| 2009 |
38 | | Maryam Jafari-lafti,
Chin-Tser Huang,
Csilla Farkas:
P2F: A User-Centric Privacy Protection Framework.
ARES 2009: 386-391 |
| 2008 |
37 | | Csilla Farkas,
Michael N. Huhns:
Securing Enterprise Applications: Service-Oriented Security (SOS).
CEC/EEE 2008: 428-431 |
36 | | Vaibhav Gowadia,
Csilla Farkas,
Michiharu Kudo:
Checking Security Policy Compliance
CoRR abs/0809.5266: (2008) |
| 2007 |
35 | | Hasika Pamunuwa,
Duminda Wijesekera,
Csilla Farkas:
An Intrusion Detection System for Detecting Phishing Attacks.
Secure Data Management 2007: 181-192 |
34 | | Mark Hartong,
Rajni Goel,
Csilla Farkas,
Duminda Wijesekera:
PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents.
VTC Spring 2007: 2550-2554 |
33 | | Katalin Anna Lázá,
Csilla Farkas:
Security in TciNMP Systems.
WOSIS 2007: 95-104 |
| 2006 |
32 | | Saket Kaushik,
Csilla Farkas,
Duminda Wijesekera,
Paul Ammann:
An Algebra for Composing Ontologies.
FOIS 2006: 265-276 |
31 | | John B. Bowles,
Caroline M. Eastman,
Csilla Farkas:
Engaging undergraduates in computer security research.
InfoSecCD 2006: 184-190 |
30 | | Amit Jain,
Csilla Farkas:
Secure resource description framework: an access control model.
SACMAT 2006: 121-129 |
29 | | Csilla Farkas,
Alexander Brodsky,
Sushil Jajodia:
Unauthorized inferences in semistructured databases.
Inf. Sci. 176(22): 3269-3299 (2006) |
28 | | Gábor Ziegler,
Csilla Farkas,
András Lörincz:
A framework for anonymous but accountable self-organizing communities.
Information & Software Technology 48(8): 726-744 (2006) |
27 | | Khaled Alghathbar,
Csilla Farkas,
Duminda Wijesekera:
Securing UML Information Flow Using FlowUML.
Journal of Research and Practice in Information Technology 38(1): (2006) |
26 | | Vaibhav Gowadia,
Csilla Farkas:
Tree Automata for Schema-Level Filtering of XML Associations.
Journal of Research and Practice in Information Technology 38(1): (2006) |
| 2005 |
25 | | Zsolt Palotai,
Csilla Farkas,
András Lörincz:
Selection in Scale-Free Small World.
CEEMAS 2005: 579-582 |
24 | | Inja Youn,
Csilla Farkas,
Bhavani M. Thuraisingham:
Multilevel Secure Teleconferencing over Public Switched Telephone Network.
DBSec 2005: 99-113 |
23 | | Tyrone S. Toland,
Csilla Farkas,
Caroline M. Eastman:
Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution.
Secure Data Management 2005: 124-142 |
22 | | Vaibhav Gowadia,
Csilla Farkas:
Tree Automata for Schema-level Filtering of XML Associations .
WOSIS 2005: 136-145 |
21 | | Khaled Alghathbar,
Duminda Wijesekera,
Csilla Farkas:
Secure UML Information Flow using FlowUML.
WOSIS 2005: 229-238 |
20 | | Zsolt Palotai,
Csilla Farkas,
András Lörincz:
Selection in Scale-Free Small World
CoRR abs/cs/0504063: (2005) |
19 | | Vaibhav Gowadia,
Csilla Farkas,
Marco Valtorta:
PAID: A Probabilistic Agent-Based Intrusion Detection system.
Computers & Security 24(7): 529-545 (2005) |
18 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
Enforcing Semantics-Aware Security in Multimedia Surveillance.
J. Data Semantics 2: 199-221 (2005) |
| 2004 |
17 | | Csilla Farkas,
Pierangela Samarati:
Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain
Kluwer 2004 |
16 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
SECRETS: A Secure Real-Time Multimedia Surveillance System.
ISI 2004: 278-296 |
15 | | Csilla Farkas,
Thomas C. Wingfield,
James Bret Michael,
Duminda Wijesekera:
THEMIS: Threat Evaluation Metamodel for Information Systems.
ISI 2004: 307-321 |
14 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
Creating non-decomposable stream bundles in multimedia web services using uSMIL.
SWS 2004: 67-76 |
13 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
Specifying multimedia access control using RDF.
Comput. Syst. Sci. Eng. 19(3): (2004) |
12 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
An authorization model for multimedia digital libraries.
Int. J. on Digital Libraries 4(3): 139-155 (2004) |
11 | | Andrei Stoica,
Csilla Farkas:
Ontology Guided XML Security Engine.
J. Intell. Inf. Syst. 23(3): 209-223 (2004) |
| 2003 |
10 | | Csilla Farkas,
Andrei Stoica:
Correlated Data Inference.
DBSec 2003: 119-132 |
9 | | Naren Kodali,
Csilla Farkas,
Duminda Wijesekera:
Multimedia Access Control Using RDF Metadata.
OTM Workshops 2003: 718-731 |
8 | | Vaibhav Gowadia,
Csilla Farkas:
RDF metadata for XML access control.
XML Security 2003: 39-48 |
| 2002 |
7 | | Andrei Stoica,
Csilla Farkas:
Secure XML Views.
DBSec 2002: 133-146 |
6 | | Csilla Farkas,
Gábor Ziegler,
Attila Meretei,
András Lörincz:
Anonymity and accountability in self-organizing electronic communities.
WPES 2002: 81-90 |
5 | | Csilla Farkas,
Michael N. Huhns:
Making Agents Secure on the Semantic Web.
IEEE Internet Computing 6(6): 76-79 (2002) |
4 | | Csilla Farkas,
Sushil Jajodia:
The Inference Problem: A Survey.
SIGKDD Explorations 4(2): 6-11 (2002) |
| 2001 |
3 | | Csilla Farkas,
Tyrone S. Toland,
Caroline M. Eastman:
The Inference Problem and Updates in Relational Databases.
DBSec 2001: 181-194 |
| 2000 |
2 | | Alexander Brodsky,
Csilla Farkas,
Duminda Wijesekera,
Xiaoyang Sean Wang:
Constraints, Inference Channels and Secure Databases.
CP 2000: 98-113 |
1 | | Alexander Brodsky,
Csilla Farkas,
Sushil Jajodia:
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures.
IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000) |