The SCEAS System
Navigation Menu

Search the dblp DataBase


Adam J. Lee: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik
    Cluster security with NVisionCC: process monitoring by leveraging emergent properties. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:121-132 [Conf]
  2. Adam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik
    Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:146-151 [Conf]
  3. Adam J. Lee, Jodie P. Boyer, Lars Olson, Carl A. Gunter
    Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:45-54 [Conf]
  4. Adam J. Lee, Marianne Winslett
    Safety and consistency in policy-based authorization systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:124-133 [Conf]
  5. Adam J. Lee, Marianne Winslett
    Virtual Fingerprinting as a Foundation for Reputation in Open Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:236-251 [Conf]
  6. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:458-462 [Conf]
  7. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:39-48 [Conf]
  8. Kiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee
    NVisionIP: an interactive network flow visualization tool for security. [Citation Graph (0, 0)][DBLP]
    SMC (3), 2004, pp:2675-2680 [Conf]
  9. Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell
    Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. [Citation Graph (0, 0)][DBLP]
    SPC, 2005, pp:134-150 [Conf]
  10. Kiran Lakkaraju, William Yurcik, Adam J. Lee
    NVisionIP: netflow visualizations of system state for security situational awareness. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:65-72 [Conf]
  11. Mehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson
    Toward an On-Demand Restricted Delegation Mechanism for Grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2006, pp:152-159 [Conf]
  12. Adam J. Lee, Kazuhiro Minami, Marianne Winslett
    Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:101-110 [Conf]

  13. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. [Citation Graph (, )][DBLP]

  14. Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP]

  15. Effective trust management through a hybrid logical and relational approach. [Citation Graph (, )][DBLP]

  16. Oblivious enforcement of hidden information release policies. [Citation Graph (, )][DBLP]

  17. Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. [Citation Graph (, )][DBLP]

  18. Solving the access-control puzzle: finding the pieces and putting them together. [Citation Graph (, )][DBLP]

  19. Towards a dynamic and composable model of trust. [Citation Graph (, )][DBLP]

  20. Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP]

  21. A privacy-preserving interdomain audit framework. [Citation Graph (, )][DBLP]

  22. Toward a threat model for storage systems. [Citation Graph (, )][DBLP]

  23. Defining a Comprehensive Threat Model for High Performance Computational Clusters [Citation Graph (, )][DBLP]

Search in 0.004secs, Finished in 0.005secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002