default search action
BibTeX records: Csilla Farkas
@inproceedings{DBLP:conf/ubisec/GengHF23, author = {Tieming Geng and Chin{-}Tser Huang and Csilla Farkas}, editor = {Guojun Wang and Haozhe Wang and Geyong Min and Nektarios Georgalas and Weizhi Meng}, title = {{SCORD:} Shuffling Column-Oriented Relational Database to Enhance Security}, booktitle = {Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {2034}, pages = {163--176}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1274-8\_11}, doi = {10.1007/978-981-97-1274-8\_11}, timestamp = {Thu, 25 Apr 2024 17:03:28 +0200}, biburl = {https://dblp.org/rec/conf/ubisec/GengHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/RavanBF22, author = {John Ravan and Shankar M. Banik and Csilla Farkas}, title = {Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {2}, pages = {1045--1058}, year = {2022}, url = {https://doi.org/10.1109/TSC.2020.2974733}, doi = {10.1109/TSC.2020.2974733}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/RavanBF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/RhujittawiwatSF22, author = {Theppatorn Rhujittawiwat and Ahmed Saaudi and Csilla Farkas}, editor = {Jorge Bernardino and Elio Masciari and Colette Rolland and Joaquim Filipe}, title = {Stream Data Access Control Model: The Need for Data Semantics}, booktitle = {Proceedings of the 14th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, {IC3K} 2022, Volume 3: KMIS, Valletta, Malta, October 24-26, 2022}, pages = {19--30}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011528600003335}, doi = {10.5220/0011528600003335}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/RhujittawiwatSF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ir/QuLFR21, author = {Xianshan Qu and Xiaopeng Li and Csilla Farkas and John R. Rose}, title = {Review helpfulness evaluation and recommendation based on an attention model of customer expectation}, journal = {Inf. Retr. J.}, volume = {24}, number = {1}, pages = {55--83}, year = {2021}, url = {https://doi.org/10.1007/s10791-020-09385-x}, doi = {10.1007/S10791-020-09385-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ir/QuLFR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZengLQDLHF21, author = {Qiang Zeng and Lannan Luo and Zhiyun Qian and Xiaojiang Du and Zhoujun Li and Chin{-}Tser Huang and Csilla Farkas}, title = {Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {6}, pages = {2582--2600}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2957787}, doi = {10.1109/TDSC.2019.2957787}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/ZengLQDLHF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/data/RhujittawiwatRS21, author = {Theppatorn Rhujittawiwat and John Ravan and Ahmed Saaudi and Shankar M. Banik and Csilla Farkas}, editor = {Christoph Quix and Slimane Hammoudi and Wil M. P. van der Aalst}, title = {Database Recovery from Malicious Transactions: {A} Use of Provenance Information}, booktitle = {Proceedings of the 10th International Conference on Data Science, Technology and Applications, {DATA} 2021, Online Streaming, July 6-8, 2021}, pages = {39--48}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010553900390048}, doi = {10.5220/0010553900390048}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/data/RhujittawiwatRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijgs/AlsuwatAVF20, author = {Emad Alsuwat and Hatim Alsuwat and Marco Valtorta and Csilla Farkas}, title = {Adversarial data poisoning attacks against the {PC} learning algorithm}, journal = {Int. J. Gen. Syst.}, volume = {49}, number = {1}, pages = {3--31}, year = {2020}, url = {https://doi.org/10.1080/03081079.2019.1630401}, doi = {10.1080/03081079.2019.1630401}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijgs/AlsuwatAVF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecir/QuLFR20, author = {Xianshan Qu and Xiaopeng Li and Csilla Farkas and John R. Rose}, editor = {Joemon M. Jose and Emine Yilmaz and Jo{\~{a}}o Magalh{\~{a}}es and Pablo Castells and Nicola Ferro and M{\'{a}}rio J. Silva and Fl{\'{a}}vio Martins}, title = {An Attention Model of Customer Expectation to Improve Review Helpfulness Prediction}, booktitle = {Advances in Information Retrieval - 42nd European Conference on {IR} Research, {ECIR} 2020, Lisbon, Portugal, April 14-17, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12035}, pages = {836--851}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45439-5\_55}, doi = {10.1007/978-3-030-45439-5\_55}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ecir/QuLFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AlsuwatARVF19, author = {Emad Alsuwat and Hatim Alsuwat and John R. Rose and Marco Valtorta and Csilla Farkas}, editor = {Simon N. Foley}, title = {Detecting Adversarial Attacks in the Context of Bayesian Networks}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {3--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_1}, doi = {10.1007/978-3-030-22479-0\_1}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AlsuwatARVF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/desec/GengAHF19, author = {Tieming Geng and Hatim Alsuwat and Chin{-}Tser Huang and Csilla Farkas}, title = {Securing Relational Database Storage with Attribute Association Aware Shuffling}, booktitle = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019, Hangzhou, China, November 18-20, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSC47296.2019.8937694}, doi = {10.1109/DSC47296.2019.8937694}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/desec/GengAHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic3k/AlsuwatAVRF19, author = {Hatim Alsuwat and Emad Alsuwat and Marco Valtorta and John R. Rose and Csilla Farkas}, editor = {Ana L. N. Fred and Joaquim Filipe}, title = {Modeling Concept Drift in the Context of Discrete Bayesian Networks}, booktitle = {Proceedings of the 11th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, {IC3K} 2019, Volume 1: KDIR, Vienna, Austria, September 17-19, 2019}, pages = {214--224}, publisher = {ScitePress}, year = {2019}, url = {https://doi.org/10.5220/0008384702140224}, doi = {10.5220/0008384702140224}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/ic3k/AlsuwatAVRF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/AlsuwatAGHF19, author = {Hatim Alsuwat and Emad Alsuwat and Tieming Geng and Chin{-}Tser Huang and Csilla Farkas}, title = {Data Dependencies Preserving Shuffle in Relational Database}, booktitle = {2nd International Conference on Data Intelligence and Security, {ICDIS} 2019, South Padre Island, TX, USA, June 28-30, 2019}, pages = {180--187}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDIS.2019.00034}, doi = {10.1109/ICDIS.2019.00034}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdis/AlsuwatAGHF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/Al-WahahSF19, author = {Mouiad Al{-}Wahah and Ahmed Saaudi and Csilla Farkas}, editor = {Mohammad S. Obaidat and Pierangela Samarati}, title = {Semantic-based Obligation for Context-Based Access Control}, booktitle = {Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague, Czech Republic, July 26-28, 2019}, pages = {535--540}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0008120105350540}, doi = {10.5220/0008120105350540}, timestamp = {Tue, 06 Jun 2023 14:58:02 +0200}, biburl = {https://dblp.org/rec/conf/icete/Al-WahahSF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Al-WahahF19, author = {Mouiad Al{-}Wahah and Csilla Farkas}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Monotonic and Non-monotonic Context Delegation}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {449--460}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007400904490460}, doi = {10.5220/0007400904490460}, timestamp = {Wed, 05 Jun 2019 13:01:15 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Al-WahahF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/SaaudiTF19, author = {Ahmed Saaudi and Yan Tong and Csilla Farkas}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Probabilistic Graphical Model on Detecting Insiders: Modeling with {SGD-HMM}}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {461--470}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007404004610470}, doi = {10.5220/0007404004610470}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/SaaudiTF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/DanielsRF18, author = {Mark Daniels and John R. Rose and Csilla Farkas}, editor = {Sebastian Doerr and Mathias Fischer and Sebastian Schrittwieser and Dominik Herrmann}, title = {Protecting Patients' Data: An Efficient Method for Health Data Privacy}, booktitle = {Proceedings of the 13th International Conference on Availability, Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30, 2018}, pages = {9:1--9:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3230833.3230865}, doi = {10.1145/3230833.3230865}, timestamp = {Wed, 10 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/DanielsRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bhi/DanielsF18, author = {Mark Daniels and Csilla Farkas}, title = {Health data privacy: {A} case of undesired inferences}, booktitle = {2018 {IEEE} {EMBS} International Conference on Biomedical {\&} Health Informatics, {BHI} 2018, Las Vegas, NV, USA, March 4-7, 2018}, pages = {291--294}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BHI.2018.8333426}, doi = {10.1109/BHI.2018.8333426}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/bhi/DanielsF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/AlsuwatAVF18, author = {Emad Alsuwat and Hatim Alsuwat and Marco Valtorta and Csilla Farkas}, editor = {Carlos Alzate and Anna Monreale and Haytham Assem and Albert Bifet and Teodora Sandra Buda and Bora Caglayan and Brett Drury and Eva Garc{\'{\i}}a{-}Mart{\'{\i}}n and Ricard Gavald{\`{a}} and Stefan Kramer and Niklas Lavesson and Michael Madden and Ian M. Molloy and Maria{-}Irina Nicolae and Mathieu Sinn}, title = {Cyber Attacks Against the {PC} Learning Algorithm}, booktitle = {{ECML} {PKDD} 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11329}, pages = {159--176}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-13453-2\_13}, doi = {10.1007/978-3-030-13453-2\_13}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/pkdd/AlsuwatAVF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkdd/Al-WahahF18, author = {Mouiad Al{-}Wahah and Csilla Farkas}, editor = {Carlos Alzate and Anna Monreale and Haytham Assem and Albert Bifet and Teodora Sandra Buda and Bora Caglayan and Brett Drury and Eva Garc{\'{\i}}a{-}Mart{\'{\i}}n and Ricard Gavald{\`{a}} and Stefan Kramer and Niklas Lavesson and Michael Madden and Ian M. Molloy and Maria{-}Irina Nicolae and Mathieu Sinn}, title = {Context Delegation for Context-Based Access Control}, booktitle = {{ECML} {PKDD} 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood 2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September 10-14, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11329}, pages = {201--210}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-13453-2\_16}, doi = {10.1007/978-3-030-13453-2\_16}, timestamp = {Tue, 19 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkdd/Al-WahahF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/DiaF15, author = {Ousmane Amadou Dia and Csilla Farkas}, title = {Risk Aware Query Replacement Approach for Secure Databases Performance Management}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {2}, pages = {217--229}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2306675}, doi = {10.1109/TDSC.2014.2306675}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/DiaF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/DiaF13, author = {Ousmane Amadou Dia and Csilla Farkas}, title = {Business Driven User Role Assignment: Nimble Adaptation of {RBAC} to Organizational Changes}, journal = {Int. J. Inf. Secur. Priv.}, volume = {7}, number = {1}, pages = {45--62}, year = {2013}, url = {https://doi.org/10.4018/jisp.2013010104}, doi = {10.4018/JISP.2013010104}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/DiaF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlmstedF13, author = {Aspen Olmsted and Csilla Farkas}, title = {Web Service constraint optimization}, booktitle = {8th International Conference for Internet Technology and Secured Transactions, {ICITST} 2013, London, United Kingdom, December 9-12, 2013}, pages = {270--275}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICITST.2013.6750204}, doi = {10.1109/ICITST.2013.6750204}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/OlmstedF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/OlmstedF13, author = {Aspen Olmsted and Csilla Farkas}, title = {Coarse Grained Web Service Availability, Consistency, and Durability}, booktitle = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara, CA, USA, June 28 - July 3, 2013}, pages = {619--620}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICWS.2013.91}, doi = {10.1109/ICWS.2013.91}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/OlmstedF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itng/FarkasV13, author = {Csilla Farkas and Sidney Valentine}, editor = {Shahram Latifi}, title = {Software Safety and Security for Programmable Logic Controllers}, booktitle = {Tenth International Conference on Information Technology: New Generations, {ITNG} 2013, 15-17 April, 2013, Las Vegas, Nevada, {USA}}, pages = {639}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ITNG.2013.98}, doi = {10.1109/ITNG.2013.98}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itng/FarkasV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsse/DiaF12, author = {Ousmane Amadou Dia and Csilla Farkas}, title = {A Practical Framework for Policy Composition and Conflict Resolution}, journal = {Int. J. Secur. Softw. Eng.}, volume = {3}, number = {4}, pages = {1--26}, year = {2012}, url = {https://doi.org/10.4018/jsse.2012100101}, doi = {10.4018/JSSE.2012100101}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsse/DiaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/OlmstedF12, author = {Aspen Olmsted and Csilla Farkas}, editor = {Nick Savage and Safwan El Assad and Charles A. Shoniregun}, title = {High volume web service resource consumption}, booktitle = {7th International Conference for Internet Technology and Secured Transactions, {ICITST} 2012, London, United Kingdom, December 10-12, 2012}, pages = {275--280}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6470959/}, timestamp = {Thu, 10 Mar 2022 09:31:39 +0100}, biburl = {https://dblp.org/rec/conf/icitst/OlmstedF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/OlmstedF12, author = {Aspen Olmsted and Csilla Farkas}, editor = {Chengcui Zhang and James Joshi and Elisa Bertino and Bhavani Thuraisingham}, title = {The cost of increased transactional correctness and durability in distributed databases}, booktitle = {{IEEE} 13th International Conference on Information Reuse {\&} Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012}, pages = {441--448}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IRI.2012.6303042}, doi = {10.1109/IRI.2012.6303042}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/OlmstedF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/StalveyFE12, author = {RoxAnn H. Stalvey and Csilla Farkas and Caroline M. Eastman}, editor = {Chengcui Zhang and James Joshi and Elisa Bertino and Bhavani Thuraisingham}, title = {First use: Introducing information security in high school oracle academy courses}, booktitle = {{IEEE} 13th International Conference on Information Reuse {\&} Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012}, pages = {653--658}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IRI.2012.6303071}, doi = {10.1109/IRI.2012.6303071}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/StalveyFE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/KopylovaFX11, author = {Yuliya Kopylova and Csilla Farkas and Wenyuan Xu}, editor = {Yingjiu Li}, title = {Accurate Accident Reconstruction in {VANET}}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {271--279}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_23}, doi = {10.1007/978-3-642-22348-8\_23}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/KopylovaFX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ValentineF11, author = {Sidney Valentine and Csilla Farkas}, title = {Software security: Application-level vulnerabilities in {SCADA} systems}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada, {USA}}, pages = {498--499}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2011}, url = {https://doi.org/10.1109/IRI.2011.6009603}, doi = {10.1109/IRI.2011.6009603}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iri/ValentineF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TolandFE10, author = {Tyrone S. Toland and Csilla Farkas and Caroline M. Eastman}, title = {The inference problem: Maintaining maximal availability in the presence of database updates}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {88--103}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.004}, doi = {10.1016/J.COSE.2009.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TolandFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/Jafari-laftiHF09, author = {Maryam Jafari{-}lafti and Chin{-}Tser Huang and Csilla Farkas}, title = {{P2F:} {A} User-Centric Privacy Protection Framework}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {386--391}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.167}, doi = {10.1109/ARES.2009.167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/Jafari-laftiHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/FarkasH08, author = {Csilla Farkas and Michael N. Huhns}, title = {Securing Enterprise Applications: Service-Oriented Security {(SOS)}}, booktitle = {10th {IEEE} International Conference on E-Commerce Technology {(CEC} 2008) / 5th {IEEE} International Conference on Enterprise Computing, E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington, DC, {USA}}, pages = {428--431}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/CECandEEE.2008.151}, doi = {10.1109/CECANDEEE.2008.151}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/FarkasH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0809-5266, author = {Vaibhav Gowadia and Csilla Farkas and Michiharu Kudo}, title = {Checking Security Policy Compliance}, journal = {CoRR}, volume = {abs/0809.5266}, year = {2008}, url = {http://arxiv.org/abs/0809.5266}, eprinttype = {arXiv}, eprint = {0809.5266}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0809-5266.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/PamunuwaWF07, author = {Hasika Pamunuwa and Duminda Wijesekera and Csilla Farkas}, editor = {Willem Jonker and Milan Petkovic}, title = {An Intrusion Detection System for Detecting Phishing Attacks}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {181--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_13}, doi = {10.1007/978-3-540-75248-6\_13}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/PamunuwaWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/LazaF07, author = {Katalin Anna L{\'{a}}z{\'{a}} and Csilla Farkas}, editor = {Mariemma Inmaculada Yag{\"{u}}e del Valle and Eduardo Fern{\'{a}}ndez{-}Medina}, title = {Security in T\({}_{\mbox{ci}}\)NMP Systems}, booktitle = {Security in Information Systems, Proceedings of the 5th International Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007}, pages = {95--104}, publisher = {{INSTICC} Press}, year = {2007}, timestamp = {Thu, 24 Jan 2008 19:53:15 +0100}, biburl = {https://dblp.org/rec/conf/sis/LazaF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/HartongGFW07, author = {Mark Hartong and Rajni Goel and Csilla Farkas and Duminda Wijesekera}, title = {{PTC-VANET} Interactions to Prevent Highway Rail Intersection Crossing Accidents}, booktitle = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC} Spring 2007, 22-25 April 2007, Dublin, Ireland}, pages = {2550--2554}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/VETECS.2007.525}, doi = {10.1109/VETECS.2007.525}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/HartongGFW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/AlghathbarFW06, author = {Khaled Alghathbar and Csilla Farkas and Duminda Wijesekera}, title = {Securing {UML} Information Flow Using FlowUML}, journal = {J. Res. Pract. Inf. Technol.}, volume = {38}, number = {1}, year = {2006}, url = {http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.111.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/AlghathbarFW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acj/GowadiaF06, author = {Vaibhav Gowadia and Csilla Farkas}, title = {Tree Automata for Schema-Level Filtering of {XML} Associations}, journal = {J. Res. Pract. Inf. Technol.}, volume = {38}, number = {1}, year = {2006}, url = {http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.97.pdf}, timestamp = {Thu, 26 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acj/GowadiaF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KodaliFW06, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, title = {uSMIL: Towards secure unbreakable semantics in multimedia web services}, journal = {Comput. Syst. Sci. Eng.}, volume = {21}, number = {5}, year = {2006}, timestamp = {Thu, 23 Aug 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csse/KodaliFW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/ZieglerFL06, author = {G{\'{a}}bor Ziegler and Csilla Farkas and Andr{\'{a}}s L{\"{o}}rincz}, title = {A framework for anonymous but accountable self-organizing communities}, journal = {Inf. Softw. Technol.}, volume = {48}, number = {8}, pages = {726--744}, year = {2006}, url = {https://doi.org/10.1016/j.infsof.2005.08.007}, doi = {10.1016/J.INFSOF.2005.08.007}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/ZieglerFL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/FarkasBJ06, author = {Csilla Farkas and Alexander Brodsky and Sushil Jajodia}, title = {Unauthorized inferences in semistructured databases}, journal = {Inf. Sci.}, volume = {176}, number = {22}, pages = {3269--3299}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2006.01.004}, doi = {10.1016/J.INS.2006.01.004}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/FarkasBJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fois/KaushikFWA06, author = {Saket Kaushik and Csilla Farkas and Duminda Wijesekera and Paul Ammann}, editor = {Brandon Bennett and Christiane Fellbaum}, title = {An Algebra for Composing Ontologies}, booktitle = {Formal Ontology in Information Systems, Proceedings of the Fourth International Conference, {FOIS} 2006, Baltimore, Maryland, USA, November 9-11, 2006}, series = {Frontiers in Artificial Intelligence and Applications}, volume = {150}, pages = {265--276}, publisher = {{IOS} Press}, year = {2006}, url = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2213}, timestamp = {Tue, 13 Mar 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fois/KaushikFWA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BowlesEF06, author = {John B. Bowles and Caroline M. Eastman and Csilla Farkas}, title = {Engaging undergraduates in computer security research}, booktitle = {Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23, 2006}, pages = {184--190}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1231047.1231061}, doi = {10.1145/1231047.1231061}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BowlesEF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JainF06, author = {Amit Jain and Csilla Farkas}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Secure resource description framework: an access control model}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {121--129}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133076}, doi = {10.1145/1133058.1133076}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JainF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GowadiaFV05, author = {Vaibhav Gowadia and Csilla Farkas and Marco Valtorta}, title = {{PAID:} {A} Probabilistic Agent-Based Intrusion Detection system}, journal = {Comput. Secur.}, volume = {24}, number = {7}, pages = {529--545}, year = {2005}, url = {https://doi.org/10.1016/j.cose.2005.06.008}, doi = {10.1016/J.COSE.2005.06.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GowadiaFV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jods/KodaliFW05, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, title = {Enforcing Semantics-Aware Security in Multimedia Surveillance}, journal = {J. Data Semant.}, volume = {2}, pages = {199--221}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30567-5\_8}, doi = {10.1007/978-3-540-30567-5\_8}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jods/KodaliFW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ceemas/PalotaiFL05, author = {Zsolt Palotai and Csilla Farkas and Andr{\'{a}}s L{\"{o}}rincz}, editor = {Michal Pechoucek and Paolo Petta and L{\'{a}}szl{\'{o}} Zsolt Varga}, title = {Selection in Scale-Free Small World}, booktitle = {Multi-Agent Systems and Applications IV, 4th International Central and Eastern European Conference on Multi-Agent Systems, {CEEMAS} 2005, Budapest, Hungary, September 15-17, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3690}, pages = {579--582}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11559221\_65}, doi = {10.1007/11559221\_65}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/ceemas/PalotaiFL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YounFT05, author = {Inja Youn and Csilla Farkas and Bhavani Thuraisingham}, editor = {Sushil Jajodia and Duminda Wijesekera}, title = {Multilevel Secure Teleconferencing over Public Switched Telephone Network}, booktitle = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3654}, pages = {99--113}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535706\_8}, doi = {10.1007/11535706\_8}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/YounFT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/TolandFE05, author = {Tyrone S. Toland and Csilla Farkas and Caroline M. Eastman}, editor = {Willem Jonker and Milan Petkovic}, title = {Dynamic Disclosure Monitor (\emph{D}\({}^{\mbox{\emph{2}}}\)\emph{Mon}): An Improved Query Processing Solution}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {124--142}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_9}, doi = {10.1007/11552338\_9}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/TolandFE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/GowadiaF05, author = {Vaibhav Gowadia and Csilla Farkas}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Tree Automata for Schema-level Filtering of {XML} Associations}, booktitle = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, pages = {136--145}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Wed, 06 Feb 2008 19:55:52 +0100}, biburl = {https://dblp.org/rec/conf/sis/GowadiaF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sis/AlghathbarWF05, author = {Khaled Alghathbar and Duminda Wijesekera and Csilla Farkas}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and Luis Javier Garc{\'{\i}}a Castro}, title = {Secure {UML} Information Flow using FlowUML}, booktitle = {Security in Information Systems, Proceedings of the 3rd International Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction with ICEIS2005, Miami, USA, May 2005}, pages = {229--238}, publisher = {{INSTICC} Press}, year = {2005}, timestamp = {Wed, 29 Jun 2005 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sis/AlghathbarWF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0504063, author = {Zsolt Palotai and Csilla Farkas and Andr{\'{a}}s L{\"{o}}rincz}, title = {Selection in Scale-Free Small World}, journal = {CoRR}, volume = {abs/cs/0504063}, year = {2005}, url = {http://arxiv.org/abs/cs/0504063}, eprinttype = {arXiv}, eprint = {cs/0504063}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0504063.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csse/KodaliFW04, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, title = {Specifying multimedia access control using {RDF}}, journal = {Comput. Syst. Sci. Eng.}, volume = {19}, number = {3}, year = {2004}, timestamp = {Tue, 20 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csse/KodaliFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/StoicaF04, author = {Andrei Stoica and Csilla Farkas}, title = {Ontology Guided {XML} Security Engine}, journal = {J. Intell. Inf. Syst.}, volume = {23}, number = {3}, pages = {209--223}, year = {2004}, url = {https://doi.org/10.1023/B:JIIS.0000047392.50246.77}, doi = {10.1023/B:JIIS.0000047392.50246.77}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/StoicaF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/KodaliFW04, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, title = {An authorization model for multimedia digital libraries}, journal = {Int. J. Digit. Libr.}, volume = {4}, number = {3}, pages = {139--155}, year = {2004}, url = {https://doi.org/10.1007/s00799-004-0080-1}, doi = {10.1007/S00799-004-0080-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/KodaliFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/KodaliFW04, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, editor = {Hsinchun Chen and Reagan W. Moore and Daniel Dajun Zeng and John Leavitt}, title = {\emph{SECRETS}: {A} Secure Real-Time Multimedia Surveillance System}, booktitle = {Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3073}, pages = {278--296}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25952-7\_21}, doi = {10.1007/978-3-540-25952-7\_21}, timestamp = {Tue, 24 May 2022 18:11:09 +0200}, biburl = {https://dblp.org/rec/conf/isi/KodaliFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/FarkasWMW04, author = {Csilla Farkas and Thomas C. Wingfield and James Bret Michael and Duminda Wijesekera}, editor = {Hsinchun Chen and Reagan W. Moore and Daniel Dajun Zeng and John Leavitt}, title = {{THEMIS:} Threat Evaluation Metamodel for Information Systems}, booktitle = {Intelligence and Security Informatics, Second Symposium on Intelligence and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3073}, pages = {307--321}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-25952-7\_23}, doi = {10.1007/978-3-540-25952-7\_23}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/FarkasWMW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/KodaliFW04, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, editor = {Vijay Atluri}, title = {Creating non-decomposable stream bundles in multimedia web services using uSMIL}, booktitle = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS} 2004, Fairfax, VA, USA, October 29, 2004}, pages = {67--76}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1111348.1111356}, doi = {10.1145/1111348.1111356}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/KodaliFW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/FarkasGJR04, author = {Csilla Farkas and Vaibhav Gowadia and Amit Jain and D. Roy}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {From {XML} to {RDF:} Syntax, Semantics, Security, and Integrity (Invited Paper)}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {41--55}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_3}, doi = {10.1007/0-387-31167-X\_3}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/FarkasGJR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2004, editor = {Csilla Farkas and Pierangela Samarati}, title = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, publisher = {Kluwer/Springer}, year = {2004}, isbn = {1-4020-8127-8}, timestamp = {Wed, 29 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FarkasS03, author = {Csilla Farkas and Andrei Stoica}, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {Correlated Data Inference}, booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, pages = {119--132}, publisher = {Kluwer/Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-8070-0\_9}, doi = {10.1007/1-4020-8070-0\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FarkasS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/KodaliFW03, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, editor = {Robert Meersman and Zahir Tari}, title = {Multimedia Access Control Using {RDF} Metadata}, booktitle = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops, {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES, WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2889}, pages = {718--731}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39962-9\_73}, doi = {10.1007/978-3-540-39962-9\_73}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/otm/KodaliFW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/KodaliFW03, author = {Naren Kodali and Csilla Farkas and Duminda Wijesekera}, editor = {Sushil Jajodia and Leon Strous}, title = {Enforcing Integrity in Multimedia Surveillance}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {67--81}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_5}, doi = {10.1007/1-4020-7901-X\_5}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/KodaliFW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xmlsec/GowadiaF03, author = {Vaibhav Gowadia and Csilla Farkas}, editor = {Sushil Jajodia and Michiharu Kudo}, title = {{RDF} metadata for {XML} access control}, booktitle = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax, VA, USA, October 31, 2003}, pages = {39--48}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/968559.968567}, doi = {10.1145/968559.968567}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xmlsec/GowadiaF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/FarkasH02, author = {Csilla Farkas and Michael N. Huhns}, title = {Making Agents Secure on the Semantic Web}, journal = {{IEEE} Internet Comput.}, volume = {6}, number = {6}, pages = {76--79}, year = {2002}, url = {https://doi.org/10.1109/MIC.2002.1067741}, doi = {10.1109/MIC.2002.1067741}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/FarkasH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigkdd/FarkasJ02, author = {Csilla Farkas and Sushil Jajodia}, title = {The Inference Problem: {A} Survey}, journal = {{SIGKDD} Explor.}, volume = {4}, number = {2}, pages = {6--11}, year = {2002}, url = {https://doi.org/10.1145/772862.772864}, doi = {10.1145/772862.772864}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigkdd/FarkasJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/StoicaF02, author = {Andrei Stoica and Csilla Farkas}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Secure {XML} Views}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {133--146}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/StoicaF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/FarkasZML02, author = {Csilla Farkas and G{\'{a}}bor Ziegler and Attila Meretei and Andr{\'{a}}s L{\"{o}}rincz}, editor = {Sushil Jajodia and Pierangela Samarati}, title = {Anonymity and accountability in self-organizing electronic communities}, booktitle = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2002, Washington, DC, USA, November 21, 2002}, pages = {81--90}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/644527.644536}, doi = {10.1145/644527.644536}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/FarkasZML02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/FarkasTE01, author = {Csilla Farkas and Tyrone S. Toland and Caroline M. Eastman}, editor = {Martin S. Olivier and David L. Spooner}, title = {The Inference Problem and Updates in Relational Databases}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {181--194}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 13:50:19 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/FarkasTE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BrodskyFJ00, author = {Alexander Brodsky and Csilla Farkas and Sushil Jajodia}, title = {Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {12}, number = {6}, pages = {900--919}, year = {2000}, url = {https://doi.org/10.1109/69.895801}, doi = {10.1109/69.895801}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/BrodskyFJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/BrodskyFWW00, author = {Alexander Brodsky and Csilla Farkas and Duminda Wijesekera and Xiaoyang Sean Wang}, editor = {Rina Dechter}, title = {Constraints, Inference Channels and Secure Databases}, booktitle = {Principles and Practice of Constraint Programming - {CP} 2000, 6th International Conference, Singapore, September 18-21, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1894}, pages = {98--113}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45349-0\_9}, doi = {10.1007/3-540-45349-0\_9}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/cp/BrodskyFWW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.