Search results

    Beyond the Individual: Exploring Data Protection by Design in Connected Communal SpacesPEPR '20Martin Kraemer
    Building and Deploying a Privacy Preserving Data Analysis PlatformPEPR '20Frederick Jansen
    Beyond Access: Using Abac Frameworks to Implement Privacy and Security PoliciesPEPR '20Amanda Walker
    Improving Usability of Differential Privacy at ScalePEPR '20Milinda Perera, Miguel Guevara
    Privacy Architecture for Data-Driven InnovationPEPR '20Derek Care, Nishant Bhajaria
    How to (In)Effectively Convey Privacy Choices with Icons and Link TextPEPR '20Lorrie Faith Cranor, Florian Schaub
    Throwing Out the ChecklistPEPR '20Dan Crowley
    Product Privacy Journey: Towards a Product Centric Privacy Engineering FrameworkPEPR '20Igor Trindade Oliveira
    Responsible Design through Experimentation: Learnings from LinkedInPEPR '20Guillaume Saint-Jacques
    A Differentially Private Data Analytics API at ScalePEPR '20Ryan Rogers
    Wikipedia and the Lean Data DietPEPR '20Nuria Ruiz
    Privacy Professional Boss ModePEPR '20
    Privacy in DeploymentPEPR '20Patricia Thaine, Pieter Luitjens, Parinaz Sobhani
    Design of a Privacy Infrastructure for the Internet of ThingsPEPR '20Norman Sadeh
    A Backdoor by Any Other Name, and How to Stop ItPEPR '20Maximillian Hunter
    Building an Effective Feedback Loop for Your Privacy Program through Privacy Incident ResponsePEPR '20Sri Pravallika Maddipati
    When Things Go WrongPEPR '20Lea Kissner
    Assessing Privacy Risk with the IPA TriadPEPR '20Mark Funk
    Engineering Ethics into the NIST Privacy FrameworkPEPR '20R. Jason Cronk
    Taking Responsibility for Someone Else's Code: Studying the Privacy Behaviors of Mobile Apps at ScalePEPR '20Serge Egelman
    When Engineers and Lawyers Talk: Right-Sizing Your Data Protection Risk ProfilePEPR '20Rafae Bhatti
    AURORA: Statistical Crash Analysis for Automated Root Cause ExplanationUSENIX Security '20Tim Blazytko, Moritz Schlögel, Cornelius Aschermann, Ali Abbasi, Joel Frank, Simon Wörner, Thorsten Holz
    Shim Shimmeny: Evaluating the Security and Privacy Contributions of Link Shimming in the Modern WebUSENIX Security '20Frank Li
    Everything Old is New Again: Binary Security of WebAssemblyUSENIX Security '20Daniel Lehmann, Johannes Kinder, Michael Pradel
    SmartVerif: Push the Limit of Automation Capability of Verifying Security Protocols by Dynamic StrategiesUSENIX Security '20Yan Xiong, Cheng Su, Wenchao Huang, Fuyou Miao, Wansen Wang, Hengyi Ouyang