Tatyana Ryutov, Clifford Neuman, Li Zhou and Noria Foukia
Initial Trust
Formation in Virtual Organizations, International Journal of Internet Technology
and Security Transactions, 2007.
Tatyana Ryutov, Clifford Neuman, Dongho Kim and Li Zhou.
Integrated Access
control and Intrusion Detection for Web Servers. IEEE Transaction on Parallel
and Distributed Systems, Vol 14, No. 9, September 2003.
Tatyana Ryutov, Grig Gheorghiu, and Clifford Neuman
An Authorization
Framework for Metacomputing Applications, Cluster Computing 2(1999), 165-
175.
B. Clifford Neuman and Theodore Ts'o.
Kerberos: An Authentication Service for
Computer Networks, IEEE Communications, 32(9):33-38. September 1994.
B. Clifford Neuman.
Enabling Commerce on the Internet, IEEE
Computer29(4):91-92. April 1996.
B. Clifford Neuman.
Security, Payment, and Privacy for Network Commerce,
IEEE Journal on Selected Areas in Communications, 13(8):1523-1531. October 1995
Workshop on Future Directions in Cyber-Physical Systems Security, Newark,
NJ, July 22-24, 2009.
Arun Viswanathan, Clifford Neuman,
Secure System Views: A new Paradigm for
Secure Usable Sysems. USC-ISI Tehnical Report Number ISI-TR-654, January
2009.
Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony Joseph,
Keith Sklower, Ron Ostrenga, Stephen Schwab,
Design Deployment and use of
the DETER testbed.. In Proceedings of the DETER Community Workshop on
Cyber-Security and Test, August 2007, Boston.
Tatyana Ryutov, Clifford Neuman,
A Trust Based Approach for Improving Data
Reliability in Industrial Sensor Networks, in proceedings of the joint ITRUST and
PST Conference on Privacy, Trust Management, and Security, New Brunswick
Canada, August 2007. Also, ISI-TR-631, January 2007.
Tatyana Ryutov, Clifford Neuman,
Situational Identity: A Person-centered
Identity Management Approach, USC ISI Technical report ISI-TR-630, January
2007.
Tatyana Ryutov, Clifford Neuman, Ronak Shah,
Automated Management of
Vulnerability Mitigation Prescriptions. USC ISI Technical report ISI-TR-630,
January 2007.
Clifford Neuman,
Managing Multiple Perspectives on Trust, in proceedings of the
2007 Cyber Security and Information Infrastrcture Research Workshop, Oak
Ridge Tennessee, May 2007.
Clifford Neuman.
Understanding Trust in SCADA Systems. Proceedings of
Beyond SCADA: Network Embedded Control for Cyber-Physical Systems.
Pittsburgh, November 9, 2006. (Refereed Workshop Position Statement)
Sukumal Kitisin and Clifford Neuman.
Reputation-Based Trust-Aware
Recommender System. Proceedings of the 2nd IEEE Workshop on the Value of
Security Through Collaboration (SECOVAL), September 2006, Baltimore.
(refereed workshop)
Ho Chung and Clifford Neuman.
Modeling the Relative Strength of Security
Protocols. Proceedings of the 2nd ACM CCS Workshop on Quality of Protection,
October 2006, Alexandria VA. (refereed workshop)
Clifford Neuman, Chinmay Shah, Kevin Lahey.
Running Live Self-Propagating
malware on the DETER Testbed. Proceedings of the DETER Community
Workshop, Arlington VA, June 2006.
Noria Foukia, Liz Zhou and Clifford Neuman.
Multilateral Decision for
Collaborative Defense Against Unsolicited Bulk e-mail. Proceedings of the 4th
International Conference on Trust Management. Pisa, Italy, May 2006. (refereed
conference)
Terry Benzel, Bob Braden, Dongho Kim, Clifford Neuman Anthony Joseph and
Keith Sklower Ron Ostrenga and Stephen Schwab,
Experience with DETER: A
Testbed for Security Research. Second IEEE Conference on testbeds and
Research Infrastructures for the Development of Networks and Communities
(TridentCom2006), March 2006, Barcelona. (refereed conference)
L. Li, I. Hamadeh, S. Jiwasurat, G. Kesidis, P. Liu, C. Neuman,
Emulating
Sequential Scanning Worms on the DETER Testbed, In Proceedings of 2nd
International IEEE/CreateNet Conference on Testbeds and Research
Infrastructures for the Development of Networks and Communities
(TridentCom2006), March 2006. (refereed conference)
Tatyana Ryutov, Clifford Neuman, Li Zhou and Noria Foukia,
Establishing
Agreements in Dynamic Virtual Organizations, in Proceedings of the Workshop
on the Value of Security through Collaboration, part of IEEE SecureComm,
September 2005, Athens. (refereed workshop)
Tatyana Ryutov, Clifford Neuman, Noria Foukia, Travis Leithead, Kent Seamons,
Li Zhou,
Adaptive Trust Negotiation and Access Control for Grids. 6th
IEEE/ACM International Workshop on Grid Computing, Seattle, November
2005. (refereed workshop)
Sultan Almuhammadi and Clifford Neuman,
"Security and Privacy using One-
Round Zero Knowledge Proofs", 7th IEEE Conference on E-Commerce
Technology, Munich, July 2005. (refereed conference)
Tatyana Ryutov, Li Zhou, Clifford Neuman, Travis Leithead, and Kent E.
Seamons,
"Adaptive Trust Negotiation and Access Control," in Proceedings of
the ACM Symposium on Access Control Models and Technologies
(SACMAT'05), Stockholm, June 1-3, 2005. (refereed conference)
Tatyana Ryutov, Clifford Neuman, Dongho Kim and Li Zhou.
Integrated Access
control and Intrusion Detection for Web Servers. In proceedings of the 23rd
International Conference on Distributed Computing Systems, Providence, Rhode
Island, May 2003. (refereed conference)
Tatyana Ryutov, Clifford Neuman and Dongho Kim.
Dynamic Authorization and
Intrusion Response in Distributed Systems. Proceedings of the 3rd DARPA
Information Survivability Conference and Exposition (DISCEX III), April 2003.
(refereed conference)
Tatyana Ryutov and Clifford Neuman.
The Specification and Enforcement of
Advanced Security Policies. To be published In Proceedings of the Third
International Conference on Policies for Distributed Systems and Networks
(POLICY 2002), June 2002, in Monterey, California. (refereed conference)
Tatyana Ryutov and Clifford Neuman,
The Set and Function Approach to
Modeling Authorization in Distributed Systems, in Proceedings of the
Information Assurance in Computer Networks Methods, Models, and
Architectures for Network Security, May 2001, St. Petersburg, Russia, 189-206.
(refereed conference)
Tatyana Ryutov and Clifford Neuman,
Representation and Evaluation of Security
Policies for Distributed System Services, in Proceedings of the DARPA
Information Survivability Conference and Exposition, January 2000. Hilton
Head, SC. (refereed conference)
G. Gheorghiu, T. Ryutov, and B. Clifford Neuman,
Authorization for
Metacomputing Applications, in Proceedings of the 7th IEEE Symposium on
High Performance Distributed Computing, Chicago, IL, July 1998. (refereed
conference)
B. Clifford Neuman and Gennady Medvinsky.
Requirements for Network
Payment: The NetCheque Perspective In Proceedings of IEEE COMPCON'95.
March 1995. (referred conference)
Charlie Lai, Gennady Medvinsky, and B. Clifford Neuman.
Endorsements,
Licensing, and Insurance for Distributed System Services, In Proceedings of 2nd
the ACM Conference on Computer and Communication Security. November
1994. (refereed conference)
B. Clifford Neuman.
How to Trust a Distributed System. In Proceedings of the
National Computer Security Conference. Baltimore MD, October 1994. (invited
conference)
Gennady Medvinsky and B. Clifford Neuman. NetCash:
A design for practical
electronic currency on the Internet. In Proceedings of the 1st ACM Conference
on Computer and Communication Security. November 1993. (refereed
conference)
B. Clifford Neuman.
Proxy-Based Authorization and Accounting for Distributed
Systems. In Proceedings of the 13th International Conference on Distributed
Computing Systems, pages 283-291, May 1993. (refereed conference)
B. Clifford Neuman and Stuart G. Stubblebine.
A Note on the Use of Timestamps
as Nonces. Operating Systems Review, 27(2):10-14, April 1993. (unrefereed)
B. Clifford Neuman.
Protection and Security Issues for Future Systems. In
Proceedings of the Workshop on Operating Systems of the 90s and Beyond .
Dagstuhl Castle, Germany. July 1991.(invited workshop)
B. Clifford Neuman and Jennifer G. Steiner.
Authentication of Unknown Entities
on an Insecure Network of Untrusted Workstations. In Proceedings of the Usenix
Workshop on Workstation Security, Portland, OR. August 1988. (refereed
conference)
Journal of Network and Computer Applications 2010
C.-F. Chou , L. Golubchik , and MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng .
Xue Cai and John Heidemann.
Understanding Block-level Address Usage in the Visible Internet.
In _Proceedings of the ACM SIGCOMM Conference _, pp. 99-110. New Delhi, India, ACM. August, 2010.
John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister.
Census and Survey of the Visible Internet. In _ Proceedings of the ACM Internet Measurement Conference _ , pp. 169-182. Vouliagmeni, Greece, ACM. October, 2008.
Gautam Thatte, Urbashi Mitra, and John Heidemann. Parametric Methods for Anomaly Detection in Aggregate Traffic. _ ACM/IEEE Transactions on Networking _ , p. accepted to appear, August, 2010. (Likely publication in 2011).
Tools for worm experimentation on the DETER testbed
S.Wei, A. Hussain, J. Mirkovic and C. Ko, International Journal of Communication Networks and Distributed Systems (IJCNDS), 2010, Vol. 5, No. 1/2, pp. 151-171.
Comparative Evaluation of Spoofing Defenses
J. Mirkovic and E. Kissel, IEEE Transactions on Dependable and Secure Computing, accepted for publication.
Accurately Measuring Denial of Service in Simulation and Testbed Experiments
J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas, IEEE Transactions on Dependable and Secure Computing, vol 6, no 2, pp 81-95, April-June 2009.
As for publications. The following two URLS:
http://create.usc.edu/2009/05/orosz_2009_-_portsec_-_port_op.html , http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5655048&tag=1 are examples of the work that we do on infrastructure protection. Again, it's not IA in the classic sense, however, everything we do in port security applies to IA (identify attack vectors, adversary motives, --- potential counter-measures, economic costs, etc.).
"A Performance Study of Online Batch-based Digital Signature Schemes."
In Journal of Network and Computer Applications , Vol. 33, No. 2, pages 98-114, March 2010.
CARPE 2004
MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , L. Golubchik , and D. G. Kay .
"Total Recall: Are Privacy Changes Inevitable?"
In Proceedings of the First ACM Workshop on Continuous Archival and Retrieval of Personal Experiences , New York, New York, October 15th 2004.
CACM 2003
L. Golubchik , MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , C.-F. Chou , S. Khuller , H. Samet , and J. Y.C. Wan.
"Bistro: A Scalable and Secure Data Transfer Service for Digital Government Applications."
In Communications of the ACM (CACM) , Vol. 46, No. 1, pages 50-51, January 2003.
International Conference on Internet Computing 2001
MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , C.-F. Chou , L. Golubchik , and S. Khuller.
"A Secure and Scalable Wide-Area Upload Service."
In Proceedings of the 2nd International Conference on Internet Computing , Vol. 2, pages 733-739, Las Vegas, Nevada, June 25-28, 2001. J. Touch, G. Finn, Y. Wang, L. Eggert, "DynaBone: Dynamic Defense Using Multi-layer Internet Overlays," Proc. 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III), Washington, DC, USA, April 22-24, 2003, Vol. 2, pp. 271-276.
http://www.isi.edu/touch/pubs/discex03-dynabone
J. Touch,
"Performance Analysis of MD5," in Proc. ACM Sigcomm '95, pp. 77-86. http://www.isi.edu/touch/pubs/sigcomm95.html
J. Touch, A. Mankin, R. Bonica,
"A TCP Authentication Option," RFC 5925, Jun. 2010 (standards-track). http://www.rfc-editor.org/rfc/rfc5925.txt