Reaserch and Publications
Security, Computer Networks, Management and Security Policy Languages
Refereed Articles and Book Chapters
[1]
Security policy conflicts in service-oriented systems (Bartosz Brodecki, Piotr Sasak, Michał Szychowiak), In New Generation Computing, Ohmsha, Ltd., volume (to be published), 2012, pp. ??-??, [bib]
[2]
Problemy bezpieczeństwa w architekturze SOA (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak), Chapter in Nauka w obliczu społeczeństwa cyfrowego. I Konferencja i3: internet - infrastruktury - informacje (Damian Niemir, Maciej Stroiński, Jan Węglarz, eds.), Ośroder Wydawnictw Naukowych, 2010, pp. 233-246, [pdf][bib]
[3]
Selected aspects of management in SOA (Bartosz Brodecki, Jerzy Brzeziński, Dariusz Dwornikowski, Jacek Kobusiński, Michał Sajkowski, Piotr Sasak, Michał Szychowiak), Chapter in SOA infrastructure tools: concepts and methods (Stanisław Ambroszkiewicz, Jerzy Brzezinski, Wojciech Cellary, Adam Grzech, Krzysztof Zieliński, eds.), Poznań University of Economics Press, 2010, (ISBN 978-83-7417-544-9) [bib]
Refereed Conference Papers
[4]
Lightweight information flow control for web services (Bartosz Brodecki, Michał Kalewski, Piotr Sasak, Michał Szychowiak), In Parallel Processing and Applied Mathematics (PPAM 2011) (Roman Wyrzykowski, Jack Dongarra, Konrad Karczewski, Jerzy Wasniewski, eds.), Springer-Verlag, in Lecture Notes in Computer Science, volume 7204, 2012, pp. 608-617, [doi][bib]
[5]
Consistency Maintenance of Modern Security Policies (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak), In Advanced Computing, Networking and Security (ADCONS 2011) (P. Santhi Thilagam, Alwyn Roshan Pais, K. Chandrasekaran, N. Balakrishnan, eds.), Springer-Verlag, in Lecture Notes in Computer Science, volume 7135, 2012, pp. 472-477, [doi][bib]
[6]
Modality conflict discovery for SOA security policies (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak), In Advanced Parallel Processing Technologies 2011 (APPT 2011) (Olivier Temam, Pen-Chung Yew, Binyu Zang, eds.), Springer-Verlag, in Lecture Notes in Computer Science, volume 6965, 2011, pp. 112-126, [pdf][doi][bib]
[7]
Security Policy Definition Framework for SOA-based systems (Bartosz Brodecki, Piotr Sasak, Michał Szychowiak), In 10th International Conference on Web Information Systems Engineering (WISE 2009) (Gottfried Vossen, Darrell D. E. Long, Jeffrey X. Yu, eds.), Springer-Verlag, in Lecture Notes in Computer Science, volume 5802, 2009, pp. 589-596, [pdf][doi][bib]
Refereed Workshop Papers
[8]
ModCon algorithm for discovering security policy conflicts (Bartosz Brodecki, Jerzy Brzeziński, Piotr Sasak, Michał Szychowiak), In The 6th Joint Workshop on Information Security, 2011, [pdf][bib]
Other Publications
[9]
MAC kontra DAC, co wybrać - prezentacja (B. Brodecki, P. Sasak), Pingwinaria conference, Slide Show, 2007, (Pingwinaria conference) [pdf][bib]
[10]
MAC kontra DAC, co wybrać (B. Brodecki, P. Sasak), Polish Linux Users Group, 2007, pp. 5f-6d, (ISBN 978-83-920463-5-6) [pdf][bib]
[11]
Obowiązkowa kontrola dostępu w systemie Linux (B. Brodecki, P. Sasak), Confidence Conference, 2007, (Confidence Conference) [pdf][bib]
Powered by bibtexbrowser
22:12 17/11/2019"
November 17, 2019
Sunday
 45 days till end of year.