BibTeX records: Csilla Farkas

download as .bib file

@article{DBLP:journals/tsc/RavanBF22,
  author       = {John Ravan and
                  Shankar M. Banik and
                  Csilla Farkas},
  title        = {Ensuring Consistent Transactions in a Web Service Environment With
                  Prediction-Based Performance Metrics},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {2},
  pages        = {1045--1058},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2020.2974733},
  doi          = {10.1109/TSC.2020.2974733},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/RavanBF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3k/RhujittawiwatSF22,
  author       = {Theppatorn Rhujittawiwat and
                  Ahmed Saaudi and
                  Csilla Farkas},
  editor       = {Jorge Bernardino and
                  Elio Masciari and
                  Colette Rolland and
                  Joaquim Filipe},
  title        = {Stream Data Access Control Model: The Need for Data Semantics},
  booktitle    = {Proceedings of the 14th International Joint Conference on Knowledge
                  Discovery, Knowledge Engineering and Knowledge Management, {IC3K}
                  2022, Volume 3: KMIS, Valletta, Malta, October 24-26, 2022},
  pages        = {19--30},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011528600003335},
  doi          = {10.5220/0011528600003335},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3k/RhujittawiwatSF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ir/QuLFR21,
  author       = {Xianshan Qu and
                  Xiaopeng Li and
                  Csilla Farkas and
                  John R. Rose},
  title        = {Review helpfulness evaluation and recommendation based on an attention
                  model of customer expectation},
  journal      = {Inf. Retr. J.},
  volume       = {24},
  number       = {1},
  pages        = {55--83},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10791-020-09385-x},
  doi          = {10.1007/S10791-020-09385-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ir/QuLFR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZengLQDLHF21,
  author       = {Qiang Zeng and
                  Lannan Luo and
                  Zhiyun Qian and
                  Xiaojiang Du and
                  Zhoujun Li and
                  Chin{-}Tser Huang and
                  Csilla Farkas},
  title        = {Resilient User-Side Android Application Repackaging and Tampering
                  Detection Using Cryptographically Obfuscated Logic Bombs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {6},
  pages        = {2582--2600},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2957787},
  doi          = {10.1109/TDSC.2019.2957787},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZengLQDLHF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/data/RhujittawiwatRS21,
  author       = {Theppatorn Rhujittawiwat and
                  John Ravan and
                  Ahmed Saaudi and
                  Shankar M. Banik and
                  Csilla Farkas},
  editor       = {Christoph Quix and
                  Slimane Hammoudi and
                  Wil M. P. van der Aalst},
  title        = {Database Recovery from Malicious Transactions: {A} Use of Provenance
                  Information},
  booktitle    = {Proceedings of the 10th International Conference on Data Science,
                  Technology and Applications, {DATA} 2021, Online Streaming, July 6-8,
                  2021},
  pages        = {39--48},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010553900390048},
  doi          = {10.5220/0010553900390048},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/data/RhujittawiwatRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijgs/AlsuwatAVF20,
  author       = {Emad Alsuwat and
                  Hatim Alsuwat and
                  Marco Valtorta and
                  Csilla Farkas},
  title        = {Adversarial data poisoning attacks against the {PC} learning algorithm},
  journal      = {Int. J. Gen. Syst.},
  volume       = {49},
  number       = {1},
  pages        = {3--31},
  year         = {2020},
  url          = {https://doi.org/10.1080/03081079.2019.1630401},
  doi          = {10.1080/03081079.2019.1630401},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijgs/AlsuwatAVF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecir/QuLFR20,
  author       = {Xianshan Qu and
                  Xiaopeng Li and
                  Csilla Farkas and
                  John R. Rose},
  editor       = {Joemon M. Jose and
                  Emine Yilmaz and
                  Jo{\~{a}}o Magalh{\~{a}}es and
                  Pablo Castells and
                  Nicola Ferro and
                  M{\'{a}}rio J. Silva and
                  Fl{\'{a}}vio Martins},
  title        = {An Attention Model of Customer Expectation to Improve Review Helpfulness
                  Prediction},
  booktitle    = {Advances in Information Retrieval - 42nd European Conference on {IR}
                  Research, {ECIR} 2020, Lisbon, Portugal, April 14-17, 2020, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12035},
  pages        = {836--851},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45439-5\_55},
  doi          = {10.1007/978-3-030-45439-5\_55},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ecir/QuLFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AlsuwatARVF19,
  author       = {Emad Alsuwat and
                  Hatim Alsuwat and
                  John R. Rose and
                  Marco Valtorta and
                  Csilla Farkas},
  editor       = {Simon N. Foley},
  title        = {Detecting Adversarial Attacks in the Context of Bayesian Networks},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_1},
  doi          = {10.1007/978-3-030-22479-0\_1},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AlsuwatARVF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/GengAHF19,
  author       = {Tieming Geng and
                  Hatim Alsuwat and
                  Chin{-}Tser Huang and
                  Csilla Farkas},
  title        = {Securing Relational Database Storage with Attribute Association Aware
                  Shuffling},
  booktitle    = {2019 {IEEE} Conference on Dependable and Secure Computing, {DSC} 2019,
                  Hangzhou, China, November 18-20, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSC47296.2019.8937694},
  doi          = {10.1109/DSC47296.2019.8937694},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/desec/GengAHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic3k/AlsuwatAVRF19,
  author       = {Hatim Alsuwat and
                  Emad Alsuwat and
                  Marco Valtorta and
                  John R. Rose and
                  Csilla Farkas},
  editor       = {Ana L. N. Fred and
                  Joaquim Filipe},
  title        = {Modeling Concept Drift in the Context of Discrete Bayesian Networks},
  booktitle    = {Proceedings of the 11th International Joint Conference on Knowledge
                  Discovery, Knowledge Engineering and Knowledge Management, {IC3K}
                  2019, Volume 1: KDIR, Vienna, Austria, September 17-19, 2019},
  pages        = {214--224},
  publisher    = {ScitePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0008384702140224},
  doi          = {10.5220/0008384702140224},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ic3k/AlsuwatAVRF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/AlsuwatAGHF19,
  author       = {Hatim Alsuwat and
                  Emad Alsuwat and
                  Tieming Geng and
                  Chin{-}Tser Huang and
                  Csilla Farkas},
  title        = {Data Dependencies Preserving Shuffle in Relational Database},
  booktitle    = {2nd International Conference on Data Intelligence and Security, {ICDIS}
                  2019, South Padre Island, TX, USA, June 28-30, 2019},
  pages        = {180--187},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDIS.2019.00034},
  doi          = {10.1109/ICDIS.2019.00034},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdis/AlsuwatAGHF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Al-WahahSF19,
  author       = {Mouiad Al{-}Wahah and
                  Ahmed Saaudi and
                  Csilla Farkas},
  editor       = {Mohammad S. Obaidat and
                  Pierangela Samarati},
  title        = {Semantic-based Obligation for Context-Based Access Control},
  booktitle    = {Proceedings of the 16th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2019 - Volume 2: SECRYPT, Prague,
                  Czech Republic, July 26-28, 2019},
  pages        = {535--540},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0008120105350540},
  doi          = {10.5220/0008120105350540},
  timestamp    = {Tue, 06 Jun 2023 14:58:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Al-WahahSF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Al-WahahF19,
  author       = {Mouiad Al{-}Wahah and
                  Csilla Farkas},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Monotonic and Non-monotonic Context Delegation},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {449--460},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007400904490460},
  doi          = {10.5220/0007400904490460},
  timestamp    = {Wed, 05 Jun 2019 13:01:15 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Al-WahahF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/SaaudiTF19,
  author       = {Ahmed Saaudi and
                  Yan Tong and
                  Csilla Farkas},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Probabilistic Graphical Model on Detecting Insiders: Modeling with
                  {SGD-HMM}},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {461--470},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007404004610470},
  doi          = {10.5220/0007404004610470},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/SaaudiTF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/DanielsRF18,
  author       = {Mark Daniels and
                  John R. Rose and
                  Csilla Farkas},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Protecting Patients' Data: An Efficient Method for Health Data Privacy},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {9:1--9:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230865},
  doi          = {10.1145/3230833.3230865},
  timestamp    = {Wed, 10 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/DanielsRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bhi/DanielsF18,
  author       = {Mark Daniels and
                  Csilla Farkas},
  title        = {Health data privacy: {A} case of undesired inferences},
  booktitle    = {2018 {IEEE} {EMBS} International Conference on Biomedical {\&}
                  Health Informatics, {BHI} 2018, Las Vegas, NV, USA, March 4-7, 2018},
  pages        = {291--294},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BHI.2018.8333426},
  doi          = {10.1109/BHI.2018.8333426},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/bhi/DanielsF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/AlsuwatAVF18,
  author       = {Emad Alsuwat and
                  Hatim Alsuwat and
                  Marco Valtorta and
                  Csilla Farkas},
  editor       = {Carlos Alzate and
                  Anna Monreale and
                  Haytham Assem and
                  Albert Bifet and
                  Teodora Sandra Buda and
                  Bora Caglayan and
                  Brett Drury and
                  Eva Garc{\'{\i}}a{-}Mart{\'{\i}}n and
                  Ricard Gavald{\`{a}} and
                  Stefan Kramer and
                  Niklas Lavesson and
                  Michael Madden and
                  Ian M. Molloy and
                  Maria{-}Irina Nicolae and
                  Mathieu Sinn},
  title        = {Cyber Attacks Against the {PC} Learning Algorithm},
  booktitle    = {{ECML} {PKDD} 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood
                  2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September
                  10-14, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11329},
  pages        = {159--176},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-13453-2\_13},
  doi          = {10.1007/978-3-030-13453-2\_13},
  timestamp    = {Wed, 02 Jun 2021 09:13:31 +0200},
  biburl       = {https://dblp.org/rec/conf/pkdd/AlsuwatAVF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkdd/Al-WahahF18,
  author       = {Mouiad Al{-}Wahah and
                  Csilla Farkas},
  editor       = {Carlos Alzate and
                  Anna Monreale and
                  Haytham Assem and
                  Albert Bifet and
                  Teodora Sandra Buda and
                  Bora Caglayan and
                  Brett Drury and
                  Eva Garc{\'{\i}}a{-}Mart{\'{\i}}n and
                  Ricard Gavald{\`{a}} and
                  Stefan Kramer and
                  Niklas Lavesson and
                  Michael Madden and
                  Ian M. Molloy and
                  Maria{-}Irina Nicolae and
                  Mathieu Sinn},
  title        = {Context Delegation for Context-Based Access Control},
  booktitle    = {{ECML} {PKDD} 2018 Workshops - Nemesis 2018, UrbReas 2018, SoGood
                  2018, IWAISe 2018, and Green Data Mining 2018, Dublin, Ireland, September
                  10-14, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11329},
  pages        = {201--210},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-13453-2\_16},
  doi          = {10.1007/978-3-030-13453-2\_16},
  timestamp    = {Tue, 19 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkdd/Al-WahahF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/DiaF15,
  author       = {Ousmane Amadou Dia and
                  Csilla Farkas},
  title        = {Risk Aware Query Replacement Approach for Secure Databases Performance
                  Management},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {2},
  pages        = {217--229},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2306675},
  doi          = {10.1109/TDSC.2014.2306675},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/DiaF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisp/DiaF13,
  author       = {Ousmane Amadou Dia and
                  Csilla Farkas},
  title        = {Business Driven User Role Assignment: Nimble Adaptation of {RBAC}
                  to Organizational Changes},
  journal      = {Int. J. Inf. Secur. Priv.},
  volume       = {7},
  number       = {1},
  pages        = {45--62},
  year         = {2013},
  url          = {https://doi.org/10.4018/jisp.2013010104},
  doi          = {10.4018/JISP.2013010104},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisp/DiaF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlmstedF13,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  title        = {Web Service constraint optimization},
  booktitle    = {8th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2013, London, United Kingdom, December 9-12, 2013},
  pages        = {270--275},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICITST.2013.6750204},
  doi          = {10.1109/ICITST.2013.6750204},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icitst/OlmstedF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/OlmstedF13,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  title        = {Coarse Grained Web Service Availability, Consistency, and Durability},
  booktitle    = {2013 {IEEE} 20th International Conference on Web Services, Santa Clara,
                  CA, USA, June 28 - July 3, 2013},
  pages        = {619--620},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICWS.2013.91},
  doi          = {10.1109/ICWS.2013.91},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/OlmstedF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itng/FarkasV13,
  author       = {Csilla Farkas and
                  Sidney Valentine},
  editor       = {Shahram Latifi},
  title        = {Software Safety and Security for Programmable Logic Controllers},
  booktitle    = {Tenth International Conference on Information Technology: New Generations,
                  {ITNG} 2013, 15-17 April, 2013, Las Vegas, Nevada, {USA}},
  pages        = {639},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ITNG.2013.98},
  doi          = {10.1109/ITNG.2013.98},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itng/FarkasV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsse/DiaF12,
  author       = {Ousmane Amadou Dia and
                  Csilla Farkas},
  title        = {A Practical Framework for Policy Composition and Conflict Resolution},
  journal      = {Int. J. Secur. Softw. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {1--26},
  year         = {2012},
  url          = {https://doi.org/10.4018/jsse.2012100101},
  doi          = {10.4018/JSSE.2012100101},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsse/DiaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icitst/OlmstedF12,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  editor       = {Nick Savage and
                  Safwan El Assad and
                  Charles A. Shoniregun},
  title        = {High volume web service resource consumption},
  booktitle    = {7th International Conference for Internet Technology and Secured Transactions,
                  {ICITST} 2012, London, United Kingdom, December 10-12, 2012},
  pages        = {275--280},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6470959/},
  timestamp    = {Thu, 10 Mar 2022 09:31:39 +0100},
  biburl       = {https://dblp.org/rec/conf/icitst/OlmstedF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/OlmstedF12,
  author       = {Aspen Olmsted and
                  Csilla Farkas},
  editor       = {Chengcui Zhang and
                  James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham},
  title        = {The cost of increased transactional correctness and durability in
                  distributed databases},
  booktitle    = {{IEEE} 13th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},
  pages        = {441--448},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IRI.2012.6303042},
  doi          = {10.1109/IRI.2012.6303042},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/OlmstedF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/StalveyFE12,
  author       = {RoxAnn H. Stalvey and
                  Csilla Farkas and
                  Caroline M. Eastman},
  editor       = {Chengcui Zhang and
                  James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham},
  title        = {First use: Introducing information security in high school oracle
                  academy courses},
  booktitle    = {{IEEE} 13th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},
  pages        = {653--658},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IRI.2012.6303071},
  doi          = {10.1109/IRI.2012.6303071},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/StalveyFE12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/KopylovaFX11,
  author       = {Yuliya Kopylova and
                  Csilla Farkas and
                  Wenyuan Xu},
  editor       = {Yingjiu Li},
  title        = {Accurate Accident Reconstruction in {VANET}},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {271--279},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_23},
  doi          = {10.1007/978-3-642-22348-8\_23},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/KopylovaFX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ValentineF11,
  author       = {Sidney Valentine and
                  Csilla Farkas},
  title        = {Software security: Application-level vulnerabilities in {SCADA} systems},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada,
                  {USA}},
  pages        = {498--499},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IRI.2011.6009603},
  doi          = {10.1109/IRI.2011.6009603},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ValentineF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TolandFE10,
  author       = {Tyrone S. Toland and
                  Csilla Farkas and
                  Caroline M. Eastman},
  title        = {The inference problem: Maintaining maximal availability in the presence
                  of database updates},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {88--103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.004},
  doi          = {10.1016/J.COSE.2009.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TolandFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Jafari-laftiHF09,
  author       = {Maryam Jafari{-}lafti and
                  Chin{-}Tser Huang and
                  Csilla Farkas},
  title        = {{P2F:} {A} User-Centric Privacy Protection Framework},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {386--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.167},
  doi          = {10.1109/ARES.2009.167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Jafari-laftiHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/FarkasH08,
  author       = {Csilla Farkas and
                  Michael N. Huhns},
  title        = {Securing Enterprise Applications: Service-Oriented Security {(SOS)}},
  booktitle    = {10th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2008) / 5th {IEEE} International Conference on Enterprise Computing,
                  E-Commerce and E-Services {(EEE} 2008), July 21-14, 2008, Washington,
                  DC, {USA}},
  pages        = {428--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CECandEEE.2008.151},
  doi          = {10.1109/CECANDEEE.2008.151},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/FarkasH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0809-5266,
  author       = {Vaibhav Gowadia and
                  Csilla Farkas and
                  Michiharu Kudo},
  title        = {Checking Security Policy Compliance},
  journal      = {CoRR},
  volume       = {abs/0809.5266},
  year         = {2008},
  url          = {http://arxiv.org/abs/0809.5266},
  eprinttype    = {arXiv},
  eprint       = {0809.5266},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0809-5266.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/PamunuwaWF07,
  author       = {Hasika Pamunuwa and
                  Duminda Wijesekera and
                  Csilla Farkas},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {An Intrusion Detection System for Detecting Phishing Attacks},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {181--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_13},
  doi          = {10.1007/978-3-540-75248-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/PamunuwaWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/LazaF07,
  author       = {Katalin Anna L{\'{a}}z{\'{a}} and
                  Csilla Farkas},
  editor       = {Mariemma Inmaculada Yag{\"{u}}e del Valle and
                  Eduardo Fern{\'{a}}ndez{-}Medina},
  title        = {Security in T\({}_{\mbox{ci}}\)NMP Systems},
  booktitle    = {Security in Information Systems, Proceedings of the 5th International
                  Workshop on Security in Information Systems, {WOSIS} 2007, In conjunction
                  with {ICEIS} 2007, Funchal, Madeira, Portugal, June 2007},
  pages        = {95--104},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Thu, 24 Jan 2008 19:53:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/LazaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/HartongGFW07,
  author       = {Mark Hartong and
                  Rajni Goel and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {{PTC-VANET} Interactions to Prevent Highway Rail Intersection Crossing
                  Accidents},
  booktitle    = {Proceedings of the 65th {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2007, 22-25 April 2007, Dublin, Ireland},
  pages        = {2550--2554},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/VETECS.2007.525},
  doi          = {10.1109/VETECS.2007.525},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/HartongGFW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/AlghathbarFW06,
  author       = {Khaled Alghathbar and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {Securing {UML} Information Flow Using FlowUML},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {38},
  number       = {1},
  year         = {2006},
  url          = {http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.111.pdf},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/AlghathbarFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acj/GowadiaF06,
  author       = {Vaibhav Gowadia and
                  Csilla Farkas},
  title        = {Tree Automata for Schema-Level Filtering of {XML} Associations},
  journal      = {J. Res. Pract. Inf. Technol.},
  volume       = {38},
  number       = {1},
  year         = {2006},
  url          = {http://www.jrpit.acs.org.au/jrpit/JRPITVolumes/JRPIT38/JRPIT38.1.97.pdf},
  timestamp    = {Thu, 26 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acj/GowadiaF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KodaliFW06,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {uSMIL: Towards secure unbreakable semantics in multimedia web services},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {21},
  number       = {5},
  year         = {2006},
  timestamp    = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csse/KodaliFW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/ZieglerFL06,
  author       = {G{\'{a}}bor Ziegler and
                  Csilla Farkas and
                  Andr{\'{a}}s L{\"{o}}rincz},
  title        = {A framework for anonymous but accountable self-organizing communities},
  journal      = {Inf. Softw. Technol.},
  volume       = {48},
  number       = {8},
  pages        = {726--744},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.infsof.2005.08.007},
  doi          = {10.1016/J.INFSOF.2005.08.007},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/ZieglerFL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/FarkasBJ06,
  author       = {Csilla Farkas and
                  Alexander Brodsky and
                  Sushil Jajodia},
  title        = {Unauthorized inferences in semistructured databases},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {22},
  pages        = {3269--3299},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2006.01.004},
  doi          = {10.1016/J.INS.2006.01.004},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/FarkasBJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fois/KaushikFWA06,
  author       = {Saket Kaushik and
                  Csilla Farkas and
                  Duminda Wijesekera and
                  Paul Ammann},
  editor       = {Brandon Bennett and
                  Christiane Fellbaum},
  title        = {An Algebra for Composing Ontologies},
  booktitle    = {Formal Ontology in Information Systems, Proceedings of the Fourth
                  International Conference, {FOIS} 2006, Baltimore, Maryland, USA, November
                  9-11, 2006},
  series       = {Frontiers in Artificial Intelligence and Applications},
  volume       = {150},
  pages        = {265--276},
  publisher    = {{IOS} Press},
  year         = {2006},
  url          = {http://www.booksonline.iospress.nl/Content/View.aspx?piid=2213},
  timestamp    = {Tue, 13 Mar 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fois/KaushikFWA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BowlesEF06,
  author       = {John B. Bowles and
                  Caroline M. Eastman and
                  Csilla Farkas},
  title        = {Engaging undergraduates in computer security research},
  booktitle    = {Proceedings of the 3rd Annual Conference on Information Security Curriculum
                  Development, InfoSecCD 2006, Kennesaw, Georgia, USA, September 22-23,
                  2006},
  pages        = {184--190},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1231047.1231061},
  doi          = {10.1145/1231047.1231061},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BowlesEF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JainF06,
  author       = {Amit Jain and
                  Csilla Farkas},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Secure resource description framework: an access control model},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {121--129},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133076},
  doi          = {10.1145/1133058.1133076},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/JainF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GowadiaFV05,
  author       = {Vaibhav Gowadia and
                  Csilla Farkas and
                  Marco Valtorta},
  title        = {{PAID:} {A} Probabilistic Agent-Based Intrusion Detection system},
  journal      = {Comput. Secur.},
  volume       = {24},
  number       = {7},
  pages        = {529--545},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.cose.2005.06.008},
  doi          = {10.1016/J.COSE.2005.06.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GowadiaFV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jods/KodaliFW05,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {Enforcing Semantics-Aware Security in Multimedia Surveillance},
  journal      = {J. Data Semant.},
  volume       = {2},
  pages        = {199--221},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30567-5\_8},
  doi          = {10.1007/978-3-540-30567-5\_8},
  timestamp    = {Wed, 16 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jods/KodaliFW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ceemas/PalotaiFL05,
  author       = {Zsolt Palotai and
                  Csilla Farkas and
                  Andr{\'{a}}s L{\"{o}}rincz},
  editor       = {Michal Pechoucek and
                  Paolo Petta and
                  L{\'{a}}szl{\'{o}} Zsolt Varga},
  title        = {Selection in Scale-Free Small World},
  booktitle    = {Multi-Agent Systems and Applications IV, 4th International Central
                  and Eastern European Conference on Multi-Agent Systems, {CEEMAS} 2005,
                  Budapest, Hungary, September 15-17, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3690},
  pages        = {579--582},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11559221\_65},
  doi          = {10.1007/11559221\_65},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ceemas/PalotaiFL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YounFT05,
  author       = {Inja Youn and
                  Csilla Farkas and
                  Bhavani Thuraisingham},
  editor       = {Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Multilevel Secure Teleconferencing over Public Switched Telephone
                  Network},
  booktitle    = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Storrs, CT, USA, August
                  7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3654},
  pages        = {99--113},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535706\_8},
  doi          = {10.1007/11535706\_8},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/YounFT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/TolandFE05,
  author       = {Tyrone S. Toland and
                  Csilla Farkas and
                  Caroline M. Eastman},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Dynamic Disclosure Monitor (\emph{D}\({}^{\mbox{\emph{2}}}\)\emph{Mon}):
                  An Improved Query Processing Solution},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {124--142},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_9},
  doi          = {10.1007/11552338\_9},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/TolandFE05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/GowadiaF05,
  author       = {Vaibhav Gowadia and
                  Csilla Farkas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Luis Javier Garc{\'{\i}}a Castro},
  title        = {Tree Automata for Schema-level Filtering of {XML} Associations},
  booktitle    = {Security in Information Systems, Proceedings of the 3rd International
                  Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction
                  with ICEIS2005, Miami, USA, May 2005},
  pages        = {136--145},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Wed, 06 Feb 2008 19:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/sis/GowadiaF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sis/AlghathbarWF05,
  author       = {Khaled Alghathbar and
                  Duminda Wijesekera and
                  Csilla Farkas},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Julio C{\'{e}}sar Hern{\'{a}}ndez Castro and
                  Luis Javier Garc{\'{\i}}a Castro},
  title        = {Secure {UML} Information Flow using FlowUML},
  booktitle    = {Security in Information Systems, Proceedings of the 3rd International
                  Workshop on Security in Information Systems, {WOSIS} 2005, In conjunction
                  with ICEIS2005, Miami, USA, May 2005},
  pages        = {229--238},
  publisher    = {{INSTICC} Press},
  year         = {2005},
  timestamp    = {Wed, 29 Jun 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sis/AlghathbarWF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0504063,
  author       = {Zsolt Palotai and
                  Csilla Farkas and
                  Andr{\'{a}}s L{\"{o}}rincz},
  title        = {Selection in Scale-Free Small World},
  journal      = {CoRR},
  volume       = {abs/cs/0504063},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0504063},
  eprinttype    = {arXiv},
  eprint       = {cs/0504063},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0504063.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/KodaliFW04,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {Specifying multimedia access control using {RDF}},
  journal      = {Comput. Syst. Sci. Eng.},
  volume       = {19},
  number       = {3},
  year         = {2004},
  timestamp    = {Tue, 20 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csse/KodaliFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/StoicaF04,
  author       = {Andrei Stoica and
                  Csilla Farkas},
  title        = {Ontology Guided {XML} Security Engine},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {23},
  number       = {3},
  pages        = {209--223},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:JIIS.0000047392.50246.77},
  doi          = {10.1023/B:JIIS.0000047392.50246.77},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/StoicaF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/KodaliFW04,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  title        = {An authorization model for multimedia digital libraries},
  journal      = {Int. J. Digit. Libr.},
  volume       = {4},
  number       = {3},
  pages        = {139--155},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00799-004-0080-1},
  doi          = {10.1007/S00799-004-0080-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/KodaliFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/KodaliFW04,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  editor       = {Hsinchun Chen and
                  Reagan W. Moore and
                  Daniel Dajun Zeng and
                  John Leavitt},
  title        = {\emph{SECRETS}: {A} Secure Real-Time Multimedia Surveillance System},
  booktitle    = {Intelligence and Security Informatics, Second Symposium on Intelligence
                  and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3073},
  pages        = {278--296},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25952-7\_21},
  doi          = {10.1007/978-3-540-25952-7\_21},
  timestamp    = {Tue, 24 May 2022 18:11:09 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/KodaliFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/FarkasWMW04,
  author       = {Csilla Farkas and
                  Thomas C. Wingfield and
                  James Bret Michael and
                  Duminda Wijesekera},
  editor       = {Hsinchun Chen and
                  Reagan W. Moore and
                  Daniel Dajun Zeng and
                  John Leavitt},
  title        = {{THEMIS:} Threat Evaluation Metamodel for Information Systems},
  booktitle    = {Intelligence and Security Informatics, Second Symposium on Intelligence
                  and Security Informatics, {ISI} 2004, Tucson, AZ, USA, June 10-11,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3073},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-25952-7\_23},
  doi          = {10.1007/978-3-540-25952-7\_23},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/FarkasWMW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/KodaliFW04,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  editor       = {Vijay Atluri},
  title        = {Creating non-decomposable stream bundles in multimedia web services
                  using uSMIL},
  booktitle    = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS}
                  2004, Fairfax, VA, USA, October 29, 2004},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1111348.1111356},
  doi          = {10.1145/1111348.1111356},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/KodaliFW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/FarkasGJR04,
  author       = {Csilla Farkas and
                  Vaibhav Gowadia and
                  Amit Jain and
                  D. Roy},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {From {XML} to {RDF:} Syntax, Semantics, Security, and Integrity (Invited
                  Paper)},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_3},
  doi          = {10.1007/0-387-31167-X\_3},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/FarkasGJR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2004,
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  isbn         = {1-4020-8127-8},
  timestamp    = {Wed, 29 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FarkasS03,
  author       = {Csilla Farkas and
                  Andrei Stoica},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Correlated Data Inference},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {119--132},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_9},
  doi          = {10.1007/1-4020-8070-0\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FarkasS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/KodaliFW03,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {Multimedia Access Control Using {RDF} Metadata},
  booktitle    = {On The Move to Meaningful Internet Systems 2003: {OTM} 2003 Workshops,
                  {OTM} Confederated International Workshops, HCI-SWWA, IPW, JTRES,
                  WORM, WMS, and {WRSM} 2003, Catania, Sicily, Italy, November 3-7,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2889},
  pages        = {718--731},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39962-9\_73},
  doi          = {10.1007/978-3-540-39962-9\_73},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/KodaliFW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/KodaliFW03,
  author       = {Naren Kodali and
                  Csilla Farkas and
                  Duminda Wijesekera},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {Enforcing Integrity in Multimedia Surveillance},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {67--81},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_5},
  doi          = {10.1007/1-4020-7901-X\_5},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/KodaliFW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xmlsec/GowadiaF03,
  author       = {Vaibhav Gowadia and
                  Csilla Farkas},
  editor       = {Sushil Jajodia and
                  Michiharu Kudo},
  title        = {{RDF} metadata for {XML} access control},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax,
                  VA, USA, October 31, 2003},
  pages        = {39--48},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/968559.968567},
  doi          = {10.1145/968559.968567},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xmlsec/GowadiaF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/FarkasH02,
  author       = {Csilla Farkas and
                  Michael N. Huhns},
  title        = {Making Agents Secure on the Semantic Web},
  journal      = {{IEEE} Internet Comput.},
  volume       = {6},
  number       = {6},
  pages        = {76--79},
  year         = {2002},
  url          = {https://doi.org/10.1109/MIC.2002.1067741},
  doi          = {10.1109/MIC.2002.1067741},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/FarkasH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigkdd/FarkasJ02,
  author       = {Csilla Farkas and
                  Sushil Jajodia},
  title        = {The Inference Problem: {A} Survey},
  journal      = {{SIGKDD} Explor.},
  volume       = {4},
  number       = {2},
  pages        = {6--11},
  year         = {2002},
  url          = {https://doi.org/10.1145/772862.772864},
  doi          = {10.1145/772862.772864},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigkdd/FarkasJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/StoicaF02,
  author       = {Andrei Stoica and
                  Csilla Farkas},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Secure {XML} Views},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {133--146},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/StoicaF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/FarkasZML02,
  author       = {Csilla Farkas and
                  G{\'{a}}bor Ziegler and
                  Attila Meretei and
                  Andr{\'{a}}s L{\"{o}}rincz},
  editor       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Anonymity and accountability in self-organizing electronic communities},
  booktitle    = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/644527.644536},
  doi          = {10.1145/644527.644536},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/FarkasZML02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/FarkasTE01,
  author       = {Csilla Farkas and
                  Tyrone S. Toland and
                  Caroline M. Eastman},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {The Inference Problem and Updates in Relational Databases},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {181--194},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 13:50:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/FarkasTE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BrodskyFJ00,
  author       = {Alexander Brodsky and
                  Csilla Farkas and
                  Sushil Jajodia},
  title        = {Secure Databases: Constraints, Inference Channels, and Monitoring
                  Disclosures},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {12},
  number       = {6},
  pages        = {900--919},
  year         = {2000},
  url          = {https://doi.org/10.1109/69.895801},
  doi          = {10.1109/69.895801},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/BrodskyFJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/BrodskyFWW00,
  author       = {Alexander Brodsky and
                  Csilla Farkas and
                  Duminda Wijesekera and
                  Xiaoyang Sean Wang},
  editor       = {Rina Dechter},
  title        = {Constraints, Inference Channels and Secure Databases},
  booktitle    = {Principles and Practice of Constraint Programming - {CP} 2000, 6th
                  International Conference, Singapore, September 18-21, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1894},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45349-0\_9},
  doi          = {10.1007/3-540-45349-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cp/BrodskyFWW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics