<?xml version="1.0"?>
<dblpperson name="Paul Ammann" pid="a/PAmmann" n="109">
<person key="homepages/a/PAmmann" mdate="2025-05-16">
<author pid="a/PAmmann">Paul Ammann</author>
<note type="affiliation">George Mason University, Fairfax, Virginia, USA</note>
<url>http://ise.gmu.edu/~pammann/</url>
<url>https://scholar.google.com/citations?user=-j0V55IAAAAJ</url>
<url>https://dl.acm.org/profile/81100513501</url>
<url>https://mathgenealogy.org/id.php?id=67535</url>
<url>https://www.wikidata.org/entity/Q78153354</url>
<url>https://orcid.org/0009-0002-8470-2917</url>
<url>https://www.wikidata.org/entity/Q130926443</url>
</person>
<r><inproceedings key="conf/icst/AlshammariAHB24" mdate="2024-09-05">
<author pid="294/1258">Abdulrahman Alshammari</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="116/7598">Michael Hilton</author>
<author pid="84/1826-1">Jonathan Bell 0001</author>
<title>230,439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers.</title>
<pages>257-268</pages>
<year>2024</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST60714.2024.00031</ee>
<crossref>conf/icst/2024</crossref>
<url>db/conf/icst/icst2024.html#AlshammariAHB24</url>
<stream>streams/conf/icst</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/AlshammariAHB24a" mdate="2024-10-01">
<author pid="294/1258">Abdulrahman Alshammari</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="116/7598">Michael Hilton</author>
<author pid="84/1826-1">Jonathan Bell 0001</author>
<title>A Study of Flaky Failure De-Duplication to Identify Unreliably Killed Mutants.</title>
<pages>257-262</pages>
<year>2024</year>
<booktitle>ICSTW</booktitle>
<ee>https://doi.org/10.1109/ICSTW60967.2024.00054</ee>
<crossref>conf/icst/2024w</crossref>
<url>db/conf/icst/icst2024w.html#AlshammariAHB24a</url>
<stream>streams/conf/icst</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/issta/KukuckaPA024" mdate="2025-01-19">
<author orcid="0009-0009-9847-7897" pid="322/7605">James Kukucka</author>
<author orcid="0000-0003-4585-5259" pid="98/2164">Lu&#237;s Pina</author>
<author orcid="0009-0002-8470-2917" pid="a/PAmmann">Paul Ammann</author>
<author orcid="0000-0002-1187-9298" pid="84/1826-1">Jonathan Bell 0001</author>
<title>An Empirical Examination of Fuzzer Mutator Performance.</title>
<pages>1631-1642</pages>
<year>2024</year>
<booktitle>ISSTA</booktitle>
<ee>https://doi.org/10.1145/3650212.3680387</ee>
<ee>https://www.wikidata.org/entity/Q130926444</ee>
<crossref>conf/issta/2024</crossref>
<url>db/conf/issta/issta2024.html#KukuckaPA024</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2401-15788" mdate="2024-02-06">
<author pid="294/1258">Abdulrahman Alshammari</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="116/7598">Michael Hilton</author>
<author pid="84/1826-1">Jonathan Bell 0001</author>
<title>230, 439 Test Failures Later: An Empirical Evaluation of Flaky Failure Classifiers.</title>
<year>2024</year>
<volume>abs/2401.15788</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2401.15788</ee>
<url>db/journals/corr/corr2401.html#abs-2401-15788</url>
</article>
</r>
<r><inproceedings key="conf/icse/KukuckaPA022" mdate="2024-02-05">
<author pid="322/7605">James Kukucka</author>
<author pid="98/2164">Lu&#237;s Pina</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author orcid="0000-0002-1187-9298" pid="84/1826-1">Jonathan Bell 0001</author>
<title>CONFETTI: Amplifying Concolic Guidance for Fuzzers.</title>
<pages>438-450</pages>
<year>2022</year>
<booktitle>ICSE</booktitle>
<ee>https://doi.org/10.1145/3510003.3510628</ee>
<crossref>conf/icse/2022</crossref>
<url>db/conf/icse/icse2022.html#KukuckaPA022</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/KaufmanFAKAJ22" mdate="2022-06-23">
<author pid="00/2211">Samuel J. Kaufman</author>
<author pid="322/7625">Ryan Featherman</author>
<author pid="242/3906">Justin Alvin</author>
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="75/10029">Ren&#233; Just</author>
<title>Prioritizing Mutants to Guide Mutation Testing.</title>
<pages>1743-1754</pages>
<year>2022</year>
<booktitle>ICSE</booktitle>
<ee>https://doi.org/10.1145/3510003.3510187</ee>
<crossref>conf/icse/2022</crossref>
<url>db/conf/icse/icse2022.html#KaufmanFAKAJ22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigsoft/BaralOAM21" mdate="2025-01-19">
<author pid="242/6305">Kesina Baral</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="242/6221">Rasika Mohod</author>
<title>Practice makes better: quiz retake software to increase student learning.</title>
<pages>47-53</pages>
<year>2021</year>
<booktitle>EASEAI@ESEC/SIGSOFT FSE</booktitle>
<ee>https://doi.org/10.1145/3472673.3473965</ee>
<ee>https://www.wikidata.org/entity/Q130843044</ee>
<crossref>conf/sigsoft/2021easeai</crossref>
<url>db/conf/sigsoft/easeai2021.html#BaralOAM21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/BaralA20" mdate="2020-08-12">
<author pid="242/6305">Kesina Baral</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Teaching a Testing Concept (JUnit) with Active Learning.</title>
<pages>411</pages>
<year>2020</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW50294.2020.00073</ee>
<crossref>conf/icst/2020w</crossref>
<url>db/conf/icst/icstw2020.html#BaralA20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/ChenGTEHFAJ20" mdate="2026-03-03">
<author pid="59/1143-1">Yiqun T. Chen</author>
<author pid="93/11109">Rahul Gopinath</author>
<author orcid="0000-0002-7567-0127" pid="282/5651">Anita Tadakamalla</author>
<author pid="e/MDErnst">Michael D. Ernst</author>
<author pid="18/1889">Reid Holmes</author>
<author pid="74/2259">Gordon Fraser 0001</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="75/10029">Ren&#233; Just</author>
<title>Revisiting the Relationship Between Fault Detection, Test Adequacy Criteria, and Test Set Size.</title>
<pages>237-249</pages>
<year>2020</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1145/3324884.3416667</ee>
<ee>https://ieeexplore.ieee.org/document/9286102</ee>
<crossref>conf/kbse/2020</crossref>
<url>db/conf/kbse/ase2020.html#ChenGTEHFAJ20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/AlvinKARJ19" mdate="2019-08-29">
<author pid="242/3906">Justin Alvin</author>
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="30/444">Huzefa Rangwala</author>
<author pid="75/10029">Ren&#233; Just</author>
<title>Guiding testing effort using mutant utility.</title>
<pages>312-313</pages>
<year>2019</year>
<booktitle>ICSE (Companion Volume)</booktitle>
<ee>https://doi.org/10.1109/ICSE-Companion.2019.00130</ee>
<ee>https://dl.acm.org/citation.cfm?id=3339800</ee>
<crossref>conf/icse/2019c</crossref>
<url>db/conf/icse/icse2019c.html#AlvinKARJ19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/BaralMFGA19" mdate="2019-06-11">
<author pid="242/6305">Kesina Baral</author>
<author pid="242/6221">Rasika Mohod</author>
<author pid="242/6242">Jennifer Flamm</author>
<author pid="242/6264">Seth Goldrich</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Evaluating a Test Automation Decision Support Tool.</title>
<pages>69-76</pages>
<year>2019</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2019.00034</ee>
<crossref>conf/icst/2019w</crossref>
<url>db/conf/icst/icstw2019.html#BaralMFGA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/PetrovicIKAJ18" mdate="2023-03-23">
<author pid="14/5531">Goran Petrovic</author>
<author orcid="0000-0002-8548-6008" pid="54/10043">Marko Ivankovic</author>
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="75/10029">Ren&#233; Just</author>
<title>An Industrial Application of Mutation Testing: Lessons, Challenges, and Research Directions.</title>
<pages>47-53</pages>
<year>2018</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2018.00027</ee>
<crossref>conf/icst/2018w</crossref>
<url>db/conf/icst/icstw2018.html#PetrovicIKAJ18</url>
</inproceedings>
</r>
<r><article key="journals/infsof/DengOAM17" mdate="2023-11-06">
<author orcid="0000-0003-0588-643X" pid="17/2104-1">Lin Deng 0001</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="117/5454">Nariman Mirzaei</author>
<title>Mutation operators for testing Android apps.</title>
<pages>154-168</pages>
<year>2017</year>
<volume>81</volume>
<journal>Inf. Softw. Technol.</journal>
<ee>https://doi.org/10.1016/j.infsof.2016.04.012</ee>
<ee>https://www.wikidata.org/entity/Q113317196</ee>
<url>db/journals/infsof/infsof81.html#DengOAM17</url>
</article>
</r>
<r><inproceedings key="conf/issta/JustKA17" mdate="2018-11-06">
<author pid="75/10029">Ren&#233; Just</author>
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Inferring mutant utility from program context.</title>
<pages>284-294</pages>
<year>2017</year>
<booktitle>ISSTA</booktitle>
<ee>https://doi.org/10.1145/3092703.3092732</ee>
<crossref>conf/issta/2017</crossref>
<url>db/conf/issta/issta2017.html#JustKA17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lats/OffuttADKLPRSWW17" mdate="2018-11-06">
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="58/3654">Kinga Dobolyi</author>
<author pid="198/7436">Chris Kauffmann</author>
<author pid="173/9201">Jaime Lester</author>
<author pid="58/4306">Upsorn Praphamontripong</author>
<author pid="30/444">Huzefa Rangwala</author>
<author pid="10/2676">Sanjeev Setia</author>
<author pid="71/5770">Pearl Y. Wang</author>
<author pid="198/7455">Liz White</author>
<title>A Novel Self-Paced Model for Teaching Programming.</title>
<pages>177-180</pages>
<year>2017</year>
<booktitle>L@S</booktitle>
<ee>https://doi.org/10.1145/3051457.3053978</ee>
<crossref>conf/lats/2017</crossref>
<url>db/conf/lats/lats2017.html#OffuttADKLPRSWW17</url>
</inproceedings>
</r>
<r><article key="journals/ieeesp/CaputoPSAOD16" mdate="2025-10-14">
<author pid="74/5873">Deanna D. Caputo</author>
<author pid="73/1640">Shari Lawrence Pfleeger</author>
<author orcid="0000-0003-1823-5505" pid="s/MASasse">M. Angela Sasse</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author orcid="0000-0003-0588-643X" pid="17/2104-1">Lin Deng 0001</author>
<title>Barriers to Usable Security? Three Organizational Case Studies.</title>
<pages>22-32</pages>
<year>2016</year>
<volume>14</volume>
<journal>IEEE Secur. Priv.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MSP.2016.95</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MSP.2016.95</ee>
<url>db/journals/ieeesp/ieeesp14.html#CaputoPSAOD16</url>
</article>
</r>
<r><inproceedings key="conf/icst/KurtzAOK16" mdate="2023-03-23">
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="183/8614">Mariet Kurtz</author>
<title>Are We There Yet? How Redundant and Equivalent Mutants Affect Determination of Test Completeness.</title>
<pages>142-151</pages>
<year>2016</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2016.41</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2016.41</ee>
<crossref>conf/icst/2016w</crossref>
<url>db/conf/icst/icstw2016.html#KurtzAOK16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigsoft/KurtzAODKG16" mdate="2022-10-02">
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="84/3153">M&#225;rcio Eduardo Delamaro</author>
<author pid="183/8614">Mariet Kurtz</author>
<author orcid="0000-0002-4840-5408" pid="46/2317">Nida G&#246;k&#231;e</author>
<title>Analyzing the validity of selective mutation with dominator mutants.</title>
<pages>571-582</pages>
<year>2016</year>
<booktitle>SIGSOFT FSE</booktitle>
<ee>https://doi.org/10.1145/2950290.2950322</ee>
<crossref>conf/sigsoft/2016</crossref>
<url>db/conf/sigsoft/fse2016.html#KurtzAODKG16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/greens/BehrouzSGMA15" mdate="2025-11-15">
<author pid="18/10505">Reyhaneh Jabbarvand Behrouz</author>
<author pid="128/5354">Alireza Sadeghi</author>
<author orcid="0000-0002-1696-8783" pid="06/6932">Joshua Garcia</author>
<author pid="88/4685">Sam Malek</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>EcoDroid: An Approach for Energy-Based Ranking of Android Apps.</title>
<pages>8-14</pages>
<year>2015</year>
<booktitle>GREENS</booktitle>
<ee>https://doi.org/10.1109/GREENS.2015.9</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/GREENS.2015.9</ee>
<ee>http://dl.acm.org/citation.cfm?id=2820161</ee>
<crossref>conf/greens/2015</crossref>
<url>db/conf/greens/greens2015.html#BehrouzSGMA15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/DengMAO15" mdate="2023-11-06">
<author orcid="0000-0003-0588-643X" pid="17/2104-1">Lin Deng 0001</author>
<author pid="117/5454">Nariman Mirzaei</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Towards mutation analysis of Android apps.</title>
<pages>1-10</pages>
<year>2015</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2015.7107450</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2015.7107450</ee>
<crossref>conf/icst/2015w</crossref>
<url>db/conf/icst/icstw2015.html#DengMAO15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/KurtzAO15" mdate="2023-03-23">
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Static analysis of mutant subsumption.</title>
<pages>1-10</pages>
<year>2015</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2015.7107454</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2015.7107454</ee>
<crossref>conf/icst/2015w</crossref>
<url>db/conf/icst/icstw2015.html#KurtzAO15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/DelamaroOA14" mdate="2023-03-23">
<author pid="84/3153">M&#225;rcio Eduardo Delamaro</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Designing Deletion Mutation Operators.</title>
<pages>11-20</pages>
<year>2014</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST.2014.12</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICST.2014.12</ee>
<crossref>conf/icst/2014</crossref>
<url>db/conf/icst/icst2014.html#DelamaroOA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/AmmannDO14" mdate="2023-03-23">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="84/3153">M&#225;rcio Eduardo Delamaro</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Establishing Theoretical Minimal Sets of Mutants.</title>
<pages>21-30</pages>
<year>2014</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST.2014.13</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICST.2014.13</ee>
<crossref>conf/icst/2014</crossref>
<url>db/conf/icst/icst2014.html#AmmannDO14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/KurtzADOD14" mdate="2023-11-06">
<author pid="149/4462">Bob Kurtz</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="84/3153">M&#225;rcio Eduardo Delamaro</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author orcid="0000-0003-0588-643X" pid="17/2104-1">Lin Deng 0001</author>
<title>Mutant Subsumption Graphs.</title>
<pages>176-185</pages>
<year>2014</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2014.20</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2014.20</ee>
<crossref>conf/icst/2014w</crossref>
<url>db/conf/icst/icstw2014.html#KurtzADOD14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/VemasaniBA14" mdate="2023-03-23">
<author pid="149/4165">Preetham Vemasani</author>
<author pid="b/AlexanderBrodsky">Alexander Brodsky 0001</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Generating Test Data to Distinguish Conjunctive Queries with Equalities.</title>
<pages>216-221</pages>
<year>2014</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2014.23</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2014.23</ee>
<crossref>conf/icst/2014w</crossref>
<url>db/conf/icst/icstw2014.html#VemasaniBA14</url>
</inproceedings>
</r>
<r><article key="journals/jss/KaminskiAO13" mdate="2020-02-24">
<author pid="133/5747">Gary Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Improving logic-based testing.</title>
<pages>2002-2012</pages>
<year>2013</year>
<volume>86</volume>
<journal>J. Syst. Softw.</journal>
<number>8</number>
<ee>https://doi.org/10.1016/j.jss.2012.08.024</ee>
<url>db/journals/jss/jss86.html#KaminskiAO13</url>
</article>
</r>
<r><article key="journals/stvr/AmmannFW12" mdate="2020-11-23">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="74/2259">Gordon Fraser 0001</author>
<author orcid="0000-0002-0462-2283" pid="w/FranzWotawa">Franz Wotawa</author>
<title>Guest Editorial for the Special Issue on Model-Based Testing.</title>
<pages>295-296</pages>
<year>2012</year>
<volume>22</volume>
<journal>Softw. Test. Verification Reliab.</journal>
<number>5</number>
<ee>https://doi.org/10.1002/stvr.1478</ee>
<url>db/journals/stvr/stvr22.html#AmmannFW12</url>
</article>
</r>
<r><inproceedings key="conf/icst/SheltonLAO12" mdate="2023-03-23">
<author pid="17/11466">William Shelton</author>
<author pid="84/3795-8">Nan Li 0008</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Adding Criteria-Based Tests to Test Driven Development.</title>
<pages>878-886</pages>
<year>2012</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST.2012.191</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICST.2012.191</ee>
<crossref>conf/icst/2012</crossref>
<url>db/conf/icst/icst2012.html#SheltonLAO12</url>
</inproceedings>
</r>
<r><article key="journals/infsof/KaminskiPAO11" mdate="2020-02-20">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="58/4306">Upsorn Praphamontripong</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>A logic mutation approach to selective mutation for programs and queries.</title>
<pages>1137-1152</pages>
<year>2011</year>
<volume>53</volume>
<journal>Inf. Softw. Technol.</journal>
<number>10</number>
<ee>https://doi.org/10.1016/j.infsof.2011.03.009</ee>
<url>db/journals/infsof/infsof53.html#KaminskiPAO11</url>
</article>
</r>
<r><article key="journals/stvr/KaminskiA11" mdate="2020-04-01">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Reducing logic test set size while preserving fault detection.</title>
<pages>155-193</pages>
<year>2011</year>
<volume>21</volume>
<journal>Softw. Test. Verification Reliab.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/stvr.442</ee>
<url>db/journals/stvr/stvr21.html#KaminskiA11</url>
</article>
</r>
<r><inproceedings key="conf/csee/OffuttLAX11" mdate="2023-03-24">
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="84/3795-8">Nan Li 0008</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="92/2988">Wuzhi Xu</author>
<title>Using abstraction and Web applications to teach criteria-based test design.</title>
<pages>227-236</pages>
<year>2011</year>
<booktitle>CSEE&#38;T</booktitle>
<ee>https://doi.org/10.1109/CSEET.2011.5876092</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSEET.2011.5876092</ee>
<crossref>conf/csee/2011</crossref>
<url>db/conf/csee/csee2011.html#OffuttLAX11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icse/KaminskiAO11" mdate="2025-10-24">
<author pid="133/5747">Gary Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Better predicate testing.</title>
<pages>57-63</pages>
<year>2011</year>
<booktitle>AST@ICSE</booktitle>
<ee>https://doi.org/10.1145/1982595.1982608</ee>
<crossref>conf/icse/2011ast</crossref>
<url>db/conf/icse/ast2011.html#KaminskiAO11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/KaminskiA10" mdate="2023-03-23">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Applications of Optimization to Logic Testing.</title>
<pages>331-336</pages>
<year>2010</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2010.49</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2010.49</ee>
<crossref>conf/icst/2010w</crossref>
<url>db/conf/icst/icstw2010.html#KaminskiA10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/serp/KaminskiPAO10" mdate="2010-12-10">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="58/4306">Upsorn Praphamontripong</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>An Evaluation of the Minimal-MUMCUT Logic Criterion and Prime Path Coverage.</title>
<pages>205-211</pages>
<year>2010</year>
<booktitle>Software Engineering Research and Practice</booktitle>
<crossref>conf/serp/2010</crossref>
<url>db/conf/serp/serp2010.html#KaminskiPAO10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/serp/KaminskiA10" mdate="2010-12-12">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Applying MCDC to Large DNF Logic Expressions.</title>
<pages>411-417</pages>
<year>2010</year>
<booktitle>Software Engineering Research and Practice</booktitle>
<crossref>conf/serp/2010</crossref>
<url>db/conf/serp/serp2010.html#KaminskiA10</url>
</inproceedings>
</r>
<r><article key="journals/jss/FraserWA09" mdate="2023-08-28">
<author pid="74/2259">Gordon Fraser 0001</author>
<author orcid="0000-0002-0462-2283" pid="w/FranzWotawa">Franz Wotawa</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Issues in using model checkers for test case generation.</title>
<pages>1403-1418</pages>
<year>2009</year>
<volume>82</volume>
<journal>J. Syst. Softw.</journal>
<number>9</number>
<ee>https://doi.org/10.1016/j.jss.2009.05.016</ee>
<ee>https://www.wikidata.org/entity/Q121438034</ee>
<url>db/journals/jss/jss82.html#FraserWA09</url>
</article>
</r>
<r><article key="journals/stvr/FraserWA09" mdate="2020-11-23">
<author pid="74/2259">Gordon Fraser 0001</author>
<author orcid="0000-0002-0462-2283" pid="w/FranzWotawa">Franz Wotawa</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Testing with model checkers: a survey.</title>
<pages>215-261</pages>
<year>2009</year>
<volume>19</volume>
<journal>Softw. Test. Verification Reliab.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/stvr.402</ee>
<url>db/journals/stvr/stvr19.html#FraserWA09</url>
</article>
</r>
<r><inproceedings key="conf/icst/KaminskiA09b" mdate="2023-03-23">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Double Fault Detection.</title>
<pages>167-176</pages>
<year>2009</year>
<booktitle>ICST Workshops</booktitle>
<ee>https://doi.org/10.1109/ICSTW.2009.13</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICSTW.2009.13</ee>
<crossref>conf/icst/2009w</crossref>
<url>db/conf/icst/icstw2009.html#KaminskiA09b</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/KaminskiA09" mdate="2023-03-23">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Using Logic Criterion Feasibility to Reduce Test Set Size While Guaranteeing Fault Detection.</title>
<pages>356-365</pages>
<year>2009</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST.2009.14</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICST.2009.14</ee>
<crossref>conf/icst/2009</crossref>
<url>db/conf/icst/icst2009.html#KaminskiA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icst/KaminskiA09a" mdate="2023-03-23">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Using a Fault Hierarchy to Improve the Efficiency of DNF Logic Mutation Testing.</title>
<pages>386-395</pages>
<year>2009</year>
<booktitle>ICST</booktitle>
<ee>https://doi.org/10.1109/ICST.2009.13</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICST.2009.13</ee>
<crossref>conf/icst/2009</crossref>
<url>db/conf/icst/icst2009.html#KaminskiA09a</url>
</inproceedings>
</r>
<r><book key="books/daglib/0020331" mdate="2019-07-25">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Introduction to Software Testing.</title>
<pages>I-XXII, 1-322</pages>
<publisher>Cambridge University Press</publisher>
<year>2008</year>
<isbn>978-0-521-88038-1</isbn>
<isbn>978-0-511-80916-3</isbn>
<ee>https://doi.org/10.1017/CBO9780511809163</ee>
</book>
</r>
<r><article key="journals/stvr/KaminskiWA08" mdate="2020-04-01">
<author pid="49/3218">Garrett Kent Kaminski</author>
<author pid="45/6195">Gregory Williams 0002</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Reconciling perspectives of software logic testing.</title>
<pages>149-188</pages>
<year>2008</year>
<volume>18</volume>
<journal>Softw. Test. Verification Reliab.</journal>
<number>3</number>
<ee>https://doi.org/10.1002/stvr.386</ee>
<url>db/journals/stvr/stvr18.html#KaminskiWA08</url>
</article>
</r>
<r><inproceedings key="conf/fortest/AmmannOX08" mdate="2017-05-24">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="92/2988">Wuzhi Xu</author>
<title>Coverage Criteria for State Based Specifications.</title>
<pages>118-156</pages>
<year>2008</year>
<booktitle>Formal Methods and Testing</booktitle>
<ee>https://doi.org/10.1007/978-3-540-78917-8_4</ee>
<crossref>conf/fortest/2008</crossref>
<url>db/conf/fortest/fortest2008.html#AmmannOX08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/qsic/FraserA08" mdate="2023-03-23">
<author pid="74/2259">Gordon Fraser 0001</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Reachability and Propagation for LTL Requirements Testing.</title>
<pages>189-198</pages>
<year>2008</year>
<booktitle>QSIC</booktitle>
<ee>https://doi.org/10.1109/QSIC.2008.21</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/QSIC.2008.21</ee>
<crossref>conf/qsic/2008</crossref>
<url>db/conf/qsic/qsic2008.html#FraserA08</url>
</inproceedings>
</r>
<r><article key="journals/tc/LiuLJA07" mdate="2022-06-13">
<author pid="21/6121-5">Peng Liu 0005</author>
<author orcid="0000-0002-4974-6116" pid="17/2703-2">Jie Li 0002</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Can-Follow Concurrency Control.</title>
<pages>1425-1430</pages>
<year>2007</year>
<volume>56</volume>
<journal>IEEE Trans. Computers</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TC.2007.70761</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TC.2007.70761</ee>
<url>db/journals/tc/tc56.html#LiuLJA07</url>
</article>
</r>
<r><inproceedings key="conf/amost/WijesekeraASF07" mdate="2020-11-23">
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="42/3331">Lingya Sun</author>
<author pid="74/2259">Gordon Fraser 0001</author>
<title>Relating counterexamples to test cases in CTL model checking specifications.</title>
<pages>75-84</pages>
<year>2007</year>
<crossref>conf/amost/2007</crossref>
<booktitle>A-MOST</booktitle>
<ee>https://doi.org/10.1145/1291535.1291543</ee>
<url>db/conf/amost/amost2007.html#WijesekeraASF07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/PamulaJAS06" mdate="2018-11-06">
<author pid="61/4569">Joseph Pamula</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="36/2914">Vipin Swarup</author>
<title>A weakest-adversary security metric for network configuration security analysis.</title>
<pages>31-38</pages>
<year>2006</year>
<booktitle>QoP</booktitle>
<ee>https://doi.org/10.1145/1179494.1179502</ee>
<crossref>conf/ccs/2006qop</crossref>
<url>db/conf/ccs/qop2006.html#PamulaJAS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/KaushikWWA06" mdate="2020-03-12">
<author pid="01/1589">Saket Kaushik</author>
<author pid="45/6818">William H. Winsborough</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems.</title>
<pages>163-178</pages>
<year>2006</year>
<crossref>conf/dbsec/2006</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11805588_12</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2006/KaushikWWA06.pdf</ee>
<url>db/conf/dbsec/dbsec2006.html#KaushikWWA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fois/KaushikFWA06" mdate="2025-10-29">
<author pid="01/1589">Saket Kaushik</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>An Algebra for Composing Ontologies.</title>
<pages>265-276</pages>
<year>2006</year>
<booktitle>FOIS</booktitle>
<crossref>conf/fois/2006</crossref>
<url>db/conf/fois/fois2006.html#KaushikFWA06</url>
<ee>https://dl.acm.org/doi/10.5555/1566079.1566110</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/isese/GuanOA06" mdate="2018-11-06">
<author pid="94/536">Jing Guan</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>An industrial case study of structural testing applied to safety-critical embedded software.</title>
<pages>272-277</pages>
<year>2006</year>
<crossref>conf/isese/2006</crossref>
<booktitle>ISESE</booktitle>
<ee>https://doi.org/10.1145/1159733.1159774</ee>
<url>db/conf/isese/isese2006.html#GuanOA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/PamulaAJR06" mdate="2018-11-06">
<author pid="61/4569">Joseph Pamula</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="12/3356">Ronald W. Ritchey</author>
<title>A framework for establishing, assessing, and managing trust in inter-organizational relationships.</title>
<pages>23-32</pages>
<year>2006</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1180367.1180374</ee>
<crossref>conf/sws/2006</crossref>
<url>db/conf/sws/sws2006.html#PamulaAJR06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/KaushikWA06" mdate="2018-11-06">
<author pid="01/1589">Saket Kaushik</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>BPEL orchestration of secure webmail.</title>
<pages>85-94</pages>
<year>2006</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1180367.1180383</ee>
<crossref>conf/sws/2006</crossref>
<url>db/conf/sws/sws2006.html#KaushikWA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/AmmannPSR05" mdate="2023-03-23">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="61/4569">Joseph Pamula</author>
<author pid="87/1905">Julie A. Street</author>
<author pid="12/3356">Ronald W. Ritchey</author>
<title>A Host-Based Approach to Network Attack Chaining Analysis.</title>
<pages>72-84</pages>
<year>2005</year>
<crossref>conf/acsac/2005</crossref>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.2005.6</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSAC.2005.6</ee>
<url>db/conf/acsac/acsac2005.html#AmmannPSR05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/KaushikWWA05" mdate="2018-11-06">
<author pid="01/1589">Saket Kaushik</author>
<author pid="45/6818">William H. Winsborough</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Email feedback: a policy-based approach to overcoming false positives.</title>
<pages>73-82</pages>
<year>2005</year>
<crossref>conf/ccs/2005fmse</crossref>
<booktitle>FMSE</booktitle>
<ee>https://doi.org/10.1145/1103576.1103586</ee>
<url>db/conf/ccs/ccs2005fmse.html#KaushikWWA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sws/KaushikWA05" mdate="2018-11-06">
<author pid="01/1589">Saket Kaushik</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Policy-based dissemination of partial web-ontologies.</title>
<pages>43-52</pages>
<year>2005</year>
<booktitle>SWS</booktitle>
<ee>https://doi.org/10.1145/1103022.1103030</ee>
<crossref>conf/sws/2005</crossref>
<url>db/conf/sws/sws2005.html#KaushikWA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/policy/KaushikAWWR04" mdate="2023-03-23">
<author pid="01/1589">Saket Kaushik</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="45/6818">William H. Winsborough</author>
<author pid="12/3356">Ronald W. Ritchey</author>
<title>A Policy Driven Approach to Email Services.</title>
<pages>169-</pages>
<year>2004</year>
<crossref>conf/policy/2004</crossref>
<booktitle>POLICY</booktitle>
<ee>https://doi.org/10.1109/POLICY.2004.1309163</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/POLICY.2004.1309163</ee>
<url>db/conf/policy/policy2004.html#KaushikAWWR04</url>
</inproceedings>
</r>
<r><article key="journals/stvr/OffuttLAA03" mdate="2020-04-01">
<author pid="o/AJeffersonOffutt">A. Jefferson Offutt</author>
<author pid="99/4667">Shaoying Liu</author>
<author pid="62/5357">Aynur Abdurazik</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Generating test data from state-based specifications.</title>
<pages>25-53</pages>
<year>2003</year>
<volume>13</volume>
<journal>Softw. Test. Verification Reliab.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/stvr.264</ee>
<url>db/journals/stvr/stvr13.html#OffuttLAA03</url>
</article>
</r>
<r><inproceedings key="conf/issre/AmmannOH03" mdate="2023-03-24">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">A. Jefferson Offutt</author>
<author pid="74/3859">Hong Huang</author>
<title>Coverage Criteria for Logical Expressions.</title>
<pages>99-107</pages>
<year>2003</year>
<crossref>conf/issre/2003</crossref>
<booktitle>ISSRE</booktitle>
<ee>https://doi.org/10.1109/ISSRE.2003.1251034</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISSRE.2003.1251034</ee>
<url>db/conf/issre/issre2003.html#AmmannOH03</url>
</inproceedings>
</r>
<r><article key="journals/tkde/AmmannJL02" mdate="2017-05-20">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="21/6121-5">Peng Liu 0005</author>
<title>Recovery from Malicious Transactions.</title>
<pages>1167-1185</pages>
<year>2002</year>
<volume>14</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TKDE.2002.1033782</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TKDE.2002.1033782</ee>
<url>db/journals/tkde/tkde14.html#AmmannJL02</url>
</article>
</r>
<r><inproceedings key="conf/ccs/AmmannWK02" mdate="2025-01-19">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="w/DumindaWijesekera">Duminda Wijesekera</author>
<author pid="01/1589">Saket Kaushik</author>
<title>Scalable, graph-based network vulnerability analysis.</title>
<pages>217-224</pages>
<year>2002</year>
<crossref>conf/ccs/2002</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/586110.586140</ee>
<ee>https://www.wikidata.org/entity/Q130917781</ee>
<url>db/conf/ccs/ccs2002.html#AmmannWK02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iceccs/AmmannDX01" mdate="2023-03-24">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="59/622-3">Wei Ding 0003</author>
<author pid="30/2635">Daling Xu</author>
<title>Using a Model Checker to Test Safety Properties.</title>
<pages>212-221</pages>
<year>2001</year>
<crossref>conf/iceccs/2001</crossref>
<booktitle>ICECCS</booktitle>
<ee>https://doi.org/10.1109/ICECCS.2001.930180</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICECCS.2001.930180</ee>
<url>db/conf/iceccs/iceccs2001.html#AmmannDX01</url>
</inproceedings>
</r>
<r><article key="journals/dpd/LiuAJ00" mdate="2020-05-18">
<ee>https://doi.org/10.1023/A:1008731200105</ee>
<author pid="21/6121-5">Peng Liu 0005</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Rewriting Histories: Recovering from Malicious Transactions.</title>
<pages>7-40</pages>
<year>2000</year>
<volume>8</volume>
<journal>Distributed Parallel Databases</journal>
<number>1</number>
<url>db/journals/dpd/dpd8.html#LiuAJ00</url>
<cdrom>DPD/8/P007.pdf</cdrom>
</article>
</r>
<r><article key="journals/isci/RayAJ00" mdate="2017-05-27">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.</title>
<pages>155-195</pages>
<year>2000</year>
<volume>129</volume>
<journal>Inf. Sci.</journal>
<number>1-4</number>
<url>db/journals/isci/isci129.html#RayAJ00</url>
<ee>https://doi.org/10.1016/S0020-0255(00)00062-1</ee>
</article>
</r>
<r><article key="journals/sigsoft/Ammann00" mdate="2020-09-17">
<author pid="a/PAmmann">Paul Ammann</author>
<title>System testing via mutation analysis of model checking specifications.</title>
<pages>33</pages>
<year>2000</year>
<volume>25</volume>
<journal>ACM SIGSOFT Softw. Eng. Notes</journal>
<number>1</number>
<ee>https://doi.org/10.1145/340855.340862</ee>
<url>db/journals/sigsoft/sigsoft25.html#Ammann00</url>
</article>
</r>
<r><inproceedings key="conf/iceccs/AbdurazikADO00" mdate="2023-03-24">
<author pid="62/5357">Aynur Abdurazik</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="59/622-3">Wei Ding 0003</author>
<author pid="o/AJeffersonOffutt">A. Jefferson Offutt</author>
<title>Evaluation of Three Specification-Based Testing Criteria.</title>
<pages>179-187</pages>
<year>2000</year>
<crossref>conf/iceccs/2000</crossref>
<booktitle>ICECCS</booktitle>
<ee>https://doi.org/10.1109/ICECCS.2000.873943</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICECCS.2000.873943</ee>
<url>db/conf/iceccs/iceccs2000.html#AbdurazikADO00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/RitcheyA00" mdate="2023-09-21">
<author pid="12/3356">Ronald W. Ritchey</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Using Model Checking to Analyze Network Vulnerabilities.</title>
<pages>156-165</pages>
<year>2000</year>
<crossref>conf/sp/2000</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.2000.848453</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.2000.848453</ee>
<url>db/conf/sp/sp2000.html#RitcheyA00</url>
</inproceedings>
</r>
<r><article key="journals/cacm/JajodiaMA99" mdate="2018-11-06">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="76/2160">Catherine D. McCollum</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Trusted Recovery.</title>
<pages>71-75</pages>
<year>1999</year>
<volume>42</volume>
<journal>Commun. ACM</journal>
<number>7</number>
<cdrom>CACMs1/CACM4207/P0071.pdf</cdrom>
<ee>https://doi.org/10.1145/306549.306580</ee>
<url>db/journals/cacm/cacm42.html#JajodiaMA99</url>
<cite>...</cite>
<cite>journals/tods/AmmannJR97</cite>
<cite>conf/sigmod/Garcia-MolinaS87</cite>
<cite>books/mk/GrayR93</cite>
<cite>...</cite>
</article>
</r>
<r><article key="journals/computer/JajodiaAM99" mdate="2020-08-12">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="76/2160">Catherine D. McCollum</author>
<title>Surviving Information Warfare Attacks.</title>
<pages>57-63</pages>
<year>1999</year>
<volume>32</volume>
<journal>Computer</journal>
<number>4</number>
<url>db/journals/computer/computer32.html#JajodiaAM99</url>
<ee>https://doi.org/10.1109/2.755006</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/2.755006</ee>
</article>
</r>
<r><article key="journals/ieeecc/AmmannJ99" mdate="2022-08-16">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Computer Security, Fault Tolerance, And Software Assurance.</title>
<pages>4-6</pages>
<year>1999</year>
<volume>7</volume>
<journal>IEEE Concurr.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/MCC.1999.749129</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MCC.1999.749129</ee>
<ee>https://www.wikidata.org/entity/Q113435947</ee>
<url>db/journals/ieeecc/ieeecc7.html#AmmannJ99</url>
</article>
</r>
<r><inproceedings key="conf/hase/AmmannB99" mdate="2023-03-24">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="16/6383">Paul E. Black</author>
<title>A Specification-Based Coverage Metric to Evaluate Test Sets.</title>
<pages>239-248</pages>
<year>1999</year>
<crossref>conf/hase/1999</crossref>
<booktitle>HASE</booktitle>
<ee>https://doi.org/10.1109/HASE.1999.809499</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HASE.1999.809499</ee>
<url>db/conf/hase/hase1999.html#AmmannB99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcs/LiuAJ99" mdate="2023-03-24">
<author pid="21/6121-5">Peng Liu 0005</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.</title>
<pages>414-423</pages>
<year>1999</year>
<crossref>conf/icdcs/1999</crossref>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS.1999.776543</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCS.1999.776543</ee>
<url>db/conf/icdcs/icdcs99.html#LiuAJ99</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tc11-5/AmmannJ99" mdate="2002-01-03">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>The Integrity Challenge.</title>
<pages>59-70</pages>
<year>1999</year>
<crossref>conf/tc11-5/1999</crossref>
<booktitle>IICIS</booktitle>
<url>db/conf/tc11-5/iicis1999.html#AmmannJ99</url>
</inproceedings>
</r>
<r><article key="journals/jcs/RayAJ98" mdate="2023-08-28">
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>A Semantic-Based Transaction Processing Model for Multilevel Transactions.</title>
<pages>181-217</pages>
<year>1998</year>
<volume>6</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<url>db/journals/jcs/jcs6.html#RayAJ98</url>
<ee>https://doi.org/10.3233/jcs-980108</ee>
<ee>https://www.wikidata.org/entity/Q114943851</ee>
</article>
</r>
<r><inproceedings key="conf/icfem/AmmannBM98" mdate="2023-03-23">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="16/6383">Paul E. Black</author>
<author pid="70/2261">William Majurski</author>
<title>Using Model Checking to Generate Tests from Specifications.</title>
<pages>46-55</pages>
<year>1998</year>
<crossref>conf/icfem/1998</crossref>
<booktitle>ICFEM</booktitle>
<ee>https://doi.org/10.1109/ICFEM.1998.730569</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICFEM.1998.730569</ee>
<url>db/conf/icfem/icfem1998.html#AmmannBM98</url>
</inproceedings>
</r>
<r><article key="journals/ansoft/AmmannLK97" mdate="2020-09-17">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="03/3711">Dahlard L. Lukes</author>
<author pid="87/4375">John C. Knight</author>
<title>Applying Data Redundancy to Differential Equation Solvers.</title>
<pages>65-77</pages>
<year>1997</year>
<volume>4</volume>
<journal>Ann. Softw. Eng.</journal>
<url>db/journals/ansoft/ansoft4.html#AmmannLK97</url>
<ee>https://doi.org/10.1023/A:1018958526071</ee>
</article>
</r>
<r><article key="journals/ieeecc/AmmannJ97" mdate="2017-05-18">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Semantics-based transaction processing: satisfying conflicting objectives.</title>
<pages>8-10</pages>
<year>1997</year>
<volume>5</volume>
<journal>IEEE Concurrency</journal>
<number>2</number>
<ee>https://doi.org/10.1109/4434.588269</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/4434.588269</ee>
<url>db/journals/ieeecc/ieeecc5.html#AmmannJ97</url>
</article>
</r>
<r><article key="journals/ieeecc/AmmannJ97a" mdate="2017-09-06">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Rethinking integrity [distributed databases].</title>
<pages>5-6</pages>
<year>1997</year>
<volume>5</volume>
<journal>IEEE Concurrency</journal>
<number>4</number>
<ee>https://doi.org/10.1109/4434.641618</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/4434.641618</ee>
<url>db/journals/ieeecc/ieeecc5.html#AmmannJ97a</url>
</article>
</r>
<r><article key="journals/tods/AmmannJR97" mdate="2018-11-06">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Applying Formal Methods to Semantic-Based Decomposition of Transactions.</title>
<pages>215-254</pages>
<cdrom>TODS22/P215.PDF</cdrom>
<year>1997</year>
<volume>22</volume>
<journal>ACM Trans. Database Syst.</journal>
<number>2</number>
<url>db/journals/tods/tods22.html#AmmannJR97</url>
<ee>https://doi.org/10.1145/249978.249981</ee>
<cite label="Agrawal 1993">journals/tods/AgrawalAS93</cite>
<cite label="Abrial 1993">...</cite>
<cite label="Ammann et al. 1995">conf/vldb/AmmannJR95</cite>
<cite label="Arora and Kulkarni 1995">...</cite>
<cite label="Bernstein et al. 1987">books/aw/BernsteinHG87</cite>
<cite label="Badrinath and Ramamritham 1992">journals/tods/BadrinathR92</cite>
<cite label="Chrysanthis and Ramamritham 1994">journals/tods/ChrysanthisR94</cite>
<cite label="Du and Elmagarmid 1989">conf/vldb/DuE89</cite>
<cite label="Elmasri and Navathe 1989">books/bc/ElmasriN89</cite>
<cite label="Farrag and &#214;zsu 1989">journals/tods/FarragO89</cite>
<cite label="Garcia-Molina 1983">journals/tods/Garcia-Molina83</cite>
<cite label="Garcia-Molina and Salem 1987">conf/sigmod/Garcia-MolinaS87</cite>
<cite label="Herlihy 1987">journals/tc/Herlihy87</cite>
<cite label="Herlihy and Weihl 1991">journals/jcss/HerlihyW91</cite>
<cite label="Jajodia and Meadows 1987">conf/icde/JajodiaM87</cite>
<cite label="Korth et al. 1990">conf/vldb/KorthLS90</cite>
<cite label="Korth and Speegle 1988">conf/sigmod/KorthS88</cite>
<cite label="Korth and Speegle 1994">journals/tods/KorthS94</cite>
<cite label="Levy et al. 1991a">conf/sigmod/LevyKS91</cite>
<cite label="Levy et al. 1991b">conf/podc/LevyKS91</cite>
<cite label="Lynch et al. 1994">...</cite>
<cite label="Lynch 1983">journals/tods/Lynch83</cite>
<cite label="Owicki and Gries 1976">journals/cacm/OwickiG76</cite>
<cite label="Potter et al. 1991">...</cite>
<cite label="Rastogi et al. 1995">conf/icdcs/RastogiKS95</cite>
<cite label="Sha et al. 1988">journals/tc/ShaLJ88</cite>
<cite label="Spivey 1992">...</cite>
<cite label="Shasha et al. 1992">conf/sigmod/ShashaSV92</cite>
<cite label="Weihl 1984">...</cite>
<cite label="Weihl 1988">journals/tc/Weihl88</cite>
<cite label="W&#228;chter and Reuter 1992">books/mk/elmagarmid92/WachterR92</cite>
</article>
</r>
<r><inproceedings key="conf/caise/JajodiaRA97" mdate="2017-05-22">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Implementing Semantic-Based Decomposition of Transactions.</title>
<pages>75-88</pages>
<year>1997</year>
<crossref>conf/caise/1997</crossref>
<booktitle>CAiSE</booktitle>
<url>db/conf/caise/caise97.html#JajodiaRA97</url>
<ee>https://doi.org/10.1007/3-540-63107-0_6</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/csee/AmmannO97" mdate="2023-03-24">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="o/AJeffersonOffutt">Jeff Offutt</author>
<title>Maintaining Knowledge Currency in the 21st Century.</title>
<pages>161-173</pages>
<year>1997</year>
<booktitle>CSEE&#38;T</booktitle>
<ee>https://doi.org/10.1109/SEDC.1997.592450</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SEDC.1997.592450</ee>
<crossref>conf/csee/1997</crossref>
<url>db/conf/csee/csee1997.html#AmmannO97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/AmmannJMB97" mdate="2023-09-21">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="76/2160">Catherine D. McCollum</author>
<author pid="16/662">Barbara T. Blaustein</author>
<title>Surviving information warfare attacks on databases.</title>
<pages>164-174</pages>
<year>1997</year>
<crossref>conf/sp/1997</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1997.601331</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1997.601331</ee>
<url>db/conf/sp/sp1997.html#AmmannJMB97</url>
</inproceedings>
</r>
<r><incollection key="books/kl/jajodiaK97/AmmannJR97" mdate="2019-08-07">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Semantic-Based Decomposition of Transactions.</title>
<year>1997</year>
<crossref>books/kl/JajodiaK97</crossref>
<booktitle>Advanced Transaction Models and Architectures</booktitle>
<url>db/books/collections/JajodiaK97.html#AmmannJR97</url>
</incollection>
</r>
<r><article key="journals/dke/SamaratiAJ96" mdate="2019-06-02">
<author orcid="0000-0001-7395-4620" pid="s/PSamarati">Pierangela Samarati</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Maintaining Replicated Authorizations in Distributed Database Systems.</title>
<pages>55-84</pages>
<year>1996</year>
<volume>18</volume>
<journal>Data Knowl. Eng.</journal>
<number>1</number>
<url>db/journals/dke/dke18.html#SamaratiAJ96</url>
<ee>https://doi.org/10.1016/0169-023X(95)00000-I</ee>
<ee>https://www.wikidata.org/entity/Q60487417</ee>
</article>
</r>
<r><article key="journals/jcs/AmmannLS96" mdate="2023-08-28">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="l/RichardJLipton">Richard J. Lipton</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>The Expressive Power of Multi-parent Creation in Monotonic Access Control Models.</title>
<pages>149-166</pages>
<year>1996</year>
<volume>4</volume>
<journal>J. Comput. Secur.</journal>
<number>2/3</number>
<url>db/journals/jcs/jcs4.html#AmmannLS96</url>
<ee>https://doi.org/10.3233/JCS-1996-42-303</ee>
<ee>https://www.wikidata.org/entity/Q114944504</ee>
</article>
</r>
<r><article key="journals/tpds/AmmannJF96" mdate="2020-10-02">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="f/PGFrankl">Phyllis G. Frankl</author>
<title>Globally Consistent Event Ordering in One-Directional Distributed Environments.</title>
<pages>665-670</pages>
<year>1996</year>
<volume>7</volume>
<journal>IEEE Trans. Parallel Distributed Syst.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/71.506704</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/71.506704</ee>
<url>db/journals/tpds/tpds7.html#AmmannJF96</url>
</article>
</r>
<r><inproceedings key="conf/sp/AmmannJR96" mdate="2023-09-21">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Ensuring Atomicity of Multilevel Transactions.</title>
<pages>74-84</pages>
<year>1996</year>
<crossref>conf/sp/1996</crossref>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SECPRI.1996.502671</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SECPRI.1996.502671</ee>
<ee>https://dl.acm.org/doi/10.5555/525080.884262</ee>
<url>db/conf/sp/sp1996.html#AmmannJR96</url>
</inproceedings>
</r>
<r><article key="journals/jcs/AmmannJJ95" mdate="2023-08-28">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="84/6523">Frank Jaeckle</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Concurrency Control in a Secure Database via a Two-Snapshot Algorithm.</title>
<pages>87-114</pages>
<year>1995</year>
<volume>3</volume>
<journal>J. Comput. Secur.</journal>
<number>2/3</number>
<url>db/journals/jcs/jcs3.html#AmmannJJ95</url>
<ee>https://doi.org/10.3233/JCS-1994/1995-32-302</ee>
<ee>https://www.wikidata.org/entity/Q114944548</ee>
</article>
</r>
<r><article key="journals/tkde/AmmannAJ95" mdate="2021-04-09">
<author pid="a/PAmmann">Paul Ammann</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>The Partitioned Synchronization Rule for Planar Extendible Partial Orders.</title>
<pages>797-808</pages>
<year>1995</year>
<volume>7</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<url>db/journals/tkde/tkde7.html#AmmannAJ95</url>
<ee>https://doi.org/10.1109/69.469819</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.469819</ee>
<cdrom>TKDE7/k0797.pdf</cdrom>
<cite>...</cite>
<cite>journals/tocs/AmmannJ93</cite>
<cite>...</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>...</cite>
<cite>books/aw/Denning82</cite>
<cite>journals/cacm/EswarranGLT76</cite>
<cite>journals/tods/HsuC86</cite>
<cite>...</cite>
<cite>...</cite>
</article>
</r>
<r><article key="journals/tkde/AmmannJM95" mdate="2017-05-20">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="58/5513">Padmaja Mavuluri</author>
<title>On-The-Fly Reading of Entire Databases.</title>
<pages>834-838</pages>
<year>1995</year>
<volume>7</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<url>db/journals/tkde/tkde7.html#AmmannJM95</url>
<ee>https://doi.org/10.1109/69.469836</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.469836</ee>
<cdrom>TKDE7/k0834.pdf</cdrom>
<cite>conf/pods/AgrawalA90</cite>
<cite>conf/icde/AgrawalAL91</cite>
<cite>journals/tods/BayerHR80</cite>
<cite>journals/tods/Bayer86</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>...</cite>
<cite>journals/cacm/EswarranGLT76</cite>
<cite>...</cite>
<cite>conf/sigmod/MohanPL92</cite>
<cite>journals/algorithmica/Pu86</cite>
<cite>conf/dpds/PuHW88</cite>
<cite>journals/tods/SalemGS94</cite>
</article>
</r>
<r><inproceedings key="conf/vldb/AmmannJR95" mdate="2017-03-29">
<crossref>conf/vldb/95</crossref>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.</title>
<pages>218-227</pages>
<year>1995</year>
<booktitle>VLDB</booktitle>
<url>db/conf/vldb/vldb95.html#AmmannJR95</url>
<ee>http://www.vldb.org/conf/1995/P218.PDF</ee>
<cite label="AAS93">journals/tods/AgrawalAS93</cite>
<cite label="AJR95">...</cite>
<cite label="BHG87">books/aw/BernsteinHG87</cite>
<cite label="BR92">journals/tods/BadrinathR92</cite>
<cite label="CR94">journals/tods/ChrysanthisR94</cite>
<cite label="DE90">conf/vldb/DuE89</cite>
<cite label="FO89">journals/tods/FarragO89</cite>
<cite label="GM83">journals/tods/Garcia-Molina83</cite>
<cite label="GMS94">journals/debu/Garcia-MolinaS94</cite>
<cite label="Her87">journals/tc/Herlihy87</cite>
<cite label="HW91">journals/jcss/HerlihyW91</cite>
<cite label="JM87">conf/icde/JajodiaM87</cite>
<cite label="KS88">conf/sigmod/KorthS88</cite>
<cite label="KS94">journals/tods/KorthS94</cite>
<cite label="LMWF94">...</cite>
<cite label="Lyn83">journals/tods/Lynch83</cite>
<cite label="OG76">journals/cacm/OwickiG76</cite>
<cite label="SLJ88">journals/tc/ShaLJ88</cite>
<cite label="Spi89">...</cite>
<cite label="SSV92">conf/sigmod/ShashaSV92</cite>
<cite label="Wei84">...</cite>
<cite label="Wei88">journals/tc/Weihl88</cite>
<cite label="WR92">books/mk/elmagarmid92/WachterR92</cite>
</inproceedings>
</r>
<r><article key="journals/tse/AmmannBK94" mdate="2017-05-17">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="01/2516">Susan S. Brilliant</author>
<author pid="87/4375">John C. Knight</author>
<title>The Effect of Imperfect Error Detection on Reliability Assessment via Life Testing.</title>
<pages>142-148</pages>
<ee>https://doi.org/10.1109/32.265635</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/32.265635</ee>
<year>1994</year>
<volume>20</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>2</number>
<url>db/journals/tse/tse20.html#AmmannBK94</url>
</article>
</r>
<r><inproceedings key="conf/ccs/AmmannJ94" mdate="2020-11-10">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.</title>
<pages>118-125</pages>
<year>1994</year>
<crossref>conf/ccs/1994</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/191177.191201</ee>
<url>db/conf/ccs/ccs1994.html#AmmannJ94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/SamaratiAJ94" mdate="2020-11-10">
<author pid="s/PSamarati">Pierangela Samarati</author>
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Propagation of Authorizations in Distributed Database Systems.</title>
<pages>136-147</pages>
<year>1994</year>
<crossref>conf/ccs/1994</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/191177.191204</ee>
<url>db/conf/ccs/ccs1994.html#SamaratiAJ94</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csee/AmmannGORS94" mdate="2017-05-17">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="53/139">Hassan Gomaa</author>
<author pid="o/AJeffersonOffutt">A. Jefferson Offutt</author>
<author pid="46/827">David Rine</author>
<author pid="s/BoSanden">Bo Ingvar Sand&#233;n</author>
<title>A Five Year Perspective on Software Engineering Graduate Programs at George Mason University.</title>
<pages>473-488</pages>
<year>1994</year>
<crossref>conf/csee/1994</crossref>
<booktitle>CSEE</booktitle>
<url>db/conf/csee/csee1994.html#AmmannGORS94</url>
<ee>https://doi.org/10.1007/BFb0017635</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/SandhuA94" mdate="2017-05-25">
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>One-Representative Safety Analysis in the Non-Monotonic Transform Model.</title>
<year>1994</year>
<crossref>conf/csfw/1994</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1994.html#SandhuA94</url>
<pages>139-149</pages>
<ee>https://doi.org/10.1109/CSFW.1994.315940</ee>
</inproceedings>
</r>
<r><article key="journals/tocs/AmmannJ93" mdate="2018-11-06">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Distributed Timestamp Generation in Planar Lattice Networks.</title>
<pages>205-225</pages>
<year>1993</year>
<volume>11</volume>
<journal>ACM Trans. Comput. Syst.</journal>
<number>3</number>
<url>db/journals/tocs/tocs11.html#AmmannJ93</url>
<ee>https://doi.org/10.1145/152864.152865</ee>
</article>
</r>
<r><inproceedings key="conf/dbsec/AmmannJ93" mdate="2002-01-03">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Planar Lattice Security Structures for Multilevel Replicated Databases.</title>
<pages>125-134</pages>
<year>1993</year>
<crossref>conf/dbsec/1993</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec93.html#AmmannJ93</url>
</inproceedings>
</r>
<r><article key="journals/jcs/AmmannS92" mdate="2023-08-28">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>The Extended Schematic Protection Model</title>
<pages>335-384</pages>
<year>1992</year>
<volume>1</volume>
<journal>J. Comput. Secur.</journal>
<number>3-4</number>
<url>db/journals/jcs/jcs1.html#AmmannS92</url>
<ee>https://doi.org/10.3233/JCS-1992-13-408</ee>
<ee>https://www.wikidata.org/entity/Q114944607</ee>
</article>
</r>
<r><inproceedings key="conf/acsac/AmmannS92" mdate="2017-05-26">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Implementing transaction control expressions by checking for absence of access rights.</title>
<pages>131-140</pages>
<year>1992</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1992.228226</ee>
<crossref>conf/acsac/1992</crossref>
<url>db/conf/acsac/acsac1992.html#AmmannS92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/AmmannLS92" mdate="2017-05-25">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="l/RichardJLipton">Richard J. Lipton</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>The Expressive Power of Multi-Parent Creation in a Monotonic Access Control Model.</title>
<pages>148-156</pages>
<year>1992</year>
<crossref>conf/csfw/1992</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1992.html#AmmannLS92</url>
<ee>https://doi.org/10.1109/CSFW.1992.236780</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/AmmannJJ92" mdate="2023-09-21">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="84/6523">Frank Jaeckle</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>A two snapshot algorithm for concurrency control in multi-level secure databases.</title>
<pages>204-215</pages>
<year>1992</year>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/RISP.1992.213260</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RISP.1992.213260</ee>
<crossref>conf/sp/1992</crossref>
<url>db/conf/sp/sp1992.html#AmmannJJ92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/AmmannSS91" mdate="2017-05-26">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<author pid="87/1902">Gurpreet S. Suri</author>
<title>A distributed implementation of the extended schematic protection model.</title>
<pages>152-164</pages>
<year>1991</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1991.213009</ee>
<crossref>conf/acsac/1991</crossref>
<url>db/conf/acsac/acsac1991.html#AmmannSS91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AmmannJ91" mdate="2002-02-15">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.</title>
<pages>191-202</pages>
<year>1991</year>
<crossref>conf/dbsec/1991</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec91.html#AmmannJ91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/AmmannS91" mdate="2023-09-21">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Safety Analysis for the Extended Schematic Protection Model.</title>
<pages>87-97</pages>
<year>1991</year>
<crossref>conf/sp/1991</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1991.html#AmmannS91</url>
<ee>https://doi.org/10.1109/RISP.1991.130777</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RISP.1991.130777</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/acsac/AmmannS90" mdate="2017-04-29">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="s/RaviSSandhu">Ravi S. Sandhu</author>
<title>Extending the creation operation in the Schematic Protection Model.</title>
<year>1990</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/CSAC.1990.143796</ee>
<crossref>conf/acsac/1990</crossref>
<url>db/conf/acsac/acsac1990.html#AmmannS90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ftcs/BrilliantKA90" mdate="2017-05-23">
<author pid="01/2516">Susan S. Brilliant</author>
<author pid="87/4375">John C. Knight</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>On the performance of software testing using multiple versions.</title>
<pages>408-415</pages>
<year>1990</year>
<booktitle>FTCS</booktitle>
<ee>https://doi.org/10.1109/FTCS.1990.89395</ee>
<crossref>conf/ftcs/1990</crossref>
<url>db/conf/ftcs/ftcs1990.html#BrilliantKA90</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ifip/KnightA89" mdate="2019-07-28">
<author pid="87/4375">John C. Knight</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>Issues Influencing the Use of N-Version Programming.</title>
<pages>217-222</pages>
<year>1989</year>
<crossref>conf/ifip/1989</crossref>
<booktitle>IFIP Congress</booktitle>
<url>db/conf/ifip/ifip89.html#KnightA89</url>
</inproceedings>
</r>
<r><article key="journals/tc/AmmannK88" mdate="2022-08-16">
<author pid="a/PAmmann">Paul Ammann</author>
<author pid="87/4375">John C. Knight</author>
<title>Data Diversity: An Approach to Software Fault Tolerance.</title>
<pages>418-425</pages>
<year>1988</year>
<volume>37</volume>
<journal>IEEE Trans. Computers</journal>
<number>4</number>
<url>db/journals/tc/tc37.html#AmmannK88</url>
<ee>https://doi.org/10.1109/12.2185</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/12.2185</ee>
<ee>https://www.wikidata.org/entity/Q111898347</ee>
</article>
</r>
<r><inproceedings key="conf/icse/KnightA85" mdate="2012-05-14">
<author pid="87/4375">John C. Knight</author>
<author pid="a/PAmmann">Paul Ammann</author>
<title>An Experimental Evaluation of Simple Methods for Seeding Program Errors.</title>
<pages>337-342</pages>
<year>1985</year>
<crossref>conf/icse/1985</crossref>
<booktitle>ICSE</booktitle>
<url>db/conf/icse/icse85.html#KnightA85</url>
<ee>http://dl.acm.org/citation.cfm?id=319667</ee>
</inproceedings>
</r>
<coauthors n="89" nc="3">
<co c="0"><na f="a/Abdurazik:Aynur" pid="62/5357">Aynur Abdurazik</na></co>
<co c="1"><na f="a/Alshammari:Abdulrahman" pid="294/1258">Abdulrahman Alshammari</na></co>
<co c="0"><na f="a/Alvin:Justin" pid="242/3906">Justin Alvin</na></co>
<co c="0"><na f="a/Atluri:Vijayalakshmi" pid="a/VAtluri">Vijayalakshmi Atluri</na></co>
<co c="0"><na f="b/Baral:Kesina" pid="242/6305">Kesina Baral</na></co>
<co c="0"><na f="b/Behrouz:Reyhaneh_Jabbarvand" pid="18/10505">Reyhaneh Jabbarvand Behrouz</na></co>
<co c="1"><na f="b/Bell_0001:Jonathan" pid="84/1826-1">Jonathan Bell 0001</na></co>
<co c="0"><na f="b/Black:Paul_E=" pid="16/6383">Paul E. Black</na></co>
<co c="0"><na f="b/Blaustein:Barbara_T=" pid="16/662">Barbara T. Blaustein</na></co>
<co c="2"><na f="b/Brilliant:Susan_S=" pid="01/2516">Susan S. Brilliant</na></co>
<co c="0"><na f="b/Brodsky_0001:Alexander" pid="b/AlexanderBrodsky">Alexander Brodsky 0001</na></co>
<co c="0"><na f="c/Caputo:Deanna_D=" pid="74/5873">Deanna D. Caputo</na></co>
<co c="0" n="2"><na f="c/Chen_0001:Yiqun" pid="59/1143-1">Yiqun Chen 0001</na><na>Yiqun T. Chen</na></co>
<co c="0"><na f="d/Delamaro:M=aacute=rcio_Eduardo" pid="84/3153">M&#225;rcio Eduardo Delamaro</na></co>
<co c="0"><na f="d/Deng_0001:Lin" pid="17/2104-1">Lin Deng 0001</na></co>
<co c="0"><na f="d/Ding_0003:Wei" pid="59/622-3">Wei Ding 0003</na></co>
<co c="0"><na f="d/Dobolyi:Kinga" pid="58/3654">Kinga Dobolyi</na></co>
<co c="0"><na f="e/Ernst:Michael_D=" pid="e/MDErnst">Michael D. Ernst</na></co>
<co c="0"><na f="f/Farkas:Csilla" pid="f/CsillaFarkas">Csilla Farkas</na></co>
<co c="0"><na f="f/Featherman:Ryan" pid="322/7625">Ryan Featherman</na></co>
<co c="0"><na f="f/Flamm:Jennifer" pid="242/6242">Jennifer Flamm</na></co>
<co c="0"><na f="f/Frankl:Phyllis_G=" pid="f/PGFrankl">Phyllis G. Frankl</na></co>
<co c="0"><na f="f/Fraser_0001:Gordon" pid="74/2259">Gordon Fraser 0001</na></co>
<co c="0"><na f="g/Garcia:Joshua" pid="06/6932">Joshua Garcia</na></co>
<co c="0"><na f="g/G=ouml=k=ccedil=e:Nida" pid="46/2317">Nida G&#246;k&#231;e</na></co>
<co c="0"><na f="g/Goldrich:Seth" pid="242/6264">Seth Goldrich</na></co>
<co c="0"><na f="g/Gomaa:Hassan" pid="53/139">Hassan Gomaa</na></co>
<co c="0"><na f="g/Gopinath:Rahul" pid="93/11109">Rahul Gopinath</na></co>
<co c="0"><na f="g/Guan:Jing" pid="94/536">Jing Guan</na></co>
<co c="1"><na f="h/Hilton:Michael" pid="116/7598">Michael Hilton</na></co>
<co c="0"><na f="h/Holmes:Reid" pid="18/1889">Reid Holmes</na></co>
<co c="0"><na f="h/Huang:Hong" pid="74/3859">Hong Huang</na></co>
<co c="0"><na f="i/Ivankovic:Marko" pid="54/10043">Marko Ivankovic</na></co>
<co c="0"><na f="j/Jaeckle:Frank" pid="84/6523">Frank Jaeckle</na></co>
<co c="0"><na f="j/Jajodia:Sushil" pid="j/SushilJajodia">Sushil Jajodia</na></co>
<co c="0"><na f="j/Just:Ren=eacute=" pid="75/10029">Ren&#233; Just</na></co>
<co c="0"><na f="k/Kaminski:Garrett_Kent" pid="49/3218">Garrett Kent Kaminski</na></co>
<co c="0"><na f="k/Kaminski:Gary" pid="133/5747">Gary Kaminski</na></co>
<co c="0"><na f="k/Kauffmann:Chris" pid="198/7436">Chris Kauffmann</na></co>
<co c="0"><na f="k/Kaufman:Samuel_J=" pid="00/2211">Samuel J. Kaufman</na></co>
<co c="0"><na f="k/Kaushik:Saket" pid="01/1589">Saket Kaushik</na></co>
<co c="2"><na f="k/Knight:John_C=" pid="87/4375">John C. Knight</na></co>
<co c="1"><na f="k/Kukucka:James" pid="322/7605">James Kukucka</na></co>
<co c="0"><na f="k/Kurtz:Bob" pid="149/4462">Bob Kurtz</na></co>
<co c="0"><na f="k/Kurtz:Mariet" pid="183/8614">Mariet Kurtz</na></co>
<co c="0"><na f="l/Lester:Jaime" pid="173/9201">Jaime Lester</na></co>
<co c="0"><na f="l/Li_0002:Jie" pid="17/2703-2">Jie Li 0002</na></co>
<co c="0"><na f="l/Li_0008:Nan" pid="84/3795-8">Nan Li 0008</na></co>
<co c="0"><na f="l/Lipton:Richard_J=" pid="l/RichardJLipton">Richard J. Lipton</na></co>
<co c="0"><na f="l/Liu_0005:Peng" pid="21/6121-5">Peng Liu 0005</na></co>
<co c="0"><na f="l/Liu:Shaoying" pid="99/4667">Shaoying Liu</na></co>
<co c="2"><na f="l/Lukes:Dahlard_L=" pid="03/3711">Dahlard L. Lukes</na></co>
<co c="0"><na f="m/Majurski:William" pid="70/2261">William Majurski</na></co>
<co c="0"><na f="m/Malek:Sam" pid="88/4685">Sam Malek</na></co>
<co c="0"><na f="m/Mavuluri:Padmaja" pid="58/5513">Padmaja Mavuluri</na></co>
<co c="0"><na f="m/McCollum:Catherine_D=" pid="76/2160">Catherine D. McCollum</na></co>
<co c="0"><na f="m/Mirzaei:Nariman" pid="117/5454">Nariman Mirzaei</na></co>
<co c="0"><na f="m/Mohod:Rasika" pid="242/6221">Rasika Mohod</na></co>
<co c="0" n="2"><na f="o/Offutt:A=_Jefferson" pid="o/AJeffersonOffutt">A. Jefferson Offutt</na><na>Jeff Offutt</na></co>
<co c="0"><na f="p/Pamula:Joseph" pid="61/4569">Joseph Pamula</na></co>
<co c="0"><na f="p/Petrovic:Goran" pid="14/5531">Goran Petrovic</na></co>
<co c="0"><na f="p/Pfleeger:Shari_Lawrence" pid="73/1640">Shari Lawrence Pfleeger</na></co>
<co c="1"><na f="p/Pina:Lu=iacute=s" pid="98/2164">Lu&#237;s Pina</na></co>
<co c="0"><na f="p/Praphamontripong:Upsorn" pid="58/4306">Upsorn Praphamontripong</na></co>
<co c="0"><na f="r/Rangwala:Huzefa" pid="30/444">Huzefa Rangwala</na></co>
<co c="0"><na f="r/Ray:Indrakshi" pid="r/IndrakshiRay">Indrakshi Ray</na></co>
<co c="0" n="2"><na f="r/Rine:David_C=" pid="46/827">David C. Rine</na><na>David Rine</na></co>
<co c="0"><na f="r/Ritchey:Ronald_W=" pid="12/3356">Ronald W. Ritchey</na></co>
<co c="0"><na f="s/Sadeghi:Alireza" pid="128/5354">Alireza Sadeghi</na></co>
<co c="0"><na f="s/Samarati:Pierangela" pid="s/PSamarati">Pierangela Samarati</na></co>
<co c="0"><na f="s/Sand=eacute=n:Bo_Ingvar" pid="s/BoSanden">Bo Ingvar Sand&#233;n</na></co>
<co c="0"><na f="s/Sandhu:Ravi_S=" pid="s/RaviSSandhu">Ravi S. Sandhu</na></co>
<co c="0"><na f="s/Sasse:M=_Angela" pid="s/MASasse">M. Angela Sasse</na></co>
<co c="0"><na f="s/Setia:Sanjeev" pid="10/2676">Sanjeev Setia</na></co>
<co c="0"><na f="s/Shelton:William" pid="17/11466">William Shelton</na></co>
<co c="0"><na f="s/Street:Julie_A=" pid="87/1905">Julie A. Street</na></co>
<co c="0"><na f="s/Sun:Lingya" pid="42/3331">Lingya Sun</na></co>
<co c="0"><na f="s/Suri:Gurpreet_S=" pid="87/1902">Gurpreet S. Suri</na></co>
<co c="0"><na f="s/Swarup:Vipin" pid="36/2914">Vipin Swarup</na></co>
<co c="0"><na f="t/Tadakamalla:Anita" pid="282/5651">Anita Tadakamalla</na></co>
<co c="0"><na f="v/Vemasani:Preetham" pid="149/4165">Preetham Vemasani</na></co>
<co c="0"><na f="w/Wang:Pearl_Y=" pid="71/5770">Pearl Y. Wang</na></co>
<co c="0"><na f="w/White:Liz" pid="198/7455">Liz White</na></co>
<co c="0"><na f="w/Wijesekera:Duminda" pid="w/DumindaWijesekera">Duminda Wijesekera</na></co>
<co c="0"><na f="w/Williams_0002:Gregory" pid="45/6195">Gregory Williams 0002</na></co>
<co c="0"><na f="w/Winsborough:William_H=" pid="45/6818">William H. Winsborough</na></co>
<co c="0"><na f="w/Wotawa:Franz" pid="w/FranzWotawa">Franz Wotawa</na></co>
<co c="0"><na f="x/Xu:Daling" pid="30/2635">Daling Xu</na></co>
<co c="0"><na f="x/Xu:Wuzhi" pid="92/2988">Wuzhi Xu</na></co>
</coauthors>
</dblpperson>

