Improving the Security in Interconnecting Building Automation Systems to Outside Networks

Improving the Security in Interconnecting Building Automation Systems to Outside Networks
Hee Dong Jung
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 3:48 pm

Distributed Non-Intrusive Load Monitoring

Distributed Non-Intrusive Load Monitoring
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew Wright
IEEE/PES Conference on Innovative Smart Grid Technologies (ISGT ’11), Anaheim, CA, January 2011. [BIB][Related]

Last updated on Thursday, June 26, 2014, 1:01 pm

Non-Intrusive Load Shed Verification

Nonintrusive Load-Shed Verification
David C. Bergman, Dong Jin, Joshua P. Juen, Naoki Tanaka, Carl A. Gunter and Andrew K. Wright
IEEE Pervasive Computing, Special Issue on Smart Energy Systems, volume 10, number 1, pages 49-57, 2011. [BIB][Related]

Last updated on Thursday, June 26, 2014, 1:01 pm

Reflective Database Access Control

Reflective Database Access Control
Lars E. Olson
Doctoral Thesis, University of Illinois at Urbana-Champaign, October 2009. [PPT]

Last updated on Thursday, June 26, 2014, 12:59 pm

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems

Safety in Discretionary Access Control for Logic-based Publish-Subscribe Systems
Kazuhiro Minami, Nikita Borisov and Carl A. Gunter
ACM Access Control Models and Technologies (Sacmat ’09), Stresa, Italy, June 2009.

Last updated on Monday, July 25, 2011, 4:19 pm

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries

Confidentiality-Preserving Distributed Proofs of Conjunctive Queries,
Adam J. Lee, Kazuhiro Minami, and Nikita Borisov.
ACM Symposium on Information, Computer and Communication Security (ASIACCS ’09), Sydney Australia, March 2009.

Last updated on Sunday, October 16, 2011, 11:52 am

Collaborative Recommender Systems for Building Automation

Collaborative Recommender Systems for Building Automation
Michael LeMay, Jason J. Haas and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’09), Waikoloa, HI, January 2009. [PPT][BIB][Related]

Last updated on Monday, June 9, 2014, 2:35 pm

An Integrated Architecture for Demand Response Communications and Control

An Integrated Architecture for Demand Response Communications and Control (awarded best paper)
Michael LeMay, Rajesh Nelli, George Gross and Carl A. Gunter
IEEE Hawaii International Conference on System Sciences (HICSS ’08), Waikoloa, HI, January 2008. [PPT][BIB][Related]

Last updated on Thursday, June 26, 2014, 12:58 pm

Improving Multi-Tier Security Using Redundant Authentication

Improving Multi-Tier Security Using Redundant Authentication
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter and David Raila
ACM Computer Security Architecture Workshop (CSAW ’07), Fairfax, VA, November 2007. [PPT][BIB][PSTR]

Last updated on Thursday, June 26, 2014, 12:58 pm

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
Michael LeMay, Omid Fatemieh and Carl A. Gunter
ACM Symposium on Access Control Models And Technologies (SACMAT ’07), Sophia Antipolis, France, Jun 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:57 pm