Adam J. Lee

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

22EEAdam J. Lee, Kazuhiro Minami, Nikita Borisov: Confidentiality-preserving distributed proofs of conjunctive queries. ASIACCS 2009: 287-297
21EEAdam J. Lee, Marianne Winslett: Towards an efficient and language-agnostic compliance checker for trust negotiation systems. ASIACCS 2008: 228-239
20EEKazuhiro Minami, Adam J. Lee, Marianne Winslett, Nikita Borisov: Secure aggregation in a publish-subscribe system. WPES 2008: 95-104
19EEAdam J. Lee, Marianne Winslett, Jim Basney, Von Welch: The Traust Authorization Service. ACM Trans. Inf. Syst. Secur. 11(1): (2008)
18EEAdam J. Lee, Marianne Winslett: Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. ACM Trans. Inf. Syst. Secur. 12(2): (2008)
17EEAdam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008)
16EEAdam J. Lee, Kazuhiro Minami, Marianne Winslett: Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. SACMAT 2007: 101-110
15EEAdam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258
14EEAdam J. Lee, Marianne Winslett: Safety and consistency in policy-based authorization systems. ACM Conference on Computer and Communications Security 2006: 124-133
13EEAdam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54
12EEMehran Ahsant, Jim Basney, Olle Mulmo, Adam J. Lee, S. Lennart Johnsson: Toward an On-Demand Restricted Delegation Mechanism for Grids. GRID 2006: 152-159
11EEAdam J. Lee, Marianne Winslett, Jim Basney, Von Welch: Traust: a trust negotiation-based authorization service for open systems. SACMAT 2006: 39-48
10EEAdam J. Lee, Parisa Tabriz, Nikita Borisov: A privacy-preserving interdomain audit framework. WPES 2006: 99-108
9EEAdam J. Lee, Marianne Winslett: Virtual Fingerprinting as a Foundation for Reputation in Open Systems. iTrust 2006: 236-251
8EEAdam J. Lee, Marianne Winslett, Jim Basney, Von Welch: Traust: A Trust Negotiation Based Authorization Service. iTrust 2006: 458-462
7EEGregory A. Koenig, Xin Meng, Adam J. Lee, Michael Treaster, Nadir Kiyanclar, William Yurcik: Cluster security with NVisionCC: process monitoring by leveraging emergent properties. CCGRID 2005: 121-132
6EEAdam J. Lee, Gregory A. Koenig, Xin Meng, William Yurcik: Searching for open windows and unlocked doors: port scanning in large-scale commodity clusters. CCGRID 2005: 146-151
5EEAdam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell: Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. SPC 2005: 134-150
4EERagib Hasan, Suvda Myagmar, Adam J. Lee, William Yurcik: Toward a threat model for storage systems. StorageSS 2005: 94-102
3EEDmitry Mogilevsky, Adam J. Lee, William Yurcik: Defining a Comprehensive Threat Model for High Performance Computational Clusters CoRR abs/cs/0510046: (2005)
2EEKiran Lakkaraju, William Yurcik, Ratna Bearavolu, Adam J. Lee: NVisionIP: an interactive network flow visualization tool for security. SMC (3) 2004: 2675-2680
1EEKiran Lakkaraju, William Yurcik, Adam J. Lee: NVisionIP: netflow visualizations of system state for security situational awareness. VizSEC 2004: 65-72

Coauthor Index

1Mehran Ahsant [12]
2Jim Basney [8] [11] [12] [19]
3Ratna Bearavolu [2]
4Nikita Borisov [10] [20] [22]
5Jodie P. Boyer [5] [13]
6Roy H. Campbell [5]
7Chris Drexelius [5]
8Carl A. Gunter [13]
9Ragib Hasan [4]
10Raquel L. Hill [5]
11S. Lennart Johnsson [12]
12Nadir Kiyanclar [7]
13Gregory A. Koenig [6] [7]
14Kiran Lakkaraju [1] [2]
15Xin Meng [6] [7]
16Kazuhiro Minami [16] [20] [22]
17Dmitry Mogilevsky [3]
18Olle Mulmo [12]
19Suvda Myagmar [4]
20Prasad Naldurg [5]
21Lars E. Olson [13]
22Kent E. Seamons [15]
23Parisa Tabriz [10]
24Michael Treaster [7]
25Von Welch [8] [11] [19]
26Marianne Winslett [8] [9] [11] [14] [15] [16] [18] [19] [20] [21]
27Ting Yu [15] [17]
28William Yurcik [1] [2] [3] [4] [6] [7]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)