dblp.uni-trier.dewww.uni-trier.de

Duminda Wijesekera

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
91EEAnyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061
2008
90EEAhmed Alazzawe, Anis Nawaz, Duminda Wijesekera: Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685
89EEVijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345
88EEJon Whittle, Duminda Wijesekera, Mark Hartong: Executable misuse cases for modeling security concerns. ICSE 2008: 121-130
87EEMurat Gunestas, Duminda Wijesekera, Anoop Singhal: Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176
86EEMark Hartong, Rajni Goel, Duminda Wijesekera: Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260
85EESteven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230
84EESteve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
83EEHemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008)
2007
82EEDuminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84
81EEMark Hartong, Rajni Goel, Duminda Wijesekera: Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72
80EEVijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290
79EEMark Hartong, Rajni Goel, Duminda Wijesekera: A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265
78EEVijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode: Evaluating distributed xacml policies. SWS 2007: 99-110
77EEHasika Pamunuwa, Duminda Wijesekera, Csilla Farkas: An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192
76EEMark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera: PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554
75EESaket Kaushik, Duminda Wijesekera: RDF Collections. WEBIST (Selected Papers) 2007: 201-212
74 Barry Sweeney, Duminda Wijesekera: Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92
73EELingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380
72EELingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
2006
71EENicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
70EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178
69EEHemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402
68 Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276
67 Mark Hartong, Rajni Goel, Duminda Wijesekera: Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155
66EESaket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94
65EEMark Hartong, Rajni Goel, Duminda Wijesekera: Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991
64 Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245
63 Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera: Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277
62EEHemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006)
61EEHanan Lutfiyya, Mark Burgess, Duminda Wijesekera: Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Network Syst. Manage. 14(4): 599-602 (2006)
60EEKhaled Alghathbar, Csilla Farkas, Duminda Wijesekera: Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology 38(1): (2006)
2005
59 Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005
58EEHemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170
57EESaket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82
56 Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael: Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294
55EEHemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005
54EEDuminda Wijesekera, James Bret Michael, Anil Nerode: An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118
53EESaket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52
52 Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas: Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238
51 Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera: Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83
50EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
49EEDuminda Wijesekera, Anil Nerode: Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Logic 135(1-3): 1-72 (2005)
48EENaren Kodali, Csilla Farkas, Duminda Wijesekera: Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semantics 2: 199-221 (2005)
2004
47 Inja Youn, Duminda Wijesekera: Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218
46EEShiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16
45EELingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
44EESushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345
43EEKaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384
42EELingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
41 Naren Kodali, Csilla Farkas, Duminda Wijesekera: SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296
40 Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera: THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321
39EESaket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169-
38EEKhaled Alghathbar, Duminda Wijesekera: Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196
37EENaren Kodali, Csilla Farkas, Duminda Wijesekera: Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76
36 Naren Kodali, Csilla Farkas, Duminda Wijesekera: Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3): (2004)
35EENaren Kodali, Csilla Farkas, Duminda Wijesekera: An authorization model for multimedia digital libraries. Int. J. on Digital Libraries 4(3): 139-155 (2004)
34EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004)
33 Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
2003
32EEJames Bret Michael, Thomas C. Wingfield, Duminda Wijesekera: Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626
31 Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371
30EELingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
29EEKhaled Alghathbar, Duminda Wijesekera: authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86
28EENaren Kodali, Csilla Farkas, Duminda Wijesekera: Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731
27 Mohamed Sharif, Duminda Wijesekera: Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36
26EEKhaled Alghathbar, Duminda Wijesekera: Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387
25EEDuminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003)
24EEDuminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003)
23 Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003)
2002
22EEDuminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180
21EEPaul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224
20 Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
19EELingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
18EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12
17EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513
16EENaren Kodali, Duminda Wijesekera: Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60
2001
15EEDuminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47
14EEÅsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58
13 Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15
12 Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74
11EEDuminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001)
2000
10EEAlexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113
9 Duminda Wijesekera, Daniel Barbará: Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103
1999
8 Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera: Test and evaluation of distributed information system networks. Ann. Software Eng. 8: 289-311 (1999)
7EEDuminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti: Experimental Evaluation of Loss Perception in Continuous Media. Multimedia Syst. 7(6): 486-499 (1999)
1998
6 Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava: Pattern Directed Mining of Sequence Data. KDD 1998: 51-57
1997
5EEWonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti: Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253
4EERaja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote: A multimedia programming toolkit/environment. ICPADS 1997: 446-452
3 Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372
1996
2 Duminda Wijesekera, Jaideep Srivastava: Quality of Service (QoS) Metrics for Continuous Media. Multimedia Tools Appl. 3(2): 127-166 (1996)
1990
1 Duminda Wijesekera: Constructive Modal Logics I. Ann. Pure Appl. Logic 50(3): 271-301 (1990)

Coauthor Index

1Ahmed Alazzawe [63] [90]
2Anis Alazzawe [63]
3Khaled Alghathbar [26] [29] [38] [52] [60]
4Paul Ammann [21] [39] [53] [57] [66] [68] [70] [82]
5Daniel Barbará [9]
6Steve Barker [84]
7Claudio Bettini [17] [18] [23] [34]
8Alexander Brodsky [10]
9Mark Burgess [61]
10Shiping Chen [31] [46]
11Ram Dantu [62]
12Srikrishna Dhammalapati [51]
13Vijayant Dhankhar [78] [80] [89]
14Csilla Farkas [10] [28] [35] [36] [37] [40] [41] [48] [52] [60] [68] [76] [77]
15Mark Foresti [5] [7]
16Gordon Fraser [82]
17Emily Frye [56]
18M. Ganesh [3] [11]
19Steven Gianvecchio [85]
20Rajni Goel [65] [67] [76] [79] [81] [86]
21Murat Gunestas [87]
22Valery Guralnik [6]
23Åsa Hagström [14] [25]
24Raja Harinath [4]
25Mark Hartong [65] [67] [76] [79] [81] [86] [88]
26Randall Jackson [56]
27Sushil Jajodia [12] [13] [14] [15] [17] [18] [19] [20] [22] [23] [24] [25] [30] [31] [33] [34] [42] [43] [44] [45] [46] [50] [55] [58] [59] [62] [69] [71] [72] [73] [83] [85]
28Saket Kaushik [21] [39] [53] [57] [66] [68] [70] [75] [78] [80] [89]
29Deepak R. Kenchammana-Hosekote [4] [5]
30Naren Kodali [16] [28] [35] [36] [37] [41] [48]
31Wonjun Lee [4] [5]
32Yingjiu Li [30] [72]
33Anyi Liu [91]
34Hanan Lutfiyya (Hanan Lutfi Lutfiyya) [61]
35Fabio Massacci [50]
36James Bret Michael [32] [40] [54] [56] [64]
37Anis Nawaz [90]
38Asad Nawaz [63]
39Anil Nerode [3] [7] [11] [49] [54] [78]
40Hasika Pamunuwa [77]
41Shwetal S. Parikh [4]
42Francesco Parisi-Presicce [14] [25]
43Raymond A. Paul [8]
44Leisheng Peng [56] [64]
45Sijan Rai [51]
46Ronald W. Ritchey [39]
47Kaushal Sarda [43]
48Hemant Sengar [55] [58] [62] [69] [83]
49Marek J. Sergot [84]
50Mohamed Sharif [27]
51Anoop Singhal [87]
52Jaideep Srivastava [2] [3] [4] [5] [6] [7] [8] [11]
53Angelos Stavrou [91]
54Difu Su [4] [5]
55Sushan Sudaharan [51]
56Lingya Sun [82]
57Barry Sweeney [74]
58Sunil Wadhwa [4]
59Haining Wang [69] [83] [85]
60Lingyu Wang [19] [20] [30] [33] [42] [45] [72] [73]
61Xiaoyang Sean Wang [10] [17] [18] [23] [34]
62Jon Whittle (Jonathan Whittle) [88]
63Thomas C. Wingfield [32] [40] [56] [64]
64William H. Winsborough [39] [57] [70]
65Jacqueline Yang [12]
66Inja Youn [47]
67Yi Yuan [91]
68Nicola Zannone [50] [71]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)