|
Search the dblp DataBase
Duminda Wijesekera:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava
Pattern Directed Mining of Sequence Data. [Citation Graph (1, 0)][DBLP] KDD, 1998, pp:51-57 [Conf]
- Khaled Alghathbar, Duminda Wijesekera
authUML: a three-phased framework to analyze access control specifications in use cases. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:77-86 [Conf]
- Paul Ammann, Duminda Wijesekera, Saket Kaushik
Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:73-82 [Conf]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
A logic-based framework for attribute based access control. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:45-55 [Conf]
- Duminda Wijesekera, Sushil Jajodia
Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf]
- Duminda Wijesekera, Sushil Jajodia
Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf]
- Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti
Experimental Evaluation of PFS Continuous Media File System. [Citation Graph (0, 0)][DBLP] CIKM, 1997, pp:246-253 [Conf]
- James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera
Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. [Citation Graph (0, 0)][DBLP] COMPSAC, 2003, pp:621-626 [Conf]
- Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang
Constraints, Inference Channels and Secure Databases. [Citation Graph (0, 0)][DBLP] CP, 2000, pp:98-113 [Conf]
- Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera
Revocations-A Classification. [Citation Graph (0, 0)][DBLP] CSFW, 2001, pp:44-58 [Conf]
- Shiping Chen, Duminda Wijesekera, Sushil Jajodia
FlexFlow: A Flexible Flow Control Policy Specification Framework. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:358-371 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:163-178 [Conf]
- Sushil Jajodia, Duminda Wijesekera
Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:3-15 [Conf]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:117-131 [Conf]
- Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
Subject Switching Algorithms for Access Control in Federated Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:61-74 [Conf]
- Inja Youn, Duminda Wijesekera
Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:205-218 [Conf]
- Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:1-14 [Conf]
- Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia
VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:393-402 [Conf]
- Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
Authentication and Integrity in Telecommunication Signaling Network. [Citation Graph (0, 0)][DBLP] ECBS, 2005, pp:163-170 [Conf]
- Shiping Chen, Duminda Wijesekera, Sushil Jajodia
Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP] ESORICS, 2004, pp:1-16 [Conf]
- Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP] ESORICS, 2003, pp:100-115 [Conf]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
Cardinality-Based Inference Control in Sum-Only Data Cubes. [Citation Graph (0, 0)][DBLP] ESORICS, 2002, pp:55-71 [Conf]
- Sushil Jajodia, Duminda Wijesekera
A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:336-345 [Conf]
- Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia
Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:379-384 [Conf]
- Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote
A multimedia programming toolkit/environment. [Citation Graph (0, 0)][DBLP] ICPADS, 1997, pp:446-452 [Conf]
- Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael
Making Decisions about Legal Responses to Cyber Attacks. [Citation Graph (0, 0)][DBLP] IFIP Int. Conf. Digital Forensics, 2005, pp:283-294 [Conf]
- Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. [Citation Graph (0, 0)][DBLP] IPDPS, 2005, pp:- [Conf]
- Duminda Wijesekera, Daniel Barbará
Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. [Citation Graph (0, 0)][DBLP] MDM/KDD, 2000, pp:98-103 [Conf]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
Multimedia Access Control Using RDF Metadata. [Citation Graph (0, 0)][DBLP] OTM Workshops, 2003, pp:718-731 [Conf]
- Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey
A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:169-0 [Conf]
- Khaled Alghathbar, Duminda Wijesekera
Analyzing Information Flow Control Policies in Requirements Engineering. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:193-196 [Conf]
- Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
Obligation Monitoring in Policy Management. [Citation Graph (0, 0)][DBLP] POLICY, 2002, pp:2-12 [Conf]
- Duminda Wijesekera, James Bret Michael, Anil Nerode
An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. [Citation Graph (0, 0)][DBLP] POLICY, 2005, pp:115-118 [Conf]
- Mohamed Sharif, Duminda Wijesekera
Providing Voice Privacy Over Public Switched Telephone Networks. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:25-36 [Conf]
- Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera
Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:267-277 [Conf]
- Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas
Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:229-238 [Conf]
- Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera
Honeynet Clusters as an early Warning System for Production Networks. [Citation Graph (0, 0)][DBLP] WOSIS, 2005, pp:77-83 [Conf]
- Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael
An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. [Citation Graph (0, 0)][DBLP] WOSIS, 2006, pp:232-245 [Conf]
- Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf]
- Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode
Tableaux for Functional Dependencies and Independencies. [Citation Graph (0, 0)][DBLP] TABLEAUX, 1997, pp:358-372 [Conf]
- Khaled Alghathbar, Duminda Wijesekera
Consistent and Complete Access Control Policies in Use Cases. [Citation Graph (0, 0)][DBLP] UML, 2003, pp:373-387 [Conf]
- Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
Provisions and Obligations in Policy Management and Security Applications. [Citation Graph (0, 0)][DBLP] VLDB, 2002, pp:502-513 [Conf]
- Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP] WPES, 2005, pp:10-19 [Conf]
- Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera
Securing UML Information Flow Using FlowUML. [Citation Graph (0, 0)][DBLP] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
- Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera
Test and evaluation of distributed information system networks. [Citation Graph (0, 0)][DBLP] Ann. Software Eng., 1999, v:8, n:, pp:289-311 [Journal]
- Duminda Wijesekera
Constructive Modal Logics I. [Citation Graph (0, 0)][DBLP] Ann. Pure Appl. Logic, 1990, v:50, n:3, pp:271-301 [Journal]
- Duminda Wijesekera, Anil Nerode
Tableaux for constructive concurrent dynamic logic. [Citation Graph (0, 0)][DBLP] Ann. Pure Appl. Logic, 2005, v:135, n:1-3, pp:1-72 [Journal]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
Specifying multimedia access control using RDF. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
Cardinality-based inference control in data cubes. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:5, pp:655-692 [Journal]
- Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
Provisions and Obligations in Policy Rule Management. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
- Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera
Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP] J. Network Syst. Manage., 2006, v:14, n:4, pp:599-602 [Journal]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
An authorization model for multimedia digital libraries. [Citation Graph (0, 0)][DBLP] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:139-155 [Journal]
- Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
Reasoning with advanced policy rules and its application to access control. [Citation Graph (0, 0)][DBLP] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:156-170 [Journal]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
Enforcing Semantics-Aware Security in Multimedia Surveillance. [Citation Graph (0, 0)][DBLP] J. Data Semantics, 2005, v:2, n:, pp:199-221 [Journal]
- Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti
Experimental Evaluation of Loss Perception in Continuous Media. [Citation Graph (0, 0)][DBLP] Multimedia Syst., 1999, v:7, n:6, pp:486-499 [Journal]
- Duminda Wijesekera, Jaideep Srivastava
Quality of Service (QoS) Metrics for Continuous Media. [Citation Graph (0, 0)][DBLP] Multimedia Tools Appl., 1996, v:3, n:2, pp:127-166 [Journal]
- Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode
Normal forms and syntactic completeness proofs for functional independencies. [Citation Graph (0, 0)][DBLP] Theor. Comput. Sci., 2001, v:266, n:1-2, pp:365-405 [Journal]
- Duminda Wijesekera, Sushil Jajodia
A propositional policy algebra for access control. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:286-325 [Journal]
- Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström
Removing permissions in the flexible authorization framework. [Citation Graph (0, 0)][DBLP] ACM Trans. Database Syst., 2003, v:28, n:3, pp:209-229 [Journal]
- Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
XACML Policies for Exclusive Resource Usage. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:275-290 [Conf]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
SECRETS: A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP] ISI, 2004, pp:278-296 [Conf]
- Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera
THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP] ISI, 2004, pp:307-321 [Conf]
- Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas
An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP] Secure Data Management, 2007, pp:181-192 [Conf]
Extracting Kerberos passwords through RC4-HMAC encryption type analysis. [Citation Graph (, )][DBLP]
Securing Workflows with XACML, RDF and BPEL. [Citation Graph (, )][DBLP]
An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP]
Executable misuse cases for modeling security concerns. [Citation Graph (, )][DBLP]
Forensic Web Services. [Citation Graph (, )][DBLP]
A Framework for Investigating Railroad Accidents. [Citation Graph (, )][DBLP]
Protection and Recovery of Railroad Event Recorder Data. [Citation Graph (, )][DBLP]
Use-Misuse Case Driven Analysis of Positive Train Control. [Citation Graph (, )][DBLP]
Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP]
Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP]
Towards Session-Aware RBAC Administration and Enforcement with XACML. [Citation Graph (, )][DBLP]
Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP]
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. [Citation Graph (, )][DBLP]
Comparison of IPsec to TLS and SRTP for Securing VoIP. [Citation Graph (, )][DBLP]
RDF Collections. [Citation Graph (, )][DBLP]
Online detection of web choreography misuses. [Citation Graph (, )][DBLP]
PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. [Citation Graph (, )][DBLP]
Communications Based Positive Train Control Systems Architecture in the USA. [Citation Graph (, )][DBLP]
Relating counterexamples to test cases in CTL model checking specifications. [Citation Graph (, )][DBLP]
Regulating access to SMIL formatted pay-per-view movies. [Citation Graph (, )][DBLP]
BPEL orchestration of secure webmail. [Citation Graph (, )][DBLP]
Evaluating distributed xacml policies. [Citation Graph (, )][DBLP]
Policy-based dissemination of partial web-ontologies. [Citation Graph (, )][DBLP]
Creating non-decomposable stream bundles in multimedia web services using uSMIL. [Citation Graph (, )][DBLP]
A role-based XACML administration and delegation profile and its enforcement architecture. [Citation Graph (, )][DBLP]
Securing Positive Train Control Systems. [Citation Graph (, )][DBLP]
Search in 0.038secs, Finished in 0.045secs
|