Ashwini Rao
Ashwini Rao
Eydle Inc.
Verified email at eydle.com
Title
Cited by
Cited by
Year
Eddy, a formal language for specifying and analyzing data flow specifications for conflicting privacy requirements
TD Breaux, H Hibshi, A Rao
Requirements Engineering 19 (3), 281-307, 2014
672014
Effect of grammar on security of long passwords
A Rao, B Jha, G Kini
Proceedings of the third ACM conference on Data and application security and …, 2013
672013
What do they know about me? Contents and Concerns of Online Behavioral Profiles
A Rao, F Schaub, N Sadeh
PASSAT 2014: International Conference on Information Privacy, Security, Risk …, 2015
54*2015
Expecting the unexpected: Understanding mismatched privacy expectations online
A Rao, F Schaub, N Sadeh, A Acquisti, R Kang
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 77-96, 2016
532016
Formal analysis of privacy requirements specifications for multi-tier applications
TD Breaux, A Rao
2013 21st IEEE International Requirements Engineering Conference (RE), 14-23, 2013
362013
Privacy and behavioral advertising: Towards meeting users’ preferences
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Proceedings of the Symposium on Usable Privacy and Security, 2015
172015
Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach
I Ruchkin, A Rao, D De Niz, S Chaki, D Garlan
Proceedings of the First ACM Workshop on Cyber-Physical Systems-Security and …, 2015
142015
Why people are (un) willing to share information with online advertisers
PG Leon, A Rao, F Schaub, A Marsh, LF Cranor, N Sadeh
Technical report CMU-ISR-15-106, 2015
132015
Towards usable privacy policies: Semi-automatically extracting data practices from websites’ privacy policies
N Sadeh, A Acquisti, TD Breaux, LF Cranor, AM McDonald, J Reidenberg, ...
Poster Proceedings, SOUPS, 9-11, 2014
112014
Smartphone fingerprint authentication versus pins: A usability study (cmu-cylab-14-012)
S Karthikeyan, S Feng, A Rao, N Sadeh
11*2014
Less is more? investigating the role of examples in security studies using analogical transfer
A Rao, H Hibshi, T Breaux, JM Lehker, J Niu
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 1-12, 2014
42014
Towards a framework for pattern experimentation: Understanding empirical validity in requirements engineering patterns
TD Breaux, H Hibshi, A Rao, JM Lehker
2012 Second IEEE International Workshop on Requirements Patterns (RePa), 41-47, 2012
32012
Assessing the Impact of Data Practices on User Privacy
A Rao
Technische Universität München, 2018
22018
Managing Risk in Mobile Applications With Formal Security Policies
T Breaux, A Rao
CARNEGIE-MELLON UNIV PITTSBURGH PA SCHOOL OF COMPUTER SCIENCE, 2013
22013
Compression in Memory Constrained DBMSs
A Rao
M. Tech. Thesis, Indian Institute of Technology Bombay, Mumbai, India, 2005
12005
Types of Privacy Expectations.
A Rao, J Pfeffer
Frontiers Big Data 3, 7, 2020
2020
Data Siphoning Across Borders: The Role of Internet Tracking
A Rao, J Pfeffer
2019 First IEEE International Conference on Trust, Privacy and Security in …, 2019
2019
Security Implications of Induced Earthquakes
B Jha, A Rao
AGUFM 2016, S31B-2768, 2016
2016
Understanding Users’ Online Privacy Expectations
A Rao
Carnegie Mellon University, 2016
2016
Types of Privacy Expectations and Mismatches
A Rao, F Schaub
The system can't perform the operation now. Try again later.
Articles 1–20