|
Search the dblp DataBase
Saket Kaushik:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paul Ammann, Duminda Wijesekera, Saket Kaushik
Scalable, graph-based network vulnerability analysis. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2002, pp:217-224 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Email feedback: a policy-based approach to overcoming false positives. [Citation Graph (0, 0)][DBLP] FMSE, 2005, pp:73-82 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:163-178 [Conf]
- Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey
A Policy Driven Approach to Email Services. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:169-0 [Conf]
- Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera
XACML Policies for Exclusive Resource Usage. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:275-290 [Conf]
Securing Workflows with XACML, RDF and BPEL. [Citation Graph (, )][DBLP]
An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP]
RDF Collections. [Citation Graph (, )][DBLP]
BPEL orchestration of secure webmail. [Citation Graph (, )][DBLP]
Evaluating distributed xacml policies. [Citation Graph (, )][DBLP]
Policy-based dissemination of partial web-ontologies. [Citation Graph (, )][DBLP]
Search in 0.001secs, Finished in 0.002secs
|