BibTeX records: James B. D. Joshi

download as .bib file

@article{DBLP:journals/tdsc/XuLJ23,
  author       = {Runhua Xu and
                  Chao Li and
                  James Joshi},
  title        = {Blockchain-Based Transparency Framework for Privacy Preserving Third-Party
                  Services},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2302--2313},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3179698},
  doi          = {10.1109/TDSC.2022.3179698},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/HarrisonPCWMBXH23,
  author       = {Galen Harrison and
                  Przemyslaw J. Porebski and
                  Jiangzhuo Chen and
                  Mandy L. Wilson and
                  Henning S. Mortveit and
                  Parantapa Bhattacharya and
                  Dawen Xie and
                  Stefan Hoops and
                  Anil Vullikanti and
                  Li Xiong and
                  James Joshi and
                  Madhav V. Marathe},
  title        = {Synthetic Information and Digital Twins for Pandemic Science: Challenges
                  and Opportunities},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {23--33},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00013},
  doi          = {10.1109/TPS-ISA58951.2023.00013},
  timestamp    = {Tue, 05 Mar 2024 12:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/HarrisonPCWMBXH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/KarimiAJA22,
  author       = {Leila Karimi and
                  Maryam Aldairi and
                  James Joshi and
                  Mai Abdelhakim},
  title        = {An Automatic Attribute-Based Access Control Policy Extraction From
                  Access Logs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2304--2317},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3054331},
  doi          = {10.1109/TDSC.2021.3054331},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/KarimiAJA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuJ022,
  author       = {Runhua Xu and
                  James Joshi and
                  Chao Li},
  title        = {{NN-EMD:} Efficiently Training Neural Networks Using Encrypted Multi-Sourced
                  Datasets},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {4},
  pages        = {2807--2820},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3074439},
  doi          = {10.1109/TDSC.2021.3074439},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuJ022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ShyuNIJ22,
  author       = {Mei{-}Ling Shyu and
                  Surya Nepal and
                  Val{\'{e}}rie Issarny and
                  James Joshi},
  title        = {Guest Editorial: Special Issue on Services Computing for {COVID-19}
                  and Future Pandemics},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {15},
  number       = {3},
  pages        = {1175--1177},
  year         = {2022},
  url          = {https://doi.org/10.1109/TSC.2022.3179065},
  doi          = {10.1109/TSC.2022.3179065},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ShyuNIJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuJK21,
  author       = {Runhua Xu and
                  James Joshi and
                  Prashant Krishnamurthy},
  title        = {An Integrated Privacy Preserving Attribute-Based Access Control Framework
                  Supporting Secure Deduplication},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {706--721},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2946073},
  doi          = {10.1109/TDSC.2019.2946073},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuJK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/XuB00JL21,
  author       = {Runhua Xu and
                  Nathalie Baracaldo and
                  Yi Zhou and
                  Ali Anwar and
                  James Joshi and
                  Heiko Ludwig},
  editor       = {Nicholas Carlini and
                  Ambra Demontis and
                  Yizheng Chen},
  title        = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned
                  Data},
  booktitle    = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial
                  Intelligence and Security, Virtual Event, Republic of Korea, 15 November
                  2021},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474369.3486872},
  doi          = {10.1145/3474369.3486872},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/XuB00JL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcse/SridharYJP21,
  author       = {Nigamanth Sridhar and
                  Li Yang and
                  James Joshi and
                  Victor Piotrowski},
  editor       = {Mark Sherriff and
                  Laurence D. Merkle and
                  Pamela A. Cutter and
                  Alvaro E. Monge and
                  Judithe Sheard},
  title        = {Cybersecurity Education in the Age of Artificial Intelligence},
  booktitle    = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science
                  Education, Virtual Event, USA, March 13-20, 2021},
  pages        = {1365},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3408877.3439525},
  doi          = {10.1145/3408877.3439525},
  timestamp    = {Wed, 07 Apr 2021 16:26:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sigcse/SridharYJP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2102-01249,
  author       = {Runhua Xu and
                  Chao Li and
                  James Joshi},
  title        = {{T3AB:} Transparent and Trustworthy Third-party Authority using Blockchain},
  journal      = {CoRR},
  volume       = {abs/2102.01249},
  year         = {2021},
  url          = {https://arxiv.org/abs/2102.01249},
  eprinttype    = {arXiv},
  eprint       = {2102.01249},
  timestamp    = {Wed, 20 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2102-01249.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2103-03918,
  author       = {Runhua Xu and
                  Nathalie Baracaldo and
                  Yi Zhou and
                  Ali Anwar and
                  James Joshi and
                  Heiko Ludwig},
  title        = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned
                  Data},
  journal      = {CoRR},
  volume       = {abs/2103.03918},
  year         = {2021},
  url          = {https://arxiv.org/abs/2103.03918},
  eprinttype    = {arXiv},
  eprint       = {2103.03918},
  timestamp    = {Tue, 27 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2103-03918.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-08587,
  author       = {Leila Karimi and
                  Mai Abdelhakim and
                  James Joshi},
  title        = {Adaptive {ABAC} Policy Learning: {A} Reinforcement Learning Approach},
  journal      = {CoRR},
  volume       = {abs/2105.08587},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.08587},
  eprinttype    = {arXiv},
  eprint       = {2105.08587},
  timestamp    = {Mon, 31 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-08587.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-04417,
  author       = {Runhua Xu and
                  Nathalie Baracaldo and
                  James Joshi},
  title        = {Privacy-Preserving Machine Learning: Methods, Challenges and Directions},
  journal      = {CoRR},
  volume       = {abs/2108.04417},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.04417},
  eprinttype    = {arXiv},
  eprint       = {2108.04417},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-04417.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AkhuseyinogluJ20,
  author       = {Nuray Baltaci Akhuseyinoglu and
                  James Joshi},
  title        = {A constraint and risk-aware approach to attribute-based access control
                  for cyber-physical systems},
  journal      = {Comput. Secur.},
  volume       = {96},
  pages        = {101802},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101802},
  doi          = {10.1016/J.COSE.2020.101802},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkhuseyinogluJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/XuJ20,
  author       = {Runhua Xu and
                  James Joshi},
  title        = {Trustworthy and Transparent Third-party Authority},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {20},
  number       = {4},
  pages        = {31:1--31:23},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386262},
  doi          = {10.1145/3386262},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/XuJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/Joshi20,
  author       = {James Joshi},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {13},
  number       = {1},
  pages        = {1--2},
  year         = {2020},
  url          = {https://doi.org/10.1109/TSC.2020.2967234},
  doi          = {10.1109/TSC.2020.2967234},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/Joshi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/XuJ20,
  author       = {Runhua Xu and
                  James Joshi},
  title        = {Revisiting Secure Computation Using Functional Encryption: Opportunities
                  and Research Directions},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {226--235},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00038},
  doi          = {10.1109/TPS-ISA50397.2020.00038},
  timestamp    = {Tue, 26 Jan 2021 14:00:08 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/XuJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-07270,
  author       = {Leila Karimi and
                  Maryam Aldairi and
                  James Joshi and
                  Mai Abdelhakim},
  title        = {An Automatic Attribute Based Access Control Policy Extraction from
                  Access Logs},
  journal      = {CoRR},
  volume       = {abs/2003.07270},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.07270},
  eprinttype    = {arXiv},
  eprint       = {2003.07270},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-07270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-06191,
  author       = {Runhua Xu and
                  James Joshi},
  title        = {Revisiting Secure Computation Using Functional Encryption: Opportunities
                  and Research Directions},
  journal      = {CoRR},
  volume       = {abs/2011.06191},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.06191},
  eprinttype    = {arXiv},
  eprint       = {2011.06191},
  timestamp    = {Wed, 18 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-06191.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-10547,
  author       = {Runhua Xu and
                  James Joshi and
                  Chao Li},
  title        = {{NN-EMD:} Efficiently Training Neural Networks using Encrypted Multi-sourced
                  Datasets},
  journal      = {CoRR},
  volume       = {abs/2012.10547},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.10547},
  eprinttype    = {arXiv},
  eprint       = {2012.10547},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-10547.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/BaracaldoPJ19,
  author       = {Nathalie Baracaldo and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {{G-SIR:} An Insider Attack Resilient Geo-Social Access Control Framework},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {84--98},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2654438},
  doi          = {10.1109/TDSC.2017.2654438},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/BaracaldoPJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/DustdarNJ19,
  author       = {Schahram Dustdar and
                  Surya Nepal and
                  James Joshi},
  title        = {Introduction to the Special Section on Advances in Internet-based
                  Collaborative Technologies},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {19},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1145/3361071},
  doi          = {10.1145/3361071},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/DustdarNJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/Joshi19,
  author       = {James Joshi},
  title        = {Editorial},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {1--3},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSC.2018.2887058},
  doi          = {10.1109/TSC.2018.2887058},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/Joshi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/XuJL19,
  author       = {Runhua Xu and
                  James B. D. Joshi and
                  Chao Li},
  title        = {CryptoNN: Training Neural Networks over Encrypted Data},
  booktitle    = {39th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019},
  pages        = {1199--1209},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICDCS.2019.00121},
  doi          = {10.1109/ICDCS.2019.00121},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/XuJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AldairiKJ19,
  author       = {Maryam Aldairi and
                  Leila Karimi and
                  James Joshi},
  title        = {A Trust Aware Unsupervised Learning Approach for Insider Threat Detection},
  booktitle    = {20th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August
                  1, 2019},
  pages        = {89--98},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IRI.2019.00027},
  doi          = {10.1109/IRI.2019.00027},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/AldairiKJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icbc/2019,
  editor       = {James Joshi and
                  Surya Nepal and
                  Qi Zhang and
                  Liang{-}Jie Zhang},
  title        = {Blockchain - {ICBC} 2019 - Second International Conference, Held as
                  Part of the Services Conference Federation, {SCF} 2019, San Diego,
                  CA, USA, June 25-30, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11521},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23404-1},
  doi          = {10.1007/978-3-030-23404-1},
  isbn         = {978-3-030-23403-4},
  timestamp    = {Wed, 19 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icbc/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1904-07303,
  author       = {Runhua Xu and
                  James B. D. Joshi and
                  Chao Li},
  title        = {CryptoNN: Training Neural Networks over Encrypted Data},
  journal      = {CoRR},
  volume       = {abs/1904.07303},
  year         = {2019},
  url          = {http://arxiv.org/abs/1904.07303},
  eprinttype    = {arXiv},
  eprint       = {1904.07303},
  timestamp    = {Thu, 13 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1904-07303.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinLPJ18,
  author       = {Lei Jin and
                  Chao Li and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {\emph{k-Trustee}: Location injection attack-resilient anonymization
                  for location privacy},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {212--230},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.002},
  doi          = {10.1016/J.COSE.2018.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinLPJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Joshi18,
  author       = {James Joshi},
  title        = {Front Cover},
  journal      = {Computer},
  volume       = {51},
  number       = {11},
  pages        = {1},
  year         = {2018},
  url          = {https://doi.org/10.1109/MC.2018.2880358},
  doi          = {10.1109/MC.2018.2880358},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Joshi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/KarimiJ18,
  author       = {Leila Karimi and
                  James Joshi},
  editor       = {Naoki Abe and
                  Huan Liu and
                  Calton Pu and
                  Xiaohua Hu and
                  Nesreen K. Ahmed and
                  Mu Qiao and
                  Yang Song and
                  Donald Kossmann and
                  Bing Liu and
                  Kisung Lee and
                  Jiliang Tang and
                  Jingrui He and
                  Jeffrey S. Saltz},
  title        = {An Unsupervised Learning Based Approach for Mining Attribute Based
                  Access Control Policies},
  booktitle    = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018),
                  Seattle, WA, USA, December 10-13, 2018},
  pages        = {1427--1436},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/BigData.2018.8622037},
  doi          = {10.1109/BIGDATA.2018.8622037},
  timestamp    = {Fri, 19 Nov 2021 16:08:20 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/KarimiJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/CarrNJ18,
  author       = {LeRoy Carr III and
                  Anthony Newtson and
                  James Joshi},
  title        = {Towards Modernizing the Future of American Voting},
  booktitle    = {4th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018},
  pages        = {130--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CIC.2018.00028},
  doi          = {10.1109/CIC.2018.00028},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/CarrNJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuPJ18,
  author       = {Runhua Xu and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for
                  Edge Computing},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {1097--1106},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00153},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00153},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuPJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/0002J18,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Administration Model for {RBAC}},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_1507},
  doi          = {10.1007/978-1-4614-8265-9\_1507},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/0002J18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/0002J18a,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {{ANSI/INCITS} {RBAC} Standard},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_1508},
  doi          = {10.1007/978-1-4614-8265-9\_1508},
  timestamp    = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/db/0002J18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/0002J18b,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {{GEO-RBAC} Model},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_1509},
  doi          = {10.1007/978-1-4614-8265-9\_1509},
  timestamp    = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/db/0002J18b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/0002J18c,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Role-Based Access Control},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_320},
  doi          = {10.1007/978-1-4614-8265-9\_320},
  timestamp    = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/db/0002J18c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/0002J18d,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Temporal Access Control},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_385},
  doi          = {10.1007/978-1-4614-8265-9\_385},
  timestamp    = {Thu, 14 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/db/0002J18d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/Joshi17,
  author       = {James Joshi},
  title        = {Editorial: {A} Message from the New Editor-in-Chief},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {10},
  number       = {1},
  pages        = {3--4},
  year         = {2017},
  url          = {https://doi.org/10.1109/TSC.2016.2641638},
  doi          = {10.1109/TSC.2016.2641638},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/Joshi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdata/LiPJ17,
  author       = {Chao Li and
                  Balaji Palanisamy and
                  James Joshi},
  editor       = {George Karypis and
                  Jia Zhang},
  title        = {Differentially Private Trajectory Analysis for Points-of-Interest
                  Recommendation},
  booktitle    = {2017 {IEEE} International Congress on Big Data, BigData Congress 2017,
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {49--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/BigDataCongress.2017.16},
  doi          = {10.1109/BIGDATACONGRESS.2017.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdata/LiPJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/AkhuseyinogluJ17,
  author       = {Nuray Baltaci Akhuseyinoglu and
                  James Joshi},
  title        = {A Risk-Aware Access Control Framework for Cyber-Physical Systems},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {349--358},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00052},
  doi          = {10.1109/CIC.2017.00052},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/AkhuseyinogluJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/KarimiJ17,
  author       = {Leila Karimi and
                  James Joshi},
  title        = {Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare
                  Environment},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {359--368},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00053},
  doi          = {10.1109/CIC.2017.00053},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/KarimiJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mswim/KarimiKJT17,
  author       = {Maryam Karimi and
                  Prashant Krishnamurthy and
                  James Joshi and
                  David Tipper},
  editor       = {Stephan Olariu and
                  Habib Ammari},
  title        = {Mining Historical Data towards Interference Management in Wireless
                  SDNs},
  booktitle    = {Proceedings of the 13th {ACM} Symposium on QoS and Security for Wireless
                  and Mobile Networks, Q2SWinet@MSWiM 2017, Miami, FL, USA, November
                  21 - 25, 2017},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3132114.3132125},
  doi          = {10.1145/3132114.3132125},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mswim/KarimiKJT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mms/JinLZLJ16,
  author       = {Lei Jin and
                  Xuelian Long and
                  Ke Zhang and
                  Yu{-}Ru Lin and
                  James B. D. Joshi},
  title        = {Characterizing users' check-in activities using their scores in a
                  location-based social network},
  journal      = {Multim. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {87--98},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00530-014-0395-8},
  doi          = {10.1007/S00530-014-0395-8},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mms/JinLZLJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/XuJ16,
  author       = {Runhua Xu and
                  James B. D. Joshi},
  title        = {An Integrated Privacy Preserving Attribute Based Access Control Framework},
  booktitle    = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016,
                  San Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {68--76},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CLOUD.2016.0019},
  doi          = {10.1109/CLOUD.2016.0019},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/XuJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/XuJ16,
  author       = {Runhua Xu and
                  James B. D. Joshi},
  title        = {Enabling Attribute Based Encryption as an Internet Service},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {417--425},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.061},
  doi          = {10.1109/CIC.2016.061},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/XuJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/SuLLCJ16,
  author       = {Yue Su and
                  Ziyi Lan and
                  Yu{-}Ru Lin and
                  Louise K. Comfort and
                  James Joshi},
  title        = {Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {495--499},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.075},
  doi          = {10.1109/CIC.2016.075},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/SuLLCJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/KarimiPJ16,
  author       = {Leila Karimi and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {A Dynamic Privacy Aware Access Control Model for Location Based Services},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {554--557},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.084},
  doi          = {10.1109/CIC.2016.084},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/KarimiPJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/LiPJ16,
  author       = {Chao Li and
                  Balaji Palanisamy and
                  James Joshi},
  editor       = {Stephan Reiff{-}Marganiec},
  title        = {SocialMix: Supporting Privacy-Aware Trusted Social Networking Services},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2016, San
                  Francisco, CA, USA, June 27 - July 2, 2016},
  pages        = {115--122},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICWS.2016.23},
  doi          = {10.1109/ICWS.2016.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/LiPJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bigdataconf/2016,
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7818133/proceeding},
  isbn         = {978-1-4673-9005-7},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuJJL15,
  author       = {Jianfeng Lu and
                  James B. D. Joshi and
                  Lei Jin and
                  Yiding Liu},
  title        = {Towards complexity analysis of User Authorization Query problem in
                  {RBAC}},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {116--130},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.003},
  doi          = {10.1016/J.COSE.2014.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuJJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsc/ShyuJL15,
  author       = {Mei{-}Ling Shyu and
                  James Joshi and
                  Qiong Liu},
  title        = {Guest Editors' Introduction},
  journal      = {Int. J. Semantic Comput.},
  volume       = {9},
  number       = {2},
  pages        = {139--142},
  year         = {2015},
  url          = {https://doi.org/10.1142/S1793351X15020018},
  doi          = {10.1142/S1793351X15020018},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsc/ShyuJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RamaswamyCBSJPG14,
  author       = {Lakshmish Ramaswamy and
                  Barbara Carminati and
                  Lujo Bauer and
                  Dongwan Shin and
                  James Joshi and
                  Calton Pu and
                  Dimitris Gritzalis},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {41},
  pages        = {1--2},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.003},
  doi          = {10.1016/J.COSE.2014.01.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RamaswamyCBSJPG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JungJ14,
  author       = {Youna Jung and
                  James B. D. Joshi},
  title        = {{CPBAC:} Property-based access control model for secure cooperation
                  in online social networks},
  journal      = {Comput. Secur.},
  volume       = {41},
  pages        = {19--39},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.08.004},
  doi          = {10.1016/J.COSE.2013.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JungJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eetcc/JoshiP14,
  author       = {James Joshi and
                  Calton Pu},
  title        = {Welcome Message from the Editors-in-Chief},
  journal      = {{EAI} Endorsed Trans. Collab. Comput.},
  volume       = {1},
  number       = {1},
  pages        = {e1},
  year         = {2014},
  url          = {https://doi.org/10.4108/cc.1.1.e1},
  doi          = {10.4108/CC.1.1.E1},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/eetcc/JoshiP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcis/CarminatiRSJP14,
  author       = {Barbara Carminati and
                  Lakshmish Ramaswamy and
                  Anna Cinzia Squicciarini and
                  James Joshi and
                  Calton Pu},
  title        = {Preface},
  journal      = {Int. J. Cooperative Inf. Syst.},
  volume       = {23},
  number       = {2},
  year         = {2014},
  url          = {https://doi.org/10.1142/S021884301402002X},
  doi          = {10.1142/S021884301402002X},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcis/CarminatiRSJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/ZhangBTJ14,
  author       = {Chengcui Zhang and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  James B. D. Joshi},
  title        = {Guest editorial: Information reuse, integration, and reusable systems},
  journal      = {Inf. Syst. Frontiers},
  volume       = {16},
  number       = {5},
  pages        = {749--752},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10796-014-9534-1},
  doi          = {10.1007/S10796-014-9534-1},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/ZhangBTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/RamaswamyCJP14,
  author       = {Lakshmish Ramaswamy and
                  Barbara Carminati and
                  James B. D. Joshi and
                  Calton Pu},
  title        = {Editorial: Collaborative Computing: Networking, Applications and Worksharing
                  (CollaborateCom 2012)},
  journal      = {Mob. Networks Appl.},
  volume       = {19},
  number       = {5},
  pages        = {634},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11036-014-0532-9},
  doi          = {10.1007/S11036-014-0532-9},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/RamaswamyCJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JinPJ14,
  author       = {Lei Jin and
                  Balaji Palanisamy and
                  James B. D. Joshi},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{POSTER:} Compromising Cloaking-based Location Privacy Preserving
                  Mechanisms with Location Injection Attacks},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1439--1441},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2662386},
  doi          = {10.1145/2660267.2662386},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JinPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ZargarJT14,
  author       = {Saman Taghavi Zargar and
                  James B. D. Joshi and
                  David Tipper},
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {DiCoTraM: {A} distributed and coordinated DDoS flooding attack tailored
                  traffic monitoring},
  booktitle    = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  pages        = {120--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IRI.2014.7051881},
  doi          = {10.1109/IRI.2014.7051881},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ZargarJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/PalanisamySJC14,
  author       = {Balaji Palanisamy and
                  Sheldon Sensenig and
                  James B. D. Joshi and
                  Rose Constantino},
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {{LEAF:} {A} privacy-conscious social network-based intervention tool
                  for {IPV} survivors},
  booktitle    = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  pages        = {138--146},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/IRI.2014.7051883},
  doi          = {10.1109/IRI.2014.7051883},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iri/PalanisamySJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BaracaldoPJ14,
  author       = {Nathalie Baracaldo and
                  Balaji Palanisamy and
                  James B. D. Joshi},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {Geo-Social-RBAC: {A} Location-Based Socially Aware Access Control
                  Framework},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {501--509},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_39},
  doi          = {10.1007/978-3-319-11698-3\_39},
  timestamp    = {Thu, 14 Oct 2021 10:08:32 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BaracaldoPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/JinTLJ14,
  author       = {Lei Jin and
                  Hassan Takabi and
                  Xuelian Long and
                  James B. D. Joshi},
  editor       = {Gail{-}Joon Ahn and
                  Anupam Datta},
  title        = {Exploiting Users' Inconsistent Preferences in Online Social Networks
                  to Discover Private Friendship Links},
  booktitle    = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
                  {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages        = {59--68},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665943.2665956},
  doi          = {10.1145/2665943.2665956},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/JinTLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iri/2014,
  editor       = {James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham and
                  Ling Liu},
  title        = {Proceedings of the 15th {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15,
                  2014},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7036233/proceeding},
  isbn         = {978-1-4799-5880-1},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinJA13,
  author       = {Lei Jin and
                  James B. D. Joshi and
                  Mohd Anwar},
  title        = {Mutual-friend based attacks in social network systems},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {15--30},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.003},
  doi          = {10.1016/J.COSE.2013.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinJA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaracaldoJ13,
  author       = {Nathalie Baracaldo and
                  James Joshi},
  title        = {An adaptive risk management and access control framework to mitigate
                  insider threats},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {237--254},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.08.001},
  doi          = {10.1016/J.COSE.2013.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaracaldoJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/ZargarJT13,
  author       = {Saman Taghavi Zargar and
                  James Joshi and
                  David Tipper},
  title        = {A Survey of Defense Mechanisms Against Distributed Denial of Service
                  (DDoS) Flooding Attacks},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {15},
  number       = {4},
  pages        = {2046--2069},
  year         = {2013},
  url          = {https://doi.org/10.1109/SURV.2013.031413.00127},
  doi          = {10.1109/SURV.2013.031413.00127},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/ZargarJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/CaverleePGJ13,
  author       = {James Caverlee and
                  Calton Pu and
                  Dimitrios Georgakopoulos and
                  James Joshi},
  title        = {Editorial for CollaborateCom 2011 Special Issue},
  journal      = {Mob. Networks Appl.},
  volume       = {18},
  number       = {2},
  pages        = {235--236},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11036-013-0436-0},
  doi          = {10.1007/S11036-013-0436-0},
  timestamp    = {Thu, 07 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/CaverleePGJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdp/MasoumzadehJ13,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Top Location Anonymization for Geosocial Network Datasets},
  journal      = {Trans. Data Priv.},
  volume       = {6},
  number       = {1},
  pages        = {107--126},
  year         = {2013},
  url          = {http://www.tdp.cat/issues11/abs.a132a13.php},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdp/MasoumzadehJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asunam/LongJ13,
  author       = {Xuelian Long and
                  James Joshi},
  editor       = {Jon G. Rokne and
                  Christos Faloutsos},
  title        = {A HITS-based {POI} recommendation algorithm for location-based social
                  networks},
  booktitle    = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13,
                  Niagara, ON, Canada - August 25 - 29, 2013},
  pages        = {642--647},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2492517.2492652},
  doi          = {10.1145/2492517.2492652},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asunam/LongJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MasoumzadehJ13,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Privacy settings in social networking systems: what you cannot control},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {149--154},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484331},
  doi          = {10.1145/2484313.2484331},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MasoumzadehJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LongJJ13,
  author       = {Xuelian Long and
                  Lei Jin and
                  James Joshi},
  editor       = {Elisa Bertino and
                  Dimitrios Georgakopoulos and
                  Mudhakar Srivatsa and
                  Surya Nepal and
                  Alessandro Vinciarelli},
  title        = {Understanding venue popularity in Foursquare},
  booktitle    = {9th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, Austin, TX, USA, October 20-23, 2013},
  pages        = {409--418},
  publisher    = {{ICST} / {IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2013.254258},
  doi          = {10.4108/ICST.COLLABORATECOM.2013.254258},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/LongJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/LongJJ13,
  author       = {Xuelian Long and
                  Lei Jin and
                  James Joshi},
  title        = {Towards understanding traveler behavior in Location-based Social Networks},
  booktitle    = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta,
                  GA, USA, December 9-13, 2013},
  pages        = {3182--3187},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/GLOCOM.2013.6831561},
  doi          = {10.1109/GLOCOM.2013.6831561},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/LongJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BaracaldoJ13,
  author       = {Nathalie Baracaldo and
                  James Joshi},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Beyond accountability: using obligations to reduce risk exposure and
                  deter insider attacks},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {213--224},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462411},
  doi          = {10.1145/2462410.2462411},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BaracaldoJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/air/JungKMJ12,
  author       = {Youna Jung and
                  Minsoo Kim and
                  Amirreza Masoumzadeh and
                  James B. D. Joshi},
  title        = {A survey of security issue in multi-agent systems},
  journal      = {Artif. Intell. Rev.},
  volume       = {37},
  number       = {3},
  pages        = {239--260},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10462-011-9228-8},
  doi          = {10.1007/S10462-011-9228-8},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/air/JungKMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JungJ12,
  author       = {Youna Jung and
                  James B. D. Joshi},
  title        = {CRiBAC: Community-centric role interaction based access control model},
  journal      = {Comput. Secur.},
  volume       = {31},
  number       = {4},
  pages        = {497--523},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.cose.2012.02.002},
  doi          = {10.1016/J.COSE.2012.02.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JungJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcc/TakabiJ12,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  title        = {Semantic-based policy management for cloud computing environments},
  journal      = {Int. J. Cloud Comput.},
  volume       = {1},
  number       = {2/3},
  pages        = {119--144},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJCC.2012.046717},
  doi          = {10.1504/IJCC.2012.046717},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcc/TakabiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/JoshiBPR12,
  author       = {James Joshi and
                  Elisa Bertino and
                  Calton Pu and
                  Heri Ramampiaro},
  title        = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue
                  on "Collaborative Computing: Networking, Applications and Worksharing"},
  journal      = {Mob. Networks Appl.},
  volume       = {17},
  number       = {3},
  pages        = {325--326},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11036-012-0367-1},
  doi          = {10.1007/S11036-012-0367-1},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/JoshiBPR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ShiJZPQ12,
  author       = {Weisong Shi and
                  James Joshi and
                  Tao Zhang and
                  Eun K. Park and
                  Juan Quemada},
  title        = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue
                  on "Collaborative Computing: Networking, Applications and Worksharing"},
  journal      = {Mob. Networks Appl.},
  volume       = {17},
  number       = {3},
  pages        = {376--377},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11036-012-0371-5},
  doi          = {10.1007/S11036-012-0371-5},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/monet/ShiJZPQ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/monet/ChenGJA12,
  author       = {Songqing Chen and
                  Le Gruenwald and
                  James Joshi and
                  Karl Aberer},
  title        = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue
                  on "Collaborative Computing: Networking, Applications and Worksharing"},
  journal      = {Mob. Networks Appl.},
  volume       = {17},
  number       = {4},
  pages        = {506--507},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11036-012-0369-z},
  doi          = {10.1007/S11036-012-0369-Z},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/monet/ChenGJA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/MasoumzadehJ12,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Preserving Structural Properties in Edge-Perturbing Anonymization
                  Techniques for Social Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {877--889},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.65},
  doi          = {10.1109/TDSC.2012.65},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0003LJ12,
  author       = {Lei Jin and
                  Xuelian Long and
                  James B. D. Joshi},
  editor       = {Ting Yu and
                  Mihai Christodorescu},
  title        = {Towards understanding residential privacy by analyzing users' activities
                  in foursquare},
  booktitle    = {Proceedings of the 2012 {ACM} Workshop on Building analysis datasets
                  and gathering experience returns for security, {BADGERS} '12, Raleigh,
                  North Carolina, USA, October 15, 2012},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2382416.2382428},
  doi          = {10.1145/2382416.2382428},
  timestamp    = {Mon, 04 Apr 2022 16:00:12 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/0003LJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/CarminatiRPJ12,
  author       = {Barbara Carminati and
                  Lakshmish Ramaswamy and
                  Calton Pu and
                  James Joshi},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Preface},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6450885/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/CarminatiRPJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JungKJ12,
  author       = {Youna Jung and
                  Minsoo Kim and
                  James B. D. Joshi},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Towards secure cooperation in online social networks},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {80--88},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250707},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250707},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JungKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/TakabiJ12,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  title        = {Policy Management as a Service: An Approach to Manage Policy Heterogeneity
                  in Cloud Computing Environment},
  booktitle    = {45th Hawaii International International Conference on Systems Science
                  {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui,
                  HI, {USA}},
  pages        = {5500--5508},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/HICSS.2012.475},
  doi          = {10.1109/HICSS.2012.475},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/TakabiJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/huc/LongJJ12,
  author       = {Xuelian Long and
                  Lei Jin and
                  James Joshi},
  editor       = {Anind K. Dey and
                  Hao{-}Hua Chu and
                  Gillian R. Hayes},
  title        = {Exploring trajectory-driven local geographic topics in foursquare},
  booktitle    = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh,
                  PA, USA, September 5-8, 2012},
  pages        = {927--934},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2370216.2370423},
  doi          = {10.1145/2370216.2370423},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/huc/LongJJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/JinLJA12,
  author       = {Lei Jin and
                  Xuelian Long and
                  James B. D. Joshi and
                  Mohd Anwar},
  editor       = {Chengcui Zhang and
                  James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham},
  title        = {Analysis of access control mechanisms for users' check-ins in Location-Based
                  Social Network Systems},
  booktitle    = {{IEEE} 13th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},
  pages        = {712--717},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/IRI.2012.6303080},
  doi          = {10.1109/IRI.2012.6303080},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/JinLJA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BaracaldoJ12,
  author       = {Nathalie Baracaldo and
                  James Joshi},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {A trust-and-risk aware {RBAC} framework: tackling insider threat},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {167--176},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295168},
  doi          = {10.1145/2295136.2295168},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BaracaldoJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2012,
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {http://eudl.eu/proceedings/COLLABORATECOM/2012},
  isbn         = {978-1-4673-2740-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iri/2012,
  editor       = {Chengcui Zhang and
                  James Joshi and
                  Elisa Bertino and
                  Bhavani Thuraisingham},
  title        = {{IEEE} 13th International Conference on Information Reuse {\&}
                  Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6294629/proceeding},
  isbn         = {978-1-4673-2282-9},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalizJ11,
  author       = {Dimitris Gritzalis and
                  James Joshi},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {2-3},
  pages        = {89--90},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.11.002},
  doi          = {10.1016/J.COSE.2010.11.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalizJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  title        = {Analysing security and privacy issues of using e-mail address as identity},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {34--58},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043730},
  doi          = {10.1504/IJIPSI.2011.043730},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/MasoumzadehJ11,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  title        = {Ontology-based access control for social network systems},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {1},
  number       = {1},
  pages        = {59--78},
  year         = {2011},
  url          = {https://doi.org/10.1504/IJIPSI.2011.043731},
  doi          = {10.1504/IJIPSI.2011.043731},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/MasoumzadehJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jikm/KayaJS11,
  author       = {Mehmet Kaya and
                  James B. D. Joshi and
                  Mei{-}Ling Shyu},
  title        = {Guest Editorial - Introduction to the Special Issue on Information
                  Reuse and Integration},
  journal      = {J. Inf. Knowl. Manag.},
  volume       = {10},
  number       = {3},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0219649211003000},
  doi          = {10.1142/S0219649211003000},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jikm/KayaJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jikm/LongJ11,
  author       = {Xuelian Long and
                  James Joshi},
  title        = {BaRMS: {A} Bayesian Reputation Management Approach for {P2P} Systems},
  journal      = {J. Inf. Knowl. Manag.},
  volume       = {10},
  number       = {3},
  pages        = {273--283},
  year         = {2011},
  url          = {https://doi.org/10.1142/S0219649211002985},
  doi          = {10.1142/S0219649211002985},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jikm/LongJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JoshiC11,
  author       = {James Joshi and
                  Barbara Carminati},
  title        = {Guest Editorial {SACMAT} 2009 and 2010},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {22:1--22:2},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043622},
  doi          = {10.1145/2043621.2043622},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JoshiC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/JinTJ11,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Towards active detection of identity clone attacks on online social
                  networks},
  booktitle    = {First {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings},
  pages        = {27--38},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1943513.1943520},
  doi          = {10.1145/1943513.1943520},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZargarTJ11,
  author       = {Saman Taghavi Zargar and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {{DCDIDP:} {A} distributed, collaborative, and data-driven intrusion
                  detection and prevention framework for cloud computing environments},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {332--341},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247158},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247158},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZargarTJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/GonzalezAJ11,
  author       = {Jesus M. Gonzalez and
                  Mohd Anwar and
                  James B. D. Joshi},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {A trust-based approach to mitigate rerouting attacks},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {520--523},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247157},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247157},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/GonzalezAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/MasoumzadehJ11,
  author       = {Amirreza Masoumzadeh and
                  James B. D. Joshi},
  editor       = {Elisa Bertino and
                  Maria Luisa Damiani and
                  Gabriel Ghinita},
  title        = {Anonymizing geo-social network datasets},
  booktitle    = {Proceedings of the 4th {ACM} {SIGSPATIAL} International Workshop on
                  Security and Privacy in {GIS} and LBS, {SPRINGL} 2011, November 1st,
                  2011, Chicago, IL, {USA}},
  pages        = {25--32},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2071880.2071886},
  doi          = {10.1145/2071880.2071886},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/MasoumzadehJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AlhajjJS11,
  author       = {Reda Alhajj and
                  James B. D. Joshi and
                  Mei{-}Ling Shyu},
  title        = {Message from program co-chairs},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada,
                  {USA}},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IRI.2011.6009499},
  doi          = {10.1109/IRI.2011.6009499},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/AlhajjJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/JungKJ11,
  author       = {Youna Jung and
                  Minsoo Kim and
                  James B. D. Joshi},
  title        = {DRiBAC: Fine-grained dynamic role interaction access control using
                  ontology},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada,
                  {USA}},
  pages        = {88--93},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/IRI.2011.6009526},
  doi          = {10.1109/IRI.2011.6009526},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/JungKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BaracaldoMJ11,
  author       = {Nathalie Baracaldo and
                  Amirreza Masoumzadeh and
                  James Joshi},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {A secure, constraint-aware role-based access control interoperation
                  framework},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {200--207},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6060001},
  doi          = {10.1109/ICNSS.2011.6060001},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BaracaldoMJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GonzalezAJ11,
  author       = {Jesus M. Gonzalez and
                  Mohd Anwar and
                  James B. D. Joshi},
  title        = {A trust-based approach against IP-spoofing attacks},
  booktitle    = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011,
                  19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {63--70},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/PST.2011.5971965},
  doi          = {10.1109/PST.2011.5971965},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pst/GonzalezAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/GonzalezAJ11,
  author       = {Jesus M. Gonzalez and
                  Mohd Anwar and
                  James B. D. Joshi},
  title        = {Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless
                  Networks: {A} Survey},
  booktitle    = {{IEEE} 10th International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2011, Changsha, China, 16-18
                  November, 2011},
  pages        = {556--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/TrustCom.2011.72},
  doi          = {10.1109/TRUSTCOM.2011.72},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/GonzalezAJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/procedia/MasoumzadehJ11,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  editor       = {Elhadi M. Shakshuki and
                  Muhammad Younas},
  title        = {An Alternative Approach to k-Anonymity for Location-Based Services},
  booktitle    = {Proceedings of the 2nd International Conference on Ambient Systems,
                  Networks and Technologies {(ANT} 2011), the 8th International Conference
                  on Mobile Web Information Systems (MobiWIS-2011), Niagara Falls, Ontario,
                  Canada, September 19-21, 2011},
  series       = {Procedia Computer Science},
  volume       = {5},
  pages        = {522--530},
  publisher    = {Elsevier},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.procs.2011.07.068},
  doi          = {10.1016/J.PROCS.2011.07.068},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/procedia/MasoumzadehJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2011,
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {http://eudl.eu/proceedings/COLLABORATECOM/2011},
  isbn         = {978-1-4673-0683-6},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {Security and Privacy Challenges in Cloud Computing Environments},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {8},
  number       = {6},
  pages        = {24--31},
  year         = {2010},
  url          = {https://doi.org/10.1109/MSP.2010.186},
  doi          = {10.1109/MSP.2010.186},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/AbererJ10,
  author       = {Karl Aberer and
                  James Joshi},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {Message from the general chairs},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--2},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://ieeexplore.ieee.org/document/5766988/},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/AbererJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/MasoumzadehJ10,
  author       = {Amirreza Masoumzadeh and
                  James Joshi},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {Preserving structural properties in anonymization of social networks},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.7},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.7},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/MasoumzadehJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZargarJ10,
  author       = {Saman Taghavi Zargar and
                  James B. D. Joshi},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {A collaborative approach to facilitate intrusion detection and response
                  against DDoS attacks},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--8},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.46},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.46},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/ZargarJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/TakabiJA10,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Gail{-}Joon Ahn},
  title        = {SecureCloud: Towards a Comprehensive Security Framework for Cloud
                  Computing Environments},
  booktitle    = {Workshop Proceedings of the 34th Annual {IEEE} International Computer
                  Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul,
                  Korea, 19-23 July 2010},
  pages        = {393--398},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSACW.2010.74},
  doi          = {10.1109/COMPSACW.2010.74},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/ZhangJ10,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Waleed W. Smari and
                  William K. McQuay},
  title        = {Role-based domain discovery in decentralized secure interoperations},
  booktitle    = {2010 International Symposium on Collaborative Technologies and Systems,
                  {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010},
  pages        = {84--93},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/CTS.2010.5478522},
  doi          = {10.1109/CTS.2010.5478522},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/ZhangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ht/GuoJ10,
  author       = {Yanhui Guo and
                  James B. D. Joshi},
  editor       = {Mark H. Chignell and
                  Elaine G. Toms},
  title        = {Topic-based personalized recommendation for collaborative tagging
                  system},
  booktitle    = {HT'10, Proceedings of the 21st {ACM} Conference on Hypertext and Hypermedia,
                  Toronto, Ontario, Canada, June 13-16, 2010},
  pages        = {61--66},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1810617.1810629},
  doi          = {10.1145/1810617.1810629},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ht/GuoJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/LongJ10,
  author       = {Xuelian Long and
                  James Joshi},
  title        = {Enhanced One-Pass {IP} Multimedia Subsystem Authentication Protocol
                  for {UMTS}},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2010, Cape Town, South Africa, 23-27 May 2010},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICC.2010.5502126},
  doi          = {10.1109/ICC.2010.5502126},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/LongJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/ZhangJ10,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Joaquim Filipe and
                  Jos{\'{e}} Cordeiro},
  title        = {Understanding Access Control Challenges in Loosely-Coupled Multidomain
                  Environments},
  booktitle    = {{ICEIS} 2010 - Proceedings of the 12th International Conference on
                  Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira,
                  Portugal, June 8 - 12, 2010},
  pages        = {356--361},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Tue, 04 Jan 2011 08:32:08 +0100},
  biburl       = {https://dblp.org/rec/conf/iceis/ZhangJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AlhajjCHJLRSZ10,
  author       = {Reda Alhajj and
                  Shu{-}Ching Chen and
                  Gongzhu Hu and
                  James B. D. Joshi and
                  Gordon K. Lee and
                  Stuart Harvey Rubin and
                  Mei{-}Ling Shyu and
                  Lotfi A. Zadeh},
  title        = {Panel title: Critical need for funding of basic and applied research
                  in large-scale computing},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada,
                  {USA}},
  pages        = {1},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IRI.2010.5558979},
  doi          = {10.1109/IRI.2010.5558979},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/AlhajjCHJLRSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/AlhajjJS10,
  author       = {Reda Alhajj and
                  James B. D. Joshi and
                  Mei{-}Ling Shyu},
  title        = {Message from Program Co-Chairs},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada,
                  {USA}},
  pages        = {1},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IRI.2010.5558982},
  doi          = {10.1109/IRI.2010.5558982},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/AlhajjJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/LongJ10,
  author       = {Xuelian Long and
                  James Joshi},
  title        = {BaRMS: {A} Bayesian Reputation Management approach for {P2P} systems},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada,
                  {USA}},
  pages        = {147--152},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/IRI.2010.5558948},
  doi          = {10.1109/IRI.2010.5558948},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/LongJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TakabiJ10,
  author       = {Hassan Takabi and
                  James B. D. Joshi},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {StateMiner: an efficient similarity-based approach for optimal mining
                  of role hierarchy},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {55--64},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809853},
  doi          = {10.1145/1809842.1809853},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/TakabiJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/MasoumzadehJ10,
  author       = {Amirreza Masoumzadeh and
                  James B. D. Joshi},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {{OSNAC:} An Ontology-based Access Control Model for Social Networking
                  Systems},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {751--759},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.116},
  doi          = {10.1109/SOCIALCOM.2010.116},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/MasoumzadehJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/JinTJ10,
  author       = {Lei Jin and
                  Hassan Takabi and
                  James B. D. Joshi},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {Security and Privacy Risks of Using E-mail Address as an Identity},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {906--913},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.134},
  doi          = {10.1109/SOCIALCOM.2010.134},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/JinTJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2010,
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {http://eudl.eu/proceedings/COLLABORATECOM/2010},
  isbn         = {978-963-9995-24-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2010,
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842},
  doi          = {10.1145/1809842},
  isbn         = {978-1-4503-0049-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/CaicedoJT09,
  author       = {Carlos E. Caicedo and
                  James B. D. Joshi and
                  Summit R. Tuladhar},
  title        = {IPv6 Security Challenges},
  journal      = {Computer},
  volume       = {42},
  number       = {2},
  pages        = {36--42},
  year         = {2009},
  url          = {https://doi.org/10.1109/MC.2009.54},
  doi          = {10.1109/MC.2009.54},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/CaicedoJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/TakabiJK09,
  author       = {Hassan Takabi and
                  James B. D. Joshi and
                  Hassan A. Karimi},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {A collaborative k-anonymity approach for location privacy in location-based
                  services},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--9},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8374},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8374},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/TakabiJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/MasoumzadehJK09,
  author       = {Amirreza Masoumzadeh and
                  James Joshi and
                  Hassan A. Karimi},
  editor       = {Divyakant Agrawal and
                  Walid G. Aref and
                  Chang{-}Tien Lu and
                  Mohamed F. Mokbel and
                  Peter Scheuermann and
                  Cyrus Shahabi and
                  Ouri Wolfson},
  title        = {{LBS} (k, T)-anonymity: a spatio-temporal approach to anonymity for
                  location-based service users},
  booktitle    = {17th {ACM} {SIGSPATIAL} International Symposium on Advances in Geographic
                  Information Systems, {ACM-GIS} 2009, November 4-6, 2009, Seattle,
                  Washington, USA, Proceedings},
  pages        = {464--467},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1653771.1653845},
  doi          = {10.1145/1653771.1653845},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/MasoumzadehJK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/ZargarMBNJ09,
  author       = {Saman Taghavi Zargar and
                  M. Amir Moulavi and
                  Rajkumar Buyya and
                  Mahmoud Naghibzadeh and
                  James B. D. Joshi},
  editor       = {Gabriel A. Wainer and
                  Clifford A. Shaffer and
                  Robert M. McGraw and
                  Michael J. Chinni},
  title        = {{RRNA:} reliable soft real-time network aware grid scheduling algorithm
                  using round trip time},
  booktitle    = {Proceedings of the 2009 Spring Simulation Multiconference, SpringSim
                  2009, San Diego, California, USA, March 22-27, 2009},
  publisher    = {{SCS/ACM}},
  year         = {2009},
  url          = {http://dl.acm.org/citation.cfm?id=1639809.1639891},
  timestamp    = {Mon, 10 Dec 2012 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/springsim/ZargarMBNJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/TakabiKJS09,
  author       = {Hassan Takabi and
                  Minsoo Kim and
                  James B. D. Joshi and
                  Michael B. Spring},
  editor       = {Ernesto Damiani and
                  Seth Proctor and
                  Anoop Singhal},
  title        = {An architecture for specification and enforcement of temporal access
                  control constraints using {OWL}},
  booktitle    = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS}
                  2009, Chicago, Illinois, USA, November 13, 2009},
  pages        = {21--28},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655121.1655127},
  doi          = {10.1145/1655121.1655127},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/TakabiKJS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2008,
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  publisher    = {Springer / {ICST}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03354-4},
  doi          = {10.1007/978-3-642-03354-4},
  isbn         = {978-3-642-03353-7},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/colcom/2009,
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {http://eudl.eu/proceedings/COLLABORATECOM/2009},
  isbn         = {978-963-9799-76-9},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2009,
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207},
  doi          = {10.1145/1542207},
  isbn         = {978-1-60558-537-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/ZhangJ09,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Administration Model for {RBAC}},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {58},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_1507},
  doi          = {10.1007/978-0-387-39940-9\_1507},
  timestamp    = {Sun, 02 Jun 2019 21:10:27 +0200},
  biburl       = {https://dblp.org/rec/reference/db/ZhangJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/ZhangJ09a,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {{ANSI/INCITS} {RBAC} Standard},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {91--92},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_1508},
  doi          = {10.1007/978-0-387-39940-9\_1508},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/db/ZhangJ09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/ZhangJ09b,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {{GEO-RBAC} Model},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {1244--1245},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_1509},
  doi          = {10.1007/978-0-387-39940-9\_1509},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/db/ZhangJ09b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/ZhangJ09c,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Role Based Access Control},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {2447--2452},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_320},
  doi          = {10.1007/978-0-387-39940-9\_320},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/db/ZhangJ09c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/ZhangJ09d,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Temporal Access Control},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {2920--2924},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_385},
  doi          = {10.1007/978-0-387-39940-9\_385},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/db/ZhangJ09d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/JoshiBGZ08,
  author       = {James B. D. Joshi and
                  Elisa Bertino and
                  Arif Ghafoor and
                  Yue Zhang},
  title        = {Formal foundations for hybrid hierarchies in {GTRBAC}},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {10},
  number       = {4},
  pages        = {2:1--2:39},
  year         = {2008},
  url          = {https://doi.org/10.1145/1284680.1284682},
  doi          = {10.1145/1284680.1284682},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/JoshiBGZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KimJK08,
  author       = {Minsoo Kim and
                  James B. D. Joshi and
                  Minkoo Kim},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {Access Control for Cooperation Systems Based on Group Situation},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {11--23},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_2},
  doi          = {10.1007/978-3-642-03354-4\_2},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/KimJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JungMJK08,
  author       = {Youna Jung and
                  Amirreza Masoumzadeh and
                  James B. D. Joshi and
                  Minkoo Kim},
  editor       = {Elisa Bertino and
                  James B. D. Joshi},
  title        = {RiBAC: Role Interaction Based Access Control Model for Community Computing},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing,
                  4th International Conference, CollaborateCom 2008, Orlando, FL, USA,
                  November 13-16, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {10},
  pages        = {304--321},
  publisher    = {Springer / {ICST}},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-03354-4\_23},
  doi          = {10.1007/978-3-642-03354-4\_23},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JungMJK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JiangJ08,
  author       = {Michael Jiang and
                  James Joshi},
  title        = {Message from the {IWSSE} 2008 Workshop Organizers},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {935},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.263},
  doi          = {10.1109/COMPSAC.2008.263},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/JiangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JiangJ08a,
  author       = {Michael Jiang and
                  James Joshi},
  title        = {{IWSSE} 2008 Workshop Organization},
  booktitle    = {Proceedings of the 32nd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008,
                  Turku, Finland},
  pages        = {936},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/COMPSAC.2008.264},
  doi          = {10.1109/COMPSAC.2008.264},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/JiangJ08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/ZhangJ08,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Cheng{-}Zhong Xu and
                  Minyi Guo},
  title        = {Temporal {UAS:} Supporting Efficient {RBAC} Authorization in Presence
                  of the Temporal Role Hierarchy},
  booktitle    = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous
                  Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume
                  {II:} Workshops},
  pages        = {264--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/EUC.2008.185},
  doi          = {10.1109/EUC.2008.185},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/ZhangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/otm/MasoumzadehJ08,
  author       = {Amirreza Masoumzadeh and
                  James B. D. Joshi},
  editor       = {Robert Meersman and
                  Zahir Tari},
  title        = {PuRBAC: Purpose-Aware Role-Based Access Control},
  booktitle    = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008
                  Confederated International Conferences, CoopIS, DOA, GADA, IS, and
                  {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5332},
  pages        = {1104--1121},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88873-4\_12},
  doi          = {10.1007/978-3-540-88873-4\_12},
  timestamp    = {Fri, 08 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/otm/MasoumzadehJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangJ08,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {{UAQ:} a framework for user authorization query processing in {RBAC}
                  extended with hybrid hierarchy and constraints},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377850},
  doi          = {10.1145/1377836.1377850},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sutc/TuladharCJ08,
  author       = {Summit R. Tuladhar and
                  Carlos E. Caicedo and
                  James B. D. Joshi},
  editor       = {Mukesh Singhal and
                  Giovanna Di Marzo Serugendo and
                  Jeffrey J. P. Tsai and
                  Wang{-}Chien Lee and
                  Kay R{\"{o}}mer and
                  Yu{-}Chee Tseng and
                  Han C. W. Hsiao},
  title        = {Inter-domain Authentication for Seamless Roaming in Heterogeneous
                  Wireless Networks},
  booktitle    = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and
                  Trustworthy Computing {(SUTC} 2008), 11-13 June 2008, Taichung, Taiwan},
  pages        = {249--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/SUTC.2008.61},
  doi          = {10.1109/SUTC.2008.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sutc/TuladharCJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/ZhangJ07,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Ning Zhang and
                  Ajith Abraham},
  title        = {{SARBAC07:} {A} Scoped Administration Model for {RBAC} with Hybrid
                  Hierarchy},
  booktitle    = {Proceedings of the Third International Symposium on Information Assurance
                  and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom},
  pages        = {149--154},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IAS.2007.90},
  doi          = {10.1109/IAS.2007.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/ZhangJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ZhangJ07,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Juan Quemada and
                  Tao Zhang},
  title        = {A request-driven secure interoperation framework in loosely-coupled
                  multi-domain environments employing {RBAC} policies},
  booktitle    = {Proceedings of the 3rd International Conference on Collaborative Computing:
                  Networking, Applications and Worksharing, White Plains, New York,
                  USA, November 12-15, 2007},
  pages        = {25--32},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2007},
  url          = {https://doi.org/10.1109/COLCOM.2007.4553805},
  doi          = {10.1109/COLCOM.2007.4553805},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ZhangJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/OuyangJ07,
  author       = {Kai Ouyang and
                  James B. D. Joshi},
  title        = {{CT-RBAC:} {A} Temporal {RBAC} Model with Conditional Periodic Time},
  booktitle    = {Proceedings of the 26th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
                  Orleans, Louisiana, {USA}},
  pages        = {467--474},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PCCC.2007.358928},
  doi          = {10.1109/PCCC.2007.358928},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/OuyangJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ZhangJ07,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  title        = {{ARBAC07:} {A} Role-based Administration Model for {RBAC} with Hybrid
                  Hierarchy},
  booktitle    = {Proceedings of the {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada,
                  {USA}},
  pages        = {196--202},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/IRI.2007.4296620},
  doi          = {10.1109/IRI.2007.4296620},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ZhangJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/ChuangPJ06,
  author       = {Michael Chuang and
                  Suronapee Phoomvuthisarn and
                  James B. D. Joshi},
  editor       = {Enrico Blanzieri and
                  Tao Zhang},
  title        = {An Integrated Framework for Trust-Based Access Control for Open Systems},
  booktitle    = {2nd International {ICST} Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA,
                  November 17-20, 2006},
  publisher    = {{IEEE} Computer Society / {ICST}},
  year         = {2006},
  url          = {https://doi.org/10.1109/COLCOM.2006.361881},
  doi          = {10.1109/COLCOM.2006.361881},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/ChuangPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ParkKNJ06,
  author       = {Jun{-}Hyung Park and
                  Minsoo Kim and
                  BongNam Noh and
                  James B. D. Joshi},
  title        = {A similarity based technique for detecting malicious executable files
                  for computer forensics},
  booktitle    = {Proceedings of the 2006 {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} - 2006: Heuristic Systems Engineering,
                  September 16-18, 2006, Waikoloa, Hawaii, {USA}},
  pages        = {188--193},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/IRI.2006.252411},
  doi          = {10.1109/IRI.2006.252411},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ParkKNJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itrust/ChandranPJ06,
  author       = {Suroop Mohan Chandran and
                  Korporn Panyim and
                  James B. D. Joshi},
  editor       = {Ketil St{\o}len and
                  William H. Winsborough and
                  Fabio Martinelli and
                  Fabio Massacci},
  title        = {A Requirements-Driven Trust Framework for Secure Interoperation in
                  Open Environments},
  booktitle    = {Trust Management, 4th International Conference, iTrust 2006, Pisa,
                  Italy, May 16-19, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3986},
  pages        = {33--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11755593\_4},
  doi          = {10.1007/11755593\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/itrust/ChandranPJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JoshiB06,
  author       = {James B. D. Joshi and
                  Elisa Bertino},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Fine-grained role-based delegation in presence of the hybrid role
                  hierarchy},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133071},
  doi          = {10.1145/1133058.1133071},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/JoshiB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/DuJ06,
  author       = {Siqing Du and
                  James B. D. Joshi},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Supporting authorization query and inter-domain role mapping in presence
                  of hybrid role hierarchy},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {228--236},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133090},
  doi          = {10.1145/1133058.1133090},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/DuJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JoshiBG05,
  author       = {James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {An Analysis of Expressiveness and Design Issues for the Generalized
                  Temporal Role-Based Access Control Model},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {2},
  pages        = {157--175},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.18},
  doi          = {10.1109/TDSC.2005.18},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/JoshiBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattiGBJ05,
  author       = {Rafae Bhatti and
                  Arif Ghafoor and
                  Elisa Bertino and
                  James Joshi},
  title        = {{X-GTRBAC:} an XML-based policy specification framework and architecture
                  for enterprise-wide access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {2},
  pages        = {187--227},
  year         = {2005},
  url          = {https://doi.org/10.1145/1065545.1065547},
  doi          = {10.1145/1065545.1065547},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattiGBJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BhattiSBGJ05,
  author       = {Rafae Bhatti and
                  Basit Shafiq and
                  Elisa Bertino and
                  Arif Ghafoor and
                  James Joshi},
  title        = {X-gtrbac admin: {A} decentralized administration model for enterprise-wide
                  access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {388--423},
  year         = {2005},
  url          = {https://doi.org/10.1145/1108906.1108909},
  doi          = {10.1145/1108906.1108909},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BhattiSBGJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/JoshiBLG05,
  author       = {James Joshi and
                  Elisa Bertino and
                  Usman Latif and
                  Arif Ghafoor},
  title        = {A Generalized Temporal Role-Based Access Control Model},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {17},
  number       = {1},
  pages        = {4--23},
  year         = {2005},
  url          = {https://doi.org/10.1109/TKDE.2005.1},
  doi          = {10.1109/TKDE.2005.1},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/JoshiBLG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/ShafiqJBG05,
  author       = {Basit Shafiq and
                  James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Secure Interoperation in a Multidomain Environment Employing {RBAC}
                  Policies},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {17},
  number       = {11},
  pages        = {1557--1577},
  year         = {2005},
  url          = {https://doi.org/10.1109/TKDE.2005.185},
  doi          = {10.1109/TKDE.2005.185},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/ShafiqJBG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ChandranJ05,
  author       = {Suroop Mohan Chandran and
                  James B. D. Joshi},
  editor       = {Du Zhang and
                  Taghi M. Khoshgoftaar and
                  Mei{-}Ling Shyu},
  title        = {Towards administration of a hybrid role hierarchy},
  booktitle    = {Proceedings of the 2005 {IEEE} International Conference on Information
                  Reuse and Integration, {IRI} - 2005, August 15-17, 2005, Las Vegas
                  Hilton, Las Vegas, NV, {USA}},
  pages        = {500--505},
  publisher    = {{IEEE} Systems, Man, and Cybernetics Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IRI-05.2005.1506523},
  doi          = {10.1109/IRI-05.2005.1506523},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ChandranJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/ChandranJ05,
  author       = {Suroop Mohan Chandran and
                  James B. D. Joshi},
  editor       = {Anne H. H. Ngu and
                  Masaru Kitsuregawa and
                  Erich J. Neuhold and
                  Jen{-}Yao Chung and
                  Quan Z. Sheng},
  title        = {\emph{LoT-RBAC}: {A} Location and Time-Based {RBAC} Model},
  booktitle    = {Web Information Systems Engineering - {WISE} 2005, 6th International
                  Conference on Web Information Systems Engineering, New York, NY, USA,
                  November 20-22, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3806},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11581062\_27},
  doi          = {10.1007/11581062\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/ChandranJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/words/ShafiqMJG05,
  author       = {Basit Shafiq and
                  Ammar Masood and
                  James Joshi and
                  Arif Ghafoor},
  title        = {A Role-Based Access Control Policy Verification Framework for Real-Time
                  Systems},
  booktitle    = {10th {IEEE} International Workshop on Object-Oriented Real-Time Dependable
                  Systems {(WORDS} 2005), 2-4 February 2005, Sedona, AZ, {USA}},
  pages        = {13--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WORDS.2005.11},
  doi          = {10.1109/WORDS.2005.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/words/ShafiqMJG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/words/PiromruenJ05,
  author       = {Smithi Piromruen and
                  James B. D. Joshi},
  title        = {An {RBAC} Framework for Time Constrained Secure Interoperation in
                  Multi-domain Environments},
  booktitle    = {10th {IEEE} International Workshop on Object-Oriented Real-Time Dependable
                  Systems {(WORDS} 2005), 2-4 February 2005, Sedona, AZ, {USA}},
  pages        = {36--48},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/WORDS.2005.18},
  doi          = {10.1109/WORDS.2005.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/words/PiromruenJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/BhattiBGJ04,
  author       = {Rafae Bhatti and
                  Elisa Bertino and
                  Arif Ghafoor and
                  James Joshi},
  title        = {XML-Based Specification for Web Services Document Security},
  journal      = {Computer},
  volume       = {37},
  number       = {4},
  pages        = {41--49},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.1297300},
  doi          = {10.1109/MC.2004.1297300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/BhattiBGJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/JoshiBBG04,
  author       = {James Joshi and
                  Rafae Bhatti and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Access-Control Language for Multidomain Environments},
  journal      = {{IEEE} Internet Comput.},
  volume       = {8},
  number       = {6},
  pages        = {40--50},
  year         = {2004},
  url          = {https://doi.org/10.1109/MIC.2004.53},
  doi          = {10.1109/MIC.2004.53},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/JoshiBBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BhattiJBG04,
  author       = {Rafae Bhatti and
                  James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Trent Jaeger and
                  Elena Ferrari},
  title        = {{X-GTRBAC} admin: a decentralized administration model for enterprise
                  wide access control},
  booktitle    = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages        = {78--86},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/990036.990049},
  doi          = {10.1145/990036.990049},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BhattiJBG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BertinoCJDS04,
  author       = {Elisa Bertino and
                  Bruno Crispo and
                  James Joshi and
                  Wengliang (Kevin) Du and
                  Ravi S. Sandhu},
  editor       = {Trent Jaeger and
                  Elena Ferrari},
  title        = {Security for grid-based computing systems issues and challenges},
  booktitle    = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings},
  pages        = {125},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/990036.990056},
  doi          = {10.1145/990036.990056},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BertinoCJDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/BhattiJBG03,
  author       = {Rafae Bhatti and
                  James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Liang{-}Jie Zhang},
  title        = {Access Control in Dynamic XML-Based Web-Services with {X-RBAC}},
  booktitle    = {Proceedings of the International Conference on Web Services, {ICWS}
                  '03, June 23 - 26, 2003, Las Vegas, Nevada, {USA}},
  pages        = {243--249},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Tue, 04 May 2004 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icws/BhattiJBG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JoshiSGB03,
  author       = {James Joshi and
                  Basit Shafiq and
                  Arif Ghafoor and
                  Elisa Bertino},
  editor       = {Elena Ferrari and
                  David F. Ferraiolo},
  title        = {Dependencies and separation of duty constraints in {GTRBAC}},
  booktitle    = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages        = {51--64},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/775412.775420},
  doi          = {10.1145/775412.775420},
  timestamp    = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/JoshiSGB03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmm/JoshiLFSG02,
  author       = {James B. D. Joshi and
                  Zhaohui Kevin Li and
                  Husni Fahmi and
                  Basit Shafiq and
                  Arif Ghafoor},
  title        = {A model for secure multimedia document database system in a distributed
                  environment},
  journal      = {{IEEE} Trans. Multim.},
  volume       = {4},
  number       = {2},
  pages        = {215--234},
  year         = {2002},
  url          = {https://doi.org/10.1109/TMM.2002.1017735},
  doi          = {10.1109/TMM.2002.1017735},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmm/JoshiLFSG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/JoshiBG02,
  author       = {James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  title        = {Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control
                  Model},
  booktitle    = {26th International Computer Software and Applications Conference {(COMPSAC}
                  2002), Prolonging Software Life: Development and Redevelopment, 26-29
                  August 2002, Oxford, England, Proceedings},
  pages        = {951--956},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/CMPSAC.2002.1045128},
  doi          = {10.1109/CMPSAC.2002.1045128},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/JoshiBG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/JoshiBG02,
  author       = {James Joshi and
                  Elisa Bertino and
                  Arif Ghafoor},
  editor       = {Ravi S. Sandhu and
                  Elisa Bertino},
  title        = {Temporal hierarchies and inheritance semantics for {GTRBAC}},
  booktitle    = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
                  2002},
  pages        = {74--83},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/507711.507724},
  doi          = {10.1145/507711.507724},
  timestamp    = {Tue, 09 Feb 2021 08:50:30 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/JoshiBG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ads/JoshiGAS02,
  author       = {James B. D. Joshi and
                  Arif Ghafoor and
                  Walid G. Aref and
                  Eugene H. Spafford},
  editor       = {William J. McIver Jr. and
                  Ahmed K. Elmagarmid},
  title        = {Security and Privacy Challenges of a Digital Government},
  booktitle    = {Advances in Digital Government - Technology, Human Factors, and Policy},
  series       = {Advances in Database Systems},
  volume       = {26},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/0-306-47374-7\_7},
  doi          = {10.1007/0-306-47374-7\_7},
  timestamp    = {Tue, 16 May 2017 14:24:24 +0200},
  biburl       = {https://dblp.org/rec/series/ads/JoshiGAS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JoshiAGS01,
  author       = {James Joshi and
                  Walid G. Aref and
                  Arif Ghafoor and
                  Eugene H. Spafford},
  title        = {Security models for web-based applications},
  journal      = {Commun. {ACM}},
  volume       = {44},
  number       = {2},
  pages        = {38--44},
  year         = {2001},
  url          = {https://doi.org/10.1145/359205.359224},
  doi          = {10.1145/359205.359224},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JoshiAGS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JoshiGAS01,
  author       = {James Joshi and
                  Arif Ghafoor and
                  Walid G. Aref and
                  Eugene H. Spafford},
  title        = {Digital Government Security Infrastructure Design Challenges},
  journal      = {Computer},
  volume       = {34},
  number       = {2},
  pages        = {66--72},
  year         = {2001},
  url          = {https://doi.org/10.1109/2.901169},
  doi          = {10.1109/2.901169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JoshiGAS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/JoshiG00,
  author       = {James Joshi and
                  Arif Ghafoor},
  title        = {A Petri-Net Based Multilevel Security Specification Model for Multimedia
                  Documents},
  booktitle    = {2000 {IEEE} International Conference on Multimedia and Expo, {ICME}
                  2000, New York, NY, USA, July 30 - August 2, 2000},
  pages        = {533--536},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICME.2000.869656},
  doi          = {10.1109/ICME.2000.869656},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icmcs/JoshiG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/SedighJBG98,
  author       = {Sahra Sedigh and
                  James Joshi and
                  Ahmed R. Bashandy and
                  Arif Ghafoor},
  title        = {Evaluation of Filtering Mechanisms for {MPEG} Video Communications},
  booktitle    = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS}
                  1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings},
  pages        = {449--454},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/RELDIS.1998.740539},
  doi          = {10.1109/RELDIS.1998.740539},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/SedighJBG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics