BibTeX records: Omar Chowdhury

download as .bib file

@article{DBLP:journals/corr/abs-2003-13604,
  author    = {Elisa Bertino and
               Syed Rafiul Hussain and
               Omar Chowdhury},
  title     = {5G Security and Privacy: {A} Research Roadmap},
  journal   = {CoRR},
  volume    = {abs/2003.13604},
  year      = {2020},
  url       = {https://arxiv.org/abs/2003.13604},
  archivePrefix = {arXiv},
  eprint    = {2003.13604},
  timestamp = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/abs-2003-13604.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KarimCHCB19,
  author    = {Imtiaz Karim and
               Fabrizio Cicala and
               Syed Rafiul Hussain and
               Omar Chowdhury and
               Elisa Bertino},
  editor    = {David Balenson},
  title     = {Opening Pandora's box through ATFuzzer: dynamic analysis of {AT} interface
               for Android smartphones},
  booktitle = {Proceedings of the 35th Annual Computer Security Applications Conference,
               {ACSAC} 2019, San Juan, PR, USA, December 09-13, 2019},
  pages     = {529--543},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3359789.3359833},
  doi       = {10.1145/3359789.3359833},
  timestamp = {Tue, 26 Nov 2019 09:46:34 +0100},
  biburl    = {https://dblp.org/rec/conf/acsac/KarimCHCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HussainEKCB19,
  author    = {Syed Rafiul Hussain and
               Mitziu Echeverria and
               Imtiaz Karim and
               Omar Chowdhury and
               Elisa Bertino},
  editor    = {Lorenzo Cavallaro and
               Johannes Kinder and
               XiaoFeng Wang and
               Jonathan Katz},
  title     = {5GReasoner: {A} Property-Directed Security and Privacy Analysis Framework
               for 5G Cellular Network Protocol},
  booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages     = {669--684},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3319535.3354263},
  doi       = {10.1145/3319535.3354263},
  timestamp = {Fri, 06 Mar 2020 13:19:56 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/HussainEKCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/ChauYCKL19,
  author    = {Sze Yiu Chau and
               Moosa Yahyazadeh and
               Omar Chowdhury and
               Aniket Kate and
               Ninghui Li},
  title     = {Analyzing Semantic Correctness with Symbolic Execution: {A} Case Study
               on PKCS{\#}1 v1.5 Signature Verification},
  booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS}
               2019, San Diego, California, USA, February 24-27, 2019},
  publisher = {The Internet Society},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/analyzing-semantic-correctness-with-symbolic-execution-a-case-study-on-pkcs1-v1-5-signature-verification/},
  timestamp = {Thu, 02 May 2019 15:52:21 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/ChauYCKL19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HussainECLB19,
  author    = {Syed Rafiul Hussain and
               Mitziu Echeverria and
               Omar Chowdhury and
               Ninghui Li and
               Elisa Bertino},
  title     = {Privacy Attacks to the 4G and 5G Cellular Paging Protocols Using Side
               Channel Information},
  booktitle = {26th Annual Network and Distributed System Security Symposium, {NDSS}
               2019, San Diego, California, USA, February 24-27, 2019},
  publisher = {The Internet Society},
  year      = {2019},
  url       = {https://www.ndss-symposium.org/ndss-paper/privacy-attacks-to-the-4g-and-5g-cellular-paging-protocols-using-side-channel-information/},
  timestamp = {Thu, 02 May 2019 15:52:21 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/HussainECLB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/YahyazadehPHC19,
  author    = {Moosa Yahyazadeh and
               Proyash Podder and
               Md. Endadul Hoque and
               Omar Chowdhury},
  editor    = {Florian Kerschbaum and
               Atefeh Mashatan and
               Jianwei Niu and
               Adam J. Lee},
  title     = {Expat: Expectation-based Policy Analysis and Enforcement for Appified
               Smart-Home Platforms},
  booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
               Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages     = {61--72},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3322431.3325107},
  doi       = {10.1145/3322431.3325107},
  timestamp = {Sun, 02 Jun 2019 13:58:07 +0200},
  biburl    = {https://dblp.org/rec/conf/sacmat/YahyazadehPHC19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisec/HussainESCB19,
  author    = {Syed Rafiul Hussain and
               Mitziu Echeverria and
               Ankush Singla and
               Omar Chowdhury and
               Elisa Bertino},
  title     = {Insecure connection bootstrapping in cellular networks: the root of
               all evil},
  booktitle = {Proceedings of the 12th Conference on Security and Privacy in Wireless
               and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019},
  pages     = {1--11},
  publisher = {{ACM}},
  year      = {2019},
  url       = {https://doi.org/10.1145/3317549.3323402},
  doi       = {10.1145/3317549.3323402},
  timestamp = {Tue, 21 May 2019 10:54:31 +0200},
  biburl    = {https://dblp.org/rec/conf/wisec/HussainESCB19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChauWWCKL18,
  author    = {Sze Yiu Chau and
               Bincheng Wang and
               Jianxiong Wang and
               Omar Chowdhury and
               Aniket Kate and
               Ninghui Li},
  title     = {Why Johnny Can't Make Money With His Contents: Pitfalls of Designing
               and Implementing Content Delivery Apps},
  booktitle = {Proceedings of the 34th Annual Computer Security Applications Conference,
               {ACSAC} 2018, San Juan, PR, USA, December 03-07, 2018},
  pages     = {236--251},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3274694.3274752},
  doi       = {10.1145/3274694.3274752},
  timestamp = {Wed, 05 Dec 2018 09:44:25 +0100},
  biburl    = {https://dblp.org/rec/conf/acsac/ChauWWCKL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/HussainCMB18,
  author    = {Syed Rafiul Hussain and
               Omar Chowdhury and
               Shagufta Mehnaz and
               Elisa Bertino},
  title     = {LTEInspector: {A} Systematic Approach for Adversarial Testing of 4G
               {LTE}},
  booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS}
               2018, San Diego, California, USA, February 18-21, 2018},
  publisher = {The Internet Society},
  year      = {2018},
  url       = {http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018\_02A-3\_Hussain\_paper.pdf},
  timestamp = {Thu, 09 Aug 2018 10:56:55 +0200},
  biburl    = {https://dblp.org/rec/conf/ndss/HussainCMB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Chowdhury18,
  author    = {Omar Chowdhury},
  editor    = {Elisa Bertino and
               Dan Lin and
               Jorge Lobo},
  title     = {How Inadequate Specification, Buggy Implementation, and Deficient
               Platform-Support Hinder Security},
  booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
               2018},
  pages     = {221},
  publisher = {{ACM}},
  year      = {2018},
  url       = {https://doi.org/10.1145/3205977.3206002},
  doi       = {10.1145/3205977.3206002},
  timestamp = {Wed, 21 Nov 2018 12:44:16 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/Chowdhury18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChauCGGYFL18,
  author    = {Sze Yiu Chau and
               Omar Chowdhury and
               Victor E. Gonsalves and
               Huangyi Ge and
               Weining Yang and
               Sonia Fahmy and
               Ninghui Li},
  editor    = {Raheem Beyah and
               Bing Chang and
               Yingjiu Li and
               Sencun Zhu},
  title     = {Adaptive Deterrence of {DNS} Cache Poisoning},
  booktitle = {Security and Privacy in Communication Networks - 14th International
               Conference, SecureComm 2018, Singapore, August 8-10, 2018, Proceedings,
               Part {II}},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {255},
  pages     = {171--191},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-01704-0\_10},
  doi       = {10.1007/978-3-030-01704-0\_10},
  timestamp = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/securecomm/ChauCGGYFL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/HoqueCCNL17,
  author    = {Md. Endadul Hoque and
               Omar Chowdhury and
               Sze Yiu Chau and
               Cristina Nita{-}Rotaru and
               Ninghui Li},
  title     = {Analyzing Operational Behavior of Stateful Protocol Implementations
               for Detecting Semantic Bugs},
  booktitle = {47th Annual {IEEE/IFIP} International Conference on Dependable Systems
               and Networks, {DSN} 2017, Denver, CO, USA, June 26-29, 2017},
  pages     = {627--638},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/DSN.2017.36},
  doi       = {10.1109/DSN.2017.36},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/dsn/HoqueCCNL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ChauCHGKNL17,
  author    = {Sze Yiu Chau and
               Omar Chowdhury and
               Md. Endadul Hoque and
               Huangyi Ge and
               Aniket Kate and
               Cristina Nita{-}Rotaru and
               Ninghui Li},
  title     = {SymCerts: Practical Symbolic Execution for Exposing Noncompliance
               in {X.509} Certificate Validation Implementations},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {503--520},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/SP.2017.40},
  doi       = {10.1109/SP.2017.40},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/ChauCHGKNL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangGCML16,
  author    = {Tianhao Wang and
               Huangyi Ge and
               Omar Chowdhury and
               Hemanta K. Maji and
               Ninghui Li},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {On the Security and Usability of Segment-based Visual Cryptographic
               Authentication Protocols},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {603--615},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978417},
  doi       = {10.1145/2976749.2978417},
  timestamp = {Sat, 08 Dec 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/WangGCML16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YangLCXP16,
  author    = {Weining Yang and
               Ninghui Li and
               Omar Chowdhury and
               Aiping Xiong and
               Robert W. Proctor},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Christopher Kruegel and
               Andrew C. Myers and
               Shai Halevi},
  title     = {An Empirical Study of Mnemonic Sentence-based Password Generation
               Strategies},
  booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Vienna, Austria, October 24-28, 2016},
  pages     = {1216--1229},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2976749.2978346},
  doi       = {10.1145/2976749.2978346},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/YangLCXP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChenCLKCMP16,
  author    = {Haining Chen and
               Omar Chowdhury and
               Ninghui Li and
               Warut Khern{-}am{-}nuai and
               Suresh Chari and
               Ian Molloy and
               Youngja Park},
  editor    = {X. Sean Wang and
               Lujo Bauer and
               Florian Kerschbaum},
  title     = {Tri-Modularization of Firewall Policies},
  booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages     = {37--48},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2914642.2914646},
  doi       = {10.1145/2914642.2914646},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/ChenCLKCMP16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chowdhury0JD15,
  author    = {Omar Chowdhury and
               Deepak Garg and
               Limin Jia and
               Anupam Datta},
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Equivalence-based Security for Querying Encrypted Databases: Theory
               and Application to Privacy Policy Audits},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1130--1143},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2810103.2813638},
  doi       = {10.1145/2810103.2813638},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Chowdhury0JD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/ChenCCLP15,
  author    = {Haining Chen and
               Omar Chowdhury and
               Jing Chen and
               Ninghui Li and
               Robert W. Proctor},
  editor    = {David M. Nicol},
  title     = {Towards quantification of firewall policy complexity},
  booktitle = {Proceedings of the 2015 Symposium and Bootcamp on the Science of Security,
               HotSoS 2015, Urbana, IL, USA, April 21-22, 2015},
  pages     = {18:1--18:2},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2746194.2746212},
  doi       = {10.1145/2746194.2746212},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/hotsos/ChenCCLP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rv/KaneCDK15,
  author    = {Aaron Kane and
               Omar Chowdhury and
               Anupam Datta and
               Philip Koopman},
  editor    = {Ezio Bartocci and
               Rupak Majumdar},
  title     = {A Case Study on Runtime Monitoring of an Autonomous Research Vehicle
               {(ARV)} System},
  booktitle = {Runtime Verification - 6th International Conference, {RV} 2015 Vienna,
               Austria, September 22-25, 2015. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9333},
  pages     = {102--117},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-23820-3\_7},
  doi       = {10.1007/978-3-319-23820-3\_7},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/rv/KaneCDK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Chowdhury0JD15,
  author    = {Omar Chowdhury and
               Deepak Garg and
               Limin Jia and
               Anupam Datta},
  title     = {Equivalence-based Security for Querying Encrypted Databases: Theory
               and Application to Privacy Policy Audits},
  journal   = {CoRR},
  volume    = {abs/1508.02448},
  year      = {2015},
  url       = {http://arxiv.org/abs/1508.02448},
  archivePrefix = {arXiv},
  eprint    = {1508.02448},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/Chowdhury0JD15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ChowdhuryJGD14,
  author    = {Omar Chowdhury and
               Limin Jia and
               Deepak Garg and
               Anupam Datta},
  editor    = {Armin Biere and
               Roderick Bloem},
  title     = {Temporal Mode-Checking for Runtime Monitoring of Privacy Policies},
  booktitle = {Computer Aided Verification - 26th International Conference, {CAV}
               2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
               Austria, July 18-22, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8559},
  pages     = {131--149},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08867-9\_9},
  doi       = {10.1007/978-3-319-08867-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:43 +0200},
  biburl    = {https://dblp.org/rec/conf/cav/ChowdhuryJGD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13,
  author    = {Omar Chowdhury and
               Andreas Gampe and
               Jianwei Niu and
               Jeffery von Ronne and
               Jared Bennatt and
               Anupam Datta and
               Limin Jia and
               William H. Winsborough},
  editor    = {Mauro Conti and
               Jaideep Vaidya and
               Andreas Schaad},
  title     = {Privacy promises that can be kept: a policy analysis method with application
               to the {HIPAA} privacy rule},
  booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages     = {3--14},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2462410.2462423},
  doi       = {10.1145/2462410.2462423},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/PontualGCKAW12,
  author    = {Murillo Pontual and
               Andreas Gampe and
               Omar Chowdhury and
               Bazoumana Kone and
               Md. Shamim Ashik and
               William H. Winsborough},
  editor    = {Elisa Bertino and
               Ravi S. Sandhu},
  title     = {The privacy in the time of the internet: secrecy vs transparency},
  booktitle = {Second {ACM} Conference on Data and Application Security and Privacy,
               {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages     = {133--140},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2133601.2133618},
  doi       = {10.1145/2133601.2133618},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/codaspy/PontualGCKAW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChowdhuryPWYIN12,
  author    = {Omar Chowdhury and
               Murillo Pontual and
               William H. Winsborough and
               Ting Yu and
               Keith Irwin and
               Jianwei Niu},
  editor    = {Vijay Atluri and
               Jaideep Vaidya and
               Axel Kern and
               Murat Kantarcioglu},
  title     = {Ensuring authorization privileges for cascading user obligations},
  booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages     = {33--44},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2295136.2295144},
  doi       = {10.1145/2295136.2295144},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/ChowdhuryPWYIN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ChowdhuryCNLB12,
  author    = {Omar Chowdhury and
               Haining Chen and
               Jianwei Niu and
               Ninghui Li and
               Elisa Bertino},
  editor    = {Carl A. Gunter and
               Zachary N. J. Peterson},
  title     = {On XACML's Adequacy to Specify and to Enforce {HIPAA}},
  booktitle = {3rd {USENIX} Workshop on Health Security and Privacy, HealthSec'12,
               Bellevue, WA, USA, August 6-7, 2012},
  publisher = {{USENIX} Association},
  year      = {2012},
  url       = {https://www.usenix.org/conference/healthsec12/workshop-program/presentation/chowdhury},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/conf/uss/ChowdhuryCNLB12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/PontualCWYI11,
  author    = {Murillo Pontual and
               Omar Chowdhury and
               William H. Winsborough and
               Ting Yu and
               Keith Irwin},
  editor    = {Ruth Breu and
               Jason Crampton and
               Jorge Lobo},
  title     = {On the management of user obligations},
  booktitle = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  pages     = {175--184},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1998441.1998473},
  doi       = {10.1145/1998441.1998473},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/PontualCWYI11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PontualCWYI10,
  author    = {Murillo Pontual and
               Omar Chowdhury and
               William H. Winsborough and
               Ting Yu and
               Keith Irwin},
  editor    = {Dengguo Feng and
               David A. Basin and
               Peng Liu},
  title     = {Toward practical authorization-dependent user obligation systems},
  booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
               2010},
  pages     = {180--191},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1755688.1755711},
  doi       = {10.1145/1755688.1755711},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/PontualCWYI10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/PontualICWY10,
  author    = {Murillo Pontual and
               Keith Irwin and
               Omar Chowdhury and
               William H. Winsborough and
               Ting Yu},
  editor    = {Ahmed K. Elmagarmid and
               Divyakant Agrawal},
  title     = {Failure Feedback for User Obligation Systems},
  booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on
               Social Computing, SocialCom / {IEEE} International Conference on Privacy,
               Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
               August 20-22, 2010},
  pages     = {713--720},
  publisher = {{IEEE} Computer Society},
  year      = {2010},
  url       = {https://doi.org/10.1109/SocialCom.2010.111},
  doi       = {10.1109/SocialCom.2010.111},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/socialcom/PontualICWY10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics