[an error occurred while processing this directive]

Partha Pal: Selected Publications

Journals and Book Chapters

  • Mostafa H, Pal P, and Hurley P. Message Passing for Distributed QoS-Security Tradeoffs. The Computer Journal, British Computer Society 57(6), pp 840-855, June 2014.

  • Pal P, Schantz R, Paulos A, and Benyo B. Managed Execution Environment as a Moving-Target Defense Infrastructure. IEEE Security and Privacy, 12(2), pp 51-59, 2014.

  • Atighetchi M, Ishakian V, Loyall J, Pal P, Sinclair S, and Grant R. Metrinome - Continuous Monitoring and Security Validation of Distributed Systems. Journal of Cyber Security & Information Systems, Volume 2 Number 1, pp.20-26, March 2014

  • Atighetchi M, Benyo B, Gosain A, MacIntyre R, Pal P, Travers V, and Zinky J. Transparent Insertion of Custom Logic in HTTP(S) Streams Using PbProxy. IEEE Internet Computing, 15(3), May/June 2011.

  • Atighetchi M, Pal P, Adler A, Gronosky A, Yaman F, Webb J, Loyall J, Sinclair A, and Payne C. Crumple Zones: Absorbing Attack Effects Before They Become a Problem. CrossTalk, The Journal Of Defense Software Engineering, 24(2), Special Issue on Rugged Software, March/April 2011, Pages 4-11.

  • Baldine I, Jackson A, Jacob J, Leland W, Lowry J, Miliken W, Pal P, Ramanathan S, Rauschenbach K, Santivanez C, and Wood D. PHAROS: An architecture for next generation core optical networks.Next Generation Internel: Architecture and Protocols; Ramamurthy, Ruskus and Sivalingam Eds; Cambridge University Press, March 2011, pages 154-178.

  • Pal P and Atighetchi M. Supporting Safe Content Inspection of Web Traffic. CrossTalk, The Journal of Defense Software Engineering, 21(9), pages 19-23, September 2008.

  • Pal P, Rubel P, Atighetchi M, Webber F, Sanders W H, Seri M, Ramasamy H, Lyons J, Agbaria A, Courtney T, Cukier M, Gosset J, and Keidar I. An Architecture for Adaptive Intrusion-Tolerant Applications. Special Issue on Application Level Adaptation, Software: Practice and Experience, 2006.

  • Singh S, Agbaria A, Stevens F, Courtney T, Meyer J F, Sanders W H, and Pal P. Validation of a Survivable Publish-Subscribe System. International Scientific Journal of Computing, Volume 4, Issue 2, 2005.

  • Atighechi M, Pal P, Webber F, Schantz R, Jones C, Loyall J. Adaptive Cyberdefense for Survival and Intrusion Tolerance. IEEE Journal of Internet Computing, Volume 8, No. 6, 2004

  • Pal P, Webber F, Schantz R, Loyall J, Watro R, Sanders W et al. Survival by Defense-Enabling. OASIS Foundations of Intrusion Tolerant Systems. J Lala (Ed.). IEEE Computer Society Press. 2003 OASIS Book

  • Pal, PP, A Framework for Connection-Related Failure Management. In ACM Computing Surveys , Vol 32, Issue 1 es, June 2001.

  • Minsky, NH and Pal, P, Providing Multiple Views for Objects . In Software- Practice and Experience , Vol, 30, No. 7, June 2000.

  • Minsky, NH and Pal, P, Software Management Via Law-Governed Regularity . In The Encyclopedia of Electrical and Electronic Engineering , John Wiley, Vol 19, 1999.

  • Minsky, NH and Pal, P, "Law-Governed Regularities in Object-Systems, Part 2: The Eiffel Case," The Journal of Theory and Practice of Object Systems , Vol. 3, No. 2, 1997.
  • Refereed Conferences and Workshops

  • SASO 2015 (to be updated)

  • Khoury J, Lauer G, Pal P, Thapa B, Loyall J and Hoff N. Efficient Privacy-Preserving Publish Subscribe Middleware. 17th IEEE Symposium on Object/Component/Service-oriented Real-time Distributed Computing, Reno, Nevada, USA, June 10-12 2014

  • Pal P, Atighetchi M, Soule N, Ishakian V, Loyall J, Grant R and Sinclair A. Secure and QoS-Managed Information Exchange Between Enterprise and Constrained Environments. 17th IEEE Symposium on Object/Component/Service-oriented Real-time Distributed Computing, Reno, Nevada, USA, June 10-12 2014

  • Atighetchi M, Soule N, Pal P, Loyall J, Sinclair A, and Grant R. Safe Configuration of TLS Connections - Beyond Default Settings. 6th IEEE Symposium on Security Analytics and Automation (SafeConfig 2013), Washington DC, October 16, 2013.

  • Paulos A, Pal P, Schantz R, and Benyo B. Moving target defense (MTD) in an adaptive execution environment. In Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop (CSIIRW '13), Oak Ridge, TN, January 8-10, 2013.

  • Paulos A, Pal, Schantz R, Benyo B, Johnson D, Hibler M, and Eide E. Isolation of Malicious External Inputs in a Security Focused Adaptive Execution Environment. In Proceedings of the 8th International Conference on Availability, Reliability and Security (ARES), Regensburg, Germany, September 2-6, 2013.

  • Benyo B, Pal P, Schantz S, Paulos A, Musliner D, Marble T, Rye J, Boldt M, and Friedman S. Automated Self-Adaptation for Cyber-Defense - Pushing Adaptive Perimeter Protection Inward. 2nd annual SASO workshop on Adaptive Host and Network Security. 2013

  • Mostafa H, Pal P, Soule N, Hoff N, Hahn E, and Hurley P. Applying Distributed Optimization for QoS-SecurityTradeoff in a Distributed Information System. Short paper, in Proceedings of AAMAS 2013

  • Pal P, Schantz R, Paulos A, Benyo B, Johnson D, Hibler H, and Eide E. A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks. In Proceedings of the Adaptive Host and Network Security Workshop, held in conjunction with the IEEE International Conference on Self Adaptive and Self Organizing Systems, Lyon, France, September 12-14, 2012

  • Pal P, Lauer G, Khoury J, Hoff H, and Loyall J. P3S: A Peivacy Preserving Publish-Subscribe Middleware. In Proceedings of the ACM/IFIP/USENIX 13th International Conference on Middleware, Montreal, Canada, December 3-7, 2012

  • Pal P, Atighetchi M, Gronosky A, Loyall J, Payne C, Sinclair A, Froberg B, and Grant R. Using Cooperative Red Teaming for Evaluating Resiliency of Defense-Enabled SoA Systems. MILCOM 2012

  • Zhang J, Berthier R, Bailey M, Rhee W, Sanders W, Pal P, Jahanian F. Learning From Early Attempts To Measure Information Security Performance. 5th Workshop on Cyber Security Experimentation and Test (CSET), Bellevue, WA, USA, 2012 (To appear)

  • Atighetchi M, Pal P, Loyall J, and Sinclair A. Avoiding Common Security Flaws in Composed Service-Oriented Systems. 6th Workshop on Recent Advances in Intrusion Tolerance and reSilience, at at the 42nd IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Boston, MA, 2012.

  • Mostafa H, Pal P, and Hurley P. Message Passing for Distributed QoS-Security Tradeoffs. Fifth International Workshop on Optimisation in Multi-Agent System (OptMAS) at AAMAS 2012, Valencia, Spain, June 2012.

  • Zhang J, Berthier R, Rhee W, Bailey M, Pal P, Sanders W, and Jahanian F. Safeguarding Academic Accounts and Resources with the University Credential Abuse Auditing System. In Proceedings of IEEE/IFIP DSN 2012.

  • Fawaz A, Berthier R, Sanders W, and Pal Pal. Understanding the Role of Automated Response Actions to Improve AMI Resiliency. Cybersecurity in Cyber Physical Systems Workshop, NIST, 2012.

  • Pal P, Schantz R, Paulos A, Regehr J, and HiblerM. Advanced Adaptive Application (A3) Environment: initial experience. In Proceedings of the Middleware 2011 Industry Track Workshop (Middleware), Lisboa, Portugal, 2011.

  • Hurley P, Pal P, Tan Creti M, Fedyk A. Continuous Mission-Oriented Assessment (CMA) of Assurance. Fifth Workshop on Recent Advances in Intrusion Tolerant Systems at the 41st IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Hong Kong, June 27, 2011.

  • Loyall J, Rohloff K, Pal P, Atighetchi M. A Survey of Security Concepts for Common Operating Environments. 2nd IEEE International Workshop on Object/component/service-oriented Real-time Networked Ultra-dependable Systems March 28-31, Newport Beach, CA, USA, 2011.

  • Atighetchi M, Pal P, Schantz R. Position Paper on Biologically Inspired Cyber Defense and Cloud Computing Techniques . Workhop on Safe in the Clouds: Biologically Inspired Approaches To Security & Resilience. March 28-30, Ocala, FL, 2010.

  • Pal P, Schantz R, Loyall J. Middleware for Runtime Assessment of Information Assurance. The ACM/IFIP/USENIX 11th International Middleware Conference,(Middleware) Industry Track, Bangalore, India, 2010.

  • Fedyk A, Atighetchi M, Pal P. Leveraging ESM Platforms for Continuous Mission-Oriented Assessment of Information Assurance. The 6th International Conference on Network and Services Management (CNSM, Niagra Falls, Canada, 2010.

  • Atighetchi M, Webb J, Pal P, Loyall J, Bestavros A, and Mayhew M. Dynamic Cross Domain Information Sharing - A Concept Paper on Flexible Adaptive Policy Management. The 2nd ACM Workshop on Assurable & Usable Security Configuration (SafeConfig) at the 17th ACM Conference on Computer and Communications Security (CCS) 2010.

  • Pal P, Rohloff K, Atighetchi M, and Schantz R. Managed Mission Assurance: Concept, Methodology and Runtime Support, Workshop on Mission Assurance: Tools, Techniques and Methodologies at the 2nd IEEE International Conference on Privacy, Security, Risk and Trust, Minneapolis, MN USA, 2010.

  • Gronosky, A., Atighetchi, M. and Pal, P. Understanding the Vulnerabilities of a SOA Platform- A Case Study. The 9th IEEE International Symposium on Network Computing and Applications (IEEE NCA), Cambridge, MA USA, 2010.

  • Atighetchi, M., Gronosky, A., Pal, P., and Loyall, J. Usable Security. The 8th International Network Conference(INC), Workshop on "Security vs. Usability?" Heidelberg, Germany, 2010.

  • Pal, P. and Hurley, P. Assessing and Managing Quality of Information Assurance. NATO IST Symposium on Cyber Security and Information Assurancee, Antalya,Turkey (Held rescheduled in Estonia), 2010.

  • Pal, P., Schantz, R., Atighetchi, M., Rohloff, K., Dautenhahn, N. and Sanders, W. Fighting Through Cyber Attacks: An Informed Perspective Toward the Future. Proceedings of the Workshop on Survivability in Cyberspace, Stockholm, Sweden, 2010.

  • Pal, P., Atighetchi, A., Loyall, J., Payne, C. and Hillman, H. Advanced Protected Services - A Concept Paper on Survivable Service-Oriented Systems. 1st IEEE International Workshop on Object/component/service-oriented Real-time Networked Ultra-dependable Systems. Carmona, Spain, 2010.

  • Atighetchi, M., Pal, P., and Loyall, J. Research and Development in Assured Dynamic Cross Domain Information Sharing. Stevens System Engeneering Research Center (SERC) Security Workshop. Washington DC, 2010.

  • Rauschenbach, K., Hain, R., Jackson, A., Jacob, J., Leland, W., Lowry, J., Milliken, W., Pal, P., Santivanez, C., Baldine, I., Huang, S., and Wood, D. Dynamic Provisioning System for Bandwidth Scalable Core Optical Network. Proceedings of MILCOM, Boston, MA, 2009.

  • Schantz, R., Beal, J., Loyall, J., Pal, P., Rohloff, K., and Bestavros, A. Research Challenges in Information Systems for the Next Generation Electric Grid. National Workshop on New Research Directions for Future Cyber-Physical Energy Systems, Baltimore, MD, 2009.

  • Pal, P., Schantz, R., Atighetchi, M., Loyall, J. and Webber, F. What Next in Intrusion Tolerance. 3rd International Workshop on Recent Advances in Intrison Tolerance, at the IEEE/IFIP Dependable Systems and Networks Conference, Estoril, Portugal, 2009.

  • Atighetchi, Michael. and Pal, P. From Auto-adaptive to Survivable and Self-Regenerative Systems – Successes, Challenges, and Future. 1st Workshop on Biologically Inspired and Cognitive Approaches to Mission Survivability (BioCoMS), 8th IEEE International Symposium on Network Computing and Applications (IEEE NCA),Cambridge, MA 2009.

  • Atighetchi, M. and Pal, P. Attribute-based Prevention of Phishing Attacks. 8th IEEE International Symposium on Network Computing and Applications (IEEE NCA),Cambridge, MA, 2009.

  • Loyall, J., Pal, P., Rohloff, K. and Gillen, M. Research Directions in Context-Aware Quality of Service and Security for Wireless, Mobile Networked Systems. Workshop on Research Directions in Situational-aware Self-managed Proactive Computing in Wireless Ad hoc Networks, St. Louis, MO, 2009.

  • Pal, P. and Atighetchi, M. (2009, March 8-9). The PhisBouncer Experience (Extended Abstract). DHS Symposium on Cybersecurity Applications and Technology for Homeland Security, Washington DC, 2009.

  • Rohloff, K., Schantz, R., Pal, P. and Loyall, J. Cyber-physical Systems Security - Challenges and Research Ideas. DHS Workshop on Future Directions of Cyber Phyiscal Systems Security, Newark, NJ, 2009.

  • Rubel, P., Pal, P., Atighetchi, M., Benjamin, P., and Webber, F.Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response (Extended Abstract). The 11th International Symposium on Recent Advances In Intrusion Detection (RAID) Boston, MA, 2008.

  • Benjamin, P., Pal, P., Webber, F., Rubel, P., and Atighetchi, M. Using a Cognitive Architecture to Automate Cyberdefense Reasoning. Proceedings of the 2008 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS), IEEE Computer Society, Edinburgh, Scotland, 2008.

  • Webber, F., Pal, P., Rubel, P. and Atighetchi, M. An Abstract Interface for Cyber-Defense Mechanisms. Cyber Security and Information Intelligence Research Workshop, Oak Ridge national Laboratory, Nashville, TN, 2008.

  • Pal, P., Webber, F., Rubel, P., Atighetchi, M., and Benjamin, P. Automating Cyber Defense Management . The 2nd International Workshop on Recent Advances in Intrusion Tolerant Systems, Glasgow, UK, 2008.

  • Rubel, P., Atighetchi, M., Pal, P., Fong, M., and O'Brien, R. Effective Monitoring of a Survivable Distributed Networked Information System. The 2nd International Workshop on Advances in Information Security, Barcelona, Spain, 2008.

  • Rohloff, K., Loyall, J., Pal, P., and Schantz, R. High-Assurance Distributed, Adaptive Software for Dynamic Systems, IEEE High Assurance Systems Engineering Symposium (HASE 2007), Dallas, Texas, 2007.

  • Rohloff, K., Schantz, R., Pal, P. and Loyall, J. Software Certification for Distributed, Adaptable Medical Systems: Position Paper on Challenges and Paths Forward. Joint Workshop On High Confidence Medical Devices, Software, and Systems (HCMDSS) and Medical Device Plug-and-Play (MD PnP) Interoperability, Boston, MA, 2007.

  • Pal, P., Webber, F., and Schantz, R. The DPASA Survivable JBI - A High-Water Mark in Intrusion Tolerant Systems. 1st Workshop on Recent Advances in Intrusion Tolerant Systems, EuroSys, Lisboa, Portugal, 2007.

  • Pal, P., Webber, F., and Schantz, R. Cognitive Enhancements to Support Dependability. 3rd Workshop on Hot Topics in Dependability (HotDep’ 07), International Conference on Dependable Systems and Networks (DSN), Edinburgh, UK, 2007.

  • Pal, P., Schantz, R., and Webber, F. Survivability Metrics -- A View from the Trenches. Workshop on Assurance Cases for Security- The Metrics Challange, International Conference on Dependable Systems and Networks (DSN), Edinburgh, UK, 2007.

  • Pal P, Webber F, Atighetchi M, and Combs, N. Trust Assessment from Observed Behavior: Toward an EssentialService for Trusted Network Computing. 5th IEEE Network Computing and Application; Trusted Network Computing Workshop, Cambridge, MA. 2006

  • Pal P, Loyall J, Webber F, and Schantz R. Making Real-time Systems Survive Malicious Attacks. IEEE Real-Time and Embedded Technology and Application Symposium, Workshop on Research Directions for Security and Networking in Critical Real-Time and Embedded Systems, San Jose, CA.2006.

  • Atighetchi M, Rubel P, Pal P, Chong J, and Sudin L. Networking Aspects in the DPASA Survivability Architecture: An Experience Report . Network Computing and Applications. Cambridge, MA,2005.

  • Pal P, and Webber F. Survivability Management. Short paper, Distributed Object Applications, Agia Napa. 2005.

  • Chong J, Pal P, Atighetchi M, Rubel P and Webber F. Survivability Architecture of a Mission Critical System: The DPASA Example. 21st Annual Computer Security Applications Conference December 5-9, 2005 Tucson, Arizona

  • Pal P, Schantz R, and Loyall J. Timeliness in Auto-Adaptive Distributed Systems. 4th International Workshop on Distributed Auto-adaptive and Reconfigurable Systems (DARES'04), in conjunction with the 23rd International Conference on Distributed Computing Systems. Tokyo. March 2004

  • Stevens F, Courtney T, Singh S, Agbaria A, Meyer J, Sanders W, and Pal P. Model-based Validation of an Intrusion-Tolerant Information System. 23rd IEEE Internation Symposium on Reliable Distributed System (SRDS'04). Florianpolis, Brazil. October 2004.

  • Rubel P, Loyall J, Atighetchi M, Pal P, and Schantz R. Rapid and Coordinated Responses: Patterns for Real-Time QoS Adaptation. The 10th Conference on Pattern Languages of Programs, Patterns and Pattern Languages for Distributed Real-Time and Embedded Systems, Monticello, Illinois. September 8-12, 2003.

  • Schantz R, Webber F, Pal P, Loyall J, and Schmidt D C. Protecting Applications Against Malice Using Adaptive Middleware. In Nardelli, E., Posadziejewski, S., & Talamo M. (Eds.), Certification and Security in E-Services, IFIP 17th World Computer Congress, August 26-29, 2002, Montreal, Canada, Kluwer Academic Publishers, 2003, pp. 73-108.

  • Atighetchi M,Pal P, Webber F, Schantz R, and Jones C. Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. The 6th IEEE International Symposium on Object-oriented Real-time Distributed Computing, Hakodate, Hokkaido, Japan. May 14-16, 2003.

  • Atighetchi M, Pal P, Jones C, Rubel P, Schantz R, Loyall J, and Zinky J. Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. The 3rd International Workshop on Distributed Auto-adaptive and Reconfigurable Systems, in conjunction with the 23rd International Conference on Distributed Computing Systems, Providence, R.I. May 19-22, 2003.

  • Pal P, Atighetchi M, Webber F, Schantz R, and Jones C. Reflections On Evaluating Survivability: The APOD Experiments. The 2nd IEEE International Symposium on Network Computing and Applications, Royal Sonesta Hotel, Cambridge, MA. April 16-18, 2003.

  • Webber F, Pal P, Jones C, Atighetchi M, and Rubel P. Middleware Policies for Intrusion Tolerance-A Position Statement for WDMS '02. Workshop on Dependable Middleware-Based Systems, in conjunction with DSN 2002: Dependable Systems and Networks Conference, Bethesda, MD. June, 2002.

  • Cukier M, Courtney T, Lyons J, Ramasamy H, Sanders W, Atighetchi M, Rubel P, Jones C, Webber F, Pal P, Watro R, and Gosset J.Providing Intrusion Tolerance With ITUA. Supplement of the 2002 International Conference on Dependable Systems and Networks. Bethesda, MD. June, 2002.

  • Sanders W, Cukier M, Webber F, Pal P, and Watro R. Probabilistic Validation of Intrusion Tolerance. Digest of Fast Abstracts. The International Conference on Dependable Systems and Networks. Bethesda, MD. June, 2002.

  • Schantz R, Loyall J, Atighetchi M, and Pal P. Packaging Quality of Service Control Behaviors for Reuse. ISORC 2002: The 5th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing, Washington, DC. April 29 - May 1, 2002.

  • Jones C, Pal P, and Webber F. Defense Enabling Using QuO: Experience in Building Survivable CORBA Applications. DOCSEC: OMG Workshop on Distributed Objects and Components Security, Baltimore, MD. March 18-21, 2002.

  • Rubel P, Pal P, Webber F, Atighetchi M, and Jones C. Impediments to Building Survivable Systems: An Experience Report. The IEEE Information Security Workshop 2001/2002.

  • Rubel P, and Pal P. Assessing Adaptation in the Context of Security and Survivability. Position paper in ISSRR: Workshop on Information-Security-System Rating and Ranking, Williamsburg, VA. May, 2001.

  • Loyall J, Schantz R, Pal P, Zinky J, and Atighetchi M. Emerging Patterns in Adaptive, Distributed Real-Time, Embedded Middleware. OOPSLA 2001 Workshop: Towards Patterns and Pattern Languages for OO Distributed Real-time and Embedded Systems, Tampa Bay, FL. October 14, 2001.

  • Pal P, Webber F, Schantz RE, Atighetchi M, Loyall JP. Defense-Enabling Using Advanced Middleware - An Example. Proceedings Milcom 2001, October 28-31, 2001, Tysons Corner, Virginia.

  • Pal P, Webber F, Schantz RE, Loyall JP, Watro R, Sanders W, Cukier M and Gossett J. Survival by Defense-Enabling. Proceedings of the New Security Paradigms Workshop (NSPW 2001), Cloudcroft, NM, September 2001.

  • Cukier M, Lyons J, Pandey P, Ramasamy HV, Sanders WH, Pal P, Webber F, Schantz R, Loyall J, Watro R, Atighetchi M, Gossett J. Intrusion Tolerance Approaches in ITUA. FastAbstract in Supplement of the 2001 International Conference on Dependable Systems and Networks, July 1-4, 2001, Göteborg, Sweden, pp. B-64 to B-65.

  • Loyall JL, Gossett JM, Gill CD, Schantz RE, Zinky JA, Pal P, Shapiro R, Rodrigues C, Atighetchi M, Karr D. Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. Proceedings of the 21st IEEE International Conference on Distributed Computing Systems (ICDCS-21), April 16-19, 2001, Phoenix, Arizona.

  • Webber F, Pal P, Schantz R, Loyall J. Defense-Enabled Applications. Proceedings of the second DARPA Information Survivability Conference and Exposition (DISCEX II), June 12-14, 2001, Anaheim, California.

  • Pal P, Webber F, Schantz RE, and Loyall JP. Intrusion Tolerant Systems. Proceedings of the IEEE Information Survivability Workshop (ISW-2000), 24-26 October 2000, Boston, Massachusetts.

  • Pal PP, Loyall JP, Schantz RE, Zinky JA, Shapiro R, Megquier J. Using QDL to Specify QoS Aware Distributed (QuO) Application Configuration. Proceedings of ISORC 2000, The Third IEEE International Symposium on Object-Oriented Real-time Distributed Computing, March 15-17, 2000, Newport Beach, CA.

  • Pal PP, Loyall JP, Schantz RE, Zinky JA, Webber F. Open Implementation Toolkit for Building Survivable Applications. Proceedings of DISCEX 2000, the DARPA Information Survivability Conference and Exposition, January 25-27, 2000, Hilton Head Island, SC.

  • Loyall JP, Pal PP, Schantz RE, Webber F. Building Adaptive and Agile Applications Using Intrusion Detection and Response. Proceedings of NDSS 2000, the Network and Distributed System Security Symposium, February 2-4 2000, San Diego, CA.

  • Pal PP and James Megquier. XML and Quality Objects. WET ICE 1999, Workshop on Integrating XML and Distributed Object Technologies. June 16-18, Stanford University, California.

  • Minsky, NH and Pal PP, Multiple Views for Objects by Means of Surrogates (Early version of the above journal paper). In Joint Proceedings of ISAW-2 and Viewpoints'96 Workshops, October, 1996.

  • Minsky, NH and Pal PP, Multiple Views for Objects as a Means for Adaptation . Position paper in ECOOP Workshop on Adaptibility in OO Software Development, July, 1996.

  • Pal, PP and Minsky, NH, Imposing the Law of Demeter and its Variations . TOOLS USA Conference, 1996.

  • Pal, PP, "Law-Governed Support for Realizing Design Patterns," TOOLS USA Conference, 1995.

  • Others

  • Pal, PP, "A Flexible Applet-like Software Distribution Mechanism for Java Applications," ACM Software Engineering Notes, Vol. 23, No. 4, 1998, ACM.

  • Pal, PP, "Bridging the OOD/OOP Gap Using Software Engineering Constraints," Eiffel Outlook, Vol. 4, No. 5, May 1995.

  • Pal, PP, "Imposing Project-Specific Software Engineering Constraints on Eiffel," Eiffel Outlook, Vol. 3, No. 5, May 1994.
  • [an error occurred while processing this directive]