The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sujeet Shenoi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
    Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:219-228 [Conf]
  2. John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
    Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:67-76 [Conf]
  3. Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
    Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:100-106 [Conf]
  4. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
    An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:385-388 [Conf]
  5. John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
    Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:221-232 [Conf]
  6. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:109-123 [Conf]
  7. John Hale, Jody Threet, Sujeet Shenoi
    A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:139-156 [Conf]
  8. John Hale, Jody Threet, Sujeet Shenoi
    Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:134-148 [Conf]
  9. J. Halle, Jody Threet, Sujeet Shenoi
    A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:101-119 [Conf]
  10. G. Lorentz, S. Dangi, D. Jones, P. Carpenter, Sujeet Shenoi
    Implementing Advanced Internet Search Engines. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:389-391 [Conf]
  11. G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
    Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:151-164 [Conf]
  12. Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi
    Remote Computer Fingerprinting for Cyber Crime Investigations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:3-15 [Conf]
  13. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
    Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:89-100 [Conf]
  14. Mark Pollitt, Michael Caloyannides, Jon Novotny, Sujeet Shenoi
    Digital Forensics: Operational, Legal, and Research Issues. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:393-403 [Conf]
  15. Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
    A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:317-332 [Conf]
  16. Mark Davis, Gavin Manes, Sujeet Shenoi
    A Network-Based Architecture for Storing Digital Evidence. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:33-42 [Conf]
  17. Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi
    Extracting Concealed Data from BIOS Chips. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:217-230 [Conf]
  18. Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi
    Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf]
  19. Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi
    Detecting Hidden Data in Ext2/Ext3 File Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:245-256 [Conf]
  20. Christopher Swenson, Gavin Manes, Sujeet Shenoi
    Imaging and Analysis of GSM SIM Cards. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:205-216 [Conf]
  21. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ISADS, 2001, pp:19-28 [Conf]
  22. Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
    Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:349-360 [Conf]
  23. John Hale, Sujeet Shenoi
    Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
  24. John Hale, Sujeet Shenoi
    Analyzing FD Inference in Relational Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:2, pp:167-183 [Journal]
  25. Mauricio Papa, Jason Wood, Sujeet Shenoi
    Evaluating controller robustness using cell mapping. [Citation Graph (0, 0)][DBLP]
    Fuzzy Sets and Systems, 2001, v:121, n:1, pp:3-12 [Journal]
  26. Rizwan Mithani, Sujeet Shenoi, L. T. Fan, W. P. Walawender
    Ranking dimensionless groups in fluidized-bed reactor scale-up. [Citation Graph (0, 0)][DBLP]
    Int. J. Approx. Reasoning, 1990, v:4, n:1, pp:69-85 [Journal]
  27. Sujeet Shenoi, Austin Melton
    An extended version of the fuzzy relational database model. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1990, v:52, n:1, pp:35-52 [Journal]
  28. Sujeet Shenoi, Austin Melton, L. T. Fan
    Functional dependencies and normal forms in the fuzzy relational database model. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1992, v:60, n:1-2, pp:1-28 [Journal]
  29. John Hale, Mauricio Papa, Sujeet Shenoi
    Programmable Access Control. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
  30. John Hale, Jody Threet, Sujeet Shenoi
    A Ticket-Based Access Control Architecture for Object Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
  31. Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi
    NetGlean: A Methodology for Distributed Network Security Scanning. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2005, v:13, n:3, pp:329-344 [Journal]

  32. Detecting Data Concealment Programs Using File System Analysis. [Citation Graph (, )][DBLP]


  33. On the Legality of Analyzing Telephone Call Records. [Citation Graph (, )][DBLP]


  34. File System Journal Forensics. [Citation Graph (, )][DBLP]


  35. Legal Issues Pertaining to the Use of Cell Phone Data. [Citation Graph (, )][DBLP]


  36. Forensic Analysis of BIOS Chips. [Citation Graph (, )][DBLP]


  37. GSM Cell Site Forensics. [Citation Graph (, )][DBLP]


  38. Countering Hostile Forensic Techniques. [Citation Graph (, )][DBLP]


  39. An Architecture for SCADA Network Forensics. [Citation Graph (, )][DBLP]


  40. Security Analysis of Multilayer SCADA Protocols. [Citation Graph (, )][DBLP]


  41. Security Strategies for SCADA Networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002