| 2009 | ||
|---|---|---|
| 95 | Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray: Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16 | |
| 94 | Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061 | |
| 93 | Min Xu, Duminda Wijesekera: A role-based XACML administration and delegation profile and its enforcement architecture. SWS 2009: 53-60 | |
| 2008 | ||
| 92 | Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera: Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685 | |
| 91 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345 | |
| 90 | Jon Whittle, Duminda Wijesekera, Mark Hartong: Executable misuse cases for modeling security concerns. ICSE 2008: 121-130 | |
| 89 | Murat Gunestas, Duminda Wijesekera, Anoop Singhal: Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176 | |
| 88 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260 | |
| 87 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 | |
| 86 | Steve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): (2008) | |
| 85 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008) | |
| 2007 | ||
| 84 | Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 | |
| 83 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72 | |
| 82 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290 | |
| 81 | Mark Hartong, Rajni Goel, Duminda Wijesekera: A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265 | |
| 80 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode: Evaluating distributed xacml policies. SWS 2007: 99-110 | |
| 79 | Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas: An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192 | |
| 78 | Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera: PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554 | |
| 77 | Saket Kaushik, Duminda Wijesekera: RDF Collections. WEBIST (Selected Papers) 2007: 201-212 | |
| 76 | Barry Sweeney, Duminda Wijesekera: Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92 | |
| 75 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 | |
| 74 | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) | |
| 2006 | ||
| 73 | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 | |
| 72 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 | |
| 71 | Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 | |
| 70 | Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276 | |
| 69 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155 | |
| 68 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 | |
| 67 | Saket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94 | |
| 66 | Mark Hartong, Rajni Goel, Duminda Wijesekera: Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991 | |
| 65 | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245 | |
| 64 | Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera: Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277 | |
| 63 | Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006) | |
| 62 | Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16(5): 475-490 (2006) | |
| 61 | Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera: Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Network Syst. Manage. 14(4): 599-602 (2006) | |
| 60 | Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera: Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology 38(1): (2006) | |
| 2005 | ||
| 59 | Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005 | |
| 58 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 | |
| 57 | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 | |
| 56 | Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael: Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294 | |
| 55 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 | |
| 54 | Duminda Wijesekera, James Bret Michael, Anil Nerode: An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118 | |
| 53 | Saket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 | |
| 52 | Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas: Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238 | |
| 51 | Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera: Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83 | |
| 50 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 | |
| 49 | Duminda Wijesekera, Anil Nerode: Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Logic 135(1-3): 1-72 (2005) | |
| 48 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semantics 2: 199-221 (2005) | |
| 2004 | ||
| 47 | Inja Youn, Duminda Wijesekera: Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218 | |
| 46 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 | |
| 45 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 | |
| 44 | Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 | |
| 43 | Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 | |
| 42 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- | |
| 41 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296 | |
| 40 | Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera: THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321 | |
| 39 | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- | |
| 38 | Khaled Alghathbar, Duminda Wijesekera: Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196 | |
| 37 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76 | |
| 36 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3): (2004) | |
| 35 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: An authorization model for multimedia digital libraries. Int. J. on Digital Libraries 4(3): 139-155 (2004) | |
| 34 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004) | |
| 33 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
| 2003 | ||
| 32 | James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera: Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626 | |
| 31 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 | |
| 30 | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 | |
| 29 | Khaled Alghathbar, Duminda Wijesekera: authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86 | |
| 28 | Naren Kodali, Csilla Farkas, Duminda Wijesekera: Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731 | |
| 27 | Mohamed Sharif, Duminda Wijesekera: Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36 | |
| 26 | Khaled Alghathbar, Duminda Wijesekera: Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387 | |
| 25 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) | |
| 24 | Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) | |
| 23 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003) | |
| 2002 | ||
| 22 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180 | |
| 21 | Paul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224 | |
| 20 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
| 19 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 | |
| 18 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12 | |
| 17 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 | |
| 16 | Naren Kodali, Duminda Wijesekera: Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60 | |
| 2001 | ||
| 15 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47 | |
| 14 | Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58 | |
| 13 | Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15 | |
| 12 | Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 | |
| 11 | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001) | |
| 2000 | ||
| 10 | Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113 | |
| 9 | Duminda Wijesekera, Daniel Barbará: Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103 | |
| 1999 | ||
| 8 | Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera: Test and evaluation of distributed information system networks. Ann. Software Eng. 8: 289-311 (1999) | |
| 7 | Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti: Experimental Evaluation of Loss Perception in Continuous Media. Multimedia Syst. 7(6): 486-499 (1999) | |
| 1998 | ||
| 6 | Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava: Pattern Directed Mining of Sequence Data. KDD 1998: 51-57 | |
| 1997 | ||
| 5 | Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti: Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253 | |
| 4 | Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote: A multimedia programming toolkit/environment. ICPADS 1997: 446-452 | |
| 3 | Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372 | |
| 1996 | ||
| 2 | Duminda Wijesekera, Jaideep Srivastava: Quality of Service (QoS) Metrics for Continuous Media. Multimedia Tools Appl. 3(2): 127-166 (1996) | |
| 1990 | ||
| 1 | Duminda Wijesekera: Constructive Modal Logics I. Ann. Pure Appl. Logic 50(3): 271-301 (1990) | |