William M. Fitzgerald

According to our database1, William M. Fitzgerald authored at least 17 papers between 2006 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2014
Consumer-Managed Federated Homes.
IEEE Commun. Mag., 2014

2013
MASON: Mobile autonomic security for network access controls.
J. Inf. Secur. Appl., 2013

Explanations and Relaxations for Policy Conflicts in Physical Access Control.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013

Avoiding inconsistencies in the Security Content Automation Protocol.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Automated Smartphone Security Configuration.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2012

Decentralized Semantic Threat Graphs.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Anomaly analysis for Physical Access Control security configuration.
Proceedings of the 7th International Conference on Risks and Security of Internet and Systems, 2012

2011
Management of security policy configuration using a Semantic Threat Graph approach.
J. Comput. Secur., 2011

Aligning Semantic Web applications with network access controls.
Comput. Stand. Interfaces, 2011

Federated Autonomic Network Access Control.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Reasoning about the Security Configuration of SAN Switch Fabrics.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Federated autonomic management of HAN services.
Proceedings of the 12th IFIP/IEEE International Symposium on Integrated Network Management, 2011

2010
Management of heterogeneous security access control configuration using an ontology engineering approach.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

2009
An Approach to Security Policy Configuration Using Semantic Threat Graphs.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Network Access Control Interoperation using Semantic Web Techniques.
Proceedings of the Security in Information Systems, 2008

Semantic Web and firewall alignment.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

2006
Principles of Secure Network Configuration: Towards a Formal Basis for Self-configuration.
Proceedings of the Autonomic Principles of IP Operations and Management, 2006


  Loading...