Auditing Rational Adversaries to Provably Manage Risks (CMU-CyLab-12-011)

[1]  Alessandro Acquisti,et al.  Empirical Analysis of Data Breach Litigation , 2013, WEIS.

[2]  Limin Jia,et al.  Policy auditing over incomplete logs: theory, implementation and applications , 2011, CCS '11.

[3]  Joan Feigenbaum,et al.  Towards a formal model of accountability , 2011, NSPW '11.

[4]  Nicolas Christin,et al.  Regret Minimizing Audits: A Learning-Theoretic Basis for Privacy Protection , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.

[5]  Frank L. Greitzer,et al.  Modeling Human Behavior to Anticipate Insider Attacks , 2011 .

[6]  Xia Zhao,et al.  Access Governance: Flexibility with Escalation and Audit , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[7]  Robert D. Nowak,et al.  Noisy Generalized Binary Search , 2009, NIPS.

[8]  Radha Jagadeesan,et al.  Towards a Theory of Accountability and Audit , 2009, ESORICS.

[9]  Sajal K. Das,et al.  Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation , 2008, 2008 14th IEEE International Conference on Parallel and Distributed Systems.

[10]  Limin Jia,et al.  Evidence-Based Audit , 2008, 2008 21st IEEE Computer Security Foundations Symposium.

[11]  Nicolas Christin,et al.  Secure or insure?: a game-theoretic analysis of information security games , 2008, WWW.

[12]  John C. Mitchell,et al.  Privacy and Utility in Business Processes , 2007, 20th IEEE Computer Security Foundations Symposium (CSF'07).

[13]  Jerry den Hartog,et al.  Audit-based compliance control , 2007, International Journal of Information Security.

[14]  Richard M. Karp,et al.  Noisy binary search and its applications , 2007, SODA '07.

[15]  Dawn M. Cappelli,et al.  Comparing Insider IT Sabotage and Espionage: A Model-Based Analysis , 2006 .

[16]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[17]  Christopher Meek,et al.  Adversarial learning , 2005, KDD '05.

[18]  John C. Mitchell,et al.  Compositional analysis of contract signing protocols , 2005, 18th IEEE Computer Security Foundations Workshop (CSFW'05).

[19]  Butler W. Lampson,et al.  31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .

[20]  J. Schummer Almost-dominant Strategy Implementation , 1999 .

[21]  Casey Ichniowski,et al.  The Effects of Human Resource Management Practices on Productivity , 1995 .

[22]  Nicolò Cesa-Bianchi,et al.  On-line learning with malicious noise and the closure algorithm , 1994, Annals of Mathematics and Artificial Intelligence.

[23]  Ming Li,et al.  Learning in the presence of malicious errors , 1993, STOC '88.

[24]  Jerome H. Saltzer,et al.  The protection of information in computer systems , 1975, Proc. IEEE.

[25]  W. Hoeffding Probability inequalities for sum of bounded random variables , 1963 .

[26]  Blaine Nelson,et al.  Behavior of Machine Learning Algorithms in Adversarial Environments , 2010 .

[27]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[28]  E. Hanushek Statistical methods for social scientists , 1977 .