Duminda Wijesekera

Orcid: 0000-0002-7122-3055

Affiliations:
  • George Mason University, Fairfax, Virginia, USA


According to our database1, Duminda Wijesekera authored at least 208 papers between 1990 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Benchmarking the Performance of 5G CV2X for Connected Vehicles based Adaptive Traffic Signal.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

Comparative Study of Attention among Drivers with Varying Driving Experience.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2024

2023
Adaptive Traffic Signal Control using CV2X.
Proceedings of the 98th IEEE Vehicular Technology Conference, 2023

2022
PURE Biomanufacturing: Secure, Pandemic-Adaptive Biomanufacturing.
IEEE Secur. Priv., 2022

Can You Trust Zero Trust?
Computer, 2022

A Key Management Module for Secure ADS-B.
Proceedings of the 25th IEEE International Conference on Intelligent Transportation Systems, 2022

An Automated Framework for Generating Attack Graphs Using Known Security Threats.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

Generating Cyber-Physical System Risk Overlays for Attack and Fault Trees using Systems Theory.
Proceedings of the Sat-CPS@CODASPY 2022: Proceedings of the 2022 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2022

2021
Formal Methods in Cyberphysical Systems.
Computer, 2021

Formal Verification of Cyberphysical Systems.
Computer, 2021

An Attack Vector Taxonomy for Mobile Telephony Security Vulnerabilities.
Computer, 2021

Pixel Invisibility: Detect Object Unseen in Color Domain.
Proceedings of the 7th International Conference on Vehicle Technology and Intelligent Transport Systems, 2021

ADS-B Attack Classification using Machine Learning Techniques.
Proceedings of the IEEE Intelligent Vehicles Symposium Workshops, 2021

2020
Pixel Invisibility: Detecting Objects Invisible in Color Images.
CoRR, 2020

Forensic Analysis of Advanced Persistent Threat Attacks in Cloud Environments.
Proceedings of the Advances in Digital Forensics XVI, 2020

2019
A Framework to Reveal Clandestine Organ Trafficking in the Dark Web and Beyond.
J. Digit. Forensics Secur. Law, 2019

Stable and Safe Automated Driving Using 3-D Road Geometric Features.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Secure Outdoor Smart Parking Using Dual Mode Bluetooth Mesh Networks.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Smart Parking Zones using Dual Mode Routed Bluetooth Fogged Meshes.
Proceedings of the 5th International Conference on Vehicle Technology and Intelligent Transport Systems, 2019

Smart Parking Zones Using Meshed Bluetooth Sensor Networks.
Proceedings of the Smart Cities, Green Technologies and Intelligent Transport Systems, 2019

DETERMINING THE FORENSIC DATA REQUIREMENTS FOR INVESTIGATING HYPERVISOR ATTACKS.
Proceedings of the Advances in Digital Forensics XV, 2019

An Attack-Fault Tree Analysis of a Movable Railroad Bridge.
Proceedings of the Critical Infrastructure Protection XIII, 2019

Coordinating AV Dispatch with Smart Remote Parking.
Proceedings of the IEEE 2nd Connected and Automated Vehicles Symposium, 2019

2018
Positive Train Control Security: An Intrusion-Detection System to Provide Cyber-Situational Awareness.
IEEE Veh. Technol. Mag., 2018

ADS-Bsec: A Holistic Framework to Secure ADS-B.
IEEE Trans. Intell. Veh., 2018

Pseudonym Certificate Validations under Heavy Vehicular Traffic Loads.
Proceedings of the 2018 IEEE Vehicular Networking Conference, 2018

Cooperative Collision Avoidance by Sharing Vehicular Subsystem Data.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

A Layered Graphical Model for Cloud Forensic Mission Attack Impact Analysis.
Proceedings of the Advances in Digital Forensics XIV, 2018

An Integrated Control and Intrusion Detection System for Smart Grid Security.
Proceedings of the Critical Infrastructure Protection XII, 2018

A Communications Model for Decentralized Autonomous Control of the Power Grid.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Sharing Genetic Data under US Privacy Laws.
Proceedings of the 11th International Joint Conference on Biomedical Engineering Systems and Technologies (BIOSTEC 2018), 2018

Performance of Generating Dialogs from Ontology and Context.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018

2017
ADS-Bsec: A novel framework to secure ADS-B.
ICT Express, 2017

An Authentication Mechanism for Accessing Mobile Web Services.
Proceedings of the Mobile Web and Intelligent Information Systems, 2017

Vehicular dynamics based plausibility checking.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Key distribution scheme for aircraft equipped with secure ADS-B IN.
Proceedings of the 20th IEEE International Conference on Intelligent Transportation Systems, 2017

Identifying Evidence for Cloud Forensic Analysis.
Proceedings of the Advances in Digital Forensics XIII - 13th IFIP WG 11.9 International Conference, Orlando, FL, USA, January 30, 2017

Detecting Data Manipulation Attacks on the Substation Interlocking Function Using Direct Power Feedback.
Proceedings of the Critical Infrastructure Protection XI, 2017

A layered graphical model for mission attack impact analysis.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Identifying Evidence for Cloud Forensic Analysis.
Proceedings of the Research Advances in Cloud Computing, 2017

2016
An ADS-B Intrusion Detection System.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sharing Data under Genetic Privacy Laws.
Proceedings of the Eleventh Conference on Semantic Technology for Intelligence, 2016

Secure ADS-B framework "ADS-Bsec".
Proceedings of the 19th IEEE International Conference on Intelligent Transportation Systems, 2016

A Probabilistic Network Forensic Model for Evidence Analysis.
Proceedings of the Advances in Digital Forensics XII, 2016

2015
Genetic Counseling Using Workflow-based EMRs.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

Toward Representing and Recognizing Cyber-Physical Autonomous Agents in Competition Using Event Semantics.
Proceedings of the Tenth Conference on Semantic Technology for Intelligence, 2015

A Logic-Based Network Forensic Model for Evidence Analysis.
Proceedings of the Advances in Digital Forensics XI, 2015

Secure ADS-B design & evaluation.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015

Detecting malicious ADS-B transmitters using a low-bandwidth sensor network.
Proceedings of the 18th International Conference on Information Fusion, 2015

POSTER: A Logic Based Network Forensics Model for Evidence Analysis.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Modeling Human-in-the-Loop Security Analysis and Decision-Making Processes.
IEEE Trans. Software Eng., 2014

Relating Admissibility Standards for Digital Evidence to Attack Scenario Reconstruction.
J. Digit. Forensics Secur. Law, 2014

Security requirement derivation by noun-verb analysis of use-misuse case relationships: a case study using positive train control.
Innov. Syst. Softw. Eng., 2014

An Ontology for Medical Treatment Consent.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

Toward the Discovery and Extraction of Money Laundering Evidence from Arbitrary Data Formats using Combinatory Reductions.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

Security Requirements Analysis of ADS-B Networks.
Proceedings of the Ninth Conference on Semantic Technology for Intelligence, 2014

A Model Towards Using Evidence from Security Events for Network Attack Analysis.
Proceedings of the WOSIS 2014, 2014

An Automated Dialog System for Conducting Security Interviews for Access Control.
Proceedings of the Critical Infrastructure Protection VIII, 2014

2013
An approach for risk assessment and mitigation in cognitive radio technologies.
Int. J. Inf. Priv. Secur. Integr., 2013

Navigation Assistance Framework for Emergencies.
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013

Data Analytics to Detect Evolving Money Laundering.
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013

An Ontological Inference Driven Interactive Voice Recognition System.
Proceedings of the Eighth Conference on Semantic Technologies for Intelligence, 2013

Dynamic Risk Model of Money Laundering.
Proceedings of the Risk Assessment and Risk-Driven Testing - First International Workshop, 2013

Creating Integrated Evidence Graphs for Network Forensics.
Proceedings of the Advances in Digital Forensics IX, 2013

Timely Delivery of Messages in Positive Train Control.
Proceedings of the Critical Infrastructure Protection VII, 2013

2012
Transportation.
Proceedings of the Critical Infrastructure Protection, 2012

Performance Analysis of Web Services on Mobile Devices.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Securing the ZigBee Protocol in the Smart Grid.
Computer, 2012

Mapping evidence graphs to attack graphs.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

A Policy-Based Dialogue System for Physical Access Control.
Proceedings of the Seventh International Conference on Semantic Technologies for Intelligence, 2012

A Lightweight Framework for Web Services Implementations on Mobile Devices.
Proceedings of the 2012 IEEE First International Conference on Mobile Services, 2012

Cognitive radio technologies: Envisioning the realization of network-centric warfare.
Proceedings of the 2012 Military Communications and Information Systems Conference, 2012

Emergency Messages in the Commercial Mobile Alert System.
Proceedings of the Critical Infrastructure Protection VI, 2012

Forensics filesystem with cluster-level identifiers for efficient data recovery.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Leveraging an Inventory of the Cognitive Radio Attack Surface.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Using Attack Graphs in Forensic Examinations.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Runtime Administration of an RBAC Profile for XACML.
IEEE Trans. Serv. Comput., 2011

Forensic Web Services Framework.
IT Prof., 2011

Preemptive mechanism to prevent health data privacy leakage.
Proceedings of the MEDES '11: International ACM Conference on Management of Emergent Digital EcoSystems, 2011

Enhancing the Usability of the Commercial Mobile Alert System.
Proceedings of the Critical Infrastructure Protection V, 2011

Specifying Time-Out Points in Surgical EMRs-Work in Progress.
Proceedings of the ENTERprise Information Systems - International Conference, 2011

2010
A testbed for large mobile social computing experiments.
Int. J. Sens. Networks, 2010

Fine-grained Sharing of Health Records using XSPA Profile for XACML - An Extended Abstract.
Proceedings of the 1st USENIX Workshop on Health Security and Privacy, 2010

Using Ontological Information to Enhance Responder Availability in Emergency Response.
Proceedings of the Fifth International Conference on Semantic Technologies for Intelligence, 2010

Ontological Constructs to Create Money Laundering Schemes.
Proceedings of the Fifth International Conference on Semantic Technologies for Intelligence, 2010

QoP and QoS Policy Cognizant Module Composition.
Proceedings of the POLICY 2010, 2010

Small World VoIP.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Tracking Skype VoIP Calls Over The Internet.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules.
Proceedings of the ACM International Health Informatics Symposium, 2010

Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services.
Proceedings of the Advances in Digital Forensics VI, 2010

U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials.
Proceedings of the Critical Infrastructure Protection IV, 2010

Ontologies for modeling enterprise level security metrics.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Efficiency of social connection-based routing in P2P VoIP networks.
Proceedings of the Second International Conference on Communication Systems and Networks, 2010

2009
A society-integrated testbed architecture for peer-to-peer telecommunications.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

A testbed for mobile social computing.
Proceedings of the 5th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2009

An evidence generation model for web services.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

Using RuleML to specify cross-domain information flow control policies.
Proceedings of the 4th IEEE International Conference on System of Systems Engineering, 2009

A role-based XACML administration and delegation profile and its enforcement architecture.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

SQLProb: a proxy-based architecture towards preventing SQL injection attacks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Towards Session-Aware RBAC Administration and Enforcement with XACML.
Proceedings of the POLICY 2009, 2009

Online detection of network traffic anomalies using behavioral distance.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Secure Cross-Domain Train Scheduling.
Proceedings of the Critical Infrastructure Protection III, 2009

Meta-models for misuse cases.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Online detection of web choreography misuses.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

Achieving Peer-to-Peer Telecommunication Services through Social Hashing.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

2008
Detecting VoIP Floods Using the Hellinger Distance.
IEEE Trans. Parallel Distributed Syst., 2008

Status-Based Access Control.
ACM Trans. Inf. Syst. Secur., 2008

Enforcing Security Policies in Requirements Engineering Using AFUML.
Int. J. Comput. Their Appl., 2008

Security and the US rail infrastructure.
Int. J. Crit. Infrastructure Prot., 2008

Voice pharming attack and the trust of VoIP.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Model-Based Covert Timing Channels: Automated Modeling and Evasion.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

Protection and Recovery of Railroad Event Recorder Data.
Proceedings of the Advances in Digital Forensics IV, 2008

Forensic Web Services.
Proceedings of the Advances in Digital Forensics IV, 2008

Executable misuse cases for modeling security concerns.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008

Securing Workflows with XACML, RDF and BPEL.
Proceedings of the Data and Applications Security XXII, 2008

Extracting Kerberos passwords through RC4-HMAC encryption type analysis.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008

2007
Preserving Privacy in On-line Analytical Processing Data Cubes.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Key management requirements for PTC operations.
IEEE Veh. Technol. Mag., 2007

Parity-based inference control for multi-dimensional range sum queries.
J. Comput. Secur., 2007

RDF Collections.
Proceedings of the WEBIST 2007, 2007

PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Evaluating distributed xacml policies.
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Comparison of IPsec to TLS and SRTP for Securing VoIP.
Proceedings of the Security in Information Systems, 2007

An Intrusion Detection System for Detecting Phishing Attacks.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

A Framework for Investigating Railroad Accidents.
Proceedings of the Advances in Digital Forensics III, 2007

Securing Positive Train Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

XACML Policies for Exclusive Resource Usage.
Proceedings of the Data and Applications Security XXI, 2007

Relating counterexamples to test cases in CTL model checking specifications.
Proceedings of the 3rd Workshop on Advances in Model Based Testing, 2007

Preserving Privacy in On-Line Analytical Processing (OLAP)
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007

2006
SS7 over IP: signaling interworking vulnerabilities.
IEEE Netw., 2006

Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks.
J. Netw. Syst. Manag., 2006

An ontology-based distributed whiteboard to determine legal responses to online cyber attacks.
Internet Res., 2006

uSMIL: Towards secure unbreakable semantics in multimedia web services.
Comput. Syst. Sci. Eng., 2006

Securing UML Information Flow Using FlowUML.
J. Res. Pract. Inf. Technol., 2006

Communications Based Positive Train Control Systems Architecture in the USA.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

BPEL orchestration of secure webmail.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords.
Proceedings of the Security in Information Systems, 2006

Fast Detection of Denial-of-Service Attacks on IP Telephony.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Use-Misuse Case Driven Analysis of Positive Train Control.
Proceedings of the Advances in Digital Forensics II - IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, USA, January 29, 2006

An Algebra for Composing Ontologies.
Proceedings of the Formal Ontology in Information Systems, 2006

VoIP Intrusion Detection Through Interacting Protocol State Machines.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Creating Objects in the Flexible Authorization Framework.
Proceedings of the Data and Applications Security XX, 2006

Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
Proceedings of the Data and Applications Security XX, 2006

2005
Enforcing Semantics-Aware Security in Multimedia Surveillance.
J. Data Semant., 2005

SPUTERS: An Integrated Traffic Surveillance and Emergency Response Architecture.
J. Intell. Transp. Syst., 2005

Tableaux for constructive concurrent dynamic logic.
Ann. Pure Appl. Log., 2005

Maintaining privacy on derived objects.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Policy-based dissemination of partial web-ontologies.
Proceedings of the 2nd ACM Workshop On Secure Web Services, 2005

Honeynet Clusters as an early Warning System for Production Networks.
Proceedings of the Security in Information Systems, 2005

Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005

An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy.
Proceedings of the 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), 2005

MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Making Decisions about Legal Responses to Cyber Attacks.
Proceedings of the Advances in Digital Forensics, 2005

Authentication and Integrity in Telecommunication Signaling Network.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

Email feedback: a policy-based approach to overcoming false positives.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
An authorization model for multimedia digital libraries.
Int. J. Digit. Libr., 2004

Reasoning with advanced policy rules and its application to access control.
Int. J. Digit. Libr., 2004

Cardinality-based inference control in data cubes.
J. Comput. Secur., 2004

Specifying multimedia access control using RDF.
Comput. Syst. Sci. Eng., 2004

Creating non-decomposable stream bundles in multimedia web services using uSMIL.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Securing OLAP Data Cubes Against Privacy Breaches.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

A Policy Driven Approach to Email Services.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Analyzing Information Flow Control Policies in Requirements Engineering.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

<i>SECRETS</i>: A Secure Real-Time Multimedia Surveillance System.
Proceedings of the Intelligence and Security Informatics, 2004

THEMIS: Threat Evaluation Metamodel for Information Systems.
Proceedings of the Intelligence and Security Informatics, 2004

Implementing Consistency Checking in Correlating Attacks.
Proceedings of the Distributed Computing and Internet Technology, 2004

A Flexible Authorization Framework for E-Commerce.
Proceedings of the Distributed Computing and Internet Technology, 2004

Incorporating Dynamic Constraints in the Flexible Authorization Framework.
Proceedings of the Computer Security, 2004

Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

A logic-based framework for attribute based access control.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

2003
Removing permissions in the flexible authorization framework.
ACM Trans. Database Syst., 2003

A propositional policy algebra for access control.
ACM Trans. Inf. Syst. Secur., 2003

Provisions and Obligations in Policy Rule Management.
J. Netw. Syst. Manag., 2003

Consistent and Complete Access Control Policies in Use Cases.
Proceedings of the «UML» 2003, 2003

Enforcing Integrity in Multimedia Surveillance.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Providing Voice Privacy Over Public Switched Telephone Networks.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Multimedia Access Control Using RDF Metadata.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

FlexFlow: A Flexible Flow Control Policy Specification Framework.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

authUML: a three-phased framework to analyze access control specifications in use cases.
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, 2003

2002
Regulating access to SMIL formatted pay-per-view movies.
Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002, 2002

Provisions and Obligations in Policy Management and Security Applications.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

Obligation Monitoring in Policy Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Cardinality-Based Inference Control in Sum-Only Data Cubes.
Proceedings of the Computer Security, 2002

Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002

Policy algebras for access control the predicate case.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Scalable, graph-based network vulnerability analysis.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Modern Intrusion Detection, Data Mining, and Degrees of Attack Guilt.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Normal forms and syntactic completeness proofs for functional independencies.
Theor. Comput. Sci., 2001

Security in Federated Database Systems.
Inf. Secur. Tech. Rep., 2001

Subject Switching Algorithms for Access Control in Federated Databases.
Proceedings of the Database and Application Security XV, 2001

Recent Advances in Access Control Models.
Proceedings of the Database and Application Security XV, 2001

Revocations-A Classification.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Policy algebras for access control: the propositional case.
Proceedings of the CCS 2001, 2001

2000
Mining Cinematic Knowledge Work in Progress [An Extended Abstract].
Proceedings of the International Workshop on Multimedia Data Mining, 2000

The DADSim air defense simulation environment.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

Constraints, Inference Channels and Secure Databases.
Proceedings of the Principles and Practice of Constraint Programming, 2000

1999
Experimental Evaluation of Loss Perception in Continuous Media.
Multim. Syst., 1999

Test and evaluation of distributed information system networks.
Ann. Softw. Eng., 1999

1998
Pattern Directed Mining of Sequence Data.
Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD-98), 1998

Performance evaluation of media losses in the Continuous Media Toolkit.
Proceedings of the 1998 International Workshop on Multimedia Software Engineering, 1998

1997
Tableaux for Functional Dependencies and Independencies.
Proceedings of the Automated Reasoning with Analytic Tableaux and Related Methods, 1997

A multimedia programming toolkit/environment.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Experimental Evaluation of PFS Continuous Media File System.
Proceedings of the Sixth International Conference on Information and Knowledge Management (CIKM'97), 1997

1996
Quality of Service (QoS) Metrics for Continuous Media.
Multim. Tools Appl., 1996

1990
Constructive Modal Logics I.
Ann. Pure Appl. Log., 1990


  Loading...