Joseph Pato
Joseph Pato
Visiting Scientist, CSAIL MIT
Verified email at - Homepage
Cited by
Cited by
Biometric recognition: Challenges and opportunities
LI Millett, JN Pato
National Academies Press, 2010
Who goes there?: Authentication through the lens of privacy
LI Millett, ST Kent
National Academies Press, 2003
Enterprise environment analysis
S Bhatt, W Horne, J Pato, S Rajagopalan, P Rao
US Patent App. 11/263,014, 2007
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML)
S Farrell, I Reid, D Orchard, K Sankar, T Moses, EN Edwards, J Pato, ...
Committee Specification 1, 1-47, 2002
On inter-realm authentication in large distributed systems
VD Gligor, SW Luan, JN Pato
Journal of Computer Security 2 (2-3), 137-157, 1993
If piracy is the problem, is DRM the answer?
S Haber, B Horne, J Pato, T Sander, RE Tarjan
Digital Rights Management: Technological, Economic, Legal and Political …, 2003
The Network Computing Architecture and System: An Environment for Developing Distributed Applications.
TH Dineen, PJ Leach, N Mishkin, JN Pato, GL Wyant
COMPCON, 296-299, 1988
Network computing system reference manual
M Kong, TH Dineen, PJ Leach, EA Martin, NW Mishkin, JN Pato, ...
Prentice-Hall, Inc., 1990
No technical understanding required: Helping users make informed choices about access to their personal data
I Liccardi, J Pato, DJ Weitzner, H Abelson, D De Roure
Proceedings of the 11th International Conference on Mobile and Ubiquitous …, 2014
IDs--not that easy: questions about nationwide identity systems
LI Millett, ST Kent
National Academies Press, 2002
Displaying program and data structures
SP Reiss, JN Pato
Brown University, Department of Computer Science, 1986
Checkpoint object
KS Klemba, CJ Crall, TA Palmer, JN Pato, AH Anderson, GP Carpenter
US Patent 6,035,399, 2000
Identity management: Setting context
J Pato, OC Center
Hewlett-Packard, Cambridge, MA, 2003
On adaptive identity management: the next generation of identity management technologies
MC Mont, P Bramhall, J Pato
Trusted Systems Laboratory, HP Laboratories Bristol, 2003
Extending the OSF DCE authorization system to support practical delegation
ME Erdos, JN Pato
Hewlett-Packard Company, 1993
Authorization in enterprise-wide distributed system: a practical design and application
V Vavadharajan, C Crall, J Pato
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
Preserving privacy based on semantic policy tools
L Kagal, J Pato
IEEE Security & Privacy 8 (4), 25-30, 2010
Improving user choice through better mobile apps transparency and permissions analysis
I Liccardi, J Pato, DJ Weitzner
Journal of Privacy and Confidentiality 5 (2), 2014
Improving mobile app selection through transparency and better permission analysis
I Liccardi, J Pato, DJ Weitzner
Journal of Privacy and Confidentiality 5 (2), 1-55, 2014
The Brown workstation environment
JN Pato, SP Reiss, MH Brown
Department of Computer Science, Brown University, 1984
The system can't perform the operation now. Try again later.
Articles 1–20