Reports and Papers Archive

Page Content


Browse All Papers »       Submit A Paper »

Automatic Migration to Role-Based Access Control

CERIAS TR 2010-34
Ian Molloy
Download: PDF
Added 2012-12-11

EXAM - An Environment for XACML Policy Analysis and Management

CERIAS TR 2010-35
Prathima Rao
Download: PDF
Added 2012-12-11

Nudging the Digital Pirate: Piracy and the Conversion of Pirates to Paying Customers

CERIAS TR 2011-27
Matthew J. Hashim
Download: PDF
Added 2012-12-11

Entitled Essays on Information Risk Management in Electronic Markets

CERIAS TR 2010-36
Juhee Kwon
Download: PDF
Added 2012-12-11

Efficient Query Processing for Uncertain Data

CERIAS TR 2011-28
Yinian Qi
Download: PDF
Added 2012-12-11

Accountability for Grid Computing Systems

CERIAS TR 2011-29
Wonjun Lee
Download: PDF
Added 2012-12-11

Analysis of port scanning attacks

CERIAS TR 2009-33
Yu Zhang
Download: PDF
Added 2012-12-11

Architectural approaches for code injection defense at the user and kernel levels

CERIAS TR 2009-34
Riley, Ryan
Download: PDF
Added 2012-12-11

Efficient query processing for rich and diverse real-time data

CERIAS TR 2009-35
Nehme, Rimma
Download: PDF
Added 2012-12-11

Forensic characterization of image capture devices

CERIAS TR 2009-38
Nitin Khanna
Download: PDF
Added 2012-12-11

Analysis of access control policies in operating systems

CERIAS TR 2009-37
Hong Chen
Download: PDF
Added 2012-12-11

A multi-layer approach towards high-performance wireless mesh networks

CERIAS TR 2007-107
Das, Saumitra
Download: PDF
Added 2012-12-11

Adaptive Virtual Distributed Environments for Shared Cyberinfrastructures

CERIAS TR 2007-108
Ruth, Paul
Download: PDF
Added 2012-12-11

Mitigation of control and data traffic attacks in wireless ad-hoc and sensor networks

CERIAS TR 2007-109
Issa Khalil
Download: PDF
Added 2012-12-11