Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Duminda Wijesekera
2010 – today
- 2012
[j28]Anthony Patrick Melaragno, Damindra Bandara, Duminda Wijesekera, James Bret Michael: Securing the ZigBee Protocol in the Smart Grid. IEEE Computer 45(4): 92-94 (2012)
[c100]Changwei Liu, Anoop Singhal, Duminda Wijesekera: Using Attack Graphs in Forensic Examinations. ARES 2012: 596-603
[c99]Andre Abadie, Duminda Wijesekera: Leveraging an Inventory of the Cognitive Radio Attack Surface. CyberSecurity 2012: 136-143
[c98]Mohammed Alhussein, Avinash Srinivasan, Duminda Wijesekera: Forensics filesystem with cluster-level identifiers for efficient data recovery. ICITST 2012: 411-415
[c97]Paul Ngo, Duminda Wijesekera: Emergency Messages in the Commercial Mobile Alert System. Critical Infrastructure Protection 2012: 171-184
[c96]KamalEldin Mohamed, Duminda Wijesekera: A Lightweight Framework for Web Services Implementations on Mobile Devices. IEEE MS 2012: 64-71
[c95]Mohammad Ababneh, Duminda Wijesekera, James Bret Michael: A Policy-Based Dialogue System for Physical Access Control. STIDS 2012: 57-63
[c94]Changwei Liu, Anoop Singhal, Duminda Wijesekera: Mapping evidence graphs to attack graphs. WIFS 2012: 121-126
[c93]KamalEldin Mohamed, Duminda Wijesekera: Performance Analysis of Web Services on Mobile Devices. ANT/MobiWIS 2012: 744-751
[p2]Mark Hartong, Rajni Goel, Duminda Wijesekera: Transportation. Critical Infrastructure Protection 2012: 330-355- 2011
[j27]Murat Gunestas, Murad Mehmet, Duminda Wijesekera, Anoop Singhal: Forensic Web Services Framework. IT Professional 13(3): 31-37 (2011)
[j26]Min Xu, Duminda Wijesekera, Xinwen Zhang: Runtime Administration of an RBAC Profile for XACML. IEEE T. Services Computing 4(4): 286-299 (2011)
[c92]Paul Ngo, Duminda Wijesekera: Enhancing the Usability of the Commercial Mobile Alert System. Critical Infrastructure Protection 2011: 137-149
[c91]Ahmed A. L. Faresi, Duminda Wijesekera: Preemptive mechanism to prevent health data privacy leakage. MEDES 2011: 17-24- 2010
[j25]Ahmed Alazzawe, Anis Alazzawe, Duminda Wijesekera, Ram Dantu: A testbed for large mobile social computing experiments. IJSNet 8(2): 89-97 (2010)
[c90]Vikram Chandrasekaran, Ram Dantu, N. K. Gupta, Xiaohui Yang, Duminda Wijesekera: Efficiency of social connection-based routing in P2P VoIP networks. COMSNETS 2010: 1-6
[c89]Anoop Singhal, Duminda Wijesekera: Ontologies for modeling enterprise level security metrics. CSIIRW 2010: 58
[c88]Mark Hartong, Rajni Goel, Duminda Wijesekera: U.S. Federal Oversight of Rail Transportation of Toxic by Inhalation Materials. Critical Infrastructure Protection 2010: 141-155
[c87]Murat Gunestas, Murad Mehmet, Duminda Wijesekera: Detecting Ponzi and Pyramid Business Schemes in Choreographed Web Services. IFIP Int. Conf. Digital Forensics 2010: 133-150
[c86]Ahmed A. L. Faresi, Duminda Wijesekera, Khaled Moidu: A comprehensive privacy-aware authorization framework founded on HIPAA privacy rules. IHI 2010: 637-646
[c85]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100
[c84]Xiaohui Yang, Angelos Stavrou, Ram Dantu, Duminda Wijesekera: Small World VoIP. MobiCASE 2010: 137-155
[c83]Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia: QoP and QoS Policy Cognizant Module Composition. POLICY 2010: 77-86
[c82]Murad Mehmet, Duminda Wijesekera: Ontological Constructs to Create Money Laundering Schemes. STIDS 2010: 21-29
[c81]Paul Ngo, Duminda Wijesekera: Using Ontological Information to Enhance Responder Availability in Emergency Response. STIDS 2010: 42-49
2000 – 2009
- 2009
[c80]Murat Gunestas, Duminda Wijesekera: Online detection of web choreography misuses. CollaborateCom 2009: 1-10
[c79]
[c78]Mark Hartong, Rajni Goel, Duminda Wijesekera: Secure Cross-Domain Train Scheduling. Critical Infrastructure Protection 2009: 199-211
[c77]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9
[c76]Min Xu, Duminda Wijesekera, Xinwen Zhang, Deshan Cooray: Towards Session-Aware RBAC Administration and Enforcement with XACML. POLICY 2009: 9-16
[c75]Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou: SQLProb: a proxy-based architecture towards preventing SQL injection attacks. SAC 2009: 2054-2061
[c74]
[c73]Randall J. Arvay, Duminda Wijesekera, James Bret Michael: Using RuleML to specify cross-domain information flow control policies. SoSE 2009: 1-6
[c72]Murat Gunestas, Duminda Wijesekera, Ahmed Elkhodary: An evidence generation model for web services. SoSE 2009: 1-6- 2008
[j24]Khaled Alghathbar, Duminda Wijesekera: Enforcing Security Policies in Requirements Engineering Using AFUML. I. J. Comput. Appl. 15(4): 237-251 (2008)
[j23]Steve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1) (2008)
[j22]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008)
[c71]Ahmed Alazzawe, Anis Nawaz, Duminda Wijesekera: Extracting Kerberos passwords through RC4-HMAC encryption type analysis. AICCSA 2008: 679-685
[c70]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: Securing Workflows with XACML, RDF and BPEL. DBSec 2008: 330-345
[c69]Jon Whittle, Duminda Wijesekera, Mark Hartong: Executable misuse cases for modeling security concerns. ICSE 2008: 121-130
[c68]Murat Gunestas, Duminda Wijesekera, Anoop Singhal: Forensic Web Services. IFIP Int. Conf. Digital Forensics 2008: 163-176
[c67]Mark Hartong, Rajni Goel, Duminda Wijesekera: Protection and Recovery of Railroad Event Recorder Data. IFIP Int. Conf. Digital Forensics 2008: 247-260
[c66]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230- 2007
[b1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180
[j21]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
[c65]Duminda Wijesekera, Paul Ammann, Lingya Sun, Gordon Fraser: Relating counterexamples to test cases in CTL model checking specifications. A-MOST 2007: 75-84
[c64]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera: XACML Policies for Exclusive Resource Usage. DBSec 2007: 275-290
[c63]Mark Hartong, Rajni Goel, Duminda Wijesekera: Securing Positive Train Control Systems. Critical Infrastructure Protection 2007: 57-72
[c62]Mark Hartong, Rajni Goel, Duminda Wijesekera: A Framework for Investigating Railroad Accidents. IFIP Int. Conf. Digital Forensics 2007: 255-265
[c61]Hasika Pamunuwa, Duminda Wijesekera, Csilla Farkas: An Intrusion Detection System for Detecting Phishing Attacks. Secure Data Management 2007: 181-192
[c60]Barry Sweeney, Duminda Wijesekera: Comparison of IPsec to TLS and SRTP for Securing VoIP. WOSIS 2007: 82-92
[c59]Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera, Anil Nerode: Evaluating distributed xacml policies. SWS 2007: 99-110
[c58]Mark Hartong, Rajni Goel, Csilla Farkas, Duminda Wijesekera: PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents. VTC Spring 2007: 2550-2554
[c57]
[c56]
[p1]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380- 2006
[j20]Khaled Alghathbar, Csilla Farkas, Duminda Wijesekera: Securing UML Information Flow Using FlowUML. Journal of Research and Practice in Information Technology 38(1) (2006)
[j19]Naren Kodali, Csilla Farkas, Duminda Wijesekera: uSMIL: Towards secure unbreakable semantics in multimedia web services. Comput. Syst. Sci. Eng. 21(5) (2006)
[j18]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An ontology-based distributed whiteboard to determine legal responses to online cyber attacks. Internet Research 16(5): 475-490 (2006)
[j17]Hanan Lutfiyya, Mark Burgess, Duminda Wijesekera: Report on Policy 2006: Workshop on Policies for Distributed Systems and Networks. J. Network Syst. Manage. 14(4): 599-602 (2006)
[j16]Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006)
[c55]Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
[c54]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. DBSec 2006: 163-178
[c53]Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402
[c52]Saket Kaushik, Csilla Farkas, Duminda Wijesekera, Paul Ammann: An Algebra for Composing Ontologies. FOIS 2006: 265-276
[c51]Mark Hartong, Rajni Goel, Duminda Wijesekera: Use-Misuse Case Driven Analysis of Positive Train Control. IFIP Int. Conf. Digital Forensics 2006: 141-155
[c50]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208
[c49]Leisheng Peng, Duminda Wijesekera, Thomas C. Wingfield, James Bret Michael: An Ontology-Based Distributed Whiteboard to Determine Legal Responses to Online Cyber Attacks. WOSIS 2006: 232-245
[c48]Ahmed Alazzawe, Anis Alazzawe, Asad Nawaz, Duminda Wijesekera: Analyzing Preauthentication Timestamps To Crack Kerberos V Passwords. WOSIS 2006: 267-277
[c47]Saket Kaushik, Duminda Wijesekera, Paul Ammann: BPEL orchestration of secure webmail. SWS 2006: 85-94
[c46]Mark Hartong, Rajni Goel, Duminda Wijesekera: Communications Based Positive Train Control Systems Architecture in the USA. VTC Spring 2006: 2987-2991- 2005
[j15]Duminda Wijesekera, Anil Nerode: Tableaux for constructive concurrent dynamic logic. Ann. Pure Appl. Logic 135(1-3): 1-72 (2005)
[j14]Naren Kodali, Csilla Farkas, Duminda Wijesekera: Enforcing Semantics-Aware Security in Multimedia Surveillance. J. Data Semantics 2: 199-221 (2005)
[c45]Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann: Email feedback: a policy-based approach to overcoming false positives. FMSE 2005: 73-82
[c44]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170
[c43]Leisheng Peng, Thomas C. Wingfield, Duminda Wijesekera, Emily Frye, Randall Jackson, James Bret Michael: Making Decisions about Legal Responses to Cyber Attacks. IFIP Int. Conf. Digital Forensics 2005: 283-294
[c42]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005
[c41]Duminda Wijesekera, James Bret Michael, Anil Nerode: An Agent-Based Framework for Assessing Missile Defense Doctrine and Policy. POLICY 2005: 115-118
[c40]Sushan Sudaharan, Srikrishna Dhammalapati, Sijan Rai, Duminda Wijesekera: Honeynet Clusters as an early Warning System for Production Networks. WOSIS 2005: 77-83
[c39]Khaled Alghathbar, Duminda Wijesekera, Csilla Farkas: Secure UML Information Flow using FlowUML. WOSIS 2005: 229-238
[c38]Saket Kaushik, Duminda Wijesekera, Paul Ammann: Policy-based dissemination of partial web-ontologies. SWS 2005: 43-52
[c37]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
[e1]Sushil Jajodia, Duminda Wijesekera (Eds.): Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X- 2004
[j13]Naren Kodali, Csilla Farkas, Duminda Wijesekera: Specifying multimedia access control using RDF. Comput. Syst. Sci. Eng. 19(3) (2004)
[j12]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
[j11]Naren Kodali, Csilla Farkas, Duminda Wijesekera: An authorization model for multimedia digital libraries. Int. J. on Digital Libraries 4(3): 139-155 (2004)
[j10]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004)
[c36]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
[c35]Inja Youn, Duminda Wijesekera: Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. DBSec 2004: 205-218
[c34]Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16
[c33]Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345
[c32]Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384
[c31]Naren Kodali, Csilla Farkas, Duminda Wijesekera: SECRETS: A Secure Real-Time Multimedia Surveillance System. ISI 2004: 278-296
[c30]Csilla Farkas, Thomas C. Wingfield, James Bret Michael, Duminda Wijesekera: THEMIS: Threat Evaluation Metamodel for Information Systems. ISI 2004: 307-321
[c29]Saket Kaushik, Paul Ammann, Duminda Wijesekera, William H. Winsborough, Ronald W. Ritchey: A Policy Driven Approach to Email Services. POLICY 2004: 169-
[c28]Khaled Alghathbar, Duminda Wijesekera: Analyzing Information Flow Control Policies in Requirements Engineering. POLICY 2004: 193-196
[c27]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
[c26]Naren Kodali, Csilla Farkas, Duminda Wijesekera: Creating non-decomposable stream bundles in multimedia web services using uSMIL. SWS 2004: 67-76- 2003
[j9]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): 351-372 (2003)
[j8]Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003)
[j7]Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003)
[c25]Khaled Alghathbar, Duminda Wijesekera: authUML: a three-phased framework to analyze access control specifications in use cases. FMSE 2003: 77-86
[c24]James Bret Michael, Thomas C. Wingfield, Duminda Wijesekera: Measured Responses to Cyber Attacks Using Schmitt Analysis: A Case Study of Attack Scenarios for a Software-Intensive System. COMPSAC 2003: 621-626
[c23]Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371
[c22]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
[c21]Naren Kodali, Csilla Farkas, Duminda Wijesekera: Multimedia Access Control Using RDF Metadata. OTM Workshops 2003: 718-731
[c20]Mohamed Sharif, Duminda Wijesekera: Providing Voice Privacy Over Public Switched Telephone Networks. SEC 2003: 25-36
[c19]Khaled Alghathbar, Duminda Wijesekera: Consistent and Complete Access Control Policies in Use Cases. UML 2003: 373-387- 2002
[c18]Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180
[c17]Paul Ammann, Duminda Wijesekera, Saket Kaushik: Scalable, graph-based network vulnerability analysis. ACM Conference on Computer and Communications Security 2002: 217-224
[c16]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
[c15]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
[c14]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12
[c13]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513
[c12]Naren Kodali, Duminda Wijesekera: Regulating access to SMIL formatted pay-per-view movies. XML Security 2002: 53-60- 2001
[j6]Sushil Jajodia, Duminda Wijesekera: Security in Federated Database Systems. Inf. Sec. Techn. Report 6(2): 69-79 (2001)
[j5]Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Normal forms and syntactic completeness proofs for functional independencies. Theor. Comput. Sci. 266(1-2): 365-405 (2001)
[c11]Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47
[c10]Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58
[c9]
[c8]Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74- 2000
[c7]Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113
[c6]Sang-Yeong Choi, Duminda Wijesekera: The DADSim air defense simulation environment. HASE 2000: 75-82
[c5]Duminda Wijesekera, Daniel Barbará: Mining Cinematic Knowledge Work in Progress [An Extended Abstract]. MDM/KDD 2000: 98-103
1990 – 1999
- 1999
[j4]Raymond A. Paul, Jaideep Srivastava, Duminda Wijesekera: Test and evaluation of distributed information system networks. Ann. Software Eng. 8: 289-311 (1999)
[j3]Duminda Wijesekera, Jaideep Srivastava, Anil Nerode, Mark Foresti: Experimental Evaluation of Loss Perception in Continuous Media. Multimedia Syst. 7(6): 486-499 (1999)- 1998
[c4]Valery Guralnik, Duminda Wijesekera, Jaideep Srivastava: Pattern Directed Mining of Sequence Data. KDD 1998: 51-57- 1997
[c3]Wonjun Lee, Difu Su, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote, Mark Foresti: Experimental Evaluation of PFS Continuous Media File System. CIKM 1997: 246-253
[c2]Raja Harinath, Wonjun Lee, Shwetal S. Parikh, Difu Su, Sunil Wadhwa, Duminda Wijesekera, Jaideep Srivastava, Deepak R. Kenchammana-Hosekote: A multimedia programming toolkit/environment. ICPADS 1997: 446-452
[c1]Duminda Wijesekera, M. Ganesh, Jaideep Srivastava, Anil Nerode: Tableaux for Functional Dependencies and Independencies. TABLEAUX 1997: 358-372- 1996
[j2]Duminda Wijesekera, Jaideep Srivastava: Quality of Service (QoS) Metrics for Continuous Media. Multimedia Tools Appl. 3(2): 127-166 (1996)- 1990
[j1]
Coauthor Index
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:05 CEST by the dblp team



