Search the dblp DataBase
Csilla Farkas :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Zsolt Palotai , Csilla Farkas , András Lörincz Selection in Scale-Free Small World. [Citation Graph (0, 0)][DBLP ] CEEMAS, 2005, pp:579-582 [Conf ] Alexander Brodsky , Csilla Farkas , Duminda Wijesekera , Xiaoyang Sean Wang Constraints, Inference Channels and Secure Databases. [Citation Graph (0, 0)][DBLP ] CP, 2000, pp:98-113 [Conf ] Csilla Farkas , Andrei Stoica Correlated Data Inference. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:119-132 [Conf ] Csilla Farkas , Tyrone S. Toland , Caroline M. Eastman The Inference Problem and Updates in Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:181-194 [Conf ] Andrei Stoica , Csilla Farkas Secure XML Views. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:133-146 [Conf ] Inja Youn , Csilla Farkas , Bhavani M. Thuraisingham Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:99-113 [Conf ] Naren Kodali , Csilla Farkas , Duminda Wijesekera Multimedia Access Control Using RDF Metadata. [Citation Graph (0, 0)][DBLP ] OTM Workshops, 2003, pp:718-731 [Conf ] Amit Jain , Csilla Farkas Secure resource description framework: an access control model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:121-129 [Conf ] Tyrone S. Toland , Csilla Farkas , Caroline M. Eastman Dynamic Disclosure Monitor (D 2 Mon ): An Improved Query Processing Solution. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:124-142 [Conf ] Khaled Alghathbar , Duminda Wijesekera , Csilla Farkas Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:229-238 [Conf ] Vaibhav Gowadia , Csilla Farkas Tree Automata for Schema-level Filtering of XML Associations . [Citation Graph (0, 0)][DBLP ] WOSIS, 2005, pp:136-145 [Conf ] Csilla Farkas , Gábor Ziegler , Attila Meretei , András Lörincz Anonymity and accountability in self-organizing electronic communities. [Citation Graph (0, 0)][DBLP ] WPES, 2002, pp:81-90 [Conf ] Khaled Alghathbar , Csilla Farkas , Duminda Wijesekera Securing UML Information Flow Using FlowUML. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal ] Vaibhav Gowadia , Csilla Farkas Tree Automata for Schema-Level Filtering of XML Associations. [Citation Graph (0, 0)][DBLP ] Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal ] Vaibhav Gowadia , Csilla Farkas , Marco Valtorta PAID: A Probabilistic Agent-Based Intrusion Detection system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 2005, v:24, n:7, pp:529-545 [Journal ] Naren Kodali , Csilla Farkas , Duminda Wijesekera Specifying multimedia access control using RDF. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal ] Gábor Ziegler , Csilla Farkas , András Lörincz A framework for anonymous but accountable self-organizing communities. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 2006, v:48, n:8, pp:726-744 [Journal ] Csilla Farkas , Michael N. Huhns Making Agents Secure on the Semantic Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2002, v:6, n:6, pp:76-79 [Journal ] Csilla Farkas , Alexander Brodsky , Sushil Jajodia Unauthorized inferences in semistructured databases. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:22, pp:3269-3299 [Journal ] Andrei Stoica , Csilla Farkas Ontology Guided XML Security Engine. [Citation Graph (0, 0)][DBLP ] J. Intell. Inf. Syst., 2004, v:23, n:3, pp:209-223 [Journal ] Naren Kodali , Csilla Farkas , Duminda Wijesekera An authorization model for multimedia digital libraries. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:139-155 [Journal ] Naren Kodali , Csilla Farkas , Duminda Wijesekera Enforcing Semantics-Aware Security in Multimedia Surveillance. [Citation Graph (0, 0)][DBLP ] J. Data Semantics, 2005, v:2, n:, pp:199-221 [Journal ] Csilla Farkas , Sushil Jajodia The Inference Problem: A Survey. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:6-11 [Journal ] Alexander Brodsky , Csilla Farkas , Sushil Jajodia Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:900-919 [Journal ] Naren Kodali , Csilla Farkas , Duminda Wijesekera SECRETS : A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:278-296 [Conf ] Csilla Farkas , Thomas C. Wingfield , James Bret Michael , Duminda Wijesekera THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP ] ISI, 2004, pp:307-321 [Conf ] Hasika Pamunuwa , Duminda Wijesekera , Csilla Farkas An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:181-192 [Conf ] Zsolt Palotai , Csilla Farkas , András Lörincz Selection in Scale-Free Small World [Citation Graph (0, 0)][DBLP ] CoRR, 2005, v:0, n:, pp:- [Journal ] P2F: A User-Centric Privacy Protection Framework. [Citation Graph (, )][DBLP ] An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP ] Security in Tci NMP Systems. [Citation Graph (, )][DBLP ] Securing Enterprise Applications: Service-Oriented Security (SOS). [Citation Graph (, )][DBLP ] PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. [Citation Graph (, )][DBLP ] RDF metadata for XML access control. [Citation Graph (, )][DBLP ] Engaging undergraduates in computer security research. [Citation Graph (, )][DBLP ] Creating non-decomposable stream bundles in multimedia web services using uSMIL. [Citation Graph (, )][DBLP ] The inference problem: Maintaining maximal availability in the presence of database updates. [Citation Graph (, )][DBLP ] Checking Security Policy Compliance [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.323secs