| 2009 |
23 | | Adam J. Lee,
Kazuhiro Minami,
Nikita Borisov:
Confidentiality-preserving distributed proofs of conjunctive queries.
ASIACCS 2009: 287-297 |
22 | | Adam J. Lee,
Ting Yu:
Towards a dynamic and composable model of trust.
SACMAT 2009: 217-226 |
| 2008 |
21 | | Adam J. Lee,
Marianne Winslett:
Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
ASIACCS 2008: 228-239 |
20 | | Kazuhiro Minami,
Adam J. Lee,
Marianne Winslett,
Nikita Borisov:
Secure aggregation in a publish-subscribe system.
WPES 2008: 95-104 |
19 | | Adam J. Lee,
Marianne Winslett,
Jim Basney,
Von Welch:
The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur. 11(1): (2008) |
18 | | Adam J. Lee,
Marianne Winslett:
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems.
ACM Trans. Inf. Syst. Secur. 12(2): (2008) |
17 | | Adam J. Lee,
Ting Yu:
Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Record 37(1): 56-58 (2008) |
| 2007 |
16 | | Adam J. Lee,
Kazuhiro Minami,
Marianne Winslett:
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
SACMAT 2007: 101-110 |
15 | | Adam J. Lee,
Kent E. Seamons,
Marianne Winslett,
Ting Yu:
Automated Trust Negotiation in Open Systems.
Secure Data Management in Decentralized Systems 2007: 217-258 |
| 2006 |
14 | | Adam J. Lee,
Marianne Winslett:
Safety and consistency in policy-based authorization systems.
ACM Conference on Computer and Communications Security 2006: 124-133 |
13 | | Adam J. Lee,
Jodie P. Boyer,
Lars E. Olson,
Carl A. Gunter:
Defeasible security policy composition for web services.
FMSE 2006: 45-54 |
12 | | Mehran Ahsant,
Jim Basney,
Olle Mulmo,
Adam J. Lee,
S. Lennart Johnsson:
Toward an On-Demand Restricted Delegation Mechanism for Grids.
GRID 2006: 152-159 |
11 | | Adam J. Lee,
Marianne Winslett,
Jim Basney,
Von Welch:
Traust: a trust negotiation-based authorization service for open systems.
SACMAT 2006: 39-48 |
10 | | Adam J. Lee,
Parisa Tabriz,
Nikita Borisov:
A privacy-preserving interdomain audit framework.
WPES 2006: 99-108 |
9 | | Adam J. Lee,
Marianne Winslett:
Virtual Fingerprinting as a Foundation for Reputation in Open Systems.
iTrust 2006: 236-251 |
8 | | Adam J. Lee,
Marianne Winslett,
Jim Basney,
Von Welch:
Traust: A Trust Negotiation Based Authorization Service.
iTrust 2006: 458-462 |
| 2005 |
7 | | Gregory A. Koenig,
Xin Meng,
Adam J. Lee,
Michael Treaster,
Nadir Kiyanclar,
William Yurcik:
Cluster security with NVisionCC: process monitoring by leveraging emergent properties.
CCGRID 2005: 121-132 |
6 | | Adam J. Lee,
Gregory A. Koenig,
Xin Meng,
William Yurcik:
Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters.
CCGRID 2005: 146-151 |
5 | | Adam J. Lee,
Jodie P. Boyer,
Chris Drexelius,
Prasad Naldurg,
Raquel L. Hill,
Roy H. Campbell:
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
SPC 2005: 134-150 |
4 | | Ragib Hasan,
Suvda Myagmar,
Adam J. Lee,
William Yurcik:
Toward a threat model for storage systems.
StorageSS 2005: 94-102 |
3 | | Dmitry Mogilevsky,
Adam J. Lee,
William Yurcik:
Defining a Comprehensive Threat Model for High Performance Computational Clusters
CoRR abs/cs/0510046: (2005) |
| 2004 |
2 | | Kiran Lakkaraju,
William Yurcik,
Ratna Bearavolu,
Adam J. Lee:
NVisionIP: an interactive network flow visualization tool for security.
SMC (3) 2004: 2675-2680 |
1 | | Kiran Lakkaraju,
William Yurcik,
Adam J. Lee:
NVisionIP: netflow visualizations of system state for security situational awareness.
VizSEC 2004: 65-72 |