Csilla Farkas
Affiliations:- University of South Carolina, Columbia, SC, USA
According to our database1,
Csilla Farkas
authored at least 70 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cse.sc.edu
On csauthors.net:
Bibliography
2024
2023
Proceedings of the Ubiquitous Security, 2023
2022
Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics.
IEEE Trans. Serv. Comput., 2022
Proceedings of the 14th International Joint Conference on Knowledge Discovery, 2022
2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021
Review helpfulness evaluation and recommendation based on an attention model of customer expectation.
Inf. Retr. J., 2021
Proceedings of the 10th International Conference on Data Science, 2021
2020
Int. J. Gen. Syst., 2020
Proceedings of the Advances in Information Retrieval, 2020
2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019
Proceedings of the 11th International Joint Conference on Knowledge Discovery, 2019
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
Proceedings of the ECML PKDD 2018 Workshops, 2018
Proceedings of the ECML PKDD 2018 Workshops, 2018
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018
2015
IEEE Trans. Dependable Secur. Comput., 2015
2013
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes.
Int. J. Inf. Secur. Priv., 2013
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013
2012
Int. J. Secur. Softw. Eng., 2012
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
The cost of increased transactional correctness and durability in distributed databases.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
The inference problem: Maintaining maximal availability in the presence of database updates.
Comput. Secur., 2010
2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008
2007
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007
Security in T<sub>ci</sub>NMP Systems.
Proceedings of the Security in Information Systems, 2007
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
2006
Inf. Softw. Technol., 2006
uSMIL: Towards secure unbreakable semantics in multimedia web services.
Comput. Syst. Sci. Eng., 2006
J. Res. Pract. Inf. Technol., 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006
Proceedings of the Formal Ontology in Information Systems, 2006
2005
Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005
Dynamic Disclosure Monitor (<i>D</i><sup><i>2</i></sup><i>Mon</i>): An Improved Query Processing Solution.
Proceedings of the Secure Data Management, 2005
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Multi-Agent Systems and Applications IV, 2005
2004
Specifying multimedia access control using RDF.
Comput. Syst. Sci. Eng., 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004
Proceedings of the Intelligence and Security Informatics, 2004
Proceedings of the Intelligence and Security Informatics, 2004
2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002
Secure XML Views.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
The Inference Problem and Updates in Relational Databases.
Proceedings of the Database and Application Security XV, 2001
2000
IEEE Trans. Knowl. Data Eng., 2000
Proceedings of the Principles and Practice of Constraint Programming, 2000