| 2008 |
| 58 | EE | Paul Ammann,
Jeff Offutt,
Wuzhi Xu:
Coverage Criteria for State Based Specifications.
Formal Methods and Testing 2008: 118-156 |
| 57 | EE | Gordon Fraser,
Paul Ammann:
Reachability and Propagation for LTL Requirements Testing.
QSIC 2008: 189-198 |
| 56 | EE | Garrett Kaminski,
Gregory Williams,
Paul Ammann:
Reconciling perspectives of software logic testing.
Softw. Test., Verif. Reliab. 18(3): 149-188 (2008) |
| 2007 |
| 55 | EE | Duminda Wijesekera,
Paul Ammann,
Lingya Sun,
Gordon Fraser:
Relating counterexamples to test cases in CTL model checking specifications.
A-MOST 2007: 75-84 |
| 54 | EE | Peng Liu,
Jie Li,
Sushil Jajodia,
Paul Ammann:
Can-Follow Concurrency Control.
IEEE Trans. Computers 56(10): 1425-1430 (2007) |
| 2006 |
| 53 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.
DBSec 2006: 163-178 |
| 52 | | Saket Kaushik,
Csilla Farkas,
Duminda Wijesekera,
Paul Ammann:
An Algebra for Composing Ontologies.
FOIS 2006: 265-276 |
| 51 | EE | Jing Guan,
Jeff Offutt,
Paul Ammann:
An industrial case study of structural testing applied to safety-critical embedded software.
ISESE 2006: 272-277 |
| 50 | EE | Joseph Pamula,
Sushil Jajodia,
Paul Ammann,
Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis.
QoP 2006: 31-38 |
| 49 | EE | Joseph Pamula,
Paul Ammann,
Sushil Jajodia,
Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
SWS 2006: 23-32 |
| 48 | EE | Saket Kaushik,
Duminda Wijesekera,
Paul Ammann:
BPEL orchestration of secure webmail.
SWS 2006: 85-94 |
| 2005 |
| 47 | EE | Paul Ammann,
Joseph Pamula,
Julie A. Street,
Ronald W. Ritchey:
A Host-Based Approach to Network Attack Chaining Analysis.
ACSAC 2005: 72-84 |
| 46 | EE | Saket Kaushik,
William H. Winsborough,
Duminda Wijesekera,
Paul Ammann:
Email feedback: a policy-based approach to overcoming false positives.
FMSE 2005: 73-82 |
| 45 | EE | Saket Kaushik,
Duminda Wijesekera,
Paul Ammann:
Policy-based dissemination of partial web-ontologies.
SWS 2005: 43-52 |
| 2004 |
| 44 | EE | Saket Kaushik,
Paul Ammann,
Duminda Wijesekera,
William H. Winsborough,
Ronald W. Ritchey:
A Policy Driven Approach to Email Services.
POLICY 2004: 169- |
| 2003 |
| 43 | EE | Paul Ammann,
A. Jefferson Offutt,
Hong Huang:
Coverage Criteria for Logical Expressions.
ISSRE 2003: 99-107 |
| 42 | EE | A. Jefferson Offutt,
Shaoying Liu,
Aynur Abdurazik,
Paul Ammann:
Generating test data from state-based specifications.
Softw. Test., Verif. Reliab. 13(1): 25-53 (2003) |
| 2002 |
| 41 | EE | Paul Ammann,
Duminda Wijesekera,
Saket Kaushik:
Scalable, graph-based network vulnerability analysis.
ACM Conference on Computer and Communications Security 2002: 217-224 |
| 40 | EE | Paul Ammann,
Sushil Jajodia,
Peng Liu:
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) |
| 2001 |
| 39 | EE | Paul Ammann,
Wei Ding,
Daling Xu:
Using a Model Checker to Test Safety Properties.
ICECCS 2001: 212-221 |
| 2000 |
| 38 | EE | Aynur Abdurazik,
Paul Ammann,
Wei Ding,
A. Jefferson Offutt:
Evaluation of Three Specification-Based Testing Criteria.
ICECCS 2000: 179-187 |
| 37 | EE | Ronald W. Ritchey,
Paul Ammann:
Using Model Checking to Analyze Network Vulnerabilities.
IEEE Symposium on Security and Privacy 2000: 156-165 |
| 36 | EE | Peng Liu,
Paul Ammann,
Sushil Jajodia:
Rewriting Histories: Recovering from Malicious Transactions.
Distributed and Parallel Databases 8(1): 7-40 (2000) |
| 35 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci. 129(1-4): 155-195 (2000) |
| 1999 |
| 34 | EE | Paul Ammann,
Paul E. Black:
A Specification-Based Coverage Metric to Evaluate Test Sets.
HASE 1999: 239-248 |
| 33 | EE | Peng Liu,
Paul Ammann,
Sushil Jajodia:
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
ICDCS 1999: 414-423 |
| 32 | | Paul Ammann,
Sushil Jajodia:
The Integrity Challenge.
IICIS 1999: 59-70 |
| 31 | EE | Sushil Jajodia,
Catherine D. McCollum,
Paul Ammann:
Trusted Recovery.
Commun. ACM 42(7): 71-75 (1999) |
| 30 | | Sushil Jajodia,
Paul Ammann,
Catherine D. McCollum:
Surviving Information Warfare Attacks.
IEEE Computer 32(4): 57-63 (1999) |
| 1998 |
| 29 | EE | Paul Ammann,
Paul E. Black,
William Majurski:
Using Model Checking to Generate Tests from Specifications.
ICFEM 1998: 46- |
| 28 | | Indrakshi Ray,
Paul Ammann,
Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions.
Journal of Computer Security 6(3): 181-217 (1998) |
| 1997 |
| 27 | | Sushil Jajodia,
Indrakshi Ray,
Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions.
CAiSE 1997: 75-88 |
| 26 | EE | Paul Ammann,
Sushil Jajodia,
Catherine D. McCollum,
Barbara T. Blaustein:
Surviving information warfare attacks on databases.
IEEE Symposium on Security and Privacy 1997: 164-174 |
| 25 | | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Semantic-Based Decomposition of Transactions.
Advanced Transaction Models and Architectures 1997: 0- |
| 24 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst. 22(2): 215-254 (1997) |
| 23 | | Paul Ammann,
Dahlard L. Lukes,
John C. Knight:
Applying Data Redundancy to Differential Equation Solvers.
Ann. Software Eng. 4: 65-77 (1997) |
| 1996 |
| 22 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions.
IEEE Symposium on Security and Privacy 1996: 74-84 |
| 21 | EE | Pierangela Samarati,
Paul Ammann,
Sushil Jajodia:
Maintaining Replicated Authorizations in Distributed Database Systems.
Data Knowl. Eng. 18(1): 55-84 (1996) |
| 20 | EE | Paul Ammann,
Sushil Jajodia,
Phyllis G. Frankl:
Globally Consistent Event Ordering in One-Directional Distributed Environments.
IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996) |
| 19 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.
Journal of Computer Security 4(2/3): 149-166 (1996) |
| 1995 |
| 18 | EE | Paul Ammann,
Sushil Jajodia,
Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
VLDB 1995: 218-227 |
| 17 | EE | Paul Ammann,
Vijayalakshmi Atluri,
Sushil Jajodia:
The Partitioned Synchronization Rule for Planar Extendible Partial Orders.
IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) |
| 16 | EE | Paul Ammann,
Sushil Jajodia,
Padmaja Mavuluri:
On-The-Fly Reading of Entire Databases.
IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) |
| 15 | | Paul Ammann,
Frank Jaeckle,
Sushil Jajodia:
Concurrency Control in a Secure Database via a Two-Snapshot Algorithm.
Journal of Computer Security 3(2/3): 87-114 (1995) |
| 1994 |
| 14 | EE | Paul Ammann,
Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
ACM Conference on Computer and Communications Security 1994: 118-125 |
| 13 | EE | Pierangela Samarati,
Paul Ammann,
Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems.
ACM Conference on Computer and Communications Security 1994: 136-147 |
| 12 | | Paul Ammann,
Hassan Gomaa,
A. Jefferson Offutt,
David Rine,
Bo Sanden:
A Five Year Perspective on Software Engineering Graduate Programs at George Mason University.
CSEE 1994: 473-488 |
| 11 | | Ravi S. Sandhu,
Paul Ammann:
One-Representative Safety Analysis in the Non-Monotonic Transform Model.
CSFW 1994: 139-149 |
| 10 | EE | Paul Ammann,
Susan S. Brilliant,
John C. Knight:
The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing.
IEEE Trans. Software Eng. 20(2): 142-148 (1994) |
| 1993 |
| 9 | | Paul Ammann,
Sushil Jajodia:
Planar Lattice Security Structures for Multilevel Replicated Databases.
DBSec 1993: 125-134 |
| 8 | EE | Paul Ammann,
Sushil Jajodia:
Distributed Timestamp Generation in Planar Lattice Networks.
ACM Trans. Comput. Syst. 11(3): 205-225 (1993) |
| 1992 |
| 7 | | Paul Ammann,
Richard J. Lipton,
Ravi S. Sandhu:
The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.
CSFW 1992: 148-156 |
| 6 | | Paul Ammann,
Ravi S. Sandhu:
The Extended Schematic Protection Model
Journal of Computer Security 1(3-4): 335-384 (1992) |
| 1991 |
| 5 | | Paul Ammann,
Sushil Jajodia:
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
DBSec 1991: 191-202 |
| 4 | | Paul Ammann,
Ravi S. Sandhu:
Safety Analysis for the Extended Schematic Protection Model.
IEEE Symposium on Security and Privacy 1991: 87-97 |
| 1989 |
| 3 | | John C. Knight,
Paul Ammann:
Issues Influencing the Use of N-Version Programming.
IFIP Congress 1989: 217-222 |
| 1988 |
| 2 | | Paul Ammann,
John C. Knight:
Data Diversity: An Approach to Software Fault Tolerance.
IEEE Trans. Computers 37(4): 418-425 (1988) |
| 1985 |
| 1 | | John C. Knight,
Paul Ammann:
An Experimental Evaluation of Simple Methods for Seeding Program Errors.
ICSE 1985: 337-342 |