2009 | ||
---|---|---|
95 | Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray: Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 | |
94 | Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 | |
93 | Min Xu, Duminda Wijesekera: A role-based XACML administration and delegation profile and its enforcement architecture. SWS 2009: 53-60 | |
2008 | ||
92 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera: Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685 | |
91 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345 | |
90 | Jon Whittle, Duminda Wijesekera, Mark Hartong: Executable misuse cases for modeling security concerns. ICSE 2008: 121-130 | |
89 | Murat Gunestas, Duminda Wijesekera, Anoop Singhal: Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 | |
88 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260 | |
87 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 | |
86 | Steve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): (2008) | |
85 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008) | |
2007 | ||
84 | Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 | |
83 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72 | |
82 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290 | |
81 | Mark Hartong, Rajni Goel, Duminda Wijesekera: A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265 | |
80 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode: Evaluating distributed xacml policies. SWS 2007: 99-110 | |
79 | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas: An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 | |
78 | Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera: PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554 | |
77 | Saket Kaushik, Duminda Wijesekera: RDF Collections. WEBIST (Selected Papers) 2007: 201-212 | |
76 | Barry Sweeney, Duminda Wijesekera: Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92 | |
75 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 | |
74 | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) | |
2006 | ||
73 | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 | |
72 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 | |
71 | Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 | |
70 | Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276 | |
69 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155 | |
68 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 | |
67 | Saket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94 | |
66 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991 | |
65 | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 | |
64 | Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera: Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277 | |
63 | Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006) | |
62 | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16(5): 475-490 (2006) | |
61 | Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera: Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Network Syst. Manage. 14(4): 599-602 (2006) | |
60 | Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera: Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology 38(1): (2006) | |
2005 | ||
59 | Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005 | |
58 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 | |
57 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 | |
56 | Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael: Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 | |
55 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 | |
54 | Duminda Wijesekera, James Bret Michael, Anil Nerode: An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 | |
53 | Saket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 | |
52 | Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas: Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 | |
51 | Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera: Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83 | |
50 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 | |
49 | Duminda Wijesekera, Anil Nerode: Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Logic 135(1-3): 1-72 (2005) | |
48 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semantics 2: 199-221 (2005) | |
2004 | ||
47 | Inja Youn, Duminda Wijesekera: Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218 | |
46 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 | |
45 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 | |
44 | Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 | |
43 | Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 | |
42 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- | |
41 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296 | |
40 | Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera: THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 | |
39 | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- | |
38 | Khaled Alghathbar, Duminda Wijesekera: Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196 | |
37 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76 | |
36 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3): (2004) | |
35 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: An authorization model for multimedia digital libraries. Int. J. on Digital Libraries 4(3): 139-155 (2004) | |
34 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004) | |
33 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
2003 | ||
32 | James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera: Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626 | |
31 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 | |
30 | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 | |
29 | Khaled Alghathbar, Duminda Wijesekera: authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86 | |
28 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731 | |
27 | Mohamed Sharif, Duminda Wijesekera: Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 | |
26 | Khaled Alghathbar, Duminda Wijesekera: Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387 | |
25 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) | |
24 | Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) | |
23 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003) | |
2002 | ||
22 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180 | |
21 | Paul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224 | |
20 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
19 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 | |
18 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12 | |
17 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 | |
16 | Naren Kodali, Duminda Wijesekera: Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60 | |
2001 | ||
15 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47 | |
14 | Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58 | |
13 | Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15 | |
12 | Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 | |
11 | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001) | |
2000 | ||
10 | Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113 | |
9 | Duminda Wijesekera, Daniel Barbará: Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103 | |
1999 | ||
8 | Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera: Test and evaluation of distributed information system networks. Ann. Software Eng. 8: 289-311 (1999) | |
7 | Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti: Experimental Evaluation of Loss Perception in Continuous Media. Multimedia Syst. 7(6): 486-499 (1999) | |
1998 | ||
6 | Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava: Pattern Directed Mining of Sequence Data. KDD 1998: 51-57 | |
1997 | ||
5 | Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti: Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253 | |
4 | Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote: A multimedia programming toolkit/environment. ICPADS 1997: 446-452 | |
3 | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372 | |
1996 | ||
2 | Duminda Wijesekera, Jaideep Srivastava: Quality of Service (QoS) Metrics for Continuous Media. Multimedia Tools Appl. 3(2): 127-166 (1996) | |
1990 | ||
1 | Duminda Wijesekera: Constructive Modal Logics I. Ann. Pure Appl. Logic 50(3): 271-301 (1990) |