Pau-Chen Cheng  Pau-Chen Cheng photo       

contact information

R&D on Computer and Internet Security
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash2338

links


more information

More information:  Risk Management  |  Security for System S -- Fuzzy MLS


2012

Learning Stochastic Models of Information Flow
Luke Dickens, Ian Molloy, Jorge Lobo, Pau-Chen Cheng, Alessandra Russo
ICDE, 2012

Risk-based Security Decisions Under Uncertainty
I Molloy, L Dickens, C Morisset, P C Cheng, J Lobo, A Russo
ACM CODASPY , 2012


2011

An Experimental Study on the Measurement of Data Sensitivity
Youngja Park, Stephen C. Gates. Wilfried Teiken, Pau-Chen Cheng
BADGERS, 2011


2010

Risk based access control with uncertain and time-dependent sensitivity
J A Clark, J E Tapiador, J McDermid, P C Cheng, D Agrawal, N Ivanic, D Slogget
Security and Cryptography (SECRYPT), Proceedings of the 2010 International Conference on, pp. 1--9

Towards learning risk estimation functions for access control
L Dickens, A Russo, P C Cheng, J Lob
In Snowbird Learning Workshop, 2010

Learning based access control in online social networks
M Shehab, G Cheek, H Touati, A C Squicciarini, P C Cheng
Proceedings of the 19th international conference on World wide web, pp. 1179--1180, 2010


2009

Dynamic security policy learning
Y T Lim, P C Cheng, P Rohatgi, J A Clark
Proceedings of the first ACM workshop on Information security governance, pp. 39--48, 2009

Risk profiles and distributed risk assessment
H Chivers, J A Clark, P C Cheng
computers \& security 28(7), 521--535, Elsevier, 2009


2008

Trading in risk: Using markets to improve access control
I Molloy, P C Cheng, P Rohatgi
Proceedings of the 2008 workshop on New security paradigms, pp. 107--125

Policy evolution with grammatical evolution
Y Lim, P Cheng, J Clark, P Rohatgi
Evolutionary Computation, 2008, pp. 71--80, Springer

MLS security policy evolution with genetic programming
Y T Lim, P C Cheng, P Rohatgi, J A Clark
Proceedings of the 10th annual conference on Genetic and evolutionary computation, pp. 1571--1578, 2008

IT security as risk management: A research perspective
P C Cheng, P Rohatgi
IBM Research Report, vol. RC24529, 2008



2007

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
Pau-Chen Cheng, Pankaj Rohatgi, Claudia Keser, Paul A. Karger, Grant M Wagner, Angela Schuett Reninger
IBM Research Report RC24190, 2007

Improving the resilience of content distribution networks to large scale distributed denial of service attacks
Kang-Won Lee, Suresh Chari, Anees Shaikh, Sambit Sahu, Pau-Chen Cheng
Journal of Computer Networks 51(10), 2753-2770, Elsevier, 2007

Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control
PC Cheng, P Rohatgi, C Keser, PA Karger, GM Wagner, AS Reninger
IEEE Symposium on Security and Privacy, 2007


2005

Protecting Content Distribution Networks from Denial of Service Attacks
K. W. Lee, S. Chari, A. Shaikh, S. Sahu, P-C. Cheng
ICC, 2005


2003

BlueBox: A Policy-Driven, Host-Based Intrusion Detection System
Suresh N. Chari, Pau-Chen Cheng
ACM TISSEC 6(2), 2003


2002

BlueBox: A Policy-Driven, Host-Based Intrusion Detection System
Suresh N. Chari, Pau-Chen Cheng
NDSS, 2002


2001

An architecture for the Internet Key Exchange protocol
P C Cheng
IBM Systems Journal 40(3), 721--746, IBM, 2001


2000

An IPSec-based Host Architecture for Secure Internet Multicast
Ran Canetti, Pau--Chen Cheng, Frederique Giraud, Dimitrios Pendarakis, Josyula R. Rao, Pankaj Rohatgi, Debanjan Saha
NDSS, 2000


1998

A Security Architecture for the Internet Protocol
Pau-Chen Cheng, Juan A. Gray, Amir Herzberg, Hugo Krawczyk
IBM System Journal 37(1), 1998


1997

Test Cases for HMAC-MD5 and HMAC-SHA-1
R Glenn, P Cheng
1997 - zinfandel.tools.ietf.org


1995

Design and implementation of modular key management protocol and IP secure tunnel on AIX
P C Cheng, J A Garay, A Herzberg, H Krawczyk
Proceedings of the 5th conference on USENIX UNIX Security Symposium-Volume 5, pp. 5--5, 1995

Securing the internet protocol
P C Cheng, J A Garay, A Herzberg, H Krawczyk
Proceedings of the fourteenth annual ACM symposium on Principles of distributed computing, pp. 257, 1995