Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Sara Sinclair
2010 – today
- 2010
[j2]Sara Sinclair, Sean W. Smith: What's Wrong with Access Control in the Real World? IEEE Security & Privacy 8(4): 74-77 (2010)
[c4]Massimiliano Pala, Sara Sinclair, Sean W. Smith: PorKI: Portable PKI Credentials via Proxy Certificates. EuroPKI 2010: 1-16
2000 – 2009
- 2009
[c3]Stephanie Trudeau, Sara Sinclair, Sean W. Smith: The effects of introspection on creating privacy policy. WPES 2009: 1-10- 2008
[p1]Sara Sinclair, Sean W. Smith: Preventative Directions For Insider Threat Mitigation Via Access Control. Insider Attack and Cyber Security 2008: 165-194
[e1]Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair (Eds.): Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6- 2007
[c2]Sara Sinclair, Sean W. Smith, Stephanie Trudeau, M. Eric Johnson, Anthony Portera: Information Risk in Financial Institutions: Field Study and Research Roadmap. FinanceCom 2007: 165-180- 2005
[j1]Sara Sinclair, Sean W. Smith: The TIPPI Point: Toward Trustworthy Interfaces. IEEE Security & Privacy 3(4): 68-71 (2005)
[c1]Sara Sinclair, Sean W. Smith: PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. ACSAC 2005: 419-430
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 10:57 CEST by the dblp team



