![]() | 2009 | |
---|---|---|
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray: Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Min Xu, Duminda Wijesekera: A role-based XACML administration and delegation profile and its enforcement architecture. SWS 2009: 53-60 |
2008 | ||
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera: Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Jon Whittle, Duminda Wijesekera, Mark Hartong: Executable misuse cases for modeling security concerns. ICSE 2008: 121-130 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Murat Gunestas, Duminda Wijesekera, Anoop Singhal: Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Duminda Wijesekera: Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Steve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008) |
2007 | ||
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Duminda Wijesekera: Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72 |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Duminda Wijesekera: A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode: Evaluating distributed xacml policies. SWS 2007: 99-110 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas: An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera: PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, Duminda Wijesekera: RDF Collections. WEBIST (Selected Papers) 2007: 201-212 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Barry Sweeney, Duminda Wijesekera: Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) |
2006 | ||
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Duminda Wijesekera: Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Mark Hartong, Rajni Goel, Duminda Wijesekera: Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera: Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006) |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16(5): 475-490 (2006) |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera: Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Network Syst. Manage. 14(4): 599-602 (2006) |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera: Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology 38(1): (2006) |
2005 | ||
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael: Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, James Bret Michael, Anil Nerode: An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas: Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera: Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Anil Nerode: Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Logic 135(1-3): 1-72 (2005) |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semantics 2: 199-221 (2005) |
2004 | ||
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Inja Youn, Duminda Wijesekera: Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera: THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Khaled Alghathbar, Duminda Wijesekera: Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3): (2004) |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: An authorization model for multimedia digital libraries. Int. J. on Digital Libraries 4(3): 139-155 (2004) |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004) |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) |
2003 | ||
32 | ![]() ![]() ![]() ![]() ![]() ![]() | James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera: Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Khaled Alghathbar, Duminda Wijesekera: authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohamed Sharif, Duminda Wijesekera: Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Khaled Alghathbar, Duminda Wijesekera: Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003) |
2002 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Paul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Naren Kodali, Duminda Wijesekera: Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60 |
2001 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001) |
2000 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Daniel Barbará: Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103 |
1999 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera: Test and evaluation of distributed information system networks. Ann. Software Eng. 8: 289-311 (1999) |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti: Experimental Evaluation of Loss Perception in Continuous Media. Multimedia Syst. 7(6): 486-499 (1999) |
1998 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava: Pattern Directed Mining of Sequence Data. KDD 1998: 51-57 |
1997 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti: Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote: A multimedia programming toolkit/environment. ICPADS 1997: 446-452 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372 |
1996 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera, Jaideep Srivastava: Quality of Service (QoS) Metrics for Continuous Media. Multimedia Tools Appl. 3(2): 127-166 (1996) |
1990 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Duminda Wijesekera: Constructive Modal Logics I. Ann. Pure Appl. Logic 50(3): 271-301 (1990) |