Csilla Farkas

Affiliations:
  • University of South Carolina, Columbia, SC, USA


According to our database1, Csilla Farkas authored at least 69 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.
Proceedings of the Ubiquitous Security, 2023

2022
Ensuring Consistent Transactions in a Web Service Environment With Prediction-Based Performance Metrics.
IEEE Trans. Serv. Comput., 2022

Stream Data Access Control Model: The Need for Data Semantics.
Proceedings of the 14th International Joint Conference on Knowledge Discovery, 2022

2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

Review helpfulness evaluation and recommendation based on an attention model of customer expectation.
Inf. Retr. J., 2021

Database Recovery from Malicious Transactions: A Use of Provenance Information.
Proceedings of the 10th International Conference on Data Science, 2021

2020
Adversarial data poisoning attacks against the PC learning algorithm.
Int. J. Gen. Syst., 2020

An Attention Model of Customer Expectation to Improve Review Helpfulness Prediction.
Proceedings of the Advances in Information Retrieval, 2020

2019
Probabilistic Graphical Model on Detecting Insiders: Modeling with SGD-HMM.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Monotonic and Non-monotonic Context Delegation.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Semantic-based Obligation for Context-Based Access Control.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Data Dependencies Preserving Shuffle in Relational Database.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

Modeling Concept Drift in the Context of Discrete Bayesian Networks.
Proceedings of the 11th International Joint Conference on Knowledge Discovery, 2019

Securing Relational Database Storage with Attribute Association Aware Shuffling.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Detecting Adversarial Attacks in the Context of Bayesian Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Cyber Attacks Against the PC Learning Algorithm.
Proceedings of the ECML PKDD 2018 Workshops, 2018

Context Delegation for Context-Based Access Control.
Proceedings of the ECML PKDD 2018 Workshops, 2018

Health data privacy: A case of undesired inferences.
Proceedings of the 2018 IEEE EMBS International Conference on Biomedical & Health Informatics, 2018

Protecting Patients' Data: An Efficient Method for Health Data Privacy.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2015
Risk Aware Query Replacement Approach for Secure Databases Performance Management.
IEEE Trans. Dependable Secur. Comput., 2015

2013
Business Driven User Role Assignment: Nimble Adaptation of RBAC to Organizational Changes.
Int. J. Inf. Secur. Priv., 2013

Software Safety and Security for Programmable Logic Controllers.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Coarse Grained Web Service Availability, Consistency, and Durability.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Web Service constraint optimization.
Proceedings of the 8th International Conference for Internet Technology and Secured Transactions, 2013

2012
A Practical Framework for Policy Composition and Conflict Resolution.
Int. J. Secur. Softw. Eng., 2012

First use: Introducing information security in high school oracle academy courses.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

The cost of increased transactional correctness and durability in distributed databases.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

High volume web service resource consumption.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

2011
Software security: Application-level vulnerabilities in SCADA systems.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Accurate Accident Reconstruction in VANET.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
The inference problem: Maintaining maximal availability in the presence of database updates.
Comput. Secur., 2010

2009
P2F: A User-Centric Privacy Protection Framework.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Checking Security Policy Compliance
CoRR, 2008

Securing Enterprise Applications: Service-Oriented Security (SOS).
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

2007
PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents.
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Security in T<sub>ci</sub>NMP Systems.
Proceedings of the Security in Information Systems, 2007

An Intrusion Detection System for Detecting Phishing Attacks.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

2006
Unauthorized inferences in semistructured databases.
Inf. Sci., 2006

A framework for anonymous but accountable self-organizing communities.
Inf. Softw. Technol., 2006

uSMIL: Towards secure unbreakable semantics in multimedia web services.
Comput. Syst. Sci. Eng., 2006

Tree Automata for Schema-Level Filtering of XML Associations.
J. Res. Pract. Inf. Technol., 2006

Securing UML Information Flow Using FlowUML.
J. Res. Pract. Inf. Technol., 2006

Secure resource description framework: an access control model.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Engaging undergraduates in computer security research.
Proceedings of the 3rd Annual Conference on Information Security Curriculum Development, 2006

An Algebra for Composing Ontologies.
Proceedings of the Formal Ontology in Information Systems, 2006

2005
Enforcing Semantics-Aware Security in Multimedia Surveillance.
J. Data Semant., 2005

PAID: A Probabilistic Agent-Based Intrusion Detection system.
Comput. Secur., 2005

Secure UML Information Flow using FlowUML.
Proceedings of the Security in Information Systems, 2005

Dynamic Disclosure Monitor (<i>D</i><sup><i>2</i></sup><i>Mon</i>): An Improved Query Processing Solution.
Proceedings of the Secure Data Management, 2005

Multilevel Secure Teleconferencing over Public Switched Telephone Network.
Proceedings of the Data and Applications Security XIX, 2005

Selection in Scale-Free Small World.
Proceedings of the Multi-Agent Systems and Applications IV, 2005

2004
An authorization model for multimedia digital libraries.
Int. J. Digit. Libr., 2004

Ontology Guided XML Security Engine.
J. Intell. Inf. Syst., 2004

Specifying multimedia access control using RDF.
Comput. Syst. Sci. Eng., 2004

From XML to RDF: Syntax, Semantics, Security, and Integrity (Invited Paper).
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Creating non-decomposable stream bundles in multimedia web services using uSMIL.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

<i>SECRETS</i>: A Secure Real-Time Multimedia Surveillance System.
Proceedings of the Intelligence and Security Informatics, 2004

THEMIS: Threat Evaluation Metamodel for Information Systems.
Proceedings of the Intelligence and Security Informatics, 2004

2003
RDF metadata for XML access control.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Enforcing Integrity in Multimedia Surveillance.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Multimedia Access Control Using RDF Metadata.
Proceedings of the On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 2003

Correlated Data Inference.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
The Inference Problem: A Survey.
SIGKDD Explor., 2002

Making Agents Secure on the Semantic Web.
IEEE Internet Comput., 2002

Anonymity and accountability in self-organizing electronic communities.
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, 2002

Secure XML Views.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
The Inference Problem and Updates in Relational Databases.
Proceedings of the Database and Application Security XV, 2001

2000
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures.
IEEE Trans. Knowl. Data Eng., 2000

Constraints, Inference Channels and Secure Databases.
Proceedings of the Principles and Practice of Constraint Programming, 2000


  Loading...