CSILLA FARKAS

Department of Computer Science and Engineering

University of South Carolina

Columbia, SC 29208, USA

Email: farkas@cec.sc.edu Phone: (803)576-5762

 

In the following list of publications, the names of the students I advised  are underlined. 

Books and Book Chapters

1.       Thomas Erl, et al. , C. Farkas (author), “Service Oriented Infrastructure, On Premise and in the Cloud,” The Prentice Hall, 1st edition, ISBN-10: 0132360284, May 2014.

2.       A. Jain and C. Farkas, " Ontology-Based Authorization Model for XML Data in Distributed Systems,” in Web Services Security Development and Architecture: Theoretical and Practical Issues, editors C. Gutierrez, E. Fernandez-Medina, and M. Piattini, ISBN-10: 1605669504, January 2010.

3.       C. Farkas, “Data Confidentiality on The Semantic Web: Is There an Inference Problem?,  Web and Information Security, editors E. Ferrari and B. Thuraisingham, IRM Press, ISBN-10: 1591405882, October 2005.

4.       Research Directions in Data and Application Security XVIII , IFIP TC 11/WG 11.3, editors: C. Farkas and P. Samarati, Kluwer Academic Publisher, ISBN-10: 1475779941, 2004, reprinted in 2013.

 

Journal  Publications  

5.       O. A. Dia and C. Farkas, “Risk Aware Query Replacement Approach for Secure Databases Performance Management,” conditionally accepted for IEEE Transactions on Dependable and Secure Computing (TDSC), Vol.2, No.2., 2015.

6.       O.A. Dia and C. Farkas, “Business Driven Role-Based Access Control,” International Journal of Information Security and Privacy (IJISP) 7 (1), 45-62, 2013.

7.       O.A. Dia and C.Farkas, “A Practical Framework for Policy Composition and Conflict Resolution,” International Journal of Secure Software Engineering (IJSSE), 3(4): 1-26, 2012.

8.       R.D. Parker and C. Farkas, “Modeling Estimated Risk for Cyber Attacks: Merging Public Health and Cyber Security,” Journal of Information Assurance and Security Letters (JIASL), Vol. 2, 32-36, 2011.

9.       T. S. Toland, C. Farkas, C. M. Eastman, “The inference problem: Maintaining maximal availability in the presence of database updates,” Journal of Computers & Security, Volume 29(1): 88-103, 2010.

10.   C. Farkas, A. Brodsky, and S. Jajodia, “Unauthorized Inferences in Semi-Structured Databases, Information Sciences Journal, 176(22): 3269-3299, 2007.

11.   G. Ziegler, C. Farkas, and A. Lorincz, “A Framework for Anonymous but Accountable Self-Organizing Communities,” Journal of Information and Software Technologies, 48(8): 726-744, 2006.

12.   V. Gowadia and C. Farkas, “Tree Automate for Schema-level Filtering of XML Associations,” Journal of Research and Practice in Information Technology (JRPIT), Vol. 38, No. 1, 97-109, 2006.

13.   K. Alghathbar, D. Wijesekera, and C. Farkas, “Securing UML Information Flow using FlowUML,” Journal of Research and Practice in Information Technology (JRPIT), Vol. 38, No. 1, 111-120, 2006.

14.   V. Gowadia, C. Farkas, M. Valtorta,”PAID: A Probabilistic Agent-Based Intrusion Detection system,  Computers & Security 24(7): 529-545, 2005. 

15.   N. B. Kodali, C. Farkas, and D. Wijesekera, “Enforcing Semantics Aware Security in Multimedia Surveillance,” Journal on Data Semantics II, LNCS 3360: 199-221, 2005.  

16.   N. B. Kodali, C. Farkas, and D. Wijesekera, “An Authorization Model for Multimedia Digital Libraries,” International Journal of Digital Libraries, Special issue on Security, 4(3): 139-155, 2004.

17.   A. Stoica and C. Farkas, “Ontology Guided XML Security Engine,” Journal of Intelligent Information Systems, 23(3): 209-223, 2004.

18.   N. B. Kodali, C. Farkas, and D. Wijesekera, “Specifying Multimedia Access Control using RDF,” Journal of Computer Systems Science and Engineering, Special issue on Semantics-Aware Techniques for Security, 19(3): 95-105, 2004.

19.   C. Farkas and S. Jajodia, “The Inference Problem: A Survey,” SIGKDD Explorations, 4(2): 6-11, 2002.

20.   C. Farkas and M. Huhns, “Making Agents Secure on the Semantic Web,” IEEE Internet Computing, 6(6): 76-79, 2002.

21.   Brodsky, C. Farkas, and S. Jajodia, “Secure Databases: Constraints, Inference Channels and Monitoring Disclosures,” IEEE Trans. on Knowledge and Data Engineering, 12(6): 900-919, 2000. 

 

Conference  Publications  

22.   C. Farkas, “Big Data Analytics: Privacy Protection Using Semantic Web Technologies,” extended abstract NSF Workshop on Big Data Security and Privacy, September 2014.
23.   V. Kish, J. R. Rose, C. Farkas, “Efficient Partitioning and Allocation of Data for Workload Queries,” in Proc. of The 9th Annual International Joint Conferences on Computer, Information, Systems Sciences, & Engineering (CISSE) E-Conference, December, 2013.
24.   A. Olmsted and C. Farkas, “Web Service Constraint Optimization, 8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013.
25.   A. Olmsted and C. Farkas, “Coarse Grained Web Service Availability, Consistency, and Durability,” IEEE 20th International Conference on Web Services, track paper, 2013.
26.   A. Olmsted and C. Farkas, “High Volume Web Service Resource Consumption,” Internet Technology and Secured Transactions,  ICITST, pages 275-280, 2012.
27.   A. Olmsted and C. Farkas, “The Cost of Increased Transactional Correctness and Durability in Distributed Databases,  2012 IEEE International Conference on Information Reuse and Integration (IRI), page(s): 441 – 448, 2012. 
28.   R. H. Stalvey, C. Farkas, C. Eastman, “First use: Introducing information security in high school oracle academy courses,” 2012 IEEE International Conference on Information Reuse and Integration (IRI), page(s): 653-658, 2012. 
29.   S. Valentine and C. Farkas, “Software Safety and Security for Programmable Logic Controllers”, International Conference on Information Technology: New Generations (ITNG), extended abstract and presentation, 2013.
30.   Y. Kopylova, C. Farkas, and W. Xu, “Accurate Accident Reconstruction in VANET,” IFIP 11.3 DBSec 2011: 271-279, 2011.
31.   S. Valentine, C. Farkas, “Software security: Application-level vulnerabilities in SCADA systems,” IEEE IRI 2011: 498-499, 2011.
32.   M. Jafari-lafti, C.T.Huang, C. Farkas, “P2F: A User-Centric Privacy Protection Framework,” ARES 2009: 386-391, 2009.
33.   C. Farkas and M. Huhns, “Securing Enterprise Applications: Service-Oriented Security (SOS),” CEC/EEE 2008: 428-431, 2008.
34.   V. Gowadia, C. Farkas, M. Kudo, “Checking Security Policy Compliance, CoRR abs/0809.5266, 2008.
35.   K. Lazar and C. Farkas, “Security in TciNMP Systems,” WOSIS 2007: 95-104, 2007.
36.   H. Pamunuwa, D. Wijesekera, C. Farkas, “An Intrusion Detection System for Detecting Phishing Attacks,” Secure Data Management SDM(2007): 181-192, 2007.
37.   M. Hartong, R. Goel, C. Farkas, D. Wijesekera, ”PTC-VANET Interactions to Prevent Highway Rail Intersection Crossing Accidents,” VTC Spring, 2550-2554, 2007.
38.   S. Valentine and C. Farkas, “PLC Code Vulnerabilities through SCADA Systems,” Presentation at the First IFIP WG 11.10 International Conference on Critical Infrastructure Protection, USA, March 2007.
39.   A. Jain and C. Farkas, “Secure Resource Description Framework: an Access Control Model,” in Proc. of ACM Symposium on Access Control Models and Technologies (SACMAT 2006): 121-129, 2006.
40.   C. Farkas, A. Jain, D. Wijesekera, A. Singhal, and B. Thuraisingham, “Semantic-Aware Data Protection in Web Services,” in Proc. of IEEE Workshop on Web Services Security (WSSS 2006), in connection with the IEEE Symposium on Security and Privacy, 2006.
41.   S. Kaushik, C. Farkas, D. Wijesekera and P. Ammann, “An Algebra for Composing Ontologies,” in Proc. of the International Conference on Formal Ontology in Information Systems, (FOIS 2006), FOIS 2006: 265-276, 2006.
42.   J. B. Bowles, C. M. Eastman, C. Farkas, “Engaging undergraduates in computer security research,” (InfoSecCD 2006): 184-190, 2006.
43.   C. Farkas, V. Gowadia, A. Jain, and D. Roy, “From XML to RDF: Syntax, Semantics, Security, and Integrity,” Invited talk at WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems, Dec. 2005.
44.   T. Toland, C. Farkas, and C. Eastman, “Dynamic Disclosure Monitor (D2Mon): An Improved Query Processing Solution,” Proc. of Secure Data Management Workshop, in association with VLDB, 124-142, 2005. Published as: Lecture Notes in Computer Science 3674, Secure Data Management, 2nd VLDB Workshop, SDM 2005, eds. W. Jonker and M. Petkovic, Springer-Verlag, 2005. ISBN: 3-540-28798-1
45.   V. Gowadia and C. Farkas, “Tree Automate for Schema-level Filtering of XML Associations,” Proc. of Workshop on Security in Information Systems, 136-145, 2005.
46.   Zs. Palotai, C. Farkas, and A. Lorincz, “Selection in Scale-Free Small World,”  short paper, 4th International Central and Eastern European Conference on Multi-Agent Systems (CEEMAS'05),  LNAI 3690, eds. M. Pechoucek, P. Petta, and Zs. Varga, Springer-Verlag, 579-582, 2005.
47.   K. Alghathbar, D. Wijesekera, C. Farkas, “Secure UML Information Flow using FlowUML,” Proc. of Workshop on Security in Information Systems, 229-238, 2005.
48.   I. Youn, C. Farkas, and B. Thuraisingham, “Multilevel Secure Teleconferencing over Public Switched Telephone Network,” Proc. of IFIP 19th  WG 11.3 working conference on Data and Application Security, 99-113, 2005. Published as: Lecture Notes in Computer Science 3654, Data and Applications Security XIX, eds. S. Jajodia and D. Wijesekera, Springer-Verlag, 2005. ISBN: 3-540-28138
49.   Zs. Palotai, C. Farkas, and A Lorincz, “Is selection optimal for scale- free small worlds?,” Proc. European Conference for Complex Systems, to appear, 2005.
50.   C. Farkas, T.C. Wingfield, J.B. Michael, and D. Wijesekera, “THEMIS: Threat Evaluation Metamodel for Information Systems,” Proc. of the 2nd Symposium on Intelligence and Security Informatics, 307-321, 2004. Published as: Lecture Notes in Computer Science 3073, Intelligence and Security Informatics, eds. H. Chen, R. Moore, D.D. Zeng, and J. Leavitt, Springer-Verlag, 2004. ISBN: 3-540-22125
51.   N. Kodali, C. Farkas, and D. Wijesekera, “SECRETS: A Secure Real-Time Multimedia Surveillance System,” Proc. of the 2nd Symposium on Intelligence and Security Informatics, 278-297, 2004. Published as: Lecture Notes in Computer Science 3073, Intelligence and Security Informatics, eds. H. Chen, R. Moore, D.D. Zeng, and J. Leavitt, Springer-Verlag, 2004. ISBN: 3-540-22125
52.   N. Kodali, C. Farkas, and D. Wijesekera, “Creating non-decomposable Multi-media Stream bundles in Multimedia Surveillance,” Proc. of Workshop on Secure Web Services, in association with the 11th ACM CCS Conference, 2004.
53.   V. Gowadia, C. Farkas, and M. Valtorta, “Agent-Based Intrusion Detection with Soft Evidence,” Proc. of  IRMA International Conference, 2003.
54.   C.Eastman and C. Farkas, “Information Systems Security in the Information Systems Curriculum,” Proc. of IRMA International Conference, 2003.
55.   C. Eastman and C. Farkas, “Information Systems Security: Distributed Modules or Centralized Course?,” Proc. of  ASEE Southeast Section Annual Conference, 2003.
56.   C. Farkas and A. Stoica, “Correlated Data Inference in Ontology Guided XML Security Engine,” Proc. of  IFIP 17th  WG 11.3 Working Conference on Data and Application Security, 119-132, 2003. Published as: Data and Application Security XVII, Status and Prospects, eds. S. De Capitani di Vimercati, I. Ray, and I. Ray, Kluwer Academic Publisher, 2004. ISBN: 1402080697
57.   V. Gowadia and C. Farkas, “RDF Metadata for XML Access Control,” Proc. Workshop on XML Security, in association with the 10th ACM CCS Conference, 39- 48, 2003.
58.   N. Kodali, C. Farkas, and D. Wijesekera,  Multimedia Access Control using RDF-Metadata,”  Proc. Workshop on Metadata for Security, in connection to ODBASE, 718-731, 2003
59.   N. Kodali, C. Farkas, and D. Wijesekera, “MLS-SMIL for Electronic Surveillance of Facilities with
Multi-Level Security Requirements,” Proc. IFIP 6th WG 11.5, Working Conference  on Data Integrity and Control in Information Systems, 2003
60.   C. Farkas, A. Stoica, and P. Talekar, “APTA: an Automated Policy Translation Architecture,” In Proc. of International Conference on Computer, Communication and Control Technologies, 2003.
61.   C. Farkas, G. Ziegler, A. Meretei, and A. Lorincz, “Anonymity and Accountability in Self-Organizing Electronic Communities,” Proc. Workshop on Privacy in the Electronic Society, in association with the 9th ACM CCS Conference, 81-90, 2002.
62.   A. Stoica and C. Farkas, “Secure XML Views,” Proc. of 16th  IFIP WG11.3 Working Conference on Database and Application Security, 133-146, 2002.
63.   C. Farkas, T. Toland, and C. Eastman, “The Inference Problem and Updates in Relational Databases,” Proc. of 15th IFIP WG11.3 Working Conference on Database and Application Security, 181-194, 2001
64.   C. Farkas, M. Valtorta, and S. Fenner, “Medical Privacy versus Data Mining,” Proc. 5th World Multiconference on Systemics, Cybernetics and Informatics, 194-200, July 2001.
65.   A. Brodsky, C. Farkas, D. Wijesekera, and S. X. Wang, “Constraints, Inference Channels and Secure Databases,” Proc. Sixth International Conference on Principles and Practice of Constraint Programming, 98-113, 2000. Published as: Lecture Notes in Computer Science 1894, Principles and Practice of Constraint Programming – CP 2000, ed. R. Dechter, Springer-Verlag, 2000. ISBN: 3-540-41053-8

 

Manuscripts to be submitted 

66.   A. Kish, J. Rose, and C. Farkas, “Partitioning for Distributed, Service-Based Systems,” to be submitted to Journal of Database Management (JDM) in Sept. 2015.

67.   S. Valentine and C. Farkas,”PLC code Vulnerability: A static analysis tool,” to be submitted to IEEE Trans. on Industrial Informatics in Sept. 2015.

68.   J. Ravan, S. Banik, and C. Farkas, “Ensuring ACID Transactions in a Web Service Environment with Prediction-Based Performance Metrics,” to be submitted to IEEE Trans. Services Computing in October 2015.

69.   M. Daniels and C. Farkas, “Medical Data Privacy: Ontology-Based Data Disclosure,” to be submitted to Journal of the American Medical Informatics Association: JAMIA