BibTeX records: Daniel J. Weitzner

download as .bib file

@article{DBLP:journals/corr/abs-2402-01007,
  author       = {Avital Baral and
                  Taylor Reynolds and
                  Lawrence Susskind and
                  Daniel J. Weitzner and
                  Angelina Wu},
  title        = {Municipal cyber risk modeling using cryptographic computing to inform
                  cyber policymaking},
  journal      = {CoRR},
  volume       = {abs/2402.01007},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.01007},
  doi          = {10.48550/ARXIV.2402.01007},
  eprinttype    = {arXiv},
  eprint       = {2402.01007},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-01007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-04166,
  author       = {Taylor Reynolds and
                  Sarah Scheffler and
                  Daniel J. Weitzner and
                  Angelina Wu},
  title        = {Mind the Gap: Securely modeling cyber risk based on security deviations
                  from a peer group},
  journal      = {CoRR},
  volume       = {abs/2402.04166},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.04166},
  doi          = {10.48550/ARXIV.2402.04166},
  eprinttype    = {arXiv},
  eprint       = {2402.04166},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-04166.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/23/HendlerS0BW23,
  author       = {James A. Hendler and
                  Nigel Shadbolt and
                  Wendy Hall and
                  Tim Berners{-}Lee and
                  Daniel J. Weitzner},
  editor       = {Oshani Seneviratne and
                  James A. Hendler},
  title        = {Web Science: An Interdisciplinary Approach to Understanding the Web},
  booktitle    = {Linking the World's Information - Essays on Tim Berners-Lee's Invention
                  of the World Wide Web},
  series       = {{ACM} Books},
  volume       = {52},
  pages        = {67--84},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591366.3591374},
  doi          = {10.1145/3591366.3591374},
  timestamp    = {Thu, 21 Sep 2023 14:12:24 +0200},
  biburl       = {https://dblp.org/rec/books/acm/23/HendlerS0BW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/acm/23/Weitzner23,
  author       = {Daniel J. Weitzner},
  editor       = {Oshani Seneviratne and
                  James A. Hendler},
  title        = {What the World Needs to Keep Learning from Tim Berners-Lee's Creation
                  of the Web},
  booktitle    = {Linking the World's Information - Essays on Tim Berners-Lee's Invention
                  of the World Wide Web},
  series       = {{ACM} Books},
  volume       = {52},
  pages        = {231--240},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3591366.3591386},
  doi          = {10.1145/3591366.3591386},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/acm/23/Weitzner23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cslaw/2022,
  editor       = {Daniel J. Weitzner and
                  Joan Feigenbaum and
                  Christopher S. Yoo},
  title        = {Proceedings of the 2022 Symposium on Computer Science and Law, {CSLAW}
                  2022, Washington DC, USA, November 1-2, 2022},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511265},
  doi          = {10.1145/3511265},
  isbn         = {978-1-4503-9234-1},
  timestamp    = {Thu, 03 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cslaw/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-04940,
  author       = {Jenny Blessing and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities
                  in Cryptographic Libraries},
  journal      = {CoRR},
  volume       = {abs/2107.04940},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.04940},
  eprinttype    = {arXiv},
  eprint       = {2107.04940},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-04940.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/SpecterKW20,
  author       = {Michael A. Specter and
                  James Koppel and
                  Daniel J. Weitzner},
  editor       = {Srdjan Capkun and
                  Franziska Roesner},
  title        = {The Ballot is Busted Before the Blockchain: {A} Security Analysis
                  of Voatz, the First Internet Voting Application Used in {U.S.} Federal
                  Elections},
  booktitle    = {29th {USENIX} Security Symposium, {USENIX} Security 2020, August 12-14,
                  2020},
  pages        = {1535--1553},
  publisher    = {{USENIX} Association},
  year         = {2020},
  url          = {https://www.usenix.org/conference/usenixsecurity20/presentation/specter},
  timestamp    = {Fri, 29 Jan 2021 22:08:55 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/SpecterKW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-04770,
  author       = {John Meklenburg and
                  Michael A. Specter and
                  Michael Wentz and
                  Hari Balakrishnan and
                  Anantha P. Chandrakasan and
                  John Cohn and
                  Gary Hatke and
                  Louise Ivers and
                  Ronald L. Rivest and
                  Gerald Jay Sussman and
                  Daniel J. Weitzner},
  title        = {SonicPACT: An Ultrasonic Ranging Method for the Private Automated
                  Contact Tracing {(PACT)} Protocol},
  journal      = {CoRR},
  volume       = {abs/2012.04770},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.04770},
  eprinttype    = {arXiv},
  eprint       = {2012.04770},
  timestamp    = {Mon, 27 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-04770.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CanettiKLRSSTVW20,
  author       = {Ran Canetti and
                  Yael Tauman Kalai and
                  Anna Lysyanskaya and
                  Ronald L. Rivest and
                  Adi Shamir and
                  Emily Shen and
                  Ari Trachtenberg and
                  Mayank Varia and
                  Daniel J. Weitzner},
  title        = {Privacy-Preserving Automated Exposure Notification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {863},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/863},
  timestamp    = {Mon, 27 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CanettiKLRSSTVW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/KraskaSBSW19,
  author       = {Tim Kraska and
                  Michael Stonebraker and
                  Michael L. Brodie and
                  Sacha Servan{-}Schreiber and
                  Daniel J. Weitzner},
  editor       = {Vijay Gadepally and
                  Timothy G. Mattson and
                  Michael Stonebraker and
                  Fusheng Wang and
                  Gang Luo and
                  Yanhui Laing and
                  Alevtina Dubovitskaya},
  title        = {SchengenDB: {A} Data Protection Database Proposal},
  booktitle    = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare
                  - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August
                  30, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11721},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33752-0\_2},
  doi          = {10.1007/978-3-030-33752-0\_2},
  timestamp    = {Wed, 03 Aug 2022 16:12:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/KraskaSBSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/FeigenbaumW18,
  author       = {Joan Feigenbaum and
                  Daniel J. Weitzner},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {On the Incommensurability of Laws and Technical Mechanisms: Or, What
                  Cryptography Can't Do},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {266--279},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_31},
  doi          = {10.1007/978-3-030-03251-7\_31},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/spw/FeigenbaumW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/Weitzner18,
  author       = {Daniel J. Weitzner},
  editor       = {Vashek Maty{\'{a}}s and
                  Petr Svenda and
                  Frank Stajano and
                  Bruce Christianson and
                  Jonathan Anderson},
  title        = {On the Incommensurability of Laws and Technical Mechanisms: Or, What
                  Cryptography Can't Do (Transcript of Discussion)},
  booktitle    = {Security Protocols {XXVI} - 26th International Workshop, Cambridge,
                  UK, March 19-21, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11286},
  pages        = {280--288},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03251-7\_32},
  doi          = {10.1007/978-3-030-03251-7\_32},
  timestamp    = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spw/Weitzner18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/FranklePSGW18,
  author       = {Jonathan Frankle and
                  Sunoo Park and
                  Daniel Shaar and
                  Shafi Goldwasser and
                  Daniel J. Weitzner},
  editor       = {William Enck and
                  Adrienne Porter Felt},
  title        = {Practical Accountability of Secret Processes},
  booktitle    = {27th {USENIX} Security Symposium, {USENIX} Security 2018, Baltimore,
                  MD, USA, August 15-17, 2018},
  pages        = {657--674},
  publisher    = {{USENIX} Association},
  year         = {2018},
  url          = {https://www.usenix.org/conference/usenixsecurity18/presentation/frankie},
  timestamp    = {Mon, 01 Feb 2021 08:43:20 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/FranklePSGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FranklePSGW18,
  author       = {Jonathan Frankle and
                  Sunoo Park and
                  Daniel Shaar and
                  Shafi Goldwasser and
                  Daniel J. Weitzner},
  title        = {Practical Accountability of Secret Processes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {697},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/697},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FranklePSGW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/BinnsZKSLW17,
  author       = {Reuben Binns and
                  Jun Zhao and
                  Max Van Kleek and
                  Nigel Shadbolt and
                  Ilaria Liccardi and
                  Daniel J. Weitzner},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {My Bank Already Gets this Data: Exposure Minimisation and Company
                  Relationships in Privacy Decision-Making},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017, Extended Abstracts},
  pages        = {2403--2409},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3027063.3053255},
  doi          = {10.1145/3027063.3053255},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/BinnsZKSLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/KleekLBZWS17,
  author       = {Max Van Kleek and
                  Ilaria Liccardi and
                  Reuben Binns and
                  Jun Zhao and
                  Daniel J. Weitzner and
                  Nigel Shadbolt},
  editor       = {Gloria Mark and
                  Susan R. Fussell and
                  Cliff Lampe and
                  m. c. schraefel and
                  Juan Pablo Hourcade and
                  Caroline Appert and
                  Daniel Wigdor},
  title        = {Better the Devil You Know: Exposing the Data Sharing Practices of
                  Smartphone Apps},
  booktitle    = {Proceedings of the 2017 {CHI} Conference on Human Factors in Computing
                  Systems, Denver, CO, USA, May 06-11, 2017},
  pages        = {5208--5220},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3025453.3025556},
  doi          = {10.1145/3025453.3025556},
  timestamp    = {Mon, 30 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/KleekLBZWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CranorRSVW16,
  author       = {Lorrie Faith Cranor and
                  Tal Rabin and
                  Vitaly Shmatikov and
                  Salil P. Vadhan and
                  Daniel J. Weitzner},
  title        = {Towards a Privacy Research Roadmap for the Computing Community},
  journal      = {CoRR},
  volume       = {abs/1604.03160},
  year         = {2016},
  url          = {http://arxiv.org/abs/1604.03160},
  eprinttype    = {arXiv},
  eprint       = {1604.03160},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/CranorRSVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AbelsonABBBDGGL15,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats},
  journal      = {Commun. {ACM}},
  volume       = {58},
  number       = {10},
  pages        = {24--26},
  year         = {2015},
  url          = {https://doi.org/10.1145/2814825},
  doi          = {10.1145/2814825},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/AbelsonABBBDGGL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecurity/AbelsonABBBDGG015,
  author       = {Harold Abelson and
                  Ross J. Anderson and
                  Steven M. Bellovin and
                  Josh Benaloh and
                  Matt Blaze and
                  Whitfield Diffie and
                  John Gilmore and
                  Matthew Green and
                  Susan Landau and
                  Peter G. Neumann and
                  Ronald L. Rivest and
                  Jeffrey I. Schiller and
                  Bruce Schneier and
                  Michael A. Specter and
                  Daniel J. Weitzner},
  title        = {Keys under doormats: mandating insecurity by requiring government
                  access to all data and communications},
  journal      = {J. Cybersecur.},
  volume       = {1},
  number       = {1},
  pages        = {69--79},
  year         = {2015},
  url          = {https://doi.org/10.1093/cybsec/tyv009},
  doi          = {10.1093/CYBSEC/TYV009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cybersecurity/AbelsonABBBDGG015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/ShihLW15,
  author       = {Fuming Shih and
                  Ilaria Liccardi and
                  Daniel J. Weitzner},
  editor       = {Bo Begole and
                  Jinwoo Kim and
                  Kori Inkpen and
                  Woontack Woo},
  title        = {Privacy Tipping Points in Smartphones Privacy Preferences},
  booktitle    = {Proceedings of the 33rd Annual {ACM} Conference on Human Factors in
                  Computing Systems, {CHI} 2015, Seoul, Republic of Korea, April 18-23,
                  2015},
  pages        = {807--816},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2702123.2702404},
  doi          = {10.1145/2702123.2702404},
  timestamp    = {Fri, 12 Mar 2021 15:27:48 +0100},
  biburl       = {https://dblp.org/rec/conf/chi/ShihLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpc/LiccardiPW14,
  author       = {Ilaria Liccardi and
                  Joseph Pato and
                  Daniel J. Weitzner},
  title        = {Improving User Choice Through Better Mobile Apps Transparency and
                  Permissions Analysis},
  journal      = {J. Priv. Confidentiality},
  volume       = {5},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.29012/jpc.v5i2.630},
  doi          = {10.29012/JPC.V5I2.630},
  timestamp    = {Wed, 09 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpc/LiccardiPW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LiccardiPWAR14,
  author       = {Ilaria Liccardi and
                  Joseph N. Pato and
                  Daniel J. Weitzner and
                  Hal Abelson and
                  David De Roure},
  editor       = {Moustafa Youssef and
                  Cecilia Mascolo and
                  Fahim Kawsar},
  title        = {No technical understanding required: helping users make informed choices
                  about access to their personal data},
  booktitle    = {11th International Conference on Mobile and Ubiquitous Systems: Computing,
                  Networking and Services, {MOBIQUITOUS} 2014, London, United Kingdom,
                  December 2-5, 2014},
  pages        = {140--150},
  publisher    = {{ICST} / {ACM}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.mobiquitous.2014.258066},
  doi          = {10.4108/ICST.MOBIQUITOUS.2014.258066},
  timestamp    = {Wed, 24 Feb 2021 08:54:23 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LiccardiPWAR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/LiccardiBAWM14,
  author       = {Ilaria Liccardi and
                  Monica Bulger and
                  Harold Abelson and
                  Daniel J. Weitzner and
                  Wendy E. Mackay},
  editor       = {Ali Miri and
                  Urs Hengartner and
                  Nen{-}Fu Huang and
                  Audun J{\o}sang and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Can apps play by the {COPPA} Rules?},
  booktitle    = {2014 Twelfth Annual International Conference on Privacy, Security
                  and Trust, Toronto, ON, Canada, July 23-24, 2014},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/PST.2014.6890917},
  doi          = {10.1109/PST.2014.6890917},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/LiccardiBAWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ZhangSW13,
  author       = {Frances Zhang and
                  Fuming Shih and
                  Daniel J. Weitzner},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Sara Foresti},
  title        = {No surprises: measuring intrusiveness of smartphone applications by
                  detecting objective context deviations},
  booktitle    = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages        = {291--296},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517840.2517864},
  doi          = {10.1145/2517840.2517864},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ZhangSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/websci/FeigenbaumHJWW11,
  author       = {Joan Feigenbaum and
                  James A. Hendler and
                  Aaron D. Jaggard and
                  Daniel J. Weitzner and
                  Rebecca N. Wright},
  editor       = {David De Roure and
                  Marshall Scott Poole},
  title        = {Accountability and deterrence in online life},
  booktitle    = {Web Science 2011, WebSci '11, Koblenz, Germany - June 15 - 17, 2011},
  pages        = {7:1--7:7},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2527031.2527043},
  doi          = {10.1145/2527031.2527043},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/websci/FeigenbaumHJWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/intr/KaporW10,
  author       = {Mitchell Kapor and
                  Daniel J. Weitzner},
  title        = {Developing the national communications and information infrastructure},
  journal      = {Internet Res.},
  volume       = {20},
  number       = {4},
  pages        = {395--407},
  year         = {2010},
  url          = {https://doi.org/10.1108/10662241011059435},
  doi          = {10.1108/10662241011059435},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/intr/KaporW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/schraefelAWTBCJKDMMSSW09,
  author       = {m. c. schraefel and
                  Paul Andr{\'{e}} and
                  Ryen White and
                  Desney S. Tan and
                  Tim Berners{-}Lee and
                  Sunny Consolvo and
                  Robert Jacobs and
                  Isaac S. Kohane and
                  Christopher A. Le Dantec and
                  Lena Mamykina and
                  Gary Marsden and
                  Ben Shneiderman and
                  Peter Szolovits and
                  Daniel J. Weitzner},
  editor       = {Dan R. Olsen Jr. and
                  Richard B. Arthur and
                  Ken Hinckley and
                  Meredith Ringel Morris and
                  Scott E. Hudson and
                  Saul Greenberg},
  title        = {Interacting with eHealth: towards grand challenges for {HCI}},
  booktitle    = {Proceedings of the 27th International Conference on Human Factors
                  in Computing Systems, {CHI} 2009, Extended Abstracts Volume, Boston,
                  MA, USA, April 4-9, 2009},
  pages        = {3309--3312},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1520340.1520476},
  doi          = {10.1145/1520340.1520476},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/schraefelAWTBCJKDMMSSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/WeitznerABFHS08,
  author       = {Daniel J. Weitzner and
                  Harold Abelson and
                  Tim Berners{-}Lee and
                  Joan Feigenbaum and
                  James A. Hendler and
                  Gerald J. Sussman},
  title        = {Information accountability},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {6},
  pages        = {82--87},
  year         = {2008},
  url          = {https://doi.org/10.1145/1349026.1349043},
  doi          = {10.1145/1349026.1349043},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/WeitznerABFHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/HendlerSHBW08,
  author       = {James A. Hendler and
                  Nigel Shadbolt and
                  Wendy Hall and
                  Tim Berners{-}Lee and
                  Daniel J. Weitzner},
  title        = {Web science: an interdisciplinary approach to understanding the web},
  journal      = {Commun. {ACM}},
  volume       = {51},
  number       = {7},
  pages        = {60--69},
  year         = {2008},
  url          = {https://doi.org/10.1145/1364782.1364798},
  doi          = {10.1145/1364782.1364798},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/HendlerSHBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner08,
  author       = {Daniel J. Weitzner},
  title        = {Net Neutrality... Seriously this Time},
  journal      = {{IEEE} Internet Comput.},
  volume       = {12},
  number       = {3},
  pages        = {86--89},
  year         = {2008},
  url          = {https://doi.org/10.1109/MIC.2008.59},
  doi          = {10.1109/MIC.2008.59},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KagalHW08,
  author       = {Lalana Kagal and
                  Chris Hanson and
                  Daniel J. Weitzner},
  title        = {Using Dependency Tracking to Provide Explanations for Policy Management},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.51},
  doi          = {10.1109/POLICY.2008.51},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/KagalHW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07,
  author       = {Daniel J. Weitzner},
  title        = {Twelve Billion Bargaining Chips: The Web Side of the Net Neutrality
                  Debate},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {1},
  pages        = {78--81},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.25},
  doi          = {10.1109/MIC.2007.25},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07a,
  author       = {Daniel J. Weitzner},
  title        = {From Home to Home Page: New Challenges to Basic Notions of Privacy
                  and Property},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {2},
  pages        = {90--93},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.33},
  doi          = {10.1109/MIC.2007.33},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07b,
  author       = {Daniel J. Weitzner},
  title        = {Free Speech and Child Protection on the Web},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {3},
  pages        = {86--89},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.54},
  doi          = {10.1109/MIC.2007.54},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07c,
  author       = {Daniel J. Weitzner},
  title        = {Whose Name Is It, Anyway? Decentralized Identity Systems on the Web},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {4},
  pages        = {72--76},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.95},
  doi          = {10.1109/MIC.2007.95},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07d,
  author       = {Daniel J. Weitzner},
  title        = {Beyond Secrecy: New Privacy Protection Strategies for Open Information
                  Spaces},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {5},
  pages        = {94--96},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.101},
  doi          = {10.1109/MIC.2007.101},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner07e,
  author       = {Daniel J. Weitzner},
  title        = {Google, Profiling, and Privacy},
  journal      = {{IEEE} Internet Comput.},
  volume       = {11},
  number       = {6},
  pages        = {95--96},
  year         = {2007},
  url          = {https://doi.org/10.1109/MIC.2007.129},
  doi          = {10.1109/MIC.2007.129},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner07e.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/Weitzner07,
  author       = {Daniel J. Weitzner},
  title        = {Personal Privacy without Computational Obscurity: Rethinking Privacy
                  Protection Strategies for Open Information Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {173--175},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.50},
  doi          = {10.1109/ACSAC.2007.50},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/Weitzner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/HansonBKSW07,
  author       = {Chris Hanson and
                  Tim Berners{-}Lee and
                  Lalana Kagal and
                  Gerald J. Sussman and
                  Daniel J. Weitzner},
  title        = {Data-Purpose Algebra: Modeling Data Usage Policies},
  booktitle    = {8th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages        = {173--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/POLICY.2007.14},
  doi          = {10.1109/POLICY.2007.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/HansonBKSW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/Weitzner07,
  author       = {Daniel J. Weitzner},
  editor       = {Timothy W. Finin and
                  Lalana Kagal and
                  Daniel Olmedilla},
  title        = {Beyond Secrecy: New Privacy Protection Strategies for the World Wide
                  Web},
  booktitle    = {Proceedings of the ISWC'07 Workshop on Privacy Enforcement and Accountability
                  with Semantics {(PEAS} 2007), Busan, Korea, Nov. 12, 2007},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {320},
  publisher    = {CEUR-WS.org},
  year         = {2007},
  url          = {https://ceur-ws.org/Vol-320/paper1.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:23:04 +0100},
  biburl       = {https://dblp.org/rec/conf/semweb/Weitzner07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ftweb/Berners-LeeHHOSW06,
  author       = {Tim Berners{-}Lee and
                  Wendy Hall and
                  James A. Hendler and
                  Kieron O'Hara and
                  Nigel Shadbolt and
                  Daniel J. Weitzner},
  title        = {A Framework for Web Science},
  journal      = {Found. Trends Web Sci.},
  volume       = {1},
  number       = {1},
  pages        = {1--130},
  year         = {2006},
  url          = {https://doi.org/10.1561/1800000001},
  doi          = {10.1561/1800000001},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ftweb/Berners-LeeHHOSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Weitzner06,
  author       = {Daniel J. Weitzner},
  title        = {In Search of Manageable Identity Systems},
  journal      = {{IEEE} Internet Comput.},
  volume       = {10},
  number       = {6},
  pages        = {84--86},
  year         = {2006},
  url          = {https://doi.org/10.1109/MIC.2006.127},
  doi          = {10.1109/MIC.2006.127},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Weitzner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaai/KagalBCW06,
  author       = {Lalana Kagal and
                  Tim Berners{-}Lee and
                  Dan Connolly and
                  Daniel J. Weitzner},
  title        = {Using Semantic Web Technologies for Policy Management on the Web},
  booktitle    = {Proceedings, The Twenty-First National Conference on Artificial Intelligence
                  and the Eighteenth Innovative Applications of Artificial Intelligence
                  Conference, July 16-20, 2006, Boston, Massachusetts, {USA}},
  pages        = {1337--1344},
  publisher    = {{AAAI} Press},
  year         = {2006},
  url          = {http://www.aaai.org/Library/AAAI/2006/aaai06-210.php},
  timestamp    = {Tue, 05 Sep 2023 09:10:47 +0200},
  biburl       = {https://dblp.org/rec/conf/aaai/KagalBCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaaiss/WeitznerABHHKMSW06,
  author       = {Daniel J. Weitzner and
                  Harold Abelson and
                  Tim Berners{-}Lee and
                  Chris Hanson and
                  James A. Hendler and
                  Lalana Kagal and
                  Deborah L. McGuinness and
                  Gerald Jay Sussman and
                  K. Krasnow Waterman},
  title        = {Transparent Accountable Data Mining: New Strategies for Privacy Protection},
  booktitle    = {Semantic Web Meets eGovernment, Papers from the 2006 {AAAI} Spring
                  Symposium, Technical Report SS-06-06, Stanford, California, USA, March
                  27-29, 2006},
  pages        = {141},
  publisher    = {{AAAI}},
  year         = {2006},
  url          = {http://www.aaai.org/Library/Symposia/Spring/2006/ss06-06-025.php},
  timestamp    = {Sat, 18 Feb 2012 12:30:46 +0100},
  biburl       = {https://dblp.org/rec/conf/aaaiss/WeitznerABHHKMSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KagalBCW06,
  author       = {Lalana Kagal and
                  Tim Berners{-}Lee and
                  Dan Connolly and
                  Daniel J. Weitzner},
  title        = {Self-Describing Delegation Networks for the Web},
  booktitle    = {7th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada},
  pages        = {205--214},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/POLICY.2006.29},
  doi          = {10.1109/POLICY.2006.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/KagalBCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/Weitzner06,
  author       = {Daniel J. Weitzner},
  editor       = {Les Carr and
                  David De Roure and
                  Arun Iyengar and
                  Carole A. Goble and
                  Michael Dahlin},
  title        = {Broken links on the web: local laws and the global free flow of information},
  booktitle    = {Proceedings of the 15th international conference on World Wide Web,
                  {WWW} 2006, Edinburgh, Scotland, UK, May 23-26, 2006},
  pages        = {489},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1135777.1135782},
  doi          = {10.1145/1135777.1135782},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/www/Weitzner06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/semweb/Weitzner05,
  author       = {Daniel J. Weitzner},
  editor       = {Yolanda Gil and
                  Enrico Motta and
                  V. Richard Benjamins and
                  Mark A. Musen},
  title        = {Semantic Web Public Policy Challenges: Privacy, Provenance, Property
                  and Personhood},
  booktitle    = {The Semantic Web - {ISWC} 2005, 4th International Semantic Web Conference,
                  {ISWC} 2005, Galway, Ireland, November 6-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3729},
  pages        = {5},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11574620\_3},
  doi          = {10.1007/11574620\_3},
  timestamp    = {Tue, 07 Sep 2021 13:47:46 +0200},
  biburl       = {https://dblp.org/rec/conf/semweb/Weitzner05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/hhci/AckermanDW01,
  author       = {Mark S. Ackerman and
                  Trevor Darrell and
                  Daniel J. Weitzner},
  title        = {Privacy in Context},
  journal      = {Hum. Comput. Interact.},
  volume       = {16},
  number       = {2-4},
  pages        = {167--176},
  year         = {2001},
  url          = {https://doi.org/10.1207/S15327051HCI16234\_03},
  doi          = {10.1207/S15327051HCI16234\_03},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/hhci/AckermanDW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/BermanW97,
  author       = {Jerry Berman and
                  Daniel J. Weitzner},
  title        = {Directing Policy-Making Beyond the Net's Metaphor},
  journal      = {Commun. {ACM}},
  volume       = {40},
  number       = {2},
  pages        = {83--84},
  year         = {1997},
  url          = {https://doi.org/10.1145/253671.253723},
  doi          = {10.1145/253671.253723},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/BermanW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics