default search action
Mary Ellen Zurko
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Adam Tse, Swaroop Vattam, Vincent J. Ercolani, Douglas Stetson, Mary Ellen Zurko:
A Testbed for Operations in the Information Environment. CSET @ USENIX Security Symposium 2024: 83-90 - 2023
- [j10]Mary Ellen Zurko, Julie M. Haney:
Usable Security and Privacy for Security and Privacy Workers. IEEE Secur. Priv. 21(1): 8-10 (2023) - [j9]Mary Ellen Zurko:
Unusable Security for Attackers [From the Editors]. IEEE Secur. Priv. 21(6): 4-7 (2023) - 2022
- [j8]Mary Ellen Zurko:
Disinformation and Reflections From Usable Security. IEEE Secur. Priv. 20(3): 4-7 (2022) - 2021
- [j7]Amy Dettmer, Hamed Okhravi, Kevin Perry, Nabil Schear, Richard Shay, Mary Ellen Zurko, Paula J. Donovan:
Lessons Learned From Designing a Security Architecture for Real-World Government Agencies. IEEE Secur. Priv. 19(4): 28-36 (2021) - 2020
- [j6]Adam Shostack, Mary Ellen Zurko:
Secure development tools and techniques need more research that will increase their impact and effectiveness in practice. Commun. ACM 63(5): 39-41 (2020)
2010 – 2019
- 2019
- [i1]Adam Shostack, Matthew Smith, Sam Weber, Mary Ellen Zurko:
Empirical Evaluation of Secure Development Processes (Dagstuhl Seminar 19231). Dagstuhl Reports 9(6): 1-25 (2019) - 2018
- [e10]Mary Ellen Zurko, Heather Richter Lipford:
Fourteenth Symposium on Usable Privacy and Security, SOUPS 2018, Baltimore, MD, USA, August 12-14, 2018. USENIX Association 2018 [contents] - 2017
- [j5]Rick Wash, Mary Ellen Zurko:
Usable Security. IEEE Internet Comput. 21(3): 19-21 (2017) - [c20]Olgierd Pieczul, Simon N. Foley, Mary Ellen Zurko:
Developer-centered security and the symmetry of ignorance. NSPW 2017: 46-56 - [c19]Sam Weber, Adam Shostack, Jon A. Solworth, Mary Ellen Zurko:
Panel: Empirically-based Secure OS Design. NSPW 2017: 90-93 - 2016
- [c18]Mary Ellen Zurko:
La Sécurité Ouverte How We Doin? So Far? WWW 2016: 5 - 2013
- [e9]Mary Ellen Zurko, Konstantin Beznosov, Tara Whalen, Tom Longstaff:
New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013. ACM 2013, ISBN 978-1-4503-2582-0 [contents] - 2012
- [j4]Steve Lipner, Trent Jaeger, Mary Ellen Zurko:
Lessons from VAX/SVS for High-Assurance VM Systems. IEEE Secur. Priv. 10(6): 26-35 (2012) - [c17]Heather Richter Lipford, Mary Ellen Zurko:
Someone to watch over me. NSPW 2012: 67-76 - [e8]Richard Ford, Mary Ellen Zurko, Cormac Herley, Tara Whalen:
The New Security Paradigms Workshop, NSPW '12, Bertinoro, Italy - September 18 - 21, 2012. ACM 2012, ISBN 978-1-4503-1794-8 [contents] - 2011
- [r1]Mary Ellen Zurko, Richard T. Simon:
Separation of Duties. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1182-1185
2000 – 2009
- 2009
- [c16]Frederik De Keukelaere, Sachiko Yoshihama, Scott Trent, Yu Zhang, Lin Luo, Mary Ellen Zurko:
Adaptive Security Dialogs for Improved Security Behavior of Users. INTERACT (1) 2009: 510-523 - [c15]Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko:
Usability meets access control: challenges and research opportunities. SACMAT 2009: 73-74 - [c14]Mary Ellen Zurko:
Technology transfer of successful usable security research into product. SOUPS 2009 - 2008
- [c13]Mary Ellen Zurko, Andrew S. Patrick:
Panel: Usable Cryptography: Manifest Destiny or Oxymoron?. Financial Cryptography 2008: 302-306 - 2007
- [e7]Carey L. Williamson, Mary Ellen Zurko, Peter F. Patel-Schneider, Prashant J. Shenoy:
Proceedings of the 16th International Conference on World Wide Web, WWW 2007, Banff, Alberta, Canada, May 8-12, 2007. ACM 2007, ISBN 978-1-59593-654-7 [contents] - 2005
- [j3]Mary Ellen Zurko, Amy Greenwald:
Foreword. Electron. Commer. Res. 5(1): 5-6 (2005) - [c12]Mary Ellen Zurko:
User-Centered Security: Stepping Up to the Grand Challenge. ACSAC 2005: 187-202 - 2002
- [j2]Massimo Marchiori, Mary Ellen Zurko, Michael R. Lyu:
Editorial. Comput. Networks 39(5): 469-471 (2002) - [c11]Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett:
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. ACSAC 2002: 371-381 - [c10]Arun Iyengar, Ronald Mraz, Mary Ellen Zurko:
Performance Considerations in Web Security. Certification and Security in E-Services 2002: 57-71 - 2001
- [c9]Mary Ellen Zurko:
Tracking influence through citation index comparisons and preliminary case studies panel position statement. NSPW 2001: 115-117 - [e6]Vincent Y. Shen, Nobuo Saito, Michael R. Lyu, Mary Ellen Zurko:
Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001. ACM 2001, ISBN 1-58113-348-0 [contents] - [e5]Vincent Y. Shen, Nobuo Saito, Michael R. Lyu, Mary Ellen Zurko:
Poster Proceedings of the Tenth International World Wide Web Conference, WWW 10, Hong Kong, China, May 1-5, 2001. 2001 [contents] - 2000
- [e4]Mary Ellen Zurko, Steven J. Greenwald:
Proceedings of the 2000 Workshop on New Security Paradigms, Ballycotton, Co. Cork, Ireland, September 18-21, 2000. ACM 2000, ISBN 1-58113-260-3 [contents]
1990 – 1999
- 1999
- [c8]Mary Ellen Zurko:
User-Centered Security. NDSS 1999 - [c7]Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo:
A User-Centered, Modular Authorization Service Built on an RBAC Foundation. S&P 1999: 57-71 - [c6]Mary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin:
Jonah: Experience Implementing PKIX Reference Freeware. USENIX Security Symposium 1999 - [e3]Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald, Cristina Serbau:
Proceedings of the 1999 Workshop on New Security Paradigms, Caledon Hills, ON, Canada, September 22-24, 1999. ACM 1999, ISBN 1-58113-149-6 [contents] - 1998
- [e2]Bob Blakley, Darrell M. Kienzle, Mary Ellen Zurko, Steven J. Greenwald:
Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998. ACM 1998, ISBN 1-58113-168-2 [contents] - 1997
- [c5]Richard T. Simon, Mary Ellen Zurko:
Separation of Duty in Role-based Environments. CSFW 1997: 183-194 - [e1]Tom Haigh, Bob Blakley, Mary Ellen Zurko, Catherine Meodaws:
Proceedings of the 1997 Workshop on New Security Paradigms, Langdale, Cumbria, United Kingdom, September 23-26, 1997. ACM 1997, ISBN 0-89791-986-6 [contents] - 1996
- [c4]Mary Ellen Zurko, Richard T. Simon:
User-centered security. NSPW 1996: 27-33 - 1993
- [c3]Mary Ellen Zurko:
Panel: What are the Foundations of Computer Security? CSFW 1993: 85-95 - 1992
- [c2]Mary Ellen Zurko:
Attribute Support for Inter-Domain Use. CSFW 1992: 179-188 - 1991
- [j1]Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
A Retrospective on the VAX VMM Security Kernel. IEEE Trans. Software Eng. 17(11): 1147-1165 (1991) - 1990
- [c1]Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn:
A VMM Security Kernel for the VAX Architecture. S&P 1990: 2-19
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint