default search action
Sushil Jajodia
Person information
- affiliation: George Mason University, Fairfax, Virginia, USA
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j218]Jalal Ghadermazi, Ankit Shah, Sushil Jajodia:
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center. DTRAP 5(2): 19:1-19:23 (2024) - [j217]Youzhi Zhang, Dongkai Chen, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian, Yanhai Xiong:
GAIT: A Game-Theoretic Defense Against Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 21(4): 1967-1980 (2024) - [j216]Chongyang Gao, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
${\sf FakeDB}$FakeDB: Generating Fake Synthetic Databases. IEEE Trans. Dependable Secur. Comput. 21(6): 5553-5564 (2024) - [j215]Alberto Maria Mongardini, Massimo La Morgia, Sushil Jajodia, Luigi Vincenzo Mancini, Alessandro Mei:
DARD: Deceptive Approaches for Robust Defense Against IP Theft. IEEE Trans. Inf. Forensics Secur. 19: 5591-5606 (2024) - [j214]Janet Layne, Qudrat E. Alahy Ratul, Edoardo Serra, Sushil Jajodia:
Analyzing Robustness of Automatic Scientific Claim Verification Tools against Adversarial Rephrasing Attacks. ACM Trans. Intell. Syst. Technol. 15(5): 93:1-93:32 (2024) - [j213]Natalia Denisenko, Youzhi Zhang, Chiara Pulice, Shohini Bhattasali, Sushil Jajodia, Philip Resnik, V. S. Subrahmanian:
A Psycholinguistics-inspired Method to Counter IP Theft Using Fake Documents. ACM Trans. Manag. Inf. Syst. 15(2): 7 (2024) - [i9]Md Athikul Islam, Edoardo Serra, Sushil Jajodia:
GenFighter: A Generative and Evolutive Textual Attack Removal. CoRR abs/2404.11538 (2024) - 2023
- [j212]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed query execution under access restrictions. Comput. Secur. 127: 103056 (2023) - [j211]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, Roberto Sassi:
Sentinels and Twins: Effective Integrity Assessment for Distributed Computation. IEEE Trans. Parallel Distributed Syst. 34(1): 108-122 (2023) - [j210]Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. ACM Trans. Spatial Algorithms Syst. 9(3): 22:1-22:36 (2023) - [j209]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam, Steve E. Hutchinson:
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center. IEEE Trans. Serv. Comput. 16(4): 2359-2371 (2023) - [c321]Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li:
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics. SP 2023: 2409-2426 - 2022
- [j208]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Maintaining the level of operational effectiveness of a CSOC under adverse conditions. Int. J. Inf. Sec. 21(3): 637-651 (2022) - [j207]Yue Li, Zeyu Chen, Haining Wang, Kun Sun, Sushil Jajodia:
Understanding Account Recovery in the Wild and its Security Implications. IEEE Trans. Dependable Secur. Comput. 19(1): 620-634 (2022) - [j206]Yanhai Xiong, Giridhar Ramachandran, Rajesh Ganesan, Sushil Jajodia, V. S. Subrahmanian:
Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft. IEEE Trans. Dependable Secur. Comput. 19(3): 1434-1445 (2022) - [j205]Haipeng Chen, Andrew Duncklee, Sushil Jajodia, Rui Liu, Sean R. McNamara, V. S. Subrahmanian:
PCAM: A Data-driven Probabilistic Cyber-alert Management Framework. ACM Trans. Internet Techn. 22(3): 67:1-67:24 (2022) - [j204]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An authorization model for query execution in the cloud. VLDB J. 31(3): 555-579 (2022) - [c320]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CIKM 2022: 4064-4068 - [i8]Jihyeon Hyeong, Jayoung Kim, Noseong Park, Sushil Jajodia:
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models. CoRR abs/2208.08114 (2022) - 2021
- [j203]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. IEEE Intell. Syst. 36(5): 104-112 (2021) - [j202]Prakruthi Karuna, Hemant Purohit, Sushil Jajodia, Rajesh Ganesan, Özlem Uzuner:
Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility. IEEE Syst. J. 15(1): 835-845 (2021) - [j201]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks. IEEE Trans. Dependable Secur. Comput. 18(1): 310-324 (2021) - [j200]Tanmoy Chakraborty, Sushil Jajodia, Jonathan Katz, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
A Fake Online Repository Generation Engine for Cyber Deception. IEEE Trans. Dependable Secur. Comput. 18(2): 518-533 (2021) - [c319]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed Query Evaluation over Encrypted Data. DBSec 2021: 96-114 - [c318]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia:
PatchDB: A Large-Scale Security Patch Dataset. DSN 2021: 149-160 - [c317]Ouri Wolfson, Prabin Giri, Sushil Jajodia, Goce Trajcevski:
Geographic-Region Monitoring by Drones in Adversarial Environments. SIGSPATIAL/GIS 2021: 480-483 - [c316]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. MILCOM 2021: 595-600 - [c315]Jinsung Jeon, Jing Liu, Jayoung Kim, Jaehoon Lee, Noseong Park, Jamie Jooyeon Lee, Özlem Uzuner, Sushil Jajodia:
Scalable Graph Synthesis with Adj and 1 - Adj. SDM 2021: 307-315 - [i7]Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck:
PatchRNN: A Deep Learning-Based System for Security Patch Identification. CoRR abs/2108.03358 (2021) - 2020
- [j199]Haipeng Chen, Qian Han, Sushil Jajodia, Roy Lindelauf, V. S. Subrahmanian, Yanhai Xiong:
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare. IEEE Syst. J. 14(3): 3779-3790 (2020) - [j198]Yubao Zhang, Jidong Xiao, Shuai Hao, Haining Wang, Sencun Zhu, Sushil Jajodia:
Understanding the Manipulation on Recommender Systems through Web Injection. IEEE Trans. Inf. Forensics Secur. 15: 3807-3818 (2020) - [j197]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System. ACM Trans. Intell. Syst. Technol. 11(3): 32:1-32:20 (2020) - [j196]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Pierangela Samarati, Hasan Cam:
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning. IEEE Trans. Parallel Distributed Syst. 31(1): 16-33 (2020) - [j195]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center. ACM Trans. Web 14(1): 2:1-2:22 (2020) - [c314]Xinda Wang, Shu Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
A Machine Learning Approach to Classify Security Patches into Vulnerability Types. CNS 2020: 1-9 - [c313]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia:
Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV). DBSec 2020: 3-23 - [p32]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
An Empirical Study of Secret Security Patch in Open Source Software. Adaptive Autonomous Secure Cyber Systems 2020: 269-289 - [e52]Sushil Jajodia, George Cybenko, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Michael P. Wellman:
Adaptive Autonomous Secure Cyber Systems. Springer 2020, ISBN 978-3-030-33431-4 [contents] - [i6]Dorjan Hitaj, Briland Hitaj, Sushil Jajodia, Luigi V. Mancini:
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks. CoRR abs/2010.16204 (2020)
2010 – 2019
- 2019
- [j194]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Optimizing the network diversity to improve the resilience of networks against unknown attacks. Comput. Commun. 145: 96-112 (2019) - [j193]Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
A methodology for ensuring fair allocation of CSOC effort for alert investigation. Int. J. Inf. Sec. 18(2): 199-218 (2019) - [j192]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments. J. Comput. Secur. 27(4): 427-458 (2019) - [j191]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center. IEEE Syst. J. 13(1): 1060-1071 (2019) - [j190]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(5): 1155-1170 (2019) - [j189]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC. IEEE Trans. Inf. Forensics Secur. 14(7): 1857-1870 (2019) - [c312]Mengyuan Zhang, Yue Xin, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
CASFinder: Detecting Common Attack Surface. DBSec 2019: 338-358 - [c311]Xinda Wang, Kun Sun, Archer L. Batcheller, Sushil Jajodia:
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS. DSN 2019: 485-492 - [c310]Haipeng Chen, Sushil Jajodia, Jing Liu, Noseong Park, Vadim Sokolov, V. S. Subrahmanian:
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data. IJCAI 2019: 2074-2080 - [p31]Ping Chen, Zhisheng Hu, Jun Xu, Minghui Zhu, Rob Erbacher, Sushil Jajodia, Peng Liu:
MTD Techniques for Memory Protection Against Zero-Day Attacks. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 129-155 - [p30]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan, George Cybenko, Thanh Hong Nguyen:
Adaptive Cyber Defenses for Botnet Detection and Mitigation. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 156-205 - [p29]Rajesh Ganesan, Ankit Shah, Sushil Jajodia, Hasan Cam:
Optimizing Alert Data Management Processes at a Cyber Security Operations Center. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense 2019: 206-231 - [e51]Sushil Jajodia, George Cybenko, Peng Liu, Cliff Wang, Michael P. Wellman:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security. Lecture Notes in Computer Science 11830, Springer 2019, ISBN 978-3-030-30718-9 [contents] - 2018
- [j188]Prakruthi Karuna, Hemant Purohit, Rajesh Ganesan, Sushil Jajodia:
Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception. IEEE Intell. Syst. 33(5): 16-25 (2018) - [j187]Massimiliano Albanese, Sushil Jajodia, Sridhar Venkatesan:
Defending from Stealthy Botnets Using Moving Target Defenses. IEEE Secur. Priv. 16(1): 92-97 (2018) - [j186]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
A methodology to measure and monitor level of operational effectiveness of a CSOC. Int. J. Inf. Sec. 17(2): 121-134 (2018) - [j185]Tanmoy Chakraborty, Sushil Jajodia, Noseong Park, Andrea Pugliese, Edoardo Serra, V. S. Subrahmanian:
Hybrid adversarial defense: Merging honeypots and traditional security methods. J. Comput. Secur. 26(5): 615-645 (2018) - [j184]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Surviving unpatchable vulnerabilities through heterogeneous network hardening options. J. Comput. Secur. 26(6): 761-789 (2018) - [j183]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. Proc. VLDB Endow. 11(10): 1071-1083 (2018) - [j182]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors. Serv. Oriented Comput. Appl. 12(2): 123-135 (2018) - [j181]Ning Zhang, Ruide Zhang, Kun Sun, Wenjing Lou, Y. Thomas Hou, Sushil Jajodia:
Memory Forensic Challenges Under Misused Architectural Features. IEEE Trans. Inf. Forensics Secur. 13(9): 2345-2358 (2018) - [j180]Katheryn A. Farris, Ankit Shah, George Cybenko, Rajesh Ganesan, Sushil Jajodia:
VULCON: A System for Vulnerability Prioritization, Mitigation, and Management. ACM Trans. Priv. Secur. 21(4): 16:1-16:28 (2018) - [j179]Ankit Shah, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions. ACM Trans. Intell. Syst. Technol. 9(5): 51:1-51:20 (2018) - [j178]Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian:
SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine. ACM Trans. Internet Techn. 18(3): 30:1-30:41 (2018) - [c309]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds. DBSec 2018: 3-20 - [r3]Claudio Bettini, X. Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems (2nd ed.) 2018 - [i5]Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim:
Data Synthesis based on Generative Adversarial Networks. CoRR abs/1806.03384 (2018) - [i4]Ankit Shah, Arunesh Sinha, Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. CoRR abs/1810.05921 (2018) - 2017
- [b5]Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Network Security Metrics. Springer 2017, ISBN 978-3-319-66504-7, pp. 1-207 - [j177]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
An Authorization Model for Multi-Provider Queries. Proc. VLDB Endow. 11(3): 256-268 (2017) - [j176]Sushil Jajodia, Noseong Park, Fabio Pierazzi, Andrea Pugliese, Edoardo Serra, Gerardo I. Simari, V. S. Subrahmanian:
A Probabilistic Logic of Cyber Deception. IEEE Trans. Inf. Forensics Secur. 12(11): 2532-2544 (2017) - [j175]Rajesh Ganesan, Sushil Jajodia, Hasan Cam:
Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk. ACM Trans. Intell. Syst. Technol. 8(4): 52:1-52:32 (2017) - [c308]Sridhar Venkatesan, Massimiliano Albanese, Ankit Shah, Rajesh Ganesan, Sushil Jajodia:
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning. MTD@CCS 2017: 75-85 - [c307]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options. DBSec 2017: 509-528 - [p28]Massimiliano Albanese, Nancy J. Cooke, González Coty, David Hall, Christopher G. Healey, Sushil Jajodia, Peng Liu, Michael D. McNeese, Peng Ning, Douglas S. Reeves, V. S. Subrahmanian, Cliff Wang, John Yen:
Computer-Aided Human Centric Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 3-25 - [p27]Sushil Jajodia, Massimiliano Albanese:
An Integrated Framework for Cyber Situation Awareness. Theory and Models for Cyber Situation Awareness 2017: 29-46 - [e50]Peng Liu, Sushil Jajodia, Cliff Wang:
Theory and Models for Cyber Situation Awareness. Lecture Notes in Computer Science 10030, Springer 2017, ISBN 978-3-319-61151-8 [contents] - 2016
- [j174]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Efficient integrity checks for join queries in the cloud. J. Comput. Secur. 24(3): 347-378 (2016) - [j173]Meixing Le, Krishna Kant, Malek Athamnah, Sushil Jajodia:
Minimum cost rule enforcement for cooperative database access. J. Comput. Secur. 24(3): 379-403 (2016) - [j172]Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian:
Using temporal probabilistic logic for optimal monitoring of security events with limited resources. J. Comput. Secur. 24(6): 735-791 (2016) - [j171]Paolo Montuschi, Edward J. McCluskey, Samarjit Chakraborty, Jason Cong, Ramón M. Rodríguez-Dagnino, Fred Douglis, Lieven Eeckhout, Gernot Heiser, Sushil Jajodia, Ruby B. Lee, Dinesh Manocha, Tomás F. Pena, Isabelle Puaut, Hanan Samet, Donatella Sciuto:
State of the Journal. IEEE Trans. Computers 65(7): 2014-2018 (2016) - [j170]Xin Ruan, Zhenyu Wu, Haining Wang, Sushil Jajodia:
Profiling Online Social Behaviors for Compromised Account Detection. IEEE Trans. Inf. Forensics Secur. 11(1): 176-187 (2016) - [j169]Mengyuan Zhang, Lingyu Wang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks. IEEE Trans. Inf. Forensics Secur. 11(5): 1071-1086 (2016) - [j168]Rajesh Ganesan, Sushil Jajodia, Ankit Shah, Hasan Cam:
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning. ACM Trans. Intell. Syst. Technol. 8(1): 4:1-4:21 (2016) - [c306]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Trusted cloud SQL DBS with on-the-fly AES decryption/encryption. IEEE BigData 2016: 3666-3675 - [c305]Sridhar Venkatesan, Massimiliano Albanese, George Cybenko, Sushil Jajodia:
A Moving Target Defense Approach to Disrupting Stealthy Botnets. MTD@CCS 2016: 37-46 - [c304]Sridhar Venkatesan, Massimiliano Albanese, Kareem Amin, Sushil Jajodia, Mason Wright:
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures. CNS 2016: 198-206 - [c303]Daniel Borbor, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks. DBSec 2016: 295-312 - [c302]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement. DEXA Workshops 2016: 19-23 - [c301]Nawaf Alhebaishi, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Threat Modeling for Cloud Data Center Infrastructures. FPS 2016: 302-319 - [c300]Fabio De Gaspari, Sushil Jajodia, Luigi V. Mancini, Agostino Panico:
AHEAD: A New Architecture for Active Defense. SafeConfig@CCS 2016: 11-16 - [c299]Massimiliano Albanese, Sushil Jajodia, R. Jhawa, Vincenzo Piuri:
Dependable and Resilient Cloud Computing. SOSE 2016: 3 - [p26]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
Deceiving Attackers by Creating a Virtual Attack Surface. Cyber Deception 2016: 169-201 - [e49]Sushil Jajodia, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Deception, Building the Scientific Foundation. Springer 2016, ISBN 978-3-319-32697-9 [contents] - [e48]Sjouke Mauw, Barbara Kordy, Sushil Jajodia:
Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9390, Springer 2016, ISBN 978-3-319-29967-9 [contents] - 2015
- [j167]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Loose associations to increase utility in data publishing. J. Comput. Secur. 23(1): 59-88 (2015) - [j166]Edoardo Serra, Sushil Jajodia, Andrea Pugliese, Antonino Rullo, V. S. Subrahmanian:
Pareto-Optimal Adversarial Defense of Enterprise Systems. ACM Trans. Inf. Syst. Secur. 17(3): 11:1-11:39 (2015) - [c298]Ning Zhang, Kun Sun, Wenjing Lou, Yiwei Thomas Hou, Sushil Jajodia:
Now You See Me: Hide and Seek in Physical Address Space. AsiaCCS 2015: 321-331 - [c297]Sridhar Venkatesan, Massimiliano Albanese, Sushil Jajodia:
Disrupting stealthy botnets through strategic placement of detectors. CNS 2015: 95-103 - [c296]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia:
A deception based approach for defeating OS and service fingerprinting. CNS 2015: 317-325 - [c295]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Numerical SQL Value Expressions Over Encrypted Cloud Databases. DEXA (2) 2015: 455-478 - [c294]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Integrity for Approximate Joins on Untrusted Computational Servers. SEC 2015: 446-459 - [e47]Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3 [contents] - [e46]Raja Naeem Akram, Sushil Jajodia:
Information Security Theory and Practice - 9th IFIP WG 11.2 International Conference, WISTP 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings. Lecture Notes in Computer Science 9311, Springer 2015, ISBN 978-3-319-24017-6 [contents] - [e45]Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - [i3]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
On-the fly AES Decryption/Encryption for Cloud SQL Databases. CoRR abs/1512.06423 (2015) - 2014
- [b4]Lingyu Wang, Massimiliano Albanese, Sushil Jajodia:
Network Hardening - An Automated Approach to Improving Network Security. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-04611-2, pp. 1-60 - [j165]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Don J. Torrieri:
A probabilistic framework for jammer identification in MANETs. Ad Hoc Networks 14: 84-94 (2014) - [j164]Meixing Le, Krishna Kant, Sushil Jajodia:
Consistency and enforcement of access rules in cooperative data sharing environment. Comput. Secur. 41: 3-18 (2014) - [j163]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Pengsu Cheng, Steven Noel:
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities. IEEE Trans. Dependable Secur. Comput. 11(1): 30-44 (2014) - [j162]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Fragmentation in Presence of Data Dependencies. IEEE Trans. Dependable Secur. Comput. 11(6): 510-523 (2014) - [j161]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact. IEEE Trans. Inf. Forensics Secur. 9(4): 681-694 (2014) - [c293]Sushil Jajodia, Kun Sun:
MTD 2014: First ACM Workshop on Moving Target Defense. CCS 2014: 1550-1551 - [c292]Longquan Li, Sencun Zhu, Don J. Torrieri, Sushil Jajodia:
Self-healing wireless networks under insider jamming attacks. CNS 2014: 220-228 - [c291]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Integrity for distributed queries. CNS 2014: 364-372 - [c290]Massimiliano Albanese, Ermanno Battista, Sushil Jajodia, Valentina Casola:
Manipulating the attacker's view of a system's attack surface. CNS 2014: 472-480 - [c289]Steven Noel, Sushil Jajodia:
Metrics suite for network attack graph analytics. CISR 2014: 5-8 - [c288]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Optimizing Integrity Checks for Join Queries in the Cloud. DBSec 2014: 33-48 - [c287]Meixing Le, Krishna Kant, Sushil Jajodia:
Consistent Query Plan Generation in Secure Cooperative Data Access. DBSec 2014: 227-242 - [c286]He Sun, Kun Sun, Yuewu Wang, Jiwu Jing, Sushil Jajodia:
TrustDump: Reliable Memory Acquisition on Smartphones. ESORICS (1) 2014: 202-218 - [c285]Lingyu Wang, Mengyuan Zhang, Sushil Jajodia, Anoop Singhal, Massimiliano Albanese:
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks. ESORICS (2) 2014: 494-511 - [c284]Paulo Shakarian, Nimish Kulkarni, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. ICETE (Selected Papers) 2014: 191-211 - [c283]George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu:
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation. ICISS 2014: 1-8 - [c282]Kun Sun, Sushil Jajodia:
Protecting Enterprise Networks through Attack Surface Expansion. SafeConfig 2014: 29-32 - [c281]Paulo Shakarian, Damon Paulo, Massimiliano Albanese, Sushil Jajodia:
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions. SECRYPT 2014: 19-30 - [c280]Zhang Xu, Haining Wang, Sushil Jajodia:
Gemini: An Emergency Line of Defense against Phishing Attacks. SRDS 2014: 11-20 - [p25]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati:
Database Security and Privacy. Computing Handbook, 3rd ed. (2) 2014: 53: 1-21 - [p24]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Proof of Isolation for Cloud Storage. Secure Cloud Computing 2014: 95-121 - [p23]Meixing Le, Krishna Kant, Sushil Jajodia:
Enabling Collaborative Data Authorization Between Enterprise Clouds. Secure Cloud Computing 2014: 149-169 - [p22]Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri:
Securing Mission-Centric Operations in the Cloud. Secure Cloud Computing 2014: 239-259 - [p21]Massimiliano Albanese, Robert F. Erbacher, Sushil Jajodia, Cristian Molinaro, Fabio Persia, Antonio Picariello, Giancarlo Sperlì, V. S. Subrahmanian:
Recognizing Unexplained Behavior in Network Traffic. Network Science and Cybersecurity 2014: 39-62 - [p20]Massimiliano Albanese, Hasan Çam, Sushil Jajodia:
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance. Cybersecurity Systems for Human Cognition Augmentation 2014: 47-60 - [p19]Massimiliano Albanese, Sushil Jajodia:
Formation of Awareness. Cyber Defense and Situational Awareness 2014: 47-62 - [e44]Sushil Jajodia, Krishna Kant, Pierangela Samarati, Anoop Singhal, Vipin Swarup, Cliff Wang:
Secure Cloud Computing. Springer 2014, ISBN 978-1-4614-9277-1 [contents] - [e43]Sushil Jajodia, Kun Sun:
Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, Scottsdale, Arizona, USA, November 7, 2014. ACM 2014, ISBN 978-1-4503-3150-0 [contents] - [e42]Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans:
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings. IFIP Advances in Information and Communication Technology 428, Springer 2014, ISBN 978-3-642-55414-8 [contents] - 2013
- [j160]Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia:
Blog or block: Detecting blog bots through behavioral biometrics. Comput. Networks 57(3): 634-646 (2013) - [j159]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Enforcing dynamic write privileges in data outsourcing. Comput. Secur. 39: 47-63 (2013) - [j158]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia:
Quantitative survivability evaluation of three virtual machine-based server architectures. J. Netw. Comput. Appl. 36(2): 781-790 (2013) - [j157]Sushil Jajodia, Pierangela Samarati:
Guest Editorial. IEEE Syst. J. 7(2): 178 (2013) - [j156]Sushil Jajodia, Pierangela Samarati:
Guest Editorial. IEEE Syst. J. 7(3): 350 (2013) - [j155]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Integrity for Join Queries in the Cloud. IEEE Trans. Cloud Comput. 1(2): 187-200 (2013) - [j154]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Preserving privacy against external and internal threats in WSN data aggregation. Telecommun. Syst. 52(4): 2163-2176 (2013) - [j153]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Recoverable Encryption through a Noised Secret over a Large Cloud. Trans. Large Scale Data Knowl. Centered Syst. 9: 42-64 (2013) - [j152]Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou:
Providing Users' Anonymity in Mobile Hybrid Networks. ACM Trans. Internet Techn. 12(3): 7:1-7:33 (2013) - [c279]Zhan Wang, Kun Sun, Jiwu Jing, Sushil Jajodia:
Verification of data redundancy in cloud storage. SCC@ASIACCS 2013: 11-18 - [c278]Sushil Jajodia, Wenjing Lou, Wade Trappe:
Welcome message. CNS 2013: 1-2 - [c277]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Kun Sun:
A moving target defense mechanism for MANETs based on identity virtualization. CNS 2013: 278-286 - [c276]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Extending Loose Associations to Multiple Fragments. DBSec 2013: 1-16 - [c275]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
TerraCheck: Verification of Dedicated Cloud Storage. DBSec 2013: 113-127 - [c274]Meixing Le, Krishna Kant, Sushil Jajodia:
Rule Enforcement with Third Parties in Secure Cooperative Data Access. DBSec 2013: 282-288 - [c273]Massimiliano Albanese, Sushil Jajodia, Ravi Jhawar, Vincenzo Piuri:
Reliable mission deployment in vulnerable distributed systems. DSN Workshops 2013: 1-8 - [c272]Sabrina De Capitani di Vimercati, Robert F. Erbacher, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Pierangela Samarati:
Encryption and Fragmentation for Data Confidentiality in the Cloud. FOSAD 2013: 212-243 - [c271]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
On information leakage by indexes over data fragments. ICDE Workshops 2013: 94-98 - [c270]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities. ICETE (Selected Papers) 2013: 322-340 - [c269]Li Wang, Zhan Wang, Kun Sun, Sushil Jajodia:
Reducing Attack Surface with VM-Based Phantom Server. MILCOM 2013: 1429-1435 - [c268]Sushil Jajodia:
Security and Privacy of Data in a Cloud. Secure Data Management 2013: 18-22 - [c267]Massimiliano Albanese, Sushil Jajodia, Anoop Singhal, Lingyu Wang:
An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities. SECRYPT 2013: 207-218 - [c266]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds. SocialCom 2013: 700-707 - [c265]William Nzoukou, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
A Unified Framework for Measuring a Network's Mean Time-to-Compromise. SRDS 2013: 215-224 - [c264]Massimiliano Albanese, Sushil Jajodia, Cristian Molinaro:
A Logic Framework for Flexible and Security-Aware Service Composition. UIC/ATC 2013: 337-346 - [p18]Don J. Torrieri, Sencun Zhu, Sushil Jajodia:
Cyber Maneuver Against External Adversaries and Compromised Nodes. Moving Target Defense 2013: 87-96 - [e41]Jason Crampton, Sushil Jajodia, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9 [contents] - [e40]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents] - 2012
- [j151]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia:
Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Trans. Dependable Secur. Comput. 9(6): 811-824 (2012) - [j150]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure Data Aggregation in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 7(3): 1040-1052 (2012) - [j149]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati:
Integrating trust management and access control in data-intensive Web applications. ACM Trans. Web 6(2): 6:1-6:43 (2012) - [c263]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Securing password recovery through dispersion. CASoN 2012: 228-233 - [c262]Meixing Le, Krishna Kant, Sushil Jajodia:
Access rule consistency in cooperative data access environment. CollaborateCom 2012: 11-20 - [c261]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga:
Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. DBSec 2012: 314-329 - [c260]Massimiliano Albanese, Sushil Jajodia, Steven Noel:
Time-efficient and cost-effective network hardening using attack graphs. DSN 2012: 1-12 - [c259]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian:
A Probabilistic Framework for Localization of Attackers in MANETs. ESORICS 2012: 145-162 - [c258]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
Recoverable Encryption through Noised Secret over a Large Cloud. Globe 2012: 13-24 - [c257]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing:
Disk storage isolation and verification in cloud. GLOBECOM 2012: 771-776 - [c256]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson:
NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515 - [c255]Barry W. Peddycord III, Peng Ning, Sushil Jajodia:
On the Accurate Identification of Network Service Dependencies in Distributed Systems. LISA 2012: 181-194 - [c254]Meixing Le, Krishna Kant, Sushil Jajodia:
Rule Configuration Checking in Secure Cooperative Data Access. SafeConfig 2012: 135-149 - [c253]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Support for Write Privileges on Outsourced Data. SEC 2012: 199-210 - [c252]Sushil Jajodia:
A Mission-centric Framework for Cyber Situational Awareness. SECRYPT 2012 - [c251]Alessio Di Mauro, Alessandro Mei, Sushil Jajodia:
Secure File Allocation and Caching in Large-scale Distributed Systems. SECRYPT 2012: 182-191 - [c250]Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40 - [c249]Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia:
Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. STM 2012: 161-176 - 2011
- [j148]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou:
The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011) - [j147]Sushil Jajodia, Jianying Zhou:
Message from the Guest Editors. Int. J. Inf. Sec. 10(5): 267-268 (2011) - [j146]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Selective data outsourcing for enforcing privacy. J. Comput. Secur. 19(3): 531-566 (2011) - [j145]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Authorization enforcement in distributed query evaluation. J. Comput. Secur. 19(4): 751-794 (2011) - [j144]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. IEEE Trans. Dependable Secur. Comput. 8(3): 450-465 (2011) - [j143]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4): 541-566 (2011) - [c248]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Detection of Cyber Attacks. CISIM 2011: 9-18 - [c247]Meixing Le, Krishna Kant, Sushil Jajodia:
Cooperative Data Access in Multi-cloud Environments. DBSec 2011: 14-28 - [c246]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian:
Scalable Analysis of Attack Scenarios. ESORICS 2011: 416-433 - [c245]Kun Sun, Sushil Jajodia, Jason H. Li, Yi Cheng, Wei Tang, Anoop Singhal:
Automatic security analysis using security metrics. MILCOM 2011: 1207-1212 - [c244]Sushil Jajodia, Steven Noel, Pramod Kalapa, Massimiliano Albanese, John Williams:
Cauldron mission-centric cyber situational awareness with defense in depth. MILCOM 2011: 1339-1344 - [c243]Krishna Kant, Meixing Le, Sushil Jajodia:
Security Considerations in Data Center Configuration Management. SafeConfig 2011 - [c242]Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469 - [c241]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Private data indexes for selective access to outsourced data. WPES 2011: 69-80 - [c240]Witold Litwin, Sushil Jajodia, Thomas J. E. Schwarz:
Privacy of data outsourced to a cloud for selected readers through client-side encryption. WPES 2011: 171-176 - [e39]Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5 [contents] - [e38]Henk C. A. van Tilborg, Sushil Jajodia:
Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8 [contents] - [e37]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents] - 2010
- [j142]Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Access control for smarter healthcare using policy spaces. Comput. Secur. 29(8): 848-858 (2010) - [j141]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring Security Risk of Networks Using Attack Graphs. Int. J. Next Gener. Comput. 1(1) (2010) - [j140]Sushil Jajodia, Jonathan K. Millen:
Editorial. J. Comput. Secur. 18(2): 187 (2010) - [j139]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Fragments and Loose Associations: Respecting Privacy in Data Publishing. Proc. VLDB Endow. 3(1): 1370-1381 (2010) - [j138]Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang, Sushil Jajodia:
An Application-Level Data Transparent Authentication Scheme without Communication Overhead. IEEE Trans. Computers 59(7): 943-954 (2010) - [j137]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang:
Providing witness anonymity under peer-to-peer settings. IEEE Trans. Inf. Forensics Secur. 5(2): 324-336 (2010) - [j136]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3): 22:1-22:33 (2010) - [j135]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang:
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010) - [j134]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2): 12:1-12:46 (2010) - [c239]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini:
Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. CIT 2010: 910-915 - [c238]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz:
LH*RE: A Scalable Distributed Data Structure with Recoverable Encryption. IEEE CLOUD 2010: 354-361 - [c237]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia:
Who is tweeting on Twitter: human, bot, or cyborg? ACSAC 2010: 21-30 - [c236]Lei Zhang, Alexander Brodsky, Sushil Jajodia:
Restoring compromised privacy in micro-data disclosure. AsiaCCS 2010: 36-47 - [c235]Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou:
Providing Mobile Users' Anonymity in Hybrid Networks. ESORICS 2010: 540-557 - [c234]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel:
k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587 - [c233]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Encryption-Based Policy Enforcement for Cloud Storage. ICDCS Workshops 2010: 42-51 - [c232]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100 - [c231]Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia:
QoP and QoS Policy Cognizant Module Composition. POLICY 2010: 77-86 - [p17]Anoop Singhal, Sushil Jajodia:
Data Mining for Intrusion Detection. Data Mining and Knowledge Discovery Handbook 2010: 1171-1180 - [p16]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen:
Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13 - [p15]Sushil Jajodia, Steven Noel:
Topological Vulnerability Analysis. Cyber Situational Awareness 2010: 139-154 - [e36]Sara Foresti, Sushil Jajodia:
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6166, Springer 2010, ISBN 978-3-642-13738-9 [contents] - [e35]Sushil Jajodia, Jianying Zhou:
Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5 [contents] - [e34]Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents] - [i2]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
2000 – 2009
- 2009
- [j133]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Secure median computation in wireless sensor networks. Ad Hoc Networks 7(8): 1448-1462 (2009) - [j132]Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia:
Model-Driven Development for secure information systems. Inf. Softw. Technol. 51(5): 809-814 (2009) - [j131]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia:
Evaluating privacy threats in released database views by symmetric indistinguishability. J. Comput. Secur. 17(1): 5-42 (2009) - [j130]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini:
Privacy-preserving robust data aggregation in wireless sensor networks. Secur. Commun. Networks 2(2): 195-213 (2009) - [j129]Kui Ren, Wenjing Lou, Bo Zhu, Sushil Jajodia:
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE Trans. Veh. Technol. 58(4): 2018-2029 (2009) - [c230]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. DBSec 2009: 225-239 - [c229]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia:
Anonymity and Historical-Anonymity in Location-Based Services. Privacy in Location-Based Applications 2009: 1-30 - [c228]Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou:
Privacy Preservation over Untrusted Mobile Networks. Privacy in Location-Based Applications 2009: 84-105 - [c227]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Keep a Few: Outsourcing Data While Maintaining Confidentiality. ESORICS 2009: 440-455 - [c226]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. ICDCS 2009: 32-39 - [c225]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9 - [c224]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang, Sushil Jajodia:
Privacy-Aware Proximity Based Services. Mobile Data Management 2009: 31-40 - [c223]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia:
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. Mobile Data Management 2009: 172-181 - [c222]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky:
L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 - [c221]Daniele Riboni, Linda Pareschi, Claudio Bettini, Sushil Jajodia:
Preserving Anonymity of Recurrent Location-Based Queries. TIME 2009: 62-69 - [e33]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang:
Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]. Lecture Notes in Computer Science 5599, Springer 2009, ISBN 978-3-642-03510-4 [contents] - [r2]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Granularity. Encyclopedia of Database Systems 2009: 2968-2973 - 2008
- [j128]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Implementing interactive analysis of attack graphs using relational databases. J. Comput. Secur. 16(4): 419-437 (2008) - [j127]Steven Noel, Sushil Jajodia:
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. J. Netw. Syst. Manag. 16(3): 259-275 (2008) - [j126]Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia:
Achieving simultaneous distribution control and privacy protection for Internet media delivery. ACM Trans. Multim. Comput. Commun. Appl. 4(2): 9:1-9:23 (2008) - [j125]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distributed Syst. 19(6): 794-805 (2008) - [c220]Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia:
Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 - [c219]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring network security using dynamic bayesian network. QoP 2008: 23-30 - [c218]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Assessing query privileges via safe and efficient permission composition. CCS 2008: 311-322 - [c217]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky:
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 - [c216]Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati:
Regulating Exceptions in Healthcare Using Policy Spaces. DBSec 2008: 254-267 - [c215]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia:
An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 - [c214]Claudio A. Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin:
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008 - [c213]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008 - [c212]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Controlled Information Sharing in Collaborative Distributed Query Processing. ICDCS 2008: 303-310 - [c211]Lei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia:
A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. POLICY 2008: 181-188 - [c210]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 - [c209]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15 - [c208]Lei Zhang, Sushil Jajodia, Alexander Brodsky:
Simulatable Binding: Beyond Simulatable Auditing. Secure Data Management 2008: 16-31 - [c207]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia:
Securely computing an approximate median in wireless sensor networks. SecureComm 2008: 6 - [c206]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati:
Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84 - [p14]Lingyu Wang, Sushil Jajodia:
Security in Data Warehouses and OLAP Systems. Handbook of Database Security 2008: 191-212 - [p13]Peng Liu, Sushil Jajodia, Meng Yu:
Damage Quarantine and Recovery in Data Processing Systems. Handbook of Database Security 2008: 383-407 - [p12]Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia:
Data Security. Wiley Encyclopedia of Computer Science and Engineering 2008 - [e32]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang:
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008. CEUR Workshop Proceedings 397, CEUR-WS.org 2008 [contents] - [e31]Sushil Jajodia, Javier López:
Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. Lecture Notes in Computer Science 5283, Springer 2008, ISBN 978-3-540-88312-8 [contents] - [e30]Sushil Jajodia, Pierangela Samarati, Stelvio Cimato:
Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy. IFIP 278, Springer 2008, ISBN 978-0-387-09698-8 [contents] - [e29]Michael Gertz, Sushil Jajodia:
Handbook of Database Security - Applications and Trends. Springer 2008, ISBN 978-0-387-48532-4 [contents] - 2007
- [b3]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180 - [j124]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient security mechanisms for overlay multicast based content delivery. Comput. Commun. 30(4): 793-806 (2007) - [j123]Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Sushil Jajodia:
Access control policies and languages. Int. J. Comput. Sci. Eng. 3(2): 94-102 (2007) - [j122]Huiping Guo, Yingjiu Li, Sushil Jajodia:
Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007) - [j121]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera:
Parity-based inference control for multi-dimensional range sum queries. J. Comput. Secur. 15(4): 417-445 (2007) - [j120]Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann:
Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) - [j119]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. ACM Trans. Sens. Networks 3(3): 14 (2007) - [c205]Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy:
Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 - [c204]Sushil Jajodia:
Topological analysis of network attack vulnerability. AsiaCCS 2007: 2 - [c203]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Toward measuring network security using attack graphs. QoP 2007: 49-54 - [c202]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
A data outsourcing architecture combining cryptography and access control. CSAW 2007: 63-69 - [c201]Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Trust management services in relational databases. AsiaCCS 2007: 149-160 - [c200]Lei Zhang, Sushil Jajodia, Alexander Brodsky:
Information disclosure under realistic assumptions: privacy versus optimality. CCS 2007: 573-583 - [c199]Lingyu Wang, Anoop Singhal, Sushil Jajodia:
Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 - [c198]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Fragmentation and Encryption to Enforce Privacy in Data Storage. ESORICS 2007: 171-186 - [c197]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia:
Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76 - [c196]Claudio Bettini, Sushil Jajodia, Linda Pareschi:
Anonymity and Diversity in LBS: A Preliminary Investigation. PerCom Workshops 2007: 577-580 - [c195]Alexander Brodsky, Lei Zhang, Sushil Jajodia:
Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. Secure Data Management 2007: 81-95 - [c194]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. SEC 2007: 385-396 - [c193]Xinyuan Wang, Shiping Chen, Sushil Jajodia:
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. S&P 2007: 116-130 - [c192]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Over-encryption: Management of Access Control Evolution on Outsourced Data. VLDB 2007: 123-134 - [p11]Sushil Jajodia, Ting Yu:
Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 - [p10]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati:
Access Control Policies and Languages in Open Environments. Secure Data Management in Decentralized Systems 2007: 21-58 - [p9]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia:
Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 - [p8]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 - [e28]Ting Yu, Sushil Jajodia:
Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6 [contents] - 2006
- [j118]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) - [j117]Lingyu Wang, Anyi Liu, Sushil Jajodia:
Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Comput. Commun. 29(15): 2917-2933 (2006) - [j116]Lingyu Wang, Steven Noel, Sushil Jajodia:
Minimum-cost network hardening using attack graphs. Comput. Commun. 29(18): 3812-3824 (2006) - [j115]Anoop Singhal, Sushil Jajodia:
Data warehousing and data mining techniques for intrusion detection systems. Distributed Parallel Databases 20(2): 149-166 (2006) - [j114]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli:
Building trust in peer-to-peer systems: a review. Int. J. Secur. Networks 1(1/2): 103-112 (2006) - [j113]Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia:
Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) - [j112]Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia:
A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006) - [j111]Csilla Farkas, Alexander Brodsky, Sushil Jajodia:
Unauthorized inferences in semistructured databases. Inf. Sci. 176(22): 3269-3299 (2006) - [j110]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. J. Comput. Secur. 14(4): 301-325 (2006) - [j109]Shiping Chen, Xinyuan Wang, Sushil Jajodia:
On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Netw. 20(5): 32-37 (2006) - [j108]Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia:
SS7 over IP: signaling interworking vulnerabilities. IEEE Netw. 20(6): 32-41 (2006) - [j107]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. ACM Trans. Sens. Networks 2(4): 500-528 (2006) - [c191]Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia:
V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. ACSAC 2006: 43-56 - [c190]Bo Zhu, Sanjeev Setia, Sushil Jajodia:
Providing witness anonymity in peer-to-peer systems. CCS 2006: 6-16 - [c189]Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup:
A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38 - [c188]Nicola Zannone, Sushil Jajodia, Duminda Wijesekera:
Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 - [c187]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia:
Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 - [c186]Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:
VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 - [c185]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia:
Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 - [c184]Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia:
Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure. IWQoS 2006: 209-218 - [c183]Lei Zhang, Alexander Brodsky, Sushil Jajodia:
Toward Information Sharing: Benefit And Risk Access Control (BARAC). POLICY 2006: 45-53 - [c182]Sushil Jajodia:
Topological analysis of network attack vulnerability. PST 2006: 2 - [c181]Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia:
A robust watermarking system based on SVD compression. SAC 2006: 1341-1347 - [c180]David R. Keppler, Vipin Swarup, Sushil Jajodia:
Redirection policies for mission-based information sharing. SACMAT 2006: 210-218 - [c179]Sankardas Roy, Sanjeev Setia, Sushil Jajodia:
Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82 - [c178]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 - [c177]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng:
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. SECON 2006: 70-79 - [c176]Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia:
DaTA - Data-Transparent Authentication Without Communication Overhead. SecureComm 2006: 1-10 - [c175]Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey:
A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32 - [c174]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186 - [c173]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Selective Data Encryption in Outsourced Dynamic Environments. VODCA@FOSAD 2006: 127-142 - [e27]Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia:
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM 2006, ISBN 1-59593-272-0 [contents] - [i1]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
The Role of Quasi-identifiers in k-Anonymity Revisited. CoRR abs/cs/0611035 (2006) - 2005
- [j106]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Information Release Control: A Learning-Based Architecture. J. Data Semant. 2: 176-198 (2005) - [j105]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Secur. Comput. 2(1): 34-45 (2005) - [j104]Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1): 119-152 (2005) - [c172]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia:
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 - [c171]Steven Noel, Sushil Jajodia:
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. ACSAC 2005: 160-169 - [c170]Xinyuan Wang, Shiping Chen, Sushil Jajodia:
Tracking anonymous peer-to-peer VoIP calls on the internet. CCS 2005: 81-91 - [c169]Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia:
Policies, Models, and Languages for Access Control. DNIS 2005: 225-237 - [c168]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia:
Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 - [c167]Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 - [c166]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia:
MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 - [c165]Vipin Swarup, Sushil Jajodia, Joseph Pamula:
Rule-Based Topological Vulnerability Analysis. MMM-ACNS 2005: 23-37 - [c164]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia:
Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 - [c163]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Metadata Management in Outsourced Encrypted Databases. Secure Data Management 2005: 16-32 - [c162]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199 - [c161]Sankardas Roy, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia:
Securing MAODV: attacks and countermeasures. SECON 2005: 521-532 - [c160]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia:
Securing Topology Maintenance Protocols for Sensor Networks. SecureComm 2005: 101-112 - [c159]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Key management for multi-user encrypted databases. StorageSS 2005: 74-83 - [c158]Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia:
Multiple Coordinated Views for Network Attack Graphs. VizSEC 2005: 12 - [c157]Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia:
Checking for k-Anonymity Violation by Views. VLDB 2005: 910-921 - [c156]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera:
Maintaining privacy on derived objects. WPES 2005: 10-19 - [p7]Anoop Singhal, Sushil Jajodia:
Data Mining for Intrusion Detection. The Data Mining and Knowledge Discovery Handbook 2005: 1225-1237 - [e26]Sushil Jajodia, Duminda Wijesekera:
Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X [contents] - [e25]Sushil Jajodia, Chandan Mazumdar:
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3803, Springer 2005, ISBN 3-540-30706-0 [contents] - [e24]Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous:
Journal on Data Semantics II. Lecture Notes in Computer Science 3360, Springer 2005, ISBN 3-540-24208-2 [contents] - 2004
- [j103]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-based inference control in data cubes. J. Comput. Secur. 12(5): 655-692 (2004) - [j102]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Reasoning with advanced policy rules and its application to access control. Int. J. Digit. Libr. 4(3): 156-170 (2004) - [j101]Kenneth P. Smith, Sushil Jajodia, Vipin Swarup, Jeffrey Hoyt, Gail Hamilton, Donald B. Faatz, Todd Cornett:
Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility. NeuroImage 22(4): 1646-1656 (2004) - [c155]Steven Noel, Eric Robertson, Sushil Jajodia:
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. ACSAC 2004: 350-359 - [c154]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
A logic-based framework for attribute based access control. FMSE 2004: 45-55 - [c153]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94 - [c152]Yingjiu Li, Huiping Guo, Sushil Jajodia:
Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82 - [c151]Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 - [c150]Sushil Jajodia, Duminda Wijesekera:
A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 - [c149]Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia:
Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 - [c148]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia:
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 - [c147]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201 - [c146]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Securing OLAP Data Cubes Against Privacy Breaches. S&P 2004: 161- - [c145]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning:
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. S&P 2004: 259-271 - [c144]Chao Yao, William H. Winsborough, Sushil Jajodia:
A Hierarchical Release Control Policy Framework. IICIS 2004: 121-137 - [c143]Steven Noel, Sushil Jajodia:
Managing attack graph complexity through visual hierarchical aggregation. VizSEC 2004: 109-118 - [e23]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. IFIP 148, Kluwer 2004, ISBN 1-4020-8144-8 [contents] - [e22]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang:
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. IFIP 147, Kluwer / Springer 2004, ISBN 1-4020-8142-1 [contents] - [e21]Sushil Jajodia, Leon Strous:
Integrity and Internal Control in Information Systems VI - IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS) 13-14 November 2003, Lausanne, Switzerland. IFIP 140, Springer 2004, ISBN 978-1-4020-7900-9 [contents] - 2003
- [b2]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112 - [j100]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) - [j99]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) - [j98]Daniel Barbará, Rajni Goel, Sushil Jajodia:
A Checksum-based Corruption Detection Technique. J. Comput. Secur. 11(3): 315-330 (2003) - [j97]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Rule Management. J. Netw. Syst. Manag. 11(3): 351-372 (2003) - [j96]Duminda Wijesekera, Sushil Jajodia:
A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) - [j95]Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström:
Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) - [j94]Alessandro Mei, Luigi V. Mancini, Sushil Jajodia:
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distributed Syst. 14(9): 885-896 (2003) - [c142]Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs:
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ACSAC 2003: 86-95 - [c141]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP: efficient security mechanisms for large-scale distributed sensor networks. CCS 2003: 62-72 - [c140]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Balancing confidentiality and efficiency in untrusted relational DBMSs. CCS 2003: 93-102 - [c139]Kenneth P. Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffrey Hoyt:
Securely sharing neuroimagery. CIKM 2003: 375-377 - [c138]Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 - [c137]Yingjiu Li, Vipin Swarup, Sushil Jajodia:
Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 - [c136]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 - [c135]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- - [c134]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- - [c133]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia:
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 - [c132]Sencun Zhu, Sushil Jajodia:
Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10 - [c131]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 - [c130]Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto:
Bootstrapping a Data Mining Intrusion Detection System. SAC 2003: 421-425 - [c129]Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle:
A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276 - [c128]Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 - [c127]Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia:
Implementation of a Storage Mechanism for Untrusted DBMSs. IEEE Security in Storage Workshop 2003: 38-46 - [c126]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A Learning-based Approach to Information Release Control. IICIS 2003: 83-105 - [c125]Sushil Jajodia:
Recent Advances in Access Control Models. WAIM 2003: 1 - [e20]Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9 [contents] - [e19]Sushil Jajodia, Pierangela Samarati, Paul F. Syverson:
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003. ACM 2003, ISBN 1-58113-776-1 [contents] - [e18]Sushil Jajodia, Michiharu Kudo:
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003. ACM 2003, ISBN 1-58113-777-X [contents] - 2002
- [j93]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002) - [j92]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) - [j91]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Design and implementation of a decentralized prototype system for detecting distributed attacks. Comput. Commun. 25(15): 1374-1391 (2002) - [j90]Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad:
Consistent policy enforcement in distributed systems using mobile policies. Data Knowl. Eng. 43(3): 261-280 (2002) - [j89]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Reasoning in Workflow Systems. Distributed Parallel Databases 11(3): 269-306 (2002) - [j88]Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia:
Enhancing Profiles for Anomaly Detection Using Time Granularities. J. Comput. Secur. 10(1/2): 137-158 (2002) - [j87]Sanjeev Setia, Sencun Zhu, Sushil Jajodia:
A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Evaluation 49(1/4): 21-41 (2002) - [j86]Csilla Farkas, Sushil Jajodia:
The Inference Problem: A Survey. SIGKDD Explor. 4(2): 6-11 (2002) - [j85]Paul Ammann, Sushil Jajodia, Peng Liu:
Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) - [c124]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia:
Auditing Interval-Based Inference. CAiSE 2002: 553-567 - [c123]Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control the predicate case. CCS 2002: 171-180 - [c122]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Towards Secure XML Federations. DBSec 2002: 117-131 - [c121]Daniel Barbará, Rajni Goel, Sushil Jajodia:
Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189 - [c120]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia:
Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 - [c119]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia:
A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 - [c118]Yingjiu Li, Lingyu Wang, Sushil Jajodia:
Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 - [c117]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Obligation Monitoring in Policy Management. POLICY 2002: 2-12 - [c116]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 - [c115]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia:
Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 - [c114]Kenneth P. Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia:
Propagating Modifications to Mobile Policies. SEC 2002: 573-584 - [c113]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera:
Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 - [p6]Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu:
An Architecture for Anomaly Detection. Applications of Data Mining in Computer Security 2002: 63-76 - [e17]Daniel Barbará, Sushil Jajodia:
Applications of Data Mining in Computer Security. Advances in Information Security, Springer 2002, ISBN 9781461353218 [contents] - [e16]Sushil Jajodia, Pierangela Samarati:
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002. ACM 2002, ISBN 1-58113-633-1 [contents] - 2001
- [j84]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding loss of fairness owing to failures in fair data exchange systems. Decis. Support Syst. 31(3): 337-350 (2001) - [j83]Sushil Jajodia, Duminda Wijesekera:
Security in Federated Database Systems. Inf. Secur. Tech. Rep. 6(2): 69-79 (2001) - [j82]Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Security Transaction Processing. J. Comput. Secur. 9(3): 165-195 (2001) - [j81]Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu:
ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Rec. 30(4): 15-24 (2001) - [j80]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) - [j79]Pierangela Samarati, Michael K. Reiter, Sushil Jajodia:
An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001) - [j78]Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian:
Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2): 214-260 (2001) - [c112]Duminda Wijesekera, Sushil Jajodia:
Policy algebras for access control: the propositional case. CCS 2001: 38-47 - [c111]Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera:
Revocations-A Classification. CSFW 2001: 44-58 - [c110]Peng Liu, Sushil Jajodia:
Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205 - [c109]Sushil Jajodia, Duminda Wijesekera:
Recent Advances in Access Control Models. DBSec 2001: 3-15 - [c108]Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia:
Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 - [c107]Ravi Mukkamala, Sushil Jajodia:
A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238 - [c106]Daniel Barbará, Ningning Wu, Sushil Jajodia:
Detecting Novel Network Intrusions Using Bayes Estimators. SDM 2001: 1-17 - [c105]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346 - [c104]Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi:
Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260 - [c103]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 - [p5]Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian:
Provisional Authorizations. E-Commerce Security and Privacy 2001: 133-159 - [e15]Hideko S. Kunii, Sushil Jajodia, Arne Sølvberg:
Conceptual Modeling - ER 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings. Lecture Notes in Computer Science 2224, Springer 2001, ISBN 3-540-42866-6 [contents] - 2000
- [b1]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang:
Time granularities in databases, data mining, and temporal reasoning. Springer 2000, ISBN 978-3-540-66997-5, pp. I-XI, 1-230 - [j77]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
Modeling requests among cooperating intrusion detection systems. Comput. Commun. 23(17): 1702-1715 (2000) - [j76]Peng Liu, Paul Ammann, Sushil Jajodia:
Rewriting Histories: Recovering from Malicious Transactions. Distributed Parallel Databases 8(1): 7-40 (2000) - [j75]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Transaction Dependencies in Database Systems. Distributed Parallel Databases 8(4): 399-446 (2000) - [j74]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) - [j73]Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. J. Comput. Secur. 8(4): 243-279 (2000) - [j72]Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino:
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) - [j71]Alexander Brodsky, Csilla Farkas, Sushil Jajodia:
Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000) - [c102]Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean:
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ACSAC 2000: 298-307 - [c101]Susan Chapin, Donald B. Faatz, Sushil Jajodia:
Distributed Policies for Data Management - Making Policies Mobile. DBSec 2000: 63-75 - [c100]Daniel Barbará, Rajni Goel, Sushil Jajodia:
Protecting File systems Against Corruption Using Checksums. DBSec 2000: 113-124 - [c99]Peng Liu, Peng Ning, Sushil Jajodia:
Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 - [c98]Daniel Barbará, Rajni Goel, Sushil Jajodia:
Using Checksums to Detect Data Corruption. EDBT 2000: 136-149 - [c97]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia:
CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 - [c96]Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder:
Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. S&P 2000: 215-228 - [c95]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-37 - [c94]Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia:
Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19 - [e14]Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati:
CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4 [contents]
1990 – 1999
- 1999
- [j70]Sushil Jajodia, Catherine D. McCollum, Paul Ammann:
Trusted Recovery. Commun. ACM 42(7): 71-75 (1999) - [j69]Sushil Jajodia, Paul Ammann, Catherine D. McCollum:
Surviving Information Warfare Attacks. Computer 32(4): 57-63 (1999) - [j68]Paul Ammann, Sushil Jajodia:
Computer Security, Fault Tolerance, And Software Assurance. IEEE Concurr. 7(1): 4-6 (1999) - [j67]Sushil Jajodia:
Data replication gaining popularity. IEEE Concurr. 7(2): 85-86 (1999) - [j66]Sushil Jajodia:
Distributed Databases: Turing Award Winner Jim Gray on the new millennium. IEEE Concurr. 7(3): 9-10 (1999) - [j65]Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia:
Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999) - [j64]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Inf. Syst. 17(2): 101-140 (1999) - [c93]Amgad Fayad, Sushil Jajodia, Catherine D. McCollum:
Application-Level Isolation Using Data Inconsistency Detection. ACSAC 1999: 119-126 - [c92]Peng Liu, Sushil Jajodia, Catherine D. McCollum:
Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 - [c91]Ravi Mukkamala, Jason Gagnon, Sushil Jajodia:
Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46 - [c90]Peng Liu, Paul Ammann, Sushil Jajodia:
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 - [c89]Sushil Jajodia:
Protecting Critical Information Systems (Abstract). ICICS 1999: 143 - [c88]Neil F. Johnson, Zoran Duric, Sushil Jajodia:
Recovery of Watermarks from Distorted Images. Information Hiding 1999: 318-332 - [c87]Neil F. Johnson, Zoran Duric, Sushil Jajodia:
On Fingerprinting Images for Recognition. Multimedia Information Systems 1999: 4-11 - [c86]Paul Ammann, Sushil Jajodia:
The Integrity Challenge. IICIS 1999: 59-70 - [e13]Sushil Jajodia:
Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece. IFIP Conference Proceedings 142, Kluwer 1999, ISBN 0-7923-8488-1 [contents] - 1998
- [j63]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998) - [j62]Neil F. Johnson, Sushil Jajodia:
Exploring Steganography: Seeing the Unseen. Computer 31(2): 26-34 (1998) - [j61]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998) - [j60]Sushil Jajodia:
Interview: Amit Sheth On Workflow Technology. IEEE Concurr. 6(2): 21-23 (1998) - [j59]Xiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni:
Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. Int. J. Artif. Intell. Tools 7(2): 319-339 (1998) - [j58]Indrakshi Ray, Paul Ammann, Sushil Jajodia:
A Semantic-Based Transaction Processing Model for Multilevel Transactions. J. Comput. Secur. 6(3): 181-217 (1998) - [j57]Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) - [j56]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin:
Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998) - [j55]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998) - [c85]Sushil Jajodia, Peng Liu, Catherine D. McCollum:
Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82 - [c84]Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia:
A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178 - [c83]Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia:
Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. CSFW 1998: 190-201 - [c82]Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier:
Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 - [c81]Neil F. Johnson, Sushil Jajodia:
Steganalysis of Images Created Using Current Steganography Software. Information Hiding 1998: 273-289 - [c80]Giovanni Rumolo, Sushil Jajodia:
Algebra for Databases with Explicit Markings of Damaged Data. IICIS 1998: 103-129 - [e12]Opher Etzion, Sushil Jajodia, Suryanarayana M. Sripada:
Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997). Lecture Notes in Computer Science 1399, Springer 1998, ISBN 3-540-64519-5 [contents] - [e11]Sushil Jajodia, M. Tamer Özsu, Asuman Dogac:
Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings. Lecture Notes in Computer Science 1508, Springer 1998, ISBN 3-540-65107-1 [contents] - [e10]Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous:
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998. IFIP Conference Proceedings 136, Kluwer 1998, ISBN 0-412-84770-1 [contents] - 1997
- [j54]Paul Ammann, Sushil Jajodia:
Semantics-based transaction processing: satisfying conflicting objectives. IEEE Concurrency 5(2): 8-10 (1997) - [j53]Paul Ammann, Sushil Jajodia:
Rethinking integrity [distributed databases]. IEEE Concurrency 5(4): 5-6 (1997) - [j52]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
A theoretical formulation for degrees of isolation in databases. Inf. Softw. Technol. 39(1): 47-53 (1997) - [j51]Sushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang:
Information Systems Research at George Mason University. SIGMOD Rec. 26(4): 69-74 (1997) - [j50]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101 (1997) - [j49]Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia:
Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538 (1997) - [j48]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997) - [j47]Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia:
Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997) - [j46]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) - [j45]Ouri Wolfson, Sushil Jajodia, Yixiu Huang:
An Adaptive Data Replication Algorithm. ACM Trans. Database Syst. 22(2): 255-314 (1997) - [c79]Sushil Jajodia, Indrakshi Ray, Paul Ammann:
Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 - [c78]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449 - [c77]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55 - [c76]Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang:
Temporal Database Bibliography Update. Temporal Databases, Dagstuhl 1997: 338-366 - [c75]Christian S. Jensen, Curtis E. Dyreson, Michael H. Böhlen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Fabio Grandi, Patrick J. Hayes, Sushil Jajodia, Wolfgang Käfer, Nick Kline, Nikos A. Lorentzos, Yannis G. Mitsopoulos, Angelo Montanari, Daniel A. Nonen, Elisa Peressi, Barbara Pernici, John F. Roddick, Nandlal L. Sarda, Maria Rita Scalas, Arie Segev, Richard T. Snodgrass, Michael D. Soo, Abdullah Uz Tansel, Paolo Tiberio, Gio Wiederhold:
The Consensus Glossary of Temporal Database Concepts - February 1998 Version. Temporal Databases, Dagstuhl 1997: 367-405 - [c74]Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton:
Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 - [c73]Sushil Jajodia, Ravi Mukkamala, Indrajit Ray:
A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 - [c72]Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino:
A Unified Framework for Enforcing Multiple Access Control Policies. SIGMOD Conference 1997: 474-485 - [c71]Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian:
A Logical Language for Expressing Authorizations. S&P 1997: 31-42 - [c70]Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
Providing flexibility in information flow control for object oriented systems. S&P 1997: 130-140 - [c69]Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:
Surviving information warfare attacks on databases. S&P 1997: 164-174 - [p4]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997 - [p3]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino:
Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997 - [e9]Sushil Jajodia, Larry Kerschberg:
Advanced Transaction Models and Architectures. Kluwer 1997, ISBN 0-7923-9880-7 [contents] - [e8]Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous:
Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997. IFIP Conference Proceedings 109, Chapman Hall 1997, ISBN 0-412-82600-3 [contents] - [r1]Sushil Jajodia:
Database Security and Privacy. The Computer Science and Engineering Handbook 1997: 1112-1124 - 1996
- [j44]Sushil Jajodia:
Database Security and Privacy. ACM Comput. Surv. 28(1): 129-131 (1996) - [j43]Sushil Jajodia:
Managing Security and Privacy of Information. ACM Comput. Surv. 28(4es): 79 (1996) - [j42]Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996) - [j41]Kenneth P. Smith, Barbara T. Blaustein, Sushil Jajodia, LouAnna Notargiacomo:
Correctness Criteria for Multilevel Secure Transactions. IEEE Trans. Knowl. Data Eng. 8(1): 32-45 (1996) - [j40]Pierangela Samarati, Elisa Bertino, Sushil Jajodia:
An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8(4): 555-562 (1996) - [j39]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996) - [j38]Paul Ammann, Sushil Jajodia, Phyllis G. Frankl:
Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distributed Syst. 7(6): 665-670 (1996) - [c68]Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini:
An Advanced Commit Protocol for MLS Distributed Database Systems. CCS 1996: 119-128 - [c67]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
A Non-Timestamped Authorization Model for Data Management Systems. CCS 1996: 169-178 - [c66]Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 - [c65]Sushil Jajodia, Luigi V. Mancini, Indrajit Ray:
Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 - [c64]Donald G. Marks, Amihai Motro, Sushil Jajodia:
Enhancing the Controlled Disclosure of Sensitive Information. ESORICS 1996: 290-303 - [c63]K. Selçuk Candan, Sushil Jajodia, V. S. Subrahmanian:
Secure Mediated Databases. ICDE 1996: 28-37 - [c62]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. PODS 1996: 68-78 - [c61]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Ensuring Atomicity of Multilevel Transactions. S&P 1996: 74-84 - [c60]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Supporting Multiple Access Control Policies in Database Systems. S&P 1996: 94-107 - [c59]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia:
A General Framework and Reasoning Model for Time Granularity. TIME 1996: 104-111 - [p2]Sushil Jajodia, Ravi Mukkamala:
Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control. Performance of Concurrency Control Mechanisms in Centralized Database Systems 1996: 387-405 - [e7]V. S. Subrahmanian, Sushil Jajodia:
Multimedia Database System: Issues and Research Direction. Springer 1996, ISBN 3-540-58710-1 [contents] - 1995
- [j37]Ouri Wolfson, Sushil Jajodia:
An Algorithm for Dynamic Data Allocation in Distributed Systems. Inf. Process. Lett. 53(2): 113-119 (1995) - [j36]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Database Security: Research and Practice. Inf. Syst. 20(7): 537-556 (1995) - [j35]Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian:
Temporal Modules: An Approach Toward Federated Temporal Databases. Inf. Sci. 82(1-2): 103-128 (1995) - [j34]Paul Ammann, Frank Jaeckle, Sushil Jajodia:
Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. J. Comput. Secur. 3(2/3): 87-114 (1995) - [j33]Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia:
The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) - [j32]Paul Ammann, Sushil Jajodia, Padmaja Mavuluri:
On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) - [c58]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247 - [c57]Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia:
Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268 - [c56]Paul Ammann, Sushil Jajodia, Indrakshi Ray:
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 - 1994
- [j31]Sushil Jajodia, Ravi Mukkamala, K. V. S. Ramarao:
A View-Based Dynamic Replication Control Algorithm. Nord. J. Comput. 1(2): 214-230 (1994) - [j30]Christian S. Jensen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Patrick J. Hayes, Sushil Jajodia:
A Consensus Glossary of Temporal Database Concepts. SIGMOD Rec. 23(1): 52-64 (1994) - [c55]Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum:
Benchmarking multilevel secure database systems using the MITRE benchmark. ACSAC 1994: 86-95 - [c54]Paul Ammann, Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. CCS 1994: 118-125 - [c53]Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems. CCS 1994: 136-147 - [c52]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274 - [c51]Amihai Motro, Donald G. Marks, Sushil Jajodia:
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. ESORICS 1994: 431-445 - [c50]Elisa Bertino, Luigi V. Mancini, Sushil Jajodia:
Collecting garbage in multilevel secure object stores. S&P 1994: 106-120 - 1993
- [j29]Sushil Jajodia, Ravi Mukkamala:
Measuring the effect of commutative transactions on distributed database performance. Inf. Sci. 68(1-2): 91-111 (1993) - [j28]Ravi S. Sandhu, Sushil Jajodia:
Limitations of Relational Data Base Access Controls. Inf. Secur. J. A Glob. Perspect. 2(1): 57-72 (1993) - [j27]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. J. Comput. Secur. 2(4): 311-352 (1993) - [j26]Paul Ammann, Sushil Jajodia:
Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993) - [c49]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
Authorizations in Relational Database Management Systems. CCS 1993: 130-139 - [c48]Elisa Bertino, Pierangela Samarati, Sushil Jajodia:
High Assurance Discretionary Access Control for Object Bases. CCS 1993: 140-150 - [c47]Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein:
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. DBSec 1993: 109-121 - [c46]Paul Ammann, Sushil Jajodia:
Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134 - [c45]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158 - [c44]Ravi Mukkamala, Sushil Jajodia:
A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. DBSec 1993: 199-214 - [c43]Elisa Bertino, Sushil Jajodia:
Modeling Multilevel Entities Using Single Level Objects. DOOD 1993: 415-428 - [c42]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Enforcing Mandatory Access Control in Object Bases. Security for Object-Oriented Systems 1993: 96-116 - [c41]Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian:
Temporal Modules: An Approach Toward Federated Temporal Databases. SIGMOD Conference 1993: 227-236 - [c40]Barbara T. Blaustein, Sushil Jajodia, Catherine D. McCollum, LouAnna Notargiacomo:
A model of atomicity for multilevel transactions. S&P 1993: 120-134 - [c39]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving stricter correctness requirements in multilevel secure databases. S&P 1993: 135-147 - [c38]Elisa Bertino, Sushil Jajodia, Pierangela Samarati:
Access Control in Object-Oriented Database Systems - Some Approaches and Issues. Advanced Database Systems 1993: 17-44 - [p1]Gio Wiederhold, Sushil Jajodia, Witold Litwin:
Integrating Temporal Data in a Heterogeneous Environment. Temporal Databases 1993: 563-579 - [e6]Abdullah Uz Tansel, James Clifford, Shashi K. Gadia, Sushil Jajodia, Arie Segev, Richard T. Snodgrass:
Temporal Databases: Theory, Design, and Implementation. Benjamin/Cummings 1993, ISBN 0-8053-2413-5 [contents] - [e5]Peter Buneman, Sushil Jajodia:
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993. ACM Press 1993, ISBN 978-0-89791-592-2 [contents] - 1992
- [j25]Ravi S. Sandhu, Sushil Jajodia:
Eliminating polyinstantiation securely. Comput. Secur. 11(6): 547-562 (1992) - [c37]Oliver Costich, Sushil Jajodia:
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. DBSec 1992: 249-266 - [c36]John P. McDermott, Sushil Jajodia:
Orange Locking: Channel-Free Database Concurrency Control Via Locking. DBSec 1992: 267-284 - [c35]Ravi S. Sandhu, Sushil Jajodia:
Polyinstantation for Cover Stories. ESORICS 1992: 307-328 - [c34]Ouri Wolfson, Sushil Jajodia:
Distributed Algorithms for Dynamic Replication of Data. PODS 1992: 149-163 - [c33]Vinti Doshi, Sushil Jajodia:
Referential Integrity in Multilevel Secure Database Management Systems. SEC 1992: 359-371 - [c32]Paul Ammann, Frank Jaeckle, Sushil Jajodia:
A two snapshot algorithm for concurrency control in multi-level secure databases. S&P 1992: 204-215 - [c31]Sushil Jajodia, Vijayalakshmi Atluri:
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. S&P 1992: 216-224 - [c30]Ouri Wolfson, Sushil Jajodia:
An Algorithm for Dynamic Data Distribution. Workshop on the Management of Replicated Data 1992: 62-65 - [e4]Carl E. Landwehr, Sushil Jajodia:
Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991. IFIP Transactions A-6, North-Holland 1992, ISBN 0-444-89518-3 [contents] - 1991
- [j24]Ravi S. Sandhu, Sushil Jajodia:
Integrity principles and mechanisms in database management systems. Comput. Secur. 10(5): 413-427 (1991) - [j23]Sushil Jajodia, David Mutchler:
A short technical paper: Determining whether a vote assignment is dominated. Inf. Sci. 56(1-3): 279-282 (1991) - [j22]Ravi Mukkamala, Sushil Jajodia:
A Note on Estimating the Cardinality of the Projection of a Database Relation. ACM Trans. Database Syst. 16(3): 564-566 (1991) - [c29]John P. McDermott, Sushil Jajodia, Ravi S. Sandhu:
A single-level scheduler for the replicated architecture for multilevel-secure databases. ACSAC 1991: 2-11 - [c28]Boris Y. Kogan, Sushil Jajodia:
An audit model for object-oriented databases. ACSAC 1991: 90-99 - [c27]Gio Wiederhold, Sushil Jajodia, Witold Litwin:
Dealing with Granularity of Time in Temporal Databases. CAiSE 1991: 124-140 - [c26]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 - [c25]Sushil Jajodia:
Panel Discussion on the Polyinstantiation Problem: A Position Paper. CSFW 1991: 235 - [c24]Paul Ammann, Sushil Jajodia:
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202 - [c23]Sushil Jajodia, Ravi Mukkamala:
Effects of SeaView Decomposition of Multilevel Relations on Database Performance. DBSec 1991: 203-225 - [c22]Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia:
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 - [c21]Sushil Jajodia, Ravi S. Sandhu:
Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59 - [c20]Sushil Jajodia, Ravi S. Sandhu:
A Novel Decomposition of Multilevel Relations into Single-Level Relations. S&P 1991: 300-315 - [e3]Sushil Jajodia, Carl E. Landwehr:
Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990. North-Holland 1991, ISBN 0-444-89076-9 [contents] - 1990
- [j21]Sushil Jajodia, Frederick N. Springsteel:
Lossless Outer Joins with Incomplete Information. BIT 30(1): 34-41 (1990) - [j20]Sushil Jajodia, Ravi S. Sandhu:
Database Security: Current Status and Key Issues. SIGMOD Rec. 19(4): 123-126 (1990) - [j19]Sushil Jajodia, David Mutchler:
Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database. ACM Trans. Database Syst. 15(2): 230-280 (1990) - [c19]Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley:
Update semantics for multilevel relations. ACSAC 1990: 103-112 - [c18]Sushil Jajodia, Ravi S. Sandhu:
A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158 - [c17]Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt:
A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 - [c16]Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308 - [c15]Boris Kogan, Sushil Jajodia:
Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. SIGMOD Conference 1990: 153-162 - [c14]Sushil Jajodia, Boris Kogan:
Integrating an Object-Oriented Data Model with Multilevel Security. S&P 1990: 76-85 - [c13]Sushil Jajodia, Ravi S. Sandhu:
Polyinstantiation Integrity in Multilevel Relations. S&P 1990: 104-115 - [c12]Sushil Jajodia, Boris Kogan:
Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. S&P 1990: 360-368
1980 – 1989
- 1989
- [j18]Sushil Jajodia, Won Kim:
From the Issue Editors. IEEE Data Eng. Bull. 12(1): 1 (1989) - [j17]Sushil Jajodia, David Mutchler:
A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting. IEEE Trans. Knowl. Data Eng. 1(4): 459-469 (1989) - [j16]Sushil Jajodia, David Mutchler:
A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability. IEEE Trans. Software Eng. 15(1): 39-46 (1989) - [c11]Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley:
Audit Trail Organization in Relational Databases. DBSec 1989: 269-281 - 1988
- [j15]Sushil Jajodia:
Letter from the TC Chair. IEEE Data Eng. Bull. 11(2): 1 (1988) - [c10]Sushil Jajodia, David Mutchler:
Integrating Static and Dynamic Voting Protocols To Enhance File Availability. ICDE 1988: 144-153 - [e2]Sushil Jajodia, Won Kim, Abraham Silberschatz:
Proceedings of the International Symposium on Databases in Parallel and Distributed Systems, Austin, Texas, USA, December 5-7, 1988. IEEE Computer Society 1988, ISBN 0-8186-0893-5 [contents] - 1987
- [j14]H. A. Burgdorff, Sushil Jajodia, Frederick N. Springsteel, Yechezkel Zalcstein:
Alternative Methods for the Reconstruction of Trees from Their Traversals. BIT 27(2): 133-140 (1987) - [j13]Sushil Jajodia:
Letter from the TC Chairman. IEEE Data Eng. Bull. 10(3): 1 (1987) - [j12]Sushil Jajodia, Frederick N. Springsteel:
Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. IEEE Trans. Software Eng. 13(7): 811-819 (1987) - [j11]Satish K. Tripathi, Yennun Huang, Sushil Jajodia:
Local Area Networks: Software and Related Issues. IEEE Trans. Software Eng. 13(8): 872-879 (1987) - [j10]Sushil Jajodia:
An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". IEEE Trans. Software Eng. 13(9): 1047-1048 (1987) - [c9]Catherine Meadows, Sushil Jajodia:
Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101 - [c8]Sushil Jajodia, Catherine A. Meadows:
Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404 - [c7]Sushil Jajodia:
Managing Replicated Files in Partitioned Distributed Database Systems. ICDE 1987: 412-418 - [c6]Sushil Jajodia, David Mutchler:
Dynamic Voting. SIGMOD Conference 1987: 227-238 - [c5]Sushil Jajodia, David Mutchler:
Enhancements to the Voting Algorithm. VLDB 1987: 399-406 - 1986
- [j9]Sushil Jajodia:
Recognizing Multivalued Dependencies in Relation Schemas. Comput. J. 29(5): 458-459 (1986) - [j8]Sushil Jajodia:
Chairman's Message. IEEE Database Eng. Bull. 9(3): 1 (1986) - 1985
- [j7]Sushil Jajodia:
On Equivalence of Relational and Network Database Models. Inf. Process. Lett. 20(1): 51-54 (1985) - 1984
- [j6]Sushil Jajodia, Peter Ann-Beng Ng, Raymond T. Yeh:
Introduction to the special issue on the use of entity-relationship concepts in databases and related software. J. Syst. Softw. 4(2-3): 95-98 (1984) - [j5]Sushil Jajodia, Peter A. Ng:
Translation of entity-relationship diagrams into relational structures. J. Syst. Softw. 4(2-3): 123-133 (1984) - [j4]Sushil Jajodia, Peter A. Ng:
Representative Instances and gamma-Acyclic Relational Schemes. IEEE Trans. Software Eng. 10(6): 614-618 (1984) - [c4]Sushil Jajodia:
Universal and Representative Instances Using Unmarked Nulls. FSTTCS 1984: 367-378 - 1983
- [j3]Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel:
Entity-relationship diagrams which are in BCNF. Int. J. Parallel Program. 12(4): 269-283 (1983) - [j2]Sushil Jajodia, Jian Liu, Peter A. Ng:
A Scheme of Parallel Processing for MIMD Systems. IEEE Trans. Software Eng. 9(4): 436-445 (1983) - [j1]Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel:
The Problem of Equivalence for Entity-Relationship Diagrams. IEEE Trans. Software Eng. 9(5): 617-630 (1983) - [c3]Sushil Jajodia, Peter A. Ng:
On the Representation of Relational Structures by Entity-Relationship Diagrams. ER 1983: 249-263 - [c2]Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel:
On Universal and Representative Instances for Inconsistent Databases. ER 1983: 279-295 - [c1]Paul K. Blackwell, Sushil Jajodia, Peter A. Ng:
A View of Database Management Systems as Abstract Data Types. ER 1983: 661-668 - [e1]Carl G. Davis, Sushil Jajodia, Peter A. Ng, Raymond T. Yeh:
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, USA. North-Holland 1983, ISBN 0-444-86777-5 [contents]
Coauthor Index
aka: Hasan Cam
aka: Luigi Vincenzo Mancini
aka: X. Sean Wang
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint