The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Duminda Wijesekera: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava
    Pattern Directed Mining of Sequence Data. [Citation Graph (1, 0)][DBLP]
    KDD, 1998, pp:51-57 [Conf]
  2. Khaled Alghathbar, Duminda Wijesekera
    authUML: a three-phased framework to analyze access control specifications in use cases. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:77-86 [Conf]
  3. Paul Ammann, Duminda Wijesekera, Saket Kaushik
    Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf]
  4. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP]
    FMSE, 2005, pp:73-82 [Conf]
  5. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    A logic-based framework for attribute based access control. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:45-55 [Conf]
  6. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf]
  7. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf]
  8. Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti
    Experimental Evaluation of PFS Continuous Media File System. [Citation Graph (0, 0)][DBLP]
    CIKM, 1997, pp:246-253 [Conf]
  9. James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera
    Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:621-626 [Conf]
  10. Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang
    Constraints, Inference Channels and Secure Databases. [Citation Graph (0, 0)][DBLP]
    CP, 2000, pp:98-113 [Conf]
  11. Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera
    Revocations-A Classification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:44-58 [Conf]
  12. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    FlexFlow: A Flexible Flow Control Policy Specification Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:358-371 [Conf]
  13. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
    Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:163-178 [Conf]
  14. Sushil Jajodia, Duminda Wijesekera
    Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:3-15 [Conf]
  15. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:117-131 [Conf]
  16. Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
    Subject Switching Algorithms for Access Control in Federated Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:61-74 [Conf]
  17. Inja Youn, Duminda Wijesekera
    Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:205-218 [Conf]
  18. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:1-14 [Conf]
  19. Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia
    VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:393-402 [Conf]
  20. Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
    Authentication and Integrity in Telecommunication Signaling Network. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:163-170 [Conf]
  21. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:1-16 [Conf]
  22. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
    Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:100-115 [Conf]
  23. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Cardinality-Based Inference Control in Sum-Only Data Cubes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:55-71 [Conf]
  24. Sushil Jajodia, Duminda Wijesekera
    A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:336-345 [Conf]
  25. Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia
    Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:379-384 [Conf]
  26. Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote
    A multimedia programming toolkit/environment. [Citation Graph (0, 0)][DBLP]
    ICPADS, 1997, pp:446-452 [Conf]
  27. Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael
    Making Decisions about Legal Responses to Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    IFIP Int. Conf. Digital Forensics, 2005, pp:283-294 [Conf]
  28. Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
    MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  29. Duminda Wijesekera, Daniel Barbará
    Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. [Citation Graph (0, 0)][DBLP]
    MDM/KDD, 2000, pp:98-103 [Conf]
  30. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Multimedia Access Control Using RDF Metadata. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:718-731 [Conf]
  31. Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey
    A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:169-0 [Conf]
  32. Khaled Alghathbar, Duminda Wijesekera
    Analyzing Information Flow Control Policies in Requirements Engineering. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:193-196 [Conf]
  33. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Obligation Monitoring in Policy Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:2-12 [Conf]
  34. Duminda Wijesekera, James Bret Michael, Anil Nerode
    An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. [Citation Graph (0, 0)][DBLP]
    POLICY, 2005, pp:115-118 [Conf]
  35. Mohamed Sharif, Duminda Wijesekera
    Providing Voice Privacy Over Public Switched Telephone Networks. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:25-36 [Conf]
  36. Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera
    Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:267-277 [Conf]
  37. Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas
    Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:229-238 [Conf]
  38. Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera
    Honeynet Clusters as an early Warning System for Production Networks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:77-83 [Conf]
  39. Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael
    An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2006, pp:232-245 [Conf]
  40. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
    Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf]
  41. Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode
    Tableaux for Functional Dependencies and Independencies. [Citation Graph (0, 0)][DBLP]
    TABLEAUX, 1997, pp:358-372 [Conf]
  42. Khaled Alghathbar, Duminda Wijesekera
    Consistent and Complete Access Control Policies in Use Cases. [Citation Graph (0, 0)][DBLP]
    UML, 2003, pp:373-387 [Conf]
  43. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Management and Security Applications. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:502-513 [Conf]
  44. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
    Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:10-19 [Conf]
  45. Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera
    Securing UML Information Flow Using FlowUML. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  46. Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera
    Test and evaluation of distributed information system networks. [Citation Graph (0, 0)][DBLP]
    Ann. Software Eng., 1999, v:8, n:, pp:289-311 [Journal]
  47. Duminda Wijesekera
    Constructive Modal Logics I. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 1990, v:50, n:3, pp:271-301 [Journal]
  48. Duminda Wijesekera, Anil Nerode
    Tableaux for constructive concurrent dynamic logic. [Citation Graph (0, 0)][DBLP]
    Ann. Pure Appl. Logic, 2005, v:135, n:1-3, pp:1-72 [Journal]
  49. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Specifying multimedia access control using RDF. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
  50. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Cardinality-based inference control in data cubes. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:655-692 [Journal]
  51. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Rule Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
  52. Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera
    Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2006, v:14, n:4, pp:599-602 [Journal]
  53. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    An authorization model for multimedia digital libraries. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:139-155 [Journal]
  54. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Reasoning with advanced policy rules and its application to access control. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:156-170 [Journal]
  55. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Enforcing Semantics-Aware Security in Multimedia Surveillance. [Citation Graph (0, 0)][DBLP]
    J. Data Semantics, 2005, v:2, n:, pp:199-221 [Journal]
  56. Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti
    Experimental Evaluation of Loss Perception in Continuous Media. [Citation Graph (0, 0)][DBLP]
    Multimedia Syst., 1999, v:7, n:6, pp:486-499 [Journal]
  57. Duminda Wijesekera, Jaideep Srivastava
    Quality of Service (QoS) Metrics for Continuous Media. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 1996, v:3, n:2, pp:127-166 [Journal]
  58. Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode
    Normal forms and syntactic completeness proofs for functional independencies. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2001, v:266, n:1-2, pp:365-405 [Journal]
  59. Duminda Wijesekera, Sushil Jajodia
    A propositional policy algebra for access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:286-325 [Journal]
  60. Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström
    Removing permissions in the flexible authorization framework. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2003, v:28, n:3, pp:209-229 [Journal]
  61. Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
    XACML Policies for Exclusive Resource Usage. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:275-290 [Conf]
  62. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    SECRETS: A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:278-296 [Conf]
  63. Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera
    THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:307-321 [Conf]
  64. Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas
    An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:181-192 [Conf]

  65. Extracting Kerberos passwords through RC4-HMAC encryption type analysis. [Citation Graph (, )][DBLP]


  66. Securing Workflows with XACML, RDF and BPEL. [Citation Graph (, )][DBLP]


  67. An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP]


  68. Executable misuse cases for modeling security concerns. [Citation Graph (, )][DBLP]


  69. Forensic Web Services. [Citation Graph (, )][DBLP]


  70. A Framework for Investigating Railroad Accidents. [Citation Graph (, )][DBLP]


  71. Protection and Recovery of Railroad Event Recorder Data. [Citation Graph (, )][DBLP]


  72. Use-Misuse Case Driven Analysis of Positive Train Control. [Citation Graph (, )][DBLP]


  73. Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP]


  74. Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP]


  75. Towards Session-Aware RBAC Administration and Enforcement with XACML. [Citation Graph (, )][DBLP]


  76. Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP]


  77. SQLProb: a proxy-based architecture towards preventing SQL injection attacks. [Citation Graph (, )][DBLP]


  78. Comparison of IPsec to TLS and SRTP for Securing VoIP. [Citation Graph (, )][DBLP]


  79. RDF Collections. [Citation Graph (, )][DBLP]


  80. Online detection of web choreography misuses. [Citation Graph (, )][DBLP]


  81. PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. [Citation Graph (, )][DBLP]


  82. Communications Based Positive Train Control Systems Architecture in the USA. [Citation Graph (, )][DBLP]


  83. Relating counterexamples to test cases in CTL model checking specifications. [Citation Graph (, )][DBLP]


  84. Regulating access to SMIL formatted pay-per-view movies. [Citation Graph (, )][DBLP]


  85. BPEL orchestration of secure webmail. [Citation Graph (, )][DBLP]


  86. Evaluating distributed xacml policies. [Citation Graph (, )][DBLP]


  87. Policy-based dissemination of partial web-ontologies. [Citation Graph (, )][DBLP]


  88. Creating non-decomposable stream bundles in multimedia web services using uSMIL. [Citation Graph (, )][DBLP]


  89. A role-based XACML administration and delegation profile and its enforcement architecture. [Citation Graph (, )][DBLP]


  90. Securing Positive Train Control Systems. [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.045secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002