The inference problem: a survey C Farkas, S Jajodia ACM SIGKDD Explorations Newsletter 4 (2), 6-11, 2002 | 373 | 2002 |
Secure databases: Constraints, inference channels, and monitoring disclosures A Brodsky, C Farkas, S Jajodia IEEE Transactions on Knowledge and Data Engineering 12 (6), 900-919, 2000 | 226 | 2000 |
Secure resource description framework: an access control model A Jain, C Farkas Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 140 | 2006 |
Paid: A probabilistic agent-based intrusion detection system V Gowadia, C Farkas, M Valtorta Computers & Security 24 (7), 529-545, 2005 | 110 | 2005 |
Secure XML views A Stoica, C Farkas Research Directions in Data and Applications Security: IFIP TC11/WG11. 3 …, 2003 | 91 | 2003 |
Comparing the agrochemical properties of compost and vermicomposts produced from municipal sewage sludge digestate M Rékási, N Mazsu, E Draskovits, B Bernhardt, A Szabó, PA Rivier, ... Bioresource technology 291, 121861, 2019 | 62 | 2019 |
RDF metadata for XML access control V Gowadia, C Farkas Proceedings of the 2003 ACM workshop on XML security, 39-48, 2003 | 62 | 2003 |
Secure Access Control in a Multi-user Geodatabase S De, CM Eastman, C Farkas available on the Internet at the URL http://www10. giscafe. com 10, 2005 | 51 | 2005 |
The inference problem and updates in relational databases C Farkas, TS Toland, CM Eastman Database and Application Security XV: IFIP TC11/WG11. 3 Fifteenth Annual …, 2002 | 44 | 2002 |
Anonymity and accountability in self-organizing electronic communities C Farkas, G Ziegler, A Meretei, A Lörincz Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, 81-90, 2002 | 38 | 2002 |
Making agents secure on the semantic web C Farkas, MN Huhns IEEE Internet Computing 6 (6), 76-79, 2002 | 36 | 2002 |
An authorization model for multimedia digital libraries N Kodali, C Farkas, D Wijesekera International Journal on Digital Libraries 4, 139-155, 2004 | 35 | 2004 |
Ontology guided xml security engine A Stoica, C Farkas Journal of Intelligent Information Systems 23, 209-223, 2004 | 32 | 2004 |
The inference problem: Maintaining maximal availability in the presence of database updates TS Toland, C Farkas, CM Eastman Computers & Security 29 (1), 88-103, 2010 | 31 | 2010 |
Securing UML information flow using FlowUML K Alghathbar, C Farkas, D Wijesekera Journal of Research and Practice in Information Technology 38 (1), 111-120, 2006 | 28 | 2006 |
Unauthorized inferences in semistructured databases C Farkas, A Brodsky, S Jajodia Information Sciences 176 (22), 3269-3299, 2006 | 27 | 2006 |
Resilient user-side android application repackaging and tampering detection using cryptographically obfuscated logic bombs Q Zeng, L Luo, Z Qian, X Du, Z Li, CT Huang, C Farkas IEEE Transactions on Dependable and Secure Computing 18 (6), 2582-2600, 2019 | 25 | 2019 |
PTC-VANET interactions to prevent highway rail intersection crossing accidents M Hartong, R Goel, C Farkas, D Wijesekera 2007 IEEE 65th Vehicular Technology Conference-VTC2007-Spring, 2550-2554, 2007 | 23 | 2007 |
A framework for anonymous but accountable self-organizing communities G Ziegler, C Farkas, A Lőrincz Information and Software Technology 48 (8), 726-744, 2006 | 22 | 2006 |
Software security: Application-level vulnerabilities in SCADA systems S Valentine, C Farkas 2011 IEEE International Conference on Information Reuse & Integration, 498-499, 2011 | 21 | 2011 |