Biometric recognition: Challenges and opportunities LI Millett, JN Pato National Academies Press, 2010 | 255 | 2010 |
Who goes there?: Authentication through the lens of privacy LI Millett, ST Kent National Academies Press, 2003 | 145* | 2003 |
Enterprise environment analysis S Bhatt, W Horne, J Pato, S Rajagopalan, P Rao US Patent App. 11/263,014, 2007 | 108 | 2007 |
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) S Farrell, I Reid, D Orchard, K Sankar, T Moses, EN Edwards, J Pato, ... Committee Specification 1, 1-47, 2002 | 92* | 2002 |
On inter-realm authentication in large distributed systems VD Gligor, SW Luan, JN Pato Journal of Computer Security 2 (2-3), 137-157, 1993 | 73 | 1993 |
If piracy is the problem, is DRM the answer? S Haber, B Horne, J Pato, T Sander, RE Tarjan Digital Rights Management: Technological, Economic, Legal and Political …, 2003 | 65 | 2003 |
The Network Computing Architecture and System: An Environment for Developing Distributed Applications. TH Dineen, PJ Leach, N Mishkin, JN Pato, GL Wyant COMPCON, 296-299, 1988 | 62 | 1988 |
Network computing system reference manual M Kong, TH Dineen, PJ Leach, EA Martin, NW Mishkin, JN Pato, ... Prentice-Hall, Inc., 1990 | 56 | 1990 |
No technical understanding required: Helping users make informed choices about access to their personal data I Liccardi, J Pato, DJ Weitzner, H Abelson, D De Roure Proceedings of the 11th International Conference on Mobile and Ubiquitous …, 2014 | 52 | 2014 |
IDs--not that easy: questions about nationwide identity systems LI Millett, ST Kent National Academies Press, 2002 | 52 | 2002 |
Displaying program and data structures SP Reiss, JN Pato Brown University, Department of Computer Science, 1986 | 43 | 1986 |
Checkpoint object KS Klemba, CJ Crall, TA Palmer, JN Pato, AH Anderson, GP Carpenter US Patent 6,035,399, 2000 | 41 | 2000 |
Identity management: Setting context J Pato, OC Center Hewlett-Packard, Cambridge, MA, 2003 | 37 | 2003 |
On adaptive identity management: the next generation of identity management technologies MC Mont, P Bramhall, J Pato Trusted Systems Laboratory, HP Laboratories Bristol, 2003 | 35 | 2003 |
Extending the OSF DCE authorization system to support practical delegation ME Erdos, JN Pato Hewlett-Packard Company, 1993 | 32 | 1993 |
Authorization in enterprise-wide distributed system: a practical design and application V Vavadharajan, C Crall, J Pato Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998 | 31 | 1998 |
Preserving privacy based on semantic policy tools L Kagal, J Pato IEEE Security & Privacy 8 (4), 25-30, 2010 | 26 | 2010 |
Improving user choice through better mobile apps transparency and permissions analysis I Liccardi, J Pato, DJ Weitzner Journal of Privacy and Confidentiality 5 (2), 2014 | 23 | 2014 |
Improving mobile app selection through transparency and better permission analysis I Liccardi, J Pato, DJ Weitzner Journal of Privacy and Confidentiality 5 (2), 1-55, 2014 | 23 | 2014 |
The Brown workstation environment JN Pato, SP Reiss, MH Brown Department of Computer Science, Brown University, 1984 | 23 | 1984 |