Department of Computer Science and
University of South Carolina
Columbia, SC 29208, USA
Email: firstname.lastname@example.org Phone:
In the following list of
publications, the names of the students I advised are underlined.
Books and Book Chapters
1. Thomas Erl, et al. , C. Farkas (author), “Service Oriented Infrastructure, On Premise
and in the Cloud,” The Prentice Hall, 1st edition, ISBN-10:
0132360284, May 2014.
2. A. Jain and C. Farkas,
Authorization Model for XML Data in Distributed Systems,” in Web Services Security Development and
Architecture: Theoretical and Practical Issues, editors C. Gutierrez, E.
Fernandez-Medina, and M. Piattini, ISBN-10: 1605669504,
3. C. Farkas, “Data
Confidentiality on The Semantic Web: Is There an Inference Problem?,” Web and Information Security, editors E.
Ferrari and B. Thuraisingham, IRM Press,
ISBN-10: 1591405882, October 2005.
Directions in Data and Application Security XVIII , IFIP
TC 11/WG 11.3, editors: C. Farkas
and P. Samarati, Kluwer Academic Publisher, ISBN-10: 1475779941, 2004, reprinted in 2013.
O. A. Dia and C. Farkas, “Risk Aware Query
Replacement Approach for Secure Databases Performance Management,”
conditionally accepted for IEEE
Transactions on Dependable and Secure Computing (TDSC), Vol.2, No.2., 2015.
O.A. Dia and C. Farkas, “Business Driven Role-Based
Access Control,” International Journal of
Information Security and Privacy (IJISP) 7 (1), 45-62, 2013.
7. O.A. Dia and C.Farkas, “A Practical Framework for Policy Composition and
Conflict Resolution,” International
Journal of Secure Software Engineering (IJSSE), 3(4): 1-26, 2012.
8. R.D. Parker and C. Farkas, “Modeling Estimated Risk for
Cyber Attacks: Merging Public Health and Cyber Security,” Journal of Information Assurance and Security Letters (JIASL), Vol.
2, 32-36, 2011.
9. T. S. Toland, C. Farkas, C. M. Eastman, “The inference problem:
Maintaining maximal availability in the presence of database updates,” Journal of Computers & Security, Volume 29(1): 88-103, 2010.
10. C. Farkas, A. Brodsky, and
“Unauthorized Inferences in Semi-Structured Databases,” Information Sciences Journal, 176(22):
Farkas, and A. Lorincz, “A
Framework for Anonymous but Accountable Self-Organizing Communities,” Journal of Information and Software Technologies,
48(8): 726-744, 2006.
V. Gowadia and C. Farkas,
“Tree Automate for Schema-level Filtering of XML Associations,” Journal of Research and Practice in
Information Technology (JRPIT), Vol. 38, No. 1, 97-109, 2006.
Alghathbar, D. Wijesekera,
and C. Farkas,
“Securing UML Information Flow using FlowUML,” Journal of Research and Practice in Information
Technology (JRPIT), Vol. 38, No. 1, 111-120, 2006.
V. Gowadia, C. Farkas, M. Valtorta,”PAID:
A Probabilistic Agent-Based Intrusion Detection system,” Computers & Security 24(7): 529-545, 2005.
15. N. B. Kodali, C.
Farkas, and D. Wijesekera, “Enforcing Semantics
Aware Security in Multimedia Surveillance,” Journal
on Data Semantics II, LNCS 3360: 199-221, 2005.
16. N. B. Kodali, C.
Farkas, and D. Wijesekera, “An Authorization
Model for Multimedia Digital Libraries,” International Journal of Digital Libraries,
Special issue on Security, 4(3): 139-155, 2004.
17. A. Stoica and C.
Farkas, “Ontology Guided XML Security Engine,” Journal of Intelligent
Information Systems, 23(3): 209-223, 2004.
18. N. B. Kodali, C.
Farkas, and D. Wijesekera, “Specifying Multimedia
Access Control using RDF,” Journal of Computer Systems Science and Engineering,
Special issue on Semantics-Aware Techniques for Security, 19(3): 95-105, 2004.
19. C. Farkas and S. Jajodia,
“The Inference Problem: A Survey,” SIGKDD Explorations, 4(2): 6-11, 2002.
20. C. Farkas and M. Huhns, “Making Agents Secure on the Semantic Web,” IEEE
Internet Computing, 6(6): 76-79, 2002.
21. Brodsky, C. Farkas, and S. Jajodia,
“Secure Databases: Constraints, Inference Channels and Monitoring Disclosures,”
IEEE Trans. on Knowledge and Data Engineering, 12(6): 900-919, 2000.
Farkas, “Big Data Analytics: Privacy Protection Using Semantic
Web Technologies,” extended abstract NSF Workshop on Big Data Security and
Privacy, September 2014.
J. R. Rose,
C. Farkas, “Efficient Partitioning and Allocation of Data for
Workload Queries,” in Proc. of The 9th Annual
International Joint Conferences on Computer, Information, Systems Sciences,
& Engineering (CISSE) E-Conference, December, 2013.
A. Olmsted and
Farkas, “Web Service Constraint Optimization,” 8th International Conference for
Internet Technology and Secured Transactions (ICITST-2013), 2013.
Farkas, “Coarse Grained Web Service Availability, Consistency,
and Durability,” IEEE 20th International Conference on Web Services, track
Farkas, “High Volume Web Service Resource Consumption,” Internet
Technology and Secured Transactions, ICITST, pages 275-280, 2012.
Farkas, “The Cost of Increased Transactional Correctness and
Durability in Distributed Databases,” 2012 IEEE International Conference on
Information Reuse and Integration (IRI), page(s): 441 – 448, 2012.
R. H. Stalvey,
Farkas, C. Eastman, “First use: Introducing information security
in high school oracle academy courses,” 2012 IEEE International Conference on
Information Reuse and Integration (IRI), page(s): 653-658, 2012.
Farkas, “Software Safety and Security for Programmable Logic
Controllers”, International Conference on Information Technology: New
Generations (ITNG), extended abstract and presentation, 2013.
Farkas, and W. Xu, “Accurate Accident
Reconstruction in VANET,” IFIP 11.3 DBSec 2011:
Farkas, “Software security: Application-level vulnerabilities in
SCADA systems,” IEEE IRI 2011: 498-499, 2011.
C.T.Huang, C. Farkas, “P2F: A
User-Centric Privacy Protection Framework,” ARES 2009: 386-391, 2009.
Farkas and M. Huhns, “Securing Enterprise
Applications: Service-Oriented Security (SOS),”
2008: 428-431, 2008.
Farkas, M. Kudo, “Checking Security
Policy Compliance,” CoRR abs/0809.5266, 2008.
Farkas, “Security in TciNMP Systems,” WOSIS
2007: 95-104, 2007.
H. Pamunuwa, D. Wijesekera, C. Farkas, “An Intrusion
Detection System for Detecting Phishing Attacks,” Secure Data Management SDM(2007):
M. Hartong, R. Goel, C. Farkas, D. Wijesekera, ”PTC-VANET Interactions to Prevent Highway Rail
Intersection Crossing Accidents,” VTC Spring, 2550-2554, 2007.
Farkas, “PLC Code Vulnerabilities through SCADA Systems,”
Presentation at the First IFIP WG 11.10 International Conference on Critical
Infrastructure Protection, USA, March 2007.
A. Jain and
Farkas, “Secure Resource Description Framework: an Access Control
Model,” in Proc. of ACM Symposium on Access Control Models and Technologies (SACMAT
2006): 121-129, 2006.
Farkas, A. Jain, D. Wijesekera,
A. Singhal, and B. Thuraisingham,
“Semantic-Aware Data Protection in Web Services,” in Proc. of IEEE Workshop on
Web Services Security (WSSS 2006), in connection with the IEEE Symposium on
Security and Privacy, 2006.
S. Kaushik, C. Farkas,
D. Wijesekera and P. Ammann,
“An Algebra for Composing Ontologies,” in Proc. of the International Conference
on Formal Ontology in Information Systems, (FOIS 2006), FOIS 2006: 265-276,
J. B. Bowles, C. M. Eastman, C. Farkas,
“Engaging undergraduates in computer security research,” (InfoSecCD
2006): 184-190, 2006.
Farkas, V. Gowadia, A. Jain,
and D. Roy, “From XML to RDF: Syntax, Semantics, Security, and Integrity,” Invited
talk at WG 11.1 & WG 11.5 Joint Working Conference on Security Management,
Integrity, and Internal Control in Information Systems, Dec. 2005.
Farkas, and C. Eastman, “Dynamic Disclosure Monitor (D2Mon): An
Improved Query Processing Solution,” Proc. of Secure Data Management Workshop,
in association with VLDB, 124-142, 2005. Published as:
Lecture Notes in Computer Science 3674, Secure Data Management, 2nd VLDB
Workshop, SDM 2005, eds. W. Jonker and M. Petkovic, Springer-Verlag, 2005.
Farkas, “Tree Automate for Schema-level Filtering of XML
Associations,” Proc. of Workshop on Security in Information Systems, 136-145,
Palotai, C. Farkas,
and A. Lorincz, “Selection in Scale-Free Small
World,” short paper, 4th International
Central and Eastern European Conference on Multi-Agent Systems
(CEEMAS'05), LNAI 3690, eds. M. Pechoucek, P. Petta, and Zs. Varga, Springer-Verlag, 579-582, 2005.
K. Alghathbar, D. Wijesekera, C. Farkas, “Secure UML
Information Flow using FlowUML,” Proc. of Workshop on
Security in Information Systems, 229-238, 2005.
I. Youn, C. Farkas,
and B. Thuraisingham, “Multilevel Secure
Teleconferencing over Public Switched Telephone Network,” Proc. of IFIP
19th WG 11.3 working conference on Data
and Application Security, 99-113, 2005. Published as: Lecture
Notes in Computer Science 3654, Data and Applications Security XIX, eds. S. Jajodia and D. Wijesekera,
Springer-Verlag, 2005. ISBN: 3-540-28138
Palotai, C. Farkas,
and A Lorincz, “Is selection optimal for scale- free
small worlds?,” Proc. European Conference for Complex
Systems, to appear, 2005.
Farkas, T.C. Wingfield, J.B. Michael,
and D. Wijesekera, “THEMIS: Threat Evaluation Metamodel for Information Systems,” Proc. of the 2nd
Symposium on Intelligence and Security Informatics, 307-321, 2004. Published as: Lecture Notes in Computer Science 3073, Intelligence
and Security Informatics, eds. H. Chen, R. Moore, D.D. Zeng,
and J. Leavitt, Springer-Verlag, 2004. ISBN:
Farkas, and D. Wijesekera, “SECRETS: A
Secure Real-Time Multimedia Surveillance System,” Proc. of the 2nd Symposium on
Intelligence and Security Informatics, 278-297, 2004. Published
as: Lecture Notes in Computer Science 3073, Intelligence and Security
Informatics, eds. H. Chen, R. Moore, D.D. Zeng, and
J. Leavitt, Springer-Verlag, 2004. ISBN:
Farkas, and D. Wijesekera, “Creating
non-decomposable Multi-media Stream bundles in Multimedia Surveillance,” Proc.
of Workshop on Secure Web Services, in association with the 11th ACM CCS
Farkas, and M. Valtorta, “Agent-Based
Intrusion Detection with Soft Evidence,” Proc. of IRMA International Conference, 2003.
C.Eastman and C.
Farkas, “Information Systems Security in the Information Systems
Curriculum,” Proc. of IRMA International Conference, 2003.
C. Eastman and C. Farkas, “Information
Systems Security: Distributed Modules or Centralized Course?,”
Proc. of ASEE Southeast Section Annual
Farkas and A. Stoica,
“Correlated Data Inference in Ontology Guided XML Security Engine,” Proc. of IFIP 17th WG 11.3 Working Conference on Data and
Application Security, 119-132, 2003. Published as: Data and
Application Security XVII, Status and Prospects, eds. S. De Capitani
di Vimercati, I. Ray, and I. Ray, Kluwer Academic
Publisher, 2004. ISBN: 1402080697
Farkas, “RDF Metadata for XML Access Control,” Proc. Workshop on
XML Security, in association with the 10th ACM CCS Conference, 39- 48, 2003.
Farkas, and D. Wijesekera, “Multimedia Access
Control using RDF-Metadata,” Proc.
Workshop on Metadata for Security, in connection to ODBASE, 718-731, 2003
Kodali, C. Farkas,
and D. Wijesekera, “MLS-SMIL for Electronic
Surveillance of Facilities with
Multi-Level Security Requirements,” Proc. IFIP 6th WG 11.5,
Working Conference on
Data Integrity and Control in Information Systems, 2003
Farkas, A. Stoica, and P. Talekar, “APTA: an Automated Policy Translation
Architecture,” In Proc. of International Conference on Computer, Communication
and Control Technologies, 2003.
Farkas, G. Ziegler, A. Meretei, and A. Lorincz, “Anonymity and Accountability in Self-Organizing
Electronic Communities,” Proc. Workshop on Privacy in the Electronic Society,
in association with the 9th ACM CCS Conference, 81-90, 2002.
Farkas, “Secure XML Views,” Proc. of 16th IFIP WG11.3 Working Conference on
Database and Application Security, 133-146, 2002.
Farkas, T. Toland, and C.
Eastman, “The Inference Problem and Updates in Relational Databases,” Proc. of
15th IFIP WG11.3 Working Conference on Database and Application Security,
Farkas, M. Valtorta, and S. Fenner, “Medical Privacy versus Data Mining,” Proc. 5th
World Multiconference on Systemics,
Cybernetics and Informatics, 194-200, July 2001.
A. Brodsky, C. Farkas, D. Wijesekera, and S. X. Wang, “Constraints, Inference
Channels and Secure Databases,” Proc. Sixth International Conference on
Principles and Practice of Constraint Programming, 98-113, 2000. Published as: Lecture Notes in Computer Science 1894, Principles
and Practice of Constraint Programming – CP 2000, ed. R. Dechter,
Springer-Verlag, 2000. ISBN: 3-540-41053-8
to be submitted
66. A. Kish, J. Rose, and C. Farkas, “Partitioning for
Distributed, Service-Based Systems,” to be submitted to Journal of Database
Management (JDM) in Sept. 2015.
67. S. Valentine and C. Farkas,”PLC
code Vulnerability: A static analysis tool,” to be submitted to IEEE Trans. on
Industrial Informatics in Sept. 2015.
68. J. Ravan, S. Banik, and C. Farkas, “Ensuring ACID
Transactions in a Web Service Environment with Prediction-Based Performance
Metrics,” to be submitted to IEEE Trans. Services Computing in October
69. M. Daniels and C. Farkas, “Medical Data Privacy:
Ontology-Based Data Disclosure,” to be submitted to Journal of the American
Medical Informatics Association: JAMIA