Atul Prakash

According to our database1, Atul Prakash
  • authored at least 110 papers between 1984 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
Security Implications of Permission Models in Smart-Home Application Frameworks.
IEEE Security & Privacy, 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
IEEE Security & Privacy, 2017

Decoupled-IFTTT: Constraining Privilege in Trigger-Action Platforms for the Internet of Things.
CoRR, 2017

Internet of Things Security Research: A Rehash of Old Ideas or New Intellectual Challenges?
CoRR, 2017

Robust Physical-World Attacks on Machine Learning Models.
CoRR, 2017

Ensuring Authorized Updates in Multi-user Database-Backed Applications.
Proceedings of the 26th USENIX Security Symposium, 2017

Heimdall: A Privacy-Respecting Implicit Preference Collection Framework.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

2016
FlowFence: Practical Data Protection for Emerging IoT Application Frameworks.
Proceedings of the 25th USENIX Security Symposium, 2016

Security Analysis of Emerging Smart Home Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Android UI Deception Revisited: Attacks and Defenses.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
Practical Always-on Taint Tracking on Mobile Devices.
Proceedings of the 15th Workshop on Hot Topics in Operating Systems, 2015

Decomposable Trust for Android Applications.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

2014
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services.
IJNGC, 2014

Anception: Application Virtualization For Android.
CoRR, 2014

Cloud computing data capsules for non-consumptiveuse of texts.
Proceedings of the ScienceCloud'14, 2014

OASIS: Operational Access Sandboxes for Information Security.
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, 2014

2013
The Confinement Problem: 40 Years Later.
JIPS, 2013

Let the Right One in: Discovering and Mitigating Permission Gaps.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Expose: Discovering Potential Binary Code Re-use.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Security in sensor network based SCADA system for adaptive traffic signal operation.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

Adaptive semi-private email aliases.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Accessing Trusted Web Sites from Low-Integrity Systems without End-Host Snooping.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Distilling critical attack graph surface iteratively through minimum-cost SAT solving.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Bringing the field into the lab: supporting capture and replay of contextual data for the design of context-aware applications.
Proceedings of the 23rd Annual ACM Symposium on User Interface Software and Technology, 2010

A Study on Latent Vulnerabilities.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

Fighting Phishing with Trusted Email.
Proceedings of the ARES 2010, 2010

2009
Location-Aware Computing, Virtual Networks.
IEEE Pervasive Computing, 2009

Protecting Confidential Data on Personal Computers with Storage Capsules.
Proceedings of the 18th USENIX Security Symposium, 2009

Quantifying Information Leaks in Outbound Web Traffic.
Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 2009

Ensemble: Community-Based Anomaly Detection for Popular Applications.
Proceedings of the Security and Privacy in Communication Networks, 2009

2008
Distributed and Collaborative Development.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Large-Scale Group Collaboration Systems.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Towards Quantification of Network-Based Information Leaks via HTTP.
Proceedings of the 3rd USENIX Workshop on Hot Topics in Security, 2008

Analyzing websites for user-visible security design flaws.
Proceedings of the 4th Symposium on Usable Privacy and Security, 2008

Prism: Providing Flexible and Fast Filesystem Cloning Service for Virtual Servers.
Proceedings of the Middleware 2008, 2008

Social networks and context-aware spam.
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, 2008

2007
Supporting Privacy Policies in a Publish-Subscribe Substrate for Pervasive Environments.
JNW, 2007

Using a virtual machine to protect sensitive Grid resources.
Concurrency and Computation: Practice and Experience, 2007

Securing Network Input via a Trusted Input Proxy.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

OpenFire: Using deception to reduce network attacks.
Proceedings of the Third International Conference on Security and Privacy in Communication Networks and the Workshops, 2007

Security in Practice - Security-Usability Chasm.
Proceedings of the Information Systems Security, Third International Conference, 2007

Spector: Automatically Analyzing Shell Code.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Methods and limitations of security policy reconciliation.
ACM Trans. Inf. Syst. Secur., 2006

Enforcing provisioning and authorization policy in the Antigone system.
Journal of Computer Security, 2006

Siren: Catching Evasive Malware (Short Paper).
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Designing a Publish-Subscribe Substrate for Privacy/Security in Pervasive Environments.
Proceedings of the ACS/IEEE International Conference on Pervasive Services 2006, 2006

Securing sensitive content in a view-only file system.
Proceedings of the Sixth ACM Workshop on Digital Rights Management, 2006

Introduction to the talking points project.
Proceedings of the 8th International ACM SIGACCESS Conference on Computers and Accessibility, 2006

2005
Towards Protecting Sensitive Files in a Compromised System.
Proceedings of the 3rd International IEEE Security in Storage Workshop (SISW 2005), 2005

FACE: A Firewall Analysis and Configuration Engine.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January, 2005

WSF: An HTTP-Level Firewall for Hardening Web Servers.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

SVGrid: a secure virtual environment for untrusted grid applications.
Proceedings of the 3rd international workshop on Middleware for grid computing, 2005

CPOL: high-performance policy evaluation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Web tap: detecting covert web traffic.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
A Flexible Architecture for Security Policy Enforcement.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Antigone: Policy-based Secure Group Communication System and AMirD: Antigone-based Secure File Mirroring System.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Source Authentication in Group Communication Systems.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

2002
Methods and Limitations of Security Policy Reconciliation.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
DACIA: A Mobile Component Framework for Buildinh Adaptive Distributed Applications.
Operating Systems Review, 2001

Secure Distribution of Events in Content-Based Publish Subscribe Systems.
Proceedings of the 10th USENIX Security Symposium, 2001

2000
Developing adaptive groupware applications using a mobile component framework.
Proceedings of the CSCW 2000, 2000

1999
Data Management Issues and Trade-Offs in CSCW Systems.
IEEE Trans. Knowl. Data Eng., 1999

Flexible Control of Downloaded Executable Content.
ACM Trans. Inf. Syst. Secur., 1999

Software Architecture for the UARC Web-Based Collaboratory.
IEEE Internet Computing, 1999

Antigone: A Flexible Framework for Secure Group Communication.
Proceedings of the 8th USENIX Security Symposium, Washington, D.C., August 23-26, 1999, 1999

Stateful Group Communication Services.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

The Case for Better Throughput Estimation.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

1998
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects.
IEEE Trans. Computers, 1998

The Upper Atmospheric Research Collaboratory (UARC).
Interactions, 1998

Tolerating Client and Communication Failures in Distributed Groupware Systems.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Adaptive group communication services for groupware systems.
Proceedings of the Second International Enterprise Distributed Object Computing Workshop, 1998

1997
Concurrency Control and View Notification Algorithms for Collaborative Replicated Objects.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

Providing Flexible Services for Managing Shared State in Collaborative Systems.
Proceedings of the Fifth European Conference on Computer Supported Cooperative Work, 1997

1996
A Query Algebra for Program Databases.
IEEE Trans. Software Eng., 1996

Building Systems That Flexibly Download Executable Content.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

A Protocol Composition-Based Approach to QoS Control in Collaboration Systems.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

A Flexible Architecture for Integrating Heterogeneous Media on Replayable Workspaces.
Proceedings of the IEEE International Conference on Multimedia Computing and Systems, 1996

Supporting Multi-User, Multi-Applet Workspaces in CBE.
Proceedings of the CSCW '96, 1996

Corona: A Communication Service for Scalable, Reliable Group Collaboration Systems.
Proceedings of the CSCW '96, 1996

1995
Program view generation and change analysis using attributed dependency graphs.
Journal of Software Maintenance, 1995

Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems.
Proceedings of the SEKE'95, 1995

Requirements of role-based access control for collaborative systems.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Dealing with Synchronization and Timing Variability in the Playback of Interactive Session Recordings.
Proceedings of the Third ACM International Conference on Multimedia '95, 1995

Computer Supported Cooperative Work: New Challenges or Old Problems (Panel).
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

Management and utilization of knowledge for the automatic improvement of workflow performance.
Proceedings of the Conference on Organizational Computing Systems, 1995

The Session Capture and Replay Paradigm for Asynchronous Collaboration.
Proceedings of the Fourth European Conference on Computer Supported Cooperative Work, 1995

Implementation of a discretionary access control model for script-based systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A Framework for Source Code Search Using Program Patterns.
IEEE Trans. Software Eng., 1994

A Framework for Undoing Actions in Collaborative Systems.
ACM Trans. Comput.-Hum. Interact., 1994

Supporting Queries on Source Code: a Formal Framework.
International Journal of Software Engineering and Knowledge Engineering, 1994

Investigating Reverse Engineering Technologies for the CAS Program Understanding Project.
IBM Systems Journal, 1994

Protocols for Integrated Audio and Shared Windows in Collaborative Systems.
Proceedings of the Second ACM International Conference on Multimedia '94, 1994

A Framework for Automatic Improvement of Workflows to Meet Performance Goals.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994

Querying Source Code Using an Algebraic Query Language.
Proceedings of the International Conference on Software Maintenance, 1994

DistView: Support for Building Efficient Collaborative Applications Using Replicated Objects.
Proceedings of the CSCW '94, 1994

The upper atmospheric research collaboratory.
Proceedings of the Conference on Human Factors in Computing Systems, 1994

Support for the File System Security Requirements of Computational E-Mail Systems.
Proceedings of the CCS '94, 1994

1993
Issues in the Design of a Toolkit for Supporting Multiple Group Editors.
Computing Systems, 1993

BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems.
Proceedings of the SEKE'93, 1993

Generating programming language-based pattern matchers.
Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, 1993

1992
Undoing Actions in Collaborative Work.
Proceedings of the CSCW '92, Proceedings of the Conference on Computer Supported Cooperative Work, Toronto, Canada, October 31, 1992

1991
Theories and techniques of program understanding.
Proceedings of the 1991 Conference of the Centre for Advanced Studies on Collaborative Research, 1991

Filter: an algorithm for reducing cascaded rollbacks in optimistic distributed simulations.
Proceedings of the Proceedings 24th Annual Simulation Symposium (ANSS-24 1991), 1991

1990
The Evolution Support Environment System.
IEEE Trans. Software Eng., 1990

DistEdit: A Distributed Toolkit for Supporting Multiple Group Editors.
Proceedings of the CSCW '90, 1990

1988
Support for Reusability in Genesis.
IEEE Trans. Software Eng., 1988

Hierarchical Distributed Simulations.
Proceedings of the 8th International Conference on Distributed Computing Systems, 1988

1987
Issues in the Development of Large, Distributed, and Reliable Software.
Advances in Computers, 1987

1986
Programming in the Large.
IEEE Trans. Software Eng., 1986

1984
Software Engineering: Problems and Perspectives.
IEEE Computer, 1984


  Loading...