Year |
Citation |
Score |
2020 |
Han X, Mickens J, Gehani A, Seltzer M, Pasquier TFJ-. Xanthus: Push-button Orchestration of Host Provenance Data Collection. Arxiv: Cryptography and Security. 27-32. DOI: 10.1145/3391800.3398175 |
0.431 |
|
2015 |
Raykova M, Lakhani H, Kazmi H, Gehani A. Decentralized authorization and privacy-enhanced routing for information-centric networks Acm International Conference Proceeding Series. 7: 31-40. DOI: 10.1145/2818000.2818001 |
0.315 |
|
2015 |
Wood S, Mathewson J, Joy J, Stehr MO, Kim M, Gehani A, Gerla M, Sadjadpour H, Garcia-Luna-Aceves JJ. ICEMAN: A practical architecture for situational awareness at the network edge Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9200: 617-631. DOI: 10.1007/978-3-319-23165-5_29 |
0.325 |
|
2013 |
Gehani A, Ciocarlie GF, Shankar N. Accountable clouds 2013 Ieee International Conference On Technologies For Homeland Security, Hst 2013. 403-407. DOI: 10.1109/THS.2013.6699038 |
0.341 |
|
2013 |
Wood S, Mathewson J, Joy J, Stehr MO, Kim M, Gehani A, Gerla M, Sadjadpour H, Garcia-Luna-Aceves JJ. ICEMAN: A system for efficient, robust and secure situational awareness at the network edge Proceedings - Ieee Military Communications Conference Milcom. 1512-1517. DOI: 10.1109/MILCOM.2013.255 |
0.36 |
|
2013 |
Lakhani H, Tahir R, Aqil A, Zaffar F, Tariq D, Gehani A. Optimized rollback and re-computation Proceedings of the Annual Hawaii International Conference On System Sciences. 4930-4937. DOI: 10.1109/HICSS.2013.434 |
0.311 |
|
2013 |
Caskurlu B, Gehani A, Bilgin CC, Subramani K. Analytical models for risk-based intrusion response Computer Networks. 57: 2181-2192. DOI: 10.1016/J.Comnet.2013.03.012 |
0.468 |
|
2013 |
Malik T, Gehani A, Tariq D, Zaffar F. Sketching distributed data provenance Studies in Computational Intelligence. 426: 85-107. DOI: 10.1007/978-3-642-29931-5-4 |
0.329 |
|
2012 |
Gehani A, Tariq D. SPADE: Support for provenance auditing in distributed environments Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7662: 101-120. |
0.334 |
|
2011 |
Husted N, Saidi H, Gehani A. Smartphone security limitations: Conflicting traditions Acm International Conference Proceeding Series. 5-12. DOI: 10.1145/2076496.2076497 |
0.327 |
|
2011 |
Gehani A, Hanz D, Rushby J, Denker G, DeLong R. On the (f)utility of untrusted data sanitization Proceedings - Ieee Military Communications Conference Milcom. 1261-1266. DOI: 10.1109/MILCOM.2011.6127475 |
0.335 |
|
2011 |
Gehani A, Zaniewski L, Subramani K. Algorithmic aspects of risk management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7000: 262-276. DOI: 10.1007/978-3-642-24933-4_13 |
0.394 |
|
2011 |
Kim M, Stehr MO, Gehani A, Talcott C. Ensuring security and availability through model-based cross-layer adaptation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6905: 310-325. DOI: 10.1007/978-3-642-23641-9_26 |
0.381 |
|
2010 |
Malik T, Nistor L, Gehani A. Middleware for managing provenance metadata Middleware'10 Posters and Demos Track, Middleware Posters'10. DOI: 10.1145/1930028.1930033 |
0.342 |
|
2010 |
Gehani A, Kim M, Malik T. Efficient querying of distributed provenance stores Hpdc 2010 - Proceedings of the 19th Acm International Symposium On High Performance Distributed Computing. 613-621. DOI: 10.1145/1851476.1851567 |
0.381 |
|
2010 |
Gehani A, Kim M. Mendel: Efficiently verifying the lineage of data modified in multiple trust domains Hpdc 2010 - Proceedings of the 19th Acm International Symposium On High Performance Distributed Computing. 227-239. DOI: 10.1145/1851476.1851503 |
0.343 |
|
2010 |
Malik T, Nistor L, Gehani A. Tracking and sketching distributed data provenance Proceedings - 2010 6th Ieee International Conference On E-Science, Escience 2010. 190-197. DOI: 10.1109/eScience.2010.51 |
0.383 |
|
2008 |
Gehani A, Chandra S. Parameterized access control: From design to prototype Proceedings of the 4th International Conference On Security and Privacy in Communication Networks, Securecomm'08. DOI: 10.1145/1460877.1460922 |
0.385 |
|
2007 |
Gehani A, Chandra S. Parameterizing access control for heterogeneous peer-to-peer applications Proceedings of the 3rd International Conference On Security and Privacy in Communication Networks, Securecomm. 269-278. DOI: 10.1109/SECCOM.2007.4550343 |
0.39 |
|
2007 |
Gehani A, Lindqvist U. Bonsai: Balanced lineage authentication Proceedings - Annual Computer Security Applications Conference, Acsac. 363-372. DOI: 10.1109/ACSAC.2007.45 |
0.356 |
|
2006 |
Gehani A, Chandra S, Kedem G. Augmenting storage with an intrusion response primitive to ensure the security of critical data Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 114-124. DOI: 10.1145/1128817.1128836 |
0.608 |
|
2005 |
Zaffar F, Kedem G, Gehani A. Paranoid: A global secure file access control system Proceedings - Annual Computer Security Applications Conference, Acsac. 2005: 322-330. DOI: 10.1109/CSAC.2005.42 |
0.606 |
|
2004 |
Gehani A, Labean T, Reif J. DNA-based cryptography Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2950: 167-188. DOI: 10.1007/978-3-540-24635-0_12 |
0.301 |
|
2004 |
Gehani A, Kedem G. RheoStat: Real-Time risk management Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3224: 296-314. |
0.603 |
|
1999 |
Gehani A, Reif J. Micro flow bio-molecular computation Biosystems. 52: 197-216. PMID 10636046 DOI: 10.1016/S0303-2647(99)00048-9 |
0.311 |
|
Show low-probability matches. |