Professional‎ > ‎

Publications


Refereed Journal Articles

  1. Pierre St. Juste, David Wolinsky, P. Oscar Boykin, Michael J. Covington, and Renato Figueiredo. SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks. Computer Networks, 2010. Special Issue on Collaborative P2P Technology.
  2. Meiyuan Zhao, Hong Li, Rita Wouhaybi, Jesse Walker, Vic Lortz, and Michael J. Covington. Decentralized trust management for securing community networks. Intel Technology Journal, 13(2):148-169, 2009. Invited Article.
  3. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, and Ravi Sandhu. Toward a usage-based security frame-work for collaborative computing systems. ACM Transactions on Information and System Security, 11(1):1-36, 2008.
  4. Ravi Sandhu, Xinwen Zhang, Kumar Ranganathan, and Michael J. Covington. Client-side security enforcement using trusted computing and PEI models. Journal of High Speed Networks (JHSN), 2006. Special issue on Managing Security Policies: Modeling, Verification and Configuration.

Symposium, Conference, and Workshop Publications

  1. Matthew Weber, Ling Liu, Michael Covington, Lama Nachman, Peter Pesti, and Kipp Jones. On map matching of wireless positioning data: A selective look-ahead approach. In Proceedings of the 18th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS). ACM, November 2010.
  2. Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, and Xinwen Zhang. Patient-centric authorization framework for sharing electronic health records. In Proceedings of the 14th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 125-134, New York, New York, USA, June 2009. ACM.
  3. Hyung Chan Kim, Angelos D. Keromytis, Michael J. Covington, and Ravi Sahita. Capturing information flow with concatenated dynamic taint analysis. In Proceedings of the 4th International Conference on Availability, Reliability and Security (ARES), pages 355-362. IEEE, March 2009.
  4. Pierre St. Juste, David Wolinsky, Jiangyan Xu, Michael J. Covington, and Renato Figueiredo. On the use of social networking groups for automatic configuration of virtual grid environments. In Grid Computing Environments(GCE) Workshop, with Super Computing 2008, pages 1-10. IEEE, November 2008.
  5. Jing Jin, Gail-Joon Ahn, Michael J. Covington, and Xinwen Zhang. Access control model for sharing composite electronic health records. In Proceedings of the 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 340-354. Springer Lecture Notes in Computer Science, November 2008.
  6. Xinwen Zhang, Michael J. Covington, Songqing Chen, and Ravi Sandhu. SecureBus: towards application-transparent trusted computing with mandatory access control. In Proceedings of the 2nd ACM symposium on Information, computer and communications security (ASIACCS), pages 117-126, New York, NY, USA, March 2007. ACM.
  7. Michael J. Covington and Manoj R. Sastry. A contextual attribute-based access control model. In Proceedings of the 2nd International Workshop on Context-Aware Mobile Systems (CAMS), Montpellier, France, October 2006. In conjunction with OnTheMove Federated Conferences (OTM'06).
  8. Manoj R. Sastry, Michael J. Covington, and Deepak J. Manohar. Securing collaborative applications. In Proceedings of the 2006 International Conference on Security and Management (SAM), Las Vegas, Nevada, USA, June 2006.
  9. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, and Ravi Sandhu. A usage-based authorization frame-work for collaborative computing systems. In Proceedings of the eleventh ACM symposium on Access control models and technologies (SACMAT), pages 180-189, New York, NY, USA, June 2006. ACM.
  10. Michael J. Covington, Manoj R. Sastry, and Deepak J. Manohar. Attribute-based authentication model for dynamic mobile environments. In Proceedings of the 3rd International Conference on Security in Pervasive Computing (SPC), York, UK, April 2006. Springer Lecture Notes in Computer Science. Received Best Paper Award.
  11. Manoj R. Sastry and Michael J. Covington. Attribute-based authentication using trusted platforms. In Proceedings of the 8th International Symposium on Wireless Personal Multimedia Communications (WPMC), Aalborg, Denmark, September 2005. Special Session on Platform Security.
  12. Michael J. Covington, Mustaque Ahamad, Irfan Essa, and H. Venkateswaran. Parameterized authentication. In Proceedings of the European Symposium On Research In Computer Security (ESORICS), September 2004.
  13. Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, and Mustaque Ahamad. A context-aware security architecture for emerging applications [Full Text]. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), Las Vegas, Nevada, USA, December 2002.
  14. Michael J. Covington, Mustaque Ahamad, and H. Venkateswaran. 5-minute talk and poster presentation: Providing adaptive security through parameterized authentication. In Proceedings of the 23rd IEEE Symposium on Security and Privacy (SSP), Oakland, California, USA, May 2002.
  15. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind Dey, Mustaque Ahamad, and Gregory Abowd. Securing context-aware applications using environment roles. In Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 10-20, Chantilly, Virginia, USA, May 2001.
  16. Michael J. Covington, Matthew J. Moyer, and Mustaque Ahamad. Generalized role-based access control for securing future applications. In Proceedings of the 23rd National Information Systems Security Conference (NISSC), pages 40-51, Baltimore, Maryland, USA, October 2000.

Book Chapters

  1. Eladio Martin, Ling Liu, Michael Covington, Peter Pesti, and Matt Weber. Chapter 1: Positioning technology in location-based services. In Syed A. Ahson and Mohammad Ilyas, editors, Location Based Services Handbook: Applications, Technologies, and Security. CRC Press, July 2010.

Other Reviewed Publications

  1. Michael J. Covington, Manoj R. Sastry, Jeff Einarson, and Kerry Johns-Vano. Secure mobile systems research. Intel Corporation Research and Development White Paper, March 2006.
  2. Michael J. Covington. A Flexible Security Architecture for Pervasive Computing Environments. PhD thesis, College of Computing, Georgia Institute of Technology, April 2004.
  3. Michael J. Covington. An extended Internet architecture with reliable service guarantees. Undergraduate Honors Thesis, Mount Saint Mary's College, May 1997.