dblp.uni-trier.dewww.uni-trier.de

Paul Ammann

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
58EEPaul Ammann, Jeff Offutt, Wuzhi Xu: Coverage Criteria for State Based Specifications. Formal Methods and Testing 2008: 118-156
57EEGordon Fraser, Paul Ammann: Reachability and Propagation for LTL Requirements Testing. QSIC 2008: 189-198
56EEGarrett Kaminski, Gregory Williams, Paul Ammann: Reconciling perspectives of software logic testing. Softw. Test., Verif. Reliab. 18(3): 149-188 (2008)
2007
55EEDuminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84
54EEPeng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
2006
53EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178
52 Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276
51EEJing Guan, Jeff Offutt, Paul Ammann: An industrial case study of structural testing applied to safety-critical embedded software. ISESE 2006: 272-277
50EEJoseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup: A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38
49EEJoseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey: A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32
48EESaket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94
2005
47EEPaul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey: A Host-Based Approach to Network Attack Chaining Analysis. ACSAC 2005: 72-84
46EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82
45EESaket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52
2004
44EESaket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169-
2003
43EEPaul Ammann, A. Jefferson Offutt, Hong Huang: Coverage Criteria for Logical Expressions. ISSRE 2003: 99-107
42EEA. Jefferson Offutt, Shaoying Liu, Aynur Abdurazik, Paul Ammann: Generating test data from state-based specifications. Softw. Test., Verif. Reliab. 13(1): 25-53 (2003)
2002
41EEPaul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224
40EEPaul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)
2001
39EEPaul Ammann, Wei Ding, Daling Xu: Using a Model Checker to Test Safety Properties. ICECCS 2001: 212-221
2000
38EEAynur Abdurazik, Paul Ammann, Wei Ding, A. Jefferson Offutt: Evaluation of Three Specification-Based Testing Criteria. ICECCS 2000: 179-187
37EERonald W. Ritchey, Paul Ammann: Using Model Checking to Analyze Network Vulnerabilities. IEEE Symposium on Security and Privacy 2000: 156-165
36EEPeng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
35 Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000)
1999
34EEPaul Ammann, Paul E. Black: A Specification-Based Coverage Metric to Evaluate Test Sets. HASE 1999: 239-248
33EEPeng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423
32 Paul Ammann, Sushil Jajodia: The Integrity Challenge. IICIS 1999: 59-70
31EESushil Jajodia, Catherine D. McCollum, Paul Ammann: Trusted Recovery. Commun. ACM 42(7): 71-75 (1999)
30 Sushil Jajodia, Paul Ammann, Catherine D. McCollum: Surviving Information Warfare Attacks. IEEE Computer 32(4): 57-63 (1999)
1998
29EEPaul Ammann, Paul E. Black, William Majurski: Using Model Checking to Generate Tests from Specifications. ICFEM 1998: 46-
28 Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998)
1997
27 Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88
26EEPaul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Surviving information warfare attacks on databases. IEEE Symposium on Security and Privacy 1997: 164-174
25 Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0-
24EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997)
23 Paul Ammann, Dahlard L. Lukes, John C. Knight: Applying Data Redundancy to Differential Equation Solvers. Ann. Software Eng. 4: 65-77 (1997)
1996
22EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84
21EEPierangela Samarati, Paul Ammann, Sushil Jajodia: Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996)
20EEPaul Ammann, Sushil Jajodia, Phyllis G. Frankl: Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996)
19 Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996)
1995
18EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227
17EEPaul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995)
16EEPaul Ammann, Sushil Jajodia, Padmaja Mavuluri: On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995)
15 Paul Ammann, Frank Jaeckle, Sushil Jajodia: Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. Journal of Computer Security 3(2/3): 87-114 (1995)
1994
14EEPaul Ammann, Sushil Jajodia: An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. ACM Conference on Computer and Communications Security 1994: 118-125
13EEPierangela Samarati, Paul Ammann, Sushil Jajodia: Propagation of Authorizations in Distributed Database Systems. ACM Conference on Computer and Communications Security 1994: 136-147
12 Paul Ammann, Hassan Gomaa, A. Jefferson Offutt, David Rine, Bo Sanden: A Five Year Perspective on Software Engineering Graduate Programs at George Mason University. CSEE 1994: 473-488
11 Ravi S. Sandhu, Paul Ammann: One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149
10EEPaul Ammann, Susan S. Brilliant, John C. Knight: The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. IEEE Trans. Software Eng. 20(2): 142-148 (1994)
1993
9 Paul Ammann, Sushil Jajodia: Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134
8EEPaul Ammann, Sushil Jajodia: Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993)
1992
7 Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156
6 Paul Ammann, Ravi S. Sandhu: The Extended Schematic Protection Model Journal of Computer Security 1(3-4): 335-384 (1992)
1991
5 Paul Ammann, Sushil Jajodia: A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202
4 Paul Ammann, Ravi S. Sandhu: Safety Analysis for the Extended Schematic Protection Model. IEEE Symposium on Security and Privacy 1991: 87-97
1989
3 John C. Knight, Paul Ammann: Issues Influencing the Use of N-Version Programming. IFIP Congress 1989: 217-222
1988
2 Paul Ammann, John C. Knight: Data Diversity: An Approach to Software Fault Tolerance. IEEE Trans. Computers 37(4): 418-425 (1988)
1985
1 John C. Knight, Paul Ammann: An Experimental Evaluation of Simple Methods for Seeding Program Errors. ICSE 1985: 337-342

Coauthor Index

1Aynur Abdurazik [38] [42]
2Vijayalakshmi Atluri (Vijay Atluri) [17]
3Paul E. Black [29] [34]
4Barbara T. Blaustein [26]
5Susan S. Brilliant [10]
6Wei Ding [38] [39]
7Csilla Farkas [52]
8Phyllis G. Frankl [20]
9Gordon Fraser [55] [57]
10Hassan Gomaa [12]
11Jing Guan [51]
12Hong Huang [43]
13Frank Jaeckle [15]
14Sushil Jajodia [5] [8] [9] [13] [14] [15] [16] [17] [18] [20] [21] [22] [24] [25] [26] [27] [28] [30] [31] [32] [33] [35] [36] [40] [49] [50] [54]
15Garrett Kaminski [56]
16Saket Kaushik [41] [44] [45] [46] [48] [52] [53]
17John C. Knight [1] [2] [3] [10] [23]
18Jie Li [54]
19Richard J. Lipton [7] [19]
20Peng Liu [33] [36] [40] [54]
21Shaoying Liu [42]
22Dahlard L. Lukes [23]
23William Majurski [29]
24Padmaja Mavuluri [16]
25Catherine D. McCollum [26] [30] [31]
26A. Jefferson Offutt (Jeff Offutt) [12] [38] [42] [43] [51] [58]
27Joseph Pamula [47] [49] [50]
28Indrakshi Ray [18] [22] [24] [25] [27] [28] [35]
29David Rine [12]
30Ronald W. Ritchey [37] [44] [47] [49]
31Pierangela Samarati [13] [21]
32Bo Sandén (Bo Sanden) [12]
33Ravi S. Sandhu [4] [6] [7] [11] [19]
34Julie A. Street [47]
35Lingya Sun [55]
36Vipin Swarup [50]
37Duminda Wijesekera [41] [44] [45] [46] [48] [52] [53] [55]
38Gregory Williams [56]
39William H. Winsborough [44] [46] [53]
40Daling Xu [39]
41Wuzhi Xu [58]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)