Prasad Naldurg

According to our database1, Prasad Naldurg authored at least 31 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Practical Formal Methods for Real World Cryptography (Invited Talk).
Proceedings of the 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2019

2018
Efficient Secure k-Nearest Neighbours over Encrypted Data.
Proceedings of the 21st International Conference on Extending Database Technology, 2018

2016
Patching Logic Vulnerabilities for Web Applications using LogicPatcher.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2014
MACE: Detecting Privilege Escalation Vulnerabilities in Web Applications.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Verito: A Practical System for Transparency and Accountability in Virtual Economies.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Primal Infon Logic: Derivability in Polynomial Time.
Proceedings of the IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science, 2013

dkal ⋆ : Constructing Executable Specifications of Authorization Protocols.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

2012
Foundations of Dynamic Access Control.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
SEAL: a logic programming framework for specifying and verifying access control models.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

ZDVUE: prioritization of javascript attacks to discover new vulnerabilities.
Proceedings of the 4th ACM Workshop on Security and Artificial Intelligence, 2011

2010
Baaz: A System for Detecting Access Control Misconfigurations.
Proceedings of the 19th USENIX Security Symposium, 2010

2008
A type system for data-flow integrity on Windows Vista.
ACM SIGPLAN Notices, 2008

The Superdiversifier: Peephole Individualization for Software Protection.
Proceedings of the Advances in Information and Computer Security, 2008

EON: modeling and analyzing dynamic access control systems with logic programs.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Connections between Mining Frequent Itemsets and Learning Generative Models.
Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
SPACE: Secure Protocol for Address Book based Connection Establishment.
Proceedings of the 5th ACM Workshop on Hot Topics in Networks, 2006

<i>NETRA</i>: : seeing through access control.
Proceedings of the 2006 ACM workshop on Formal methods in security engineering, 2006

2005
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005

2004
Modeling Insecurity: Enabling Recovery -Oriented Security With Dynamic Policies
PhD thesis, 2004

A Middleware Architecture for Securing Ubiquitous Computing Cyber Infrastructures.
IEEE Distributed Syst. Online, 2004

Routing with Confidence: Supporting Discretionary Routing Requirements in Policy Based Networks.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

A Temporal Logic Based Framework for Intrusion Detection.
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2004

2003
Dynamic access control: preserving safety and trust for network defense operations.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Modeling insecurity: policy engineering for survivability.
Proceedings of the 2003 ACM Workshop on Survivable and Self-Regenerative Systems, 2003

2002
Towards Security and Privacy for Pervasive Computing.
Proceedings of the Software Security -- Theories and Systems, 2002

Developing Dynamic Security Policies.
Proceedings of the 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 2002

Access Control for Active Spaces.
Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC 2002), 2002

2001
Security-aware ad hoc routing for wireless networks.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

2000
Flexible Secure Multicasting in Active Networks.
Proceedings of the 2000 ICDCS Workshops, April 10, 2000, Taipei, Taiwan, ROC, 2000


  Loading...