Reliable Telemetry in White Spaces using Remote Attestation

Reliable Telemetry in White Spaces using Remote Attestation
Omid Fatemieh, Michael LeMay, and Carl A. Gunter
Annual Computer Security Applications Conference (ACSAC ’11), Orlando, FL, December 2011. [PPT][BIB][Related]

Last updated on Tuesday, December 13, 2011, 12:15 pm

Assuring Network Service with Bandwidth and Integrity Based Fairness

Assuring Network Service with Bandwidth and Integrity Based Fairness
Fariba Khan
Doctoral Thesis, University of Illinois at Urbana-Champaign, November 2011. [BIB]

Last updated on Thursday, December 8, 2011, 10:12 am

Role Prediction using Electronic Medical Record System Audits

Role Prediction using Electronic Medical Record System Audits
Wen Zhang, Carl A. Gunter, David Liebovitz, Jian Tian, and Bradley Malin
AMIA 2011 Annual Symposium, Washington, DC, October 2011. [PPT][BIB]

Last updated on Wednesday, December 7, 2011, 3:25 pm

Experience-Based Access Management

Experience-Based Access Management: A Life-Cycle Framework for Identity and Access Management Systems
Carl A. Gunter, David M. Liebovitz, and Bradley Malin
IEEE Security & Privacy, volume 9, number 5, September/October 2011. [BIB]

Last updated on Friday, July 20, 2012, 9:07 am

Compact Integrity-Aware Architectures

Compact Integrity-Aware Architectures
Michael LeMay
Doctoral Thesis, University of Illinois at Urbana-Champaign, August 2011. [BIB][Related]

Last updated on Wednesday, December 7, 2011, 3:33 pm

Automated Framework for Formal Operator Task Analysis

Automated Framework for Formal Operator Task Analysis
Ayesha Yasmeen and Elsa L. Gunter
ACM International Symposium on Software Testing and Analysis (ISSTA ’11), Toronto, Canada, July 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 3:46 pm

Improving the Security in Interconnecting Building Automation Systems to Outside Networks

Improving the Security in Interconnecting Building Automation Systems to Outside Networks
Hee Dong Jung
Master of Science Thesis, University of Illinois at Urbana-Champaign, July 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 3:48 pm

Enforcing Executing-Implies-Verified with the Integrity-Aware Processor

Enforcing Executing-Implies-Verified with the Integrity-Aware Processor
Michael LeMay and Carl A. Gunter
International Conference on Trust and Trustworthy Computing (TRUST ’11), Pittsburgh, PA, June 2011. [PPT][BIB][Related]
The original publication is available at www.springerlink.com.

Last updated on Thursday, March 22, 2012, 11:08 pm

Formalizing Operator Task Analysis

Formalizing Operator Task Analysis
Ayesha Yasmeen
Doctoral Thesis, University of Illinois at Urbana-Champaign, June 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 3:55 pm

Making DTNs Robust Against Spoofing Attacks

Making DTNs Robust Against Spoofing Attacks with Localized Countermeasures
Md Yusuf Sarwar Uddin, Ahmed Khurshid, Hee Dong Jung, Carl Gunter, Matthew Caesar and Tarek Abdelzaher
IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON ’11), Salt Lake City, UT, June 2011. [BIB]

Last updated on Wednesday, December 7, 2011, 4:04 pm