Publications

Theses

    Ph.D. Thesis: A Distributed Persistent Store, Ph.D. Thesis (Supervisor: Dr. Frans Henskens), Basser Department of Computer Science, The University of Sydney, Sydney, Australia, 1995.
    M.Sc. Thesis: MAkTAB: An Application Generator in C Language for Commercial Applications, M.Sc. Thesis (Superviser: Masih Ghaemian), Department of Computer Engineering, Sharif University of Technology, Tehran, Iran, 1989.

Published Journal Papers

  1. Noferesti, M. and Jalili, R. “ACoPE: An Adaptive Semi-Supervised Learning Approach for Complex-Policy Enforcement in High-Bandwidth Networks”, Computer Networks, October 2019.
  2. Noferesti, M. and Jalili, R. “Inline High-Bandwidth Network Analysis Using A Robust Stream Clustering Algorithm”, IET Information Security, Vol 13, No. 5, March 2019.
  3. Gharehchamani; J., Dousti; M.S., Jalili, R. and Papadopoulos, D. “SESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing”, ISeCure, Vol. 11, No. 1, 2019.
  4. Dorri Nogoorani, S. and Jalili, R. "TIRIAC: A trust-driven risk-aware access control framework for Grid environments”, in Future Generation Computer Systems, Vol. 55, pp 238-254, January 2016.
  5. Dorri Nogoorani, S. and Jalili, R. "Uncertainty in Trust: A Risk-Aware Approach”, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems (IJUFKS), 2016.
  6. Dousti, M.S. and Jalili, R., "FORSAKES: A Forward-Secure Authenticated Key Exchange Protocol Based on Symmetric Key-Evolving Schemes," Advances in Mathematics of Communications, Volume 9, No. 4, pp. 471–514, 2015.
  7. Hadavi, M.A., Jalili, R., Karimi, L. "Access control aware data retrieval for secret sharing based database outsourcing", Distributed and Parallel Databases, pp 1-30, Published Online 2015.
  8. Boorghany, A., Sarmadi, S.B., and R. Jalili, R. "On constrained implementation of lattice-based cryptographic primitives and schemes on smart cards", ACM Transactions in Embedded Computing Systems – TECS, Vol. 14, No. 3, pp 42-67, 2015.
  9. M. Niknafs, S.D. Nogoorani, R. Jalili, R. "A Collusion Mitigation Scheme for Reputation Systems", ISeCure, The ISC International Journal of Information Security, Vol. 7, No. 2, 2015.
  10. Asayesh, A., Hadavi, M.A., and Jalili, R.,"(t, k)‐Hypergraph anonymization: an approach for secure data publishing", Security and Communication Networks, Vol. 8, No. 7, P.P. 1306-1317, 10 May 2015.
  11. Dousti, M.S. and Jalili, R., "An efficient statistical zero-knowledge authentication protocol for smart cards", International Journal of Computer Mathematics, Vol. 93, No. 3, pp 1-30, March 2015.
  12. Hadavi, M.A., Jalili, R., Damiani, E. and Cimato, S. "Security and Searchability in Secret Sharing-based Data Outsourcing", International Journal of Information Security, Vol. 14, No. 6, pp 513-529, November 2015.
  13. Noferesti, M., Ghasemi, S., Hadavi, M.A, and Jalili, R. “A Trust-Based Approach for Correctness verification of Query Results in Data Outsourcing”, Journal of Computing and Security (JCS), Vol. 1, No. 1, pp 3-14, 2014.
  14. Mahrooghi, H.R. and Jalili, R. “An Algebraic Theory of Epistemic Processes”, Journal of Universal Computer Science (JUCS), Vol 19, No. 10, pp 1396-1432, 2013.
  15. Amini, M., Jalili, R., and Mousa Amir Ehsan, and Fathyieh Faghih, "Cooperative Security Administration in Multi-Domain Environments Using a Variant of Deontic Logic", Scientia Iranica, Transaction on Computer Science & Engineering and Electrical Engineering, Vol. 19, No 3, pp 635-653, June 2012.
  16. Soltani, S., Hadavi, M.A. and Jalili, R. "Separating Indexes from Data: A Distributed Scheme for Secure Database Outsourcing", ISeCure, The ISC International Journal of Information Security, Vol. 3, No.2. pp 121-133, 2011.
  17. Amini, M. and Jalili, R. "A Multi-Level Authorization Model and Framework for Distributed Semantic-Aware Environments", IET Information Security, Special Issue on Multi-Agent and Distributed Information Security, Vol. 4, No 4, pp. 301-321, Dec. 2010.
  18. Norolahi-Ravari, A., Jafarian,J.H., Amini, M. and Jalili, R. "GTHBAC: A Generalized Temporal History Based Access Control Model", Telecommunication Systems Journal, Vol. 45, No. 2, pp 111-125, 2010.
  19. Shahriari, H.R., Makarem, M.S., Sirjani, M., Jalili, R., and Movaghar, A. “Vulnerability Analysis of Networks to Detect Multiphase Attack Using the Actor-based Language Rebeca”, Elsevier Computers & Electrical Engineering journal, Vol. 36, No. 5, pp. 874-885, 2010.
  20. Mohammadi-Nodooshan, A., Darmani, Y., Jalili, R. , Nourani, M. and Sayad Haghighi, M. " A Robust and Efficient SIP Authentication Scheme", Scientia Iranica Scientia Transactions on Computer Science and Engineering, Vol. 17, No. 1, pp 551-558, January 2009.
  21. Niamanesh, M. and Jalili, R. “A Framework for Automatic Reconfigurations of Protocol Stacks in Ubiquitous Computing Systems”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp 758-769, 2009.
  22. Niamanesh, M. and Jalili, R. “A Solution for Backward-Compatible Reconfigurations of Running Protocol Components in Protocol Stacks”, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, pp. 784-793, 2009.
  23. Niamanesh, M. and Jalili, R. “DRAPS: A Framework for Dynamic Reconfigurable Protocol Stacks”, Journal of Information Science and Engineering (JISE), Vol. 25, pp 827-841, May 2009.
  24. Asadpour, M. and Jalili, R. “Double Voting Problem of some Anonymous E-Voting Schemes”, Journal of Information Science and Engineering (JISE), Vol. 25, pp 895-906, 2009.
  25. Shahriari, H.R. Ganji-Saffar, Y., Jalili, R., Habibi, J. “Topological Analysis of Multi-phase Attacks using Expert Systems”, Journal of Information Science and Engineering (JISE), Vol. 24, No. 3; pp 743-767. May 2008.
  26. Shahriari, H.R. and Jalili, R. “Vulnerability Take Grant (VTG): An Efficient Approach to Analyze Network Vulnerabilities”, Elsevier Computers and Security Journal, Vol. 26, No. 5, pp 349-360, 2007.
  27. Yusefi, A., Jalili, R. and Niamanesh, M. “Multi-Determiner Protection of Private Data in Pervasive Computing Environments”, IJCSNS International Journal of Computer Science and Network Security, Vol. 16, No. 12, pp 239-249, Dec. 2006.
  28. Rafiei, M.E., Jalili, R. and Moosavi, H. “Vulnerability Analysis trough a Graph-based Protection System”, IJCSNS International Journal of Computer Science and Network Security, , Vol. 16, No. 12, pp 311-319, Dec. 2006.
  29. Amini, M., Jalili, R., and Shahriari, H.R. “RT-UNNID: A Practical Solution to Real-Time Network-Based Intrusion Detection Using Unsupervised Neural Networks”, Elsevier Computers and Security Journal, Vol. 25, No. 6, pp 459-468, Sept. 2006.

Published Conference Papers

  1. Gharahchamani, J., Papadopoulos, D., Papamanthou, C., Jalili, R. “New Constructions for Forward and Backward Private Symmetric Searchable Encryption”, ACM SIGSAC Conference, 2018
  2. Karimi, L., Javadi, S.A., Hadavi, M.A., and Jalili, R. "Missing a Trusted Reference Monitor: How to Enforce Confidential and Dynamic Access Policies?" Computer Networks and Distributed Systems, 2014.
  3. A. Boorghany, S.B. Sarmadi, P. Yousefi, P. Gorji, R. Jalili, "Random data and key generation evaluation of some commercial tokens and smart cards", Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.
  4. M. Soltani, S. Najafi, R. Jalili, "Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation", Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.
  5. E. Mohammadian, M. Noferesti, R. Jalili, "FAST: Fast Anonymization of Big Data Streams", Big Data Science and Computing, 2014.
  6. A. Najafi, A. Sepahi, R. Jalili, "Web driven alert verification", Information Security and Cryptology (ISCISC), 3-4 Sept. 2014.
  7. V. Khodabakhshi, M. Soltani, R. Jalili, M. Rezvani, "Chaos-based selective key (CSK) Cryptosystem: A new direction to secure VPN", Information Security and Cryptology (ISCISC), Aug. 2013.
  8. S.A. Mirheidari, S. Arshad, S. Khoshkdahan, R. Jalili, "A Comprehensive Approach to Abusing Locality in Shared Web Hosting Servers", Trust, Security and Privacy in Computing and Communications, 16-18 July 2013.
  9. S.A. Mirheidari, S. Arshad, R. Jalili, "Alert Correlation Algorithms: A Survey and Taxonomy", Cyberspace Safety and Security, 2013.
  10. Y. Sobhdel, R. Jalili, "A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm", Information Systems Security, ICISS 2013: pp 390-401, 2013.
  11. A.T. Haghighat, M.A. Kargar, M.S. Dousti, R. Jalili, "Minimal assumptions to achieve privacy in e-voting protocols", Information Security and Cryptology (ISCISC), pp 1-5, Aug. 2013.
  12. Toroghi Haghighat, A., Dousti, M.S., Jalili, R.” An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol”, The PST2013 International Conference on Privacy, Security and Trust (PST), pp 161-168, 2013
  13. Karimi, L., Javadi, S.A. , Hadavi, M.A., Jalili, R. “Selective-Encryption based Access Control for Data Outsourcing“, Symposium on Computer Networks and Distributed Systems (CNDS 2013), 2013.
  14. Y. Sobhdel; Jalili, R.” A UC-Secure Authenticated Contributory Group Key Exchange Protocol Based on Discrete Logarithm”, 9th International Conference on Information Systems Security (ICISS 2013), Lecture Notes in Computer Science Volume 8303, pp 390-401, India, 2013
  15. Emamdoost, N., Dousti, M. S., & Jalili, R. “Statistical Disclosure: Improved, Extended, and Resisted”, In proceedings of SECURWARE 2012, The Sixth International Conference on Emerging Security Information, Systems and Technologies, pp 119-125, 2012.
  16. Taheri Soodejani, A., Hadavi, M.A., Jalili, R. “k-Anonymity-based Horizontal Fragmentation to Preserve Privacy in Data Outsourcing”, In Proceedings of The 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2012)”, pp 263-273, 2012.
  17. Hadavi, M.A., Ernesto Damiani, E., Jalili, R., Cimato, S., and Ganjei, Z. “AS5: A Secure Searchable Secret Sharing Scheme for Privacy Preserving Database Outsourcing”, In Proceedings of the 5th SETOP International Workshop on Autonomous and Spontaneous Security (SETOP 2012), pp 201-216, 2012
  18. Simin Ghasemi, Morteza Noferesti, Mohammad Ali Hadavi, Sadegh Dorri Nogoorani and Rasool Jalili, “Correctness Verification in Database Outsourcing: A Trust Based Fake Tuples Approach”, 8th International Conference on Information Systems Security (ICISS2012), pp343-251, 2012.
  19. Najmeh S. MirAmirKhani, Rasool Jalili, “Formalization of Blind Signature using the Inductive Method. 5th International Information Security and Cryptology Conference - ISCTURKEY 2012, pp 148-154, 2012
  20. Mohammad Ali Hadavi, Morteza Noferesti, Rasool Jalili, Ernesto Damiani, “Database as a Service: Towards a Unified Solution for Security Requirements”, In Proceedings if the 4th IEEE International Workshop on Security Aspects in Processes and Services Engineering (SAPSE 2012) under COMPSAC 2012
  21. Sadegh Dorri Nogoorani, Rasool Jalili, “Uncertainty in Probabilistic Trust Models”, 26th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2012
  22. Dorri Nogoorani, S. ; Hadavi, M.A. ; Jalili, R.” Measuring software security using SAN models”, 9th International ISC Conference on Information Security and Cryptography (ISCISC2012), pp 80-86, 2012
  23. Javadi, S.A., Amini, M. and Jalili, R. "Non-monotonocity in OrBAC Through Default and Exception Policy Rules", In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 87-94, 2012, Tabriz, Iran.
  24. Alizadeh, M., Javadi, S.A., Amini, M. and Jalili, R. "Policy Specification and Enforcement in Online Social Networks Using MKNF+", In Proceedings of the 9th International ISC Conference on Information Security and Cryptology, pp. 48-53, 2012, Tabriz, Iran.
  25. Arasteh, M., Amini, M. and Jalili, R. "A Trust and Reputation-based Access Control Model for Virtual Organizations", In Proceedings of the 9th International ISC Conference on Information Security and Cryptology (ISCISC2012), pp. 121-127, 2012, Tabriz, Iran.
  26. N.S. Miramirkhani, R. Jalili, M. Yarmohamadi, "FOO e-voting protocol: Inductive analysis of the eligibility property", Information Security and Cryptology (ISCISC), 13-14 Sept. 2012.
  27. S. A. Mirheidari, S. Arshad, S. Khoshkdahan, R. Jalili, "Two novel server-side attacks against log file in Shared Web Hosting servers", Internet Technology And Secured Transactions, 10-12 Dec, 2012.
  28. P. Tourani, M.A. Hadavi, R. Jalili, "Access control enforcement on outsourced data ensuring privacy of access control policies", High Performance Computing and Simulation (HPCS), 4-8 July, 2011
  29. M.H. Haghighat, H.R. Mahrooghi, R. Jalili, "Automatic checking of eligibility in electronic voting protocolsusing mCRL2", Computer Science and Software Engineering (CSSE), 15-16 June 2011
  30. Noferesti, M., Hadavi, M.A., and Jalili, R. “A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios”, In Proceedings if the Seventh International Conference on Information Systems Security-LNCS Published (ICISS 2011), India, 2011
  31. Amirkhani, N., Mahrooghi, H.R., Jalili, R. “Analysis of an E-voting Protocol using the Inductive Method”, In Proceedings of the Fundamentals of Software Engineering (FSEN-2011), Tehran, 2011.
  32. مهدي اسحاقي ورسول جليلي " ارزيابي ويژگي بي رسيدي در برخي پروتکل هاي راي گيري الکترونيکي اينترنتي"، نهمین کنفرانس انجمن رمز ایران، مشهد، 1391
  33. مريم کريمي ورسول جليلي " روشي کارآ و امن جهت پرس و جوي بازه اي روي داده رمز شده اکس ام ال"، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390
  34. بنيامين تختايي، حميد رضا محروقي، رسول جليلي " تحليل صوري وارسي پذيري ميکس نت با استفاده از حساب پي کاربردي"، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390
  35. نجمه ميراميرخاني ، حميدرضا محروقي، رسول جليلي، " ارائه ي مدل صوري طرح امضاي کور با استفاده از روش استقرايي"، هشتمین کنفرانس انجمن رمز ایران، تهران، 1390
  36. Faghih, F., Amini, M. and Jalili, R. "Specification of History Based Constraints for Access Control in Conceptual Level", In Proceedings of the 6th International Conference on Information Systems Security (ICISS10), Lecture Notes in Computer Science (LNCS), Vol. 6503, pp. 186-200, 2010, Gandhinaga, India.
  37. Sobhdel, Y., Dousti, M.S., Jalili, R. “Universally Composable Priced Oblivious Transfer”, In Proceedings of the 7th International ISC Conference on Information Security and Cryptography -ISCISC2010, Yazd, 2010.
  38. Toorani, P, Hadavi, M.A., Jalili, R. “A Secure Solution for Access Control Management on Outsourced Data”, In Proceedings of the 7th International ISC Conference on Information Security and Cryptography -ISCISC2010, Yazd, pp 85-92, 2010.
  39. Amoli, A.S., Kharrazi, S.M., Jalili, R. “2PLoc: Preserving Privacy in Location-Based Services”, In Proceedings of the The Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), USA, 2010.
  40. Toorani, P, Hadavi, M.A., Jalili, R. “ACCESS CONTROL ENFORCEMENT ON OUTSOURCED DATA ENSURING PRIVACY OF ACCESS CONTROL POLICIES”, In Proceedings of the 5th International Workshop on Data Privacy Management (DPM-2010), Greece, pp 85-92, 2010.
  41. Hadavi, M.A. and Jalili, R. “Secure Data Outsourcing Based on Threshold Secret Sharing; Towards a More Practical Solution”, In Proceedings of The 36th Conference on Very Large Databases (VLDB2010), Singapore, 2010.
  42. Mahrooghi, H.R., Haghighat, M.H., and Jalili, R. “Formal Verification of Authentication-Type Properties of an Electronic Voting Protocol Using mCRL2”, In Proceedings of The Fourth International Workshop on Verification and Evaluation of Computer and Communication Systems (VECoS 2010), France, 2010.
  43. نوید امام دوست، محمد صادق دوستی،و رسول جليلي، "بهبود حمله افشاي آماري در پروتکل هاي گمنامي"، هفتمین کنفرانس انجمن رمز ایران، یزد، 1389
  44. Faghih, F., Amini, M. and Jalili, R. "A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web Environments", In Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, 2009, London, UK.
  45. Ehsan A.M., Amini, M. and Jalili, R. "Handling Context in a Semantic-based Access Control Framework", In Proceedings of the 5th International Symposium on Frontiers of Information Systems and Network Applications (FINA09) to be held with the IEEE 23rd International Conference on Advanced Information Networking and Applications(AINA'09), 2009, Bradford, UK.
  46. Sedighian, A. and Jalili, R. "AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems", In Proceedings of the 3rd International Conference on Emerging Security Information, Systems and Technologies (SecureWare 2009), Greece, 2009.
  47. Ehsan A.M., Amini, M. and Jalili, R. "A Semantic-based Access Control Mechanism Using Semantic Technologies", Proceedings of the 2nd International Conference on Security of Information and Networks (SIN 2009), 2009, Gazimagusa, North Cyprus.
  48. AmirHaeri, M. and Jalili, R. “RTEAS: A Real-Time Algorithm for Extracting Attack Scenarios from Intrusion Alert Stream”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 39-46, 2009.
  49. Asgharian, A., Amini, M., and Jalili, R. “An Efficient DC-Net Based Anonymous Message Transmission Protocol”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 23-30, 2009.
  50. Dousti, M.S., AmirHaeri, M., and Jalili, R. “Privacy-Preserving Single Layer Perceptron”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 31-38, 2009.
  51. Karimi, M., Hadavi, M.A., and Jalili, R. “A Secure Range Query Enabled Approach for Encrypted XML Documents”, In Proceedings of the 6th ISC International Conference on Information Security and Cryptology (ISCISC 2009), Isfahan, pp 13-22, 2009.
  52. ShirAliNia, A. and Jalili, R. “The Data Affecting Model for Detecting Source Code Security Vulnerabilities”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  53. Ehsan, A.M., Amini, M. and Jalili, R. “Using Semantic Annotation for Designing Security Mechanisms based on MA(DL)2”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  54. Mansoori, F. and Jalili, R. “A Method for Query Processing On Encrypted String Data”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  55. Asl-Asgharian, A., Amini, M. and Jalili, R. “Access Control in Updating XML Documents Using Static Analysis”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  56. Asl-Asgharian, A., Amini, M. and Jalili, R. “Access Control in Updating XML Documents Using Static Analysis”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  57. Jafarian, J.H., Amini, M. and Jalili, R. “A Context Sensitive Information Flow Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  58. Noorollahi, A., Amini, M. and Jalili, R. “Using Logical Time and Semantics in A History Based Access Control Model”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  59. Bahreyni, P., AmirHaeri, M., and Jalili, R. “A Probabilistic Approach to Intrusion Alert Correlation”, Proceedings of the 5th ISC International Conference on Information Security and Cryptology (ISCISC 2008), Tehran, 2008.
  60. Jafarian, J.H., Amini, M. and Jalili, R. “Context-Aware Mandatory Access Control Model for Multilevel Security Environments”, Proceedings of the 27th International Conference on Computer Safety, Reliability and Security SAFECOMP2008, UK, 2008.
  61. IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Multi-Domain Authorization Considering Administrators”, Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY-2008), USA, 2008.
  62. Noorollahi, A., Amini, M. and Jalili, R. “A Semantic Aware Access Control Model with Real Time Constraints on History of Accesses”, Proceedings of the International Multiconference on Computer Science and Information Technology –(IMCSIT-2008), Poland, 2008.
  63. Amini, M. and Jalili, R. “A Calculus for Composite Authorities' Policy Derivation in Shared Domains of Pervasive Computing Environments”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.
  64. Noorollahi, A., Jafarian, J.H , Amini, M. and Jalili, R. “A History Based Semantic Aware Access Control Model Using Logical Time Approach”, Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IDCS 2008), Bangeladesh, 2008.
  65. Sadighian, A.R. and Jalili, R. “FLMAP: A Fast Lightweight Mutual Authentication Protocol for RFID System”, Proceedings of the 16th IEEE International Conference on Networks (ICON 2008), India, 2008.
  66. Taherian, M. Jalili, R. and Amini, M. “Trust Inference in Web-Based Social Networks using Resistive Networks”, Proceedings of the The Third International Conference on Internet and Web Applications and Services (ICIW-2008), Greece, 2008.
  67. afarian, J.H., Amini, M. and Jalili, R. “Protecting Location Privacy through a Graph-based Location Representation and a Robust Obfuscation Technique”, Proceedings of the The 11th International Conference on Information Security and Cryptology- ICISC 2008, Korea, 2008.
  68. Niamanesh, M. and Jalili, R. “A Formalism for Reconfigurability Analysis in Distributed Non- Blocking Components”, Proceedings of the 28th International Conference on Distributed Computing Systems (ICDCS-08), China, 2008.
  69. IranManesh, Z., Amini, M. and Jalili, R. “A Logic for Inclusion of Administrative Domains and Administrators in Multi-Domain Authorization”, Proceedings of the International Conference on Global e-Security, ICGeS-08, UK, 2008.
  70. Abasi-Moghadam, S., Shah-Karami, A. and Jalili, R.“Mapping of Access Control Models in XML-Based DataBases Using Anthology Based Mapping in Semantic Web”, Proceedings of the 13th CSI National Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  71. Saremi, F., Mashayekhi, H., Jalili, R., and Movaghar, A. “CEBAC: A Decentralized Cooperation Enforcement Based Access Control Framework in MANETs”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  72. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  73. Mohammadi-Nodooshan, A. Darmani, Y. Jalili, R. and Nourani, M. “A Robust and Efficient SIP Authentication Scheme”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  74. Noorollahi, A., Amini, M. and Jalili, R. “A Temporal Semantic-based Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  75. Jafarian, J.H., Amini, M. and Jalili, R. “CAMAC: A Context-Aware Mandatory Access Control Model”, Proceedings of the 13th CSI International Computer Conference (CSICC2008), Kish Island, IRAN, 2008.
  76. Taherian, M. Jalili, R. and Amini, M. “A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments”, Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060), Netherland, 2008.
  77. Hemmati, H. and Jalili, R. “Self-Reconfiguration in Highly Available Pervasive Computing Systems”, Proceedings of the International Conference on Autonomic and Trusted Computing (ATC-08) (LNCS 5060), Netherland, 2008.
  78. Taherian, M. Jalili, R., Abolhassani, H. and Amini, M. “PTO: A Trust Ontology for Pervasive Environments”, Proceedings of the IEEE AINA-2008 International Conference, Japan, 2008.
  79. Taherian, M. and Jalili, R. “An Anthology-based and Sematic-Aware Trust Model for Pervasive Computing Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  80. Golyaei, S. and Jalili, R. “A Certificate Based Client Based Access Control Model and its Associating Policy Description Language”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007.
  81. Amini, M. and Jalili, R. “Specification and Inference of Access Policies and Obligations Based on The Deontic Logics in Semantic-Aware Environments”, Proceedings of the Forth Iranian Society of Cryptography Conference (ISCC2007), IRAN, 2007 (The Best Paper Award).
  82. Takabi, H, Amini, M. and Jalili, R. “Enhancing Role-Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.
  83. Takabi, H, Amini, M. and Jalili, R. “Separation of Duty in Role-Based Access Control Model through Fuzzy Relations”, Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007 (Published by IEEE), UK, 2007.
  84. Niamanesh, M. and Jalili, R. “A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems”, Proceedings of the 31st IEEE Computers, Software, and Applications Conference (COMPSAC 2007), China, 2007.
  85. Niamanesh, M. Sabet-Ghadam, S., Yusefzadeh, R. and Jalili, R. “Design and Implementation of a Dynamic Reconfigurable Architecture for Protocol Stack”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  86. Niamanesh, M. and Jalili, R. “Formalizing Assured Dynamic Reconfiguration in Protocols”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  87. Rafiei, M. E. Taherian, M., Moosavi, H., Movaghar, A. and Jalili, R. “Vulnerability Analysis in VGBPS using Prolog”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (FSEN 2007.) (LNCS 4767), Tehran, IRAN, 2007.
  88. Shahriari, H.R. and Jalili, R. “Formal Definition and Categorization of Vulnerabilities using Take-Grant Protection Model”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  89. Hafez-Ghorani, S., SAdeghian, B., Jalili, R., and Tarameshloo, E. “A method for Implementation of ARBAC97 in Relational DBMSs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  90. Jalaei, R., Shahriari, H.R., and Jalili, R. “Analysis of Combinational Attacks to Networks Using Attack Graphs”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  91. Yusefi, A., Jalili, R., and Niamanesh, M. “A Multi-Determiner Privacy Protection System for Pervasive Computing Environments”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  92. Mokhtarian, K., Jalili, R., and Shahriari, H.R. “Quantitative Evaluation of Network Security Using Fuzzy Privilege Graph”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  93. Gerani, Sh. Shahriari, H.R., Saberi, M. and Jalili, R. “Modelling and Analysis of Firewall Vulnerabilities Using VTG”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  94. Rafiei, M. E. and Jalili, R. “Decidability of the Safety Problem in the VGBPS Protection System”, Proceedings of the 12th CSI International Computer Conference (CSICC2007), Tehran, IRAN, 2007.
  95. Takabi, H, Amini, M. and Jalili, R. “Trust-Based User-Role Assignment in Role-Based Access Control”, Proceedings of The 2007 ACS/IEEE International Conference on Computer Systems and Applications (AICCSA ‘2007), Jordan, 2007.
  96. Masoum-Zadeh, A., Amini, M. and Jalili, R. “Conflict Detection and Resolution in Context-Aware Authorization”, Proceedings of the The IEEE 21st International Conference on Advanced Information Networking and Applications (AINA-2007), Canada, 2007.
  97. SattarZadeh, B., AsadPour, M. and Jalili, R. “Enhanced Smart-Card-Based Authentication Scheme Providing Forward-Secure Key Agreement”, Proceedings of the International Conference on New Technologies, Mobility and Security (NTMS'2007), France, 2007.
  98. SattarZadeh, B., AsadPour, M. and Jalili, R. “Improved User Identity Confidentiality for UMTS Mobile Networks”, Proceedings of the 4th European Conference on Universal Multiservice Networks, ECUMN'2007, France, 2007.
  99. Jalaei, R., Shahriari, H.R., and Jalili, R. “Generating and Analyzing Attack Graphs through Vulnerability Take Grant Model”, Proceedings of the International Conference on Network Security- ICONS2007, India, 2007
  100. Masoum-Zadeh, A., Amini, M. and Jalili, R. “Context Aware Access Control through Provisional Authorization”, Proceedings of the 2nd International Conference on Information System Security (ICISS 2006), India, Dec. 2006.
  101. Javanmardi, S., Hemmati, H. and Jalili, R. “An Access Control Framework for Pervasive Computing Environments” Proceedings of the 2006 International Conference on Pervasive Systems & Computing PSC'06, Monte Carlo Resort, Las Vegas, Nevada, USA, June 26-29, 2006.
  102. Javanmardi, S., Amini, M. Jalili, R., and Ganji-Saffar, Y. “SBAC: "A Semantic-Based Access Control Model” Proceedings of the NORDSEC-2006, Sweden, October 2006.
  103. Javanmardi, S., Amini, M. and Jalili, R. “An Access Control Model for Protecting Semantic Web Resources”, Proceedings of the Semantic Web Policy Workshop, Athens, GA, USA, November 5, 2006.
  104. SattarZadeh, B., AsadPour, M. and Jalili, R. “Security Enhancement For A Low Computation Cost User Authentication Scheme”, Proceedings of the International Conference on Security and Cryptography (SECRYPT2006), Portugal, August 2006.
  105. Ganji Saffar, Y., Abolhassani, H. and Jalili, R. “An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments”, Proceedings of the International Workshop on Pervasive Computing Systems & Application (PerCSA 2006) of the ACS/IEEE AICCSA-06 Conference, Dubai/Sharjeh, 2006 (To Apear)
  106. Zakeri, R., Abolhassani, H., Shahriari, H.R. and Jalili, R. “Using Description Logics for Network Vulnerability Analysis”, Proceedings of the 5th International Conference on Networking ICN'06, IEEE Computer Society Press, Mauritius 2006 (to Apear).
  107. Sajedi, H., Jalili, R., and Niamanesh, M., “Using Intelligent Agents for Automatic Selection of Services in Dynamic Wireless Networks”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 1003-1006 (The Farsi Volume), IPM, Tehran, 2006.
  108. Omidian, A., Shahriari, H.R., and Jalili, R., “Modeling of Computer Network Vulnerabilities Using Petri-Nets”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 935-938 (The Farsi Volume), IPM, Tehran, 2006.
  109. Fekrazad Nobakht, N., Niamanesh, M., Hemmati, H., and Jalili, R., “A Graph-Based Mechanism for State Transfer in Dynamic Reconfiguration of Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 436-444 (The Farsi Volume), IPM, Tehran, 2006.
  110. Niamanesh, M., Heydarian, F. and Jalili, R. “Runtime Validity of Dynamic Reconfiguration in Component-Based Programs”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 613-617 (The English Volume), IPM, Tehran, 2006.
  111. Shahriari, H.R., and Makarem, M.S., Sirjani, M., Jalili, R. and Movaghar, A. ”Modeling and Verification of Complex Network Attacks Using and Actor-Based Language”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 152-158 (The English Volume), IPM, Tehran, 2006.
  112. Zakeri, R., Jalili, R. and Shahriari, H.R. “Using Description Logics for Man In The Middle Attack Analysis”, Proceedings of the 11th CSI Computer Conference (CSICC2006), pp. 512-515 (The English Volume), IPM, Tehran, 2006.
  113. Shahriari, H.R., Sadoddin, R., Jalili, R., Zakeri, R. and Omidian, A.R. “Network Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)”, Proceedings of the 7th International Conference on Information and Communications Security(ICICS2005), pp. 256-268 LNCS# 3783, 2005.
  114. Hemmati, H., Niamanesh, M. Jalili, R. “A Framework to Support Run-Time Assured Dynamic Reconfiguration for Pervasive Computing Environments”, Proceedings of the First International Symposium on Wireless Pervasive Computing (ISWPC-2006), pp. 273-277, Thailand, 2006.
  115. Hemmati, H., Aliakbarian , S., Niamanesh, M. Jalili, R. “Structural and Behavioral Run-Time Validation of Dynamic Reconfiguration in Pervasive Computing Environments”, Proceedings of the 4th Asian International Mobile Computing Conference AMOC, India, 2006
  116. Asadzadeh, K., Niamanesh, M. Jalili, R. “A Composition Function Model for Software Reconfiguration Propagation in a Network of Systems”, Proceedings of the 9th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI2005), Orlando, Florida, 2005.
  117. Niamanesh, M., Heidarian Dehkordi, F., Fekrazad Nobakht, N, Jalili, R., “On Validity Assurance of Dynamic Reconfiguration for Component-based Programs”, Proceedings of the IPM International Workshop on Foundations of Software Engineering (Theory And Practice) FSEN 2005, Tehran, Iran, 2005.
  118. Shahriari , H.R., Sadoddin, R. , Jalili, R., Zakeri, R. and Omidian, R. “Vulnerability Analysis through Vulnerability Take-Grant Model (VTG)”, Proceedings o f the 7th International Conference on Information and Communications Security (ICICS2005), China, 2005.
  119. Shahriari , H.R. and Jalili, R. "Modeling and Analyzing Network Vulnerabilities via a Logic-Based Approach”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran, 2005.
  120. Zakeri, R., Shahriari , H.R., Jalili, R. and Sadoddin, R. “Modeling TCP/IP Networks Topology for Network Vulnerability Analysis”, Proceedings of the 2nd International Symposium of Telecommunications (IST2005), Shiraz, Iran, 2005.
  121. Shahriari , H.R. GanjiSaffar, Y. and Jalili, R. "An Approach to Analyzing Network Vulnerabilities based on the Topology Relations”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 273-284, Isfahan, Iran, 2005.
  122. Shahriari , H.R. Sadoddin, R. and Jalili, R. “Network Vulnerability Analysis based on the Take-Grant Protection Model: A Proof of the Concept”, Proceedings of the 3rd Iranian Society of Cryptography Conference (ISCC2005), pp. 261-272, Isfahan, Iran, 2005.
  123. Shahriari , H.R. and Jalili, R. “Modeling of Network Security-Related Behaviors Using NVML”, Proceedings of the 8th IEEE International Multi-topic conference (INMIC 2004), Lahur, Pakistan, 2004.
  124. Shahriari , H.R. and Jalili, R. “Using CSP To Model And Analyze Transmission Control Protocol Vulnerabilities Within The Broadcast Network”, Proceedings of the International Networking and Communications Conference (INCC 2004), Lahur, Pakistan, 2004.
  125. Asadzadeh, K, Niamanesh, M. and Jalili, R. “A Combinational Function Based Model for Reconfiguration Propagation in Distributed Systems”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  126. Ranjbar, A., Hemmati, H., Niamanesh, M. and Jalili, R. “Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  127. Moghadam, M., Niamanesh, M. and Jalili, R. “Context Based Service Migration in Pervasive Computing”, Proceedings of the Second International Conference on Information and Knowledge Technology, Tehran, 2005.
  128. Jalili, R., Imani-Mehr, F. and Amini, M. “SPUNNID: A new Approach for Detection of DDoS Attacks Based on the Combination of Statistical Methods and Unsupervised Neural Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  129. Ranjbar, A., Jalili, R. and Niamanesh, M. “Using Metropolitan Pervasive Environments Information in Predicting Continuous Location-Based Queries”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  130. Samadi. M, Esmaeili, J. and Jalili, R. “A System for Identification and Misleading of Intruder in Computer Networks”, Proceedings of the 10th Annual Iranian Computer Society Conference, Tehran, 2005.
  131. Jalili, R. and Niamanesh, M. “Modelling of Communication Protocol Stacks with Reconfigurable Capability”, Sharif University of Technology Research Reports, Tehran, 2005.
  132. Jalili, R. and Amini, M. “Network Based Intrusion Detection Using Unsupervised Adaptive Resonance Theory (ART)”, Proceedings of the Fourth International ICSC Symposium On Engineering Of Intelligent Systems (EIS 2004), Portugal, 2004.
  133. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  134. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  135. Ezati, N. and Jalili, R. “Improving Performance of the Internet Connections Inspection Through In-Kernel Application Proxies”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  136. Khansari-Nia, O. and Jalili, R. “A New Approach for Role Delegation in Distributed Environments Based on Role-Based Access Control”, Proceedings of the 9th Annual Computer Society of Iran Conference (CSICC2004), Sharif University of Technology, Tehran, Iran, pp. , 2004.
  137. Khansari-Nia, O. and Jalili, R. “A Dynamic Access Control Model for Relational Database Systems”, Proceedings of the Second Iranian Cryptography Conference (ISCC2003), Sharif University of Technology, Tehran, Iran, pp. , 2003.
  138. Jalili, R. and Amini, M. “An Intrusion Detection System Based on the ART Neural Networks”, Proceedings of the Fifth Conference on Intelligent Systems (CIS 2003), Ferdowsi University of Mashhad, Mashhad, Iran, pp. , 2003.
  139. Niamanesh, M. and Jalili, R. “A Secure Architecture for Software Defined Radio”, Proceedings of the Second International Symposium on Telecommunication (IST2003), Isfahan, Iran, pp. , 2003.
  140. Jalili, R., Heydari, M.A. and Fooladgar, M. “Obstacles and Approaches to Improve The Cyberspace Security from The Operating System Point of View”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  141. Jalili, R., Hadavi, A. and Ale-Sheykh, R. “Review of the World Countries to the Open Source Phenomenon”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  142. Jalili, R., Ale-Sheykh, R. and Hadavi, A. “Operating System Security: Concepts, Current Research, and New Approaches”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  143. Ranjbar, A., Makarem, M.S., Jalili, R. And Bakht, M. “On Enhancing of Operating System Security Via Security Frameworks”, Proceedings of the Operating System and Security Conference, Sharif University of Technology, Tehran, Iran, 2003.
  144. Jalili, R., and Adelkhah, B, "Design and Implementation of A Specification-based Intrusion Detection System”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.576-591, 2003.
  145. Jalili, R., and Hosseyni, S. M. "SFRED: An Algorithm for Dynamic Queue Management in Firewall”, Proceedings of the 8th Annual Iranian Computer Society Conference (ICSC'2003), Ferdowsi University of Mashhad, Iran, pp.142-149, 2003.
  146. Jalili, R., and Rezvani, M, "Specification and Verification of Security Policies in Firewalls”, Lecture Notes in Computer Science # 2510, Springer, 2002, pp. 154-163. 2002.
  147. Jalili, R., and Rezvani, M, "Analysis and Verification of Security Policy in Firewalls” Proceedings of the 7th Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 339-345, 2002.
  148. Jalili, R., and Niamanesh, M. "Attack and Fault Tolerance Through Dependable Middleware” Proceedings of the Seventh Annual Iranian Computer Society Conference (ICSC'2002), Iran Telecommunication Center, pp. 365-372, 2002.
  149. Jalili, R., and Heydari, M. A. "Quality of Service in Virtual Private Networks” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp.221-235, 2002.
  150. Jalili, R. Samadi, M., and Shahriari, H. R. "FireHack: A Tool for Firewalls Security Evaluation” Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 73-82, 2002.
  151. Jalili, R. and Rezvani, M. "High Level Security Policy Specification in Firewalls”, Proceedings of the First Iranian Cryptography Conference, Imam Hossein University, Tehran, Iran, pp. 105-116, 2002.
  152. Jalili, R. and PourReza, H. et al "Hadid Firewall, toward an Integrated Secure Computer Networks”, Proceedings of the 1st Iranian Military Information Dissemination, Tehran, I271-286, 2001.
  153. Jalili, R. and YusefZadeh, H. "Statefulness and Address Translation in a Packet Filter”, Proceedings of the Sixth Annual Iranian Computer Society Conference (ICSC'2001), University of Isfahan, Isfahan, Iran, pp. 491-500, 2001.
  154. Jalili, R. and Feili, H. "An Evaluation of Concurrency Control Mechanisms in Database Systems", Proceedings of the Fifth Iranian Computer Society Conference (ICSC'2000), Shahid Beheshti University, Tehran, Iran, pp. 113-123, 2000.
  155. Jalili, R. and Pirayesh, A. R. "Persistance in the Sharif Operating System ", Proceedings of the Fourth Iranian Computer Society Conference (ICSC'98), Sharif University of Technology, Tehran, Iran, pp. 71-80, 1998.
  156. Jalili, R. and Sadri, B. and Lavassani, M. "NFS Version 3 Implementation and Optimization: Our Experience on Linux", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 119-125, 1997.
  157. Jalili, R. and Salek, A.."Protection in the Sharif Operating System", Proceedings of the Third Iranian Computer Society Conference (ICSC'97), Iran University of Science and Technology, Tehran, Iran, pp. 244-250(F),1997.
  158. Jalili, R. and Zare, R."POURIA: A Persistent Extension to C++", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 1-8,1996.
  159. Jalili, R. and Henskens, F. A."Stable-Copy Replication of Highly Available Stable Distributed Persistent Stores", Proceedings of the Second Iranian Computer Society Conference (ICSC'96), Amir Kabir University of Technology, Tehran, Iran, pp. 78-86,1996.
  160. Jalili, R. "Persistent Systems", OFOGH, The Journal of Computer Science and Engineering, Vol 1, No 1, pp. 10-23, 1994.
  161. Jalili, R. and Henskens, F. A."Management of Inter-Entity Dependencies using Directed Dependency Graphs", Proceedings of the First Iranian Computer Society Conference (ICSC'95), Sharif University of Technology, Tehran, Iran, pp. 210-218,1995.
  162. Heskens, F. A., Koch, D. M., Jalili, R., Rosenberg, J. "Hardware Support for Stability in a Persistent Architecture", Proceedings of the 6th International Workshop on Persistent Object Stores, Tarascon, France, Springer-Verlag, pp. 387-399, 1994.
  163. Jalili, R. and Henskens, F. A. "Reducing the Extent of Cascadable Operations in Stable Distributed Persistent Stores", Proceedings of the 18th Australian Computer Science Conference (ACSC'95), Adelaide, Australia, vol 1, pp. 227-236, 1995.
  164. Jalili, R. and Henskens, F. A. "Operating System Support for Object Dependencies in Persistent Object Stores", Proceedings of the Workshop on Object-Oriented Real-Time Dependable Systems (WORDS'94), Dana Point, California, IEEE Computer Society Press, pp. 21-29, 1994.
  165. Jalili, R, and Henskens, , F. A."Using Directed Graphs to Describe Entity Dependency in Stable Distributed Persistent Stores", Proceedings of the 28th Hawaii International Conference on System Sciences, IEEE Computer Society Press, Vol. 2, pp. 665-674, 1995.