| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2011 | — | conf |
WEIS (Springer Volume)
|
| 2011 | — | conf |
WEIS
|
| 2011 | C | conf |
CloudCom
|
| 2011 | B | conf |
TrustCom
|
| 2010 | J | jnl |
J. Comput. Secur.
|
| 2010 | — | conf |
HealthGrid
|
| 2009 | — | conf |
MIE
|
| 2009 | — | conf |
HealthGrid
|
| 2009 | B | conf |
CBMS
|
| 2009 | J | jnl |
ACM SIGOPS Oper. Syst. Rev.
|
| 2009 | — | conf |
POLICY
|
| 2009 | A | conf |
Using security metrics coupled with predictive modeling and simulation to assess security processes.
ESEM
|
| 2008 | A | conf |
ACSAC
|
| 2007 | — | conf |
QoP
|
| 2007 | — | conf |
Digital Identity Management
|
| 2005 | J | jnl |
Int. J. Inf. Sec.
|
| 2005 | — | ed. |
iTrust
|
| 2005 | — | conf |
iTrust
|
| 2003 | C | conf |
ISC
|
| 2003 | A | conf |
ESORICS
|
| 2003 | — | conf |
iTrust
|
| 2003 | B | conf |
CBMS
|
| 2002 | — | conf |
IEEE Security in Storage Workshop
|
| 2002 | B | conf |
COMPSAC
|
| 2002 | B | conf |
COMPSAC
|
| 1996 | B | conf |
COLING
|
| 1996 | — | conf |
FAPR
|
| 1996 | — | — |