Ashish Gehani, Ph.D. - Publications

Affiliations: 
2003 Duke University, Durham, NC 
Area:
Computer Science

25 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Han X, Mickens J, Gehani A, Seltzer M, Pasquier TFJ-. Xanthus: Push-button Orchestration of Host Provenance Data Collection. Arxiv: Cryptography and Security. 27-32. DOI: 10.1145/3391800.3398175  0.431
2015 Raykova M, Lakhani H, Kazmi H, Gehani A. Decentralized authorization and privacy-enhanced routing for information-centric networks Acm International Conference Proceeding Series. 7: 31-40. DOI: 10.1145/2818000.2818001  0.315
2015 Wood S, Mathewson J, Joy J, Stehr MO, Kim M, Gehani A, Gerla M, Sadjadpour H, Garcia-Luna-Aceves JJ. ICEMAN: A practical architecture for situational awareness at the network edge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 617-631. DOI: 10.1007/978-3-319-23165-5_29  0.325
2013 Gehani A, Ciocarlie GF, Shankar N. Accountable clouds 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 403-407. DOI: 10.1109/THS.2013.6699038  0.341
2013 Wood S, Mathewson J, Joy J, Stehr MO, Kim M, Gehani A, Gerla M, Sadjadpour H, Garcia-Luna-Aceves JJ. ICEMAN: A system for efficient, robust and secure situational awareness at the network edge Proceedings - Ieee Military Communications Conference Milcom. 1512-1517. DOI: 10.1109/MILCOM.2013.255  0.36
2013 Lakhani H, Tahir R, Aqil A, Zaffar F, Tariq D, Gehani A. Optimized rollback and re-computation Proceedings of the Annual Hawaii International Conference On System Sciences. 4930-4937. DOI: 10.1109/HICSS.2013.434  0.311
2013 Caskurlu B, Gehani A, Bilgin CC, Subramani K. Analytical models for risk-based intrusion response Computer Networks. 57: 2181-2192. DOI: 10.1016/J.Comnet.2013.03.012  0.468
2013 Malik T, Gehani A, Tariq D, Zaffar F. Sketching distributed data provenance Studies in Computational Intelligence. 426: 85-107. DOI: 10.1007/978-3-642-29931-5-4  0.329
2012 Gehani A, Tariq D. SPADE: Support for provenance auditing in distributed environments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7662: 101-120.  0.334
2011 Husted N, Saidi H, Gehani A. Smartphone security limitations: Conflicting traditions Acm International Conference Proceeding Series. 5-12. DOI: 10.1145/2076496.2076497  0.327
2011 Gehani A, Hanz D, Rushby J, Denker G, DeLong R. On the (f)utility of untrusted data sanitization Proceedings - Ieee Military Communications Conference Milcom. 1261-1266. DOI: 10.1109/MILCOM.2011.6127475  0.335
2011 Gehani A, Zaniewski L, Subramani K. Algorithmic aspects of risk management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7000: 262-276. DOI: 10.1007/978-3-642-24933-4_13  0.394
2011 Kim M, Stehr MO, Gehani A, Talcott C. Ensuring security and availability through model-based cross-layer adaptation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6905: 310-325. DOI: 10.1007/978-3-642-23641-9_26  0.381
2010 Malik T, Nistor L, Gehani A. Middleware for managing provenance metadata Middleware'10 Posters and Demos Track, Middleware Posters'10. DOI: 10.1145/1930028.1930033  0.342
2010 Gehani A, Kim M, Malik T. Efficient querying of distributed provenance stores Hpdc 2010 - Proceedings of the 19th Acm International Symposium On High Performance Distributed Computing. 613-621. DOI: 10.1145/1851476.1851567  0.381
2010 Gehani A, Kim M. Mendel: Efficiently verifying the lineage of data modified in multiple trust domains Hpdc 2010 - Proceedings of the 19th Acm International Symposium On High Performance Distributed Computing. 227-239. DOI: 10.1145/1851476.1851503  0.343
2010 Malik T, Nistor L, Gehani A. Tracking and sketching distributed data provenance Proceedings - 2010 6th Ieee International Conference On E-Science, Escience 2010. 190-197. DOI: 10.1109/eScience.2010.51  0.383
2008 Gehani A, Chandra S. Parameterized access control: From design to prototype Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460922  0.385
2007 Gehani A, Chandra S. Parameterizing access control for heterogeneous peer-to-peer applications Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 269-278. DOI: 10.1109/SECCOM.2007.4550343  0.39
2007 Gehani A, Lindqvist U. Bonsai: Balanced lineage authentication Proceedings - Annual Computer Security Applications Conference, Acsac. 363-372. DOI: 10.1109/ACSAC.2007.45  0.356
2006 Gehani A, Chandra S, Kedem G. Augmenting storage with an intrusion response primitive to ensure the security of critical data Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 114-124. DOI: 10.1145/1128817.1128836  0.608
2005 Zaffar F, Kedem G, Gehani A. Paranoid: A global secure file access control system Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 322-330. DOI: 10.1109/CSAC.2005.42  0.606
2004 Gehani A, Labean T, Reif J. DNA-based cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2950: 167-188. DOI: 10.1007/978-3-540-24635-0_12  0.301
2004 Gehani A, Kedem G. RheoStat: Real-Time risk management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3224: 296-314.  0.603
1999 Gehani A, Reif J. Micro flow bio-molecular computation Biosystems. 52: 197-216. PMID 10636046 DOI: 10.1016/S0303-2647(99)00048-9  0.311
Show low-probability matches.