BibTeX records: Prasad Naldurg

download as .bib file

@inproceedings{DBLP:conf/edbt/KesarwaniKNPSMM18,
  author    = {Manish Kesarwani and
               Akshar Kaul and
               Prasad Naldurg and
               Sikhar Patranabis and
               Gagandeep Singh and
               Sameep Mehta and
               Debdeep Mukhopadhyay},
  title     = {Efficient Secure k-Nearest Neighbours over Encrypted Data},
  booktitle = {Proceedings of the 21th International Conference on Extending Database
               Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018.},
  pages     = {564--575},
  year      = {2018},
  crossref  = {DBLP:conf/edbt/2018},
  url       = {https://doi.org/10.5441/002/edbt.2018.67},
  doi       = {10.5441/002/edbt.2018.67},
  timestamp = {Fri, 16 Mar 2018 10:35:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/edbt/KesarwaniKNPSMM18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MonshizadehNV16,
  author    = {Maliheh Monshizadeh and
               Prasad Naldurg and
               V. N. Venkatakrishnan},
  title     = {Patching Logic Vulnerabilities for Web Applications using LogicPatcher},
  booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  pages     = {73--84},
  year      = {2016},
  crossref  = {DBLP:conf/codaspy/2016},
  url       = {https://doi.org/10.1145/2857705.2857727},
  doi       = {10.1145/2857705.2857727},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/MonshizadehNV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MonshizadehNV14,
  author    = {Maliheh Monshizadeh and
               Prasad Naldurg and
               V. N. Venkatakrishnan},
  title     = {{MACE:} Detecting Privilege Escalation Vulnerabilities in Web Applications},
  booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages     = {690--701},
  year      = {2014},
  crossref  = {DBLP:conf/ccs/2014},
  url       = {https://doi.org/10.1145/2660267.2660337},
  doi       = {10.1145/2660267.2660337},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/MonshizadehNV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/essos/JeanninCCGNS13,
  author    = {Jean{-}Baptiste Jeannin and
               Guido de Caso and
               Juan Chen and
               Yuri Gurevich and
               Prasad Naldurg and
               Nikhil Swamy},
  title     = {dkal {\(\star\)} : Constructing Executable Specifications of Authorization
               Protocols},
  booktitle = {Engineering Secure Software and Systems - 5th International Symposium,
               ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  pages     = {139--154},
  year      = {2013},
  crossref  = {DBLP:conf/essos/2013},
  url       = {https://doi.org/10.1007/978-3-642-36563-8\_10},
  doi       = {10.1007/978-3-642-36563-8\_10},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/JeanninCCGNS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/BaskarNRS13,
  author    = {Anguraj Baskar and
               Prasad Naldurg and
               K. R. Raghavendra and
               S. P. Suresh},
  title     = {Primal Infon Logic: Derivability in Polynomial Time},
  booktitle = {{IARCS} Annual Conference on Foundations of Software Technology and
               Theoretical Computer Science, {FSTTCS} 2013, December 12-14, 2013,
               Guwahati, India},
  pages     = {163--174},
  year      = {2013},
  crossref  = {DBLP:conf/fsttcs/2013},
  url       = {https://doi.org/10.4230/LIPIcs.FSTTCS.2013.163},
  doi       = {10.4230/LIPIcs.FSTTCS.2013.163},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/BaskarNRS13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/BhaskarGLN13,
  author    = {Raghav Bhaskar and
               Saikat Guha and
               Srivatsan Laxman and
               Prasad Naldurg},
  title     = {Verito: {A} Practical System for Transparency and Accountability in
               Virtual Economies},
  booktitle = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/ndss/2013},
  url       = {https://www.ndss-symposium.org/ndss2013/verito-practical-system-transparency-and-accountability-virtual-economies},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/BhaskarGLN13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pldi/2013plas,
  editor    = {Prasad Naldurg and
               Nikhil Swamy},
  title     = {Proceedings of the 2013 {ACM} {SIGPLAN} Workshop on Programming Languages
               and Analysis for Security, {PLAS} 2013, Seattle, WA, USA, June 20,
               2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2465106},
  isbn      = {978-1-4503-2144-0},
  timestamp = {Thu, 22 May 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pldi/2013plas},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/Naldurg12,
  author    = {Prasad Naldurg},
  title     = {Foundations of Dynamic Access Control},
  booktitle = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  pages     = {44--58},
  year      = {2012},
  crossref  = {DBLP:conf/iciss/2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3\_4},
  doi       = {10.1007/978-3-642-35130-3\_4},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/Naldurg12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KaranthLNVLS11,
  author    = {Sandeep Karanth and
               Srivatsan Laxman and
               Prasad Naldurg and
               Ramarathnam Venkatesan and
               John Lambert and
               Jinwook Shin},
  title     = {{ZDVUE:} prioritization of javascript attacks to discover new vulnerabilities},
  booktitle = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
               AISec 2011, Chicago, IL, USA, October 21, 2011},
  pages     = {31--42},
  year      = {2011},
  crossref  = {DBLP:conf/ccs/2011aisec},
  url       = {https://doi.org/10.1145/2046684.2046690},
  doi       = {10.1145/2046684.2046690},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/KaranthLNVLS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NaldurgR11,
  author    = {Prasad Naldurg and
               K. R. Raghavendra},
  title     = {{SEAL:} a logic programming framework for specifying and verifying
               access control models},
  booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages     = {83--92},
  year      = {2011},
  crossref  = {DBLP:conf/sacmat/2011},
  url       = {https://doi.org/10.1145/1998441.1998454},
  doi       = {10.1145/1998441.1998454},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/NaldurgR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/DasBN10,
  author    = {Tathagata Das and
               Ranjita Bhagwan and
               Prasad Naldurg},
  title     = {Baaz: {A} System for Detecting Access Control Misconfigurations},
  booktitle = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
               2010, Proceedings},
  pages     = {161--176},
  year      = {2010},
  crossref  = {DBLP:conf/uss/2010},
  url       = {http://www.usenix.org/events/sec10/tech/full\_papers/Das.pdf},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/DasBN10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigplan/ChaudhuriNR08,
  author    = {Avik Chaudhuri and
               Prasad Naldurg and
               Sriram K. Rajamani},
  title     = {A type system for data-flow integrity on Windows Vista},
  journal   = {{SIGPLAN} Notices},
  volume    = {43},
  number    = {12},
  pages     = {9--20},
  year      = {2008},
  url       = {https://doi.org/10.1145/1513443.1513447},
  doi       = {10.1145/1513443.1513447},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigplan/ChaudhuriNR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChaudhuriNRRV08,
  author    = {Avik Chaudhuri and
               Prasad Naldurg and
               Sriram K. Rajamani and
               G. Ramalingam and
               Lakshmisubrahmanyam Velaga},
  title     = {{EON:} modeling and analyzing dynamic access control systems with
               logic programs},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {381--390},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008},
  url       = {https://doi.org/10.1145/1455770.1455818},
  doi       = {10.1145/1455770.1455818},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChaudhuriNRRV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/JacobJNSV08,
  author    = {Matthias Jacob and
               Mariusz H. Jakubowski and
               Prasad Naldurg and
               Chit Wei Saw and
               Ramarathnam Venkatesan},
  title     = {The Superdiversifier: Peephole Individualization for Software Protection},
  booktitle = {Advances in Information and Computer Security, Third International
               Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
               2008. Proceedings},
  pages     = {100--120},
  year      = {2008},
  crossref  = {DBLP:conf/iwsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-89598-5\_7},
  doi       = {10.1007/978-3-540-89598-5\_7},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/JacobJNSV08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pldi/ChaudhuriNR08,
  author    = {Avik Chaudhuri and
               Prasad Naldurg and
               Sriram K. Rajamani},
  title     = {A type system for data-flow integrity on windows vista},
  booktitle = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
               for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  pages     = {89--100},
  year      = {2008},
  crossref  = {DBLP:conf/pldi/2008plas},
  url       = {https://doi.org/10.1145/1375696.1375708},
  doi       = {10.1145/1375696.1375708},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pldi/ChaudhuriNR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0803-3230,
  author    = {Avik Chaudhuri and
               Prasad Naldurg and
               Sriram K. Rajamani},
  title     = {A Type System for Data-Flow Integrity on Windows Vista},
  journal   = {CoRR},
  volume    = {abs/0803.3230},
  year      = {2008},
  url       = {http://arxiv.org/abs/0803.3230},
  archivePrefix = {arXiv},
  eprint    = {0803.3230},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-0803-3230},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LaxmanNSV07,
  author    = {Srivatsan Laxman and
               Prasad Naldurg and
               Raja Sripada and
               Ramarathnam Venkatesan},
  title     = {Connections between Mining Frequent Itemsets and Learning Generative
               Models},
  booktitle = {Proceedings of the 7th {IEEE} International Conference on Data Mining
               {(ICDM} 2007), October 28-31, 2007, Omaha, Nebraska, {USA}},
  pages     = {571--576},
  year      = {2007},
  crossref  = {DBLP:conf/icdm/2007},
  url       = {https://doi.org/10.1109/ICDM.2007.83},
  doi       = {10.1109/ICDM.2007.83},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdm/LaxmanNSV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JakubowskiNPV07,
  author    = {Mariusz H. Jakubowski and
               Prasad Naldurg and
               Vijay Patankar and
               Ramarathnam Venkatesan},
  title     = {Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection},
  booktitle = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
               France, June 11-13, 2007, Revised Selected Papers},
  pages     = {96--111},
  year      = {2007},
  crossref  = {DBLP:conf/ih/2007},
  url       = {https://doi.org/10.1007/978-3-540-77370-2\_7},
  doi       = {10.1007/978-3-540-77370-2\_7},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/JakubowskiNPV07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KapadiaNC07,
  author    = {Apu Kapadia and
               Prasad Naldurg and
               Roy H. Campbell},
  title     = {Distributed Enforcement of Unlinkability Policies: Looking Beyond
               the Chinese Wall},
  booktitle = {8th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  pages     = {141--150},
  year      = {2007},
  crossref  = {DBLP:conf/policy/2007},
  url       = {https://doi.org/10.1109/POLICY.2007.16},
  doi       = {10.1109/POLICY.2007.16},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/KapadiaNC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaldurgSRL06,
  author    = {Prasad Naldurg and
               Stefan Schwoon and
               Sriram K. Rajamani and
               John Lambert},
  title     = {\emph{NETRA}: : seeing through access control},
  booktitle = {Proceedings of the 2006 {ACM} workshop on Formal methods in security
               engineering, {FMSE} 2006, Alexandria, VA, USA, November 3, 2006},
  pages     = {55--66},
  year      = {2006},
  crossref  = {DBLP:conf/ccs/2006fmse},
  url       = {https://doi.org/10.1145/1180337.1180343},
  doi       = {10.1145/1180337.1180343},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/NaldurgSRL06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotnets/Ananthanarayanan06,
  author    = {Ganesh Ananthanarayanan and
               Ramarathnam Venkatesan and
               Prasad Naldurg and
               Sean Olin Blagsvedt and
               Adithya Hemakumar},
  title     = {{SPACE:} Secure Protocol for Address Book based Connection Establishment},
  booktitle = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
               California, USA, November 29-30, 2006},
  year      = {2006},
  crossref  = {DBLP:conf/hotnets/2006},
  url       = {http://conferences.sigcomm.org/hotnets/2006/ananthanarayanan06space.pdf},
  timestamp = {Mon, 21 Aug 2017 14:31:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/Ananthanarayanan06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spc/LeeBDNHC05,
  author    = {Adam J. Lee and
               Jodie P. Boyer and
               Chris Drexelius and
               Prasad Naldurg and
               Raquel L. Hill and
               Roy H. Campbell},
  title     = {Supporting Dynamically Changing Authorizations in Pervasive Communication
               Systems},
  booktitle = {Security in Pervasive Computing, Second International Conference,
               {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  pages     = {134--150},
  year      = {2005},
  crossref  = {DBLP:conf/spc/2005},
  url       = {https://doi.org/10.1007/978-3-540-32004-3\_15},
  doi       = {10.1007/978-3-540-32004-3\_15},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spc/LeeBDNHC05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsonline/HillACKNR04,
  author    = {Raquel L. Hill and
               Jalal Al{-}Muhtadi and
               Roy H. Campbell and
               Apu Kapadia and
               Prasad Naldurg and
               Anand Ranganathan},
  title     = {A Middleware Architecture for Securing Ubiquitous Computing Cyber
               Infrastructures},
  journal   = {{IEEE} Distributed Systems Online},
  volume    = {5},
  number    = {9},
  year      = {2004},
  url       = {https://doi.org/10.1109/MDSO.2004.21},
  doi       = {10.1109/MDSO.2004.21},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dsonline/HillACKNR04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/forte/NaldurgST04,
  author    = {Prasad Naldurg and
               Koushik Sen and
               Prasanna Thati},
  title     = {A Temporal Logic Based Framework for Intrusion Detection},
  booktitle = {Formal Techniques for Networked and Distributed Systems - {FORTE}
               2004, 24th {IFIP} {WG} 6.1 International Conference, Madrid Spain,
               September 27-30, 2004, Proceedings},
  pages     = {359--376},
  year      = {2004},
  crossref  = {DBLP:conf/forte/2004},
  url       = {https://doi.org/10.1007/978-3-540-30232-2\_23},
  doi       = {10.1007/978-3-540-30232-2\_23},
  timestamp = {Fri, 25 Aug 2017 06:45:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/forte/NaldurgST04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/KapadiaNC04,
  author    = {Apu Kapadia and
               Prasad Naldurg and
               Roy H. Campbell},
  title     = {Routing with Confidence: Supporting Discretionary Routing Requirements
               in Policy Based Networks},
  booktitle = {5th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
               {USA}},
  pages     = {45--54},
  year      = {2004},
  crossref  = {DBLP:conf/policy/2004},
  url       = {https://doi.org/10.1109/POLICY.2004.1309149},
  doi       = {10.1109/POLICY.2004.1309149},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/policy/KapadiaNC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NaldurgC03,
  author    = {Prasad Naldurg and
               Roy H. Campbell},
  title     = {Dynamic access control: preserving safety and trust for network defense
               operations},
  booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages     = {231--237},
  year      = {2003},
  crossref  = {DBLP:conf/sacmat/2003},
  url       = {https://doi.org/10.1145/775412.775442},
  doi       = {10.1145/775412.775442},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/NaldurgC03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SampemaneNC02,
  author    = {Geetanjali Sampemane and
               Prasad Naldurg and
               Roy H. Campbell},
  title     = {Access Control for Active Spaces},
  booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
               9-13 December 2002, Las Vegas, NV, {USA}},
  pages     = {343--352},
  year      = {2002},
  crossref  = {DBLP:conf/acsac/2002},
  url       = {https://doi.org/10.1109/CSAC.2002.1176306},
  doi       = {10.1109/CSAC.2002.1176306},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/SampemaneNC02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dance/NaldurgCM02,
  author    = {Prasad Naldurg and
               Roy H. Campbell and
               M. Dennis Mickunas},
  title     = {Developing Dynamic Security Policies},
  booktitle = {2002 {DARPA} Active Networks Conference and Exposition {(DANCE} 2002),
               29-31 May 2002, San Francisco, CA, {USA}},
  pages     = {204--215},
  year      = {2002},
  crossref  = {DBLP:conf/dance/2002},
  url       = {https://doi.org/10.1109/DANCE.2002.1003494},
  doi       = {10.1109/DANCE.2002.1003494},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dance/NaldurgCM02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isss2/CampbellANSM02,
  author    = {Roy H. Campbell and
               Jalal Al{-}Muhtadi and
               Prasad Naldurg and
               Geetanjali Sampemane and
               M. Dennis Mickunas},
  title     = {Towards Security and Privacy for Pervasive Computing},
  booktitle = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
               Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
               Papers},
  pages     = {1--15},
  year      = {2002},
  crossref  = {DBLP:conf/isss2/2002},
  url       = {https://doi.org/10.1007/3-540-36532-X\_1},
  doi       = {10.1007/3-540-36532-X\_1},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isss2/CampbellANSM02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobihoc/YiNK01,
  author    = {Seung Yi and
               Prasad Naldurg and
               Robin Kravets},
  title     = {Security-aware ad hoc routing for wireless networks},
  booktitle = {Proceedings of the 2nd {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2001, October 4-5, 2001, Long Beach,
               CA, {USA}},
  pages     = {299--302},
  year      = {2001},
  crossref  = {DBLP:conf/mobihoc/2001},
  url       = {https://doi.org/10.1145/501416.501464},
  doi       = {10.1145/501416.501464},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/YiNK01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/LiuCVNYM00,
  author    = {Zhaoyu Liu and
               Roy H. Campbell and
               Sudha K. Varadarjan and
               Prasad Naldurg and
               Seung Yi and
               M. Dennis Mickunas},
  title     = {Flexible Secure Multicasting in Active Networks},
  booktitle = {Proceedings of the 2000 {ICDCS} Workshops, April 10, 2000, Taipei,
               Taiwan, {ROC}},
  pages     = {C15--C22},
  year      = {2000},
  crossref  = {DBLP:conf/icdcsw/2000},
  timestamp = {Mon, 22 Mar 2004 09:40:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/LiuCVNYM00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/edbt/2018,
  editor    = {Michael H. B{\"{o}}hlen and
               Reinhard Pichler and
               Norman May and
               Erhard Rahm and
               Shan{-}Hung Wu and
               Katja Hose},
  title     = {Proceedings of the 21th International Conference on Extending Database
               Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018},
  publisher = {OpenProceedings.org},
  year      = {2018},
  isbn      = {978-3-89318-078-3},
  timestamp = {Fri, 16 Mar 2018 10:35:27 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/edbt/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016,
  editor    = {Elisa Bertino and
               Ravi Sandhu and
               Alexander Pretschner},
  title     = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2857705},
  isbn      = {978-1-4503-3935-3},
  timestamp = {Tue, 15 Mar 2016 09:10:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014,
  editor    = {Gail{-}Joon Ahn and
               Moti Yung and
               Ninghui Li},
  title     = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2660267},
  isbn      = {978-1-4503-2957-6},
  timestamp = {Mon, 10 Nov 2014 10:57:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/essos/2013,
  editor    = {Jan J{\"{u}}rjens and
               Benjamin Livshits and
               Riccardo Scandariato},
  title     = {Engineering Secure Software and Systems - 5th International Symposium,
               ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7781},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-36563-8},
  doi       = {10.1007/978-3-642-36563-8},
  isbn      = {978-3-642-36562-1},
  timestamp = {Wed, 17 May 2017 14:24:40 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/essos/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fsttcs/2013,
  editor    = {Anil Seth and
               Nisheeth K. Vishnoi},
  title     = {{IARCS} Annual Conference on Foundations of Software Technology and
               Theoretical Computer Science, {FSTTCS} 2013, December 12-14, 2013,
               Guwahati, India},
  series    = {LIPIcs},
  volume    = {24},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2013},
  url       = {http://drops.dagstuhl.de/portals/extern/index.php?semnr=13018},
  isbn      = {978-3-939897-64-4},
  timestamp = {Wed, 11 Dec 2013 14:43:09 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/fsttcs/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ndss/2013,
  title     = {20th Annual Network and Distributed System Security Symposium, {NDSS}
               2013, San Diego, California, USA, February 24-27, 2013},
  publisher = {The Internet Society},
  year      = {2013},
  url       = {https://www.ndss-symposium.org/ndss2013/},
  timestamp = {Tue, 16 Jan 2018 13:23:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ndss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2012,
  editor    = {Venkat N. Venkatakrishnan and
               Diganta Goswami},
  title     = {Information Systems Security, 8th International Conference, {ICISS}
               2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7671},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-35130-3},
  doi       = {10.1007/978-3-642-35130-3},
  isbn      = {978-3-642-35129-7},
  timestamp = {Wed, 24 May 2017 08:28:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iciss/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2011aisec,
  editor    = {Yan Chen and
               Alvaro A. C{\'{a}}rdenas and
               Rachel Greenstadt and
               Benjamin I. P. Rubinstein},
  title     = {Proceedings of the 4th {ACM} Workshop on Security and Artificial Intelligence,
               AISec 2011, Chicago, IL, USA, October 21, 2011},
  publisher = {{ACM}},
  year      = {2011},
  url       = {http://dl.acm.org/citation.cfm?id=2046684},
  isbn      = {978-1-4503-1003-1},
  timestamp = {Wed, 14 Nov 2012 14:02:02 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2011aisec},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2011,
  editor    = {Ruth Breu and
               Jason Crampton and
               Jorge Lobo},
  title     = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1998441},
  doi       = {10.1145/1998441},
  isbn      = {978-1-4503-0688-1},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/uss/2010,
  title     = {19th {USENIX} Security Symposium, Washington, DC, USA, August 11-13,
               2010, Proceedings},
  publisher = {{USENIX} Association},
  year      = {2010},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/uss/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008,
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-810-7},
  timestamp = {Tue, 11 Nov 2008 10:39:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2008,
  editor    = {Kanta Matsuura and
               Eiichiro Fujisaki},
  title     = {Advances in Information and Computer Security, Third International
               Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
               2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5312},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89598-5},
  doi       = {10.1007/978-3-540-89598-5},
  isbn      = {978-3-540-89597-8},
  timestamp = {Tue, 13 Jun 2017 10:37:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwsec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pldi/2008plas,
  editor    = {{\'{U}}lfar Erlingsson and
               Marco Pistoia},
  title     = {Proceedings of the 2008 Workshop on Programming Languages and Analysis
               for Security, {PLAS} 2008, Tucson, AZ, USA, June 8, 2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-936-4},
  timestamp = {Mon, 16 Jun 2008 11:50:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pldi/2008plas},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdm/2007,
  title     = {Proceedings of the 7th {IEEE} International Conference on Data Mining
               {(ICDM} 2007), October 28-31, 2007, Omaha, Nebraska, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4470209},
  isbn      = {0-7695-3018-4},
  timestamp = {Tue, 16 Sep 2014 18:00:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icdm/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2007,
  editor    = {Teddy Furon and
               Fran{\c{c}}ois Cayre and
               Gwena{\"{e}}l J. Do{\"{e}}rr and
               Patrick Bas},
  title     = {Information Hiding, 9th International Workshop, {IH} 2007, Saint Malo,
               France, June 11-13, 2007, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4567},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-77370-2},
  doi       = {10.1007/978-3-540-77370-2},
  isbn      = {978-3-540-77369-6},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ih/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2007,
  title     = {8th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2007), 13-15 June 2007, Bologna, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4262556},
  isbn      = {0-7695-2767-1},
  timestamp = {Wed, 25 Nov 2015 15:22:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006fmse,
  editor    = {Marianne Winslett and
               Andrew D. Gordon and
               David Sands},
  title     = {Proceedings of the 2006 {ACM} workshop on Formal methods in security
               engineering, {FMSE} 2006, Alexandria, VA, USA, November 3, 2006},
  publisher = {{ACM}},
  year      = {2006},
  isbn      = {1-59593-550-9},
  timestamp = {Mon, 11 Dec 2006 10:47:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2006fmse},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hotnets/2006,
  editor    = {Eddie Kohler and
               Greg Minshall},
  title     = {5th {ACM} Workshop on Hot Topics in Networks - HotNets-V, Irvine,
               California, USA, November 29-30, 2006},
  publisher = {{ACM} {SIGCOMM}},
  year      = {2006},
  timestamp = {Mon, 21 Aug 2017 14:31:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hotnets/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/spc/2005,
  editor    = {Dieter Hutter and
               Markus Ullmann},
  title     = {Security in Pervasive Computing, Second International Conference,
               {SPC} 2005, Boppard, Germany, April 6-8, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3450},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/b135497},
  doi       = {10.1007/b135497},
  isbn      = {3-540-25521-4},
  timestamp = {Tue, 30 May 2017 16:36:52 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/spc/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/forte/2004,
  editor    = {David de Frutos{-}Escrig and
               Manuel N{\'{u}}{\~{n}}ez},
  title     = {Formal Techniques for Networked and Distributed Systems - {FORTE}
               2004, 24th {IFIP} {WG} 6.1 International Conference, Madrid Spain,
               September 27-30, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3235},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b100576},
  doi       = {10.1007/b100576},
  isbn      = {3-540-23252-4},
  timestamp = {Fri, 25 Aug 2017 06:45:04 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/forte/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/policy/2004,
  title     = {5th {IEEE} International Workshop on Policies for Distributed Systems
               and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY,
               {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9150},
  isbn      = {0-7695-2141-X},
  timestamp = {Wed, 25 Nov 2015 15:22:51 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/policy/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2003,
  editor    = {Elena Ferrari and
               David F. Ferraiolo},
  title     = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  publisher = {{ACM}},
  year      = {2003},
  url       = {https://doi.org/10.1145/775412},
  doi       = {10.1145/775412},
  isbn      = {1-58113-681-1},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2002,
  title     = {18th Annual Computer Security Applications Conference {(ACSAC} 2002),
               9-13 December 2002, Las Vegas, NV, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=8386},
  isbn      = {0-7695-1828-1},
  timestamp = {Mon, 04 Aug 2014 17:08:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acsac/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dance/2002,
  title     = {2002 {DARPA} Active Networks Conference and Exposition {(DANCE} 2002),
               29-31 May 2002, San Francisco, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2002},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7864},
  isbn      = {0-7695-1564-9},
  timestamp = {Wed, 17 Feb 2016 12:58:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dance/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isss2/2002,
  editor    = {Mitsuhiro Okada and
               Benjamin C. Pierce and
               Andre Scedrov and
               Hideyuki Tokuda and
               Akinori Yonezawa},
  title     = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
               Symposium, {ISSS} 2002, Tokyo, Japan, November 8-10, 2002, Revised
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2609},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/3-540-36532-X},
  doi       = {10.1007/3-540-36532-X},
  isbn      = {3-540-00708-3},
  timestamp = {Mon, 29 May 2017 16:53:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/isss2/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobihoc/2001,
  title     = {Proceedings of the 2nd {ACM} Interational Symposium on Mobile Ad Hoc
               Networking and Computing, MobiHoc 2001, October 4-5, 2001, Long Beach,
               CA, {USA}},
  publisher = {{ACM}},
  year      = {2001},
  isbn      = {1-58113-428-2},
  timestamp = {Thu, 04 Dec 2003 14:50:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobihoc/2001},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icdcsw/2000,
  editor    = {Ten{-}Hwang Lai},
  title     = {Proceedings of the 2000 {ICDCS} Workshops, April 10, 2000, Taipei,
               Taiwan, {ROC}},
  year      = {2000},
  timestamp = {Mon, 22 Mar 2004 09:40:43 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/icdcsw/2000},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier