The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Csilla Farkas: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Zsolt Palotai, Csilla Farkas, András Lörincz
    Selection in Scale-Free Small World. [Citation Graph (0, 0)][DBLP]
    CEEMAS, 2005, pp:579-582 [Conf]
  2. Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang
    Constraints, Inference Channels and Secure Databases. [Citation Graph (0, 0)][DBLP]
    CP, 2000, pp:98-113 [Conf]
  3. Csilla Farkas, Andrei Stoica
    Correlated Data Inference. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:119-132 [Conf]
  4. Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman
    The Inference Problem and Updates in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:181-194 [Conf]
  5. Andrei Stoica, Csilla Farkas
    Secure XML Views. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:133-146 [Conf]
  6. Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham
    Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:99-113 [Conf]
  7. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Multimedia Access Control Using RDF Metadata. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:718-731 [Conf]
  8. Amit Jain, Csilla Farkas
    Secure resource description framework: an access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:121-129 [Conf]
  9. Tyrone S. Toland, Csilla Farkas, Caroline M. Eastman
    Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:124-142 [Conf]
  10. Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas
    Secure UML Information Flow using FlowUML. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:229-238 [Conf]
  11. Vaibhav Gowadia, Csilla Farkas
    Tree Automata for Schema-level Filtering of XML Associations . [Citation Graph (0, 0)][DBLP]
    WOSIS, 2005, pp:136-145 [Conf]
  12. Csilla Farkas, Gábor Ziegler, Attila Meretei, András Lörincz
    Anonymity and accountability in self-organizing electronic communities. [Citation Graph (0, 0)][DBLP]
    WPES, 2002, pp:81-90 [Conf]
  13. Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera
    Securing UML Information Flow Using FlowUML. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  14. Vaibhav Gowadia, Csilla Farkas
    Tree Automata for Schema-Level Filtering of XML Associations. [Citation Graph (0, 0)][DBLP]
    Journal of Research and Practice in Information Technology, 2006, v:38, n:1, pp:- [Journal]
  15. Vaibhav Gowadia, Csilla Farkas, Marco Valtorta
    PAID: A Probabilistic Agent-Based Intrusion Detection system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:7, pp:529-545 [Journal]
  16. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Specifying multimedia access control using RDF. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
  17. Gábor Ziegler, Csilla Farkas, András Lörincz
    A framework for anonymous but accountable self-organizing communities. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 2006, v:48, n:8, pp:726-744 [Journal]
  18. Csilla Farkas, Michael N. Huhns
    Making Agents Secure on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:6, pp:76-79 [Journal]
  19. Csilla Farkas, Alexander Brodsky, Sushil Jajodia
    Unauthorized inferences in semistructured databases. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:22, pp:3269-3299 [Journal]
  20. Andrei Stoica, Csilla Farkas
    Ontology Guided XML Security Engine. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2004, v:23, n:3, pp:209-223 [Journal]
  21. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    An authorization model for multimedia digital libraries. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:139-155 [Journal]
  22. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    Enforcing Semantics-Aware Security in Multimedia Surveillance. [Citation Graph (0, 0)][DBLP]
    J. Data Semantics, 2005, v:2, n:, pp:199-221 [Journal]
  23. Csilla Farkas, Sushil Jajodia
    The Inference Problem: A Survey. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:6-11 [Journal]
  24. Alexander Brodsky, Csilla Farkas, Sushil Jajodia
    Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:900-919 [Journal]
  25. Naren Kodali, Csilla Farkas, Duminda Wijesekera
    SECRETS: A Secure Real-Time Multimedia Surveillance System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:278-296 [Conf]
  26. Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera
    THEMIS: Threat Evaluation Metamodel for Information Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:307-321 [Conf]
  27. Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas
    An Intrusion Detection System for Detecting Phishing Attacks. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:181-192 [Conf]
  28. Zsolt Palotai, Csilla Farkas, András Lörincz
    Selection in Scale-Free Small World [Citation Graph (0, 0)][DBLP]
    CoRR, 2005, v:0, n:, pp:- [Journal]

  29. P2F: A User-Centric Privacy Protection Framework. [Citation Graph (, )][DBLP]


  30. An Algebra for Composing Ontologies. [Citation Graph (, )][DBLP]


  31. Security in TciNMP Systems. [Citation Graph (, )][DBLP]


  32. Securing Enterprise Applications: Service-Oriented Security (SOS). [Citation Graph (, )][DBLP]


  33. PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. [Citation Graph (, )][DBLP]


  34. RDF metadata for XML access control. [Citation Graph (, )][DBLP]


  35. Engaging undergraduates in computer security research. [Citation Graph (, )][DBLP]


  36. Creating non-decomposable stream bundles in multimedia web services using uSMIL. [Citation Graph (, )][DBLP]


  37. The inference problem: Maintaining maximal availability in the presence of database updates. [Citation Graph (, )][DBLP]


  38. Checking Security Policy Compliance [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.323secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002