The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rasool Jalili: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Conflict Detection and Resolution in Context-Aware Authorization. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:505-511 [Conf]
  2. Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
    An Access Control Framework for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP]
    PSC, 2006, pp:97-103 [Conf]
  3. Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
    Improved User Identity Confidentiality for UMTS Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ECUMN, 2007, pp:401-409 [Conf]
  4. Rasool Jalili, Mohsen Rezvani
    Specification and Verification of Security Policies in Firewalls. [Citation Graph (0, 0)][DBLP]
    EurAsia-ICT, 2002, pp:154-163 [Conf]
  5. Rasool Jalili, Frans A. Henskens
    Using directed graphs to describe entity dependency in stable distributed persistent stores. [Citation Graph (0, 0)][DBLP]
    HICSS (2), 1995, pp:665-674 [Conf]
  6. Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
    Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:256-268 [Conf]
  7. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Context-Aware Provisional Access Control. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:132-146 [Conf]
  8. Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani
    Using Description Logics for Network Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:78- [Conf]
  9. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
    Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:192-203 [Conf]
  10. Frans A. Henskens, D. M. Koch, Rasool Jalili, John Rosenberg
    Hardware Support for Stability in a Persistent Architecture. [Citation Graph (0, 0)][DBLP]
    POS, 1994, pp:387-399 [Conf]
  11. Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
    Security Enhancement for a Low Computation Cost User Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:5-8 [Conf]
  12. Morteza Amini, Rasool Jalili, Hamid Reza Shahriari
    RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:459-468 [Journal]
  13. Mahdi Niamanesh, Nafiseh Fekrazad Nobakht, Rasool Jalili, Faranak Heydarian Dehkordi
    On Validity Assurance of Dynamic Reconfiguration for Component-based Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2006, v:159, n:, pp:227-239 [Journal]
  14. Hassan Takabi, Morteza Amini, Rasool Jalili
    Trust-Based User-Role Assignment in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:807-814 [Conf]
  15. Mahdi Niamanesh, Rasool Jalili
    A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2007, pp:609-612 [Conf]
  16. Mahdi Niamanesh, Rasool Jalili
    Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:49-64 [Conf]
  17. Mahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefzadeh Rahaghi, Rasool Jalili
    Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:396-403 [Conf]
  18. Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili
    Vulnerability Analysis in VGBPS Using Prolog. [Citation Graph (0, 0)][DBLP]
    FSEN, 2007, pp:404-411 [Conf]

  19. An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]


  20. PTO: A Trust Ontology for Pervasive Environments. [Citation Graph (, )][DBLP]


  21. Handling Context in a Semantic-Based Access Control Framework. [Citation Graph (, )][DBLP]


  22. Self-reconfiguration in Highly Available Pervasive Computing Systems. [Citation Graph (, )][DBLP]


  23. A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  24. A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. [Citation Graph (, )][DBLP]


  25. Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. [Citation Graph (, )][DBLP]


  26. A Logic for Multi-domain Authorization Considering Administrators. [Citation Graph (, )][DBLP]


  27. A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. [Citation Graph (, )][DBLP]


  28. A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. [Citation Graph (, )][DBLP]


  29. Trust Inference in Web-Based Social Networks Using Resistive Networks. [Citation Graph (, )][DBLP]


  30. Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  31. Enhancing Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  32. AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. [Citation Graph (, )][DBLP]


  33. A semantic-based access control mechanism using semantic technologies. [Citation Graph (, )][DBLP]


  34. FLMAP: A fast lightweight mutual authentication protocol for RFID systems. [Citation Graph (, )][DBLP]


  35. A Semantic aware Access Control model with real time constraints on history of accesses. [Citation Graph (, )][DBLP]


  36. Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.306secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002