Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Sushil Jajodia
2010 – today
- 2013
[j153]Zi Chu, Steven Gianvecchio, Aaron Koehl, Haining Wang, Sushil Jajodia: Blog or block: Detecting blog bots through behavioral biometrics. Computer Networks 57(3): 634-646 (2013)
[j152]Yan Yang, Yulong Zhang, Alex Hai Wang, Meng Yu, Wanyu Zang, Peng Liu, Sushil Jajodia: Quantitative survivability evaluation of three virtual machine-based server architectures. J. Network and Computer Applications 36(2): 781-790 (2013)
[j151]
[j150]
[j149]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini: Preserving privacy against external and internal threats in WSN data aggregation. Telecommunication Systems 52(4): 2163-2176 (2013)
[j148]Sushil Jajodia, Witold Litwin, S. J. Thomas Schwarz: Recoverable Encryption through a Noised Secret over a Large Cloud. T. Large-Scale Data- and Knowledge-Centered Systems 9: 42-64 (2013)
[j147]Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: Providing Users' Anonymity in Mobile Hybrid Networks. ACM Trans. Internet Techn. 12(3): 7 (2013)
[c249]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati: Extending Loose Associations to Multiple Fragments. DBSec 2013: 1-16
[c248]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing: TerraCheck: Verification of Dedicated Cloud Storage. DBSec 2013: 113-127
[c247]Meixing Le, Krishna Kant, Sushil Jajodia: Rule Enforcement with Third Parties in Secure Cooperative Data Access. DBSec 2013: 282-288
[c246]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: On information leakage by indexes over data fragments. ICDE Workshops 2013: 94-98
[p18]Don Torrieri, Sencun Zhu, Sushil Jajodia: Cyber Maneuver Against External Adversaries and Compromised Nodes. Moving Target Defense 2013: 87-96
[e37]Jason Crampton, Sushil Jajodia, Keith Mayes (Eds.): Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9
[e36]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1- 2012
[j146]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia: Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? IEEE Trans. Dependable Sec. Comput. 9(6): 811-824 (2012)
[j145]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia: Secure Data Aggregation in Wireless Sensor Networks. IEEE Transactions on Information Forensics and Security 7(3): 1040-1052 (2012)
[j144]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Giuseppe Psaila, Pierangela Samarati: Integrating trust management and access control in data-intensive Web applications. TWEB 6(2): 6 (2012)
[c245]Sushil Jajodia, Witold Litwin, S. J. Thomas Schwarz: Securing password recovery through dispersion. CASoN 2012: 228-233
[c244]Meixing Le, Krishna Kant, Sushil Jajodia: Access rule consistency in cooperative data access environment. CollaborateCom 2012: 11-20
[c243]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga: Enforcing Subscription-Based Authorization Policies in Cloud Scenarios. DBSec 2012: 314-329
[c242]Massimiliano Albanese, Sushil Jajodia, Steven Noel: Time-efficient and cost-effective network hardening using attack graphs. DSN 2012: 1-12
[c241]Massimiliano Albanese, Alessandra De Benedictis, Sushil Jajodia, Paulo Shakarian: A Probabilistic Framework for Localization of Attackers in MANETs. ESORICS 2012: 145-162
[c240]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz: Recoverable Encryption through Noised Secret over a Large Cloud. Globe 2012: 13-24
[c239]Zhan Wang, Kun Sun, Sushil Jajodia, Jiwu Jing: Disk storage isolation and verification in cloud. GLOBECOM 2012: 771-776
[c238]Arun Natarajan, Peng Ning, Yao Liu, Sushil Jajodia, Steve E. Hutchinson: NSDMiner: Automated discovery of Network Service Dependencies. INFOCOM 2012: 2507-2515
[c237]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Support for Write Privileges on Outsourced Data. SEC 2012: 199-210
[c236]
[c235]Alessio Di Mauro, Alessandro Mei, Sushil Jajodia: Secure File Allocation and Caching in Large-scale Distributed Systems. SECRYPT 2012: 182-191
[c234]Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal: Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. SRDS 2012: 31-40
[c233]Nelson Nazzicari, Javier Almillategui, Angelos Stavrou, Sushil Jajodia: Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification. STM 2012: 161-176- 2011
[j143]Michael E. Locasto, Anup K. Ghosh, Sushil Jajodia, Angelos Stavrou: The ephemeral legion: producing an expert cyber-security work force from thin air. Commun. ACM 54(1): 129-131 (2011)
[j142]Sushil Jajodia, Jianying Zhou: Message from the Guest Editors. Int. J. Inf. Sec. 10(5): 267-268 (2011)
[j141]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Selective data outsourcing for enforcing privacy. Journal of Computer Security 19(3): 531-566 (2011)
[j140]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Authorization enforcement in distributed query evaluation. Journal of Computer Security 19(4): 751-794 (2011)
[j139]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia: Securing Topology Maintenance Protocols for Sensor Networks. IEEE Trans. Dependable Sec. Comput. 8(3): 450-465 (2011)
[j138]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4): 541-566 (2011)
[c232]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian: Scalable Detection of Cyber Attacks. CISIM 2011: 9-18
[c231]Meixing Le, Krishna Kant, Sushil Jajodia: Cooperative Data Access in Multi-cloud Environments. DBSec 2011: 14-28
[c230]Massimiliano Albanese, Sushil Jajodia, Andrea Pugliese, V. S. Subrahmanian: Scalable Analysis of Attack Scenarios. ESORICS 2011: 416-433
[c229]Krishna Kant, Meixing Le, Sushil Jajodia: Security Considerations in Data Center Configuration Management. SafeConfig 2011
[c228]Meixing Le, Zhaohui Wang, Quan Jia, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Trading Elephants for Ants: Efficient Post-attack Reconstitution. SecureComm 2011: 460-469
[c227]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Private data indexes for selective access to outsourced data. WPES 2011: 69-80
[c226]Witold Litwin, Sushil Jajodia, Thomas J. E. Schwarz: Privacy of data outsourced to a cloud for selected readers through client-side encryption. WPES 2011: 171-176
[e35]Sushil Jajodia, Chandan Mazumdar (Eds.): Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5
[e34]Henk C. A. van Tilborg, Sushil Jajodia (Eds.): Encyclopedia of Cryptography and Security, 2nd Ed. Springer 2011, ISBN 978-1-4419-5905-8
[e33]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2- 2010
[j137]Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati: Access control for smarter healthcare using policy spaces. Computers & Security 29(8): 848-858 (2010)
[j136]Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring Security Risk of Networks Using Attack Graphs. IJNGC 1(1) (2010)
[j135]
[j134]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragments and Loose Associations: Respecting Privacy in Data Publishing. PVLDB 3(1): 1370-1381 (2010)
[j133]Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang, Sushil Jajodia: An Application-Level Data Transparent Authentication Scheme without Communication Overhead. IEEE Trans. Computers 59(7): 943-954 (2010)
[j132]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang: Providing witness anonymity under peer-to-peer settings. IEEE Transactions on Information Forensics and Security 5(2): 324-336 (2010)
[j131]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Combining fragmentation and encryption to protect privacy in data storage. ACM Trans. Inf. Syst. Secur. 13(3) (2010)
[j130]Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang: Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks. IEEE Trans. Mob. Comput. 9(7): 913-926 (2010)
[j129]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Encryption policies for regulating access to outsourced data. ACM Trans. Database Syst. 35(2) (2010)
[c225]Lei Zhang, Honggang Zhang, Mauro Conti, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini: Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. CIT 2010: 910-915
[c224]Sushil Jajodia, Witold Litwin, Thomas J. E. Schwarz: LH*RE: A Scalable Distributed Data Structure with Recoverable Encryption. IEEE CLOUD 2010: 354-361
[c223]Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia: Who is tweeting on Twitter: human, bot, or cyborg? ACSAC 2010: 21-30
[c222]Lei Zhang, Alexander Brodsky, Sushil Jajodia: Restoring compromised privacy in micro-data disclosure. ASIACCS 2010: 36-47
[c221]Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: Providing Mobile Users' Anonymity in Hybrid Networks. ESORICS 2010: 540-557
[c220]Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel: k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. ESORICS 2010: 573-587
[c219]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati: Encryption-Based Policy Enforcement for Cloud Storage. ICDCS Workshops 2010: 42-51
[c218]Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Tracking Skype VoIP Calls Over The Internet. INFOCOM 2010: 96-100
[c217]Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia: QoP and QoS Policy Cognizant Module Composition. POLICY 2010: 77-86
[p17]Anoop Singhal, Sushil Jajodia: Data Mining for Intrusion Detection. Data Mining and Knowledge Discovery Handbook 2010: 1171-1180
[p16]Paul Barford, Marc Dacier, Thomas G. Dietterich, Matt Fredrikson, Jonathon T. Giffin, Sushil Jajodia, Somesh Jha, Jason H. Li, Peng Liu, Peng Ning, Xinming Ou, Dawn Song, Laura Strater, Vipin Swarup, George P. Tadda, C. Wang, John Yen: Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness 2010: 3-13
[p15]Sushil Jajodia, Steven Noel: Topological Vulnerability Analysis. Cyber Situational Awareness 2010: 139-154
[e32]Sara Foresti, Sushil Jajodia (Eds.): Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings. Lecture Notes in Computer Science 6166, Springer 2010, ISBN 978-3-642-13738-9
[e31]Sushil Jajodia, Jianying Zhou (Eds.): Security and Privacy in Communication Networks - 6th Iternational ICST Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 50, Springer 2010, ISBN 978-3-642-16160-5
[e30]Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang (Eds.): Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2
[i2]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
2000 – 2009
- 2009
[j128]Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia: Secure median computation in wireless sensor networks. Ad Hoc Networks 7(8): 1448-1462 (2009)
[j127]Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia: Model-Driven Development for secure information systems. Information & Software Technology 51(5): 809-814 (2009)
[j126]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009)
[j125]Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009)
[j124]Kui Ren, Wenjing Lou, Bo Zhu, Sushil Jajodia: Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation. IEEE T. Vehicular Technology 58(4): 2018-2029 (2009)
[c216]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. DBSec 2009: 225-239
[c215]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: Anonymity and Historical-Anonymity in Location-Based Services. Privacy in Location-Based Applications 2009: 1-30
[c214]Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: Privacy Preservation over Untrusted Mobile Networks. Privacy in Location-Based Applications 2009: 84-105
[c213]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Keep a Few: Outsourcing Data While Maintaining Confidentiality. ESORICS 2009: 440-455
[c212]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. ICDCS 2009: 32-39
[c211]Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Online detection of network traffic anomalies using behavioral distance. IWQoS 2009: 1-9
[c210]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang, Sushil Jajodia: Privacy-Aware Proximity Based Services. Mobile Data Management 2009: 31-40
[c209]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. Mobile Data Management 2009: 172-181
[c208]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171
[c207]Daniele Riboni, Linda Pareschi, Claudio Bettini, Sushil Jajodia: Preserving Anonymity of Recurrent Location-Based Queries. TIME 2009: 62-69
[e29]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang (Eds.): Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]. Lecture Notes in Computer Science 5599, Springer 2009, ISBN 978-3-642-03510-4
[r1]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Granularity. Encyclopedia of Database Systems 2009: 2968-2973- 2008
[j123]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008)
[j122]Steven Noel, Sushil Jajodia: Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. J. Network Syst. Manage. 16(3): 259-275 (2008)
[j121]Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia: Achieving simultaneous distribution control and privacy protection for Internet media delivery. TOMCCAP 4(2) (2008)
[j120]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008)
[c206]Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
[c205]Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30
[c204]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Assessing query privileges via safe and efficient permission composition. ACM Conference on Computer and Communications Security 2008: 311-322
[c203]Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204
[c202]Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati: Regulating Exceptions in Healthcare Using Policy Spaces. DBSec 2008: 254-267
[c201]Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296
[c200]Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin: A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008
[c199]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008
[c198]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Controlled Information Sharing in Collaborative Distributed Query Processing. ICDCS 2008: 303-310
[c197]Lei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia: A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. POLICY 2008: 181-188
[c196]Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230
[c195]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15
[c194]Lei Zhang, Sushil Jajodia, Alexander Brodsky: Simulatable Binding: Beyond Simulatable Auditing. Secure Data Management 2008: 16-31
[c193]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati: Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84
[p14]Lingyu Wang, Sushil Jajodia: Security in Data Warehouses and OLAP Systems. Handbook of Database Security 2008: 191-212
[p13]Peng Liu, Sushil Jajodia, Meng Yu: Damage Quarantine and Recovery in Data Processing Systems. Handbook of Database Security 2008: 383-407
[p12]Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Data Security. Wiley Encyclopedia of Computer Science and Engineering 2008
[e28]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang (Eds.): Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008. CEUR Workshop Proceedings 397, CEUR-WS.org 2008
[e27]Sushil Jajodia, Javier López (Eds.): Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings. Lecture Notes in Computer Science 5283, Springer 2008, ISBN 978-3-540-88312-8
[e26]Sushil Jajodia, Pierangela Samarati, Stelvio Cimato (Eds.): Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy. IFIP 278, Springer 2008, ISBN 978-0-387-09698-8
[e25]Michael Gertz, Sushil Jajodia (Eds.): Handbook of Database Security - Applications and Trends. Springer 2008, ISBN 978-0-387-48532-4- 2007
[b3]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180
[j119]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
[j118]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Selective Data Encryption in Outsourced Dynamic Environments. Electr. Notes Theor. Comput. Sci. 168: 127-142 (2007)
[j117]Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Sushil Jajodia: Access control policies and languages. IJCSE 3(2): 94-102 (2007)
[j116]Huiping Guo, Yingjiu Li, Sushil Jajodia: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007)
[j115]Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
[j114]Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
[j113]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3) (2007)
[c192]Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267
[c191]
[c190]Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54
[c189]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: A data outsourcing architecture combining cryptography and access control. CSAW 2007: 63-69
[c188]Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Trust management services in relational databases. ASIACCS 2007: 149-160
[c187]Lei Zhang, Sushil Jajodia, Alexander Brodsky: Information disclosure under realistic assumptions: privacy versus optimality. ACM Conference on Computer and Communications Security 2007: 573-583
[c186]Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112
[c185]Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragmentation and Encryption to Enforce Privacy in Data Storage. ESORICS 2007: 171-186
[c184]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia: Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76
[c183]Claudio Bettini, Sushil Jajodia, Linda Pareschi: Anonymity and Diversity in LBS: A Preliminary Investigation. PerCom Workshops 2007: 577-580
[c182]Alexander Brodsky, Lei Zhang, Sushil Jajodia: Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. Secure Data Management 2007: 81-95
[c181]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. SEC 2007: 385-396
[c180]Xinyuan Wang, Shiping Chen, Sushil Jajodia: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. IEEE Symposium on Security and Privacy 2007: 116-130
[c179]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Over-encryption: Management of Access Control Evolution on Outsourced Data. VLDB 2007: 123-134
[p11]Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20
[p10]Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati: Access Control Policies and Languages in Open Environments. Secure Data Management in Decentralized Systems 2007: 21-58
[p9]Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94
[p8]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380
[e24]Ting Yu, Sushil Jajodia (Eds.): Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6- 2006
[j112]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
[j111]Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006)
[j110]Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006)
[j109]Anoop Singhal, Sushil Jajodia: Data warehousing and data mining techniques for intrusion detection systems. Distributed and Parallel Databases 20(2): 149-166 (2006)
[j108]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli: Building trust in peer-to-peer systems: a review. IJSN 1(1/2): 103-112 (2006)
[j107]Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
[j106]Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006)
[j105]Csilla Farkas, Alexander Brodsky, Sushil Jajodia: Unauthorized inferences in semistructured databases. Inf. Sci. 176(22): 3269-3299 (2006)
[j104]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
[j103]Shiping Chen, Xinyuan Wang, Sushil Jajodia: On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network 20(5): 32-37 (2006)
[j102]Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006)
[j101]Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006)
[c178]Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia: V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. ACSAC 2006: 43-56
[c177]Bo Zhu, Sanjeev Setia, Sushil Jajodia: Providing witness anonymity in peer-to-peer systems. ACM Conference on Computer and Communications Security 2006: 6-16
[c176]Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup: A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38
[c175]Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
[c174]Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132
[c173]Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402
[c172]Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208
[c171]Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia: Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure. IWQoS 2006: 209-218
[c170]Lei Zhang, Alexander Brodsky, Sushil Jajodia: Toward Information Sharing: Benefit And Risk Access Control (BARAC). POLICY 2006: 45-53
[c169]
[c168]Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia: A robust watermarking system based on SVD compression. SAC 2006: 1341-1347
[c167]David Keppler, Vipin Swarup, Sushil Jajodia: Redirection policies for mission-based information sharing. SACMAT 2006: 210-218
[c166]Sankardas Roy, Sanjeev Setia, Sushil Jajodia: Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82
[c165]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17
[c164]Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Deng: An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks. SECON 2006: 70-79
[c163]Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia: DaTA - Data-Transparent Authentication Without Communication Overhead. SecureComm 2006: 1-10
[c162]Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey: A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32
[c161]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186
[e23]Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia (Eds.): Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006. ACM 2006, ISBN 1-59593-272-0
[i1]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: The Role of Quasi-identifiers in k-Anonymity Revisited. CoRR abs/cs/0611035 (2006)- 2005
[j100]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Information Release Control: A Learning-Based Architecture. J. Data Semantics 2: 176-198 (2005)
[j99]Yingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005)
[j98]Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1): 119-152 (2005)
[c160]Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
[c159]Steven Noel, Sushil Jajodia: Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. ACSAC 2005: 160-169
[c158]Xinyuan Wang, Shiping Chen, Sushil Jajodia: Tracking anonymous peer-to-peer VoIP calls on the internet. ACM Conference on Computer and Communications Security 2005: 81-91
[c157]Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Policies, Models, and Languages for Access Control. DNIS 2005: 225-237
[c156]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170
[c155]Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266
[c154]Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005
[c153]Vipin Swarup, Sushil Jajodia, Joseph Pamula: Rule-Based Topological Vulnerability Analysis. MMM-ACNS 2005: 23-37
[c152]Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
[c151]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Metadata Management in Outsourced Encrypted Databases. Secure Data Management 2005: 16-32
[c150]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199
[c149]Sankardas Roy, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia: Securing MAODV: attacks and countermeasures. SECON 2005: 521-532
[c148]Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia: Securing Topology Maintenance Protocols for Sensor Networks. SecureComm 2005: 101-112
[c147]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Key management for multi-user encrypted databases. StorageSS 2005: 74-83
[c146]Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia: Multiple Coordinated Views for Network Attack Graphs. VizSEC 2005: 12
[c145]Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia: Checking for k-Anonymity Violation by Views. VLDB 2005: 910-921
[c144]Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
[p7]Anoop Singhal, Sushil Jajodia: Data Mining for Intrusion Detection. The Data Mining and Knowledge Discovery Handbook 2005: 1225-1237
[e22]Sushil Jajodia, Duminda Wijesekera (Eds.): Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings. Lecture Notes in Computer Science 3654, Springer 2005, ISBN 3-540-28138-X
[e21]Sushil Jajodia, Chandan Mazumdar (Eds.): Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings. Lecture Notes in Computer Science 3803, Springer 2005, ISBN 3-540-30706-0
[e20]Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous (Eds.): Journal on Data Semantics II. Lecture Notes in Computer Science 3360, Springer 2005, ISBN 3-540-24208-2- 2004
[j97]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
[j96]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004)
[c143]Steven Noel, Eric Robertson, Sushil Jajodia: Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. ACSAC 2004: 350-359
[c142]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
[c141]Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94
[c140]Yingjiu Li, Huiping Guo, Sushil Jajodia: Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82
[c139]Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16
[c138]Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345
[c137]Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384
[c136]Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
[c135]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201
[c134]Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
[c133]Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
[c132]Steven Noel, Sushil Jajodia: Managing attack graph complexity through visual hierarchical aggregation. VizSEC 2004: 109-118
[e19]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.): Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France. Kluwer 2004, ISBN 1-4020-8144-8
[e18]Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.): Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France. Kluwer 2004, ISBN 1-4020-8142-1- 2003
[b2]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112
[j95]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003)
[j94]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
[j93]Daniel Barbará, Rajni Goel, Sushil Jajodia: A Checksum-based Corruption Detection Technique. Journal of Computer Security 11(3): 315-330 (2003)
[j92]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): 351-372 (2003)
[j91]Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003)
[j90]Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003)
[j89]Alessandro Mei, Luigi V. Mancini, Sushil Jajodia: Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distrib. Syst. 14(9): 885-896 (2003)
[c131]Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs: Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ACSAC 2003: 86-95
[c130]Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72
[c129]Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Balancing confidentiality and efficiency in untrusted relational DBMSs. ACM Conference on Computer and Communications Security 2003: 93-102
[c128]Kenneth P. Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffrey Hoyt: Securely sharing neuroimagery. CIKM 2003: 375-377
[c127]Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371
[c126]Yingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141
[c125]Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
[c124]Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163-
[c123]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
[c122]Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
[c121]
[c120]Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118
[c119]Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto: Bootstrapping a Data Mining Intrusion Detection System. SAC 2003: 421-425
[c118]Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle: A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276
[c117]Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309
[c116]Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia: Implementation of a Storage Mechanism for Untrusted DBMSs. IEEE Security in Storage Workshop 2003: 38-46
[c115]
[e17]Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger (Eds.): Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9
[e16]Sushil Jajodia, Pierangela Samarati, Paul F. Syverson (Eds.): Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003. ACM 2003, ISBN 1-58113-776-1
[e15]Sushil Jajodia, Michiharu Kudo (Eds.): Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003. ACM 2003, ISBN 1-58113-777-X- 2002
[j88]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002)
[j87]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
[j86]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
[j85]Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad: Consistent policy enforcement in distributed systems using mobile policies. Data Knowl. Eng. 43(3): 261-280 (2002)
[j84]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases 11(3): 269-306 (2002)
[j83]Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002)
[j82]Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002)
[j81]Csilla Farkas, Sushil Jajodia: The Inference Problem: A Survey. SIGKDD Explorations 4(2): 6-11 (2002)
[j80]Paul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)
[c114]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
[c113]Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180
[c112]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
[c111]Daniel Barbará, Rajni Goel, Sushil Jajodia: Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189
[c110]Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
[c109]Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
[c108]Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170
[c107]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12
[c106]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73
[c105]Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
[c104]Kenneth P. Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia: Propagating Modifications to Mobile Policies. SEC 2002: 573-584
[c103]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513
[e14]Sushil Jajodia, Pierangela Samarati (Eds.): Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002. ACM 2002, ISBN 1-58113-633-1- 2001
[j79]Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
[j78]Sushil Jajodia, Duminda Wijesekera: Security in Federated Database Systems. Inf. Sec. Techn. Report 6(2): 69-79 (2001)
[j77]Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001)
[j76]Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record 30(4): 15-24 (2001)
[j75]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
[j74]Pierangela Samarati, Michael K. Reiter, Sushil Jajodia: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001)
[j73]Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2): 214-260 (2001)
[c102]Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47
[c101]Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58
[c100]
[c99]
[c98]Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74
[c97]Ravi Mukkamala, Sushil Jajodia: A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238
[c96]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346
[c95]Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi: Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260
[c94]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
[p6]Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian: Provisional Authorizations. E-Commerce Security and Privacy 2001: 133-159
[e13]Hideko S. Kunii, Sushil Jajodia, Arne Sølvberg (Eds.): Conceptual Modeling - ER 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings. Lecture Notes in Computer Science 2224, Springer 2001, ISBN 3-540-42866-6- 2000
[b1]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang: Time granularities in databases, data mining, and temporal reasoning. Springer 2000, ISBN 978-3-540-66997-5, pp. I-XI, 1-230
[j72]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)
[j71]Peng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
[j70]Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000)
[j69]Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000)
[j68]Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): 243-279 (2000)
[j67]Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000)
[j66]Alexander Brodsky, Csilla Farkas, Sushil Jajodia: Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000)
[c93]Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean: Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ACSAC 2000: 298-307
[c92]Susan Chapin, Donald B. Faatz, Sushil Jajodia: Distributed Policies for Data Management Making Policies Mobile. DBSec 2000: 63-76
[c91]Daniel Barbará, Rajni Goel, Sushil Jajodia: Protecting File systems Against Corruption Using Checksums. DBSec 2000: 113-124
[c90]
[c89]Daniel Barbará, Rajni Goel, Sushil Jajodia: Using Checksums to Detect Data Corruption. EDBT 2000: 136-149
[c88]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
[c87]Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. IEEE Symposium on Security and Privacy 2000: 215-228
[c86]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-37
[c85]Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19
[e12]Dimitris Gritzalis, Sushil Jajodia, Pierangela Samarati (Eds.): CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000. ACM 2000, ISBN 1-58113-203-4
1990 – 1999
- 1999
[j65]Sushil Jajodia, Catherine D. McCollum, Paul Ammann: Trusted Recovery. Commun. ACM 42(7): 71-75 (1999)
[j64]Sushil Jajodia, Paul Ammann, Catherine D. McCollum: Surviving Information Warfare Attacks. IEEE Computer 32(4): 57-63 (1999)
[j63]Sushil Jajodia: Distributed Databases: Turing Award Winner Jim Gray on the new millennium. IEEE Concurrency 7(3): 9-10 (1999)
[j62]Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999)
[j61]Elisa Bertino, Sushil Jajodia, Pierangela Samarati: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Inf. Syst. 17(2): 101-140 (1999)
[c84]Amgad Fayad, Sushil Jajodia, Catherine D. McCollum: Application-Level Isolation Using Data Inconsistency Detection. ACSAC 1999: 119-126
[c83]Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18
[c82]Ravi Mukkamala, Jason Gagnon, Sushil Jajodia: Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46
[c81]Peng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423
[c80]
[c79]Neil F. Johnson, Zoran Duric, Sushil Jajodia: Recovery of Watermarks from Distorted Images. Information Hiding 1999: 318-332
[c78]Neil F. Johnson, Zoran Duric, Sushil Jajodia: On Fingerprinting Images for Recognition. Multimedia Information Systems 1999: 4-11
[c77]
[e11]Sushil Jajodia (Ed.): Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece. IFIP Conference Proceedings 142, Kluwer 1999, ISBN 0-7923-8488-1- 1998
[j60]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998)
[j59]Neil F. Johnson, Sushil Jajodia: Exploring Steganography: Seeing the Unseen. IEEE Computer 31(2): 26-34 (1998)
[j58]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998)
[j57]
[j56]Xiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni: Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. International Journal on Artificial Intelligence Tools 7(2): 319-339 (1998)
[j55]Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998)
[j54]Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998)
[j53]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin: Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998)
[j52]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998)
[c76]Sushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
[c75]Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia: A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178
[c74]Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia: Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. CSFW 1998: 190-201
[c73]Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284
[c72]Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. Information Hiding 1998: 273-289
[c71]Giovanni Rumolo, Sushil Jajodia: Algebra for Databases with Explicit Markings of Damaged Data. IICIS 1998: 103-129
[e10]Opher Etzion, Sushil Jajodia, Suryanarayana M. Sripada (Eds.): Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997). Lecture Notes in Computer Science 1399, Springer 1998, ISBN 3-540-64519-5
[e9]Sushil Jajodia, M. Tamer Özsu, Asuman Dogac (Eds.): Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings. Lecture Notes in Computer Science 1508, Springer 1998, ISBN 3-540-65107-1
[e8]Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous (Eds.): Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998. IFIP Conference Proceedings 136, Kluwer 1998, ISBN 0-412-84770-1- 1997
[j51]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: A theoretical formulation for degrees of isolation in databases. Information & Software Technology 39(1): 47-53 (1997)
[j50]Sushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang: Information Systems Research at George Mason University. SIGMOD Record 26(4): 69-74 (1997)
[j49]Elisa Bertino, Pierangela Samarati, Sushil Jajodia: An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101 (1997)
[j48]Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538 (1997)
[j47]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997)
[j46]Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia: Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997)
[j45]Paul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997)
[j44]Ouri Wolfson, Sushil Jajodia, Yixiu Huang: An Adaptive Data Replication Algorithm. ACM Trans. Database Syst. 22(2): 255-314 (1997)
[c70]Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88
[c69]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449
[c68]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55
[c67]Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang: Temporal Database Bibliography Update. Temporal Databases, Dagstuhl 1997: 338-366
[c66]Christian S. Jensen, Curtis E. Dyreson, Michael H. Böhlen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Fabio Grandi, Patrick J. Hayes, Sushil Jajodia, Wolfgang Käfer, Nick Kline, Nikos A. Lorentzos, Yannis G. Mitsopoulos, Angelo Montanari, Daniel A. Nonen, Elisa Peressi, Barbara Pernici, John F. Roddick, Nandlal L. Sarda, Maria Rita Scalas, Arie Segev, Richard T. Snodgrass, Michael D. Soo, Abdullah Uz Tansel, Paolo Tiberio, Gio Wiederhold: The Consensus Glossary of Temporal Database Concepts - February 1998 Version. Temporal Databases, Dagstuhl 1997: 367-405
[c65]Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16
[c64]Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218
[c63]Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino: A Unified Framework for Enforcing Multiple Access Control Policies. SIGMOD Conference 1997: 474-485
[c62]Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian: A Logical Language for Expressing Authorizations. IEEE Symposium on Security and Privacy 1997: 31-42
[c61]

