Skip to main content

Research Area: Secure Home Computing

Projects List

Accountable Mobile Computing Framework Based on User Behavior Modeling
Research Area: Secure Home Computing | Mobility | Privacy Protection | Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Next Generation Threat Prediction and Response | Threat Analysis and Modeling
Researchers: Martin Griss, Anind Dey, Joy Zhang

Advancing Logic-Based Access Control
Research Area: Secure Home Computing
Cross Cutting Thrusts: Formal Methods | Usable Privacy and Security
Researcher: Lujo Bauer

Efficiently Securing Non-Volatile Storage in Portable Systems
Research Area: Mobility | Trustworthy Computing Platforms and Devices | Secure Home Computing
Researcher: Ken Mai

Evaluating and Controlling Personal Privacy in Smart Environments
Research Area: Secure Home Computing
Researchers: Patrick Tague, Anthony Rowe

Grey Project: device-enabled authorization
Research Area: Mobility | Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Lujo Bauer

Lockdown: A Safe and Practical Environment for Security Applications
Research Area: Secure Home Computing | Trustworthy Computing Platforms and Devices
Researchers: Virgil Gligor, Adrian Perrig, Amit Vasudevan

Secure digital home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Greg Ganger, Lorrie Cranor

Secure Home Storage
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger

Securing the Digital Home
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Lujo Bauer, Lorrie Cranor, Greg Ganger, Adrian Perrig

Security Behavior Observatory
Research Area: Secure Home Computing | Privacy Protection
Cross Cutting Thrusts: Software Security | Usable Privacy and Security | Threat Analysis and Modeling
Researchers: Alessandro Acquisti, Nicolas Christin, Lorrie Cranor, Rahul Telang

Security Issues in Information Naming
Research Area: Secure Home Computing | Survivable Distributed Systems
Cross Cutting Thrusts: Next Generation Threat Prediction and Response
Researcher: Srinivasan Seshan

System Integrity Manager for the Everyday Users
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researchers: Hyong Kim, James Hoe

Trinetra: Mobile Technologies for Assisting the Blind & Visually Impaired
Research Area: Mobility | Secure Home Computing
Researchers: Priya Narasimhan, Moshe Mahler

Visualizing Home Networks
Research Area: Secure Home Computing
Cross Cutting Thrusts: Usable Privacy and Security
Researcher: Jason Hong