WorldCat Identities

Wijesekera, Duminda

Overview
Works: 32 works in 80 publications in 1 language and 1,479 library holdings
Genres: Handbooks and manuals  Conference papers and proceedings  Software 
Roles: Other, Editor, Author
Publication Timeline
.
Most widely held works by Duminda Wijesekera
Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings by Sushil Jajodia( )

21 editions published in 2005 in English and Undetermined and held by 601 WorldCat member libraries worldwide

"The 19th Annual IFIP Working Group 11.3 Working Conference on Data and Applications Security was held August 7-10, 2005 at the University of Connecticut in Storrs, Connecticut."
Preserving privacy in On-Line Analytical Processing (OLAP) by Lingyu Wang( )

11 editions published in 2007 in English and held by 505 WorldCat member libraries worldwide

This volume addresses the privacy issue of on-line analytic processing (OLAP) systems. It reviews a series of methods that can precisely answer daga cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data
Forensics web services (FWS) by Anoop Singhal( )

1 edition published in 2010 in English and held by 216 WorldCat member libraries worldwide

Handbook on securing cyber-physical critical infrastructure : foundation and challenges by Sajal K Das( )

1 edition published in 2012 in English and held by 70 WorldCat member libraries worldwide

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. @*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios @*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. @*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Preserving privacy for On-Line Analytical Processing by Lingyu Wang( Book )

2 editions published between 2007 and 2011 in English and held by 21 WorldCat member libraries worldwide

Preserving privacy for On-Line Analytical Processing (OLAP) by Lingyu Wang( )

4 editions published between 2006 and 2007 in English and held by 20 WorldCat member libraries worldwide

Addresses the privacy issue of On-Line Analytic Processing systems(OLAP). This work details how to keep the performance overhead of these security methods at a reasonable level. It also examines how a balance between security, availability, and performance can feasibly be achieved in OLAP systems
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security( )

1 edition published in 2007 in English and held by 5 WorldCat member libraries worldwide

"Preserving Privacy For On-Line Analytical Processing" addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sensitive data stored in underlying data warehouses must be kept secret. Second, analytical queries about the data must be allowed for decision support purposes. The main challenge is that sensitive data can be inferred from answers to seemingly innocent aggregations of the data. This volume reviews a series of methods that can precisely answer data cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data. "Preserving Privacy For On-Line Analytical Processing" is appropriate for practitioners in industry as well as graduate-level students in computer science and engineering
Constructive concurrent dynamic logic I by Anil Nerode( )

2 editions published in 1990 in English and held by 3 WorldCat member libraries worldwide

Constructive modal logics I by Duminda Wijesekera( )

2 editions published in 1990 in English and held by 3 WorldCat member libraries worldwide

Normal Forms and Syntactic Completeness Proofs for Functional Independencies( Book )

2 editions published in 1998 in English and held by 2 WorldCat member libraries worldwide

We prove normal form theorems of a complete axiom system for the inference of functional dependencies and independencies in relational databases. We also show that all proofs in our system have a normal form where the application of independency rules is limited to three levels. Our normal form results in a faster proof search engine in deriving consequences of functional independencies. As a result, we get a new construction of an Armstrong relation for a given set of functional dependencies. It is also shown that an Armstrong relation for a set of functional dependencies and independencies do not exist in general, and this generalizes the same result valid under the closed world assumption
Performance Evaluation of Media Synchronization Losses in the Continuous Media Toolkit( Book )

2 editions published in 1998 in English and held by 2 WorldCat member libraries worldwide

This paper presents a performance analysis of synchronization services provided by the Berkeley Continuous Media Toolkit (CMT). The quality of audio video synchronization is measured against processor and network loads for both remote and local clients. The metrics of analysis are the perceptible and tolerable human perceptual limits reported by Steinmetz, and another metric designed to measure synchronization of lossy media streams. It is shown that according to Steinmetz, metric CMT provides imperceptible audio video mis-synchronization for about 10 seconds, and tolerable synchronization for about 13 seconds from the start of the clips for local clients under low processor loads. It is also shown that under high loads, synchronization is achieved at the cost of losing media frames
QoS Based Evaluation of the Berkeley Continuous Media Toolkit( Book )

2 editions published in 1999 in English and held by 2 WorldCat member libraries worldwide

This paper presents a performance analysis of the Continuous Media service provided by the Berkeley, Continuous Media Tool kit (CMT). We show a development of metrics, validation by means of a user study, and a performance evaluation of a prototyping environment. The CMT is a popular environment that satisfies our need of being easily extendible and offers a quick prototyping environment. From a human user's perspective, in order for multimedia demonstrations to be comprehensible, the number of audio or video frames dropped and the timing delays in the ones that are displayed, and the degree of asynchrony between two streams such as audio and video, need to be kept within limits. Therefore, it is important to' know the frame dropping, timing delay and synchronization drift characteristics of CMT. In a series' of experiments we monitored the variation of these parameters with respect to processor, network and event loop loads. It was observed that loads affect aggregate frame drops at lower rates, and consecutive frame drops at higher rates. Because at a higher rates a large number of consecutive frames are dropped, the ones that are" played appear in a more timely manner. It is shown that according to metrics provided by other studies, CMT provides imperceptible audio-video mis-synchronization for about 10 seconds, and tolerable synchronization for about 13 seconds, from the start of the clips for local clients under low processor loads. It is also shown that under high loads, synchronization is achieved at the cost of losing media frames.1,'
Optimizing Lawful Responses to Cyber Intrusions( Book )

2 editions published in 2005 in English and held by 2 WorldCat member libraries worldwide

Cyber intrusions are rarely met with the most effective possible response, less for technical than legal reasons. Different rogue actors (terrorists, criminals, spies, etc.) are governed by overlapping but separate domestic and international legal regimes. Each of these regimes has unique limitations, but also offers unique opportunities for evidence collection, intelligence gathering, and use of force. We propose a framework which automates the mechanistic aspects of the decision-making process, with human intervention for only those legal judgments that necessitate human judgment and official responsibility. The basis of our framework is a pair of decision trees, one executable solely by the threatened system, the other by the attorneys responsible for the lawful pursuit of the intruders. These parallel decision trees are interconnected, and contain pre-distilled legal resources for making an objective, principled determination at each decision point. We offer an open-source development strategy for realizing and maintaining the framework
Experimental Evaluation of Loss Perception in Continuous Media( Book )

2 editions published in 1998 in English and held by 2 WorldCat member libraries worldwide

Perception of multimedia quality, specified by quality of service metrics can be used by system designers to optimize customer satisfaction within resource bounds enforced by general purpose computing platforms. Media losses, rate variations and transient synchronization losses have been speculated to affect human perception of multimedia quality. This paper presents metrics to measure such defects and results of a series of user experiments that justify such speculations. Results of the study provide bounds on losses, rate variations and transient synchronization losses as a function of user satisfaction, in the form of Likert values. It is shown how these results can be used by algorithm designers of underlying multimedia systems
Performance Evaluation of Media Losses in the Continuous Media Toolkit( Book )

2 editions published in 1998 in English and held by 2 WorldCat member libraries worldwide

This paper shows a methodology for user driven, top down approach to research in quality of service Issues in multimedia systems. As a case study, we show a development of metrics, validation by means of a user study, and a performance evaluation of prototyping environments. What is used, the Berkeley Continuous Media Toolkit (CMT), is a popular environment that satisfies this need. From a human user's perspective, in order for multimedia demonstrations to be comprehensible, the number of audio or video frames dropped and the timing delays in the ones that are displayed, need to be kept to a minimum. Therefore, it is important to know the frame dropping characteristics of CMT. In a series of experiments we monitored the variation of these parameters with respect to processor and network loads. It was observed that loads affect aggregate frame drops at lower rates and consecutive frame drops at higher rates. because at higher rates a large number of consecutive frames are dropped, the ones that are played appear in a more timely manned. As a solution to observed problems, we present som QoS based approaches to control drop and delay paramenters
Communication security concerns in communications based train control by M Hartong( )

1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide

Requirements for Self-Stabilization of Distributed Advanced Battle Managers( Book )

2 editions published in 2006 in English and held by 2 WorldCat member libraries worldwide

In this report, we formalize the self-stabilization problem as it pertains to the C2BMC, in addition to highlighting some of key features of the C2BMC that distinguish it from general-purpose distributed systems. We then describe a sub-area of self-stabilization known as the leader election problem, pointing out the issues tied to the re-establishment of an ABM command and control structure in the event of system faults. We performed an initial survey of a small sample of recent articles from the open literature on leader election algorithms; we found that there are over 10,000 articles on the leader election problem. The report includes a critique of each of the surveyed articles. Our report concludes with recommendations for both a framework of a leader election protocol that could be applied to the C2BMC and specific directions of further research to be conducted
Forensic Capabilities For Service-Oriented Architectures( Book )

2 editions published in 2008 in English and held by 2 WorldCat member libraries worldwide

This report describes a framework to provide on-line forensic capabilities to service oriented architecture via Forensic Web Services (FWS) and runtime execution monitoring. The FWS is a new type of web services to be used by other web services (of an independent agency) to securely maintain transactional records of interest between other web services. The framework uses runtime execution monitoring to search the transactional log for interesting (or suspicious) service invocation sequences to recreate non-repudiable evidence of transactional history for use in a court of law
Constructive modal logics by Duminda Wijesekera( )

2 editions published in 1990 in English and held by 2 WorldCat member libraries worldwide

Mapping misuse cases to functional fault trees in order to secure positive train control systems by Mark Hartong( )

1 edition published in 2006 in English and held by 2 WorldCat member libraries worldwide

 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.51 (from 0.22 for Handbook o ... to 0.94 for Forensic C ...)

Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Covers
Preserving privacy in On-Line Analytical Processing (OLAP)Preserving privacy for On-Line Analytical ProcessingPreserving privacy for On-Line Analytical Processing (OLAP)
Alternative Names
Wijesekera, D.

Wijesekera, D. (Duminda)

Languages
English (64)