Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Daniel J. Weitzner
@article{DBLP:journals/corr/abs-2402-01007, author = {Avital Baral and Taylor Reynolds and Lawrence Susskind and Daniel J. Weitzner and Angelina Wu}, title = {Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking}, journal = {CoRR}, volume = {abs/2402.01007}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01007}, doi = {10.48550/ARXIV.2402.01007}, eprinttype = {arXiv}, eprint = {2402.01007}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-01007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-04166, author = {Taylor Reynolds and Sarah Scheffler and Daniel J. Weitzner and Angelina Wu}, title = {Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group}, journal = {CoRR}, volume = {abs/2402.04166}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.04166}, doi = {10.48550/ARXIV.2402.04166}, eprinttype = {arXiv}, eprint = {2402.04166}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-04166.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/23/HendlerS0BW23, author = {James A. Hendler and Nigel Shadbolt and Wendy Hall and Tim Berners{-}Lee and Daniel J. Weitzner}, editor = {Oshani Seneviratne and James A. Hendler}, title = {Web Science: An Interdisciplinary Approach to Understanding the Web}, booktitle = {Linking the World's Information - Essays on Tim Berners-Lee's Invention of the World Wide Web}, series = {{ACM} Books}, volume = {52}, pages = {67--84}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591366.3591374}, doi = {10.1145/3591366.3591374}, timestamp = {Thu, 21 Sep 2023 14:12:24 +0200}, biburl = {https://dblp.org/rec/books/acm/23/HendlerS0BW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/acm/23/Weitzner23, author = {Daniel J. Weitzner}, editor = {Oshani Seneviratne and James A. Hendler}, title = {What the World Needs to Keep Learning from Tim Berners-Lee's Creation of the Web}, booktitle = {Linking the World's Information - Essays on Tim Berners-Lee's Invention of the World Wide Web}, series = {{ACM} Books}, volume = {52}, pages = {231--240}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3591366.3591386}, doi = {10.1145/3591366.3591386}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/acm/23/Weitzner23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cslaw/2022, editor = {Daniel J. Weitzner and Joan Feigenbaum and Christopher S. Yoo}, title = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW} 2022, Washington DC, USA, November 1-2, 2022}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511265}, doi = {10.1145/3511265}, isbn = {978-1-4503-9234-1}, timestamp = {Thu, 03 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cslaw/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-04940, author = {Jenny Blessing and Michael A. Specter and Daniel J. Weitzner}, title = {You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries}, journal = {CoRR}, volume = {abs/2107.04940}, year = {2021}, url = {https://arxiv.org/abs/2107.04940}, eprinttype = {arXiv}, eprint = {2107.04940}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-04940.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/SpecterKW20, author = {Michael A. Specter and James Koppel and Daniel J. Weitzner}, editor = {Srdjan Capkun and Franziska Roesner}, title = {The Ballot is Busted Before the Blockchain: {A} Security Analysis of Voatz, the First Internet Voting Application Used in {U.S.} Federal Elections}, booktitle = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14, 2020}, pages = {1535--1553}, publisher = {{USENIX} Association}, year = {2020}, url = {https://www.usenix.org/conference/usenixsecurity20/presentation/specter}, timestamp = {Fri, 29 Jan 2021 22:08:55 +0100}, biburl = {https://dblp.org/rec/conf/uss/SpecterKW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-04770, author = {John Meklenburg and Michael A. Specter and Michael Wentz and Hari Balakrishnan and Anantha P. Chandrakasan and John Cohn and Gary Hatke and Louise Ivers and Ronald L. Rivest and Gerald Jay Sussman and Daniel J. Weitzner}, title = {SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing {(PACT)} Protocol}, journal = {CoRR}, volume = {abs/2012.04770}, year = {2020}, url = {https://arxiv.org/abs/2012.04770}, eprinttype = {arXiv}, eprint = {2012.04770}, timestamp = {Mon, 27 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-04770.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CanettiKLRSSTVW20, author = {Ran Canetti and Yael Tauman Kalai and Anna Lysyanskaya and Ronald L. Rivest and Adi Shamir and Emily Shen and Ari Trachtenberg and Mayank Varia and Daniel J. Weitzner}, title = {Privacy-Preserving Automated Exposure Notification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {863}, year = {2020}, url = {https://eprint.iacr.org/2020/863}, timestamp = {Mon, 27 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CanettiKLRSSTVW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/KraskaSBSW19, author = {Tim Kraska and Michael Stonebraker and Michael L. Brodie and Sacha Servan{-}Schreiber and Daniel J. Weitzner}, editor = {Vijay Gadepally and Timothy G. Mattson and Michael Stonebraker and Fusheng Wang and Gang Luo and Yanhui Laing and Alevtina Dubovitskaya}, title = {SchengenDB: {A} Data Protection Database Proposal}, booktitle = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August 30, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11721}, pages = {24--38}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-33752-0\_2}, doi = {10.1007/978-3-030-33752-0\_2}, timestamp = {Wed, 03 Aug 2022 16:12:01 +0200}, biburl = {https://dblp.org/rec/conf/vldb/KraskaSBSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/FeigenbaumW18, author = {Joan Feigenbaum and Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {266--279}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_31}, doi = {10.1007/978-3-030-03251-7\_31}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/spw/FeigenbaumW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spw/Weitzner18, author = {Daniel J. Weitzner}, editor = {Vashek Maty{\'{a}}s and Petr Svenda and Frank Stajano and Bruce Christianson and Jonathan Anderson}, title = {On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion)}, booktitle = {Security Protocols {XXVI} - 26th International Workshop, Cambridge, UK, March 19-21, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11286}, pages = {280--288}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03251-7\_32}, doi = {10.1007/978-3-030-03251-7\_32}, timestamp = {Tue, 27 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spw/Weitzner18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/FranklePSGW18, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, editor = {William Enck and Adrienne Porter Felt}, title = {Practical Accountability of Secret Processes}, booktitle = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore, MD, USA, August 15-17, 2018}, pages = {657--674}, publisher = {{USENIX} Association}, year = {2018}, url = {https://www.usenix.org/conference/usenixsecurity18/presentation/frankie}, timestamp = {Mon, 01 Feb 2021 08:43:20 +0100}, biburl = {https://dblp.org/rec/conf/uss/FranklePSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FranklePSGW18, author = {Jonathan Frankle and Sunoo Park and Daniel Shaar and Shafi Goldwasser and Daniel J. Weitzner}, title = {Practical Accountability of Secret Processes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {697}, year = {2018}, url = {https://eprint.iacr.org/2018/697}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/BinnsZKSLW17, author = {Reuben Binns and Jun Zhao and Max Van Kleek and Nigel Shadbolt and Ilaria Liccardi and Daniel J. Weitzner}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts}, pages = {2403--2409}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3027063.3053255}, doi = {10.1145/3027063.3053255}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/BinnsZKSLW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/KleekLBZWS17, author = {Max Van Kleek and Ilaria Liccardi and Reuben Binns and Jun Zhao and Daniel J. Weitzner and Nigel Shadbolt}, editor = {Gloria Mark and Susan R. Fussell and Cliff Lampe and m. c. schraefel and Juan Pablo Hourcade and Caroline Appert and Daniel Wigdor}, title = {Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps}, booktitle = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing Systems, Denver, CO, USA, May 06-11, 2017}, pages = {5208--5220}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3025453.3025556}, doi = {10.1145/3025453.3025556}, timestamp = {Mon, 30 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/KleekLBZWS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/CranorRSVW16, author = {Lorrie Faith Cranor and Tal Rabin and Vitaly Shmatikov and Salil P. Vadhan and Daniel J. Weitzner}, title = {Towards a Privacy Research Roadmap for the Computing Community}, journal = {CoRR}, volume = {abs/1604.03160}, year = {2016}, url = {http://arxiv.org/abs/1604.03160}, eprinttype = {arXiv}, eprint = {1604.03160}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/CranorRSVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AbelsonABBBDGGL15, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats}, journal = {Commun. {ACM}}, volume = {58}, number = {10}, pages = {24--26}, year = {2015}, url = {https://doi.org/10.1145/2814825}, doi = {10.1145/2814825}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015, author = {Harold Abelson and Ross J. Anderson and Steven M. Bellovin and Josh Benaloh and Matt Blaze and Whitfield Diffie and John Gilmore and Matthew Green and Susan Landau and Peter G. Neumann and Ronald L. Rivest and Jeffrey I. Schiller and Bruce Schneier and Michael A. Specter and Daniel J. Weitzner}, title = {Keys under doormats: mandating insecurity by requiring government access to all data and communications}, journal = {J. Cybersecur.}, volume = {1}, number = {1}, pages = {69--79}, year = {2015}, url = {https://doi.org/10.1093/cybsec/tyv009}, doi = {10.1093/CYBSEC/TYV009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/ShihLW15, author = {Fuming Shih and Ilaria Liccardi and Daniel J. Weitzner}, editor = {Bo Begole and Jinwoo Kim and Kori Inkpen and Woontack Woo}, title = {Privacy Tipping Points in Smartphones Privacy Preferences}, booktitle = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23, 2015}, pages = {807--816}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2702123.2702404}, doi = {10.1145/2702123.2702404}, timestamp = {Fri, 12 Mar 2021 15:27:48 +0100}, biburl = {https://dblp.org/rec/conf/chi/ShihLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpc/LiccardiPW14, author = {Ilaria Liccardi and Joseph Pato and Daniel J. Weitzner}, title = {Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis}, journal = {J. Priv. Confidentiality}, volume = {5}, number = {2}, year = {2014}, url = {https://doi.org/10.29012/jpc.v5i2.630}, doi = {10.29012/JPC.V5I2.630}, timestamp = {Wed, 09 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpc/LiccardiPW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LiccardiPWAR14, author = {Ilaria Liccardi and Joseph N. Pato and Daniel J. Weitzner and Hal Abelson and David De Roure}, editor = {Moustafa Youssef and Cecilia Mascolo and Fahim Kawsar}, title = {No technical understanding required: helping users make informed choices about access to their personal data}, booktitle = {11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, {MOBIQUITOUS} 2014, London, United Kingdom, December 2-5, 2014}, pages = {140--150}, publisher = {{ICST} / {ACM}}, year = {2014}, url = {https://doi.org/10.4108/icst.mobiquitous.2014.258066}, doi = {10.4108/ICST.MOBIQUITOUS.2014.258066}, timestamp = {Wed, 24 Feb 2021 08:54:23 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LiccardiPWAR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/LiccardiBAWM14, author = {Ilaria Liccardi and Monica Bulger and Harold Abelson and Daniel J. Weitzner and Wendy E. Mackay}, editor = {Ali Miri and Urs Hengartner and Nen{-}Fu Huang and Audun J{\o}sang and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Can apps play by the {COPPA} Rules?}, booktitle = {2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/PST.2014.6890917}, doi = {10.1109/PST.2014.6890917}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/LiccardiBAWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ZhangSW13, author = {Frances Zhang and Fuming Shih and Daniel J. Weitzner}, editor = {Ahmad{-}Reza Sadeghi and Sara Foresti}, title = {No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations}, booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2013, Berlin, Germany, November 4, 2013}, pages = {291--296}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517840.2517864}, doi = {10.1145/2517840.2517864}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ZhangSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11, author = {Joan Feigenbaum and James A. Hendler and Aaron D. Jaggard and Daniel J. Weitzner and Rebecca N. Wright}, editor = {David De Roure and Marshall Scott Poole}, title = {Accountability and deterrence in online life}, booktitle = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011}, pages = {7:1--7:7}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2527031.2527043}, doi = {10.1145/2527031.2527043}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/intr/KaporW10, author = {Mitchell Kapor and Daniel J. Weitzner}, title = {Developing the national communications and information infrastructure}, journal = {Internet Res.}, volume = {20}, number = {4}, pages = {395--407}, year = {2010}, url = {https://doi.org/10.1108/10662241011059435}, doi = {10.1108/10662241011059435}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/intr/KaporW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chi/schraefelAWTBCJKDMMSSW09, author = {m. c. schraefel and Paul Andr{\'{e}} and Ryen White and Desney S. Tan and Tim Berners{-}Lee and Sunny Consolvo and Robert Jacobs and Isaac S. Kohane and Christopher A. Le Dantec and Lena Mamykina and Gary Marsden and Ben Shneiderman and Peter Szolovits and Daniel J. Weitzner}, editor = {Dan R. Olsen Jr. and Richard B. Arthur and Ken Hinckley and Meredith Ringel Morris and Scott E. Hudson and Saul Greenberg}, title = {Interacting with eHealth: towards grand challenges for {HCI}}, booktitle = {Proceedings of the 27th International Conference on Human Factors in Computing Systems, {CHI} 2009, Extended Abstracts Volume, Boston, MA, USA, April 4-9, 2009}, pages = {3309--3312}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1520340.1520476}, doi = {10.1145/1520340.1520476}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chi/schraefelAWTBCJKDMMSSW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/WeitznerABFHS08, author = {Daniel J. Weitzner and Harold Abelson and Tim Berners{-}Lee and Joan Feigenbaum and James A. Hendler and Gerald J. Sussman}, title = {Information accountability}, journal = {Commun. {ACM}}, volume = {51}, number = {6}, pages = {82--87}, year = {2008}, url = {https://doi.org/10.1145/1349026.1349043}, doi = {10.1145/1349026.1349043}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/WeitznerABFHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/HendlerSHBW08, author = {James A. Hendler and Nigel Shadbolt and Wendy Hall and Tim Berners{-}Lee and Daniel J. Weitzner}, title = {Web science: an interdisciplinary approach to understanding the web}, journal = {Commun. {ACM}}, volume = {51}, number = {7}, pages = {60--69}, year = {2008}, url = {https://doi.org/10.1145/1364782.1364798}, doi = {10.1145/1364782.1364798}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/HendlerSHBW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner08, author = {Daniel J. Weitzner}, title = {Net Neutrality... Seriously this Time}, journal = {{IEEE} Internet Comput.}, volume = {12}, number = {3}, pages = {86--89}, year = {2008}, url = {https://doi.org/10.1109/MIC.2008.59}, doi = {10.1109/MIC.2008.59}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/KagalHW08, author = {Lalana Kagal and Chris Hanson and Daniel J. Weitzner}, title = {Using Dependency Tracking to Provide Explanations for Policy Management}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {54--61}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.51}, doi = {10.1109/POLICY.2008.51}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/KagalHW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07, author = {Daniel J. Weitzner}, title = {Twelve Billion Bargaining Chips: The Web Side of the Net Neutrality Debate}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {1}, pages = {78--81}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.25}, doi = {10.1109/MIC.2007.25}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07a, author = {Daniel J. Weitzner}, title = {From Home to Home Page: New Challenges to Basic Notions of Privacy and Property}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {2}, pages = {90--93}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.33}, doi = {10.1109/MIC.2007.33}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07b, author = {Daniel J. Weitzner}, title = {Free Speech and Child Protection on the Web}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {3}, pages = {86--89}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.54}, doi = {10.1109/MIC.2007.54}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07c, author = {Daniel J. Weitzner}, title = {Whose Name Is It, Anyway? Decentralized Identity Systems on the Web}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {4}, pages = {72--76}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.95}, doi = {10.1109/MIC.2007.95}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07d, author = {Daniel J. Weitzner}, title = {Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {5}, pages = {94--96}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.101}, doi = {10.1109/MIC.2007.101}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner07e, author = {Daniel J. Weitzner}, title = {Google, Profiling, and Privacy}, journal = {{IEEE} Internet Comput.}, volume = {11}, number = {6}, pages = {95--96}, year = {2007}, url = {https://doi.org/10.1109/MIC.2007.129}, doi = {10.1109/MIC.2007.129}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner07e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Weitzner07, author = {Daniel J. Weitzner}, title = {Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {173--175}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.50}, doi = {10.1109/ACSAC.2007.50}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Weitzner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/HansonBKSW07, author = {Chris Hanson and Tim Berners{-}Lee and Lalana Kagal and Gerald J. Sussman and Daniel J. Weitzner}, title = {Data-Purpose Algebra: Modeling Data Usage Policies}, booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy}, pages = {173--177}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/POLICY.2007.14}, doi = {10.1109/POLICY.2007.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/HansonBKSW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/Weitzner07, author = {Daniel J. Weitzner}, editor = {Timothy W. Finin and Lalana Kagal and Daniel Olmedilla}, title = {Beyond Secrecy: New Privacy Protection Strategies for the World Wide Web}, booktitle = {Proceedings of the ISWC'07 Workshop on Privacy Enforcement and Accountability with Semantics {(PEAS} 2007), Busan, Korea, Nov. 12, 2007}, series = {{CEUR} Workshop Proceedings}, volume = {320}, publisher = {CEUR-WS.org}, year = {2007}, url = {https://ceur-ws.org/Vol-320/paper1.pdf}, timestamp = {Fri, 10 Mar 2023 16:23:04 +0100}, biburl = {https://dblp.org/rec/conf/semweb/Weitzner07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ftweb/Berners-LeeHHOSW06, author = {Tim Berners{-}Lee and Wendy Hall and James A. Hendler and Kieron O'Hara and Nigel Shadbolt and Daniel J. Weitzner}, title = {A Framework for Web Science}, journal = {Found. Trends Web Sci.}, volume = {1}, number = {1}, pages = {1--130}, year = {2006}, url = {https://doi.org/10.1561/1800000001}, doi = {10.1561/1800000001}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ftweb/Berners-LeeHHOSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/Weitzner06, author = {Daniel J. Weitzner}, title = {In Search of Manageable Identity Systems}, journal = {{IEEE} Internet Comput.}, volume = {10}, number = {6}, pages = {84--86}, year = {2006}, url = {https://doi.org/10.1109/MIC.2006.127}, doi = {10.1109/MIC.2006.127}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/Weitzner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/KagalBCW06, author = {Lalana Kagal and Tim Berners{-}Lee and Dan Connolly and Daniel J. Weitzner}, title = {Using Semantic Web Technologies for Policy Management on the Web}, booktitle = {Proceedings, The Twenty-First National Conference on Artificial Intelligence and the Eighteenth Innovative Applications of Artificial Intelligence Conference, July 16-20, 2006, Boston, Massachusetts, {USA}}, pages = {1337--1344}, publisher = {{AAAI} Press}, year = {2006}, url = {http://www.aaai.org/Library/AAAI/2006/aaai06-210.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/KagalBCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaaiss/WeitznerABHHKMSW06, author = {Daniel J. Weitzner and Harold Abelson and Tim Berners{-}Lee and Chris Hanson and James A. Hendler and Lalana Kagal and Deborah L. McGuinness and Gerald Jay Sussman and K. Krasnow Waterman}, title = {Transparent Accountable Data Mining: New Strategies for Privacy Protection}, booktitle = {Semantic Web Meets eGovernment, Papers from the 2006 {AAAI} Spring Symposium, Technical Report SS-06-06, Stanford, California, USA, March 27-29, 2006}, pages = {141}, publisher = {{AAAI}}, year = {2006}, url = {http://www.aaai.org/Library/Symposia/Spring/2006/ss06-06-025.php}, timestamp = {Sat, 18 Feb 2012 12:30:46 +0100}, biburl = {https://dblp.org/rec/conf/aaaiss/WeitznerABHHKMSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/KagalBCW06, author = {Lalana Kagal and Tim Berners{-}Lee and Dan Connolly and Daniel J. Weitzner}, title = {Self-Describing Delegation Networks for the Web}, booktitle = {7th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada}, pages = {205--214}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/POLICY.2006.29}, doi = {10.1109/POLICY.2006.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/KagalBCW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/Weitzner06, author = {Daniel J. Weitzner}, editor = {Les Carr and David De Roure and Arun Iyengar and Carole A. Goble and Michael Dahlin}, title = {Broken links on the web: local laws and the global free flow of information}, booktitle = {Proceedings of the 15th international conference on World Wide Web, {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006}, pages = {489}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1135777.1135782}, doi = {10.1145/1135777.1135782}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/Weitzner06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/semweb/Weitzner05, author = {Daniel J. Weitzner}, editor = {Yolanda Gil and Enrico Motta and V. Richard Benjamins and Mark A. Musen}, title = {Semantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood}, booktitle = {The Semantic Web - {ISWC} 2005, 4th International Semantic Web Conference, {ISWC} 2005, Galway, Ireland, November 6-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3729}, pages = {5}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11574620\_3}, doi = {10.1007/11574620\_3}, timestamp = {Tue, 07 Sep 2021 13:47:46 +0200}, biburl = {https://dblp.org/rec/conf/semweb/Weitzner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hhci/AckermanDW01, author = {Mark S. Ackerman and Trevor Darrell and Daniel J. Weitzner}, title = {Privacy in Context}, journal = {Hum. Comput. Interact.}, volume = {16}, number = {2-4}, pages = {167--176}, year = {2001}, url = {https://doi.org/10.1207/S15327051HCI16234\_03}, doi = {10.1207/S15327051HCI16234\_03}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/hhci/AckermanDW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/BermanW97, author = {Jerry Berman and Daniel J. Weitzner}, title = {Directing Policy-Making Beyond the Net's Metaphor}, journal = {Commun. {ACM}}, volume = {40}, number = {2}, pages = {83--84}, year = {1997}, url = {https://doi.org/10.1145/253671.253723}, doi = {10.1145/253671.253723}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/BermanW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.