default search action
William R. Claycomb
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [e4]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1. IEEE Computer Society 2018, ISBN 978-1-5386-2667-2 [contents] - [e3]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Md. Kamrul Hasan:
2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 2. IEEE Computer Society 2018 [contents] - [r1]William R. Claycomb, John McCloud:
Protection from Insider Threats. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [e2]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 1. IEEE Computer Society 2017, ISBN 978-1-5386-0367-3 [contents] - [e1]Sorel Reisman, Sheikh Iqbal Ahamed, Claudio Demartini, Thomas M. Conte, Ling Liu, William R. Claycomb, Motonori Nakamura, Edmundo Tovar, Stelvio Cimato, Chung-Horng Lung, Hiroki Takakura, Ji-Jiang Yang, Toyokazu Akiyama, Zhiyong Zhang, Kamrul Hasan:
41st IEEE Annual Computer Software and Applications Conference, COMPSAC 2017, Turin, Italy, July 4-8, 2017. Volume 2. IEEE Computer Society 2017 [contents] - 2016
- [c20]Matt Bishop, Kara L. Nance, William R. Claycomb:
Introduction to the Inside the Insider Threat Minitrack. HICSS 2016: 2728 - 2015
- [c19]William R. Claycomb:
Detecting Insider Threats: Who Is Winning the Game? MIST@CCS 2015: 51 - 2014
- [j11]William R. Claycomb, Philip A. Legg, Dieter Gollmann:
Guest Editorial: Emerging Trends in Research for Insider Threat Detection. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2): 1-6 (2014) - 2013
- [j10]Carly L. Huth, David W. Chadwick, William R. Claycomb, Ilsun You:
Guest editorial: A brief overview of data leakage and insider threats. Inf. Syst. Frontiers 15(1): 1-4 (2013) - [j9]William R. Claycomb, Carly L. Huth:
A Method For Characterizing Sociotechnical Events Related to Insider Threat Sabotage. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(4): 1-19 (2013) - 2012
- [j8]Yoshiaki Hori, William R. Claycomb, Kangbin Yim:
Frontiers in Insider Threats and Data Leakage Prevention. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(1/2): 1-3 (2012) - [j7]William R. Claycomb, Carly L. Huth, Lori Flynn, David M. McIntire, Todd B. Lewellen:
Chronological Examination of Insider Threat Sabotage: Preliminary Observations. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 4-20 (2012) - [j6]William R. Claycomb, Dongwan Shin, Gail-Joon Ahn:
Enhancing directory virtualization to detect insider activity. Secur. Commun. Networks 5(8): 873-886 (2012) - [c18]William R. Claycomb, Alex Nicoll:
Insider Threats to Cloud Computing: Directions for New Research Challenges. COMPSAC 2012: 387-394 - [c17]Dongwan Shin, Ying Wang, William R. Claycomb:
A policy-based decentralized authorization management framework for cloud computing. SAC 2012: 465-470 - 2011
- [j5]Dongwan Shin, Hakan Akkan, William R. Claycomb, Kwanjoong Kim:
Toward role-based provisioning and access control for infrastructure as a service (IaaS). J. Internet Serv. Appl. 2(3): 243-255 (2011) - [j4]William R. Claycomb, Dongwan Shin:
Extending Formal Analysis of Mobile Device Authentication. J. Internet Serv. Inf. Secur. 1(1): 86-102 (2011) - [j3]William R. Claycomb, Dongwan Shin:
A novel node level security policy framework for wireless sensor networks. J. Netw. Comput. Appl. 34(1): 418-428 (2011) - [c16]William R. Claycomb, Dongwan Shin:
Formal analysis of device authentication applications in ubiquitous computing. SAC 2011: 451-452 - 2010
- [j2]Dongwan Shin, William R. Claycomb, Seunghyun Im:
A visual way to talk to strangers: authentication in wireless pervasive computing. Int. J. Ad Hoc Ubiquitous Comput. 5(4): 252-260 (2010) - [c15]William R. Claycomb, Dongwan Shin:
Detecting insider activity using enhanced directory virtualization. Insider Threats@CCS 2010: 29-36 - [c14]William R. Claycomb, Dongwan Shin:
Towards Secure Virtual Directories: A Risk Analysis Framework. COMPSAC 2010: 27-36 - [c13]William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim:
A group-based security policy for wireless sensor networks. SAC 2010: 778-785 - [c12]William R. Claycomb, Dongwan Shin:
A framework for risk analysis in virtual directory security. SAC 2010: 1881-1882
2000 – 2009
- 2009
- [j1]William R. Claycomb, Dongwan Shin:
A User Controlled Approach for Securing Sensitive Information in Directory Services. J. Univers. Comput. Sci. 15(15): 2999-3018 (2009) - [c11]Rodrigo Lopes, Hakan Akkan, William R. Claycomb, Dongwan Shin:
An opensocial extension for enabling user-controlled persona in online social networks. CollaborateCom 2009: 1-5 - [c10]Dongwan Shin, Rodrigo Lopes, William R. Claycomb, Gail-Joon Ahn:
A Framework for Enabling User-Controlled Persona in Online Social Networks. COMPSAC (1) 2009: 292-297 - [c9]Dongwan Shin, Rodrigo Lopes, William R. Claycomb:
Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management. ITNG 2009: 504-509 - [c8]William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim:
Key Establishment Using Group Information for Wireless Sensor Networks. S-CUBE 2009: 51-65 - [c7]William R. Claycomb, Dongwan Shin:
An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information. WOSIS 2009: 36-45 - 2008
- [c6]William R. Claycomb, Dongwan Shin:
Protecting Sensitive Information in Directory Services Using Virtual Directories. CollaborateCom 2008: 244-257 - 2007
- [c5]William R. Claycomb, Dongwan Shin:
Towards secure resource sharing for impromptu collaboration in pervasive computing. SAC 2007: 940-946 - 2006
- [c4]William R. Claycomb, Dongwan Shin:
Mobile-driven architecture for managing enterprise security policies. ACM Southeast Regional Conference 2006: 555-559 - [c3]William R. Claycomb, Dongwan Shin:
A Visual Framework for Securing Impromptu Collaboration in Pervasive Computing. CollaborateCom 2006 - [c2]William R. Claycomb, Dongwan Shin:
Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing. ICPS 2006: 173-180 - [c1]William R. Claycomb, Dongwan Shin:
Enabling mobility in enterprise security management. IPCCC 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint