ACM code of ethics and professional conduct DW Gotterbarn, B Brinkman, C Flick, MS Kirkpatrick, K Miller, K Vazansky, ... Association for Computing Machinery, 2018 | 71 | 2018 |
Enforcing spatial constraints for mobile RBAC systems MS Kirkpatrick, E Bertino Proceedings of the 15th ACM symposium on Access control models and …, 2010 | 71 | 2010 |
System on chip and method for cryptography using a physically unclonable function MS Kirkpatrick, S Kerr, E Bertino US Patent 8,750,502, 2014 | 66 | 2014 |
Marlin: A fine grained randomization approach to defend against ROP attacks A Gupta, S Kerr, MS Kirkpatrick, E Bertino Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 56 | 2013 |
Prox-RBAC: A proximity-based spatially aware RBAC MS Kirkpatrick, ML Damiani, E Bertino Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances …, 2011 | 51 | 2011 |
Location-based access control systems for mobile users: concepts and research directions E Bertino, MS Kirkpatrick Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and …, 2011 | 45 | 2011 |
Privacy-preserving enforcement of spatially aware RBAC MS Kirkpatrick, G Ghinita, E Bertino IEEE Transactions on Dependable and Secure Computing 9 (5), 627-640, 2011 | 35 | 2011 |
Evaluating an alternative CS1 for students with prior programming experience MS Kirkpatrick, C Mayfield Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017 | 34 | 2017 |
A formal proximity model for RBAC systems A Gupta, MS Kirkpatrick, E Bertino Computers & Security 41, 52-67, 2014 | 34 | 2014 |
Marlin: Mitigating code reuse attacks using code randomization A Gupta, J Habibi, MS Kirkpatrick, E Bertino IEEE Transactions on Dependable and Secure Computing 12 (3), 326-337, 2014 | 32 | 2014 |
Software techniques to combat drift in PUF-based authentication systems MS Kirkpatrick, E Bertino Workshop on Secure Component and System Identification (SECSI 2010), 9, 2010 | 27 | 2010 |
Location-aware authentication and access control concepts and issues E Bertino, M Kirkpatrick 2009 International Conference on Advanced Information Networking and …, 2009 | 26 | 2009 |
Assignments that blend ethics and technology SA Doore, C Fiesler, MS Kirkpatrick, E Peck, M Sahami Proceedings of the 51st ACM Technical Symposium on Computer Science …, 2020 | 25 | 2020 |
PUF ROKs: A hardware approach to read-once keys MS Kirkpatrick, S Kerr, E Bertino Proceedings of the 6th ACM Symposium on Information, Computer and …, 2011 | 20 | 2011 |
PEAR: a hardware based protocol authentication system S Kerr, MS Kirkpatrick, E Bertino Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and …, 2010 | 19 | 2010 |
ACM code of ethics and professional conduct (2018) DW Gotterbarn, B Brinkman, C Flick, MS Kirkpatrick, K Miller, K Vazansky, ... URL: https://www. acm. org/code-of-ethics, 2018 | 18 | 2018 |
Enforcing physically restricted access control for remote data MS Kirkpatrick, S Kerr Proceedings of the first ACM conference on Data and application security and …, 2011 | 17 | 2011 |
Student perspectives of team-based learning in a CS course: Summary of qualitative findings MS Kirkpatrick Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science …, 2017 | 14 | 2017 |
PUF ROKs: generating read-once keys from physically unclonable functions MS Kirkpatrick, E Bertino, S Kerr Proceedings of the Sixth Annual Workshop on Cyber Security and Information …, 2010 | 14 | 2010 |
System on chip and method for cryptography using a physically unclonable function M Kirkpatrick, S Kerr, E Bertino | 13 | 2012 |