2008 | ||
---|---|---|
58 | EE | Paul Ammann, Jeff Offutt, Wuzhi Xu: Coverage Criteria for State Based Specifications. Formal Methods and Testing 2008: 118-156 |
57 | EE | Gordon Fraser, Paul Ammann: Reachability and Propagation for LTL Requirements Testing. QSIC 2008: 189-198 |
56 | EE | Garrett Kaminski, Gregory Williams, Paul Ammann: Reconciling perspectives of software logic testing. Softw. Test., Verif. Reliab. 18(3): 149-188 (2008) |
2007 | ||
55 | EE | Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84 |
54 | EE | Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) |
2006 | ||
53 | EE | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178 |
52 | Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276 | |
51 | EE | Jing Guan, Jeff Offutt, Paul Ammann: An industrial case study of structural testing applied to safety-critical embedded software. ISESE 2006: 272-277 |
50 | EE | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup: A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38 |
49 | EE | Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey: A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32 |
48 | EE | Saket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94 |
2005 | ||
47 | EE | Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey: A Host-Based Approach to Network Attack Chaining Analysis. ACSAC 2005: 72-84 |
46 | EE | Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82 |
45 | EE | Saket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52 |
2004 | ||
44 | EE | Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169- |
2003 | ||
43 | EE | Paul Ammann, A. Jefferson Offutt, Hong Huang: Coverage Criteria for Logical Expressions. ISSRE 2003: 99-107 |
42 | EE | A. Jefferson Offutt, Shaoying Liu, Aynur Abdurazik, Paul Ammann: Generating test data from state-based specifications. Softw. Test., Verif. Reliab. 13(1): 25-53 (2003) |
2002 | ||
41 | EE | Paul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224 |
40 | EE | Paul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) |
2001 | ||
39 | EE | Paul Ammann, Wei Ding, Daling Xu: Using a Model Checker to Test Safety Properties. ICECCS 2001: 212-221 |
2000 | ||
38 | EE | Aynur Abdurazik, Paul Ammann, Wei Ding, A. Jefferson Offutt: Evaluation of Three Specification-Based Testing Criteria. ICECCS 2000: 179-187 |
37 | EE | Ronald W. Ritchey, Paul Ammann: Using Model Checking to Analyze Network Vulnerabilities. IEEE Symposium on Security and Privacy 2000: 156-165 |
36 | EE | Peng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000) |
35 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) | |
1999 | ||
34 | EE | Paul Ammann, Paul E. Black: A Specification-Based Coverage Metric to Evaluate Test Sets. HASE 1999: 239-248 |
33 | EE | Peng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 |
32 | Paul Ammann, Sushil Jajodia: The Integrity Challenge. IICIS 1999: 59-70 | |
31 | EE | Sushil Jajodia, Catherine D. McCollum, Paul Ammann: Trusted Recovery. Commun. ACM 42(7): 71-75 (1999) |
30 | Sushil Jajodia, Paul Ammann, Catherine D. McCollum: Surviving Information Warfare Attacks. IEEE Computer 32(4): 57-63 (1999) | |
1998 | ||
29 | EE | Paul Ammann, Paul E. Black, William Majurski: Using Model Checking to Generate Tests from Specifications. ICFEM 1998: 46- |
28 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998) | |
1997 | ||
27 | Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 | |
26 | EE | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Surviving information warfare attacks on databases. IEEE Symposium on Security and Privacy 1997: 164-174 |
25 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0- | |
24 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) |
23 | Paul Ammann, Dahlard L. Lukes, John C. Knight: Applying Data Redundancy to Differential Equation Solvers. Ann. Software Eng. 4: 65-77 (1997) | |
1996 | ||
22 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84 |
21 | EE | Pierangela Samarati, Paul Ammann, Sushil Jajodia: Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996) |
20 | EE | Paul Ammann, Sushil Jajodia, Phyllis G. Frankl: Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996) |
19 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-parent Creation in Monotonic Access Control Models. Journal of Computer Security 4(2/3): 149-166 (1996) | |
1995 | ||
18 | EE | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 |
17 | EE | Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) |
16 | EE | Paul Ammann, Sushil Jajodia, Padmaja Mavuluri: On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) |
15 | Paul Ammann, Frank Jaeckle, Sushil Jajodia: Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. Journal of Computer Security 3(2/3): 87-114 (1995) | |
1994 | ||
14 | EE | Paul Ammann, Sushil Jajodia: An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. ACM Conference on Computer and Communications Security 1994: 118-125 |
13 | EE | Pierangela Samarati, Paul Ammann, Sushil Jajodia: Propagation of Authorizations in Distributed Database Systems. ACM Conference on Computer and Communications Security 1994: 136-147 |
12 | Paul Ammann, Hassan Gomaa, A. Jefferson Offutt, David Rine, Bo Sanden: A Five Year Perspective on Software Engineering Graduate Programs at George Mason University. CSEE 1994: 473-488 | |
11 | Ravi S. Sandhu, Paul Ammann: One-Representative Safety Analysis in the Non-Monotonic Transform Model. CSFW 1994: 139-149 | |
10 | EE | Paul Ammann, Susan S. Brilliant, John C. Knight: The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing. IEEE Trans. Software Eng. 20(2): 142-148 (1994) |
1993 | ||
9 | Paul Ammann, Sushil Jajodia: Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134 | |
8 | EE | Paul Ammann, Sushil Jajodia: Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993) |
1992 | ||
7 | Paul Ammann, Richard J. Lipton, Ravi S. Sandhu: The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model. CSFW 1992: 148-156 | |
6 | Paul Ammann, Ravi S. Sandhu: The Extended Schematic Protection Model Journal of Computer Security 1(3-4): 335-384 (1992) | |
1991 | ||
5 | Paul Ammann, Sushil Jajodia: A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202 | |
4 | Paul Ammann, Ravi S. Sandhu: Safety Analysis for the Extended Schematic Protection Model. IEEE Symposium on Security and Privacy 1991: 87-97 | |
1989 | ||
3 | John C. Knight, Paul Ammann: Issues Influencing the Use of N-Version Programming. IFIP Congress 1989: 217-222 | |
1988 | ||
2 | Paul Ammann, John C. Knight: Data Diversity: An Approach to Software Fault Tolerance. IEEE Trans. Computers 37(4): 418-425 (1988) | |
1985 | ||
1 | John C. Knight, Paul Ammann: An Experimental Evaluation of Simple Methods for Seeding Program Errors. ICSE 1985: 337-342 |