Alec Yasinsac’s Publications


Books   Journal Articles   Conference and Workshop Articles   Book Chapters   Technical Reports, Dissertation, Position Papers, and Testimony Before Government Bodies


BOOKS

  1. M. Burmester and A. Yasinsac (Editors),  Mobile and AD hoc Networks and Sensors Security (MADNES 2005),  Lecture Notes in Computer Science, LNCS 4074, Springer-Verlag, Berlin Heidelberg, 2006

JOURNAL ARTICLES

  1. Alec Yasinsac and Cynthia Irvine, "Is there a Trustworthy Systems Doctor in the House?", IEEE Security and Privacy Magazine, Vol. 11, No. 1, Jan-Feb 2013
  2. Todd R. Andel, Greg Back, and Alec Yasinsac, "Automating the Security Analysis Process of Secure Ad Hoc Routing," Simulation Modelling Practice and Theory, vol. 19, no. 9 (October 2011), pp. 2032-2049
  3. Yasinsac, A, and Pardue, H, in press, "Voting System Risk Assessment: A Process Using Threat Trees," Journal of Information Systems Applied Research, Vol. 4, Issue #1, 2011, http://jisar.org/
  4. Alec Yasinsac and Matt Bishop, “The Dynamics of Counting and Recounting Votes”, IEEE Security and Privacy Magazine, May-June 2008, Volume: 6, Issue: 3, pp. 22-29
  5. Todd McDonald, Yong C. Kim, and Alec Yasinsac, “Software Issues in Digital Forensics,”  ACM Operating Systems Review,  Volume 42 Issue 3, April 2008
  6. Alec Yasinsac and J. Todd McDonald, "Tamper Resistant Software Through Intent Protection", the International Journal of Network Security, Vol. 7, No. 3, pp. 370-382
  7. Todd Andel and Alec Yasinsac, “Surveying MANET Protocol Security Analysis”,  IEEE Communications Surveys, 4th Quarter 2007, Volume 9, No. 4, pp. 70-84
  8. Todd R. Andel, Alec Yasinsac, "On the Credibility of Manet Simulations," Computer, vol. 39,  no. 7,  pp. 48-54,  July 2006
  9. Mike Burmester, Tri Le Van, and Alec Yasinsac, "Adaptive gossip protocols: Managing Redundancy and Security in Ad hoc Networks", accepted to AdHoc Networks, Elsevier, November 2004, 12 pages.
  10. Alec Yasinsac and Mike Burmester, "Centers of Academic Excellence: A Case Study", IEEE Security and Privacy Magazine, Vol. 3, Issue 1, 2005, pp. 32-35
  11. Tysen Leckie and Alec Yasinsac, "Metadata for Anomaly Based Security Protocol Attack Detection", IEEE Transactions on Knowledge and Data Engineering, Volume 16, Number 10, October 2004
  12. Alec Yasinsac and Justin Childs, "Formal Analysis of Modern Security Protocols", Information Sciences, (Elsevier) 2004.  
  13. Mike Burmester and Alec Yasinsac, "Trust Infrastructures for Wireless, Mobile Networks", WSEAS Transactions on Telecommunications, Vol. 3, #1,  January 2004, pp. 377-82
  14. Alec Yasinsac, Robert Earbacher, Donald G. Marks, Mark Pollitt, Peter M. Sommer, "Computer Forensics Education", IEEE Computer Security and Privacy Magazine, July-Aug 2003, Vol. 1, No. 4, pp. 15-23
  15. Alec Yasinsac, "An Environment for Security Protocol Intrusion Detection", Journal of Computer Security, Vol. 10, No. 1-2, 2002, pp. 177-88
  16. Alec Yasinsac, "Information Security Curricula in Computer Science Departments: Theory and Practice," The George Washington University Journal of Information Security, Volume 1, Number 2, 2002
  17. Alec Yasinsac and Wm. A. Wulf, "A Framework for A Cryptographic Protocol Evaluation Workbench", The International Journal of Reliability, Quality and Safety Engineering (IJRQSE), Vol. 8 No. 4, December 01, 2001, pp 373-89

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Mark Yampolskiy, Lena Schuetzle, Uday Vaidya and Alec Yasinsac, "Security Challenges for Additive Layer Manufacturing with Metallic Alloys", The Ninth Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection SRI International Arlington, Virginia, USA, March 16 - 18, 2015
  2. Mark Yampolskiy, William Glisson, and Alec Yasinsac, "Intellectual Property Protection in Additive Layer Manufacturing: Requirements for Secure Outsourcing", The 4th Program Protection and Reverse Engineering Workshop (PPREW-4), New Orleans, LA., December 14, 2014
  3. Alec Yasinsac, "Independent Computations for Safe Remote Electronic Voting", Security Protocols XXI, 21st International Workshop, March 18-20th, 2013, Sidney Sussex College, Cambridge, UK, LNCS 8263, ISBN 978-3-642-41716-0
  4. Alec Yasinsac, "A Model For Managing System Insiders", the Hawaii International Conference on System Sciences (HICSS-46), 7-10 January, 2013
  5. Todd Andel and Alec Yasinsac, "Secure Internet Voting Protocol for Overseas Military Voters", the Twentieth International Workshop on Security Protocols, April 11-13th, 2012 at Sidney Sussex College, Cambridge, UK, LNCS (in press)
  6. Alec Yasinsac, "Did Your Mailed Ballot Count: The Unrecognized Unreliability of Voting By Mail," The 9th International Conference on Politics and Information Systems, Technologies and Applications: PISTA 2011, Orlando, Florida, July 19th - July 22nd, 2011
  7. Alec Yasinsac, "Comparative Risk Analysis: Using Technology to Make Military Members First Class Voters," 2nd International Conference on Society and Information Technologies: ICSIT 2011, Orlando, Florida, March 27-30, 2011
  8. Alec Yasinsac, "Insider Threats to Voting Systems," Workshop on Governance of Technology, Information, and Policies (GTIP), December 7, 2010
  9. J. Harold Pardue and Alec Yasinsac, "Voting System Risk Assessment Using Threat Trees," accepted to the 2010 Conference on Information Systems Applied Research, October 28-31, 2010
  10. J. Harold Pardue, Alec Yasinsac, and Jeffrey P. Landry, "Towards Internet Voting Security: A Threat Tree for Risk Assessment," accepted to the International Conference on Risks and Security of Internet and Systems 2010, October 10-13, 2010
  11. Mike Burmester, Prasanta Das, Martin Edwards, and Alec Yasinsac, "Multi-Domain Trust Management in Variable Threat Environments - A User-Centric Model", MILCOM 2009, October 18–21, 2009, Boston, MA USA
  12. Harold Pardue, Jeff Landry, and Alec Yasinsac, "A Risk Assessment Model for Voting Systems using Threat Trees and Monte Carlo Simulation", First International Workshop on Requirements Engineering for E-voting Systems, Atlanta, Georgia, USA Monday, August 31st, 2009
  13. Sean Piesert, Matt Bishop, and Alec Yasinsac, "Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines," 42st Hawaii International Conference on System Sciences,  January 5-8, 2009
  14. Mike Burmester, Prasanta Das, Martin Edwards, and Alec Yasinsac, "Domain Trust Management in Variable-Threat Environments Using Rollback-Access", MILCOM 2008, San Diego, California, November 17-19, 2008
  15. T. R. Andel and A. Yasinsac, "Automated Evaluation of Secure Route Discovery in MANET Protocols", in 15th International SPIN Workshop on Model Checking of Software (SPIN 2008), LNCS 5156, Springer-Verlag, 2008, pp. 26-41.
  16. Alec Yasinsac and Matt Bishop, “Of Paper Trails and Voter Receipts”, in Proceedings of the 41st Hawaii International Conference on System Sciences, MINITRACK: Digital Forensics – State of the Science and Foundational Research Activity, January 7-10, 2008
  17. Mike Burmester, Breno DeMederios, and Alec Yasinsac, "Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer", Security Protocols 13th International Workshop, LNCS 4631, pp. 228-244, November 15, 2007
  18. Todd R. Andel and Alec Yasinsac, “Adaptive Threat Modeling for Secure Ad Hoc Routing Protocols”, Electronic Notes in Theoretical Computer Science, 3rd International Workshop on Security and Trust Management (STM07), September 26-27th, 2007, Dresden, Germany
  19. Todd R. Andel and Alec Yasinsac, “Automated Security Analysis of Ad Hoc Routing Protocols”, Workshop on Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, Wroclaw, Poland, July 8-9, 2007
  20. Alec Yasinsac and J. Todd McDonald, “Towards Working With Small Atomic Functions”, the Fifteenth International Workshop on Security Protocols, Brno, Czech Republic, 18-20 April 2007, LNCS
  21. J. Todd McDonald and Alec Yasinsac, “Applications for Provably Secure Intent Protection with Bounded Input-Size Programs”, The International Conference on Availability, Reliability and Security (ARES 2007), April 10-13, 2007 (28%, 60/212)
  22. Todd Andel and Alec Yasinsac, “Invisible Node Revisited”, IEEE Southeast Conference 2007 (SoutheastCon 2007), March 22-25, 2007, pp. 686-691.
  23. J. Todd McDonald and Alec Yasinsac, "Program Intent Protection Using Circuit Encryption", 8th International Symposium on System and Information Security, Sao Jose dos Campos, Sao Paulo, Brazil, November 8-10, 2006 (29%, 40/140)
  24. Alec Yasinsac, “Non-Boolean Authentication", 2nd International Semantic Web Policy Workshop, Athens, Georgia, USA, Nov 6-9, 2006
  25. Todd Andel and Alec Yasinsac, "Wireless Protocol Security; to Simulate or not Simulate", Symposium on Simulation Software and Security, affiliated with the 2006 Spring Simulation Multi-conference (SpringSim06), Von Braun Center, Huntsville, Alabama, April 2-6, 2006
  26. Alec Yasinsac and J. Todd McDonald, "Security-Aware Coding", 39th Annual Hawaii International Conference On System Sciences, Mini-track on Information Security Education and Foundational Research, Jan. 4-7, 2006
  27. Tina Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor Networks Using Signal Properties", Proceedings of the 2005 IEEE Workshop on Wireless and Sensor Network Security, Nov. 7-10, 2005, Washington DC
  28. Alec Yasinsac and J. Todd McDonald, "Of Unicorns and Random Programs", The Third IASTED International Conference on Communications and Computer Networks, (CCN 2005), October 24-26, 2005, Marina del Rey, CA, USA
  29. Tina Suen and Alec Yasinsac, "Peer Identification in Wireless Sensor Networks Using Signal Properties", 2005 IEEE Workshop on Wireless and Sensor Network Security, Nov. 7-10, Washington DC
  30. J. Todd McDonald and Alec Yasinsac, "Application Security Models for Mobile Agent Systems", Proceedings of the 1st International Workshop on Security and Trust Management, Electronic Notes in Theoretical Computer Science, September 15, 2005, 25% acceptance (9/36)
  31. Mike Burmester, Breno DeMederios, and Alec Yasinsac, "Community-centric vanilla-rollback access, or: How I stopped worrying and learned to love my computer",  Thirteenth International Workshop on Security Protocols, April 20-22, 2005, LNCS
  32. Willard Thompson, Alec Yasinsac, and Todd McDonald, "Semantic Encryption Transformation Scheme", Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, September 15-17, 2004, pp. 516-21
  33. Todd McDonald, Alec Yasinsac, and Willard Thompson, "Mobile Agent Data Integrity Using Multi-agent Architecture", in the Proceedings of the 2004 International Workshop on Security in Parallel and Distributed Systems, San Francisco, CA, September 15-17, 2004, pp. 536-42
  34. Mike Burmester, Tri Le Van, and Alec Yasinsac, "Weathering the Storm: Managing Redundancy and Security in Ad hoc Networks ", 3rd International Conference on AD-HOC Networks & Wireless, July 20-22, 2004, LNCS 3158, Springer, pp. 96-107
  35. Prabha Ramachandran and Alec Yasinsac, "Limitations of On Demand Secure Routing Protocols",  IEEE Information Assurance Workshop 2004, June 10-11, 2004
  36.  D. J. Scott and Alec Yasinsac, "Dynamic Probabilistic Rebroadcast in Ad hoc Networks", Proceedings of the International Conference on Wireless Networks, June 21-4, 2004
  37. Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, "Accountable Privacy" Twelfth International Workshop on Security Protocols, April 26-28, 2004, Lecture Notes in Computer Science
  38. Yanet Manzano and Alec Yasinsac, "Honeytraps, a Valuable Tool To Provide Effective Countermeasures for Crime Against Computer and Network Systems", Proceedings of the 7th World Multi-conference on Systemics, Cybernetics and Informatics (SCI), July 30, 2003
  39. Alec Yasinsac, "Rate of Change in Ad Hoc Networks", Proceedings of the Information Resources Management Association International Conference, pp. 698-701, May 18-21, 2003, Philadelphia , PA
  40.  John Marshall, Vikram Thakur, and Alec Yasinsac, "Identifying Flaws in the Secure Routing Protocol", Proceedings of The 22nd International Performance, Computing, and Communications Conference (IPCCC 2003) April 9-11, 2003, pp. 167-174
  41. Mike Burmester and Alec Yasinsac, "Protocols for a Dynamic Key Exchange System for Ad Hoc Networks", Eleventh International Workshop on Security Protocols, Cambridge, UK, Apr. 2-4, 2003, Lecture Notes in Computer Science
  42. Stephen Carter and Alec Yasinsac, "Secure Position Aided Ad hoc Routing Protocol", Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 329-334, Nov. 4-6, 2002.
  43. Alec Yasinsac, Vikram Thakur, Stephen Carter, and Ilkay Cubukcu, "A Family of Protocols for Group Key Generation in Ad Hoc Networks," Proceedings of the IASTED International Conference on Communications and Computer Networks (CCN02), pp. 183-187, Nov.4-6, 2002
  44. Michael Burmester, Yvo Desmedt, Rebecca Wright, and Alec Yasinsac, "Security or Privacy, Must We Choose?" Symposium on Critical Infrastructure Protection and the Law, Computer Science and Telecommunication Board, October, 2002
  45. Alec Yasinsac and Yanet Manzano, "Honeytraps, A Network Forensic Tool", Proceedings of the 6th World Multi-conference on Systemics, Cybernetics, and Informatics (SCI 02), July 15-19, 2002
  1. Alec Yasinsac and James A. Davis, "Modeling Protocols for Secure Group Communication in AdHoc Networks", 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers Series: Lecture Notes in Computer Science, Christianson, B.; Crispo, B.; Malcolm, J.A.; Roe, (Eds.), 2004, VIII, 243, pp. 189-202, ISBN: 3-540-20830-5
  2. Ladislav Kohout, Alec Yasinsac, and Ernest McDuffie, "Activity Profiles for Intrusion Detection", North American Fuzzy Information Processing Society-Fuzzy Logic and the Internet (NAFIPS-FLINT 2002), New Orleans, LA, pp. 463-468, June 27-29, 2002
  3. Alec Yasinsac, Marion Bogdonav, and Jennifer Frazier, "Building An Information Security Laboratory", 6th IEEE National Colloquium for Information Systems Security Education, Government, Industry, and Academia, June 4, 2002
  4. Justin Childs and Alec Yasinsac, "Using Weakest Preconditions to Evaluate the Transport Layer Security Protocol", The Sixth IEEE International Symposium on High Assurance Systems Engineering, pp 149-59, Boca Raton, FL, Oct 24-26, 2001.
  5. Yanet Manzano and Alec Yasinsac, "Policies to Enhance Computer and Network Forensics", The 2nd Annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, held at the United States Military Academy, June 2001
  6. Alec Yasinsac, "Detecting Intrusions in Security Protocols", ACM Workshop on Intrusion Detection, 7th ACM Conference on Computer and Communication Security, Nov 2000
  7. Alec Yasinsac, "Dynamic Analysis of Security Protocols", Proceedings of the New Security Paradigms 2000 Workshop, Sept 18-21, Ballycotton, Ireland
  8. Alec Yasinsac and Wm. A. Wulf, "A Framework for A Cryptographic Protocol Evaluation Workbench", Proceedings of the Fourth IEEE International High Assur-ance Systems Engineering Symposium (HASE99), Washington D.C., Nov. 1999.
  9. Alec Yasinsac and Wm. A. Wulf, "Using Weakest Preconditions to Evaluate Cryptographic Protocols", Cambridge International Workshop on Cryptographic Protocols, March 1996.
  10. Wm. A. Wulf, Alec Yasinsac, Katie S. Oliver, and Ramesh Peri, "Remote Authentication Without Prior Shared Knowledge", Proceedings of the Internet Society Symposium on Network and Distributed System Security, February 2-4, 1994, San Diego, Ca., pp. 159-164

Return to top of the page

  


 

 

BOOK CHAPTERS

  1. Alec Yasinsac, “Identification: Remote Attestation”, Wireless Sensor Network Security, Cryptology & Information Security Series (CIS), IOS Press, http://www.iospress.nl/html/ciss.php, estimated January 2008
  2. Alec Yasinsac, "Rate of Change in Ad Hoc Networks", in Commerce and M-Commerce Technologies, Chapter # 8, pp.  166-183 , edited by Dr. Candace Deans, July 2004, Idea Group Inc. Publishers, ISBN 1-59140-566-1

 

Return to top of the page


 

 

 

 

 

Technical Reports, Dissertation, Position Papers, and Testimony Before Government Bodies

  1. Alec Yasinsac, “Precision In Elections: Extracting a Precise Result from an Imprecise Process,” the International Journal of Critical Infrastructure Protection, Elsevier, October 2012, http://dx.doi.org/10.1016/j.ijcip.2012.09.002
  2. Alec Yasinsac, "The Military's Obligation to Military Voters: A Position Paper for the NIST 2010 UOCAVA Remote Voting Systems Workshop", Workshop on UOCAVA Remote Voting Systems, Washington, DC, August 6-7, 2010, http://www.nist.gov/itl/csd/ct/uocava_workshop_aug2010.cfm
  3. Richard Benham, Alec Yasinsac, and Jeremy Epstein, "Limited Proxy Voting as an Alternative to use of Complex Systems for UOCAVA voters", Workshop on UOCAVA Remote Voting Systems, Washington, DC, August 6-7, 2010, http://www.nist.gov/itl/csd/ct/uocava_workshop_aug2010.cfm
  4. Alec Yasinsac, Robert B. Sweeney, Ph.D., J. Harold Pardue, Ph.D., Jeffrey P. Landry, Ph.D., LisaAnn Z. Benham, Richard M. Benham, Jeremy J. Epstein, Paul Lux, E. John Sebes, and Ion Sancho, "Elections Operations Assessment," in press March 16, 2010
  5. Michael Black and Alec Yasinsac, "Embedded Forensic Information", ARO Workshop on Digital Forensics, Washington D.C., Sept. 10-11, 2009
  6. Alec Yasinsac, written testimony the U.S. House of Representatives, Committee of House Administration, Voting Subcommittee hearing on "Military and Overseas voting, Problems and potential solutions", May 21, 2009, http://cha.house.gov/view_hearing.aspx?r=50
  7. Alec Yasinsac, Testimony before the U.S. Elections Assistance Commission Interdisciplinary Roundtable  Discussion of TGDC Proposed Voluntary Voting System Guidelines, May 5, 2008
  8. Alec Yasinsac, Written testimony to the U.S. Elections Assistance Commission Interdisciplinary Roundtable  Discussion of TGDC Proposed Voluntary Voting System Guidelines, May 5, 2008, http://www.eac.gov/News/docs/testimony_alec_yasinsac_fsu/attachment_download/file
  9. Kristine Amari, Ryan Gardner, Brian Hay, John Kerski, Kara L. Nance, and Alec Yasinsac, “Software Review and Security Analysis of the Diebold Voting Machine Software, Premier TSx Version 4.7.1 Supplement”, Security and Assurance in Information Technology Laboratory, Florida State University, December 19, 2007, for the Florida Department of State
  10. Alec Yasinsac, John Kerski, David Gainey, Michael Gerke, Kristine Amari, and Donald Newell, “Software Review and Security Analysis of the Diebold Voting Machine Software”, TSX Supplement, For the Florida Department of State, September 28, 2007
  11. Alec Yasinsac, Breno de Medeiros , David Gainey, John Kerski, Zachary Hartley, Ryan Walega, and Michael Gerke, “Software and Security Review for Elections Systems and Software iVotronic  Firmware Versions 9.1.8.0 and 9.2.0.0”, Final Report, For the Florida Department of State, August 14, 2007
  12. David Gainey, Michael Gerke, and Alec Yasinsac, “Software Review and Security Analysis of the Diebold Voting Machine Software”, Supplemental Report, For the Florida Department of State, August 10, 2007, http://election.dos.state.fl.us/pdf/DieboldSupplementalReportFinalSubmission.pdf
  13. Ryan Gardner, Alec Yasinsac, Matt Bishop, Tadayoshi, Kohno, Zachary Hartley, John Kerski, David Gainey, Ryan Walega, Evan Hollander, and Michael Gerke, “Software Review and Security Analysis of the Diebold Voting Machine Software”, Final Report For the Florida Department of State, July 27, 2007, http://election.dos.state.fl.us/pdf/SAITreport.pdf
  14. A. Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de Medeiros, G. Tyson, M. Shamos, and M. Burmester, “Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware, Final Report”, Security and Assurance in Information Technology Laboratory, Florida State University, February 23, 2007, http://election.dos.state.fl.us/pdf/FinalAudRepSAIT.pdf.
  15. Tina Suen and Alec Yasinsac, "Ad hoc Network Security: Peer Identification and Authentication Using Signal Properties", The 6th IEEE SMC Information Assurance Workshop, West Point, NY, June 15-17, 2005 (Poster presentation)
  16. Willard Thompson, Alec Yasinsac, and Todd MacDonald, "A Software Tamper Resistant Mechanism Using Runtime Pathway Mappings", FSU CS Department, October 2004, Technical Report, TR-041021, 12 pages.
  17. Alec Yasinsac, Edwin A. Melendez, and Sachin Goregaoker, “Implementing an Object Oriented, Knowledge Based Network Reference Monitor and Intrusion Detection System”,  FSU CS Department Technical Report TR-030801, August 29, 2003, 21 pages
  18. Alec Yasinsac, “A Formal Semantics for Evaluating Cryptographic Protocols”,  Ph.D. Dissertation, University of Virginia, January 1996, Department of Computer Science, University of Virginia, Advisor: William A. Wulf, http://libra.virginia.edu/catalog/libra-oa:313

 

Return to top of the page

 


Return to home page