The Community for Technology Leaders
Green Image
Issue No. 03 - May-June (vol. 21)
ISSN: 1089-7801

Front Cover (PDF)

pp. c1

Table of Contents (PDF)

pp. 2-3
From the Editors

Twenty Years in the Making (HTML)

M. Brian Blake , Drexel University
pp. 4

Masthead (PDF)

pp. 5

Internet Computing Begins (HTML)

Charles Petrie , undefined
pp. 6-7
Twentieth Anniversary Issue
The Test of Time
Guest Editors' Introduction

Usable Security (Abstract)

Rick Wash , Michigan State University
pp. 19-21
Usable Security

TLS Inspection: How Often and Who Cares? (Abstract)

Mark O'Neill , Brigham Young University and Sandia National Laboratories
Scott Ruoti , Brigham Young University and Sandia National Laboratories
Kent Seamons , Brigham Young University
Daniel Zappala , Brigham Young University
pp. 22-29

Balancing Security and Usability in Encrypted Email (Abstract)

Wei Bai , University of Maryland
Doowon Kim , University of Maryland
Moses Namara , Clemson University
Yichen Qian , University of Maryland
Patrick Gage Kelley , University of New Mexico
Michelle L. Mazurek , University of Maryland
pp. 30-38
Usable Security

Humans Are Dynamic - Our Tools Should Be Too (Abstract)

Sathya Chandran Sundaramurthy , University of South Florida
Michael Wesch , Kansas State University
Xinming Ou , University of South Florida
John McHugh , RedJack
S. Raj Rajagopalan , Honeywell Labs
Alexandru G. Bardas , Kansas State University
pp. 40-46
Usable Security

Longitudinal Privacy Management in Social Media: The Need for Better Controls (Abstract)

Mainack Mondal , Max Planck Institute for Software Systems
Johnnatan Messias , Max Planck Institute for Software Systems
Saptarshi Ghosh , IIT Kharagpur
Krishna P. Gummadi , Max Planck Institute for Software Systems
Aniket Kate , Purdue University
pp. 48-55

Understanding the Physical Safety, Security, and Privacy Concerns of People with Visual Impairments (Abstract)

Tousif Ahmed , Indiana University Bloomington
Roberto Hoyle , Oberlin College
Patrick Shaffer , Indiana University Bloomington
Kay Connelly , Indiana University Bloomington
David Crandall , Indiana University Bloomington
Apu Kapadia , Indiana University Bloomington
pp. 56-63

May the Force Be with You: The Future of Force-Sensitive Authentication (Abstract)

Katharina Krombholz , Ruhr-University Bochum and SBA Research
Thomas Hupperich , Ruhr-University Bochum
Thorsten Holz , Ruhr-University Bochum
pp. 64-69

Designing Effective Privacy Notices and Controls (Abstract)

Florian Schaub , University of Michigan
Rebecca Balebako , RAND Corporation
Lorrie Faith Cranor , Carnegie Mellon University
pp. 70-77

Internet Evolution (Abstract)

Dah Ming Chiu , Chinese University of Hong Kong
pp. 78-81
Beyond Wires

Do Not Capture: Automated Obscurity for Pervasive Imaging (Abstract)

Moo-Ryong Ra , AT&T Labs Research
Seungjoon Lee , Google
Eric Zavesky , AT&T Labs Research
pp. 82-87
View from the Cloud

Keep It Simple: Bidding for Servers in Today's Cloud Platforms (Abstract)

Prateek Sharma , University of Massachusetts Amherst
David Irwin , University of Massachusetts Amherst
Prashant Shenoy , University of Massachusetts Amherst
pp. 88-92
Big Data Bites

In Defense of MapReduce (Abstract)

Jimmy Lin , University of Waterloo
pp. 94-98
Practical Security

You Let That In? (Abstract)

Hilarie Orman , Purple Streak
pp. 99-102

On the Simulation of Everything (HTML)

pp. 103-104
91 ms
(Ver 3.3 (11022016))