2008 |
58 | EE | Paul Ammann,
Jeff Offutt,
Wuzhi Xu:
Coverage Criteria for State Based Specifications.
Formal Methods and Testing 2008: 118-156 |
57 | EE | Gordon Fraser,
Paul Ammann:
Reachability and Propagation for LTL Requirements Testing.
QSIC 2008: 189-198 |
56 | EE | Garrett Kaminski,
Gregory Williams,
Paul Ammann:
Reconciling perspectives of software logic testing.
Softw. Test., Verif. Reliab. 18(3): 149-188 (2008) |
2007 |
55 | EE | Duminda Wijesekera,
Paul Ammann,
Lingya Sun,
Gordon Fraser:
Relating counterexamples to test cases in CTL model checking specifications.
A-MOST 2007: 75-84 |
54 | EE | Peng Liu,
Jie Li,
Sushil Jajodia,
Paul Ammann:
Can-Follow Concurrency Control.
IEEE Trans. Computers 56(10): 1425-1430 (2007) |
2006 |
53 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
DBSec 2006: 163-178 |
52 | | Saket Kaushik,
Csilla Farkas,
Duminda Wijesekera,
Paul Ammann:
An Algebra for Composing Ontologies.
FOIS 2006: 265-276 |
51 | EE | Jing Guan,
Jeff Offutt,
Paul Ammann:
An industrial case study of structural testing applied to safety-critical embedded software.
ISESE 2006: 272-277 |
50 | EE | Joseph Pamula,
Sushil Jajodia,
Paul Ammann,
Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis.
QoP 2006: 31-38 |
49 | EE | Joseph Pamula,
Paul Ammann,
Sushil Jajodia,
Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
SWS 2006: 23-32 |
48 | EE | Saket Kaushik,
Duminda Wijesekera,
Paul Ammann:
BPEL orchestration of secure webmail.
SWS 2006: 85-94 |
2005 |
47 | EE | Paul Ammann,
Joseph Pamula,
Julie A. Street,
Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis.
ACSAC 2005: 72-84 |
46 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Email feedback: a policy-based approach to overcoming false positives.
FMSE 2005: 73-82 |
45 | EE | Saket Kaushik,
Duminda Wijesekera,
Paul Ammann:
Policy-based dissemination of partial web-ontologies.
SWS 2005: 43-52 |
2004 |
44 | EE | Saket Kaushik,
Paul Ammann,
Duminda Wijesekera,
William H. Winsborough,
Ronald W. Ritchey:
A Policy Driven Approach to Email Services.
POLICY 2004: 169- |
2003 |
43 | EE | Paul Ammann,
A. Jefferson Offutt,
Hong Huang:
Coverage Criteria for Logical Expressions.
ISSRE 2003: 99-107 |
42 | EE | A. Jefferson Offutt,
Shaoying Liu,
Aynur Abdurazik,
Paul Ammann:
Generating test data from state-based specifications.
Softw. Test., Verif. Reliab. 13(1): 25-53 (2003) |
2002 |
41 | EE | Paul Ammann,
Duminda Wijesekera,
Saket Kaushik:
Scalable, graph-based network vulnerability analysis.
ACM Conference on Computer and Communications Security 2002: 217-224 |
40 | EE | Paul Ammann,
Sushil Jajodia,
Peng Liu:
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) |
2001 |
39 | EE | Paul Ammann,
Wei Ding,
Daling Xu:
Using a Model Checker to Test Safety Properties.
ICECCS 2001: 212-221 |
2000 |
38 | EE | Aynur Abdurazik,
Paul Ammann,
Wei Ding,
A. Jefferson Offutt:
Evaluation of Three Specification-Based Testing Criteria.
ICECCS 2000: 179-187 |
37 | EE | Ronald W. Ritchey,
Paul Ammann:
Using Model Checking to Analyze Network Vulnerabilities.
IEEE Symposium on Security and Privacy 2000: 156-165 |
36 | EE | Peng Liu,
Paul Ammann,
Sushil Jajodia:
Rewriting Histories: Recovering from Malicious Transactions.
Distributed and Parallel Databases 8(1): 7-40 (2000) |
35 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci. 129(1-4): 155-195 (2000) |
1999 |
34 | EE | Paul Ammann,
Paul E. Black:
A Specification-Based Coverage Metric to Evaluate Test Sets.
HASE 1999: 239-248 |
33 | EE | Peng Liu,
Paul Ammann,
Sushil Jajodia:
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
ICDCS 1999: 414-423 |
32 | | Paul Ammann,
Sushil Jajodia:
The Integrity Challenge.
IICIS 1999: 59-70 |
31 | EE | Sushil Jajodia,
Catherine D. McCollum,
Paul Ammann:
Trusted Recovery.
Commun. ACM 42(7): 71-75 (1999) |
30 | | Sushil Jajodia,
Paul Ammann,
Catherine D. McCollum:
Surviving Information Warfare Attacks.
IEEE Computer 32(4): 57-63 (1999) |
1998 |
29 | EE | Paul Ammann,
Paul E. Black,
William Majurski:
Using Model Checking to Generate Tests from Specifications.
ICFEM 1998: 46- |
28 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
Journal of Computer Security 6(3): 181-217 (1998) |
1997 |
27 | | Sushil Jajodia,
Indrakshi Ray,
Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions.
CAiSE 1997: 75-88 |
26 | EE | Paul Ammann,
Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Surviving information warfare attacks on databases.
IEEE Symposium on Security and Privacy 1997: 164-174 |
25 | | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Semantic-Based Decomposition of Transactions.
Advanced Transaction Models and Architectures 1997: 0- |
24 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst. 22(2): 215-254 (1997) |
23 | | Paul Ammann,
Dahlard L. Lukes,
John C. Knight:
Applying Data Redundancy to Differential Equation Solvers.
Ann. Software Eng. 4: 65-77 (1997) |
1996 |
22 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions.
IEEE Symposium on Security and Privacy 1996: 74-84 |
21 | EE | Pierangela Samarati,
Paul Ammann,
Sushil Jajodia:
Maintaining Replicated Authorizations in Distributed Database Systems.
Data Knowl. Eng. 18(1): 55-84 (1996) |
20 | EE | Paul Ammann,
Sushil Jajodia,
Phyllis G. Frankl:
Globally Consistent Event Ordering in One-Directional Distributed Environments.
IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996) |
19 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.
Journal of Computer Security 4(2/3): 149-166 (1996) |
1995 |
18 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
VLDB 1995: 218-227 |
17 | EE | Paul Ammann,
Vijayalakshmi Atluri,
Sushil Jajodia:
The Partitioned Synchronization Rule for Planar Extendible Partial Orders.
IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) |
16 | EE | Paul Ammann,
Sushil Jajodia,
Padmaja Mavuluri:
On-The-Fly Reading of Entire Databases.
IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) |
15 | | Paul Ammann,
Frank Jaeckle,
Sushil Jajodia:
Concurrency Control in a Secure Database via a Two-Snapshot Algorithm.
Journal of Computer Security 3(2/3): 87-114 (1995) |
1994 |
14 | EE | Paul Ammann,
Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
ACM Conference on Computer and Communications Security 1994: 118-125 |
13 | EE | Pierangela Samarati,
Paul Ammann,
Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems.
ACM Conference on Computer and Communications Security 1994: 136-147 |
12 | | Paul Ammann,
Hassan Gomaa,
A. Jefferson Offutt,
David Rine,
Bo Sanden:
A Five Year Perspective on Software Engineering Graduate Programs at George Mason University.
CSEE 1994: 473-488 |
11 | | Ravi S. Sandhu,
Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model.
CSFW 1994: 139-149 |
10 | EE | Paul Ammann,
Susan S. Brilliant,
John C. Knight:
The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing.
IEEE Trans. Software Eng. 20(2): 142-148 (1994) |
1993 |
9 | | Paul Ammann,
Sushil Jajodia:
Planar Lattice Security Structures for Multilevel Replicated Databases.
DBSec 1993: 125-134 |
8 | EE | Paul Ammann,
Sushil Jajodia:
Distributed Timestamp Generation in Planar Lattice Networks.
ACM Trans. Comput. Syst. 11(3): 205-225 (1993) |
1992 |
7 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.
CSFW 1992: 148-156 |
6 | | Paul Ammann,
Ravi S. Sandhu:
The Extended Schematic Protection Model
Journal of Computer Security 1(3-4): 335-384 (1992) |
1991 |
5 | | Paul Ammann,
Sushil Jajodia:
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
DBSec 1991: 191-202 |
4 | | Paul Ammann,
Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model.
IEEE Symposium on Security and Privacy 1991: 87-97 |
1989 |
3 | | John C. Knight,
Paul Ammann:
Issues Influencing the Use of N-Version Programming.
IFIP Congress 1989: 217-222 |
1988 |
2 | | Paul Ammann,
John C. Knight:
Data Diversity: An Approach to Software Fault Tolerance.
IEEE Trans. Computers 37(4): 418-425 (1988) |
1985 |
1 | | John C. Knight,
Paul Ammann:
An Experimental Evaluation of Simple Methods for Seeding Program Errors.
ICSE 1985: 337-342 |