Follow
Joseph Pato
Joseph Pato
Visiting Scientist, CSAIL MIT
Verified email at csail.mit.edu - Homepage
Title
Cited by
Cited by
Year
Biometric recognition: Challenges and opportunities
LI Millett, JN Pato
National Academies Press, 2010
2462010
Who goes there?: Authentication through the lens of privacy
LI Millett, ST Kent
National Academies Press, 2003
1452003
Enterprise environment analysis
S Bhatt, W Horne, J Pato, S Rajagopalan, P Rao
US Patent App. 11/263,014, 2007
1042007
Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML)
S Farrell, I Reid, D Orchard, K Sankar, T Moses, EN Edwards, J Pato, ...
Committee Specification 1, 1-47, 2002
91*2002
On inter-realm authentication in large distributed systems
VD Gligor, SW Luan, JN Pato
Journal of Computer Security 2 (2-3), 137-157, 1993
761993
If piracy is the problem, is DRM the answer?
S Haber, B Horne, J Pato, T Sander, RE Tarjan
Digital Rights Management: Technological, Economic, Legal and Political …, 2003
652003
The Network Computing Architecture and System: An Environment for Developing Distributed Applications.
TH Dineen, PJ Leach, N Mishkin, JN Pato, GL Wyant
COMPCON, 296-299, 1988
611988
Network computing system reference manual
M Kong, TH Dineen, PJ Leach, EA Martin, NW Mishkin, JN Pato, ...
Prentice-Hall, Inc., 1990
561990
IDs--not that easy: questions about nationwide identity systems
LI Millett, ST Kent
National Academies Press, 2002
542002
No technical understanding required: Helping users make informed choices about access to their personal data
I Liccardi, J Pato, DJ Weitzner, H Abelson, D De Roure
Proceedings of the 11th International Conference on Mobile and Ubiquitous …, 2014
532014
Displaying program and data structures
SP Reiss, JN Pato
Brown University, Department of Computer Science, 1986
421986
Checkpoint object
KS Klemba, CJ Crall, TA Palmer, JN Pato, AH Anderson, GP Carpenter
US Patent 6,035,399, 2000
412000
Identity management: Setting context
J Pato, OC Center
Hewlett-Packard, Cambridge, MA, 2003
362003
On adaptive identity management: the next generation of identity management technologies
MC Mont, P Bramhall, J Pato
Trusted Systems Laboratory, HP Laboratories Bristol, 2003
342003
Extending the OSF DCE authorization system to support practical delegation
ME Erdos, JN Pato
Hewlett-Packard Company, 1993
331993
Authorization in enterprise-wide distributed system: a practical design and application
V Vavadharajan, C Crall, J Pato
Proceedings 14th Annual Computer Security Applications Conference (Cat. No …, 1998
311998
Preserving privacy based on semantic policy tools
L Kagal, J Pato
IEEE Security & Privacy 8 (4), 25-30, 2010
262010
Improving mobile app selection through transparency and better permission analysis
I Liccardi, J Pato, DJ Weitzner
Journal of Privacy and Confidentiality 5 (2), 1-55, 2014
232014
The Brown workstation environment
JN Pato, SP Reiss, MH Brown
Department of Computer Science, Brown University, 1984
231984
Improving user choice through better mobile apps transparency and permissions analysis
I Liccardi, J Pato, DJ Weitzner
Journal of Privacy and Confidentiality 5 (2), 2014
222014
The system can't perform the operation now. Try again later.
Articles 1–20