Deprecated: The each() function is deprecated. This message will be suppressed on further calls in /home/zhenxiangba/zhenxiangba.com/public_html/phproxy-improved-master/index.php on line 456
Lujo Bauer
[go: Go Back, main page]

Lujo

Lujo Bauer
    [loo'yo]

Research Scientist
CyLab
Carnegie Mellon University

Contact Info

Collaborative Innovation Center, Room 2121
4720 Forbes Avenue
Pittsburgh, PA 15213

phone: +1-412-268-9745
fax: +1-412-268-6779
email: lb...@cmu.edu

Teaching

Fall 2008: 18-732—Secure Software Systems
Fall 2007: 18-730—Introduction to Computer Security

Advertisements

24th IFIP International Information Security Conference (SEC2009), May 18–20, 2009 in Pafos, Cyprus
16th Annual Network & Distributed System Security Symposium (NDSS), Feb 8–11, 2009 in San Diego, California, USA
2008 Symposium on Usable Privacy and Security (SOUPS), Jul 23–25, 2008 in Pittsburgh, Pennsylvania, USA
Joint workshop on Foundations of Computer Security, Automated Reasoning for Security Protocol Analysis, and Issues in the Theory of Security (FCS-ARSPA-WITS), Jun 21–22, 2008 in Pittsburgh, Pennsylvania, USA
2008 ACM Symposium on Access Control Models and Technologies (SACMAT), Jun 11–13, 2008 in Estes Park, Colorado, USA
6th International Conference on Applied Cryptography and Network Security (ACNS), Jun 3–6, 2008 in New York, New York, USA

Research Interests

I do research in computer security—I'm particularly interested in building usable access-control systems with sound theoretical underpinnings, and generally in narrowing the gap between a formal model and a usable system. Key terms: proof-carrying authorization, distributed access control, program monitors, security automata, languages for specifying security policies.

Publications

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicity permission of the copyright holder.

Detecting and resolving policy misconfigurations in access-control systems.
Lujo Bauer, Scott Garriss, and Michael K. Reiter.
In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, June 2008. To appear. [BibTeX]

Composing expressive run-time security policies.
Lujo Bauer, Jay Ligatti, and David Walker.
ACM Transactions on Software Engineering and Methodology, 2008. To appear. [BibTeX]

A user study of policy creation in a flexible access-control system.
Lujo Bauer, Lorrie Cranor, Robert W. Reeder, Michael K. Reiter, and Kami Vaniea.
In CHI 2008: Conference on Human Factors in Computing Systems, April 2008. © ACM DOI:10.1145/1357054.1357143 [BibTeX]

Expandable grids for visualizing and authoring computer security policies.
Robert W. Reeder, Lujo Bauer, Lorrie Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, and Heather Strong.
In CHI 2008: Conference on Human Factors in Computing Systems, April 2008. © ACM DOI:10.1145/1357054.1357285 [BibTeX]

Efficient proving for practical distributed access-control systems.
Lujo Bauer, Scott Garriss, and Michael K. Reiter.
In Computer Security—ESORICS 2007: 12th European Symposium on Research in Computer Security, volume 4734 of Lecture Notes in Computer Science, pages 19–37, September 2007. (Full version appears as a technical report.) © Springer-Verlag DOI:10.1007/978-3-540-74835-9_3 [BibTeX]

Lessons learned from the deployment of a smartphone-based access-control system.
Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, and Kami Vaniea.
In SOUPS '07: Proceedings of the 3rd Symposium on Usable Privacy and Security, pages 64–75, July 2007. DOI:10.1145/1280680.1280689 [BibTeX]

Consumable credentials in logic-based access-control systems.
Kevin D. Bowers, Lujo Bauer, Deepak Garg, Frank Pfenning, and Michael K. Reiter.
In Proceedings of the 2007 Network & Distributed System Security Symposium, pages 143–157, February 2007. © Internet Society [BibTeX]

Comparing access-control technologies: a study of keys and smartphones.
Lujo Bauer, Lorrie Cranor, Robert W. Reeder, Michael K. Reiter, and Kami Vaniea.
Technical Report CMU-CYLAB-07-005, CyLab, Carnegie Mellon University, February 2007. [BibTeX]

User-controllable security and privacy for pervasive computing.
Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen Tang, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Jason Hong, Bruce McLaren, Mike Reiter, and Norman Sadeh.
In Eighth IEEE Workshop on Mobile Computing Systems and Applications (HotMobile), pages 14–19, February 2007. DOI:10.1109/WMCSA.2007.4389552 [BibTeX]

Efficient proving for distributed access-control systems.
Lujo Bauer, Scott Garriss, and Michael K. Reiter.
Technical Report CMU-CYLAB-06-015, CyLab, Carnegie Mellon University, September 2006. [BibTeX]

A linear logic of authorization and knowledge.
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, and Michael K. Reiter.
In Computer Security—ESORICS 2006: 11th European Symposium on Research in Computer Security, volume 4189 of Lecture Notes in Computer Science, pages 297–312, September 2006. Official, slightly abbreviated version. © Springer-Verlag DOI:10.1007/11863908_19 [BibTeX]

Device-enabled authorization in the Grey system.
Lujo Bauer, Scott Garriss, Jonathan M. McCune, Michael K. Reiter, Jason Rouse, and Peter Rutenbar.
In Information Security: 8th International Conference, ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 431–445, September 2005. An extended version of this paper appears as a tech report. © Springer-Verlag DOI:10.1007/11556992_31 [BibTeX]

Enforcing non-safety security policies with program monitors.
Jay Ligatti, Lujo Bauer, and David Walker.
In Computer Security—ESORICS 2005: 10th European Symposium on Research in Computer Security, volume 3679 of Lecture Notes in Computer Science, pages 355–373, September 2005. © Springer-Verlag DOI:10.1007/11555827_21 [BibTeX]

Composing security policies with Polymer.
Lujo Bauer, Jay Ligatti, and David Walker.
In Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), pages 305–314, June 2005. © ACM DOI:10.1145/1065010.1065047 [BibTeX]

Distributed proving in access-control systems.
Lujo Bauer, Scott Garriss, and Michael K. Reiter.
In Proceedings of the 2005 IEEE Symposium on Security & Privacy, pages 81–95, May 2005. © IEEE DOI:10.1109/SP.2005.9 [BibTeX]

Enforcing non-safety security policies with program monitors.
Jay Ligatti, Lujo Bauer, and David Walker.
Technical Report TR-720-05, Princeton University, January 2005. [BibTeX]

Edit automata: Enforcement mechanisms for run-time security policies.
Jay Ligatti, Lujo Bauer, and David Walker.
International Journal of Information Security, 4(1–2):2–16, February 2005. (Published online 26 Oct 2004.) © Springer-Verlag DOI:10.1007/s10207-004-0046-8 [BibTeX]

A language and system for composing security policies.
Lujo Bauer, Jay Ligatti, and David Walker.
Technical Report TR-699-04, Princeton University, January 2004. [BibTeX]

Access control for the Web via proof-carrying authorization.
Lujo Bauer.
Ph.D. Thesis, Princeton University, November 2003. [BibTeX]

Types and effects for non-interfering program monitors.
Lujo Bauer, Jarred Ligatti, and David Walker.
In Software Security—Theories and Systems. Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers, volume 2609 of Lecture Notes in Computer Science, pages 154–171, 2003. © Springer-Verlag [BibTeX]

Mechanisms for secure modular programming in Java.
Lujo Bauer, Andrew W. Appel, and Edward W. Felten.
Software—Practice and Experience, 33(5):461–480, 2003. DOI:10.1002/spe.516 [BibTeX]

A general and flexible access-control system for the Web.
Lujo Bauer, Michael A. Schneider, and Edward W. Felten.
In Proceedings of the 11th USENIX Security Symposium, pages 93–108, August 2002. [BibTeX]

A calculus for composing security policies.
Lujo Bauer, Jarred Ligatti, and David Walker.
Technical Report TR-655-02, Princeton University, August 2002. [BibTeX]

More enforceable security policies.
Lujo Bauer, Jarred Ligatti, and David Walker.
In Foundations of Computer Security, July 2002. [BibTeX]

More enforceable security policies.
Lujo Bauer, Jarred Ligatti, and David Walker.
Technical Report TR-649-02, Princeton University, June 2002. [BibTeX]

A proof-carrying authorization system.
Lujo Bauer, Michael A. Schneider, and Edward W. Felten.
Technical Report TR-638-01, Princeton University, April 2001. [BibTeX]

Mechanisms for secure modular programming in Java.
Lujo Bauer, Andrew W. Appel, and Edward W. Felten.
Technical Report TR-603-99, Princeton University, July 1999. [BibTeX]

Coauthors and collaborators