Search the dblp DataBase
Paul Ammann :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Paul Ammann , Sushil Jajodia A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1991, pp:191-202 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP ] ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal ] Paul Ammann , Sushil Jajodia Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:125-134 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP ] VLDB, 1995, pp:218-227 [Conf ] Paul Ammann , Sushil Jajodia Distributed Timestamp Generation in Planar Lattice Networks. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1993, v:11, n:3, pp:205-225 [Journal ] Paul Ammann , Joseph Pamula , Julie Street , Ronald W. Ritchey A Host-Based Approach to Network Attack Chaining Analysis. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:72-84 [Conf ] Sushil Jajodia , Indrakshi Ray , Paul Ammann Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP ] CAiSE, 1997, pp:75-88 [Conf ] Paul Ammann , Sushil Jajodia An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf ] Paul Ammann , Duminda Wijesekera , Saket Kaushik Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf ] Saket Kaushik , William H. Winsborough , Duminda Wijesekera , Paul Ammann Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP ] FMSE, 2005, pp:73-82 [Conf ] Pierangela Samarati , Paul Ammann , Sushil Jajodia Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf ] Paul Ammann , Hassan Gomaa , A. Jefferson Offutt , David Rine , Bo Sanden A Five Year Perspective on Software Engineering Graduate Programs at George Mason University. [Citation Graph (0, 0)][DBLP ] CSEE, 1994, pp:473-488 [Conf ] Paul Ammann , Richard J. Lipton , Ravi S. Sandhu The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:148-156 [Conf ] Ravi S. Sandhu , Paul Ammann One-Representative Safety Analysis in the Non-Monotonic Transform Model. [Citation Graph (0, 0)][DBLP ] CSFW, 1994, pp:139-149 [Conf ] Saket Kaushik , William H. Winsborough , Duminda Wijesekera , Paul Ammann Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:163-178 [Conf ] Paul Ammann , Paul E. Black A Specification-Based Coverage Metric to Evaluate Test Sets. [Citation Graph (0, 0)][DBLP ] HASE, 1999, pp:239-248 [Conf ] Peng Liu , Paul Ammann , Sushil Jajodia Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP ] ICDCS, 1999, pp:414-423 [Conf ] Aynur Abdurazik , Paul Ammann , Wei Ding , A. Jefferson Offutt Evaluation of Three Specification-Based Testing Criteria. [Citation Graph (0, 0)][DBLP ] ICECCS, 2000, pp:179-187 [Conf ] Paul Ammann , Wei Ding , Daling Xu Using a Model Checker to Test Safety Properties. [Citation Graph (0, 0)][DBLP ] ICECCS, 2001, pp:212-221 [Conf ] Paul Ammann , Paul E. Black , William Majurski Using Model Checking to Generate Tests from Specifications. [Citation Graph (0, 0)][DBLP ] ICFEM, 1998, pp:46-0 [Conf ] John C. Knight , Paul Ammann An Experimental Evaluation of Simple Methods for Seeding Program Errors. [Citation Graph (0, 0)][DBLP ] ICSE, 1985, pp:337-342 [Conf ] John C. Knight , Paul Ammann Issues Influencing the Use of N-Version Programming. [Citation Graph (0, 0)][DBLP ] IFIP Congress, 1989, pp:217-222 [Conf ] Jing Guan , Jeff Offutt , Paul Ammann An industrial case study of structural testing applied to safety-critical embedded software. [Citation Graph (0, 0)][DBLP ] ISESE, 2006, pp:272-277 [Conf ] Paul Ammann , A. Jefferson Offutt , Hong Huang Coverage Criteria for Logical Expressions. [Citation Graph (0, 0)][DBLP ] ISSRE, 2003, pp:99-107 [Conf ] Saket Kaushik , Paul Ammann , Duminda Wijesekera , William H. Winsborough , Ronald W. Ritchey A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:169-0 [Conf ] Paul Ammann , Sushil Jajodia , Catherine D. McCollum , Barbara T. Blaustein Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf ] Paul Ammann , Ravi S. Sandhu Safety Analysis for the Extended Schematic Protection Model. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:87-97 [Conf ] Ronald W. Ritchey , Paul Ammann Using Model Checking to Analyze Network Vulnerabilities. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:156-165 [Conf ] Paul Ammann , Sushil Jajodia The Integrity Challenge. [Citation Graph (0, 0)][DBLP ] IICIS, 1999, pp:59-70 [Conf ] Paul Ammann , Dahlard L. Lukes , John C. Knight Applying Data Redundancy to Differential Equation Solvers. [Citation Graph (0, 0)][DBLP ] Ann. Software Eng., 1997, v:4, n:, pp:65-77 [Journal ] Sushil Jajodia , Catherine D. McCollum , Paul Ammann Trusted Recovery. [Citation Graph (0, 2)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal ] Sushil Jajodia , Paul Ammann , Catherine D. McCollum Surviving Information Warfare Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1999, v:32, n:4, pp:57-63 [Journal ] Pierangela Samarati , Paul Ammann , Sushil Jajodia Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal ] Peng Liu , Paul Ammann , Sushil Jajodia Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal ] Paul Ammann , Frank Jaeckle , Sushil Jajodia Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:2/3, pp:87-114 [Journal ] Paul Ammann , Richard J. Lipton , Ravi S. Sandhu The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1996, v:4, n:2/3, pp:149-166 [Journal ] Paul Ammann , Ravi S. Sandhu The Extended Schematic Protection Model [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1992, v:1, n:3-4, pp:335-384 [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal ] A. Jefferson Offutt , Shaoying Liu , Aynur Abdurazik , Paul Ammann Generating test data from state-based specifications. [Citation Graph (0, 0)][DBLP ] Softw. Test., Verif. Reliab., 2003, v:13, n:1, pp:25-53 [Journal ] Paul Ammann , John C. Knight Data Diversity: An Approach to Software Fault Tolerance. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1988, v:37, n:4, pp:418-425 [Journal ] Paul Ammann , Vijayalakshmi Atluri , Sushil Jajodia The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal ] Paul Ammann , Sushil Jajodia , Peng Liu Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal ] Paul Ammann , Sushil Jajodia , Padmaja Mavuluri On-The-Fly Reading of Entire Databases. [Citation Graph (0, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:834-838 [Journal ] Paul Ammann , Sushil Jajodia , Phyllis G. Frankl Globally Consistent Event Ordering in One-Directional Distributed Environments. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:6, pp:665-670 [Journal ] Paul Ammann , Susan S. Brilliant , John C. Knight The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1994, v:20, n:2, pp:142-148 [Journal ] Peng Liu , Jie Li , Sushil Jajodia , Paul Ammann Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal ] A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP ] An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP ] Reachability and Propagation for LTL Requirements Testing. [Citation Graph (, )][DBLP ] Relating counterexamples to test cases in CTL model checking specifications. [Citation Graph (, )][DBLP ] Coverage Criteria for State Based Specifications. [Citation Graph (, )][DBLP ] A framework for establishing, assessing, and managing trust in inter-organizational relationships. [Citation Graph (, )][DBLP ] BPEL orchestration of secure webmail. [Citation Graph (, )][DBLP ] Policy-based dissemination of partial web-ontologies. [Citation Graph (, )][DBLP ] Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection. [Citation Graph (, )][DBLP ] Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing. [Citation Graph (, )][DBLP ] Search in 0.022secs, Finished in 0.026secs