University Southern California University Southern California

Publications

Tatyana Ryutov, Clifford Neuman, Li Zhou and Noria Foukia
Initial Trust Formation in Virtual Organizations, International Journal of Internet Technology and Security Transactions, 2007.

Tatyana Ryutov, Clifford Neuman, Dongho Kim and Li Zhou.
Integrated Access control and Intrusion Detection for Web Servers. IEEE Transaction on Parallel and Distributed Systems, Vol 14, No. 9, September 2003.

Tatyana Ryutov, Grig Gheorghiu, and Clifford Neuman
An Authorization Framework for Metacomputing Applications, Cluster Computing 2(1999), 165- 175.

B. Clifford Neuman and Theodore Ts'o.
Kerberos: An Authentication Service for Computer Networks, IEEE Communications, 32(9):33-38. September 1994.

B. Clifford Neuman.
Enabling Commerce on the Internet, IEEE Computer29(4):91-92. April 1996.

B. Clifford Neuman.
Security, Payment, and Privacy for Network Commerce, IEEE Journal on Selected Areas in Communications, 13(8):1523-1531. October 1995 Workshop on Future Directions in Cyber-Physical Systems Security, Newark, NJ, July 22-24, 2009.

Arun Viswanathan, Clifford Neuman,
Secure System Views: A new Paradigm for Secure Usable Sysems. USC-ISI Tehnical Report Number ISI-TR-654, January 2009.

Terry Benzel, Robert Braden, Dongho Kim, Clifford Neuman, Anthony Joseph, Keith Sklower, Ron Ostrenga, Stephen Schwab,
Design Deployment and use of the DETER testbed.. In Proceedings of the DETER Community Workshop on Cyber-Security and Test, August 2007, Boston.

Tatyana Ryutov, Clifford Neuman,
A Trust Based Approach for Improving Data Reliability in Industrial Sensor Networks, in proceedings of the joint ITRUST and PST Conference on Privacy, Trust Management, and Security, New Brunswick Canada, August 2007. Also, ISI-TR-631, January 2007.

Tatyana Ryutov, Clifford Neuman,
Situational Identity: A Person-centered Identity Management Approach, USC ISI Technical report ISI-TR-630, January 2007.

Tatyana Ryutov, Clifford Neuman, Ronak Shah,
Automated Management of Vulnerability Mitigation Prescriptions. USC ISI Technical report ISI-TR-630, January 2007.

Clifford Neuman,
Managing Multiple Perspectives on Trust, in proceedings of the 2007 Cyber Security and Information Infrastrcture Research Workshop, Oak Ridge Tennessee, May 2007.

Clifford Neuman.
Understanding Trust in SCADA Systems. Proceedings of Beyond SCADA: Network Embedded Control for Cyber-Physical Systems. Pittsburgh, November 9, 2006. (Refereed Workshop Position Statement)

Sukumal Kitisin and Clifford Neuman.
Reputation-Based Trust-Aware Recommender System. Proceedings of the 2nd IEEE Workshop on the Value of Security Through Collaboration (SECOVAL), September 2006, Baltimore. (refereed workshop)

Ho Chung and Clifford Neuman.
Modeling the Relative Strength of Security Protocols. Proceedings of the 2nd ACM CCS Workshop on Quality of Protection, October 2006, Alexandria VA. (refereed workshop)

Clifford Neuman, Chinmay Shah, Kevin Lahey.
Running Live Self-Propagating malware on the DETER Testbed. Proceedings of the DETER Community Workshop, Arlington VA, June 2006.

Noria Foukia, Liz Zhou and Clifford Neuman.
Multilateral Decision for Collaborative Defense Against Unsolicited Bulk e-mail. Proceedings of the 4th International Conference on Trust Management. Pisa, Italy, May 2006. (refereed conference)

Terry Benzel, Bob Braden, Dongho Kim, Clifford Neuman Anthony Joseph and Keith Sklower Ron Ostrenga and Stephen Schwab,
Experience with DETER: A Testbed for Security Research. Second IEEE Conference on testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom2006), March 2006, Barcelona. (refereed conference)

L. Li, I. Hamadeh, S. Jiwasurat, G. Kesidis, P. Liu, C. Neuman,
Emulating Sequential Scanning Worms on the DETER Testbed, In Proceedings of 2nd International IEEE/CreateNet Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities (TridentCom2006), March 2006. (refereed conference)

Tatyana Ryutov, Clifford Neuman, Li Zhou and Noria Foukia,
Establishing Agreements in Dynamic Virtual Organizations, in Proceedings of the Workshop on the Value of Security through Collaboration, part of IEEE SecureComm, September 2005, Athens. (refereed workshop)

Tatyana Ryutov, Clifford Neuman, Noria Foukia, Travis Leithead, Kent Seamons, Li Zhou,
Adaptive Trust Negotiation and Access Control for Grids. 6th IEEE/ACM International Workshop on Grid Computing, Seattle, November 2005. (refereed workshop)

Sultan Almuhammadi and Clifford Neuman,
"Security and Privacy using One- Round Zero Knowledge Proofs", 7th IEEE Conference on E-Commerce Technology, Munich, July 2005. (refereed conference)

Tatyana Ryutov, Li Zhou, Clifford Neuman, Travis Leithead, and Kent E. Seamons,
"Adaptive Trust Negotiation and Access Control," in Proceedings of the ACM Symposium on Access Control Models and Technologies (SACMAT'05), Stockholm, June 1-3, 2005. (refereed conference)

Tatyana Ryutov, Clifford Neuman, Dongho Kim and Li Zhou.
Integrated Access control and Intrusion Detection for Web Servers. In proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, May 2003. (refereed conference)

Tatyana Ryutov, Clifford Neuman and Dongho Kim.
Dynamic Authorization and Intrusion Response in Distributed Systems. Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX III), April 2003. (refereed conference)

Tatyana Ryutov and Clifford Neuman.
The Specification and Enforcement of Advanced Security Policies. To be published In Proceedings of the Third International Conference on Policies for Distributed Systems and Networks (POLICY 2002), June 2002, in Monterey, California. (refereed conference)

Tatyana Ryutov and Clifford Neuman,
The Set and Function Approach to Modeling Authorization in Distributed Systems, in Proceedings of the Information Assurance in Computer Networks Methods, Models, and Architectures for Network Security, May 2001, St. Petersburg, Russia, 189-206. (refereed conference)

Tatyana Ryutov and Clifford Neuman,
Representation and Evaluation of Security Policies for Distributed System Services, in Proceedings of the DARPA Information Survivability Conference and Exposition, January 2000. Hilton Head, SC. (refereed conference)

G. Gheorghiu, T. Ryutov, and B. Clifford Neuman,
Authorization for Metacomputing Applications, in Proceedings of the 7th IEEE Symposium on High Performance Distributed Computing, Chicago, IL, July 1998. (refereed conference)

B. Clifford Neuman and Gennady Medvinsky.
Requirements for Network Payment: The NetCheque Perspective In Proceedings of IEEE COMPCON'95. March 1995. (referred conference)

Charlie Lai, Gennady Medvinsky, and B. Clifford Neuman.
Endorsements, Licensing, and Insurance for Distributed System Services, In Proceedings of 2nd the ACM Conference on Computer and Communication Security. November 1994. (refereed conference)

B. Clifford Neuman.
How to Trust a Distributed System. In Proceedings of the National Computer Security Conference. Baltimore MD, October 1994. (invited conference)

Gennady Medvinsky and B. Clifford Neuman. NetCash:
A design for practical electronic currency on the Internet. In Proceedings of the 1st ACM Conference on Computer and Communication Security. November 1993. (refereed conference)

B. Clifford Neuman.
Proxy-Based Authorization and Accounting for Distributed Systems. In Proceedings of the 13th International Conference on Distributed Computing Systems, pages 283-291, May 1993. (refereed conference)

B. Clifford Neuman and Stuart G. Stubblebine.
A Note on the Use of Timestamps as Nonces. Operating Systems Review, 27(2):10-14, April 1993. (unrefereed)

B. Clifford Neuman.
Protection and Security Issues for Future Systems. In Proceedings of the Workshop on Operating Systems of the 90s and Beyond . Dagstuhl Castle, Germany. July 1991.(invited workshop)

B. Clifford Neuman and Jennifer G. Steiner.
Authentication of Unknown Entities on an Insecure Network of Untrusted Workstations. In Proceedings of the Usenix Workshop on Workstation Security, Portland, OR. August 1988. (refereed conference)

Journal of Network and Computer Applications 2010
C.-F. Chou , L. Golubchik , and MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng .

Xue Cai and John Heidemann.
Understanding Block-level Address Usage in the Visible Internet.
In _Proceedings of the ACM SIGCOMM Conference _, pp. 99-110. New Delhi, India, ACM. August, 2010. .

John Heidemann, Yuri Pradkin, Ramesh Govindan, Christos Papadopoulos, Genevieve Bartlett, and Joseph Bannister.
Census and Survey of the Visible Internet. In _ Proceedings of the ACM Internet Measurement Conference _ , pp. 169-182. Vouliagmeni, Greece, ACM. October, 2008. , .

Gautam Thatte, Urbashi Mitra, and John Heidemann. Parametric Methods for Anomaly Detection in Aggregate Traffic. _ ACM/IEEE Transactions on Networking _ , p. accepted to appear, August, 2010. (Likely publication in 2011).

Tools for worm experimentation on the DETER testbed
S.Wei, A. Hussain, J. Mirkovic and C. Ko, International Journal of Communication Networks and Distributed Systems (IJCNDS), 2010, Vol. 5, No. 1/2, pp. 151-171.

Comparative Evaluation of Spoofing Defenses
J. Mirkovic and E. Kissel, IEEE Transactions on Dependable and Secure Computing, accepted for publication.

Accurately Measuring Denial of Service in Simulation and Testbed Experiments
J. Mirkovic, A. Hussain, S. Fahmy, P. Reiher and R. Thomas, IEEE Transactions on Dependable and Secure Computing, vol 6, no 2, pp 81-95, April-June 2009.
As for publications. The following two URLS:
http://create.usc.edu/2009/05/orosz_2009_-_portsec_-_port_op.html , http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5655048&tag=1 are examples of the work that we do on infrastructure protection. Again, it's not IA in the classic sense, however, everything we do in port security applies to IA (identify attack vectors, adversary motives, --- potential counter-measures, economic costs, etc.).

"A Performance Study of Online Batch-based Digital Signature Schemes."
In Journal of Network and Computer Applications , Vol. 33, No. 2, pages 98-114, March 2010.

CARPE 2004
MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , L. Golubchik , and D. G. Kay .

"Total Recall: Are Privacy Changes Inevitable?"
In Proceedings of the First ACM Workshop on Continuous Archival and Retrieval of Personal Experiences , New York, New York, October 15th 2004.

CACM 2003
L. Golubchik , MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , C.-F. Chou , S. Khuller , H. Samet , and J. Y.C. Wan.

"Bistro: A Scalable and Secure Data Transfer Service for Digital Government Applications."
In Communications of the ACM (CACM) , Vol. 46, No. 1, pages 50-51, January 2003.

International Conference on Internet Computing 2001
MailScanner has detected a possible fraud attempt from "merlot.usc.edu" claiming to be W. C. Cheng , C.-F. Chou , L. Golubchik , and S. Khuller.

"A Secure and Scalable Wide-Area Upload Service."
In Proceedings of the 2nd International Conference on Internet Computing , Vol. 2, pages 733-739, Las Vegas, Nevada, June 25-28, 2001. J. Touch, G. Finn, Y. Wang, L. Eggert, "DynaBone: Dynamic Defense Using Multi-layer Internet Overlays," Proc. 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III), Washington, DC, USA, April 22-24, 2003, Vol. 2, pp. 271-276.
http://www.isi.edu/touch/pubs/discex03-dynabone

J. Touch,
"Performance Analysis of MD5," in Proc. ACM Sigcomm '95, pp. 77-86. http://www.isi.edu/touch/pubs/sigcomm95.html

J. Touch, A. Mankin, R. Bonica,
"A TCP Authentication Option," RFC 5925, Jun. 2010 (standards-track). http://www.rfc-editor.org/rfc/rfc5925.txt