Omar Chowdhury

According to our database1, Omar Chowdhury authored at least 19 papers between 2010 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

LTEInspector: A Systematic Approach for Adversarial Testing of 4G LTE.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

2017
SymCerts: Practical Symbolic Execution for Exposing Noncompliance in X.509 Certificate Validation Implementations.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Analyzing Operational Behavior of Stateful Protocol Implementations for Detecting Semantic Bugs.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
Tri-Modularization of Firewall Policies.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

An Empirical Study of Mnemonic Sentence-based Password Generation Strategies.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
CoRR, 2015

A Case Study on Runtime Monitoring of an Autonomous Research Vehicle (ARV) System.
Proceedings of the Runtime Verification - 6th International Conference, 2015

Towards quantification of firewall policy complexity.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Equivalence-based Security for Querying Encrypted Databases: Theory and Application to Privacy Policy Audits.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Temporal Mode-Checking for Runtime Monitoring of Privacy Policies.
Proceedings of the Computer Aided Verification - 26th International Conference, 2014

2013
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
On XACML's Adequacy to Specify and to Enforce HIPAA.
Proceedings of the 3rd USENIX Workshop on Health Security and Privacy, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

The privacy in the time of the internet: secrecy vs transparency.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

2010
Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010


  Loading...