The SCEAS System
Navigation Menu

Search the dblp DataBase


Prasad Naldurg: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell
    Access Control for Active Spaces. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:343-352 [Conf]
  2. Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert
    NETRA: : seeing through access control. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:55-66 [Conf]
  3. Prasad Naldurg, Roy H. Campbell, M. Dennis Mickunas
    Developing Dynamic Security Policies. [Citation Graph (0, 0)][DBLP]
    DANCE, 2002, pp:204-215 [Conf]
  4. Prasad Naldurg, Koushik Sen, Prasanna Thati
    A Temporal Logic Based Framework for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    FORTE, 2004, pp:359-376 [Conf]
  5. Zhaoyu Liu, Roy H. Campbell, Sudha K. Varadarjan, Prasad Naldurg, Seung Yi, M. Dennis Mickunas
    Flexible Secure Multicasting in Active Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Group Communications and Computations, 2000, pp:0-0 [Conf]
  6. Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
    Towards Security and Privacy for Pervasive Computing. [Citation Graph (0, 0)][DBLP]
    ISSS, 2002, pp:1-15 [Conf]
  7. Seung Yi, Prasad Naldurg, Robin Kravets
    Security-aware ad hoc routing for wireless networks. [Citation Graph (0, 0)][DBLP]
    MobiHoc, 2001, pp:299-302 [Conf]
  8. Apu Kapadia, Prasad Naldurg, Roy H. Campbell
    Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:45-54 [Conf]
  9. Prasad Naldurg, Roy H. Campbell
    Dynamic access control: preserving safety and trust for network defense operations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:231-237 [Conf]
  10. Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell
    Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:134-150 [Conf]
  11. Raquel Hill, Jalal Al-Muhtadi, Roy H. Campbell, Apu Kapadia, Prasad Naldurg, Anand Ranganathan
    A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2004, v:5, n:9, pp:- [Journal]
  12. Apu Kapadia, Prasad Naldurg, Roy H. Campbell
    Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:141-150 [Conf]

  13. EON: modeling and analyzing dynamic access control systems with logic programs. [Citation Graph (, )][DBLP]

  14. Connections between Mining Frequent Itemsets and Learning Generative Models. [Citation Graph (, )][DBLP]

  15. Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. [Citation Graph (, )][DBLP]

  16. The Superdiversifier: Peephole Individualization for Software Protection. [Citation Graph (, )][DBLP]

  17. A type system for data-flow integrity on windows vista. [Citation Graph (, )][DBLP]

  18. A Type System for Data-Flow Integrity on Windows Vista [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002