default search action
Michael S. Kirkpatrick
Person information
- affiliation: James Madison University, Department of Computer Science, Harrisonburg, VA, USA
- affiliation (PhD 2011): Purdue University, West Lafayette, IN, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Emanuelle Burton, Kristel Clayville, Stacy A. Doore, Michael S. Kirkpatrick, Michael Goldweber:
Managing Authority When Teaching Computing Ethics. SIGCSE (2) 2024: 1523-1524 - [c28]Michael C. Stewart, Michael S. Kirkpatrick:
Platform or Foundational Concept? Approaches to Teaching Modern Web Development. SIGCSE (2) 2024: 1922 - 2021
- [j5]Marty J. Wolf, Don Gotterbarn, Michael S. Kirkpatrick:
Upholding ACM's principles. Commun. ACM 64(8): 21 (2021) - 2020
- [c27]Stacy A. Doore, Casey Fiesler, Michael S. Kirkpatrick, Evan Peck, Mehran Sahami:
Assignments that Blend Ethics and Technology. SIGCSE 2020: 475-476
2010 – 2019
- 2019
- [c26]Dee A. B. Weikle, Michael O. Lam, Michael S. Kirkpatrick:
Automating Systems Course Unit and Integration Testing: Experience Report. SIGCSE 2019: 565-570 - [c25]Marty J. Wolf, Don Gotterbarn, Michael S. Kirkpatrick:
ACM Code of Ethics: Looking Back and Forging Ahead. SIGCSE 2019: 801-802 - 2018
- [c24]Michael S. Kirkpatrick, Dee A. B. Weikle:
Active Learning Strategies for Integrating the ACM Code of Ethics into CS Courses: (Abstract Only). SIGCSE 2018: 1062 - [c23]Michael S. Kirkpatrick:
OpenCSF: An Online Interactive Textbook for Computer Systems Fundamentals (Abstract Only). SIGCSE 2018: 1105 - 2017
- [c22]Michael S. Kirkpatrick:
Student Perspectives of Team-Based Learning in a CS Course: Summary of Qualitative Findings. SIGCSE 2017: 327-332 - [c21]Michael S. Kirkpatrick, Chris Mayfield:
Evaluating an Alternative CS1 for Students with Prior Programming Experience. SIGCSE 2017: 333-338 - 2015
- [j4]Aditi Gupta, Javid Habibi, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: Mitigating Code Reuse Attacks Using Code Randomization. IEEE Trans. Dependable Secur. Comput. 12(3): 326-337 (2015) - [c20]Michael S. Kirkpatrick, Samantha Prins:
Using the Readiness Assurance Process and Metacognition in an Operating Systems Course. ITiCSE 2015: 183-188 - [c19]Michael S. Kirkpatrick, Mohamed S. Aboutabl, David Bernstein, Sharon Simmons:
Backward Design: An Integrated Approach to a Systems Curriculum. SIGCSE 2015: 30-35 - [c18]Michael S. Kirkpatrick, Janice E. Cuny, Mark Guzdial, Amanda M. Holland-Minkley, Clifford A. Shaffer:
Best Practices for IRB Approval: Four Perspectives. SIGCSE 2015: 267-268 - 2014
- [j3]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. Comput. Secur. 41: 52-67 (2014) - [c17]Michael S. Kirkpatrick, Leo Porter:
Integrating active learning techniques into systems courses (abstract only). SIGCSE 2014: 735-736 - 2013
- [c16]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A secure architecture design based on application isolation, code minimization and randomization. CNS 2013: 423-429 - [c15]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: A Fine Grained Randomization Approach to Defend against ROP Attacks. NSS 2013: 293-306 - 2012
- [j2]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Resilient Authenticated Execution of Critical Applications in Untrusted Environments. IEEE Trans. Dependable Secur. Comput. 9(4): 597-609 (2012) - [j1]Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino:
Privacy-Preserving Enforcement of Spatially Aware RBAC. IEEE Trans. Dependable Secur. Comput. 9(5): 627-640 (2012) - [c14]Aditi Gupta, Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
Marlin: making it harder to fish for gadgets. CCS 2012: 1016-1018 - [c13]Aditi Gupta, Michael S. Kirkpatrick, Elisa Bertino:
A formal proximity model for RBAC systems. CollaborateCom 2012: 1-10 - 2011
- [b1]Michael S. Kirkpatrick:
Trusted enforcement of contextual access control. Purdue University, USA, 2011 - [c12]Michael S. Kirkpatrick, Sam Kerr, Elisa Bertino:
PUF ROKs: a hardware approach to read-once keys. AsiaCCS 2011: 155-164 - [c11]Michael S. Kirkpatrick, Sam Kerr:
Enforcing physically restricted access control for remote data. CODASPY 2011: 203-212 - [c10]Elisa Bertino, Michael S. Kirkpatrick:
Location-based access control systems for mobile users: concepts and research directions. SPRINGL 2011: 49-52 - [c9]Michael S. Kirkpatrick, Maria Luisa Damiani, Elisa Bertino:
Prox-RBAC: a proximity-based spatially aware RBAC. GIS 2011: 339-348 - 2010
- [c8]Aditi Gupta, Salmin Sultana, Michael S. Kirkpatrick, Elisa Bertino:
A selective encryption approach to fine-grained access control for P2P file sharing. CollaborateCom 2010: 1-10 - [c7]Michael S. Kirkpatrick, Elisa Bertino, Sam Kerr:
PUF ROKs: generating read-once keys from physically unclonable functions. CSIIRW 2010: 19 - [c6]Sam Kerr, Michael S. Kirkpatrick, Elisa Bertino:
PEAR: a hardware based protocol authentication system. SPRINGL 2010: 18-25 - [c5]Michael S. Kirkpatrick, Elisa Bertino:
Enforcing spatial constraints for mobile RBAC systems. SACMAT 2010: 99-108
2000 – 2009
- 2009
- [c4]Elisa Bertino, Michael S. Kirkpatrick:
Location-Aware Authentication and Access Control. AINA 2009: 10-15 - [c3]Michael S. Kirkpatrick, Elisa Bertino:
Physically restricted authentication with trusted hardware. STC 2009: 55-60 - [c2]Carmen Ruiz Vicente, Michael S. Kirkpatrick, Gabriel Ghinita, Elisa Bertino, Christian S. Jensen:
Towards location-based access control in healthcare emergency response. SPRINGL 2009: 22-26 - [c1]Michael S. Kirkpatrick, Elisa Bertino:
Context-Dependent Authentication and Access Control. iNetSeC 2009: 63-75
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 21:29 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint