Supporting Emergency-Response by Retasking Network Infrastructures

Supporting Emergency-Response by Retasking Network Infrastructures
Michael LeMay and Carl A. Gunter
ACM Workshop on Hot Topics in Networking (HotNets-VI), Atlanta, GA, November 2007. [PPT][BIB][Related]

Last updated on Thursday, June 26, 2014, 12:58 pm

Improving Multi-Tier Security Using Redundant Authentication

Improving Multi-Tier Security Using Redundant Authentication
Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter and David Raila
ACM Computer Security Architecture Workshop (CSAW ’07), Fairfax, VA, November 2007. [PPT][BIB][PSTR]

Last updated on Thursday, June 26, 2014, 12:58 pm

Reasoning about Concurrency for Security Tunnels

Reasoning about Concurrency for Security Tunnels
Alwyn E. Goodloe and Carl A. Gunter
IEEE Computer Security Foundations (CSF ’07), Venice, Italy, July 2007. [PPT][BBT]

Last updated on Thursday, June 26, 2014, 12:58 pm

Emergency Alerts as RSS Feeds with Interdomain Authorization

Emergency Alerts as RSS Feeds with Interdomain Authorization
Filippo Gioachin, Ravinder Shankesi, Michael J. May, Carl A. Gunter and Wook Shin
IARIA International Conference on Internet Monitoring and Protection (ICIMP ’07), Santa Clara, CA, July 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:57 pm

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework

PolicyMorph: Interactive Policy Transformations for a Logical Attribute-Based Access Control Framework
Michael LeMay, Omid Fatemieh and Carl A. Gunter
ACM Symposium on Access Control Models And Technologies (SACMAT ’07), Sophia Antipolis, France, Jun 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:57 pm

PAS: A Wireless-Enabled, Sensor-Integrated Personal Assistance System for Independent and Assisted Living

PAS: A Wireless-Enabled, Sensor-Integrated Personal Assistance System for Independent and Assisted Living
Jennifer C. Hou, Qixin Wang, Bedoor K. AlShebli, Linda Ball, Stanley Birge, Marco Caccamo, Chin-Fei Cheah, Eric Gilbert, Carl A. Gunter, Elsa Gunter, Chang-Gun Lee, Karrie Karahalios, Min-Young Nam, Narasimhan Nitya, Chaudhri Rohit, Lui Sha, Wook Shin, Sammy Yu, Yang Yu and Zheng Zeng
High Confidence Medical Device Software and Systems (HCMDSS ’07), Boston, MA, June 2007.

Last updated on Thursday, June 26, 2014, 12:57 pm

A Systematic Approach to Uncover Security Flaws in GUI Logic

A Systematic Approach to Uncover Security Flaws in GUI Logic
Shuo Chen, Jose Meseguer, Ralf Sasse, Helen J. Wang and Yi-Min Wang
IEEE Security and Privacy, Oakland CA, May 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:57 pm

On the Safety and Efficiency of Firewall Policy Deployment

On the Safety and Efficiency of Firewall Policy Deployment
Charles C. Zhang, Marianne Winslett and Carl A. Gunter
IEEE Security and Privacy, Oakland CA, May 2007. [PPT][BIB]

Last updated on Thursday, June 26, 2014, 12:53 pm

How Much Bandwidth Can Botnets Commandeer?

How Much Bandwidth Can Botnets Commandeer?Michael Greenwald, Sanjeev Khanna and Santosh Venkatesh
2nd Annual Information Theory and Applications Workshop, San Diego, CA, February 2007.

Last updated on Thursday, June 26, 2014, 12:52 pm

Fair Coalitions for Power-Aware Routing in Wireless Networks

Fair Coalitions for Power-Aware Routing in Wireless Networks
Ratul K. Guha, Carl A. Gunter and Saswati Sarkar
IEEE Transactions on Mobile Computing, volume 6, nubmer 2, pages 206-220, February 2007. [BIB]

Last updated on Thursday, June 26, 2014, 12:52 pm