Search For:

Displaying 1-8 out of 8 total
A Doctrinal Thesis
Found in: IEEE Security and Privacy
By Fred B. Schneider,Deirdre K. Mulligan
Issue Date:July 2011
pp. 3-4
Policy proposals are best made relative to a cybersecurity doctrine rather than suggested piecemeal as is being done today. A doctrine of deterrence through accountability, for example, would be a basis for rationalizing proposals that equate attacks with ...
 
Inferring Personal Information from Demand-Response Systems
Found in: IEEE Security and Privacy
By Mikhail A. Lisovich, Deirdre K. Mulligan, Stephen B. Wicker
Issue Date:January 2010
pp. 11-20
Current and upcoming demand-response systems provide increasingly detailed power-consumption data to utilities and a growing array of players angling to assist consumers in understanding and managing their energy use. The granularity of this data, as well ...
 
Transactional Confidentiality in Sensor Networks
Found in: IEEE Security and Privacy
By Sameer Pai, Marci Meingast, Tanya Roosta, Sergio Bermudez, Stephen B. Wicker, Deirdre K. Mulligan, Shankar Sastry
Issue Date:July 2008
pp. 28-35
In a sensor network environment, elements such as message rate, message size, mote frequency, and message routing can reveal transactional data—that is, information about the sensors deployed, frequency of events monitored, network topology, parties deploy...
 
I'm Pc01002/SpringPeeper/ED288l.6; Who are You?
Found in: IEEE Security and Privacy
By Susan Landau, Deirdre K. Mulligan
Issue Date:March 2008
pp. 13-15
In considering identity management, the first issue is—What is identity? This is, of course, an issue that has plagued poets, philosophers, and playwrights for centuries. We're concerned with a more prosaic version of the question: How does an entity recog...
 
The Enduring Importance of Transparency
Found in: IEEE Security & Privacy
By Deirdre K. Mulligan
Issue Date:May 2014
pp. 61-65
nullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnullnull...
 
What regulators can do to advance privacy through design
Found in: Communications of the ACM
By Kenneth A. Bamberger, Deirdre K. Mulligan
Issue Date:November 2013
pp. 20-22
Seeking to address the challenges of privacy by design through regulatory process and formal law.
     
Noticing notice: a large-scale experiment on the timing of software license agreements
Found in: Proceedings of the SIGCHI conference on Human factors in computing systems (CHI '07)
By Deirdre K. Mulligan, Jens Grossklags, Joseph A. Konstan, Nathaniel S. Good
Issue Date:April 2007
pp. 607-616
Spyware is an increasing problem. Interestingly, many programs carrying spyware honestly disclose the activities of the software, but users install the software anyway. We report on a study of software installation to assess the effectiveness of different ...
     
Introduction
Found in: Communications of the ACM
By Deirdre K. Mulligan
Issue Date:April 2003
pp. 30-33
The fair-use exceptions in U.S. copyright law are being undermined by rules programmed into consumer electronics and computers that reflect the exclusive interest of rights holders alone.
     
 1