The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ira S. Moskowitz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Myong H. Kang, Ira S. Moskowitz
    A Pump for Rapid, Reliable, Secure Communication. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:119-129 [Conf]
  2. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    An Architecture for Multilevel Secure Interoperability. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:194-204 [Conf]
  3. Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck
    The Pump: A Decade of Covert Fun. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:352-360 [Conf]
  4. Myong H. Kang, Ira S. Moskowitz, Bruce E. Montrose, James J. Parsonese
    A Case Study Of Two Nrl Pump Prototypes. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:32-43 [Conf]
  5. Oliver Costich, Ira S. Moskowitz
    Analysis of a Storage Channel in the Two-Phase Commit Protocol. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:201-208 [Conf]
  6. Ira S. Moskowitz
    Quotient States and Probabilistic Channels. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:74-83 [Conf]
  7. Ira S. Moskowitz, Oliver Costich
    A classical Automata Approach to Noninterference Type Problems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:2-8 [Conf]
  8. LiWu Chang, Ira S. Moskowitz
    An Integrated Framework for Database Privacy Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:161-172 [Conf]
  9. LiWu Chang, Ira S. Moskowitz
    A Study of Inference Problems in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:191-204 [Conf]
  10. LiWu Chang, Ira S. Moskowitz
    Bayesian Methods to the Database Inference Problem. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:237-251 [Conf]
  11. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz
    A Strategy for an MLS Workflow Management System. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:161-174 [Conf]
  12. Ira S. Moskowitz, Myong H. Kang
    The Modulated-Input Modulated-Output Model. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:61-75 [Conf]
  13. Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
    Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:135-149 [Conf]
  14. Myong H. Kang, Judith N. Froscher, Ira S. Moskowitz
    A framework for MLS interoperability. [Citation Graph (0, 0)][DBLP]
    HASE, 1996, pp:198-205 [Conf]
  15. LiWu Chang, Ira S. Moskowitz
    Critical analysis of security in voice hiding techniques. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:203-216 [Conf]
  16. James Tracy, LiWu Chang, Ira S. Moskowitz
    An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:413-0 [Conf]
  17. Ira S. Moskowitz, LiWu Chang
    An Entropy-Based Framework for Database Inference. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:405-418 [Conf]
  18. Catherine Meadows, Ira S. Moskowitz
    Covert Channels - A Context-Based View. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1996, pp:73-93 [Conf]
  19. Richard E. Newman, Ira S. Moskowitz, LiWu Chang, Murali M. Brahmadesam
    A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:258-277 [Conf]
  20. LiWu Chang, Ira S. Moskowitz
    Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:82-89 [Conf]
  21. Richard E. Newman, Ira S. Moskowitz, Paul F. Syverson, Andrei Serjantov
    Metrics for Trafic Analysis Prevention. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2003, pp:48-65 [Conf]
  22. Richard E. Newman, Vipan R. Nalla, Ira S. Moskowitz
    Anonymity and Covert Channels in Simple Timed Mix-Firewalls. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2004, pp:1-16 [Conf]
  23. Ira S. Moskowitz
    Variable Noise Effects Upon a Simple Timing Channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:362-372 [Conf]
  24. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-channel. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:2-11 [Conf]
  25. Ira S. Moskowitz, Richard E. Newman, Daniel P. Crepeau, Allen R. Miller
    Covert channels and anonymizing networks. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:79-88 [Conf]
  26. Ira S. Moskowitz, Richard E. Newman
    Timing channels, anonymity, mixes, and spikes. [Citation Graph (0, 0)][DBLP]
    ACST, 2006, pp:252-256 [Conf]
  27. Myong H. Kang, Andrew P. Moore, Ira S. Moskowitz
    Design and Assurance Strategy for the NRL Pump. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:4, pp:56-64 [Journal]
  28. Keye Martin, Ira S. Moskowitz, Gerard Allwein
    Algebraic Information Theory For Binary Channels. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:158, n:, pp:289-306 [Journal]
  29. James Tracy, LiWu Chang, Ira S. Moskowitz
    An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 2003, v:12, n:3, pp:297-313 [Journal]
  30. Ira S. Moskowitz, Steven J. Greenwald, Myong H. Kang
    An Analysis of the Timed Z-Channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1998, v:44, n:7, pp:3162-3168 [Journal]
  31. Ira S. Moskowitz, Allen R. Miller
    The channel capacity of a certain noisy timing channel. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1992, v:38, n:4, pp:1339-0 [Journal]
  32. Myong H. Kang, Ira S. Moskowitz, Daniel C. Lee
    A Network Pump. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1996, v:22, n:5, pp:329-338 [Journal]
  33. Keye Martin, Ira S. Moskowitz
    Noisy Timing Channels with Binary Inputs and Outputs. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2006, pp:124-144 [Conf]
  34. Farid Ahmed, Ira S. Moskowitz
    Composite signature based watermarking for fingerprint authentication. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2005, pp:137-142 [Conf]

Search in 0.068secs, Finished in 0.071secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002