Search the dblp DataBase
Adam J. Lee :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gregory A. Koenig , Xin Meng , Adam J. Lee , Michael Treaster , Nadir Kiyanclar , William Yurcik Cluster security with NVisionCC: process monitoring by leveraging emergent properties. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:121-132 [Conf ] Adam J. Lee , Gregory A. Koenig , Xin Meng , William Yurcik Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. [Citation Graph (0, 0)][DBLP ] CCGRID, 2005, pp:146-151 [Conf ] Adam J. Lee , Jodie P. Boyer , Lars Olson , Carl A. Gunter Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP ] FMSE, 2006, pp:45-54 [Conf ] Adam J. Lee , Marianne Winslett Safety and consistency in policy-based authorization systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:124-133 [Conf ] Adam J. Lee , Marianne Winslett Virtual Fingerprinting as a Foundation for Reputation in Open Systems. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:236-251 [Conf ] Adam J. Lee , Marianne Winslett , Jim Basney , Von Welch Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP ] iTrust, 2006, pp:458-462 [Conf ] Adam J. Lee , Marianne Winslett , Jim Basney , Von Welch Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:39-48 [Conf ] Kiran Lakkaraju , William Yurcik , Ratna Bearavolu , Adam J. Lee NVisionIP: an interactive network flow visualization tool for security. [Citation Graph (0, 0)][DBLP ] SMC (3), 2004, pp:2675-2680 [Conf ] Adam J. Lee , Jodie P. Boyer , Chris Drexelius , Prasad Naldurg , Raquel L. Hill , Roy H. Campbell Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. [Citation Graph (0, 0)][DBLP ] SPC, 2005, pp:134-150 [Conf ] Kiran Lakkaraju , William Yurcik , Adam J. Lee NVisionIP: netflow visualizations of system state for security situational awareness. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:65-72 [Conf ] Mehran Ahsant , Jim Basney , Olle Mulmo , Adam J. Lee , S. Lennart Johnsson Toward an On-Demand Restricted Delegation Mechanism for Grids. [Citation Graph (0, 0)][DBLP ] GRID, 2006, pp:152-159 [Conf ] Adam J. Lee , Kazuhiro Minami , Marianne Winslett Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:101-110 [Conf ] Towards an efficient and language-agnostic compliance checker for trust negotiation systems. [Citation Graph (, )][DBLP ] Confidentiality-preserving distributed proofs of conjunctive queries. [Citation Graph (, )][DBLP ] Effective trust management through a hybrid logical and relational approach. [Citation Graph (, )][DBLP ] Oblivious enforcement of hidden information release policies. [Citation Graph (, )][DBLP ] Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. [Citation Graph (, )][DBLP ] Solving the access-control puzzle: finding the pieces and putting them together. [Citation Graph (, )][DBLP ] Towards a dynamic and composable model of trust. [Citation Graph (, )][DBLP ] Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP ] A privacy-preserving interdomain audit framework. [Citation Graph (, )][DBLP ] Toward a threat model for storage systems. [Citation Graph (, )][DBLP ] Defining a Comprehensive Threat Model for High Performance Computational Clusters [Citation Graph (, )][DBLP ] Search in 0.004secs, Finished in 0.006secs