BibTeX records: Joshua A. Kroll

download as .bib file

@article{DBLP:journals/popets/LandisK24,
  author       = {Christopher B. Landis and
                  Joshua A. Kroll},
  title        = {Mitigating Inference Risks with the {NIST} Privacy Framework},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2024},
  number       = {1},
  pages        = {217--231},
  year         = {2024},
  url          = {https://doi.org/10.56553/popets-2024-0013},
  doi          = {10.56553/POPETS-2024-0013},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/LandisK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/chi/RismaniSSJKMR23,
  author       = {Shalaleh Rismani and
                  Renee Shelby and
                  Andrew Smart and
                  Edgar W. Jatho III and
                  Joshua A. Kroll and
                  AJung Moon and
                  Negar Rostamzadeh},
  editor       = {Albrecht Schmidt and
                  Kaisa V{\"{a}}{\"{a}}n{\"{a}}nen and
                  Tesh Goyal and
                  Per Ola Kristensson and
                  Anicia Peters and
                  Stefanie Mueller and
                  Julie R. Williamson and
                  Max L. Wilson},
  title        = {From Plane Crashes to Algorithmic Harm: Applicability of Safety Engineering
                  Frameworks for Responsible {ML}},
  booktitle    = {Proceedings of the 2023 {CHI} Conference on Human Factors in Computing
                  Systems, {CHI} 2023, Hamburg, Germany, April 23-28, 2023},
  pages        = {2:1--2:18},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3544548.3581407},
  doi          = {10.1145/3544548.3581407},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/chi/RismaniSSJKMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-02972,
  author       = {Edgar W. Jatho III and
                  Logan O. Mailloux and
                  Eugene D. Williams and
                  Patrick McClure and
                  Joshua A. Kroll},
  title        = {Concrete Safety for {ML} Problems: System Safety for {ML} Development
                  and Assessment},
  journal      = {CoRR},
  volume       = {abs/2302.02972},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.02972},
  doi          = {10.48550/ARXIV.2302.02972},
  eprinttype    = {arXiv},
  eprint       = {2302.02972},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-02972.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/KonighoferKPVC23,
  author       = {Bettina K{\"{o}}nighofer and
                  Joshua A. Kroll and
                  Ruzica Piskac and
                  Michael Veale and
                  Filip Cano C{\'{o}}rdoba},
  title        = {Accountable Software Systems (Dagstuhl Seminar 23411)},
  journal      = {Dagstuhl Reports},
  volume       = {13},
  number       = {10},
  pages        = {24--49},
  year         = {2023},
  url          = {https://doi.org/10.4230/DagRep.13.10.24},
  doi          = {10.4230/DAGREP.13.10.24},
  timestamp    = {Fri, 04 Jul 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/KonighoferKPVC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2210-03535,
  author       = {Shalaleh Rismani and
                  Renee Shelby and
                  Andrew Smart and
                  Edgar W. Jatho III and
                  Joshua A. Kroll and
                  AJung Moon and
                  Negar Rostamzadeh},
  title        = {From plane crashes to algorithmic harm: applicability of safety engineering
                  frameworks for responsible {ML}},
  journal      = {CoRR},
  volume       = {abs/2210.03535},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2210.03535},
  doi          = {10.48550/ARXIV.2210.03535},
  eprinttype    = {arXiv},
  eprint       = {2210.03535},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2210-03535.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-04602,
  author       = {Edgar W. Jatho III and
                  Logan O. Mailloux and
                  Shalaleh Rismani and
                  Eugene D. Williams and
                  Joshua A. Kroll},
  title        = {System Safety Engineering for Social and Ethical {ML} Risks: {A} Case
                  Study},
  journal      = {CoRR},
  volume       = {abs/2211.04602},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.04602},
  doi          = {10.48550/ARXIV.2211.04602},
  eprinttype    = {arXiv},
  eprint       = {2211.04602},
  timestamp    = {Tue, 15 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-04602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/KrollMT21,
  author       = {Joshua A. Kroll and
                  James Bret Michael and
                  David B. Thaw},
  title        = {Enhancing Cybersecurity via Artificial Intelligence: Risks, Rewards,
                  and Frameworks},
  journal      = {Computer},
  volume       = {54},
  number       = {6},
  pages        = {64--71},
  year         = {2021},
  url          = {https://doi.org/10.1109/MC.2021.3055703},
  doi          = {10.1109/MC.2021.3055703},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/KrollMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itpro/CarterKM21,
  author       = {Thomas Carter and
                  Joshua A. Kroll and
                  James Bret Michael},
  title        = {Lessons Learned From Applying the {NIST} Privacy Framework},
  journal      = {{IT} Prof.},
  volume       = {23},
  number       = {4},
  pages        = {9--13},
  year         = {2021},
  url          = {https://doi.org/10.1109/MITP.2021.3086916},
  doi          = {10.1109/MITP.2021.3086916},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/itpro/CarterKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fat/Kroll21,
  author       = {Joshua A. Kroll},
  editor       = {Madeleine Clare Elish and
                  William Isaac and
                  Richard S. Zemel},
  title        = {Outlining Traceability: {A} Principle for Operationalizing Accountability
                  in Computing Systems},
  booktitle    = {FAccT '21: 2021 {ACM} Conference on Fairness, Accountability, and
                  Transparency, Virtual Event / Toronto, Canada, March 3-10, 2021},
  pages        = {758--771},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3442188.3445937},
  doi          = {10.1145/3442188.3445937},
  timestamp    = {Fri, 05 May 2023 15:54:55 +0200},
  biburl       = {https://dblp.org/rec/conf/fat/Kroll21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2101-09385,
  author       = {Joshua A. Kroll},
  title        = {Outlining Traceability: {A} Principle for Operationalizing Accountability
                  in Computing Systems},
  journal      = {CoRR},
  volume       = {abs/2101.09385},
  year         = {2021},
  url          = {https://arxiv.org/abs/2101.09385},
  eprinttype    = {arXiv},
  eprint       = {2101.09385},
  timestamp    = {Sat, 30 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2101-09385.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmhci/MulliganKKW19,
  author       = {Deirdre K. Mulligan and
                  Joshua A. Kroll and
                  Nitin Kohli and
                  Richmond Y. Wong},
  title        = {This Thing Called Fairness: Disciplinary Confusion Realizing a Value
                  in Technology},
  journal      = {Proc. {ACM} Hum. Comput. Interact.},
  volume       = {3},
  number       = {{CSCW}},
  pages        = {119:1--119:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3359221},
  doi          = {10.1145/3359221},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmhci/MulliganKKW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LuckieBKKKc19,
  author       = {Matthew J. Luckie and
                  Robert Beverly and
                  Ryan Koga and
                  Ken Keys and
                  Joshua A. Kroll and
                  K. C. Claffy},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {Network Hygiene, Incentives, and Regulation: Deployment of Source
                  Address Validation in the Internet},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {465--480},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3354232},
  doi          = {10.1145/3319535.3354232},
  timestamp    = {Mon, 11 Aug 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/LuckieBKKKc19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/KrollKL19,
  author       = {Joshua A. Kroll and
                  Nitin Kohli and
                  Paul Laskowski},
  editor       = {Vijay Gadepally and
                  Timothy G. Mattson and
                  Michael Stonebraker and
                  Fusheng Wang and
                  Gang Luo and
                  Yanhui Laing and
                  Alevtina Dubovitskaya},
  title        = {Privacy and Policy in Polystores: {A} Data Management Research Agenda},
  booktitle    = {Heterogeneous Data Management, Polystores, and Analytics for Healthcare
                  - {VLDB} 2019 Workshops, Poly and DMAH, Los Angeles, CA, USA, August
                  30, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11721},
  pages        = {68--81},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-33752-0\_5},
  doi          = {10.1007/978-3-030-33752-0\_5},
  timestamp    = {Wed, 03 Aug 2022 16:12:01 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/KrollKL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-11869,
  author       = {Deirdre K. Mulligan and
                  Joshua A. Kroll and
                  Nitin Kohli and
                  Richmond Y. Wong},
  title        = {This Thing Called Fairness: Disciplinary Confusion Realizing a Value
                  in Technology},
  journal      = {CoRR},
  volume       = {abs/1909.11869},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.11869},
  eprinttype    = {arXiv},
  eprint       = {1909.11869},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-11869.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/Kroll18,
  author       = {Joshua A. Kroll},
  title        = {Data Science Data Governance {[AI} Ethics]},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {6},
  pages        = {61--70},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSEC.2018.2875329},
  doi          = {10.1109/MSEC.2018.2875329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/Kroll18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/us/Kroll15,
  author       = {Joshua A. Kroll},
  title        = {Accountable Algorithms},
  school       = {Princeton University, {USA}},
  year         = {2015},
  url          = {https://arks.princeton.edu/ark:/88435/dsp014b29b837r},
  timestamp    = {Mon, 19 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/us/Kroll15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BonneauMCNKF15,
  author       = {Joseph Bonneau and
                  Andrew Miller and
                  Jeremy Clark and
                  Arvind Narayanan and
                  Joshua A. Kroll and
                  Edward W. Felten},
  title        = {SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies},
  booktitle    = {2015 {IEEE} Symposium on Security and Privacy, {SP} 2015, San Jose,
                  CA, USA, May 17-21, 2015},
  pages        = {104--121},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SP.2015.14},
  doi          = {10.1109/SP.2015.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/BonneauMCNKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonneauMCNKF15,
  author       = {Joseph Bonneau and
                  Andrew Miller and
                  Jeremy Clark and
                  Arvind Narayanan and
                  Joshua A. Kroll and
                  Edward W. Felten},
  title        = {Research Perspectives and Challenges for Bitcoin and Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {261},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/261},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonneauMCNKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/KrollSA14,
  author       = {Joshua A. Kroll and
                  Gordon Stewart and
                  Andrew W. Appel},
  title        = {Portable Software Fault Isolation},
  booktitle    = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
                  Austria, 19-22 July, 2014},
  pages        = {18--32},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/CSF.2014.10},
  doi          = {10.1109/CSF.2014.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/KrollSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/BonneauNMCKF14,
  author       = {Joseph Bonneau and
                  Arvind Narayanan and
                  Andrew Miller and
                  Jeremy Clark and
                  Joshua A. Kroll and
                  Edward W. Felten},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Mixcoin: Anonymity for Bitcoin with Accountable Mixes},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {486--504},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_31},
  doi          = {10.1007/978-3-662-45472-5\_31},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/BonneauNMCKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/EdmundsonSKF14,
  author       = {Anne Edmundson and
                  Anna Kornfeld Simpson and
                  Joshua A. Kroll and
                  Edward W. Felten},
  editor       = {Jedidiah R. Crandall and
                  Vern Paxson},
  title        = {Security Audit of Safeplug "Tor in a Box"},
  booktitle    = {4th {USENIX} Workshop on Free and Open Communications on the Internet,
                  {FOCI} '14, San Diego, CA, USA, August 18, 2014},
  publisher    = {{USENIX} Association},
  year         = {2014},
  url          = {https://www.usenix.org/conference/foci14/workshop-program/presentation/edmundson},
  timestamp    = {Mon, 01 Feb 2021 08:42:51 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/EdmundsonSKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BonneauNMCKF14,
  author       = {Joseph Bonneau and
                  Arvind Narayanan and
                  Andrew Miller and
                  Jeremy Clark and
                  Joshua A. Kroll and
                  Edward W. Felten},
  title        = {Mixcoin: Anonymity for Bitcoin with accountable mixes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BonneauNMCKF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}