default search action
Daniel J. Weitzner
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c23]Jenny Blessing, Michael A. Specter, Daniel J. Weitzner:
Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries. AsiaCCS 2024 - [i7]Avital Baral, Taylor Reynolds, Lawrence Susskind, Daniel J. Weitzner, Angelina Wu:
Municipal cyber risk modeling using cryptographic computing to inform cyber policymaking. CoRR abs/2402.01007 (2024) - [i6]Taylor Reynolds, Sarah Scheffler, Daniel J. Weitzner, Angelina Wu:
Mind the Gap: Securely modeling cyber risk based on security deviations from a peer group. CoRR abs/2402.04166 (2024) - 2023
- [p2]James A. Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel J. Weitzner:
Web Science: An Interdisciplinary Approach to Understanding the Web. Linking the World's Information 2023: 67-84 - [p1]Daniel J. Weitzner:
What the World Needs to Keep Learning from Tim Berners-Lee's Creation of the Web. Linking the World's Information 2023: 231-240 - 2022
- [e1]Daniel J. Weitzner, Joan Feigenbaum, Christopher S. Yoo:
Proceedings of the 2022 Symposium on Computer Science and Law, CSLAW 2022, Washington DC, USA, November 1-2, 2022. ACM 2022, ISBN 978-1-4503-9234-1 [contents] - 2021
- [i5]Jenny Blessing, Michael A. Specter, Daniel J. Weitzner:
You Really Shouldn't Roll Your Own Crypto: An Empirical Study of Vulnerabilities in Cryptographic Libraries. CoRR abs/2107.04940 (2021) - 2020
- [c22]Michael A. Specter, James Koppel, Daniel J. Weitzner:
The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections. USENIX Security Symposium 2020: 1535-1553 - [i4]John Meklenburg, Michael A. Specter, Michael Wentz, Hari Balakrishnan, Anantha P. Chandrakasan, John Cohn, Gary Hatke, Louise Ivers, Ronald L. Rivest, Gerald Jay Sussman, Daniel J. Weitzner:
SonicPACT: An Ultrasonic Ranging Method for the Private Automated Contact Tracing (PACT) Protocol. CoRR abs/2012.04770 (2020) - [i3]Ran Canetti, Yael Tauman Kalai, Anna Lysyanskaya, Ronald L. Rivest, Adi Shamir, Emily Shen, Ari Trachtenberg, Mayank Varia, Daniel J. Weitzner:
Privacy-Preserving Automated Exposure Notification. IACR Cryptol. ePrint Arch. 2020: 863 (2020)
2010 – 2019
- 2019
- [c21]Tim Kraska, Michael Stonebraker, Michael L. Brodie, Sacha Servan-Schreiber, Daniel J. Weitzner:
SchengenDB: A Data Protection Database Proposal. Poly/DMAH@VLDB 2019: 24-38 - 2018
- [c20]Joan Feigenbaum, Daniel J. Weitzner:
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do. Security Protocols Workshop 2018: 266-279 - [c19]Daniel J. Weitzner:
On the Incommensurability of Laws and Technical Mechanisms: Or, What Cryptography Can't Do (Transcript of Discussion). Security Protocols Workshop 2018: 280-288 - [c18]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. USENIX Security Symposium 2018: 657-674 - [i2]Jonathan Frankle, Sunoo Park, Daniel Shaar, Shafi Goldwasser, Daniel J. Weitzner:
Practical Accountability of Secret Processes. IACR Cryptol. ePrint Arch. 2018: 697 (2018) - 2017
- [c17]Reuben Binns, Jun Zhao, Max Van Kleek, Nigel Shadbolt, Ilaria Liccardi, Daniel J. Weitzner:
My Bank Already Gets this Data: Exposure Minimisation and Company Relationships in Privacy Decision-Making. CHI Extended Abstracts 2017: 2403-2409 - [c16]Max Van Kleek, Ilaria Liccardi, Reuben Binns, Jun Zhao, Daniel J. Weitzner, Nigel Shadbolt:
Better the Devil You Know: Exposing the Data Sharing Practices of Smartphone Apps. CHI 2017: 5208-5220 - 2016
- [i1]Lorrie Faith Cranor, Tal Rabin, Vitaly Shmatikov, Salil P. Vadhan, Daniel J. Weitzner:
Towards a Privacy Research Roadmap for the Computing Community. CoRR abs/1604.03160 (2016) - 2015
- [j17]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats. Commun. ACM 58(10): 24-26 (2015) - [j16]Harold Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Matthew Green, Susan Landau, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier, Michael A. Specter, Daniel J. Weitzner:
Keys under doormats: mandating insecurity by requiring government access to all data and communications. J. Cybersecur. 1(1): 69-79 (2015) - [c15]Fuming Shih, Ilaria Liccardi, Daniel J. Weitzner:
Privacy Tipping Points in Smartphones Privacy Preferences. CHI 2015: 807-816 - 2014
- [j15]Ilaria Liccardi, Joseph Pato, Daniel J. Weitzner:
Improving User Choice Through Better Mobile Apps Transparency and Permissions Analysis. J. Priv. Confidentiality 5(2) (2014) - [c14]Ilaria Liccardi, Joseph N. Pato, Daniel J. Weitzner, Hal Abelson, David De Roure:
No technical understanding required: helping users make informed choices about access to their personal data. MobiQuitous 2014: 140-150 - [c13]Ilaria Liccardi, Monica Bulger, Harold Abelson, Daniel J. Weitzner, Wendy E. Mackay:
Can apps play by the COPPA Rules? PST 2014: 1-9 - 2013
- [c12]Frances Zhang, Fuming Shih, Daniel J. Weitzner:
No surprises: measuring intrusiveness of smartphone applications by detecting objective context deviations. WPES 2013: 291-296 - 2011
- [c11]Joan Feigenbaum, James A. Hendler, Aaron D. Jaggard, Daniel J. Weitzner, Rebecca N. Wright:
Accountability and deterrence in online life. WebSci 2011: 7:1-7:7 - 2010
- [j14]Mitchell Kapor, Daniel J. Weitzner:
Developing the national communications and information infrastructure. Internet Res. 20(4): 395-407 (2010)
2000 – 2009
- 2009
- [c10]m. c. schraefel, Paul André, Ryen White, Desney S. Tan, Tim Berners-Lee, Sunny Consolvo, Robert Jacobs, Isaac S. Kohane, Christopher A. Le Dantec, Lena Mamykina, Gary Marsden, Ben Shneiderman, Peter Szolovits, Daniel J. Weitzner:
Interacting with eHealth: towards grand challenges for HCI. CHI Extended Abstracts 2009: 3309-3312 - 2008
- [j13]Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Joan Feigenbaum, James A. Hendler, Gerald J. Sussman:
Information accountability. Commun. ACM 51(6): 82-87 (2008) - [j12]James A. Hendler, Nigel Shadbolt, Wendy Hall, Tim Berners-Lee, Daniel J. Weitzner:
Web science: an interdisciplinary approach to understanding the web. Commun. ACM 51(7): 60-69 (2008) - [j11]Daniel J. Weitzner:
Net Neutrality... Seriously this Time. IEEE Internet Comput. 12(3): 86-89 (2008) - [c9]Lalana Kagal, Chris Hanson, Daniel J. Weitzner:
Using Dependency Tracking to Provide Explanations for Policy Management. POLICY 2008: 54-61 - 2007
- [j10]Daniel J. Weitzner:
Twelve Billion Bargaining Chips: The Web Side of the Net Neutrality Debate. IEEE Internet Comput. 11(1): 78-81 (2007) - [j9]Daniel J. Weitzner:
From Home to Home Page: New Challenges to Basic Notions of Privacy and Property. IEEE Internet Comput. 11(2): 90-93 (2007) - [j8]Daniel J. Weitzner:
Free Speech and Child Protection on the Web. IEEE Internet Comput. 11(3): 86-89 (2007) - [j7]Daniel J. Weitzner:
Whose Name Is It, Anyway? Decentralized Identity Systems on the Web. IEEE Internet Comput. 11(4): 72-76 (2007) - [j6]Daniel J. Weitzner:
Beyond Secrecy: New Privacy Protection Strategies for Open Information Spaces. IEEE Internet Comput. 11(5): 94-96 (2007) - [j5]Daniel J. Weitzner:
Google, Profiling, and Privacy. IEEE Internet Comput. 11(6): 95-96 (2007) - [c8]Daniel J. Weitzner:
Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks. ACSAC 2007: 173-175 - [c7]Chris Hanson, Tim Berners-Lee, Lalana Kagal, Gerald J. Sussman, Daniel J. Weitzner:
Data-Purpose Algebra: Modeling Data Usage Policies. POLICY 2007: 173-177 - [c6]Daniel J. Weitzner:
Beyond Secrecy: New Privacy Protection Strategies for the World Wide Web. PEAS 2007 - 2006
- [j4]Tim Berners-Lee, Wendy Hall, James A. Hendler, Kieron O'Hara, Nigel Shadbolt, Daniel J. Weitzner:
A Framework for Web Science. Found. Trends Web Sci. 1(1): 1-130 (2006) - [j3]Daniel J. Weitzner:
In Search of Manageable Identity Systems. IEEE Internet Comput. 10(6): 84-86 (2006) - [c5]Lalana Kagal, Tim Berners-Lee, Dan Connolly, Daniel J. Weitzner:
Using Semantic Web Technologies for Policy Management on the Web. AAAI 2006: 1337-1344 - [c4]Daniel J. Weitzner, Harold Abelson, Tim Berners-Lee, Chris Hanson, James A. Hendler, Lalana Kagal, Deborah L. McGuinness, Gerald Jay Sussman, K. Krasnow Waterman:
Transparent Accountable Data Mining: New Strategies for Privacy Protection. AAAI Spring Symposium: Semantic Web Meets eGovernment 2006: 141- - [c3]Lalana Kagal, Tim Berners-Lee, Dan Connolly, Daniel J. Weitzner:
Self-Describing Delegation Networks for the Web. POLICY 2006: 205-214 - [c2]Daniel J. Weitzner:
Broken links on the web: local laws and the global free flow of information. WWW 2006: 489 - 2005
- [c1]Daniel J. Weitzner:
Semantic Web Public Policy Challenges: Privacy, Provenance, Property and Personhood. ISWC 2005: 5 - 2001
- [j2]Mark S. Ackerman, Trevor Darrell, Daniel J. Weitzner:
Privacy in Context. Hum. Comput. Interact. 16(2-4): 167-176 (2001)
1990 – 1999
- 1997
- [j1]Jerry Berman, Daniel J. Weitzner:
Directing Policy-Making Beyond the Net's Metaphor. Commun. ACM 40(2): 83-84 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-04 00:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint