Search results
- NetQuery: a knowledge plane for reasoning about network properties, Alan Shieh, Emin Gun Sirer, Fred Schneider, Proceedings of the ACM CoNEXT Student Workshop, ACM CoNEXT, 30, November, 2010
- Dissecting One Click Frauds, Nicolas Christin, 11, November, 2010
- A Model-Integrated, Guideline-Driven, Clinical Decision-Support System, Janos Laszlo Mathe, 11, November, 2010
- Discounting the Past: Bad Weighs Heavier than Good, Laura Brandimarte, 11, November, 2010
- Scalable Parametric Verification of Reference Monitors: How to Verify Reference Monitors without Worrying about Data Structure Size, Jason Franklin, 11, November, 2010
- Managing Information Leakage, Steven Whang, 11, November, 2010
- Towards Understanding the Usage Pattern of Web-based Electronic Medical Record System, Xiaowei Li, 11, November, 2010
- Modeling Cyber-Insurance: Towards A Unifying Framework, Galina A. Schwartz, 11, November, 2010
- Security Decision-Making Among Interdependent Organizations, Ann Miura-Ko, 11, November, 2010
- EBAM: Experience-Based Access Management for Healthcare, Elizabeth Durham, 11, November, 2010
- Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws, Anupam Datta, 11, November, 2010
- Are Security Experts Useful? Bayesian Nash Equilibria for Network Security Games with Limited Information, Benjamin Johnson, 11, November, 2010
- Simulation of Network Attacks on SCADA Systems, Andrew Davis, 10, November, 2010
- Security Interdependencies for Networked Control Systems with Identical Agents, Saurabh Amin, 10, November, 2010
- Fault-Tolerant Distributed Reconnaissance, Adrian Lauf, 10, November, 2010
- Netslice: Enabling Critical Network Infrastructure with Commodity Routers, Hakim Weatherspoon, 10, November, 2010
- A Privacy-Aware Architecture For Demand Response Systems, Stephen Wicker, 10, November, 2010
- Towards a Formal Foundation of Web Security, Devdatta Akhawe, 10, November, 2010
- SessionJuggler: Secure Login From an Untrusted Terminal Using Session Hijacking, Elie Bursztein, 10, November, 2010
- Protecting Browsers from Extension Vulnerabilities, Adrienne Porter Felt, 10, November, 2010
- The Case for Ubiquitous Transport-Level Encryption, Andrea Bittau, 10, November, 2010
- A Learning-Based Approach to Reactive Security, Benjamin Rubinstein, 10, November, 2010
- Location Privacy via Private Proximity Testing, Arvind Narayanan, 10, November, 2010
- Community Epidemic Detection using Time-Correlated Anomalies, Adam Oliner, 10, November, 2010
- Experiences in the Logical Specification of the HIPAA and GLBA Privacy Laws, Henry DeYoung, Deepak Garg, Limin Jia, Dilsun Kaynar, Anupam Datta, th ACM Workshop on Privacy in the Electronic Society, October, 2010
- Privacy Challenges in Patient-Centric Health Information Systems (Position Paper), Anupam Datta, Nipun Dave, John Mitchell, Helen Nissenbaum, Divya Sharma, 1st Usenix Workshop on Health Security and Privacy, August, 2010
- WS-OBJECTS: Extending Service-Oriented Architecture with Hierarchical Composition of Client-Side Asynchronous Event-Processing Logic, Ken Birman, Krzysztof Ostrowski, 7th IEEE International Conference on Web Services (ICWS 2009), July, 2010
- Opportunistic Strategies for Lightweight Signal Processing for Body Sensor Networks, Edmund Seto , Eladio Matin, Allen Yang, Posu Yan, Raffaele Gravina , Irving Lin, Curtis Wang, Michael Roy, Victor Shia, Ruzena Bajcsy, PETRA, June, 2010
- Enabling Multiple BSN Applications Using the SPINE Framework, Andreoli Alessandro, Alessia Salmeri, Luigi Buondonno, Nikhil Raveendranathan, Vitali Loseu, Roberta Giannantonio, Edmund Seto , Giancarlo Fortino, BSN 2010, June, 2010
- Requirements for an Integrity-Protected Hypervisor on the x86 Hardware Virtualized Architecture, Amit Vasudevan, Jonathan M. McCune, Ning Qu, Leendert van Doorn, Adrian Perrig, the 3rd International Conference on Trust and Trustworthy Computing (Trust 2010), June, 2010
- Transaction costs and iceberg costs, K. Hausken, G. A. Schwartz, Applied Economics Letters, 18, 1, 101-102, June, 2010
- IVEC: Off-Chip Memory Integrity Protection for Both Security and Reliability, Ruirui Huang, and G. Edward Suh, Proceedings of the 37th International Symposium on Computer Architecture (ISCA 2010), June, 2010
- TrustVisor: Efficient TCB Reduction and Attestation, Jonathan M. McCune, Yanlin Li, Ning Qu, Zongwei Zhou, Anupam Datta, Virgil D. Gligor, Adrian Perrig, Proceedings of IEEE Symposium on Security and Privacy (Oakland 2010), May, 2010
- Bootstrapping Trust in Commodity Computers, Bryan Parno, Jonathan M. McCune, Adrian Perrig, Proceedings of IEEE Symposium on Security and Privacy, May, 2010
- Static Power Reduction Techniques for Asynchronous Circuits, Carlos Tadeo Ortega Otero, Jonathan Tse, Rajit Manohar, IEEE International Symposium on Asynchronous Circuits and Systems, May, 2010
- Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size, J. Franklin, S. Chaki, A. Datta, A. Seshadri, 31st IEEE Symposium on Security and Privacy, May, 2010
- TRUST Annual Report 2009-2010, Faculty and Staff, May, 2010
- A distributed intrusion detection system for resource-constrained devices in ad-hoc networks, Adrian Lauf, William H. Robinson, Alan Peters, Elsevier Ad-hoc Networks, 8, 3, 253-266, May, 2010
- Fine-Grained Privilege Separation for Web Applications, Adrian Mettler, David Wagner, Akshay Krishnamurthy, World Wide Web Confererence, IW3C2, April, 2010
- Simulation of Network Attacks on SCADA Systems, Rohan Chabukswar, Bruno Sinopoli, Gabor Karsai, Annarita Giani, Himanshu Neema, Andrew Davis, First Workshop on Secure Control Systems, Cyber Physical Systems Week 2010, April, 2010
- Secure Compressed Domain Watermarking for H.264 Video, Sampath Bavipati , Xiao Su, Proc. 7th Int'l Conf. on Information Technology: New Generations, April, 2010
- Adapting and Evaluating Distributed Real-time and Embedded Systems in Dynamic Environments, Joe Hoffert, Douglas Schmidt, Aniruddha Gokhale, 1st International Workshop on Data Dissemination for Large scale Complex Critical Infrastructures, April, 2010
- Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password, Adrian Perrig, Ahren Studer, Proceedings of ACM Conference on Wireless Network Security (WiSec), March, 2010
- DISTRIBUTED SENSING WITH FAULT-TOLERANT RESOURCE REALLOCATION FOR DISASTER AREA ASSESSMENT, Adrian Lauf, Vanderbilt University, March, 2010
- Orthrus: Efficient Software Integrity Protection on Multi-Cores, Ruirui Huang, Daniel Y. Deng, and G. Edward Suh, Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS 2010), March, 2010
- Security - a science?, Sigurd Meldal, IEEE IACC 2010, Deepak Garg, 19, February, 2010
- Decreased time delay and security enhancement recommendations for AMI smart meter networks, Coalton Bennett, Stephen Wicker, IEEE Xplore Innovative Smart Grid Technologies (ISGT), 2010, 6, 19, January, 2010
- When Information Improves Information Security, Jens Grossklags, Benjamin Johnson, Nicolas Christin, Proceedings of the Fourteenth International Conference on Financial Cryptography and Data Security (FC'10), January, 2010
- Inferring Personal Information from Demand-Response Systems, Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker, IEEE Security & Privacy, 8, 1, 11-20, January, 2010
- Distributed Programming with Distributed Authorization, K. Avijit, A. Datta, R. Harper, 5th ACM SIGPLAN Workshop on Types in Language Design and Implementation, January, 2010
- Object Views: Fine-Grained Sharing in Browsers, Leo Meyerovich, Adrienne Porter Felt, Mark Miller, International World Wide Web Conference (WWW), 2010
- Can a Routing Protocol Be Truly Optimal? Dynamic Load-Balancing in Wireless Sensor Networks, Daniel Seung Lee, Stephen Wicker, WAMICON 2010, WAMICON, 2010
- A Middleware for Gossip Protocols, Robbert van Renesse, A Middleware for Gossip Protocols, 2010
- Self-Replicating Objects for Multicore Platform., Ken Birman, Krzysztof Ostrowski, Self-Replicating Objects for Multicore Platform., 2010
- Joint State-Space Planning: A Practical Algorithm for the Multiple Path Consensus Problem, Mikhail Lisovich, Maxim Likhachev, 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2010), 2010
- Application of Reed-Muller Codes for Localization of Malicious Nodes, Anna Kacewicz, Stephen Wicker, IEEE ICC, 2010
- Protecting Browsers from Extension Vulnerabilities, Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman, NDSS, 2010
- Joe-E: A Security-Oriented Subset of Java, Adrian Mettler, David Wagner, Tyler Close, Network and Distributed Systems Symposium, Internet Society, 2010
- Compositional System Security with Interface-Confined Adversaries, Deepak Garg, Jason Franklin, Dilsun Kaynar, Anupam Datta, Electronic Notes in Theoretical Computer Science, 265, 2010
- Do Data Breach Disclosure Laws Reduce Identity Theft?, Sasha Romanosky, Rahul Telang, Alessandro Acquisti, Carnegie Mellon University, 2010
- A highly metamorphic virus generator, Mark Stamp, Priti Desai, International Journal of Multimedia Intelligence and Security, 1, 4, 402-427, 2010
- Privacy Costs and Personal Data Protection: Economic and Legal Perspectives, Romanosky Sasha, Alessandro Acquisti, Berkeley Technology Law Journal, 2010
- Productivity Analysis of the Distributed QoS Modeling Language, Joe Hoffert, Douglas Schmidt, Aniruddha Gokhale, Dr. Janis Osis and Dr. Erika Asnina, IGI Global, 2010
- Distributed Sensor Perception via Sparse representation, Allen Yang, Michael Gastpar, Ruzena Bajcsy, Shankar Sastry, Proceedings of IEEE, 2010
- Providing Survivability against Jamming Attack for Multi-Radio Multi-Channel Wireless Mesh Networks, Shanshan Jiang, Yuan Xue, Journal of Network and Computer Applications (JNCA), 2010
- Secure Re-keying and Collusion Prevention Using Block Designs, Nathaniel Karst, Stephen Wicker, IEEE Transactions on Networking, 2010
- SPIN and Berkeley Fit - Towards Social Interaction in Mobile Body Sensor Networks, 2. Posu Yan, Irving Lin, Michael Roy, Edmund Seto, Curtis Wang, Allen Yang, Ruzena Bajcsy:, 2010
- InvisiType: Object-Oriented Security Policies, Jiwon Seo and Monica S. Lam, Annual Network and Distributed System Security Symposium, 2010
- A History of the Virtual Synchrony Replication Model, Ken Birman, Replication, 91-120, 2010
- An introduction to software reverse engineering, Mark Stamp, Teodoro Cipresso, Peter Stavroulakis and Mark Stamp, 31, Springer, 2010
- An introduction to software reverse engineering, Mark Stamp, Peter Stavroulakis and Mark Stamp, 31, Springer, 2010
- Handbook of Information and Communication Security, Mark Stamp, Peter Stavroulakis and Mark Stamp, Springer, 2010, 978-3-642-04116-7
- iPhone Security Analysis, Mark Stamp, Vaibhav Pandya, International Journal of Multimedia Intelligence and Security, 2010
- Inferring Personal Information from Demand-Response Systems, Mikhail Lisovich, Deirdre Mulligan, Stephen Wicker, IEEE Security and Privacy Magazine, 2010
- Surveillance, Policing and Democracy, Deirdre Mulligan, Stephen Wicker, Minnesota Law Review, 2010
Found 75 publications.
Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.