|
Search the dblp DataBase
Sujeet Shenoi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi
Security Policy Coordination for Heterogeneous Information Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:219-228 [Conf]
- John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi
Extending Java for Package based Access Control. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:67-76 [Conf]
- Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu
Policy Mediation for Multi-Enterprise Environments. [Citation Graph (0, 0)][DBLP] ACSAC, 2000, pp:100-106 [Conf]
- M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi
An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:385-388 [Conf]
- John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi
Language Extensions for Programmable Security. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:221-232 [Conf]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Security for Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:109-123 [Conf]
- John Hale, Jody Threet, Sujeet Shenoi
A Practical Formalism for Imprecise Inference Control. [Citation Graph (0, 0)][DBLP] DBSec, 1994, pp:139-156 [Conf]
- John Hale, Jody Threet, Sujeet Shenoi
Capability-Based Primitives for Access Control in Object-Oriented Systems. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:134-148 [Conf]
- J. Halle, Jody Threet, Sujeet Shenoi
A Framework for High Assurance Security of Distributed Objects. [Citation Graph (0, 0)][DBLP] DBSec, 1996, pp:101-119 [Conf]
- G. Lorentz, S. Dangi, D. Jones, P. Carpenter, Sujeet Shenoi
Implementing Advanced Internet Search Engines. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:389-391 [Conf]
- G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi
Public Telephone Network Vulnerabilities. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:151-164 [Conf]
- Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi
Remote Computer Fingerprinting for Cyber Crime Investigations. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:3-15 [Conf]
- Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi
Simulation and Analysis of Cryptographic Protocols. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:89-100 [Conf]
- Mark Pollitt, Michael Caloyannides, Jon Novotny, Sujeet Shenoi
Digital Forensics: Operational, Legal, and Research Issues. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:393-403 [Conf]
- Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi
A Tool for Inference Detection and Knowledge Discovery in Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:317-332 [Conf]
- Mark Davis, Gavin Manes, Sujeet Shenoi
A Network-Based Architecture for Storing Digital Evidence. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:33-42 [Conf]
- Pavel Gershteyn, Mark Davis, Gavin Manes, Sujeet Shenoi
Extracting Concealed Data from BIOS Chips. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:217-230 [Conf]
- Tyler Moore, Anthony Meehan 0002, Gavin Manes, Sujeet Shenoi
Using Signaling Information in Telecom Network Forensics. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:177-188 [Conf]
- Scott Piper, Mark Davis, Gavin Manes, Sujeet Shenoi
Detecting Hidden Data in Ext2/Ext3 File Systems. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:245-256 [Conf]
- Christopher Swenson, Gavin Manes, Sujeet Shenoi
Imaging and Analysis of GSM SIM Cards. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:205-216 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Formal Analysis of E-Commerce Protocols. [Citation Graph (0, 0)][DBLP] ISADS, 2001, pp:19-28 [Conf]
- Mauricio Papa, Oliver Bremer, John Hale, Sujeet Shenoi
Integrating Logics and Process Calculi for Cryptographic Protocol Analysis. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:349-360 [Conf]
- John Hale, Sujeet Shenoi
Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge Discovery. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 1997, pp:188-199 [Conf]
- John Hale, Sujeet Shenoi
Analyzing FD Inference in Relational Databases. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1996, v:18, n:2, pp:167-183 [Journal]
- Mauricio Papa, Jason Wood, Sujeet Shenoi
Evaluating controller robustness using cell mapping. [Citation Graph (0, 0)][DBLP] Fuzzy Sets and Systems, 2001, v:121, n:1, pp:3-12 [Journal]
- Rizwan Mithani, Sujeet Shenoi, L. T. Fan, W. P. Walawender
Ranking dimensionless groups in fluidized-bed reactor scale-up. [Citation Graph (0, 0)][DBLP] Int. J. Approx. Reasoning, 1990, v:4, n:1, pp:69-85 [Journal]
- Sujeet Shenoi, Austin Melton
An extended version of the fuzzy relational database model. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1990, v:52, n:1, pp:35-52 [Journal]
- Sujeet Shenoi, Austin Melton, L. T. Fan
Functional dependencies and normal forms in the fuzzy relational database model. [Citation Graph (0, 0)][DBLP] Inf. Sci., 1992, v:60, n:1-2, pp:1-28 [Journal]
- John Hale, Mauricio Papa, Sujeet Shenoi
Programmable Access Control. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:331-352 [Journal]
- John Hale, Jody Threet, Sujeet Shenoi
A Ticket-Based Access Control Architecture for Object Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
- Gavin Manes, Dominic Schulte, Seth Guenther, Sujeet Shenoi
NetGlean: A Methodology for Distributed Network Security Scanning. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2005, v:13, n:3, pp:329-344 [Journal]
Detecting Data Concealment Programs Using File System Analysis. [Citation Graph (, )][DBLP]
On the Legality of Analyzing Telephone Call Records. [Citation Graph (, )][DBLP]
File System Journal Forensics. [Citation Graph (, )][DBLP]
Legal Issues Pertaining to the Use of Cell Phone Data. [Citation Graph (, )][DBLP]
Forensic Analysis of BIOS Chips. [Citation Graph (, )][DBLP]
GSM Cell Site Forensics. [Citation Graph (, )][DBLP]
Countering Hostile Forensic Techniques. [Citation Graph (, )][DBLP]
An Architecture for SCADA Network Forensics. [Citation Graph (, )][DBLP]
Security Analysis of Multilayer SCADA Protocols. [Citation Graph (, )][DBLP]
Security Strategies for SCADA Networks. [Citation Graph (, )][DBLP]
Search in 0.019secs, Finished in 0.020secs
|