The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Paul Ammann: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paul Ammann, Sushil Jajodia
    A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1991, pp:191-202 [Conf]
  2. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal]
  3. Paul Ammann, Sushil Jajodia
    Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:125-134 [Conf]
  4. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP]
    VLDB, 1995, pp:218-227 [Conf]
  5. Paul Ammann, Sushil Jajodia
    Distributed Timestamp Generation in Planar Lattice Networks. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1993, v:11, n:3, pp:205-225 [Journal]
  6. Paul Ammann, Joseph Pamula, Julie Street, Ronald W. Ritchey
    A Host-Based Approach to Network Attack Chaining Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:72-84 [Conf]
  7. Sushil Jajodia, Indrakshi Ray, Paul Ammann
    Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1997, pp:75-88 [Conf]
  8. Paul Ammann, Sushil Jajodia
    An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf]
  9. Paul Ammann, Duminda Wijesekera, Saket Kaushik
    Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf]
  10. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:73-82 [Conf]
  11. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf]
  12. Paul Ammann, Hassan Gomaa, A. Jefferson Offutt, David Rine, Bo Sanden
    A Five Year Perspective on Software Engineering Graduate Programs at George Mason University. [Citation Graph (0, 0)][DBLP]
    CSEE, 1994, pp:473-488 [Conf]
  13. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu
    The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:148-156 [Conf]
  14. Ravi S. Sandhu, Paul Ammann
    One-Representative Safety Analysis in the Non-Monotonic Transform Model. [Citation Graph (0, 0)][DBLP]
    CSFW, 1994, pp:139-149 [Conf]
  15. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:163-178 [Conf]
  16. Paul Ammann, Paul E. Black
    A Specification-Based Coverage Metric to Evaluate Test Sets. [Citation Graph (0, 0)][DBLP]
    HASE, 1999, pp:239-248 [Conf]
  17. Peng Liu, Paul Ammann, Sushil Jajodia
    Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1999, pp:414-423 [Conf]
  18. Aynur Abdurazik, Paul Ammann, Wei Ding, A. Jefferson Offutt
    Evaluation of Three Specification-Based Testing Criteria. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2000, pp:179-187 [Conf]
  19. Paul Ammann, Wei Ding, Daling Xu
    Using a Model Checker to Test Safety Properties. [Citation Graph (0, 0)][DBLP]
    ICECCS, 2001, pp:212-221 [Conf]
  20. Paul Ammann, Paul E. Black, William Majurski
    Using Model Checking to Generate Tests from Specifications. [Citation Graph (0, 0)][DBLP]
    ICFEM, 1998, pp:46-0 [Conf]
  21. John C. Knight, Paul Ammann
    An Experimental Evaluation of Simple Methods for Seeding Program Errors. [Citation Graph (0, 0)][DBLP]
    ICSE, 1985, pp:337-342 [Conf]
  22. John C. Knight, Paul Ammann
    Issues Influencing the Use of N-Version Programming. [Citation Graph (0, 0)][DBLP]
    IFIP Congress, 1989, pp:217-222 [Conf]
  23. Jing Guan, Jeff Offutt, Paul Ammann
    An industrial case study of structural testing applied to safety-critical embedded software. [Citation Graph (0, 0)][DBLP]
    ISESE, 2006, pp:272-277 [Conf]
  24. Paul Ammann, A. Jefferson Offutt, Hong Huang
    Coverage Criteria for Logical Expressions. [Citation Graph (0, 0)][DBLP]
    ISSRE, 2003, pp:99-107 [Conf]
  25. Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey
    A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:169-0 [Conf]
  26. Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
    Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf]
  27. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf]
  28. Paul Ammann, Ravi S. Sandhu
    Safety Analysis for the Extended Schematic Protection Model. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:87-97 [Conf]
  29. Ronald W. Ritchey, Paul Ammann
    Using Model Checking to Analyze Network Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:156-165 [Conf]
  30. Paul Ammann, Sushil Jajodia
    The Integrity Challenge. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:59-70 [Conf]
  31. Paul Ammann, Dahlard L. Lukes, John C. Knight
    Applying Data Redundancy to Differential Equation Solvers. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1997, v:4, n:, pp:65-77 [Journal]
  32. Sushil Jajodia, Catherine D. McCollum, Paul Ammann
    Trusted Recovery. [Citation Graph (0, 2)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal]
  33. Sushil Jajodia, Paul Ammann, Catherine D. McCollum
    Surviving Information Warfare Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:4, pp:57-63 [Journal]
  34. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal]
  35. Peng Liu, Paul Ammann, Sushil Jajodia
    Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal]
  36. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal]
  37. Paul Ammann, Frank Jaeckle, Sushil Jajodia
    Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:2/3, pp:87-114 [Journal]
  38. Paul Ammann, Richard J. Lipton, Ravi S. Sandhu
    The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1996, v:4, n:2/3, pp:149-166 [Journal]
  39. Paul Ammann, Ravi S. Sandhu
    The Extended Schematic Protection Model [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1992, v:1, n:3-4, pp:335-384 [Journal]
  40. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal]
  41. A. Jefferson Offutt, Shaoying Liu, Aynur Abdurazik, Paul Ammann
    Generating test data from state-based specifications. [Citation Graph (0, 0)][DBLP]
    Softw. Test., Verif. Reliab., 2003, v:13, n:1, pp:25-53 [Journal]
  42. Paul Ammann, John C. Knight
    Data Diversity: An Approach to Software Fault Tolerance. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1988, v:37, n:4, pp:418-425 [Journal]
  43. Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia
    The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal]
  44. Paul Ammann, Sushil Jajodia, Peng Liu
    Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal]
  45. Paul Ammann, Sushil Jajodia, Padmaja Mavuluri
    On-The-Fly Reading of Entire Databases. [Citation Graph (0, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:834-838 [Journal]
  46. Paul Ammann, Sushil Jajodia, Phyllis G. Frankl
    Globally Consistent Event Ordering in One-Directional Distributed Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:6, pp:665-670 [Journal]
  47. Paul Ammann, Susan S. Brilliant, John C. Knight
    The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1994, v:20, n:2, pp:142-148 [Journal]
  48. Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann
    Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal]

  49. A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP]


  50. An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP]


  51. Reachability and Propagation for LTL Requirements Testing. [Citation Graph (, )][DBLP]


  52. Relating counterexamples to test cases in CTL model checking specifications. [Citation Graph (, )][DBLP]


  53. Coverage Criteria for State Based Specifications. [Citation Graph (, )][DBLP]


  54. A framework for establishing, assessing, and managing trust in inter-organizational relationships. [Citation Graph (, )][DBLP]


  55. BPEL orchestration of secure webmail. [Citation Graph (, )][DBLP]


  56. Policy-based dissemination of partial web-ontologies. [Citation Graph (, )][DBLP]


  57. Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection. [Citation Graph (, )][DBLP]


  58. Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing. [Citation Graph (, )][DBLP]


Search in 0.295secs, Finished in 0.299secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002