Follow
Sara Sinclair Brody
Sara Sinclair Brody
Unknown affiliation
No verified email
Title
Cited by
Cited by
Year
Insider attack and cyber security: beyond the hacker
SJ Stolfo, SM Bellovin, S Hershkop, AD Keromytis, S Sinclair, SW Smith
Springer Science & Business Media, 2008
1202008
Preventative directions for insider threat mitigation via access control
S Sinclair, SW Smith
Insider attack and cyber security: Beyond the hacker, 165-194, 2008
582008
Information risk in financial institutions: Field study and research roadmap
S Sinclair, SW Smith, S Trudeau, ME Johnson, A Portera
International Workshop on Enterprise Applications and Services in the …, 2007
432007
What's wrong with access control in the real world?
S Sinclair, SW Smith
IEEE Security & Privacy 8 (4), 74-77, 2010
382010
An experience report on undergraduate cyber-security education and outreach
M Locasto, S Sinclair
Annual Conference on Education in Information Security (ACEIS), 2009
272009
The effects of introspection on creating privacy policy
S Trudeau, S Sinclair, SW Smith
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, 1-10, 2009
152009
PorKI: Making user PKI safe on machines of heterogeneous trustworthiness
S Sinclair, SW Smith
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-430, 2005
122005
Access control in and for the real world
S Sinclair
Dartmouth College, 2014
112014
The TIPPI point: Toward trustworthy interfaces
S Sinclair, SW Smith
IEEE security & privacy 3 (4), 68-71, 2005
112005
PorKI: Portable PKI credentials via proxy certificates
M Pala, S Sinclair, SW Smith
European Public Key Infrastructure Workshop, 1-16, 2010
102010
Attacking and Defending Networked Embedded Devices
KH Baek, S Bratus, S Sinclair, SW Smith
2nd Workshop on Embedded Systems Security (WESS)(Salzburg, Austria, 2007
102007
Adapting bayesian statistical spam filters to the server side
S Sinclair
Journal of Computing Sciences in Colleges 19 (5), 344-346, 2004
102004
Expressing trust in distributed systems: the mismatch between tools and reality
SW Smith, C Masone, S Sinclair
Forty-Second Annual Allerton Conference on Privacy, Security and Trust, 29-39, 2004
92004
Information risk in the professional services–field study results from financial institutions and a roadmap for research
S Sinclair, SW Smith, S Trudeau, ME Johnson, A Portera
Proceedings for the 3rd International Workshop on Enterprise Applications …, 2007
82007
Insider attack and cyber security, advances in information security
SJ Stolfo, S Bellovin, S Hershkop, A Keromytis, S Sinclair, S Smith
Springer, 2008
72008
Access control realities as observed in a clinical medical setting
S Sinclair, S Smith
42012
Protecting Data Privacy With User-Friendly Software
SS Brody
Council On Foreign Relations Cyber Brief Series, 2016
32016
Advances in information security: Insider attack and cyber security-Beyond the hacker
SJ Stolfo, SM Bellovin, S Hershkop, AD Keromytis, S Sinclair, SW Smith
Springer, New York, 2008
32008
Dumbots: Unexpected botnets through networked embedded devices
KH Baek, S Bratus, S Sinclair
32007
Meta-observations from an outsider's study of clinical environments
S Sinclair
Proceedings of the first ACM workshop on Security and privacy in medical and …, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20