Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sushil Jajodia
@article{DBLP:journals/compsec/VimercatiFJLPS23, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Distributed query execution under access restrictions}, journal = {Comput. Secur.}, volume = {127}, pages = {103056}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103056}, doi = {10.1016/J.COSE.2022.103056}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/VimercatiFJPSS23, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati and Roberto Sassi}, title = {Sentinels and Twins: Effective Integrity Assessment for Distributed Computation}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {34}, number = {1}, pages = {108--122}, year = {2023}, url = {https://doi.org/10.1109/TPDS.2022.3215863}, doi = {10.1109/TPDS.2022.3215863}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/VimercatiFJPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsas/WolfsonGJT23, author = {Ouri Wolfson and Prabin Giri and Sushil Jajodia and Goce Trajcevski}, title = {Geographic-Region Monitoring by Drones in Adversarial Environments}, journal = {{ACM} Trans. Spatial Algorithms Syst.}, volume = {9}, number = {3}, pages = {22:1--22:36}, year = {2023}, url = {https://doi.org/10.1145/3611009}, doi = {10.1145/3611009}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsas/WolfsonGJT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ShahGJCH23, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam and Steve E. Hutchinson}, title = {A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {16}, number = {4}, pages = {2359--2371}, year = {2023}, url = {https://doi.org/10.1109/TSC.2023.3253307}, doi = {10.1109/TSC.2023.3253307}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ShahGJCH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangWSJWL23, author = {Shu Wang and Xinda Wang and Kun Sun and Sushil Jajodia and Haining Wang and Qi Li}, title = {GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {2409--2426}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179479}, doi = {10.1109/SP46215.2023.10179479}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/WangWSJWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ShahGJC22, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Maintaining the level of operational effectiveness of a {CSOC} under adverse conditions}, journal = {Int. J. Inf. Sec.}, volume = {21}, number = {3}, pages = {637--651}, year = {2022}, url = {https://doi.org/10.1007/s10207-021-00573-4}, doi = {10.1007/S10207-021-00573-4}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ShahGJC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCWSJ22, author = {Yue Li and Zeyu Chen and Haining Wang and Kun Sun and Sushil Jajodia}, title = {Understanding Account Recovery in the Wild and its Security Implications}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {620--634}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2975789}, doi = {10.1109/TDSC.2020.2975789}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/LiCWSJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XiongRGJS22, author = {Yanhai Xiong and Giridhar Ramachandran and Rajesh Ganesan and Sushil Jajodia and V. S. Subrahmanian}, title = {Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {3}, pages = {1434--1445}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3038132}, doi = {10.1109/TDSC.2020.3038132}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XiongRGJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ChenDJLMS22, author = {Haipeng Chen and Andrew Duncklee and Sushil Jajodia and Rui Liu and Sean R. McNamara and V. S. Subrahmanian}, title = {{PCAM:} {A} Data-driven Probabilistic Cyber-alert Management Framework}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {3}, pages = {67:1--67:24}, year = {2022}, url = {https://doi.org/10.1145/3511101}, doi = {10.1145/3511101}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/ChenDJLMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/VimercatiFJLPS22, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {An authorization model for query execution in the cloud}, journal = {{VLDB} J.}, volume = {31}, number = {3}, pages = {555--579}, year = {2022}, url = {https://doi.org/10.1007/s00778-021-00709-x}, doi = {10.1007/S00778-021-00709-X}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/VimercatiFJLPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/Hyeong0PJ22, author = {Jihyeon Hyeong and Jayoung Kim and Noseong Park and Sushil Jajodia}, editor = {Mohammad Al Hasan and Li Xiong}, title = {An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models}, booktitle = {Proceedings of the 31st {ACM} International Conference on Information {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022}, pages = {4064--4068}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511808.3557546}, doi = {10.1145/3511808.3557546}, timestamp = {Wed, 19 Oct 2022 12:52:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/Hyeong0PJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2208-08114, author = {Jihyeon Hyeong and Jayoung Kim and Noseong Park and Sushil Jajodia}, title = {An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models}, journal = {CoRR}, volume = {abs/2208.08114}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2208.08114}, doi = {10.48550/ARXIV.2208.08114}, eprinttype = {arXiv}, eprint = {2208.08114}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2208-08114.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/HitajHJM21, author = {Dorjan Hitaj and Briland Hitaj and Sushil Jajodia and Luigi V. Mancini}, title = {Capture the Bot: Using Adversarial Examples to Improve {CAPTCHA} Robustness to Bot Attacks}, journal = {{IEEE} Intell. Syst.}, volume = {36}, number = {5}, pages = {104--112}, year = {2021}, url = {https://doi.org/10.1109/MIS.2020.3036156}, doi = {10.1109/MIS.2020.3036156}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/HitajHJM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/KarunaPJGU21, author = {Prakruthi Karuna and Hemant Purohit and Sushil Jajodia and Rajesh Ganesan and {\"{O}}zlem Uzuner}, title = {Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {1}, pages = {835--845}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.2980177}, doi = {10.1109/JSYST.2020.2980177}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sj/KarunaPJGU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhangWJS21, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {1}, pages = {310--324}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2018.2889086}, doi = {10.1109/TDSC.2018.2889086}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/0002JKPSS21, author = {Tanmoy Chakraborty and Sushil Jajodia and Jonathan Katz and Antonio Picariello and Giancarlo Sperl{\`{\i}} and V. S. Subrahmanian}, title = {A Fake Online Repository Generation Engine for Cyber Deception}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {518--533}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2898661}, doi = {10.1109/TDSC.2019.2898661}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/0002JKPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS21, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, editor = {Ken Barker and Kambiz Ghazinour}, title = {Distributed Query Evaluation over Encrypted Data}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {96--114}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_6}, doi = {10.1007/978-3-030-81242-3\_6}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/WangWF0J21, author = {Xinda Wang and Shu Wang and Pengbin Feng and Kun Sun and Sushil Jajodia}, title = {PatchDB: {A} Large-Scale Security Patch Dataset}, booktitle = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021}, pages = {149--160}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/DSN48987.2021.00030}, doi = {10.1109/DSN48987.2021.00030}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/WangWF0J21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/WolfsonGJT21, author = {Ouri Wolfson and Prabin Giri and Sushil Jajodia and Goce Trajcevski}, editor = {Xiaofeng Meng and Fusheng Wang and Chang{-}Tien Lu and Yan Huang and Shashi Shekhar and Xing Xie}, title = {Geographic-Region Monitoring by Drones in Adversarial Environments}, booktitle = {{SIGSPATIAL} '21: 29th International Conference on Advances in Geographic Information Systems, Virtual Event / Beijing, China, November 2-5, 2021}, pages = {480--483}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474717.3484216}, doi = {10.1145/3474717.3484216}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/WolfsonGJT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WangWFSJBG21, author = {Xinda Wang and Shu Wang and Pengbin Feng and Kun Sun and Sushil Jajodia and Sanae Benchaaboun and Frank Geck}, title = {PatchRNN: {A} Deep Learning-Based System for Security Patch Identification}, booktitle = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San Diego, CA, USA, November 29 - Dec. 2, 2021}, pages = {595--600}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MILCOM52596.2021.9652940}, doi = {10.1109/MILCOM52596.2021.9652940}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/milcom/WangWFSJBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/JeonLKLPLUJ21, author = {Jinsung Jeon and Jing Liu and Jayoung Kim and Jaehoon Lee and Noseong Park and Jamie Jooyeon Lee and {\"{O}}zlem Uzuner and Sushil Jajodia}, editor = {Carlotta Demeniconi and Ian Davidson}, title = {Scalable Graph Synthesis with Adj and 1 - Adj}, booktitle = {Proceedings of the 2021 {SIAM} International Conference on Data Mining, {SDM} 2021, Virtual Event, April 29 - May 1, 2021}, pages = {307--315}, publisher = {{SIAM}}, year = {2021}, url = {https://doi.org/10.1137/1.9781611976700.35}, doi = {10.1137/1.9781611976700.35}, timestamp = {Mon, 17 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdm/JeonLKLPLUJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-03358, author = {Xinda Wang and Shu Wang and Pengbin Feng and Kun Sun and Sushil Jajodia and Sanae Benchaaboun and Frank Geck}, title = {PatchRNN: {A} Deep Learning-Based System for Security Patch Identification}, journal = {CoRR}, volume = {abs/2108.03358}, year = {2021}, url = {https://arxiv.org/abs/2108.03358}, eprinttype = {arXiv}, eprint = {2108.03358}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-03358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ChenHJLSX20, author = {Haipeng Chen and Qian Han and Sushil Jajodia and Roy Lindelauf and V. S. Subrahmanian and Yanhai Xiong}, title = {Disclose or Exploit? {A} Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare}, journal = {{IEEE} Syst. J.}, volume = {14}, number = {3}, pages = {3779--3790}, year = {2020}, url = {https://doi.org/10.1109/JSYST.2020.2964985}, doi = {10.1109/JSYST.2020.2964985}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ChenHJLSX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangXHWZJ20, author = {Yubao Zhang and Jidong Xiao and Shuai Hao and Haining Wang and Sencun Zhu and Sushil Jajodia}, title = {Understanding the Manipulation on Recommender Systems through Web Injection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {3807--3818}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2954737}, doi = {10.1109/TIFS.2019.2954737}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/ShahSGJC20, author = {Ankit Shah and Arunesh Sinha and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {11}, number = {3}, pages = {32:1--32:20}, year = {2020}, url = {https://doi.org/10.1145/3377554}, doi = {10.1145/3377554}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/ShahSGJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/ShahGJSC20, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Pierangela Samarati and Hasan Cam}, title = {Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {31}, number = {1}, pages = {16--33}, year = {2020}, url = {https://doi.org/10.1109/TPDS.2019.2927977}, doi = {10.1109/TPDS.2019.2927977}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/ShahGJSC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/ShahGJC20, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center}, journal = {{ACM} Trans. Web}, volume = {14}, number = {1}, pages = {2:1--2:22}, year = {2020}, url = {https://doi.org/10.1145/3372498}, doi = {10.1145/3372498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/ShahGJC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/WangW0BJ20, author = {Xinda Wang and Shu Wang and Kun Sun and Archer L. Batcheller and Sushil Jajodia}, title = {A Machine Learning Approach to Classify Security Patches into Vulnerability Types}, booktitle = {8th {IEEE} Conference on Communications and Network Security, {CNS} 2020, Avignon, France, June 29 - July 1, 2020}, pages = {1--9}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CNS48642.2020.9162237}, doi = {10.1109/CNS48642.2020.9162237}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/WangW0BJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Alhebaishi0J20, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia}, editor = {Anoop Singhal and Jaideep Vaidya}, title = {Modeling and Mitigating Security Threats in Network Functions Virtualization {(NFV)}}, booktitle = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP} {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12122}, pages = {3--23}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-49669-2\_1}, doi = {10.1007/978-3-030-49669-2\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Alhebaishi0J20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/20/Wang0BJ20, author = {Xinda Wang and Kun Sun and Archer L. Batcheller and Sushil Jajodia}, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {An Empirical Study of Secret Security Patch in Open Source Software}, booktitle = {Adaptive Autonomous Secure Cyber Systems}, pages = {269--289}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1\_13}, doi = {10.1007/978-3-030-33432-1\_13}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/Wang0BJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/20/JCSS2020, editor = {Sushil Jajodia and George Cybenko and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Michael P. Wellman}, title = {Adaptive Autonomous Secure Cyber Systems}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-33432-1}, doi = {10.1007/978-3-030-33432-1}, isbn = {978-3-030-33431-4}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/20/JCSS2020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16204, author = {Dorjan Hitaj and Briland Hitaj and Sushil Jajodia and Luigi V. Mancini}, title = {Capture the Bot: Using Adversarial Examples to Improve {CAPTCHA} Robustness to Bot Attacks}, journal = {CoRR}, volume = {abs/2010.16204}, year = {2020}, url = {https://arxiv.org/abs/2010.16204}, eprinttype = {arXiv}, eprint = {2010.16204}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16204.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BorborWJS19, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Optimizing the network diversity to improve the resilience of networks against unknown attacks}, journal = {Comput. Commun.}, volume = {145}, pages = {96--112}, year = {2019}, url = {https://doi.org/10.1016/j.comcom.2019.06.004}, doi = {10.1016/J.COMCOM.2019.06.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/BorborWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ShahGJ19, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia}, title = {A methodology for ensuring fair allocation of {CSOC} effort for alert investigation}, journal = {Int. J. Inf. Sec.}, volume = {18}, number = {2}, pages = {199--218}, year = {2019}, url = {https://doi.org/10.1007/s10207-018-0407-3}, doi = {10.1007/S10207-018-0407-3}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ShahGJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AlhebaishiWJS19, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Mitigating the insider threat of remote administrators in clouds through maintenance task assignments}, journal = {J. Comput. Secur.}, volume = {27}, number = {4}, pages = {427--458}, year = {2019}, url = {https://doi.org/10.3233/JCS-191306}, doi = {10.3233/JCS-191306}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AlhebaishiWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShahGJC19, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center}, journal = {{IEEE} Syst. J.}, volume = {13}, number = {1}, pages = {1060--1071}, year = {2019}, url = {https://doi.org/10.1109/JSYST.2018.2809506}, doi = {10.1109/JSYST.2018.2809506}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ShahGJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShahGJC19, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a {CSOC}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {5}, pages = {1155--1170}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2871744}, doi = {10.1109/TIFS.2018.2871744}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShahGJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ShahGJC19a, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {A Two-Step Approach to Optimal Selection of Alerts for Investigation in a {CSOC}}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {7}, pages = {1857--1870}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2018.2886465}, doi = {10.1109/TIFS.2018.2886465}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ShahGJC19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangXWJS19, author = {Mengyuan Zhang and Yue Xin and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Simon N. Foley}, title = {CASFinder: Detecting Common Attack Surface}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {338--358}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_18}, doi = {10.1007/978-3-030-22479-0\_18}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangXWJS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/Wang0BJ19, author = {Xinda Wang and Kun Sun and Archer L. Batcheller and Sushil Jajodia}, title = {Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in {OSS}}, booktitle = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019}, pages = {485--492}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/DSN.2019.00056}, doi = {10.1109/DSN.2019.00056}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/Wang0BJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcai/ChenJLPSS19, author = {Haipeng Chen and Sushil Jajodia and Jing Liu and Noseong Park and Vadim Sokolov and V. S. Subrahmanian}, editor = {Sarit Kraus}, title = {FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data}, booktitle = {Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16, 2019}, pages = {2074--2080}, publisher = {ijcai.org}, year = {2019}, url = {https://doi.org/10.24963/ijcai.2019/287}, doi = {10.24963/IJCAI.2019/287}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ijcai/ChenJLPSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/0003HXZEJ019, author = {Ping Chen and Zhisheng Hu and Jun Xu and Minghui Zhu and Rob Erbacher and Sushil Jajodia and Peng Liu}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {{MTD} Techniques for Memory Protection Against Zero-Day Attacks}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {129--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_7}, doi = {10.1007/978-3-030-30719-6\_7}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/0003HXZEJ019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseJVCN19, author = {Massimiliano Albanese and Sushil Jajodia and Sridhar Venkatesan and George Cybenko and Thanh Hong Nguyen}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Adaptive Cyber Defenses for Botnet Detection and Mitigation}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {156--205}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_8}, doi = {10.1007/978-3-030-30719-6\_8}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseJVCN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/GanesanSJC19, author = {Rajesh Ganesan and Ankit Shah and Sushil Jajodia and Hasan Cam}, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Optimizing Alert Data Management Processes at a Cyber Security Operations Center}, booktitle = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, pages = {206--231}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6\_9}, doi = {10.1007/978-3-030-30719-6\_9}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/GanesanSJC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/11830, editor = {Sushil Jajodia and George Cybenko and Peng Liu and Cliff Wang and Michael P. Wellman}, title = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control- and Game-Theoretic Approaches to Cyber Security}, series = {Lecture Notes in Computer Science}, volume = {11830}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30719-6}, doi = {10.1007/978-3-030-30719-6}, isbn = {978-3-030-30718-9}, timestamp = {Mon, 23 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/11830.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/expert/KarunaPGJ18, author = {Prakruthi Karuna and Hemant Purohit and Rajesh Ganesan and Sushil Jajodia}, title = {Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception}, journal = {{IEEE} Intell. Syst.}, volume = {33}, number = {5}, pages = {16--25}, year = {2018}, url = {https://doi.org/10.1109/MIS.2018.2877277}, doi = {10.1109/MIS.2018.2877277}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/expert/KarunaPGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/AlbaneseJV18, author = {Massimiliano Albanese and Sushil Jajodia and Sridhar Venkatesan}, title = {Defending from Stealthy Botnets Using Moving Target Defenses}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {92--97}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331034}, doi = {10.1109/MSP.2018.1331034}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/AlbaneseJV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ShahGJC18, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {A methodology to measure and monitor level of operational effectiveness of a {CSOC}}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {121--134}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0365-1}, doi = {10.1007/S10207-017-0365-1}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/ShahGJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChakrabortyJPPS18, author = {Tanmoy Chakraborty and Sushil Jajodia and Noseong Park and Andrea Pugliese and Edoardo Serra and V. S. Subrahmanian}, title = {Hybrid adversarial defense: Merging honeypots and traditional security methods}, journal = {J. Comput. Secur.}, volume = {26}, number = {5}, pages = {615--645}, year = {2018}, url = {https://doi.org/10.3233/JCS-171094}, doi = {10.3233/JCS-171094}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChakrabortyJPPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BorborWJS18, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Surviving unpatchable vulnerabilities through heterogeneous network hardening options}, journal = {J. Comput. Secur.}, volume = {26}, number = {6}, pages = {761--789}, year = {2018}, url = {https://doi.org/10.3233/JCS-171106}, doi = {10.3233/JCS-171106}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BorborWJS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/ParkMGJPK18, author = {Noseong Park and Mahmoud Mohammadi and Kshitij Gorde and Sushil Jajodia and Hongkyu Park and Youngmin Kim}, title = {Data Synthesis based on Generative Adversarial Networks}, journal = {Proc. {VLDB} Endow.}, volume = {11}, number = {10}, pages = {1071--1083}, year = {2018}, url = {http://www.vldb.org/pvldb/vol11/p1071-park.pdf}, doi = {10.14778/3231751.3231757}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/ParkMGJPK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/soca/ShahGJC18, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors}, journal = {Serv. Oriented Comput. Appl.}, volume = {12}, number = {2}, pages = {123--135}, year = {2018}, url = {https://doi.org/10.1007/s11761-018-0235-3}, doi = {10.1007/S11761-018-0235-3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/soca/ShahGJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangZSLHJ18, author = {Ning Zhang and Ruide Zhang and Kun Sun and Wenjing Lou and Y. Thomas Hou and Sushil Jajodia}, title = {Memory Forensic Challenges Under Misused Architectural Features}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {9}, pages = {2345--2358}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2018.2819119}, doi = {10.1109/TIFS.2018.2819119}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangZSLHJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/FarrisSCGJ18, author = {Katheryn A. Farris and Ankit Shah and George Cybenko and Rajesh Ganesan and Sushil Jajodia}, title = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation, and Management}, journal = {{ACM} Trans. Priv. Secur.}, volume = {21}, number = {4}, pages = {16:1--16:28}, year = {2018}, url = {https://doi.org/10.1145/3196884}, doi = {10.1145/3196884}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/ShahGJC18, author = {Ankit Shah and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Dynamic Optimization of the Level of Operational Effectiveness of a {CSOC} Under Adverse Conditions}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {9}, number = {5}, pages = {51:1--51:20}, year = {2018}, url = {https://doi.org/10.1145/3173457}, doi = {10.1145/3173457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/ShahGJC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/JajodiaPSS17, author = {Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian}, title = {{SHARE:} {A} Stackelberg Honey-Based Adversarial Reasoning Engine}, journal = {{ACM} Trans. Internet Techn.}, volume = {18}, number = {3}, pages = {30:1--30:41}, year = {2018}, url = {https://doi.org/10.1145/3137571}, doi = {10.1145/3137571}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/JajodiaPSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Alhebaishi0JS18, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {3--20}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_1}, doi = {10.1007/978-3-319-95729-6\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Alhebaishi0JS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/BettiniWJ18, author = {Claudio Bettini and X. Sean Wang and Sushil Jajodia}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Temporal Granularity}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_397}, doi = {10.1007/978-1-4614-8265-9\_397}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/BettiniWJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1806-03384, author = {Noseong Park and Mahmoud Mohammadi and Kshitij Gorde and Sushil Jajodia and Hongkyu Park and Youngmin Kim}, title = {Data Synthesis based on Generative Adversarial Networks}, journal = {CoRR}, volume = {abs/1806.03384}, year = {2018}, url = {http://arxiv.org/abs/1806.03384}, eprinttype = {arXiv}, eprint = {1806.03384}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1806-03384.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-05921, author = {Ankit Shah and Arunesh Sinha and Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System}, journal = {CoRR}, volume = {abs/1810.05921}, year = {2018}, url = {http://arxiv.org/abs/1810.05921}, eprinttype = {arXiv}, eprint = {1810.05921}, timestamp = {Tue, 21 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-05921.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WangJS17, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Network Security Metrics}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66505-4}, doi = {10.1007/978-3-319-66505-4}, isbn = {978-3-319-66504-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WangJS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/VimercatiFJLPS17, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {An Authorization Model for Multi-Provider Queries}, journal = {Proc. {VLDB} Endow.}, volume = {11}, number = {3}, pages = {256--268}, year = {2017}, url = {http://www.vldb.org/pvldb/vol11/p256-vimercati.pdf}, doi = {10.14778/3157794.3157796}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/VimercatiFJLPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JajodiaPPPSSS17, author = {Sushil Jajodia and Noseong Park and Fabio Pierazzi and Andrea Pugliese and Edoardo Serra and Gerardo I. Simari and V. S. Subrahmanian}, title = {A Probabilistic Logic of Cyber Deception}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {11}, pages = {2532--2544}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2710945}, doi = {10.1109/TIFS.2017.2710945}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/JajodiaPPPSSS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/GanesanJC17, author = {Rajesh Ganesan and Sushil Jajodia and Hasan Cam}, title = {Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {8}, number = {4}, pages = {52:1--52:32}, year = {2017}, url = {https://doi.org/10.1145/2914795}, doi = {10.1145/2914795}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/GanesanJC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VenkatesanASGJ17, author = {Sridhar Venkatesan and Massimiliano Albanese and Ankit Shah and Rajesh Ganesan and Sushil Jajodia}, editor = {Hamed Okhravi and Xinming Ou}, title = {Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning}, booktitle = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {75--85}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3140549.3140552}, doi = {10.1145/3140549.3140552}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VenkatesanASGJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Borbor0JS17, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {509--528}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_28}, doi = {10.1007/978-3-319-61176-1\_28}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Borbor0JS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17, author = {Massimiliano Albanese and Nancy J. Cooke and Gonz{\'{a}}lez Coty and David Hall and Christopher G. Healey and Sushil Jajodia and Peng Liu and Michael D. McNeese and Peng Ning and Douglas S. Reeves and V. S. Subrahmanian and Cliff Wang and John Yen}, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Computer-Aided Human Centric Cyber Situation Awareness}, booktitle = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, pages = {3--25}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5\_1}, doi = {10.1007/978-3-319-61152-5\_1}, timestamp = {Mon, 03 Jan 2022 21:52:37 +0100}, biburl = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/JajodiaA17, author = {Sushil Jajodia and Massimiliano Albanese}, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {An Integrated Framework for Cyber Situation Awareness}, booktitle = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, pages = {29--46}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5\_2}, doi = {10.1007/978-3-319-61152-5\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/JajodiaA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/10030, editor = {Peng Liu and Sushil Jajodia and Cliff Wang}, title = {Theory and Models for Cyber Situation Awareness}, series = {Lecture Notes in Computer Science}, volume = {10030}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61152-5}, doi = {10.1007/978-3-319-61152-5}, isbn = {978-3-319-61151-8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/lncs/10030.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VimercatiFJPS16, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Efficient integrity checks for join queries in the cloud}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {347--378}, year = {2016}, url = {https://doi.org/10.3233/JCS-160545}, doi = {10.3233/JCS-160545}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VimercatiFJPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LeKAJ16, author = {Meixing Le and Krishna Kant and Malek Athamnah and Sushil Jajodia}, title = {Minimum cost rule enforcement for cooperative database access}, journal = {J. Comput. Secur.}, volume = {24}, number = {3}, pages = {379--403}, year = {2016}, url = {https://doi.org/10.3233/JCS-160548}, doi = {10.3233/JCS-160548}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LeKAJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JajodiaPSS16, author = {Sushil Jajodia and Noseong Park and Edoardo Serra and V. S. Subrahmanian}, title = {Using temporal probabilistic logic for optimal monitoring of security events with limited resources}, journal = {J. Comput. Secur.}, volume = {24}, number = {6}, pages = {735--791}, year = {2016}, url = {https://doi.org/10.3233/JCS-160555}, doi = {10.3233/JCS-160555}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JajodiaPSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/MontuschiMCCRDE16, author = {Paolo Montuschi and Edward J. McCluskey and Samarjit Chakraborty and Jason Cong and Ram{\'{o}}n M. Rodr{\'{\i}}guez{-}Dagnino and Fred Douglis and Lieven Eeckhout and Gernot Heiser and Sushil Jajodia and Ruby B. Lee and Dinesh Manocha and Tom{\'{a}}s F. Pena and Isabelle Puaut and Hanan Samet and Donatella Sciuto}, title = {State of the Journal}, journal = {{IEEE} Trans. Computers}, volume = {65}, number = {7}, pages = {2014--2018}, year = {2016}, url = {https://doi.org/10.1109/TC.2016.2568358}, doi = {10.1109/TC.2016.2568358}, timestamp = {Thu, 27 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/MontuschiMCCRDE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RuanWWJ16, author = {Xin Ruan and Zhenyu Wu and Haining Wang and Sushil Jajodia}, title = {Profiling Online Social Behaviors for Compromised Account Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {1}, pages = {176--187}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2015.2482465}, doi = {10.1109/TIFS.2015.2482465}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhangWJSA16, author = {Mengyuan Zhang and Lingyu Wang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, title = {Network Diversity: {A} Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {1071--1086}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2516916}, doi = {10.1109/TIFS.2016.2516916}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/GanesanJSC16, author = {Rajesh Ganesan and Sushil Jajodia and Ankit Shah and Hasan Cam}, title = {Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {8}, number = {1}, pages = {4:1--4:21}, year = {2016}, url = {https://doi.org/10.1145/2882969}, doi = {10.1145/2882969}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tist/GanesanJSC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/JajodiaLS16, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {Trusted cloud {SQL} {DBS} with on-the-fly {AES} decryption/encryption}, booktitle = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, pages = {3666--3675}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/BigData.2016.7841034}, doi = {10.1109/BIGDATA.2016.7841034}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/JajodiaLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VenkatesanACJ16, author = {Sridhar Venkatesan and Massimiliano Albanese and George Cybenko and Sushil Jajodia}, editor = {Peng Liu and Cliff Wang}, title = {A Moving Target Defense Approach to Disrupting Stealthy Botnets}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {37--46}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2995272.2995280}, doi = {10.1145/2995272.2995280}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VenkatesanACJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16, author = {Sridhar Venkatesan and Massimiliano Albanese and Kareem Amin and Sushil Jajodia and Mason Wright}, title = {A moving target defense approach to mitigate DDoS attacks against proxy-based architectures}, booktitle = {2016 {IEEE} Conference on Communications and Network Security, {CNS} 2016, Philadelphia, PA, USA, October 17-19, 2016}, pages = {198--206}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/CNS.2016.7860486}, doi = {10.1109/CNS.2016.7860486}, timestamp = {Mon, 22 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BorborWJS16, author = {Daniel Borbor and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Silvio Ranise and Vipin Swarup}, title = {Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {295--312}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_21}, doi = {10.1007/978-3-319-41483-6\_21}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BorborWJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/JajodiaLS16, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {On-the-Fly {AES256} Decryption/Encryption for Trusted Cloud {SQL} {DBS:} Position Statement}, booktitle = {27th International Workshop on Database and Expert Systems Applications, {DEXA} 2016 Workshops, Porto, Portugal, September 5-8, 2016}, pages = {19--23}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DEXA.2016.020}, doi = {10.1109/DEXA.2016.020}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/JajodiaLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/AlhebaishiWJS16, author = {Nawaf Alhebaishi and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, editor = {Fr{\'{e}}d{\'{e}}ric Cuppens and Lingyu Wang and Nora Cuppens{-}Boulahia and Nadia Tawbi and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Threat Modeling for Cloud Data Center Infrastructures}, booktitle = {Foundations and Practice of Security - 9th International Symposium, {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10128}, pages = {302--319}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-51966-1\_20}, doi = {10.1007/978-3-319-51966-1\_20}, timestamp = {Sun, 02 Oct 2022 16:01:32 +0200}, biburl = {https://dblp.org/rec/conf/fps/AlhebaishiWJS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/GaspariJMP16, author = {Fabio De Gaspari and Sushil Jajodia and Luigi V. Mancini and Agostino Panico}, editor = {Nicholas J. Multari and Anoop Singhal and David O. Manz}, title = {{AHEAD:} {A} New Architecture for Active Defense}, booktitle = {Proceedings of the 2016 {ACM} Workshop on Automated Decision Making for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October 24, 2016}, pages = {11--16}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2994475.2994481}, doi = {10.1145/2994475.2994481}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/GaspariJMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/AlbaneseJJP16, author = {Massimiliano Albanese and Sushil Jajodia and R. Jhawa and Vincenzo Piuri}, title = {Dependable and Resilient Cloud Computing}, booktitle = {2016 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE} 2016, Oxford, United Kingdom, March 29 - April 2, 2016}, pages = {3}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/SOSE.2016.53}, doi = {10.1109/SOSE.2016.53}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sose/AlbaneseJJP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/16/AlbaneseBJ16, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia}, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Deceiving Attackers by Creating a Virtual Attack Surface}, booktitle = {Cyber Deception, Building the Scientific Foundation}, pages = {169--201}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3\_8}, doi = {10.1007/978-3-319-32699-3\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/16/AlbaneseBJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/JSSW2016, editor = {Sushil Jajodia and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Deception, Building the Scientific Foundation}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32699-3}, doi = {10.1007/978-3-319-32699-3}, isbn = {978-3-319-32697-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/JSSW2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csfw/2015gramsec, editor = {Sjouke Mauw and Barbara Kordy and Sushil Jajodia}, title = {Graphical Models for Security - Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29968-6}, doi = {10.1007/978-3-319-29968-6}, isbn = {978-3-319-29967-9}, timestamp = {Thu, 23 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/2015gramsec.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VimercatiFJLPS15, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Loose associations to increase utility in data publishing}, journal = {J. Comput. Secur.}, volume = {23}, number = {1}, pages = {59--88}, year = {2015}, url = {https://doi.org/10.3233/JCS-140513}, doi = {10.3233/JCS-140513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VimercatiFJLPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SerraJPRS15, author = {Edoardo Serra and Sushil Jajodia and Andrea Pugliese and Antonino Rullo and V. S. Subrahmanian}, title = {Pareto-Optimal Adversarial Defense of Enterprise Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {17}, number = {3}, pages = {11:1--11:39}, year = {2015}, url = {https://doi.org/10.1145/2699907}, doi = {10.1145/2699907}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/SerraJPRS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangSLHJ15, author = {Ning Zhang and Kun Sun and Wenjing Lou and Yiwei Thomas Hou and Sushil Jajodia}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Now You See Me: Hide and Seek in Physical Address Space}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {321--331}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714600}, doi = {10.1145/2714576.2714600}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangSLHJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VenkatesanAJ15, author = {Sridhar Venkatesan and Massimiliano Albanese and Sushil Jajodia}, title = {Disrupting stealthy botnets through strategic placement of detectors}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {95--103}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346816}, doi = {10.1109/CNS.2015.7346816}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/VenkatesanAJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJ15, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia}, title = {A deception based approach for defeating {OS} and service fingerprinting}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {317--325}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346842}, doi = {10.1109/CNS.2015.7346842}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/JajodiaLS15, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, editor = {Qiming Chen and Abdelkader Hameurlain and Farouk Toumani and Roland R. Wagner and Hendrik Decker}, title = {Numerical {SQL} Value Expressions Over Encrypted Cloud Databases}, booktitle = {Database and Expert Systems Applications - 26th International Conference, {DEXA} 2015, Valencia, Spain, September 1-4, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9262}, pages = {455--478}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22852-5\_38}, doi = {10.1007/978-3-319-22852-5\_38}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/JajodiaLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VimercatiFJPS15, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Integrity for Approximate Joins on Untrusted Computational Servers}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {446--459}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_30}, doi = {10.1007/978-3-319-18467-8\_30}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VimercatiFJPS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2015, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0}, doi = {10.1007/978-3-319-26961-0}, isbn = {978-3-319-26960-3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wistp/2015, editor = {Raja Naeem Akram and Sushil Jajodia}, title = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9311}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24018-3}, doi = {10.1007/978-3-319-24018-3}, isbn = {978-3-319-24017-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/56, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1}, doi = {10.1007/978-3-319-14039-1}, isbn = {978-3-319-14038-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/56.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/JajodiaLS15, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {On-the fly {AES} Decryption/Encryption for Cloud {SQL} Databases}, journal = {CoRR}, volume = {abs/1512.06423}, year = {2015}, url = {http://arxiv.org/abs/1512.06423}, eprinttype = {arXiv}, eprint = {1512.06423}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/JajodiaLS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/sbcs/WangAJ14, author = {Lingyu Wang and Massimiliano Albanese and Sushil Jajodia}, title = {Network Hardening - An Automated Approach to Improving Network Security}, series = {Springer Briefs in Computer Science}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04612-9}, doi = {10.1007/978-3-319-04612-9}, isbn = {978-3-319-04611-2}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/sbcs/WangAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/AlbaneseBJT14, author = {Massimiliano Albanese and Alessandra De Benedictis and Sushil Jajodia and Don J. Torrieri}, title = {A probabilistic framework for jammer identification in MANETs}, journal = {Ad Hoc Networks}, volume = {14}, pages = {84--94}, year = {2014}, url = {https://doi.org/10.1016/j.adhoc.2013.11.007}, doi = {10.1016/J.ADHOC.2013.11.007}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/AlbaneseBJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeKJ14, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, title = {Consistency and enforcement of access rules in cooperative data sharing environment}, journal = {Comput. Secur.}, volume = {41}, pages = {3--18}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.08.011}, doi = {10.1016/J.COSE.2013.08.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangJSCN14, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Pengsu Cheng and Steven Noel}, title = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk of Unknown Vulnerabilities}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {1}, pages = {30--44}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.24}, doi = {10.1109/TDSC.2013.24}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Fragmentation in Presence of Data Dependencies}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {6}, pages = {510--523}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.2295798}, doi = {10.1109/TDSC.2013.2295798}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RoyCSJ14, author = {Sankardas Roy and Mauro Conti and Sanjeev Setia and Sushil Jajodia}, title = {Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {4}, pages = {681--694}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2307197}, doi = {10.1109/TIFS.2014.2307197}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RoyCSJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JajodiaS14, author = {Sushil Jajodia and Kun Sun}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{MTD} 2014: First {ACM} Workshop on Moving Target Defense}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1550--1551}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660385}, doi = {10.1145/2660267.2660385}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JajodiaS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/LiZTJ14, author = {Longquan Li and Sencun Zhu and Don J. Torrieri and Sushil Jajodia}, title = {Self-healing wireless networks under insider jamming attacks}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {220--228}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997489}, doi = {10.1109/CNS.2014.6997489}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/LiZTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Integrity for distributed queries}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {364--372}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997505}, doi = {10.1109/CNS.2014.6997505}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJC14, author = {Massimiliano Albanese and Ermanno Battista and Sushil Jajodia and Valentina Casola}, title = {Manipulating the attacker's view of a system's attack surface}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2014, San Francisco, CA, USA, October 29-31, 2014}, pages = {472--480}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/CNS.2014.6997517}, doi = {10.1109/CNS.2014.6997517}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/NoelJ14, author = {Steven Noel and Sushil Jajodia}, editor = {Robert K. Abercrombie and Jeffrey Todd McDonald}, title = {Metrics suite for network attack graph analytics}, booktitle = {Cyber and Information Security Research Conference, {CISR} '14, Oak Ridge, TN, USA, April 8-10, 2014}, pages = {5--8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2602087.2602117}, doi = {10.1145/2602087.2602117}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/NoelJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJPS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Optimizing Integrity Checks for Join Queries in the Cloud}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {33--48}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_3}, doi = {10.1007/978-3-662-43936-4\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LeKJ14, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Consistent Query Plan Generation in Secure Cooperative Data Access}, booktitle = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, pages = {227--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4\_15}, doi = {10.1007/978-3-662-43936-4\_15}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LeKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SunSWJJ14, author = {He Sun and Kun Sun and Yuewu Wang and Jiwu Jing and Sushil Jajodia}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {TrustDump: Reliable Memory Acquisition on Smartphones}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8712}, pages = {202--218}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11203-9\_12}, doi = {10.1007/978-3-319-11203-9\_12}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/SunSWJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangZJSA14, author = {Lingyu Wang and Mengyuan Zhang and Sushil Jajodia and Anoop Singhal and Massimiliano Albanese}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, title = {Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks}, booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8713}, pages = {494--511}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11212-1\_28}, doi = {10.1007/978-3-319-11212-1\_28}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ShakarianKAJ14, author = {Paulo Shakarian and Nimish Kulkarni and Massimiliano Albanese and Sushil Jajodia}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Joaquim Filipe}, title = {Keeping Intruders at Bay: {A} Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions}, booktitle = {E-Business and Telecommunications - 11th International Joint Conference, {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {554}, pages = {191--211}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-25915-4\_11}, doi = {10.1007/978-3-319-25915-4\_11}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/ShakarianKAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/CybenkoJW014, author = {George Cybenko and Sushil Jajodia and Michael P. Wellman and Peng Liu}, editor = {Atul Prakash and Rudrapatna K. Shyamasundar}, title = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation}, booktitle = {Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {1--8}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13841-1\_1}, doi = {10.1007/978-3-319-13841-1\_1}, timestamp = {Wed, 12 May 2021 16:44:21 +0200}, biburl = {https://dblp.org/rec/conf/iciss/CybenkoJW014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/SunJ14, author = {Kun Sun and Sushil Jajodia}, editor = {Ehab Al{-}Shaer and Krishna Kant}, title = {Protecting Enterprise Networks through Attack Surface Expansion}, booktitle = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {29--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665936.2665939}, doi = {10.1145/2665936.2665939}, timestamp = {Thu, 13 Feb 2020 15:16:46 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/SunJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/ShakarianPAJ14, author = {Paulo Shakarian and Damon Paulo and Massimiliano Albanese and Sushil Jajodia}, editor = {Mohammad S. Obaidat and Andreas Holzinger and Pierangela Samarati}, title = {Keeping Intruders at Large - {A} Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions}, booktitle = {{SECRYPT} 2014 - Proceedings of the 11th International Conference on Security and Cryptography, Vienna, Austria, 28-30 August, 2014}, pages = {19--30}, publisher = {SciTePress}, year = {2014}, url = {https://doi.org/10.5220/0005013800190030}, doi = {10.5220/0005013800190030}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/ShakarianPAJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/XuWJ14, author = {Zhang Xu and Haining Wang and Sushil Jajodia}, title = {Gemini: An Emergency Line of Defense against Phishing Attacks}, booktitle = {33rd {IEEE} International Symposium on Reliable Distributed Systems, {SRDS} 2014, Nara, Japan, October 6-9, 2014}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SRDS.2014.26}, doi = {10.1109/SRDS.2014.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/XuWJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/chb/VimercatiFJS14, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Pierangela Samarati}, editor = {Heikki Topi and Allen Tucker}, title = {Database Security and Privacy}, booktitle = {Computing Handbook, Third Edition: Information Systems and Information Technology}, pages = {53: 1--21}, publisher = {{CRC} Press}, year = {2014}, timestamp = {Tue, 17 Jun 2014 13:41:03 +0200}, biburl = {https://dblp.org/rec/books/crc/chb/VimercatiFJS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/WangSJJ14, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Proof of Isolation for Cloud Storage}, booktitle = {Secure Cloud Computing}, pages = {95--121}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_5}, doi = {10.1007/978-1-4614-9278-8\_5}, timestamp = {Thu, 13 Feb 2020 15:16:45 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/WangSJJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/LeKJ14, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Enabling Collaborative Data Authorization Between Enterprise Clouds}, booktitle = {Secure Cloud Computing}, pages = {149--169}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_7}, doi = {10.1007/978-1-4614-9278-8\_7}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/LeKJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/AlbaneseJJP14, author = {Massimiliano Albanese and Sushil Jajodia and Ravi Jhawar and Vincenzo Piuri}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Securing Mission-Centric Operations in the Cloud}, booktitle = {Secure Cloud Computing}, pages = {239--259}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_11}, doi = {10.1007/978-1-4614-9278-8\_11}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/securecloud14/AlbaneseJJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14, author = {Massimiliano Albanese and Robert F. Erbacher and Sushil Jajodia and Cristian Molinaro and Fabio Persia and Antonio Picariello and Giancarlo Sperl{\`{\i}} and V. S. Subrahmanian}, editor = {Robinson E. Pino}, title = {Recognizing Unexplained Behavior in Network Traffic}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {39--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_3}, doi = {10.1007/978-1-4614-7597-2\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseCJ14, author = {Massimiliano Albanese and Hasan {\c{C}}am and Sushil Jajodia}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {47--60}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_3}, doi = {10.1007/978-3-319-10374-7\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseJ14, author = {Massimiliano Albanese and Sushil Jajodia}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Formation of Awareness}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {47--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_4}, doi = {10.1007/978-3-319-11391-3\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/securecloud2014, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Secure Cloud Computing}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8}, doi = {10.1007/978-1-4614-9278-8}, isbn = {978-1-4614-9277-1}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2014mtd, editor = {Sushil Jajodia and Kun Sun}, title = {Proceedings of the First {ACM} Workshop on Moving Target Defense, {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663474}, doi = {10.1145/2663474}, isbn = {978-1-4503-3150-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2014mtd.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2014, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Anas Abou El Kalam and Thierry Sans}, title = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11 International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55415-5}, doi = {10.1007/978-3-642-55415-5}, isbn = {978-3-642-55414-8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/ChuGKWJ13, author = {Zi Chu and Steven Gianvecchio and Aaron Koehl and Haining Wang and Sushil Jajodia}, title = {Blog or block: Detecting blog bots through behavioral biometrics}, journal = {Comput. Networks}, volume = {57}, number = {3}, pages = {634--646}, year = {2013}, url = {https://doi.org/10.1016/j.comnet.2012.10.005}, doi = {10.1016/J.COMNET.2012.10.005}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/ChuGKWJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VimercatiFJLPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Enforcing dynamic write privileges in data outsourcing}, journal = {Comput. Secur.}, volume = {39}, pages = {47--63}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.01.008}, doi = {10.1016/J.COSE.2013.01.008}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YangZWYZLJ13, author = {Yan Yang and Yulong Zhang and Alex Hai Wang and Meng Yu and Wanyu Zang and Peng Liu and Sushil Jajodia}, title = {Quantitative survivability evaluation of three virtual machine-based server architectures}, journal = {J. Netw. Comput. Appl.}, volume = {36}, number = {2}, pages = {781--790}, year = {2013}, url = {https://doi.org/10.1016/j.jnca.2012.12.006}, doi = {10.1016/J.JNCA.2012.12.006}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/YangZWYZLJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/JajodiaS13, author = {Sushil Jajodia and Pierangela Samarati}, title = {Guest Editorial}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {2}, pages = {178}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2013.2245815}, doi = {10.1109/JSYST.2013.2245815}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/JajodiaS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/JajodiaS13a, author = {Sushil Jajodia and Pierangela Samarati}, title = {Guest Editorial}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {350}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2013.2245816}, doi = {10.1109/JSYST.2013.2245816}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/JajodiaS13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/VimercatiFJPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Integrity for Join Queries in the Cloud}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {1}, number = {2}, pages = {187--200}, year = {2013}, url = {https://doi.org/10.1109/TCC.2013.18}, doi = {10.1109/TCC.2013.18}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/VimercatiFJPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/0004ZCPJM13, author = {Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro and Sushil Jajodia and Luigi Vincenzo Mancini}, title = {Preserving privacy against external and internal threats in {WSN} data aggregation}, journal = {Telecommun. Syst.}, volume = {52}, number = {4}, pages = {2163--2176}, year = {2013}, url = {https://doi.org/10.1007/s11235-011-9539-8}, doi = {10.1007/S11235-011-9539-8}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/telsys/0004ZCPJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tlsdkcs/JajodiaLS13, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {Recoverable Encryption through a Noised Secret over a Large Cloud}, journal = {Trans. Large Scale Data Knowl. Centered Syst.}, volume = {9}, pages = {42--64}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40069-8\_3}, doi = {10.1007/978-3-642-40069-8\_3}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tlsdkcs/JajodiaLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ArdagnaJSS13, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, title = {Providing Users' Anonymity in Mobile Hybrid Networks}, journal = {{ACM} Trans. Internet Techn.}, volume = {12}, number = {3}, pages = {7:1--7:33}, year = {2013}, url = {https://doi.org/10.1145/2461321.2461322}, doi = {10.1145/2461321.2461322}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/ArdagnaJSS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangSJJ13, author = {Zhan Wang and Kun Sun and Jiwu Jing and Sushil Jajodia}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {Verification of data redundancy in cloud storage}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {11--18}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484407}, doi = {10.1145/2484402.2484407}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangSJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/JajodiaLT13, author = {Sushil Jajodia and Wenjing Lou and Wade Trappe}, title = {Welcome message}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {1--2}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682675}, doi = {10.1109/CNS.2013.6682675}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/JajodiaLT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlbaneseBJS13, author = {Massimiliano Albanese and Alessandra De Benedictis and Sushil Jajodia and Kun Sun}, title = {A moving target defense mechanism for MANETs based on identity virtualization}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {278--286}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682717}, doi = {10.1109/CNS.2013.6682717}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlbaneseBJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, editor = {Lingyu Wang and Basit Shafiq}, title = {Extending Loose Associations to Multiple Fragments}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {1--16}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_1}, doi = {10.1007/978-3-642-39256-6\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJJ13, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, editor = {Lingyu Wang and Basit Shafiq}, title = {TerraCheck: Verification of Dedicated Cloud Storage}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {113--127}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_8}, doi = {10.1007/978-3-642-39256-6\_8}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LeKJ13, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Lingyu Wang and Basit Shafiq}, title = {Rule Enforcement with Third Parties in Secure Cooperative Data Access}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {282--288}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_20}, doi = {10.1007/978-3-642-39256-6\_20}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LeKJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AlbaneseJJP13, author = {Massimiliano Albanese and Sushil Jajodia and Ravi Jhawar and Vincenzo Piuri}, title = {Reliable mission deployment in vulnerable distributed systems}, booktitle = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/DSNW.2013.6615514}, doi = {10.1109/DSNW.2013.6615514}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/AlbaneseJJP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fosad/VimercatiEFJLS13, author = {Sabrina De Capitani di Vimercati and Robert F. Erbacher and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Pierangela Samarati}, editor = {Alessandro Aldini and Javier L{\'{o}}pez and Fabio Martinelli}, title = {Encryption and Fragmentation for Data Confidentiality in the Cloud}, booktitle = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013 Tutorial Lectures}, series = {Lecture Notes in Computer Science}, volume = {8604}, pages = {212--243}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-10082-1\_8}, doi = {10.1007/978-3-319-10082-1\_8}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/fosad/VimercatiEFJLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/VimercatiFJPS13, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Chee Yong Chan and Jiaheng Lu and Kjetil N{\o}rv{\aa}g and Egemen Tanin}, title = {On information leakage by indexes over data fragments}, booktitle = {Workshops Proceedings of the 29th {IEEE} International Conference on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12, 2013}, pages = {94--98}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICDEW.2013.6547434}, doi = {10.1109/ICDEW.2013.6547434}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/VimercatiFJPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/AlbaneseJSW13, author = {Massimiliano Albanese and Sushil Jajodia and Anoop Singhal and Lingyu Wang}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {456}, pages = {322--340}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-44788-8\_19}, doi = {10.1007/978-3-662-44788-8\_19}, timestamp = {Tue, 16 Aug 2022 23:04:29 +0200}, biburl = {https://dblp.org/rec/conf/icete/AlbaneseJSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/WangWSJ13, author = {Li Wang and Zhan Wang and Kun Sun and Sushil Jajodia}, editor = {Joe Senftle and Mike Beltrani and Kari Karwedsky}, title = {Reducing Attack Surface with VM-Based Phantom Server}, booktitle = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San Diego, CA, USA, November 18-20, 2013}, pages = {1429--1435}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/MILCOM.2013.242}, doi = {10.1109/MILCOM.2013.242}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/WangWSJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/Jajodia13, author = {Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Security and Privacy of Data in a Cloud}, booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento, Italy, August 30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8425}, pages = {18--22}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-06811-4\_4}, doi = {10.1007/978-3-319-06811-4\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/Jajodia13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13, author = {Massimiliano Albanese and Sushil Jajodia and Anoop Singhal and Lingyu Wang}, editor = {Pierangela Samarati}, title = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {207--218}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223168/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/JajodiaLS13, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {700--707}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.105}, doi = {10.1109/SOCIALCOM.2013.105}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/JajodiaLS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/NzoukouWJS13, author = {William Nzoukou and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {A Unified Framework for Measuring a Network's Mean Time-to-Compromise}, booktitle = {{IEEE} 32nd Symposium on Reliable Distributed Systems, {SRDS} 2013, Braga, Portugal, 1-3 October 2013}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SRDS.2013.30}, doi = {10.1109/SRDS.2013.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/NzoukouWJS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/AlbaneseJM13, author = {Massimiliano Albanese and Sushil Jajodia and Cristian Molinaro}, title = {A Logic Framework for Flexible and Security-Aware Service Composition}, booktitle = {2013 {IEEE} 10th International Conference on Ubiquitous Intelligence and Computing and 2013 {IEEE} 10th International Conference on Autonomic and Trusted Computing, {UIC/ATC} 2013, Vietri sul Mare, Sorrento Peninsula, Italy, December 18-21, 2013}, pages = {337--346}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/UIC-ATC.2013.11}, doi = {10.1109/UIC-ATC.2013.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uic/AlbaneseJM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TorrieriZJ13, author = {Don J. Torrieri and Sencun Zhu and Sushil Jajodia}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Cyber Maneuver Against External Adversaries and Compromised Nodes}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {87--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_5}, doi = {10.1007/978-1-4614-5416-8\_5}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2013, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6}, doi = {10.1007/978-3-642-40203-6}, isbn = {978-3-642-40202-9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/100, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8}, doi = {10.1007/978-1-4614-5416-8}, isbn = {978-1-4614-5415-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ChuGWJ12, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, title = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {811--824}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.75}, doi = {10.1109/TDSC.2012.75}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/RoyCSJ12, author = {Sankardas Roy and Mauro Conti and Sanjeev Setia and Sushil Jajodia}, title = {Secure Data Aggregation in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {3}, pages = {1040--1052}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2012.2189568}, doi = {10.1109/TIFS.2012.2189568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/RoyCSJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tweb/VimercatiFJPPS12, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Giuseppe Psaila and Pierangela Samarati}, title = {Integrating trust management and access control in data-intensive Web applications}, journal = {{ACM} Trans. Web}, volume = {6}, number = {2}, pages = {6:1--6:43}, year = {2012}, url = {https://doi.org/10.1145/2180861.2180863}, doi = {10.1145/2180861.2180863}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tweb/VimercatiFJPPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cason/JajodiaLS12, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {Securing password recovery through dispersion}, booktitle = {Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012}, pages = {228--233}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CASoN.2012.6412407}, doi = {10.1109/CASON.2012.6412407}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/cason/JajodiaLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LeKJ12, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Access rule consistency in cooperative data access environment}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {11--20}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250467}, doi = {10.4108/ICST.COLLABORATECOM.2012.250467}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/LeKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VimercatiFJL12, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Enforcing Subscription-Based Authorization Policies in Cloud Scenarios}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {314--329}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_24}, doi = {10.1007/978-3-642-31540-4\_24}, timestamp = {Fri, 27 Dec 2019 21:29:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/VimercatiFJL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/AlbaneseJN12, author = {Massimiliano Albanese and Sushil Jajodia and Steven Noel}, editor = {Robert S. Swarz and Philip Koopman and Michel Cukier}, title = {Time-efficient and cost-effective network hardening using attack graphs}, booktitle = {{IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2012, Boston, MA, USA, June 25-28, 2012}, pages = {1--12}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/DSN.2012.6263942}, doi = {10.1109/DSN.2012.6263942}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/AlbaneseJN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlbaneseBJS12, author = {Massimiliano Albanese and Alessandra De Benedictis and Sushil Jajodia and Paulo Shakarian}, editor = {Sara Foresti and Moti Yung and Fabio Martinelli}, title = {A Probabilistic Framework for Localization of Attackers in MANETs}, booktitle = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7459}, pages = {145--162}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33167-1\_9}, doi = {10.1007/978-3-642-33167-1\_9}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlbaneseBJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globe/JajodiaLS12, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, editor = {Abdelkader Hameurlain and Farookh Khadeer Hussain and Franck Morvan and A Min Tjoa}, title = {Recoverable Encryption through Noised Secret over a Large Cloud}, booktitle = {Data Management in Cloud, Grid and {P2P} Systems - 5th International Conference, Globe 2012, Vienna, Austria, September 5-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7450}, pages = {13--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32344-7\_2}, doi = {10.1007/978-3-642-32344-7\_2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globe/JajodiaLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/WangSJJ12, author = {Zhan Wang and Kun Sun and Sushil Jajodia and Jiwu Jing}, title = {Disk storage isolation and verification in cloud}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {771--776}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503206}, doi = {10.1109/GLOCOM.2012.6503206}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/WangSJJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/NatarajanNLJH12, author = {Arun Natarajan and Peng Ning and Yao Liu and Sushil Jajodia and Steve E. Hutchinson}, editor = {Albert G. Greenberg and Kazem Sohraby}, title = {NSDMiner: Automated discovery of Network Service Dependencies}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March 25-30, 2012}, pages = {2507--2515}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/INFCOM.2012.6195642}, doi = {10.1109/INFCOM.2012.6195642}, timestamp = {Fri, 07 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/NatarajanNLJH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/PeddycordNJ12, author = {Barry W. Peddycord III and Peng Ning and Sushil Jajodia}, editor = {Carolyn Rowland}, title = {On the Accurate Identification of Network Service Dependencies in Distributed Systems}, booktitle = {Strategies, Tools , and Techniques: Proceedings of the 26th Large Installation System Administration Conference, {LISA} 2012, San Diego, CA, USA, December 9-14, 2012}, pages = {181--194}, publisher = {{USENIX} Association}, year = {2012}, url = {https://www.usenix.org/conference/lisa12/technical-sessions/presentation/peddycord}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/lisa/PeddycordNJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/LeKJ12, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Rule Configuration Checking in Secure Cooperative Data Access}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {135--149}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_8}, doi = {10.1007/978-3-319-01433-3\_8}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/LeKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/VimercatiFJPS12, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Support for Write Privileges on Outsourced Data}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {199--210}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_17}, doi = {10.1007/978-3-642-30436-1\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/VimercatiFJPS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Jajodia12, author = {Sushil Jajodia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {A Mission-centric Framework for Cyber Situational Awareness}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, publisher = {SciTePress}, year = {2012}, timestamp = {Tue, 07 Nov 2017 12:02:58 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/Jajodia12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/MauroMJ12, author = {Alessio Di Mauro and Alessandro Mei and Sushil Jajodia}, editor = {Pierangela Samarati and Wenjing Lou and Jianying Zhou}, title = {Secure File Allocation and Caching in Large-scale Distributed Systems}, booktitle = {{SECRYPT} 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {182--191}, publisher = {SciTePress}, year = {2012}, timestamp = {Thu, 07 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/MauroMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/ChengWJS12, author = {Pengsu Cheng and Lingyu Wang and Sushil Jajodia and Anoop Singhal}, title = {Aggregating {CVSS} Base Scores for Semantics-Rich Network Security Metrics}, booktitle = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012, Irvine, CA, USA, October 8-11, 2012}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SRDS.2012.4}, doi = {10.1109/SRDS.2012.4}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/ChengWJS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stm/NazzicariASJ12, author = {Nelson Nazzicari and Javier Almillategui and Angelos Stavrou and Sushil Jajodia}, editor = {Audun J{\o}sang and Pierangela Samarati and Marinella Petrocchi}, title = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification}, booktitle = {Security and Trust Management - 8th International Workshop, {STM} 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7783}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38004-4\_11}, doi = {10.1007/978-3-642-38004-4\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/LocastoGJS11, author = {Michael E. Locasto and Anup K. Ghosh and Sushil Jajodia and Angelos Stavrou}, title = {The ephemeral legion: producing an expert cyber-security work force from thin air}, journal = {Commun. {ACM}}, volume = {54}, number = {1}, pages = {129--131}, year = {2011}, url = {https://doi.org/10.1145/1866739.1866764}, doi = {10.1145/1866739.1866764}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/JajodiaZ11, author = {Sushil Jajodia and Jianying Zhou}, title = {Message from the Guest Editors}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {267--268}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0131-8}, doi = {10.1007/S10207-011-0131-8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/JajodiaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CirianiVFJPS11, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Selective data outsourcing for enforcing privacy}, journal = {J. Comput. Secur.}, volume = {19}, number = {3}, pages = {531--566}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0422}, doi = {10.3233/JCS-2011-0422}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CirianiVFJPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VimercatiFJPS11, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Authorization enforcement in distributed query evaluation}, journal = {J. Comput. Secur.}, volume = {19}, number = {4}, pages = {751--794}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0413}, doi = {10.3233/JCS-2010-0413}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VimercatiFJPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/GabrielliMSJ11, author = {Andrea Gabrielli and Luigi V. Mancini and Sanjeev Setia and Sushil Jajodia}, title = {Securing Topology Maintenance Protocols for Sensor Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {8}, number = {3}, pages = {450--465}, year = {2011}, url = {https://doi.org/10.1109/TDSC.2009.46}, doi = {10.1109/TDSC.2009.46}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/GabrielliMSJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/MascettiFBWJ11, author = {Sergio Mascetti and Dario Freni and Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies}, journal = {{VLDB} J.}, volume = {20}, number = {4}, pages = {541--566}, year = {2011}, url = {https://doi.org/10.1007/s00778-010-0213-7}, doi = {10.1007/S00778-010-0213-7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/MascettiFBWJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisim/AlbaneseJPS11, author = {Massimiliano Albanese and Sushil Jajodia and Andrea Pugliese and V. S. Subrahmanian}, editor = {Nabendu Chaki and Agostino Cortesi}, title = {Scalable Detection of Cyber Attacks}, booktitle = {Computer Information Systems - Analysis and Technologies - 10th International Conference, {CISIM} 2011, Kolkata, India, December 14-16, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {245}, pages = {9--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27245-5\_4}, doi = {10.1007/978-3-642-27245-5\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisim/AlbaneseJPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LeKJ11, author = {Meixing Le and Krishna Kant and Sushil Jajodia}, editor = {Yingjiu Li}, title = {Cooperative Data Access in Multi-cloud Environments}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {14--28}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_4}, doi = {10.1007/978-3-642-22348-8\_4}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/LeKJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlbaneseJPS11, author = {Massimiliano Albanese and Sushil Jajodia and Andrea Pugliese and V. S. Subrahmanian}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Scalable Analysis of Attack Scenarios}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {416--433}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_23}, doi = {10.1007/978-3-642-23822-2\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlbaneseJPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/SunJLCTS11, author = {Kun Sun and Sushil Jajodia and Jason H. Li and Yi Cheng and Wei Tang and Anoop Singhal}, title = {Automatic security analysis using security metrics}, booktitle = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011}, pages = {1207--1212}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/MILCOM.2011.6127465}, doi = {10.1109/MILCOM.2011.6127465}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/milcom/SunJLCTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/JajodiaNKAW11, author = {Sushil Jajodia and Steven Noel and Pramod Kalapa and Massimiliano Albanese and John Williams}, title = {Cauldron mission-centric cyber situational awareness with defense in depth}, booktitle = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore, MD, USA, November 7-10, 2011}, pages = {1339--1344}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/MILCOM.2011.6127490}, doi = {10.1109/MILCOM.2011.6127490}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/JajodiaNKAW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/KantLJ11, author = {Krishna Kant and Meixing Le and Sushil Jajodia}, editor = {John Banghart and Ehab Al{-}Shaer and Tony Sager and HariGovind V. Ramasamy}, title = {Security Considerations in Data Center Configuration Management}, booktitle = {4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31 - November 1, 2011}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/SafeConfig.2011.6111676}, doi = {10.1109/SAFECONFIG.2011.6111676}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/safeconfig/KantLJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11, author = {Meixing Le and Zhaohui Wang and Quan Jia and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {Trading Elephants for Ants: Efficient Post-attack Reconstitution}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {460--469}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_27}, doi = {10.1007/978-3-642-31909-9\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/VimercatiFJPS11, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Yan Chen and Jaideep Vaidya}, title = {Private data indexes for selective access to outsourced data}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {69--80}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046566}, doi = {10.1145/2046556.2046566}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/VimercatiFJPS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/LitwinJS11, author = {Witold Litwin and Sushil Jajodia and Thomas J. E. Schwarz}, editor = {Yan Chen and Jaideep Vaidya}, title = {Privacy of data outsourced to a cloud for selected readers through client-side encryption}, booktitle = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic society, {WPES} 2011, Chicago, IL, USA, October 17, 2011}, pages = {171--176}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2046556.2046580}, doi = {10.1145/2046556.2046580}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wpes/LitwinJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2011, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1}, doi = {10.1007/978-3-642-25560-1}, isbn = {978-3-642-25559-5}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/crypt/2011, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Encyclopedia of Cryptography and Security, 2nd Ed}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5}, doi = {10.1007/978-1-4419-5906-5}, isbn = {978-1-4419-5905-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/54, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9}, doi = {10.1007/978-1-4614-0977-9}, isbn = {978-1-4614-0976-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/54.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArdagnaVFGJS10, author = {Claudio A. Ardagna and Sabrina De Capitani di Vimercati and Sara Foresti and Tyrone Grandison and Sushil Jajodia and Pierangela Samarati}, title = {Access control for smarter healthcare using policy spaces}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {848--858}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.07.001}, doi = {10.1016/J.COSE.2010.07.001}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ArdagnaVFGJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijngc/NoelWSJ10, author = {Steven Noel and Lingyu Wang and Anoop Singhal and Sushil Jajodia}, title = {Measuring Security Risk of Networks Using Attack Graphs}, journal = {Int. J. Next Gener. Comput.}, volume = {1}, number = {1}, year = {2010}, url = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/68}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijngc/NoelWSJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JajodiaM10, author = {Sushil Jajodia and Jonathan K. Millen}, title = {Editorial}, journal = {J. Comput. Secur.}, volume = {18}, number = {2}, pages = {187}, year = {2010}, url = {https://doi.org/10.3233/JCS-2010-0402}, doi = {10.3233/JCS-2010-0402}, timestamp = {Wed, 23 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/JajodiaM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/VimercatiFJPS10, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Fragments and Loose Associations: Respecting Privacy in Data Publishing}, journal = {Proc. {VLDB} Endow.}, volume = {3}, number = {1}, pages = {1370--1381}, year = {2010}, url = {http://www.vldb.org/pvldb/vldb2010/pvldb\_vol3/R121.pdf}, doi = {10.14778/1920841.1921009}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/VimercatiFJPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/ChenCWZJ10, author = {Songqing Chen and Shiping Chen and Xinyuan Wang and Zhao Zhang and Sushil Jajodia}, title = {An Application-Level Data Transparent Authentication Scheme without Communication Overhead}, journal = {{IEEE} Trans. Computers}, volume = {59}, number = {7}, pages = {943--954}, year = {2010}, url = {https://doi.org/10.1109/TC.2010.80}, doi = {10.1109/TC.2010.80}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/ChenCWZJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ZhuSJW10, author = {Bo Zhu and Sanjeev Setia and Sushil Jajodia and Lingyu Wang}, title = {Providing witness anonymity under peer-to-peer settings}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {5}, number = {2}, pages = {324--336}, year = {2010}, url = {https://doi.org/10.1109/TIFS.2010.2041821}, doi = {10.1109/TIFS.2010.2041821}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ZhuSJW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CirianiVFJPS10, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Combining fragmentation and encryption to protect privacy in data storage}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {22:1--22:33}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805978}, doi = {10.1145/1805974.1805978}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/ZhuSJRW10, author = {Bo Zhu and Sanjeev Setia and Sushil Jajodia and Sankardas Roy and Lingyu Wang}, title = {Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {9}, number = {7}, pages = {913--926}, year = {2010}, url = {https://doi.org/10.1109/TMC.2010.40}, doi = {10.1109/TMC.2010.40}, timestamp = {Thu, 15 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/ZhuSJRW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/VimercatiFJPS10, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Encryption policies for regulating access to outsourced data}, journal = {{ACM} Trans. Database Syst.}, volume = {35}, number = {2}, pages = {12:1--12:46}, year = {2010}, url = {https://doi.org/10.1145/1735886.1735891}, doi = {10.1145/1735886.1735891}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tods/VimercatiFJPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/ZhangZCPJM10, author = {Lei Zhang and Honggang Zhang and Mauro Conti and Roberto Di Pietro and Sushil Jajodia and Luigi Vincenzo Mancini}, title = {Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks}, booktitle = {10th {IEEE} International Conference on Computer and Information Technology, {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010}, pages = {910--915}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CIT.2010.169}, doi = {10.1109/CIT.2010.169}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/ZhangZCPJM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/JajodiaLS10, author = {Sushil Jajodia and Witold Litwin and Thomas J. E. Schwarz}, title = {LH*RE: {A} Scalable Distributed Data Structure with Recoverable Encryption}, booktitle = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010, Miami, FL, USA, 5-10 July, 2010}, pages = {354--361}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CLOUD.2010.41}, doi = {10.1109/CLOUD.2010.41}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/JajodiaLS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChuGWJ10, author = {Zi Chu and Steven Gianvecchio and Haining Wang and Sushil Jajodia}, editor = {Carrie Gates and Michael Franz and John P. McDermott}, title = {Who is tweeting on Twitter: human, bot, or cyborg?}, booktitle = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC} 2010, Austin, Texas, USA, 6-10 December 2010}, pages = {21--30}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1920261.1920265}, doi = {10.1145/1920261.1920265}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangBJ10, author = {Lei Zhang and Alexander Brodsky and Sushil Jajodia}, editor = {Dengguo Feng and David A. Basin and Peng Liu}, title = {Restoring compromised privacy in micro-data disclosure}, booktitle = {Proceedings of the 5th {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16, 2010}, pages = {36--47}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1755688.1755694}, doi = {10.1145/1755688.1755694}, timestamp = {Fri, 03 Jun 2022 12:02:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhangBJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaJSS10, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Providing Mobile Users' Anonymity in Hybrid Networks}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {540--557}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_33}, doi = {10.1007/978-3-642-15497-3\_33}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaJSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangJSN10, author = {Lingyu Wang and Sushil Jajodia and Anoop Singhal and Steven Noel}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {\emph{k}-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {573--587}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_35}, doi = {10.1007/978-3-642-15497-3\_35}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangJSN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/VimercatiFJPPS10, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati}, title = {Encryption-Based Policy Enforcement for Cloud Storage}, booktitle = {30th {IEEE} International Conference on Distributed Computing Systems Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy}, pages = {42--51}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDCSW.2010.35}, doi = {10.1109/ICDCSW.2010.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/VimercatiFJPPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/SengarRWWJ10, author = {Hemant Sengar and Zhen Ren and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Tracking Skype VoIP Calls Over The Internet}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {96--100}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462266}, doi = {10.1109/INFCOM.2010.5462266}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/SengarRWWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/SeymerSWJ10, author = {Paul Seymer and Angelos Stavrou and Duminda Wijesekera and Sushil Jajodia}, title = {QoP and QoS Policy Cognizant Module Composition}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {77--86}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.16}, doi = {10.1109/POLICY.2010.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/SeymerSWJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dmkdh/SinghalJ10, author = {Anoop Singhal and Sushil Jajodia}, editor = {Oded Maimon and Lior Rokach}, title = {Data Mining for Intrusion Detection}, booktitle = {Data Mining and Knowledge Discovery Handbook, 2nd ed}, pages = {1171--1180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-09823-4\_61}, doi = {10.1007/978-0-387-09823-4\_61}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/reference/dmkdh/SinghalJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaN10, author = {Sushil Jajodia and Steven Noel}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Topological Vulnerability Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {139--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_7}, doi = {10.1007/978-1-4419-0140-8\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2010, editor = {Sara Foresti and Sushil Jajodia}, title = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6}, doi = {10.1007/978-3-642-13739-6}, isbn = {978-3-642-13738-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2010, editor = {Sushil Jajodia and Jianying Zhou}, title = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2}, doi = {10.1007/978-3-642-16161-2}, isbn = {978-3-642-16160-5}, timestamp = {Sun, 07 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/46, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8}, doi = {10.1007/978-1-4419-0140-8}, isbn = {978-1-4419-0139-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/46.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1007-0408, author = {Sergio Mascetti and Dario Freni and Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies}, journal = {CoRR}, volume = {abs/1007.0408}, year = {2010}, url = {http://arxiv.org/abs/1007.0408}, eprinttype = {arXiv}, eprint = {1007.0408}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1007-0408.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/RoyCSJ09, author = {Sankardas Roy and Mauro Conti and Sanjeev Setia and Sushil Jajodia}, title = {Secure median computation in wireless sensor networks}, journal = {Ad Hoc Networks}, volume = {7}, number = {8}, pages = {1448--1462}, year = {2009}, url = {https://doi.org/10.1016/j.adhoc.2009.04.007}, doi = {10.1016/J.ADHOC.2009.04.007}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/RoyCSJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/Fernandez-MedinaJTJ09, author = {Eduardo Fern{\'{a}}ndez{-}Medina and Jan J{\"{u}}rjens and Juan Trujillo and Sushil Jajodia}, title = {Model-Driven Development for secure information systems}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {5}, pages = {809--814}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.05.010}, doi = {10.1016/J.INFSOF.2008.05.010}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/Fernandez-MedinaJTJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/YaoWWBJ09, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Claudio Bettini and Sushil Jajodia}, title = {Evaluating privacy threats in released database views by symmetric indistinguishability}, journal = {J. Comput. Secur.}, volume = {17}, number = {1}, pages = {5--42}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0317}, doi = {10.3233/JCS-2009-0317}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ContiZRPJM09, author = {Mauro Conti and Lei Zhang and Sankardas Roy and Roberto Di Pietro and Sushil Jajodia and Luigi V. Mancini}, title = {Privacy-preserving robust data aggregation in wireless sensor networks}, journal = {Secur. Commun. Networks}, volume = {2}, number = {2}, pages = {195--213}, year = {2009}, url = {https://doi.org/10.1002/sec.95}, doi = {10.1002/SEC.95}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ContiZRPJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/RenLZJ09, author = {Kui Ren and Wenjing Lou and Bo Zhu and Sushil Jajodia}, title = {Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {58}, number = {4}, pages = {2018--2029}, year = {2009}, url = {https://doi.org/10.1109/TVT.2008.2003961}, doi = {10.1109/TVT.2008.2003961}, timestamp = {Wed, 14 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/RenLZJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CirianiVFJPS09, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {225--239}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_15}, doi = {10.1007/978-3-642-03007-9\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/CirianiVFJPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BettiniMWFJ09, author = {Claudio Bettini and Sergio Mascetti and Xiaoyang Sean Wang and Dario Freni and Sushil Jajodia}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Anonymity and Historical-Anonymity in Location-Based Services}, booktitle = {Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]}, series = {Lecture Notes in Computer Science}, volume = {5599}, pages = {1--30}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03511-1\_1}, doi = {10.1007/978-3-642-03511-1\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BettiniMWFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaJSS09, author = {Claudio A. Ardagna and Sushil Jajodia and Pierangela Samarati and Angelos Stavrou}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Privacy Preservation over Untrusted Mobile Networks}, booktitle = {Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]}, series = {Lecture Notes in Computer Science}, volume = {5599}, pages = {84--105}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03511-1\_4}, doi = {10.1007/978-3-642-03511-1\_4}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaJSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CirianiVFJPS09, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Michael Backes and Peng Ning}, title = {Keep a Few: Outsourcing Data While Maintaining Confidentiality}, booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5789}, pages = {440--455}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04444-1\_27}, doi = {10.1007/978-3-642-04444-1\_27}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CirianiVFJPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/CirianiVFJPS09, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases}, booktitle = {29th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada}, pages = {32--39}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDCS.2009.52}, doi = {10.1109/ICDCS.2009.52}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/CirianiVFJPS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SengarWWWJ09, author = {Hemant Sengar and Xinyuan Wang and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Online detection of network traffic anomalies using behavioral distance}, booktitle = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston, South Carolina, USA, 13-15 July 2009}, pages = {1--9}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/IWQoS.2009.5201415}, doi = {10.1109/IWQOS.2009.5201415}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SengarWWWJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/MascettiBFWJ09, author = {Sergio Mascetti and Claudio Bettini and Dario Freni and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Yu{-}Chee Tseng and Peter Scheuermann and Ralf Hartmut G{\"{u}}ting and Wang{-}Chien Lee and Chung{-}Ta King and Evaggelia Pitoura}, title = {Privacy-Aware Proximity Based Services}, booktitle = {{MDM} 2009, Tenth International Conference on Mobile Data Management, Taipei, Taiwan, 18-20 May 2009}, pages = {31--40}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MDM.2009.14}, doi = {10.1109/MDM.2009.14}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/MascettiBFWJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/MascettiBWFJ09, author = {Sergio Mascetti and Claudio Bettini and Xiaoyang Sean Wang and Dario Freni and Sushil Jajodia}, editor = {Yu{-}Chee Tseng and Peter Scheuermann and Ralf Hartmut G{\"{u}}ting and Wang{-}Chien Lee and Chung{-}Ta King and Evaggelia Pitoura}, title = {ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in {LBS}}, booktitle = {{MDM} 2009, Tenth International Conference on Mobile Data Management, Taipei, Taiwan, 18-20 May 2009}, pages = {172--181}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/MDM.2009.28}, doi = {10.1109/MDM.2009.28}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/MascettiBWFJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangWJB09, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Willem Jonker and Milan Petkovic}, title = {L-Cover: Preserving Diversity by Anonymity}, booktitle = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France, August 28, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5776}, pages = {158--171}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04219-5\_10}, doi = {10.1007/978-3-642-04219-5\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/RiboniPBJ09, author = {Daniele Riboni and Linda Pareschi and Claudio Bettini and Sushil Jajodia}, editor = {Carsten Lutz and Jean{-}Fran{\c{c}}ois Raskin}, title = {Preserving Anonymity of Recurrent Location-Based Queries}, booktitle = {{TIME} 2009, 16th International Symposium on Temporal Representation and Reasoning, Bressanone-Brixen, Italy, 23-25 July 2009, Proceedings}, pages = {62--69}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/TIME.2009.8}, doi = {10.1109/TIME.2009.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/RiboniPBJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2009-5599, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]}, series = {Lecture Notes in Computer Science}, volume = {5599}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03511-1}, doi = {10.1007/978-3-642-03511-1}, isbn = {978-3-642-03510-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2009-5599.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/BettiniWJ09, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Temporal Granularity}, booktitle = {Encyclopedia of Database Systems}, pages = {2968--2973}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_397}, doi = {10.1007/978-0-387-39940-9\_397}, timestamp = {Sun, 02 Jun 2019 21:10:27 +0200}, biburl = {https://dblp.org/rec/reference/db/BettiniWJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangYSJ08, author = {Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia}, title = {Implementing interactive analysis of attack graphs using relational databases}, journal = {J. Comput. Secur.}, volume = {16}, number = {4}, pages = {419--437}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0327}, doi = {10.3233/JCS-2008-0327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangYSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/NoelJ08, author = {Steven Noel and Sushil Jajodia}, title = {Optimal {IDS} Sensor Placement and Alert Prioritization Using Attack Graphs}, journal = {J. Netw. Syst. Manag.}, volume = {16}, number = {3}, pages = {259--275}, year = {2008}, url = {https://doi.org/10.1007/s10922-008-9109-x}, doi = {10.1007/S10922-008-9109-X}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/NoelJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tomccap/ChenCGSJ08, author = {Songqing Chen and Shiping Chen and Huiping Guo and Bo Shen and Sushil Jajodia}, title = {Achieving simultaneous distribution control and privacy protection for Internet media delivery}, journal = {{ACM} Trans. Multim. Comput. Commun. Appl.}, volume = {4}, number = {2}, pages = {9:1--9:23}, year = {2008}, url = {https://doi.org/10.1145/1352012.1352013}, doi = {10.1145/1352012.1352013}, timestamp = {Tue, 19 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tomccap/ChenCGSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/SengarWWJ08, author = {Hemant Sengar and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Detecting VoIP Floods Using the Hellinger Distance}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {19}, number = {6}, pages = {794--805}, year = {2008}, url = {https://doi.org/10.1109/TPDS.2007.70786}, doi = {10.1109/TPDS.2007.70786}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/SengarWWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuangSGJ08, author = {Yih Huang and Angelos Stavrou and Anup K. Ghosh and Sushil Jajodia}, editor = {Jason Nieh and Angelos Stavrou}, title = {Efficiently tracking application interactions using lightweight virtualization}, booktitle = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security, VMSec 2008, Alexandria, VA, USA, October 27, 2008}, pages = {19--28}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456482.1456486}, doi = {10.1145/1456482.1456486}, timestamp = {Wed, 04 May 2022 13:02:17 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FrigaultWSJ08, author = {Marcel Frigault and Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {Andy Ozment and Ketil St{\o}len}, title = {Measuring network security using dynamic bayesian network}, booktitle = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP 2008, Alexandria, VA, USA, October 27, 2008}, pages = {23--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456362.1456368}, doi = {10.1145/1456362.1456368}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FrigaultWSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VimercatiFJPS08, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Peng Ning and Paul F. Syverson and Somesh Jha}, title = {Assessing query privileges via safe and efficient permission composition}, booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008}, pages = {311--322}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1455770.1455810}, doi = {10.1145/1455770.1455810}, timestamp = {Tue, 10 Nov 2020 19:59:27 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VimercatiFJPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZhangWJB08, author = {Lei Zhang and Lingyu Wang and Sushil Jajodia and Alexander Brodsky}, editor = {Vijay Atluri}, title = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {190--204}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_15}, doi = {10.1007/978-3-540-70567-3\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ArdagnaVGJS08, author = {Claudio Agostino Ardagna and Sabrina De Capitani di Vimercati and Tyrone Grandison and Sushil Jajodia and Pierangela Samarati}, editor = {Vijay Atluri}, title = {Regulating Exceptions in Healthcare Using Policy Spaces}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {254--267}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_20}, doi = {10.1007/978-3-540-70567-3\_20}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ArdagnaVGJS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangILSJ08, author = {Lingyu Wang and Tania Islam and Tao Long and Anoop Singhal and Sushil Jajodia}, editor = {Vijay Atluri}, title = {An Attack Graph-Based Probabilistic Security Metric}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {283--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_22}, doi = {10.1007/978-3-540-70567-3\_22}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ArdagnaSJSM08, author = {Claudio A. Ardagna and Angelos Stavrou and Sushil Jajodia and Pierangela Samarati and Rhandi Martin}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks}, booktitle = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397/paper6.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:59 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ArdagnaSJSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MascettiFBWJ08, author = {Sergio Mascetti and Dario Freni and Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {On the Impact of User Movement Simulations in the Evaluation of {LBS} Privacy- Preserving Techniques}, booktitle = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397/paper5.pdf}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/MascettiFBWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/VimercatiFJPS08, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Controlled Information Sharing in Collaborative Distributed Query Processing}, booktitle = {28th {IEEE} International Conference on Distributed Computing Systems {(ICDCS} 2008), 17-20 June 2008, Beijing, China}, pages = {303--310}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDCS.2008.62}, doi = {10.1109/ICDCS.2008.62}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/VimercatiFJPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ZhangBSJ08, author = {Lei Zhang and Alexander Brodsky and Vipin Swarup and Sushil Jajodia}, title = {A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling}, booktitle = {9th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York, {USA}}, pages = {181--188}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/POLICY.2008.20}, doi = {10.1109/POLICY.2008.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ZhangBSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08, author = {Steven Gianvecchio and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Richard Lippmann and Engin Kirda and Ari Trachtenberg}, title = {Model-Based Covert Timing Channels: Automated Modeling and Evasion}, booktitle = {Recent Advances in Intrusion Detection, 11th International Symposium, {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5230}, pages = {211--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-87403-4\_12}, doi = {10.1007/978-3-540-87403-4\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ08, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {How Anonymous Is k-Anonymous? Look at Your Quasi-ID}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {1--15}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_1}, doi = {10.1007/978-3-540-85259-9\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/ZhangJB08, author = {Lei Zhang and Sushil Jajodia and Alexander Brodsky}, editor = {Willem Jonker and Milan Petkovic}, title = {Simulatable Binding: Beyond Simulatable Auditing}, booktitle = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland, New Zealand, August 24, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5159}, pages = {16--31}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85259-9\_2}, doi = {10.1007/978-3-540-85259-9\_2}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdmw/ZhangJB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/RoyCSJ08, author = {Sankardas Roy and Mauro Conti and Sanjeev Setia and Sushil Jajodia}, editor = {Albert Levi and Peng Liu and Refik Molva}, title = {Securely computing an approximate median in wireless sensor networks}, booktitle = {4th International {ICST} Conference on Security and Privacy in Communication Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008}, pages = {6}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1460877.1460885}, doi = {10.1145/1460877.1460885}, timestamp = {Tue, 06 Nov 2018 16:58:12 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/RoyCSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/VimercatiFJPPS08, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Gerardo Pelosi and Pierangela Samarati}, editor = {Vijay Atluri and Marianne Winslett}, title = {Preserving confidentiality of security policies in data outsourcing}, booktitle = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {75--84}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456403.1456417}, doi = {10.1145/1456403.1456417}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/VimercatiFJPPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/WangJ08, author = {Lingyu Wang and Sushil Jajodia}, editor = {Michael Gertz and Sushil Jajodia}, title = {Security in Data Warehouses and {OLAP} Systems}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {191--212}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_8}, doi = {10.1007/978-0-387-48533-1\_8}, timestamp = {Mon, 07 Dec 2020 17:16:27 +0100}, biburl = {https://dblp.org/rec/reference/dbsec/WangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/LiuJY08, author = {Peng Liu and Sushil Jajodia and Meng Yu}, editor = {Michael Gertz and Sushil Jajodia}, title = {Damage Quarantine and Recovery in Data Processing Systems}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {383--407}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_16}, doi = {10.1007/978-0-387-48533-1\_16}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/dbsec/LiuJY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/wiley/VimercatiSJ08, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati and Sushil Jajodia}, editor = {Benjamin W. Wah}, title = {Data Security}, booktitle = {Wiley Encyclopedia of Computer Science and Engineering}, publisher = {John Wiley {\&} Sons, Inc.}, year = {2008}, url = {https://doi.org/10.1002/9780470050118.ecse096}, doi = {10.1002/9780470050118.ECSE096}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/wiley/VimercatiSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2008pilba, editor = {Claudio Bettini and Sushil Jajodia and Pierangela Samarati and Xiaoyang Sean Wang}, title = {Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008}, series = {{CEUR} Workshop Proceedings}, volume = {397}, publisher = {CEUR-WS.org}, year = {2008}, url = {https://ceur-ws.org/Vol-397}, urn = {urn:nbn:de:0074-397-1}, timestamp = {Fri, 10 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/2008pilba.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2008, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5}, doi = {10.1007/978-3-540-88313-5}, isbn = {978-3-540-88312-8}, timestamp = {Thu, 29 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2008, editor = {Sushil Jajodia and Pierangela Samarati and Stelvio Cimato}, title = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008, September 7-10, 2008, Milano, Italy}, series = {{IFIP}}, volume = {278}, publisher = {Springer}, year = {2008}, isbn = {978-0-387-09698-8}, timestamp = {Wed, 17 Sep 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:reference/dbsec/2008, editor = {Michael Gertz and Sushil Jajodia}, title = {Handbook of Database Security - Applications and Trends}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1}, doi = {10.1007/978-0-387-48533-1}, isbn = {978-0-387-48532-4}, timestamp = {Mon, 07 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/dbsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, title = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}}, series = {Advances in Information Security}, volume = {29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46274-5}, doi = {10.1007/978-0-387-46274-5}, isbn = {978-0-387-46273-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuYLSJ07, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, title = {Efficient security mechanisms for overlay multicast based content delivery}, journal = {Comput. Commun.}, volume = {30}, number = {4}, pages = {793--806}, year = {2007}, url = {https://doi.org/10.1016/j.comcom.2006.10.003}, doi = {10.1016/J.COMCOM.2006.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcse/VimercatiFSJ07, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati and Sushil Jajodia}, title = {Access control policies and languages}, journal = {Int. J. Comput. Sci. Eng.}, volume = {3}, number = {2}, pages = {94--102}, year = {2007}, url = {https://doi.org/10.1504/IJCSE.2007.015739}, doi = {10.1504/IJCSE.2007.015739}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcse/VimercatiFSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GuoLJ07, author = {Huiping Guo and Yingjiu Li and Sushil Jajodia}, title = {Chaining watermarks for detecting malicious modifications to streaming data}, journal = {Inf. Sci.}, volume = {177}, number = {1}, pages = {281--298}, year = {2007}, url = {https://doi.org/10.1016/j.ins.2006.03.014}, doi = {10.1016/J.INS.2006.03.014}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/GuoLJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangLJW07, author = {Lingyu Wang and Yingjiu Li and Sushil Jajodia and Duminda Wijesekera}, title = {Parity-based inference control for multi-dimensional range sum queries}, journal = {J. Comput. Secur.}, volume = {15}, number = {4}, pages = {417--445}, year = {2007}, url = {https://doi.org/10.3233/jcs-2007-15401}, doi = {10.3233/JCS-2007-15401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangLJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/LiuLJA07, author = {Peng Liu and Jie Li and Sushil Jajodia and Paul Ammann}, title = {Can-Follow Concurrency Control}, journal = {{IEEE} Trans. Computers}, volume = {56}, number = {10}, pages = {1425--1430}, year = {2007}, url = {https://doi.org/10.1109/TC.2007.70761}, doi = {10.1109/TC.2007.70761}, timestamp = {Mon, 13 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/LiuLJA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJN07, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {Interleaved hop-by-hop authentication against false data injection attacks in sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {3}, number = {3}, pages = {14}, year = {2007}, url = {https://doi.org/10.1145/1267060.1267062}, doi = {10.1145/1267060.1267062}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZhuASJR07, author = {Bo Zhu and Venkata Gopala Krishna Addada and Sanjeev Setia and Sushil Jajodia and Sankardas Roy}, title = {Efficient Distributed Detection of Node Replication Attacks in Sensor Networks}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {257--267}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.26}, doi = {10.1109/ACSAC.2007.26}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZhuASJR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Jajodia07, author = {Sushil Jajodia}, editor = {Feng Bao and Steven Miller}, title = {Topological analysis of network attack vulnerability}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {2}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229288}, doi = {10.1145/1229285.1229288}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Jajodia07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangSJ07, author = {Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {G{\"{u}}nter Karjoth and Ketil St{\o}len}, title = {Toward measuring network security using attack graphs}, booktitle = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP 2007, Alexandria, VA, USA, October 29, 2007}, pages = {49--54}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314257.1314273}, doi = {10.1145/1314257.1314273}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VimercatiFJPS07, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Peng Ning and Vijay Atluri}, title = {A data outsourcing architecture combining cryptography and access control}, booktitle = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture, {CSAW} 2007, Fairfax, VA, USA, November 2, 2007}, pages = {63--69}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1314466.1314477}, doi = {10.1145/1314466.1314477}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/VimercatiFJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VimercatiJPS07, author = {Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Feng Bao and Steven Miller}, title = {Trust management services in relational databases}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {149--160}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229308}, doi = {10.1145/1229285.1229308}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VimercatiJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangJB07, author = {Lei Zhang and Sushil Jajodia and Alexander Brodsky}, editor = {Peng Ning and Sabrina De Capitani di Vimercati and Paul F. Syverson}, title = {Information disclosure under realistic assumptions: privacy versus optimality}, booktitle = {Proceedings of the 2007 {ACM} Conference on Computer and Communications Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007}, pages = {573--583}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1315245.1315316}, doi = {10.1145/1315245.1315316}, timestamp = {Tue, 10 Nov 2020 20:00:14 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangJB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangSJ07, author = {Lingyu Wang and Anoop Singhal and Sushil Jajodia}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Measuring the Overall Security of Network Configurations Using Attack Graphs}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {98--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_9}, doi = {10.1007/978-3-540-73538-0\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/CirianiVFJPS07, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {Fragmentation and Encryption to Enforce Privacy in Data Storage}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {171--186}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_12}, doi = {10.1007/978-3-540-74835-9\_12}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/CirianiVFJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/BettiniMWJ07, author = {Claudio Bettini and Sergio Mascetti and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Christian Becker and Christian S. Jensen and Jianwen Su and Daniela Nicklas}, title = {Anonymity in Location-Based Services: Towards a General Framework}, booktitle = {8th International Conference on Mobile Data Management {(MDM} 2007), Mannheim, Germany, May 7-11, 2007}, pages = {69--76}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/MDM.2007.19}, doi = {10.1109/MDM.2007.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/BettiniMWJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/percom/BettiniJP07, author = {Claudio Bettini and Sushil Jajodia and Linda Pareschi}, title = {Anonymity and Diversity in {LBS:} {A} Preliminary Investigation}, booktitle = {Fifth Annual {IEEE} International Conference on Pervasive Computing and Communications - Workshops (PerCom Workshops 2007), 19-23 March 2007, White Plains, New York, {USA}}, pages = {577--580}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PERCOMW.2007.23}, doi = {10.1109/PERCOMW.2007.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/percom/BettiniJP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BrodskyZJ07, author = {Alexander Brodsky and Lei Zhang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases}, booktitle = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria, September 23-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4721}, pages = {81--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75248-6\_6}, doi = {10.1007/978-3-540-75248-6\_6}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BrodskyZJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DamianiVFJPS07, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Hein S. Venter and Mariki M. Eloff and Les Labuschagne and Jan H. P. Eloff and Rossouw von Solms}, title = {An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing}, booktitle = {New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the {IFIP} {TC-11} 22nd International Information Security Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa}, series = {{IFIP}}, volume = {232}, pages = {385--396}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-72367-9\_33}, doi = {10.1007/978-0-387-72367-9\_33}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/DamianiVFJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangCJ07, author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, title = {Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems}, booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23 May 2007, Oakland, California, {USA}}, pages = {116--130}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SP.2007.30}, doi = {10.1109/SP.2007.30}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangCJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/VimercatiFJPS07, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Christoph Koch and Johannes Gehrke and Minos N. Garofalakis and Divesh Srivastava and Karl Aberer and Anand Deshpande and Daniela Florescu and Chee Yong Chan and Venkatesh Ganti and Carl{-}Christian Kanne and Wolfgang Klas and Erich J. Neuhold}, title = {Over-encryption: Management of Access Control Evolution on Outsourced Data}, booktitle = {Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007}, pages = {123--134}, publisher = {{ACM}}, year = {2007}, url = {http://www.vldb.org/conf/2007/papers/research/p123-decapitani.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/VimercatiFJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaY07, author = {Sushil Jajodia and Ting Yu}, editor = {Ting Yu and Sushil Jajodia}, title = {Basic Security Concepts}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {3--20}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_1}, doi = {10.1007/978-0-387-27696-0\_1}, timestamp = {Mon, 04 Apr 2022 16:00:08 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/VimercatiFJS07, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Pierangela Samarati}, editor = {Ting Yu and Sushil Jajodia}, title = {Access Control Policies and Languages in Open Environments}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {21--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_2}, doi = {10.1007/978-0-387-27696-0\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/VimercatiFJS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YuLZJ07, author = {Meng Yu and Peng Liu and Wanyu Zang and Sushil Jajodia}, editor = {Ting Yu and Sushil Jajodia}, title = {Trusted Recovery}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {59--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_3}, doi = {10.1007/978-0-387-27696-0\_3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YuLZJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, editor = {Ting Yu and Sushil Jajodia}, title = {Preserving Privacy in On-line Analytical Processing Data Cubes}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {355--380}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_11}, doi = {10.1007/978-0-387-27696-0\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/33, editor = {Ting Yu and Sushil Jajodia}, title = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, publisher = {Springer}, year = {2007}, isbn = {978-0-387-27694-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/33.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/ZhuXSJ06, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {{LHAP:} {A} lightweight network access control protocol for ad hoc networks}, journal = {Ad Hoc Networks}, volume = {4}, number = {5}, pages = {567--585}, year = {2006}, url = {https://doi.org/10.1016/j.adhoc.2005.06.002}, doi = {10.1016/J.ADHOC.2005.06.002}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/ZhuXSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangLJ06, author = {Lingyu Wang and Anyi Liu and Sushil Jajodia}, title = {Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts}, journal = {Comput. Commun.}, volume = {29}, number = {15}, pages = {2917--2933}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.04.001}, doi = {10.1016/J.COMCOM.2006.04.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangNJ06, author = {Lingyu Wang and Steven Noel and Sushil Jajodia}, title = {Minimum-cost network hardening using attack graphs}, journal = {Comput. Commun.}, volume = {29}, number = {18}, pages = {3812--3824}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2006.06.018}, doi = {10.1016/J.COMCOM.2006.06.018}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangNJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/SinghalJ06, author = {Anoop Singhal and Sushil Jajodia}, title = {Data warehousing and data mining techniques for intrusion detection systems}, journal = {Distributed Parallel Databases}, volume = {20}, number = {2}, pages = {149--166}, year = {2006}, url = {https://doi.org/10.1007/s10619-006-9496-5}, doi = {10.1007/S10619-006-9496-5}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/SinghalJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsn/ZhuJK06, author = {Bo Zhu and Sushil Jajodia and Mohan S. Kankanhalli}, title = {Building trust in peer-to-peer systems: a review}, journal = {Int. J. Secur. Networks}, volume = {1}, number = {1/2}, pages = {103--112}, year = {2006}, url = {https://doi.org/10.1504/IJSN.2006.010827}, doi = {10.1504/IJSN.2006.010827}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiZWJ06, author = {Yingjiu Li and Sencun Zhu and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Looking into the seeds of time: Discovering temporal patterns in large transaction sets}, journal = {Inf. Sci.}, volume = {176}, number = {8}, pages = {1003--1031}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2005.01.019}, doi = {10.1016/J.INS.2005.01.019}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiZWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/GuoLLJ06, author = {Huiping Guo and Yingjiu Li and Anyi Liu and Sushil Jajodia}, title = {A fragile watermarking scheme for detecting malicious modifications of database relations}, journal = {Inf. Sci.}, volume = {176}, number = {10}, pages = {1350--1378}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2005.06.003}, doi = {10.1016/J.INS.2005.06.003}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/GuoLLJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/FarkasBJ06, author = {Csilla Farkas and Alexander Brodsky and Sushil Jajodia}, title = {Unauthorized inferences in semistructured databases}, journal = {Inf. Sci.}, volume = {176}, number = {22}, pages = {3269--3299}, year = {2006}, url = {https://doi.org/10.1016/j.ins.2006.01.004}, doi = {10.1016/J.INS.2006.01.004}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/FarkasBJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhuSXJ06, author = {Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia}, title = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks}, journal = {J. Comput. Secur.}, volume = {14}, number = {4}, pages = {301--325}, year = {2006}, url = {https://doi.org/10.3233/jcs-2006-14401}, doi = {10.3233/JCS-2006-14401}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/ChenWJ06, author = {Shiping Chen and Xinyuan Wang and Sushil Jajodia}, title = {On the anonymity and traceability of peer-to-peer VoIP calls}, journal = {{IEEE} Netw.}, volume = {20}, number = {5}, pages = {32--37}, year = {2006}, url = {https://doi.org/10.1109/MNET.2006.1705881}, doi = {10.1109/MNET.2006.1705881}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/ChenWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/SengarDWJ06, author = {Hemant Sengar and Ram Dantu and Duminda Wijesekera and Sushil Jajodia}, title = {{SS7} over {IP:} signaling interworking vulnerabilities}, journal = {{IEEE} Netw.}, volume = {20}, number = {6}, pages = {32--41}, year = {2006}, url = {https://doi.org/10.1109/MNET.2006.273119}, doi = {10.1109/MNET.2006.273119}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/SengarDWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/ZhuSJ06, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, title = {{LEAP+:} Efficient security mechanisms for large-scale distributed sensor networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {2}, number = {4}, pages = {500--528}, year = {2006}, url = {https://doi.org/10.1145/1218556.1218559}, doi = {10.1145/1218556.1218559}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ChenLCJ06, author = {Shiping Chen and Dongyu Liu and Songqing Chen and Sushil Jajodia}, title = {{V-COPS:} {A} Vulnerability-Based Cooperative Alert Distribution System}, booktitle = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006), 11-15 December 2006, Miami Beach, Florida, {USA}}, pages = {43--56}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ACSAC.2006.54}, doi = {10.1109/ACSAC.2006.54}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ChenLCJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuSJ06, author = {Bo Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Providing witness anonymity in peer-to-peer systems}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {6--16}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180408}, doi = {10.1145/1180405.1180408}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PamulaJAS06, author = {Joseph Pamula and Sushil Jajodia and Paul Ammann and Vipin Swarup}, editor = {G{\"{u}}nter Karjoth and Fabio Massacci}, title = {A weakest-adversary security metric for network configuration security analysis}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006}, pages = {31--38}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1179494.1179502}, doi = {10.1145/1179494.1179502}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PamulaJAS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ZannoneJW06, author = {Nicola Zannone and Sushil Jajodia and Duminda Wijesekera}, editor = {Ernesto Damiani and Peng Liu}, title = {Creating Objects in the Flexible Authorization Framework}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {1--14}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_1}, doi = {10.1007/11805588\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ZannoneJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangYSJ06, author = {Lingyu Wang and Chao Yao and Anoop Singhal and Sushil Jajodia}, editor = {Ernesto Damiani and Peng Liu}, title = {Interactive Analysis of Attack Graphs Using Relational Queries}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {119--132}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_9}, doi = {10.1007/11805588\_9}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangYSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/SengarWWJ06, author = {Hemant Sengar and Duminda Wijesekera and Haining Wang and Sushil Jajodia}, title = {VoIP Intrusion Detection Through Interacting Protocol State Machines}, booktitle = {2006 International Conference on Dependable Systems and Networks {(DSN} 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings}, pages = {393--402}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/DSN.2006.73}, doi = {10.1109/DSN.2006.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/SengarWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/SengarWWJ06, author = {Hemant Sengar and Haining Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Fast Detection of Denial-of-Service Attacks on {IP} Telephony}, booktitle = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings}, pages = {199--208}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IWQOS.2006.250469}, doi = {10.1109/IWQOS.2006.250469}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/SengarWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/ChenCGSJ06, author = {Songqing Chen and Shiping Chen and Huiping Guo and Bo Shen and Sushil Jajodia}, title = {Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure}, booktitle = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS 2006, New Haven, CT, USA, 19-21 June 2006, Proceedings}, pages = {209--218}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IWQOS.2006.250470}, doi = {10.1109/IWQOS.2006.250470}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwqos/ChenCGSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ZhangBJ06, author = {Lei Zhang and Alexander Brodsky and Sushil Jajodia}, title = {Toward Information Sharing: Benefit And Risk Access Control {(BARAC)}}, booktitle = {7th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada}, pages = {45--53}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/POLICY.2006.36}, doi = {10.1109/POLICY.2006.36}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ZhangBJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/Jajodia06, author = {Sushil Jajodia}, title = {Topological analysis of network attack vulnerability}, booktitle = {Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between {PST} Technologies and Business Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November 1, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {380}, pages = {2}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1501434.1501437}, doi = {10.1145/1501434.1501437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/Jajodia06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/CalagnaGMJ06, author = {Maria Calagna and Huiping Guo and Luigi V. Mancini and Sushil Jajodia}, editor = {Hisham Haddad}, title = {A robust watermarking system based on \emph{SVD} compression}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {1341--1347}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141590}, doi = {10.1145/1141277.1141590}, timestamp = {Tue, 06 Nov 2018 11:06:49 +0100}, biburl = {https://dblp.org/rec/conf/sac/CalagnaGMJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KepplerSJ06, author = {David Keppler and Vipin Swarup and Sushil Jajodia}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Redirection policies for mission-based information sharing}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {210--218}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133088}, doi = {10.1145/1133058.1133088}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KepplerSJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sasn/RoySJ06, author = {Sankardas Roy and Sanjeev Setia and Sushil Jajodia}, editor = {Sencun Zhu and Donggang Liu}, title = {Attack-resilient hierarchical data aggregation in sensor networks}, booktitle = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006}, pages = {71--82}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180345.1180355}, doi = {10.1145/1180345.1180355}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/RoySJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/YaoWWJ06, author = {Chao Yao and Lingyu Wang and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Indistinguishability: The Other Aspect of Privacy}, booktitle = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul, Korea, September 10-11, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4165}, pages = {1--17}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11844662\_1}, doi = {10.1007/11844662\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/ZhuJKBD06, author = {Bo Zhu and Sushil Jajodia and Mohan S. Kankanhalli and Feng Bao and Robert H. Deng}, title = {An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks}, booktitle = {Proceedings of the Third Annual {IEEE} Communications Society on Sensor and Ad Hoc Communications and Networks, {SECON} 2006, September 25-28, 2006, Reston, VA, {USA}}, pages = {70--79}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SAHCN.2006.288411}, doi = {10.1109/SAHCN.2006.288411}, timestamp = {Fri, 30 Apr 2021 18:04:33 +0200}, biburl = {https://dblp.org/rec/conf/secon/ZhuJKBD06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChenCWJ06, author = {Songqing Chen and Shiping Chen and Xinyuan Wang and Sushil Jajodia}, title = {DaTA - Data-Transparent Authentication Without Communication Overhead}, booktitle = {Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August 2, 2006 - September 1, 2006}, pages = {1--10}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/SECCOMW.2006.359567}, doi = {10.1109/SECCOMW.2006.359567}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChenCWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/PamulaAJR06, author = {Joseph Pamula and Paul Ammann and Sushil Jajodia and Ronald W. Ritchey}, editor = {Ari Juels and Ernesto Damiani and Alban Gabillon}, title = {A framework for establishing, assessing, and managing trust in inter-organizational relationships}, booktitle = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS} 2006, Alexandria, VA, USA, November 3, 2006}, pages = {23--32}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180367.1180374}, doi = {10.1145/1180367.1180374}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/PamulaAJR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/MascettiBWJ06, author = {Sergio Mascetti and Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {James Pustejovsky and Peter Z. Revesz}, title = {k-Anonymity in Databases with Timestamped Data}, booktitle = {13th International Symposium on Temporal Representation and Reasoning {(TIME} 2006), 15-17 June 2006, Budapest, Hungary}, pages = {177--186}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/TIME.2006.20}, doi = {10.1109/TIME.2006.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/MascettiBWJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/DamianiVFJPS07, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Maurice H. ter Beek and Fabio Gadducci}, title = {Selective Data Encryption in Outsourced Dynamic Environments}, booktitle = {Proceedings of the Second International Workshop on Views on Designing Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September 16-17, 2006}, series = {Electronic Notes in Theoretical Computer Science}, volume = {168}, pages = {127--142}, publisher = {Elsevier}, year = {2006}, url = {https://doi.org/10.1016/j.entcs.2006.11.003}, doi = {10.1016/J.ENTCS.2006.11.003}, timestamp = {Tue, 24 Jan 2023 11:14:31 +0100}, biburl = {https://dblp.org/rec/journals/entcs/DamianiVFJPS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2006, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-272-0}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0611035, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {The Role of Quasi-identifiers in k-Anonymity Revisited}, journal = {CoRR}, volume = {abs/cs/0611035}, year = {2006}, url = {http://arxiv.org/abs/cs/0611035}, eprinttype = {arXiv}, eprint = {cs/0611035}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0611035.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jods/BettiniWJ05, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Information Release Control: {A} Learning-Based Architecture}, journal = {J. Data Semant.}, volume = {2}, pages = {176--198}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30567-5\_7}, doi = {10.1007/978-3-540-30567-5\_7}, timestamp = {Wed, 16 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jods/BettiniWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiSJ05, author = {Yingjiu Li and Vipin Swarup and Sushil Jajodia}, title = {Fingerprinting Relational Databases: Schemes and Specialties}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {1}, pages = {34--45}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.12}, doi = {10.1109/TDSC.2005.12}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CeselliDVJPS05, author = {Alberto Ceselli and Ernesto Damiani and Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, title = {Modeling and assessing inference exposure in encrypted databases}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {119--152}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053289}, doi = {10.1145/1053283.1053289}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/CeselliDVJPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ZhuYLSJ05, author = {Sencun Zhu and Chao Yao and Donggang Liu and Sanjeev Setia and Sushil Jajodia}, editor = {John Ioannidis and Angelos D. Keromytis and Moti Yung}, title = {Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution}, booktitle = {Applied Cryptography and Network Security, Third International Conference, {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3531}, pages = {40--55}, year = {2005}, url = {https://doi.org/10.1007/11496137\_4}, doi = {10.1007/11496137\_4}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NoelJ05, author = {Steven Noel and Sushil Jajodia}, title = {Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices}, booktitle = {21st Annual Computer Security Applications Conference {(ACSAC} 2005), 5-9 December 2005, Tucson, AZ, {USA}}, pages = {160--169}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/CSAC.2005.58}, doi = {10.1109/CSAC.2005.58}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NoelJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangCJ05, author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Tracking anonymous peer-to-peer VoIP calls on the internet}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {81--91}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102133}, doi = {10.1145/1102120.1102133}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/WangCJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dnis/VimercatiSJ05, author = {Sabrina De Capitani di Vimercati and Pierangela Samarati and Sushil Jajodia}, editor = {Subhash Bhalla}, title = {Policies, Models, and Languages for Access Control}, booktitle = {Databases in Networked Information Systems, 4th International Workshop, {DNIS} 2005, Aizu-Wakamatsu, Japan, March 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3433}, pages = {225--237}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-31970-2\_18}, doi = {10.1007/978-3-540-31970-2\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/dnis/VimercatiSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecbs/SengarWJ05, author = {Hemant Sengar and Duminda Wijesekera and Sushil Jajodia}, title = {Authentication and Integrity in Telecommunication Signaling Network}, booktitle = {12th {IEEE} International Conference on the Engineering of Computer-Based Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}}, pages = {163--170}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ECBS.2005.19}, doi = {10.1109/ECBS.2005.19}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecbs/SengarWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLJ05, author = {Lingyu Wang and Anyi Liu and Sushil Jajodia}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {247--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_15}, doi = {10.1007/11555827\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangLJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipps/SengarWJ05, author = {Hemant Sengar and Duminda Wijesekera and Sushil Jajodia}, title = {MTPSec: Customizable Secure {MTP3} Tunnels in the {SS7} Network}, booktitle = {19th International Parallel and Distributed Processing Symposium {(IPDPS} 2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/IPDPS.2005.297}, doi = {10.1109/IPDPS.2005.297}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipps/SengarWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SwarupJP05, author = {Vipin Swarup and Sushil Jajodia and Joseph Pamula}, editor = {Vladimir Gorodetsky and Igor V. Kotenko and Victor A. Skormin}, title = {Rule-Based Topological Vulnerability Analysis}, booktitle = {Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3685}, pages = {23--37}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11560326\_3}, doi = {10.1007/11560326\_3}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SwarupJP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05, author = {Donggang Liu and Peng Ning and Sencun Zhu and Sushil Jajodia}, title = {Practical Broadcast Authentication in Sensor Networks}, booktitle = {2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}}, pages = {118--132}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MOBIQUITOUS.2005.49}, doi = {10.1109/MOBIQUITOUS.2005.49}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/DamianiVFJPS05, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Willem Jonker and Milan Petkovic}, title = {Metadata Management in Outsourced Encrypted Databases}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {16--32}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_2}, doi = {10.1007/11552338\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/DamianiVFJPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ05, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Protecting Privacy Against Location-Based Personal Identification}, booktitle = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim, Norway, September 2-3, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3674}, pages = {185--199}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11552338\_13}, doi = {10.1007/11552338\_13}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secon/RoyASJ05, author = {Sankardas Roy and Venkata Gopala Krishna Addada and Sanjeev Setia and Sushil Jajodia}, title = {Securing {MAODV:} attacks and countermeasures}, booktitle = {Proceedings of the Second Annual {IEEE} Communications Society Conference on Sensor and Ad Hoc Communications and Networks, {SECON} 2005, September 26-29, 2005, Santa Clara, CA, {USA}}, pages = {521--532}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SAHCN.2005.1557104}, doi = {10.1109/SAHCN.2005.1557104}, timestamp = {Fri, 30 Apr 2021 18:04:33 +0200}, biburl = {https://dblp.org/rec/conf/secon/RoyASJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/GabrielliMSJ05, author = {Andrea Gabrielli and Luigi V. Mancini and Sanjeev Setia and Sushil Jajodia}, title = {Securing Topology Maintenance Protocols for Sensor Networks}, booktitle = {First International Conference on Security and Privacy for Emerging Areas in Communications Networks, SecureComm 2005, Athens, Greece, 5-9 September, 2005}, pages = {101--112}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/SECURECOMM.2005.34}, doi = {10.1109/SECURECOMM.2005.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/GabrielliMSJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/storagess/DamianiVFJPS05, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Vijay Atluri and Pierangela Samarati and William Yurcik and Larry Brumbaugh and Yuanyuan Zhou}, title = {Key management for multi-user encrypted databases}, booktitle = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005}, pages = {74--83}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1103780.1103792}, doi = {10.1145/1103780.1103792}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/storagess/DamianiVFJPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NoelJKJ05, author = {Steven Noel and Michael Jacobs and Pramod Kalapa and Sushil Jajodia}, editor = {Kwan{-}Liu Ma and Stephen C. North and William Yurcik}, title = {Multiple Coordinated Views for Network Attack Graphs}, booktitle = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC 2005, Minneapolis, MN, USA, October 26, 2005}, pages = {12}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/VIZSEC.2005.14}, doi = {10.1109/VIZSEC.2005.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NoelJKJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/YaoWJ05, author = {Chao Yao and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Klemens B{\"{o}}hm and Christian S. Jensen and Laura M. Haas and Martin L. Kersten and Per{-}{\AA}ke Larson and Beng Chin Ooi}, title = {Checking for k-Anonymity Violation by Views}, booktitle = {Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30 - September 2, 2005}, pages = {910--921}, publisher = {{ACM}}, year = {2005}, url = {http://www.vldb.org/archives/website/2005/program/paper/fri/p910-yao.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/YaoWJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/ZannoneJMW05, author = {Nicola Zannone and Sushil Jajodia and Fabio Massacci and Duminda Wijesekera}, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Maintaining privacy on derived objects}, booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, pages = {10--19}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102199.1102202}, doi = {10.1145/1102199.1102202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/ZannoneJMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/datamining2005/SinghalJ05, author = {Anoop Singhal and Sushil Jajodia}, editor = {Oded Maimon and Lior Rokach}, title = {Data Mining for Intrusion Detection}, booktitle = {The Data Mining and Knowledge Discovery Handbook}, pages = {1225--1237}, publisher = {Springer}, year = {2005}, timestamp = {Mon, 05 Sep 2005 12:46:21 +0200}, biburl = {https://dblp.org/rec/books/sp/datamining2005/SinghalJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2005, editor = {Sushil Jajodia and Duminda Wijesekera}, title = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3654}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535706}, doi = {10.1007/11535706}, isbn = {3-540-28138-X}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2005, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980}, doi = {10.1007/11593980}, isbn = {3-540-30706-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:journals/jods/2005-2, editor = {Stefano Spaccapietra and Elisa Bertino and Sushil Jajodia and Roger King and Dennis McLeod and Maria E. Orlowska and Leon Strous}, title = {Journal on Data Semantics {II}}, series = {Lecture Notes in Computer Science}, volume = {3360}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b104761}, doi = {10.1007/B104761}, isbn = {3-540-24208-2}, timestamp = {Tue, 01 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jods/2005-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, title = {Cardinality-based inference control in data cubes}, journal = {J. Comput. Secur.}, volume = {12}, number = {5}, pages = {655--692}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12501}, doi = {10.3233/JCS-2004-12501}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/BettiniJWW04, author = {Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang and Duminda Wijesekera}, title = {Reasoning with advanced policy rules and its application to access control}, journal = {Int. J. Digit. Libr.}, volume = {4}, number = {3}, pages = {156--170}, year = {2004}, url = {https://doi.org/10.1007/s00799-004-0078-8}, doi = {10.1007/S00799-004-0078-8}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/BettiniJWW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/SmithJSHHFC04, author = {Kenneth P. Smith and Sushil Jajodia and Vipin Swarup and Jeffrey Hoyt and Gail Hamilton and Donald B. Faatz and Todd Cornett}, title = {Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility}, journal = {NeuroImage}, volume = {22}, number = {4}, pages = {1646--1656}, year = {2004}, url = {https://doi.org/10.1016/j.neuroimage.2004.03.048}, doi = {10.1016/J.NEUROIMAGE.2004.03.048}, timestamp = {Thu, 13 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/SmithJSHHFC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NoelRJ04, author = {Steven Noel and Eric Robertson and Sushil Jajodia}, title = {Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances}, booktitle = {20th Annual Computer Security Applications Conference {(ACSAC} 2004), 6-10 December 2004, Tucson, AZ, {USA}}, pages = {350--359}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/CSAC.2004.11}, doi = {10.1109/CSAC.2004.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NoelRJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {A logic-based framework for attribute based access control}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {45--55}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029140}, doi = {10.1145/1029133.1029140}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LiSJ04, author = {Yingjiu Li and Vipin Swarup and Sushil Jajodia}, editor = {Csilla Farkas and Pierangela Samarati}, title = {Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases}, booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, pages = {81--94}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8128-6\_6}, doi = {10.1007/1-4020-8128-6\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LiSJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LiGJ04, author = {Yingjiu Li and Huiping Guo and Sushil Jajodia}, editor = {Aggelos Kiayias and Moti Yung}, title = {Tamper detection and localization for categorical data using fragile watermarks}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management 2004, Washington, DC, USA, October 25, 2004}, pages = {73--82}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029146.1029159}, doi = {10.1145/1029146.1029159}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LiGJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/ChenWJ04, author = {Shiping Chen and Duminda Wijesekera and Sushil Jajodia}, editor = {Pierangela Samarati and Peter Y. A. Ryan and Dieter Gollmann and Refik Molva}, title = {Incorporating Dynamic Constraints in the Flexible Authorization Framework}, booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3193}, pages = {1--16}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30108-0\_1}, doi = {10.1007/978-3-540-30108-0\_1}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/ChenWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/JajodiaW04, author = {Sushil Jajodia and Duminda Wijesekera}, editor = {R. K. Ghosh and Hrushikesha Mohanty}, title = {A Flexible Authorization Framework for E-Commerce}, booktitle = {Distributed Computing and Internet Technology, First International Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3347}, pages = {336--345}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30555-2\_39}, doi = {10.1007/978-3-540-30555-2\_39}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/JajodiaW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/SardaWJ04, author = {Kaushal Sarda and Duminda Wijesekera and Sushil Jajodia}, editor = {R. K. Ghosh and Hrushikesha Mohanty}, title = {Implementing Consistency Checking in Correlating Attacks}, booktitle = {Distributed Computing and Internet Technology, First International Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3347}, pages = {379--384}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30555-2\_44}, doi = {10.1007/978-3-540-30555-2\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/SardaWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mobiquitous/ZhuSXJ04, author = {Sencun Zhu and Sanjeev Setia and Shouhuai Xu and Sushil Jajodia}, title = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks}, booktitle = {1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge, MA, {USA}}, pages = {42--51}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/MOBIQ.2004.1331709}, doi = {10.1109/MOBIQ.2004.1331709}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mobiquitous/ZhuSXJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdmw/BettiniWJ04, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Willem Jonker and Milan Petkovic}, title = {Identifying Sensitive Associations in Databases for Release Control}, booktitle = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto, Canada, August 30, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3178}, pages = {187--201}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30073-1\_14}, doi = {10.1007/978-3-540-30073-1\_14}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sdmw/BettiniWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/WangJW04, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, title = {Securing {OLAP} Data Cubes Against Privacy Breaches}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {161}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301322}, doi = {10.1109/SECPRI.2004.1301322}, timestamp = {Thu, 21 Sep 2023 15:57:30 +0200}, biburl = {https://dblp.org/rec/conf/sp/WangJW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/ZhuSJN04, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia and Peng Ning}, title = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks}, booktitle = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12 May 2004, Berkeley, CA, {USA}}, pages = {259--271}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/SECPRI.2004.1301328}, doi = {10.1109/SECPRI.2004.1301328}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/YaoWJ04, author = {Chao Yao and William H. Winsborough and Sushil Jajodia}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {A Hierarchical Release Control Policy Framework}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {121--137}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_8}, doi = {10.1007/0-387-31167-X\_8}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/YaoWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vizsec/NoelJ04, author = {Steven Noel and Sushil Jajodia}, editor = {Carla E. Brodley and Philip Chan and Richard Lippmann and William Yurcik}, title = {Managing attack graph complexity through visual hierarchical aggregation}, booktitle = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004}, pages = {109--118}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029208.1029225}, doi = {10.1145/1029208.1029225}, timestamp = {Wed, 24 Feb 2021 16:44:20 +0100}, biburl = {https://dblp.org/rec/conf/vizsec/NoelJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ifip11/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Information Security Management, Education and Privacy, {IFIP} 18th World Computer Congress, {TC11} 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {148}, publisher = {Kluwer}, year = {2004}, isbn = {1-4020-8144-8}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ifip11/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sec/2004, editor = {Yves Deswarte and Fr{\'{e}}d{\'{e}}ric Cuppens and Sushil Jajodia and Lingyu Wang}, title = {Security and Protection in Information Processing Systems, {IFIP} 18th WorldComputer Congress, {TC11} 19th International Information Security Conference, 22-27 August 2004, Toulouse, France}, series = {{IFIP}}, volume = {147}, publisher = {Kluwer / Springer}, year = {2004}, isbn = {1-4020-8142-1}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tc11-5/2003, editor = {Sushil Jajodia and Leon Strous}, title = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b116855}, doi = {10.1007/B116855}, isbn = {978-1-4020-7900-9}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/NingJW03, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Intrusion Detection in Distributed Systems - An Abstraction-Based Approach}, series = {Advances in Information Security}, volume = {9}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0467-2}, doi = {10.1007/978-1-4615-0467-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/NingJW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/PietroMJ03, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, title = {Providing secrecy in key management protocols for large wireless sensors networks}, journal = {Ad Hoc Networks}, volume = {1}, number = {4}, pages = {455--468}, year = {2003}, url = {https://doi.org/10.1016/S1570-8705(03)00046-5}, doi = {10.1016/S1570-8705(03)00046-5}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/PietroMJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/LiNWJ03, author = {Yingjiu Li and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Discovering calendar-based temporal association rules}, journal = {Data Knowl. Eng.}, volume = {44}, number = {2}, pages = {193--218}, year = {2003}, timestamp = {Thu, 27 Nov 2003 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dke/LiNWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BarbaraGJ03, author = {Daniel Barbar{\'{a}} and Rajni Goel and Sushil Jajodia}, title = {A Checksum-based Corruption Detection Technique}, journal = {J. Comput. Secur.}, volume = {11}, number = {3}, pages = {315--330}, year = {2003}, url = {https://doi.org/10.3233/jcs-2003-11303}, doi = {10.3233/JCS-2003-11303}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BarbaraGJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnsm/BettiniJWW03, author = {Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang and Duminda Wijesekera}, title = {Provisions and Obligations in Policy Rule Management}, journal = {J. Netw. Syst. Manag.}, volume = {11}, number = {3}, pages = {351--372}, year = {2003}, url = {https://doi.org/10.1023/A:1025711105609}, doi = {10.1023/A:1025711105609}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnsm/BettiniJWW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/WijesekeraJ03, author = {Duminda Wijesekera and Sushil Jajodia}, title = {A propositional policy algebra for access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {2}, pages = {286--325}, year = {2003}, url = {https://doi.org/10.1145/762476.762481}, doi = {10.1145/762476.762481}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/WijesekeraJPH03, author = {Duminda Wijesekera and Sushil Jajodia and Francesco Parisi{-}Presicce and {\AA}sa Hagstr{\"{o}}m}, title = {Removing permissions in the flexible authorization framework}, journal = {{ACM} Trans. Database Syst.}, volume = {28}, number = {3}, pages = {209--229}, year = {2003}, url = {https://doi.org/10.1145/937598.937599}, doi = {10.1145/937598.937599}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/WijesekeraJPH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/MeiMJ03, author = {Alessandro Mei and Luigi V. Mancini and Sushil Jajodia}, title = {Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {14}, number = {9}, pages = {885--896}, year = {2003}, url = {https://doi.org/10.1109/TPDS.2003.1233711}, doi = {10.1109/TPDS.2003.1233711}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/MeiMJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NoelJOJ03, author = {Steven Noel and Sushil Jajodia and Brian O'Berry and Michael Jacobs}, title = {Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs}, booktitle = {19th Annual Computer Security Applications Conference {(ACSAC} 2003), 8-12 December 2003, Las Vegas, NV, {USA}}, pages = {86--95}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/CSAC.2003.1254313}, doi = {10.1109/CSAC.2003.1254313}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NoelJOJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {{LEAP:} efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {62--72}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948120}, doi = {10.1145/948109.948120}, timestamp = {Tue, 10 Nov 2020 20:00:42 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DamianiVJPS03, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sushil Jajodia and Stefano Paraboschi and Pierangela Samarati}, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Balancing confidentiality and efficiency in untrusted relational DBMSs}, booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, pages = {93--102}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/948109.948124}, doi = {10.1145/948109.948124}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DamianiVJPS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/SmithSJFCH03, author = {Kenneth P. Smith and Vipin Swarup and Sushil Jajodia and Donald B. Faatz and Todd Cornett and Jeffrey Hoyt}, title = {Securely sharing neuroimagery}, booktitle = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information and Knowledge Management, New Orleans, Louisiana, USA, November 2-8, 2003}, pages = {375--377}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/956863.956934}, doi = {10.1145/956863.956934}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cikm/SmithSJFCH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChenWJ03, author = {Shiping Chen and Duminda Wijesekera and Sushil Jajodia}, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {FlexFlow: {A} Flexible Flow Control Policy Specification Framework}, booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, pages = {358--371}, publisher = {Kluwer/Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-8070-0\_26}, doi = {10.1007/1-4020-8070-0\_26}, timestamp = {Wed, 20 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/ChenWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/drm/LiSJ03, author = {Yingjiu Li and Vipin Swarup and Sushil Jajodia}, editor = {Moti Yung}, title = {Constructing a virtual primary key for fingerprinting relational data}, booktitle = {Proceedings of the 2003 {ACM} workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003}, pages = {133--141}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/947380.947398}, doi = {10.1145/947380.947398}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/LiSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangLWJ03, author = {Lingyu Wang and Yingjiu Li and Duminda Wijesekera and Sushil Jajodia}, editor = {Einar Snekkenes and Dieter Gollmann}, title = {Precisely Answering Multi-dimensional Range Queries without Privacy Breaches}, booktitle = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2808}, pages = {100--115}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39650-5\_6}, doi = {10.1007/978-3-540-39650-5\_6}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangLWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, title = {Performance Optimizations for Group Key Management Scheme}, booktitle = {23rd International Conference on Distributed Computing Systems {(ICDCS} 2003), 19-22 May 2003, Providence, RI, {USA}}, pages = {163}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCS.2003.1203463}, doi = {10.1109/ICDCS.2003.1203463}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/ZhuXSJ03, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {{LHAP:} {A} Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks}, booktitle = {23rd International Conference on Distributed Computing Systems Workshops {(ICDCS} 2003 Workshops), 19-22 May 2003, Providence, RI, {USA}}, pages = {749}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICDCSW.2003.1203642}, doi = {10.1109/ICDCSW.2003.1203642}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/ZhuXSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/ZhuXSJ03, author = {Sencun Zhu and Shouhuai Xu and Sanjeev Setia and Sushil Jajodia}, title = {Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: {A} Probabilistic Approach}, booktitle = {11th {IEEE} International Conference on Network Protocols {(ICNP} 2003), 4-7 November 2003, Atlanta, GA, {USA}}, pages = {326--335}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ICNP.2003.1249782}, doi = {10.1109/ICNP.2003.1249782}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/ZhuXSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwdc/ZhuJ03, author = {Sencun Zhu and Sushil Jajodia}, editor = {Samir R. Das and Sajal K. Das}, title = {Scalable Group Rekeying for Secure Multicast: {A} Survey}, booktitle = {Distributed Computing - {IWDC} 2003, 5th International Workshop, Kolkata, India, December 27-30, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2918}, pages = {1--10}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24604-6\_1}, doi = {10.1007/978-3-540-24604-6\_1}, timestamp = {Tue, 10 Sep 2019 13:47:28 +0200}, biburl = {https://dblp.org/rec/conf/iwdc/ZhuJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ngc/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Burkhard Stiller and Georg Carle and Martin Karsten and Peter Reichl}, title = {Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast}, booktitle = {Group Communications and Charges; Technology and Business Models, 5th {COST264} International Workshop on Networked Group Communications, {NGC} 2003, and 3rd International Workshop on Internet Charging and QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2816}, pages = {107--118}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39405-1\_10}, doi = {10.1007/978-3-540-39405-1\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/ngc/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/BarbaraLLJC03, author = {Daniel Barbar{\'{a}} and Yi Li and Jia{-}Ling Lin and Sushil Jajodia and Julia Couto}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Bootstrapping a Data Mining Intrusion Detection System}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {421--425}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952616}, doi = {10.1145/952532.952616}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/BarbaraLLJC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/WilliamsFJC03, author = {Douglas E. Williams and Amgad Fayad and Sushil Jajodia and Daniel Calle}, editor = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati and Pierangela Samarati and Sokratis K. Katsikas}, title = {A User Friendly Guard with Mobile Post-Release Access Control Policy}, booktitle = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\) International Conference on Information Security (SEC2003), May 26-28, 2003, Athens, Greece}, series = {{IFIP} Conference Proceedings}, volume = {250}, pages = {265--276}, publisher = {Kluwer}, year = {2003}, timestamp = {Fri, 25 Apr 2003 10:12:34 +0200}, biburl = {https://dblp.org/rec/conf/sec/WilliamsFJC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sensys/ZhuSJ03, author = {Sencun Zhu and Sanjeev Setia and Sushil Jajodia}, editor = {Ian F. Akyildiz and Deborah Estrin and David E. Culler and Mani B. Srivastava}, title = {{LEAP} - efficient security mechanisms for large-scale distributed sensor networks}, booktitle = {Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, SenSys 2003, Los Angeles, California, USA, November 5-7, 2003}, pages = {308--309}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/958491.958534}, doi = {10.1145/958491.958534}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sisw/DamianiVFPSJ03, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Mario Finetti and Stefano Paraboschi and Pierangela Samarati and Sushil Jajodia}, title = {Implementation of a Storage Mechanism for Untrusted DBMSs}, booktitle = {2nd International {IEEE} Security in Storage Workshop {(SISW} 2003), Information Assurance, The Storage Security Perspective, 31 October 2003, Washington, DC, {USA}}, pages = {38--46}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/SISW.2003.10006}, doi = {10.1109/SISW.2003.10006}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sisw/DamianiVFPSJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/BettiniWJ03, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Sushil Jajodia and Leon Strous}, title = {A Learning-based Approach to Information Release Control}, booktitle = {Integrity and Internal Control in Information Systems {VI} - {IFIP} {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland}, series = {{IFIP}}, volume = {140}, pages = {83--105}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-7901-X\_6}, doi = {10.1007/1-4020-7901-X\_6}, timestamp = {Tue, 23 May 2017 01:07:20 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/BettiniWJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waim/Jajodia03, author = {Sushil Jajodia}, editor = {Guozhu Dong and Changjie Tang and Wei Wang}, title = {Recent Advances in Access Control Models}, booktitle = {Advances in Web-Age Information Management, 4th International Conference, {WAIM} 2003, Chengdu, China, August 17-19, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2762}, pages = {1}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45160-0\_1}, doi = {10.1007/978-3-540-45160-0\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/waim/Jajodia03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, publisher = {{ACM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=948109}, isbn = {1-58113-738-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2003, editor = {Sushil Jajodia and Pierangela Samarati and Paul F. Syverson}, title = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2003, Washington, DC, USA, October 30, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-776-1}, timestamp = {Wed, 16 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/xmlsec/2003, editor = {Sushil Jajodia and Michiharu Kudo}, title = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax, VA, USA, October 31, 2003}, publisher = {{ACM}}, year = {2003}, isbn = {1-58113-777-X}, timestamp = {Thu, 07 Feb 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/xmlsec/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ai/BettiniWJ02, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Solving multi-granularity temporal constraint networks}, journal = {Artif. Intell.}, volume = {140}, number = {1/2}, pages = {107--152}, year = {2002}, url = {https://doi.org/10.1016/S0004-3702(02)00223-0}, doi = {10.1016/S0004-3702(02)00223-0}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ai/BettiniWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/NingWJ02, author = {Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {An Algebraic Representation of Calendars}, journal = {Ann. Math. Artif. Intell.}, volume = {36}, number = {1-2}, pages = {5--38}, year = {2002}, url = {https://doi.org/10.1023/A:1015835418881}, doi = {10.1023/A:1015835418881}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/NingWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NingJW02, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Design and implementation of a decentralized prototype system for detecting distributed attacks}, journal = {Comput. Commun.}, volume = {25}, number = {15}, pages = {1374--1391}, year = {2002}, url = {https://doi.org/10.1016/S0140-3664(02)00039-7}, doi = {10.1016/S0140-3664(02)00039-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NingJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/ChapinFJF02, author = {Susan Chapin and Donald B. Faatz and Sushil Jajodia and Amgad Fayad}, title = {Consistent policy enforcement in distributed systems using mobile policies}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {261--280}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00128-3}, doi = {10.1016/S0169-023X(02)00128-3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/BettiniWJ02, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Temporal Reasoning in Workflow Systems}, journal = {Distributed Parallel Databases}, volume = {11}, number = {3}, pages = {269--306}, year = {2002}, url = {https://doi.org/10.1023/A:1014048800604}, doi = {10.1023/A:1014048800604}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/BettiniWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiWWJ02, author = {Yingjiu Li and Ningning Wu and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Enhancing Profiles for Anomaly Detection Using Time Granularities}, journal = {J. Comput. Secur.}, volume = {10}, number = {1/2}, pages = {137--158}, year = {2002}, url = {https://doi.org/10.3233/jcs-2002-101-206}, doi = {10.3233/JCS-2002-101-206}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiWWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pe/SetiaZJ02, author = {Sanjeev Setia and Sencun Zhu and Sushil Jajodia}, title = {A comparative performance analysis of reliable group rekey transport protocols for secure multicast}, journal = {Perform. Evaluation}, volume = {49}, number = {1/4}, pages = {21--41}, year = {2002}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pe/SetiaZJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigkdd/FarkasJ02, author = {Csilla Farkas and Sushil Jajodia}, title = {The Inference Problem: {A} Survey}, journal = {{SIGKDD} Explor.}, volume = {4}, number = {2}, pages = {6--11}, year = {2002}, url = {https://doi.org/10.1145/772862.772864}, doi = {10.1145/772862.772864}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigkdd/FarkasJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AmmannJL02, author = {Paul Ammann and Sushil Jajodia and Peng Liu}, title = {Recovery from Malicious Transactions}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {14}, number = {5}, pages = {1167--1185}, year = {2002}, url = {https://doi.org/10.1109/TKDE.2002.1033782}, doi = {10.1109/TKDE.2002.1033782}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AmmannJL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/LiWWJ02, author = {Yingjiu Li and Lingyu Wang and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Anne Banks Pidduck and John Mylopoulos and Carson C. Woo and M. Tamer {\"{O}}zsu}, title = {Auditing Interval-Based Inference}, booktitle = {Advanced Information Systems Engineering, 14th International Conference, CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2348}, pages = {553--567}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-47961-9\_38}, doi = {10.1007/3-540-47961-9\_38}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/LiWWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WijesekeraJ02, author = {Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri}, title = {Policy algebras for access control the predicate case}, booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, pages = {171--180}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/586110.586134}, doi = {10.1145/586110.586134}, timestamp = {Tue, 10 Nov 2020 20:00:47 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WijesekeraJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WangWJ02, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Towards Secure {XML} Federations}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {117--131}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 02 Jan 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarbaraGJ02, author = {Daniel Barbar{\'{a}} and Rajni Goel and Sushil Jajodia}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Mining Malicious Corruption of Data with Hidden Markov Models}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {175--189}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarbaraGJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/WangWJ02, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Cardinality-Based Inference Control in Sum-Only Data Cubes}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {55--71}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_4}, doi = {10.1007/3-540-45853-0\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/WangWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/foiks/LiZWJ02, author = {Yingjiu Li and Sencun Zhu and Lingyu Wang and Sushil Jajodia}, editor = {Thomas Eiter and Klaus{-}Dieter Schewe}, title = {A Privacy-Enhanced Microaggregation Method}, booktitle = {Foundations of Information and Knowledge Systems, Second International Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2284}, pages = {148--159}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45758-5\_10}, doi = {10.1007/3-540-45758-5\_10}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/LiWJ02, author = {Yingjiu Li and Lingyu Wang and Sushil Jajodia}, editor = {Roger Dingledine and Paul F. Syverson}, title = {Preventing Interval-Based Inference by Random Data Perturbation}, booktitle = {Privacy Enhancing Technologies, Second International Workshop, {PET} 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2482}, pages = {160--170}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36467-6\_12}, doi = {10.1007/3-540-36467-6\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/LiWJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BettiniJWW02, author = {Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang and Duminda Wijesekera}, title = {Obligation Monitoring in Policy Management}, booktitle = {3rd International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2002), 5-7 June 2002, Monterey, CA, {USA}}, pages = {2--12}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/POLICY.2002.1011288}, doi = {10.1109/POLICY.2002.1011288}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BettiniJWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pomc/PietroMJ02, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, title = {Efficient and secure keys management for wireless mobile communications}, booktitle = {Proceedings of the 2002 Workshop on Principles of Mobile Computing, {POMC} 2002, October 30-31, 2002, Toulouse, France}, pages = {66--73}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/584490.584504}, doi = {10.1145/584490.584504}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pomc/PietroMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PietroMJ02, author = {Roberto Di Pietro and Luigi V. Mancini and Sushil Jajodia}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Secure Selective Exclusion in Ad Hoc Wireless Network}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {423--434}, publisher = {Kluwer}, year = {2002}, timestamp = {Fri, 11 Feb 2005 12:53:42 +0100}, biburl = {https://dblp.org/rec/conf/sec/PietroMJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/SmithFFJ02, author = {Kenneth P. Smith and Donald B. Faatz and Amgad Fayad and Sushil Jajodia}, editor = {Adeeb Ghonaimy and Mahmoud T. El{-}Hadidi and Heba Kamal Aslan}, title = {Propagating Modifications to Mobile Policies}, booktitle = {Security in the Information Society: Visions and Perspectives, {IFIP} {TC11} 17\({}^{\mbox{th}}\) International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt}, series = {{IFIP} Conference Proceedings}, volume = {214}, pages = {573--584}, publisher = {Kluwer}, year = {2002}, timestamp = {Mon, 29 Aug 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/SmithFFJ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/BettiniJWW02, author = {Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang and Duminda Wijesekera}, title = {Provisions and Obligations in Policy Management and Security Applications}, booktitle = {Proceedings of 28th International Conference on Very Large Data Bases, {VLDB} 2002, Hong Kong, August 20-23, 2002}, pages = {502--513}, publisher = {Morgan Kaufmann}, year = {2002}, url = {http://www.vldb.org/conf/2002/S14P03.pdf}, doi = {10.1016/B978-155860869-6/50051-2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/BettiniJWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/02/BarbaraCJW02, author = {Daniel Barbar{\'{a}} and Julia Couto and Sushil Jajodia and Ningning Wu}, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {An Architecture for Anomaly Detection}, booktitle = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, pages = {63--76}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0\_3}, doi = {10.1007/978-1-4615-0953-0\_3}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/BarbaraCJW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/02/BJ2002, editor = {Daniel Barbar{\'{a}} and Sushil Jajodia}, title = {Applications of Data Mining in Computer Security}, series = {Advances in Information Security}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-0953-0}, doi = {10.1007/978-1-4615-0953-0}, isbn = {9781461353218}, timestamp = {Fri, 26 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/02/BJ2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2002, editor = {Sushil Jajodia and Pierangela Samarati}, title = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2002, Washington, DC, USA, November 21, 2002}, publisher = {{ACM}}, year = {2002}, isbn = {1-58113-633-1}, timestamp = {Wed, 16 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dss/LiuNJ01, author = {Peng Liu and Peng Ning and Sushil Jajodia}, title = {Avoiding loss of fairness owing to failures in fair data exchange systems}, journal = {Decis. Support Syst.}, volume = {31}, number = {3}, pages = {337--350}, year = {2001}, url = {https://doi.org/10.1016/S0167-9236(00)00141-X}, doi = {10.1016/S0167-9236(00)00141-X}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dss/LiuNJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JajodiaW01, author = {Sushil Jajodia and Duminda Wijesekera}, title = {Security in Federated Database Systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {6}, number = {2}, pages = {69--79}, year = {2001}, url = {https://doi.org/10.1016/S1363-4127(01)00208-4}, doi = {10.1016/S1363-4127(01)00208-4}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/JajodiaW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JajodiaAKMM01, author = {Sushil Jajodia and Vijayalakshmi Atluri and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala}, title = {Multilevel Security Transaction Processing}, journal = {J. Comput. Secur.}, volume = {9}, number = {3}, pages = {165--195}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-9301}, doi = {10.3233/JCS-2001-9301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JajodiaAKMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/BarbaraCJW01, author = {Daniel Barbar{\'{a}} and Julia Couto and Sushil Jajodia and Ningning Wu}, title = {{ADAM:} {A} Testbed for Exploring the Use of Data Mining in Intrusion Detection}, journal = {{SIGMOD} Rec.}, volume = {30}, number = {4}, pages = {15--24}, year = {2001}, url = {https://doi.org/10.1145/604264.604268}, doi = {10.1145/604264.604268}, timestamp = {Fri, 05 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigmod/BarbaraCJW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/NingJW01, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Abstraction-based intrusion detection in distributed environments}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {407--452}, year = {2001}, url = {https://doi.org/10.1145/503339.503342}, doi = {10.1145/503339.503342}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/NingJW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/SamaratiRJ01, author = {Pierangela Samarati and Michael K. Reiter and Sushil Jajodia}, title = {An authorization model for a public key management service}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {4}, number = {4}, pages = {453--482}, year = {2001}, url = {https://doi.org/10.1145/503339.503343}, doi = {10.1145/503339.503343}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/SamaratiRJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/JajodiaSSS01, author = {Sushil Jajodia and Pierangela Samarati and Maria Luisa Sapino and V. S. Subrahmanian}, title = {Flexible support for multiple access control policies}, journal = {{ACM} Trans. Database Syst.}, volume = {26}, number = {2}, pages = {214--260}, year = {2001}, url = {https://doi.org/10.1145/383891.383894}, doi = {10.1145/383891.383894}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tods/JajodiaSSS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WijesekeraJ01, author = {Duminda Wijesekera and Sushil Jajodia}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Policy algebras for access control: the propositional case}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {38--47}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501990}, doi = {10.1145/501983.501990}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WijesekeraJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/HagstromJPW01, author = {{\AA}sa Hagstr{\"{o}}m and Sushil Jajodia and Francesco Parisi{-}Presicce and Duminda Wijesekera}, title = {Revocations-A Classification}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {44--58}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930135}, doi = {10.1109/CSFW.2001.930135}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/HagstromJPW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LiuJ01, author = {Peng Liu and Sushil Jajodia}, title = {Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance}, booktitle = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada}, pages = {191--205}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/CSFW.2001.930146}, doi = {10.1109/CSFW.2001.930146}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/LiuJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaW01, author = {Sushil Jajodia and Duminda Wijesekera}, editor = {Martin S. Olivier and David L. Spooner}, title = {Recent Advances in Access Control Models}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {3--15}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 13:50:19 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaW01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/YangWJ01, author = {Jacqueline Yang and Duminda Wijesekera and Sushil Jajodia}, editor = {Martin S. Olivier and David L. Spooner}, title = {Subject Switching Algorithms for Access Control in Federated Databases}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {61--74}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/YangWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MukkamalaJ01, author = {Ravi Mukkamala and Sushil Jajodia}, editor = {Martin S. Olivier and David L. Spooner}, title = {A Novel Approach to Certificate Revocation Management}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {225--238}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MukkamalaJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/BarbaraWJ01, author = {Daniel Barbar{\'{a}} and Ningning Wu and Sushil Jajodia}, editor = {Vipin Kumar and Robert L. Grossman}, title = {Detecting Novel Network Intrusions Using Bayes Estimators}, booktitle = {Proceedings of the First {SIAM} International Conference on Data Mining, {SDM} 2001, Chicago, IL, USA, April 5-7, 2001}, pages = {1--17}, publisher = {{SIAM}}, year = {2001}, url = {https://doi.org/10.1137/1.9781611972719.28}, doi = {10.1137/1.9781611972719.28}, timestamp = {Wed, 17 May 2017 14:24:53 +0200}, biburl = {https://dblp.org/rec/conf/sdm/BarbaraWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sebd/BettiniWJ01, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Augusto Celentano and Letizia Tanca and Paolo Tiberio}, title = {Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints}, booktitle = {Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, {SEBD} 2001, Venezia, Italy, 27-29 Giugno 2001}, pages = {339--346}, year = {2001}, timestamp = {Mon, 18 Jan 2016 11:07:09 +0100}, biburl = {https://dblp.org/rec/conf/sebd/BettiniWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/FayadJFD01, author = {Amgad Fayad and Sushil Jajodia and Donald B. Faatz and Vinti Doshi}, editor = {Michel Dupuy and Pierre Paradinas}, title = {Going Beyond {MAC} and {DAC} Using Mobile Policies}, booktitle = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth Annual Working Conference on Information Security (IFIP/Sec'01), June 11-13, 2001, Paris, France}, series = {{IFIP} Conference Proceedings}, volume = {193}, pages = {245--260}, publisher = {Kluwer}, year = {2001}, timestamp = {Fri, 26 Jul 2002 13:05:24 +0200}, biburl = {https://dblp.org/rec/conf/sec/FayadJFD01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/LiNWJ01, author = {Yingjiu Li and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Discovering Calendar-based Temporal Association Rules}, booktitle = {Eigth International Symposium on Temporal Representation and Reasoning, TIME-01, Civdale del Friuli, Italy, June 14-16, 2001}, pages = {111--118}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/TIME.2001.930706}, doi = {10.1109/TIME.2001.930706}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/LiNWJ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaKS01, author = {Sushil Jajodia and Michiharu Kudo and V. S. Subrahmanian}, editor = {Anup K. Ghosh}, title = {Provisional Authorizations}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {133--159}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_8}, doi = {10.1007/978-1-4615-1467-1\_8}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaKS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/er/2001, editor = {Hideko S. Kunii and Sushil Jajodia and Arne S{\o}lvberg}, title = {Conceptual Modeling - {ER} 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2224}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45581-7}, doi = {10.1007/3-540-45581-7}, isbn = {3-540-42866-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/2001.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0007577, author = {Claudio Bettini and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Time granularities in databases, data mining, and temporal reasoning}, publisher = {Springer}, year = {2000}, url = {http://www.springer.com/computer/swe/book/978-3-540-66997-5}, isbn = {978-3-540-66997-5}, timestamp = {Mon, 18 Apr 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0007577.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NingWJ00, author = {Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Modeling requests among cooperating intrusion detection systems}, journal = {Comput. Commun.}, volume = {23}, number = {17}, pages = {1702--1715}, year = {2000}, url = {https://doi.org/10.1016/S0140-3664(00)00256-5}, doi = {10.1016/S0140-3664(00)00256-5}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NingWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/LiuAJ00, author = {Peng Liu and Paul Ammann and Sushil Jajodia}, title = {Rewriting Histories: Recovering from Malicious Transactions}, journal = {Distributed Parallel Databases}, volume = {8}, number = {1}, pages = {7--40}, year = {2000}, url = {https://doi.org/10.1023/A:1008731200105}, doi = {10.1023/A:1008731200105}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/LiuAJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/ManciniRJB00, author = {Luigi V. Mancini and Indrajit Ray and Sushil Jajodia and Elisa Bertino}, title = {Flexible Transaction Dependencies in Database Systems}, journal = {Distributed Parallel Databases}, volume = {8}, number = {4}, pages = {399--446}, year = {2000}, url = {https://doi.org/10.1023/A:1008738705440}, doi = {10.1023/A:1008738705440}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/ManciniRJB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/RayAJ00, author = {Indrakshi Ray and Paul Ammann and Sushil Jajodia}, title = {Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity}, journal = {Inf. Sci.}, volume = {129}, number = {1-4}, pages = {155--195}, year = {2000}, url = {https://doi.org/10.1016/S0020-0255(00)00062-1}, doi = {10.1016/S0020-0255(00)00062-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/RayAJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiuJM00, author = {Peng Liu and Sushil Jajodia and Catherine D. McCollum}, title = {Intrusion Confinement by Isolation in Information Systems}, journal = {J. Comput. Secur.}, volume = {8}, number = {4}, pages = {243--279}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-8402}, doi = {10.3233/JCS-2000-8402}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LiuJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/RayMJB00, author = {Indrajit Ray and Luigi V. Mancini and Sushil Jajodia and Elisa Bertino}, title = {{ASEP:} {A} Secure and Flexible Commit Protocol for {MLS} Distributed Database Systems}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {12}, number = {6}, pages = {880--899}, year = {2000}, url = {https://doi.org/10.1109/69.895800}, doi = {10.1109/69.895800}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/RayMJB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BrodskyFJ00, author = {Alexander Brodsky and Csilla Farkas and Sushil Jajodia}, title = {Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {12}, number = {6}, pages = {900--919}, year = {2000}, url = {https://doi.org/10.1109/69.895801}, doi = {10.1109/69.895801}, timestamp = {Wed, 13 Dec 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tkde/BrodskyFJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoshiFJM00, author = {Vinti Doshi and Amgad Fayad and Sushil Jajodia and Roswitha MacLean}, title = {Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications}, booktitle = {16th Annual Computer Security Applications Conference {(ACSAC} 2000), 11-15 December 2000, New Orleans, Louisiana, {USA}}, pages = {298--307}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ACSAC.2000.898884}, doi = {10.1109/ACSAC.2000.898884}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DoshiFJM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChapinFJ00, author = {Susan Chapin and Donald B. Faatz and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Distributed Policies for Data Management - Making Policies Mobile}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {63--75}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_6}, doi = {10.1007/0-306-47008-X\_6}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ChapinFJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarbaraGJ00, author = {Daniel Barbar{\'{a}} and Rajni Goel and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Protecting File systems Against Corruption Using Checksums}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {113--124}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_10}, doi = {10.1007/0-306-47008-X\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarbaraGJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/LiuNJ00, author = {Peng Liu and Peng Ning and Sushil Jajodia}, title = {Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols}, booktitle = {2000 International Conference on Dependable Systems and Networks {(DSN} 2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York, NY, {USA}}, pages = {631--640}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICDSN.2000.857600}, doi = {10.1109/ICDSN.2000.857600}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/LiuNJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/BarbaraGJ00, author = {Daniel Barbar{\'{a}} and Rajni Goel and Sushil Jajodia}, editor = {Carlo Zaniolo and Peter C. Lockemann and Marc H. Scholl and Torsten Grust}, title = {Using Checksums to Detect Data Corruption}, booktitle = {Advances in Database Technology - {EDBT} 2000, 7th International Conference on Extending Database Technology, Konstanz, Germany, March 27-31, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1777}, pages = {136--149}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-46439-5\_9}, doi = {10.1007/3-540-46439-5\_9}, timestamp = {Thu, 23 Jun 2022 19:56:44 +0200}, biburl = {https://dblp.org/rec/conf/edbt/BarbaraGJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/YangNWJ00, author = {Jiahai Yang and Peng Ning and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Sihan Qing and Jan H. P. Eloff}, title = {{CARDS:} {A} Distributed System for Detecting Coordinated Attacks}, booktitle = {Information Security for Global Information Infrastructures, {IFIP} {TC11} Fifteenth Annual Working Conference on Information Security, August 22-24, 2000, Beijing, China}, series = {{IFIP} Conference Proceedings}, volume = {175}, pages = {171--180}, publisher = {Kluwer}, year = {2000}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sec/YangNWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/SetiaKJH00, author = {Sanjeev Setia and Samir Koussih and Sushil Jajodia and Eric Harder}, title = {Kronos: {A} Scalable Group Re-Keying Approach for Secure Multicast}, booktitle = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000}, pages = {215--228}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/SECPRI.2000.848459}, doi = {10.1109/SECPRI.2000.848459}, timestamp = {Thu, 21 Sep 2023 15:57:29 +0200}, biburl = {https://dblp.org/rec/conf/sp/SetiaKJH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/BettiniWJ00, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Free Schedules for Free Agents in Workflow Systems}, booktitle = {Seventh International Workshop on Temporal Representation and Reasoning, {TIME} 2000, Nova Scotia, Canada, July 7-9, 2000}, pages = {31--37}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/TIME.2000.856582}, doi = {10.1109/TIME.2000.856582}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/BettiniWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tsdm/LiWJ00, author = {Yingjiu Li and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {John F. Roddick and Kathleen Hornsby}, title = {Discovering Temporal Patterns in Multiple Granularities}, booktitle = {Temporal, Spatial, and Spatio-Temporal Data Mining, First International Workshop {TSDM} 2000 Lyon, France, September 12, 2000, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2007}, pages = {5--19}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45244-3\_2}, doi = {10.1007/3-540-45244-3\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/tsdm/LiWJ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2000, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, publisher = {{ACM}}, year = {2000}, url = {http://dl.acm.org/citation.cfm?id=352600}, isbn = {1-58113-203-4}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JajodiaMA99, author = {Sushil Jajodia and Catherine D. McCollum and Paul Ammann}, title = {Trusted Recovery}, journal = {Commun. {ACM}}, volume = {42}, number = {7}, pages = {71--75}, year = {1999}, url = {https://doi.org/10.1145/306549.306580}, doi = {10.1145/306549.306580}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JajodiaMA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JajodiaAM99, author = {Sushil Jajodia and Paul Ammann and Catherine D. McCollum}, title = {Surviving Information Warfare Attacks}, journal = {Computer}, volume = {32}, number = {4}, pages = {57--63}, year = {1999}, url = {https://doi.org/10.1109/2.755006}, doi = {10.1109/2.755006}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JajodiaAM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/AmmannJ99, author = {Paul Ammann and Sushil Jajodia}, title = {Computer Security, Fault Tolerance, And Software Assurance}, journal = {{IEEE} Concurr.}, volume = {7}, number = {1}, pages = {4--6}, year = {1999}, url = {https://doi.org/10.1109/MCC.1999.749129}, doi = {10.1109/MCC.1999.749129}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeecc/AmmannJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/Jajodia99a, author = {Sushil Jajodia}, title = {Data replication gaining popularity}, journal = {{IEEE} Concurr.}, volume = {7}, number = {2}, pages = {85--86}, year = {1999}, url = {https://doi.org/10.1109/MCC.1999.766976}, doi = {10.1109/MCC.1999.766976}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeecc/Jajodia99a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/Jajodia99, author = {Sushil Jajodia}, title = {Distributed Databases: Turing Award Winner Jim Gray on the new millennium}, journal = {{IEEE} Concurr.}, volume = {7}, number = {3}, pages = {9--10}, year = {1999}, url = {https://doi.org/10.1109/MCC.1999.788774}, doi = {10.1109/MCC.1999.788774}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeecc/Jajodia99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhangLJ99, author = {Chunru Zhang and Kwok{-}Yan Lam and Sushil Jajodia}, title = {Scalable Threshold Closure}, journal = {Theor. Comput. Sci.}, volume = {226}, number = {1-2}, pages = {185--206}, year = {1999}, url = {https://doi.org/10.1016/S0304-3975(99)00072-9}, doi = {10.1016/S0304-3975(99)00072-9}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/ZhangLJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tois/BertinoJS99, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, title = {A Flexible Authorization Mechanism for Relational Data Management Systems}, journal = {{ACM} Trans. Inf. Syst.}, volume = {17}, number = {2}, pages = {101--140}, year = {1999}, url = {https://doi.org/10.1145/306686.306687}, doi = {10.1145/306686.306687}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tois/BertinoJS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/FayadJM99, author = {Amgad Fayad and Sushil Jajodia and Catherine D. McCollum}, title = {Application-Level Isolation Using Data Inconsistency Detection}, booktitle = {15th Annual Computer Security Applications Conference {(ACSAC} 1999), 6-10 December 1999, Scottsdale, AZ, {USA}}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/CSAC.1999.816019}, doi = {10.1109/CSAC.1999.816019}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/FayadJM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/LiuJM99, author = {Peng Liu and Sushil Jajodia and Catherine D. McCollum}, editor = {Vijayalakshmi Atluri and John Hale}, title = {Intrusion Confinement by Isolation in Information Systems}, booktitle = {Research Advances in Database and Information Systems Security, {IFIP} {WG} 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {171}, pages = {3--18}, publisher = {Kluwer}, year = {1999}, timestamp = {Tue, 09 Jul 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/LiuJM99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MukkamalaGJ99, author = {Ravi Mukkamala and Jason Gagnon and Sushil Jajodia}, editor = {Vijayalakshmi Atluri and John Hale}, title = {Integrating Data Mining Techniques with Intrusion Detection Methods}, booktitle = {Research Advances in Database and Information Systems Security, {IFIP} {WG} 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {171}, pages = {33--46}, publisher = {Kluwer}, year = {1999}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MukkamalaGJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/LiuAJ99, author = {Peng Liu and Paul Ammann and Sushil Jajodia}, title = {Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications}, booktitle = {Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31 - June 4, 1999}, pages = {414--423}, publisher = {{IEEE} Computer Society}, year = {1999}, url = {https://doi.org/10.1109/ICDCS.1999.776543}, doi = {10.1109/ICDCS.1999.776543}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/LiuAJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/Jajodia99, author = {Sushil Jajodia}, editor = {Vijay Varadharajan and Yi Mu}, title = {Protecting Critical Information Systems (Abstract)}, booktitle = {Information and Communication Security, Second International Conference, ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1726}, pages = {143}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-47942-0\_12}, doi = {10.1007/978-3-540-47942-0\_12}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/Jajodia99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JohnsonDJ99, author = {Neil F. Johnson and Zoran Duric and Sushil Jajodia}, editor = {Andreas Pfitzmann}, title = {Recovery of Watermarks from Distorted Images}, booktitle = {Information Hiding, Third International Workshop, IH'99, Dresden, Germany, September 29 - October 1, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1768}, pages = {318--332}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/10719724\_22}, doi = {10.1007/10719724\_22}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/JohnsonDJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mis/JohnsonDJ99, author = {Neil F. Johnson and Zoran Duric and Sushil Jajodia}, editor = {Leana Golubchik and Vassilis J. Tsotras}, title = {On Fingerprinting Images for Recognition}, booktitle = {{MIS} '99, 5th Workshop on Multimedia Information Systems, 21-23 October 1999, Indian Wells, California, Proceedings}, pages = {4--11}, year = {1999}, timestamp = {Tue, 12 Mar 2013 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mis/JohnsonDJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/AmmannJ99, author = {Paul Ammann and Sushil Jajodia}, editor = {Margaret E. van Biene{-}Hershey and Leon Strous}, title = {The Integrity Challenge}, booktitle = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, Third Working Conference on Integrity and Internal Control in Information Systems: Strategic Views on the Need for Control, Amsterdam, The Netherlands, November 18-19, 1999}, series = {{IFIP} Conference Proceedings}, volume = {165}, pages = {59--70}, publisher = {Kluwer}, year = {1999}, timestamp = {Thu, 22 Aug 2002 09:18:50 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/AmmannJ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/1998, editor = {Sushil Jajodia}, title = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, publisher = {Kluwer}, year = {1999}, isbn = {0-7923-8488-1}, timestamp = {Mon, 21 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amai/BettiniWJ98, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {A General Framework for Time Granularity and Its Application to Temporal Reasoning}, journal = {Ann. Math. Artif. Intell.}, volume = {22}, number = {1-2}, pages = {29--58}, year = {1998}, url = {https://doi.org/10.1023/A:1018938007511}, doi = {10.1023/A:1018938007511}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amai/BettiniWJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JohnsonJ98, author = {Neil F. Johnson and Sushil Jajodia}, title = {Exploring Steganography: Seeing the Unseen}, journal = {Computer}, volume = {31}, number = {2}, pages = {26--34}, year = {1998}, url = {https://doi.org/10.1109/MC.1998.4655281}, doi = {10.1109/MC.1998.4655281}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JohnsonJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/BettiniWJ98, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Mining Temporal Relationships with Multiple Granularities in Time Sequences}, journal = {{IEEE} Data Eng. Bull.}, volume = {21}, number = {1}, pages = {32--38}, year = {1998}, url = {http://sites.computer.org/debull/98mar/bettini1.ps}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/BettiniWJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/Jajodia98, author = {Sushil Jajodia}, title = {Interview: Amit Sheth On Workflow Technology}, journal = {{IEEE} Concurr.}, volume = {6}, number = {2}, pages = {21--23}, year = {1998}, url = {https://doi.org/10.1109/MCC.1998.678785}, doi = {10.1109/MCC.1998.678785}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeecc/Jajodia98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijait/WangJM98, author = {Xiaoyang Sean Wang and Sushil Jajodia and Sona Mohavni}, title = {Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information}, journal = {Int. J. Artif. Intell. Tools}, volume = {7}, number = {2}, pages = {319--339}, year = {1998}, url = {https://doi.org/10.1142/S0218213098000159}, doi = {10.1142/S0218213098000159}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijait/WangJM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/RayAJ98, author = {Indrakshi Ray and Paul Ammann and Sushil Jajodia}, title = {A Semantic-Based Transaction Processing Model for Multilevel Transactions}, journal = {J. Comput. Secur.}, volume = {6}, number = {3}, pages = {181--217}, year = {1998}, url = {https://doi.org/10.3233/jcs-980108}, doi = {10.3233/JCS-980108}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/RayAJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BertinoJMR98, author = {Elisa Bertino and Sushil Jajodia and Luigi V. Mancini and Indrajit Ray}, title = {Advanced Transaction Processing in Multilevel Secure File Stores}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {10}, number = {1}, pages = {120--135}, year = {1998}, url = {https://doi.org/10.1109/69.667095}, doi = {10.1109/69.667095}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/BertinoJMR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BettiniWJL98, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia and Jia{-}Ling Lin}, title = {Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {10}, number = {2}, pages = {222--237}, year = {1998}, url = {https://doi.org/10.1109/69.683754}, doi = {10.1109/69.683754}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/BettiniWJL98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BettiniWJ98, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Temporal Semantic Assumptions and Their Use in Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {10}, number = {2}, pages = {277--296}, year = {1998}, url = {https://doi.org/10.1109/69.683757}, doi = {10.1109/69.683757}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/BettiniWJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JajodiaLM98, author = {Sushil Jajodia and Peng Liu and Catherine D. McCollum}, title = {Application-Level Isolation to Cope with Malicious Database Users}, booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998), 7-11 December 1998, Scottsdale, AZ, {USA}}, pages = {73--82}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSAC.1998.738580}, doi = {10.1109/CSAC.1998.738580}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/JajodiaLM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JajodiaMS98, author = {Sushil Jajodia and Luigi V. Mancini and Sanjeev Setia}, title = {A Fair Locking Protocol for Multilevel Secure Databases}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {168--178}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683167}, doi = {10.1109/CSFW.1998.683167}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/JajodiaMS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/LinWJ98, author = {Jia{-}Ling Lin and Xiaoyang Sean Wang and Sushil Jajodia}, title = {Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies}, booktitle = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop, Rockport, Massachusetts, USA, June 9-11, 1998}, pages = {190--201}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/CSFW.1998.683169}, doi = {10.1109/CSFW.1998.683169}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/LinWJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThuraisinghamJSDO98, author = {Bhavani Thuraisingham and Sushil Jajodia and Pierangela Samarati and John E. Dobson and Martin S. Olivier}, editor = {Sushil Jajodia}, title = {Security and Privacy Issues for the World Wide Web: Panel Discussion}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {269--284}, publisher = {Kluwer}, year = {1998}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThuraisinghamJSDO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/JohnsonJ98, author = {Neil F. Johnson and Sushil Jajodia}, editor = {David Aucsmith}, title = {Steganalysis of Images Created Using Current Steganography Software}, booktitle = {Information Hiding, Second International Workshop, Portland, Oregon, USA, April 14-17, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1525}, pages = {273--289}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49380-8\_19}, doi = {10.1007/3-540-49380-8\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/JohnsonJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/RumoloJ98, author = {Giovanni Rumolo and Sushil Jajodia}, editor = {Sushil Jajodia and William List and Graeme W. McGregor and Leon Strous}, title = {Algebra for Databases with Explicit Markings of Damaged Data}, booktitle = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998}, series = {{IFIP} Conference Proceedings}, volume = {136}, pages = {103--129}, publisher = {Kluwer}, year = {1998}, timestamp = {Thu, 22 Aug 2002 09:35:37 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/RumoloJ98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dagstuhl/TDB97, editor = {Opher Etzion and Sushil Jajodia and Suryanarayana M. Sripada}, title = {Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997)}, series = {Lecture Notes in Computer Science}, volume = {1399}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053695}, doi = {10.1007/BFB0053695}, isbn = {3-540-64519-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/TDB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mis/1998, editor = {Sushil Jajodia and M. Tamer {\"{O}}zsu and Asuman Dogac}, title = {Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1508}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49651-3}, doi = {10.1007/3-540-49651-3}, isbn = {3-540-65107-1}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mis/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tc11-5/1998, editor = {Sushil Jajodia and William List and Graeme W. McGregor and Leon Strous}, title = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998}, series = {{IFIP} Conference Proceedings}, volume = {136}, publisher = {Kluwer}, year = {1998}, isbn = {0-412-84770-1}, timestamp = {Thu, 22 Aug 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/AmmannJ97, author = {Paul Ammann and Sushil Jajodia}, title = {Semantics-based transaction processing: satisfying conflicting objectives}, journal = {{IEEE} Concurrency}, volume = {5}, number = {2}, pages = {8--10}, year = {1997}, url = {https://doi.org/10.1109/4434.588269}, doi = {10.1109/4434.588269}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeecc/AmmannJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeecc/AmmannJ97a, author = {Paul Ammann and Sushil Jajodia}, title = {Rethinking integrity [distributed databases]}, journal = {{IEEE} Concurrency}, volume = {5}, number = {4}, pages = {5--6}, year = {1997}, url = {https://doi.org/10.1109/4434.641618}, doi = {10.1109/4434.641618}, timestamp = {Wed, 06 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeecc/AmmannJ97a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/AtluriBJ97, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {A theoretical formulation for degrees of isolation in databases}, journal = {Inf. Softw. Technol.}, volume = {39}, number = {1}, pages = {47--53}, year = {1997}, url = {https://doi.org/10.1016/0950-5849(96)01109-3}, doi = {10.1016/0950-5849(96)01109-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/AtluriBJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/JajodiaBBKMSW97, author = {Sushil Jajodia and Daniel Barbar{\'{a}} and Alexander Brodsky and Larry Kerschberg and Amihai Motro and Edgar H. Sibley and Xiaoyang Sean Wang}, title = {Information Systems Research at George Mason University}, journal = {{SIGMOD} Rec.}, volume = {26}, number = {4}, pages = {69--74}, year = {1997}, url = {https://doi.org/10.1145/271074.271095}, doi = {10.1145/271074.271095}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/JajodiaBBKMSW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/BertinoSJ97, author = {Elisa Bertino and Pierangela Samarati and Sushil Jajodia}, title = {An Extended Authorization Model for Relational Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {1}, pages = {85--101}, year = {1997}, url = {https://doi.org/10.1109/69.567051}, doi = {10.1109/69.567051}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/BertinoSJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SamaratiBCJ97, author = {Pierangela Samarati and Elisa Bertino and Alessandro Ciampichetti and Sushil Jajodia}, title = {Information Flow Control in Object-Oriented Systems}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {4}, pages = {524--538}, year = {1997}, url = {https://doi.org/10.1109/69.617048}, doi = {10.1109/69.617048}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SamaratiBCJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AtluriJB97, author = {Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino}, title = {Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {5}, pages = {697--708}, year = {1997}, url = {https://doi.org/10.1109/69.634749}, doi = {10.1109/69.634749}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AtluriJB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/WangBBJ97, author = {Xiaoyang Sean Wang and Claudio Bettini and Alexander Brodsky and Sushil Jajodia}, title = {Logical Design for Temporal Databases with Multiple Granularities}, journal = {{ACM} Trans. Database Syst.}, volume = {22}, number = {2}, pages = {115--170}, year = {1997}, url = {https://doi.org/10.1145/249978.249979}, doi = {10.1145/249978.249979}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/WangBBJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/AmmannJR97, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, title = {Applying Formal Methods to Semantic-Based Decomposition of Transactions}, journal = {{ACM} Trans. Database Syst.}, volume = {22}, number = {2}, pages = {215--254}, year = {1997}, url = {https://doi.org/10.1145/249978.249981}, doi = {10.1145/249978.249981}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/AmmannJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/WolfsonJH97, author = {Ouri Wolfson and Sushil Jajodia and Yixiu Huang}, title = {An Adaptive Data Replication Algorithm}, journal = {{ACM} Trans. Database Syst.}, volume = {22}, number = {2}, pages = {255--314}, year = {1997}, url = {https://doi.org/10.1145/249978.249982}, doi = {10.1145/249978.249982}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tods/WolfsonJH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/JajodiaRA97, author = {Sushil Jajodia and Indrakshi Ray and Paul Ammann}, editor = {Antoni Oliv{\'{e}} and Joan Antoni Pastor}, title = {Implementing Semantic-Based Decomposition of Transactions}, booktitle = {Advanced Information Systems Engineering, 9th International Conference CAiSE'97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1250}, pages = {75--88}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-63107-0\_6}, doi = {10.1007/3-540-63107-0\_6}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/JajodiaRA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cp/BettiniWJ97, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Gert Smolka}, title = {Satisfiability of Quantitative Temporal Constraints with Multiple Granularities}, booktitle = {Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29 - November 1, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1330}, pages = {435--449}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0017458}, doi = {10.1007/BFB0017458}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/cp/BettiniWJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/BettiniWJ97, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Opher Etzion and Sushil Jajodia and Suryanarayana M. Sripada}, title = {An Architecture for Supporting Interoperability among Temporal Databases}, booktitle = {Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997)}, series = {Lecture Notes in Computer Science}, volume = {1399}, pages = {36--55}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0053697}, doi = {10.1007/BFB0053697}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/BettiniWJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/WuJW97, author = {Yu Wu and Sushil Jajodia and Xiaoyang Sean Wang}, editor = {Opher Etzion and Sushil Jajodia and Suryanarayana M. Sripada}, title = {Temporal Database Bibliography Update}, booktitle = {Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997)}, series = {Lecture Notes in Computer Science}, volume = {1399}, pages = {338--366}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0053709}, doi = {10.1007/BFB0053709}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dagstuhl/WuJW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dagstuhl/JensenDBCEGGHJKKLMMNPPRSSSSSTTW97, author = {Christian S. Jensen and Curtis E. Dyreson and Michael H. B{\"{o}}hlen and James Clifford and Ramez Elmasri and Shashi K. Gadia and Fabio Grandi and Patrick J. Hayes and Sushil Jajodia and Wolfgang K{\"{a}}fer and Nick Kline and Nikos A. Lorentzos and Yannis G. Mitsopoulos and Angelo Montanari and Daniel A. Nonen and Elisa Peressi and Barbara Pernici and John F. Roddick and Nandlal L. Sarda and Maria Rita Scalas and Arie Segev and Richard T. Snodgrass and Michael D. Soo and Abdullah Uz Tansel and Paolo Tiberio and Gio Wiederhold}, editor = {Opher Etzion and Sushil Jajodia and Suryanarayana M. Sripada}, title = {The Consensus Glossary of Temporal Database Concepts - February 1998 Version}, booktitle = {Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997)}, series = {Lecture Notes in Computer Science}, volume = {1399}, pages = {367--405}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0053710}, doi = {10.1007/BFB0053710}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dagstuhl/JensenDBCEGGHJKKLMMNPPRSSSSSTTW97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ThuraisinghamSSLJC97, author = {Bhavani Thuraisingham and Linda Schlipper and Pierangela Samarati and Tsau Young Lin and Sushil Jajodia and Chris Clifton}, editor = {Tsau Young Lin and Shelly Qian}, title = {Security Issues in Data Warehousing and Data Mining: Panel Discussion}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {3--16}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ThuraisinghamSSLJC97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaMR97, author = {Sushil Jajodia and Ravi Mukkamala and Indrajit Ray}, editor = {Tsau Young Lin and Shelly Qian}, title = {A Two-tier Coarse Indexing Scheme for {MLS} Database Systems}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {199--218}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Thu, 24 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaMR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/JajodiaSSB97, author = {Sushil Jajodia and Pierangela Samarati and V. S. Subrahmanian and Elisa Bertino}, editor = {Joan Peckham}, title = {A Unified Framework for Enforcing Multiple Access Control Policies}, booktitle = {{SIGMOD} 1997, Proceedings {ACM} {SIGMOD} International Conference on Management of Data, May 13-15, 1997, Tucson, Arizona, {USA}}, pages = {474--485}, publisher = {{ACM} Press}, year = {1997}, url = {https://doi.org/10.1145/253260.253364}, doi = {10.1145/253260.253364}, timestamp = {Mon, 14 Jun 2021 15:39:36 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/JajodiaSSB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaSS97, author = {Sushil Jajodia and Pierangela Samarati and V. S. Subrahmanian}, title = {A Logical Language for Expressing Authorizations}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {31--42}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601312}, doi = {10.1109/SECPRI.1997.601312}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaSS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/FerrariSBJ97, author = {Elena Ferrari and Pierangela Samarati and Elisa Bertino and Sushil Jajodia}, title = {Providing flexibility in information flow control for object oriented systems}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {130--140}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601328}, doi = {10.1109/SECPRI.1997.601328}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/FerrariSBJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AmmannJMB97, author = {Paul Ammann and Sushil Jajodia and Catherine D. McCollum and Barbara T. Blaustein}, title = {Surviving information warfare attacks on databases}, booktitle = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, {USA}}, pages = {164--174}, publisher = {{IEEE} Computer Society}, year = {1997}, url = {https://doi.org/10.1109/SECPRI.1997.601331}, doi = {10.1109/SECPRI.1997.601331}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannJMB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/kl/jajodiaK97/AmmannJR97, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, editor = {Sushil Jajodia and Larry Kerschberg}, title = {Semantic-Based Decomposition of Transactions}, booktitle = {Advanced Transaction Models and Architectures}, publisher = {Kluwer}, year = {1997}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/kl/jajodiaK97/AmmannJR97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/kl/jajodiaK97/ManciniRJB97, author = {Luigi V. Mancini and Indrajit Ray and Sushil Jajodia and Elisa Bertino}, editor = {Sushil Jajodia and Larry Kerschberg}, title = {Flexible Commit Protocols for Advanced Transaction Processing}, booktitle = {Advanced Transaction Models and Architectures}, publisher = {Kluwer}, year = {1997}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/kl/jajodiaK97/ManciniRJB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/kl/JajodiaK97, editor = {Sushil Jajodia and Larry Kerschberg}, title = {Advanced Transaction Models and Architectures}, publisher = {Kluwer}, year = {1997}, isbn = {0-7923-9880-7}, timestamp = {Mon, 05 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/kl/JajodiaK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/tc11-5/1997, editor = {Sushil Jajodia and William List and Graeme W. McGregor and Leon Strous}, title = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997}, series = {{IFIP} Conference Proceedings}, volume = {109}, publisher = {Chapman Hall}, year = {1997}, isbn = {0-412-82600-3}, timestamp = {Thu, 22 Aug 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/1997.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/crc/tucker97/Jajodia97, author = {Sushil Jajodia}, editor = {Allen B. Tucker}, title = {Database Security and Privacy}, booktitle = {The Computer Science and Engineering Handbook}, pages = {1112--1124}, publisher = {{CRC} Press}, year = {1997}, timestamp = {Sun, 09 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/crc/tucker97/Jajodia97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Jajodia96, author = {Sushil Jajodia}, title = {Database Security and Privacy}, journal = {{ACM} Comput. Surv.}, volume = {28}, number = {1}, pages = {129--131}, year = {1996}, url = {https://doi.org/10.1145/234313.234370}, doi = {10.1145/234313.234370}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Jajodia96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/Jajodia96a, author = {Sushil Jajodia}, title = {Managing Security and Privacy of Information}, journal = {{ACM} Comput. Surv.}, volume = {28}, number = {4es}, pages = {79}, year = {1996}, url = {https://doi.org/10.1145/242224.242327}, doi = {10.1145/242224.242327}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/Jajodia96a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/SamaratiAJ96, author = {Pierangela Samarati and Paul Ammann and Sushil Jajodia}, title = {Maintaining Replicated Authorizations in Distributed Database Systems}, journal = {Data Knowl. Eng.}, volume = {18}, number = {1}, pages = {55--84}, year = {1996}, url = {https://doi.org/10.1016/0169-023X(95)00000-I}, doi = {10.1016/0169-023X(95)00000-I}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/SamaratiAJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SmithBJN96, author = {Kenneth P. Smith and Barbara T. Blaustein and Sushil Jajodia and LouAnna Notargiacomo}, title = {Correctness Criteria for Multilevel Secure Transactions}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {8}, number = {1}, pages = {32--45}, year = {1996}, url = {https://doi.org/10.1109/69.485627}, doi = {10.1109/69.485627}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SmithBJN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/SamaratiBJ96, author = {Pierangela Samarati and Elisa Bertino and Sushil Jajodia}, title = {An Authorization Model for a Distributed Hypertext System}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {8}, number = {4}, pages = {555--562}, year = {1996}, url = {https://doi.org/10.1109/69.536249}, doi = {10.1109/69.536249}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/SamaratiBJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AtluriJB96, author = {Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino}, title = {Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {8}, number = {5}, pages = {839--854}, year = {1996}, url = {https://doi.org/10.1109/69.542034}, doi = {10.1109/69.542034}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AtluriJB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/AmmannJF96, author = {Paul Ammann and Sushil Jajodia and Phyllis G. Frankl}, title = {Globally Consistent Event Ordering in One-Directional Distributed Environments}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {7}, number = {6}, pages = {665--670}, year = {1996}, url = {https://doi.org/10.1109/71.506704}, doi = {10.1109/71.506704}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/AmmannJF96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/RayBJM96, author = {Indrajit Ray and Elisa Bertino and Sushil Jajodia and Luigi V. Mancini}, editor = {Li Gong and Jacques Stearn}, title = {An Advanced Commit Protocol for {MLS} Distributed Database Systems}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {119--128}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238198}, doi = {10.1145/238168.238198}, timestamp = {Tue, 10 Nov 2020 20:00:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/RayBJM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertinoJS96, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, editor = {Li Gong and Jacques Stearn}, title = {A Non-Timestamped Authorization Model for Data Management Systems}, booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and Communications Security, New Delhi, India, March 14-16, 1996}, pages = {169--178}, publisher = {{ACM}}, year = {1996}, url = {https://doi.org/10.1145/238168.238211}, doi = {10.1145/238168.238211}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertinoJS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriJKMM96, author = {Vijayalakshmi Atluri and Sushil Jajodia and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala}, editor = {Pierangela Samarati and Ravi S. Sandhu}, title = {Multilevel Secure Transaction Processing: Status and Prospects}, booktitle = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} / {WG11.3} Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy}, series = {{IFIP} Conference Proceedings}, volume = {79}, pages = {79--98}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 24 Oct 2002 16:14:24 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriJKMM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaMR96, author = {Sushil Jajodia and Luigi V. Mancini and Indrajit Ray}, editor = {Pierangela Samarati and Ravi S. Sandhu}, title = {Secure Locking Protocols for Multilevel Database Management Systems}, booktitle = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} / {WG11.3} Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy}, series = {{IFIP} Conference Proceedings}, volume = {79}, pages = {177--194}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 24 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaMR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MarksMJ96, author = {Donald G. Marks and Amihai Motro and Sushil Jajodia}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {Enhancing the Controlled Disclosure of Sensitive Information}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {290--303}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_42}, doi = {10.1007/3-540-61770-1\_42}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MarksMJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/CandanJS96, author = {K. Sel{\c{c}}uk Candan and Sushil Jajodia and V. S. Subrahmanian}, editor = {Stanley Y. W. Su}, title = {Secure Mediated Databases}, booktitle = {Proceedings of the Twelfth International Conference on Data Engineering, February 26 - March 1, 1996, New Orleans, Louisiana, {USA}}, pages = {28--37}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/ICDE.1996.492086}, doi = {10.1109/ICDE.1996.492086}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/CandanJS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/BettiniWJ96, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Richard Hull}, title = {Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining}, booktitle = {Proceedings of the Fifteenth {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, June 3-5, 1996, Montreal, Canada}, pages = {68--78}, publisher = {{ACM} Press}, year = {1996}, url = {https://doi.org/10.1145/237661.237680}, doi = {10.1145/237661.237680}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pods/BettiniWJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AmmannJR96, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, title = {Ensuring Atomicity of Multilevel Transactions}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {74--84}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502671}, doi = {10.1109/SECPRI.1996.502671}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannJR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BertinoJS96, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, title = {Supporting Multiple Access Control Policies in Database Systems}, booktitle = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, {USA}}, pages = {94--107}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/SECPRI.1996.502673}, doi = {10.1109/SECPRI.1996.502673}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/BertinoJS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/time/BettiniWJ96, author = {Claudio Bettini and Xiaoyang Sean Wang and Sushil Jajodia}, editor = {Luca Chittaro and Scott D. Goodwin and Howard J. Hamilton and Angelo Montanari}, title = {A General Framework and Reasoning Model for Time Granularity}, booktitle = {Proceedings of the Third International Workshop on Temporal Representation and Reasoning, TIME-96, Key West, Florida, USA, May 19-20, 1996}, pages = {104--111}, publisher = {{IEEE} Computer Society}, year = {1996}, url = {https://doi.org/10.1109/TIME.1996.555688}, doi = {10.1109/TIME.1996.555688}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/time/BettiniWJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/ph/kumar96/JajodiaM96, author = {Sushil Jajodia and Ravi Mukkamala}, editor = {Vijay Kumar}, title = {Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control}, booktitle = {Performance of Concurrency Control Mechanisms in Centralized Database Systems}, pages = {387--405}, publisher = {Prentice-Hall}, year = {1996}, timestamp = {Mon, 05 Aug 2019 11:49:10 +0200}, biburl = {https://dblp.org/rec/books/ph/kumar96/JajodiaM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SubrahmanianJ96, editor = {V. S. Subrahmanian and Sushil Jajodia}, title = {Multimedia Database System: Issues and Research Direction}, publisher = {Springer}, year = {1996}, isbn = {3-540-58710-1}, timestamp = {Tue, 06 Aug 2019 09:54:56 +0200}, biburl = {https://dblp.org/rec/books/sp/SubrahmanianJ96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/WolfsonJ95, author = {Ouri Wolfson and Sushil Jajodia}, title = {An Algorithm for Dynamic Data Allocation in Distributed Systems}, journal = {Inf. Process. Lett.}, volume = {53}, number = {2}, pages = {113--119}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(94)00182-X}, doi = {10.1016/0020-0190(94)00182-X}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/WolfsonJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/BertinoJS95, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, title = {Database Security: Research and Practice}, journal = {Inf. Syst.}, volume = {20}, number = {7}, pages = {537--556}, year = {1995}, url = {https://doi.org/10.1016/0306-4379(95)00029-4}, doi = {10.1016/0306-4379(95)00029-4}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/BertinoJS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangJS95, author = {Xiaoyang Sean Wang and Sushil Jajodia and V. S. Subrahmanian}, title = {Temporal Modules: An Approach Toward Federated Temporal Databases}, journal = {Inf. Sci.}, volume = {82}, number = {1-2}, pages = {103--128}, year = {1995}, url = {https://doi.org/10.1016/0020-0255(94)00062-G}, doi = {10.1016/0020-0255(94)00062-G}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangJS95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AmmannJJ95, author = {Paul Ammann and Frank Jaeckle and Sushil Jajodia}, title = {Concurrency Control in a Secure Database via a Two-Snapshot Algorithm}, journal = {J. Comput. Secur.}, volume = {3}, number = {2/3}, pages = {87--114}, year = {1995}, url = {https://doi.org/10.3233/JCS-1994/1995-32-302}, doi = {10.3233/JCS-1994/1995-32-302}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AmmannJJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AmmannAJ95, author = {Paul Ammann and Vijayalakshmi Atluri and Sushil Jajodia}, title = {The Partitioned Synchronization Rule for Planar Extendible Partial Orders}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {7}, number = {5}, pages = {797--808}, year = {1995}, url = {https://doi.org/10.1109/69.469819}, doi = {10.1109/69.469819}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AmmannAJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AmmannJM95, author = {Paul Ammann and Sushil Jajodia and Padmaja Mavuluri}, title = {On-The-Fly Reading of Entire Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {7}, number = {5}, pages = {834--838}, year = {1995}, url = {https://doi.org/10.1109/69.469836}, doi = {10.1109/69.469836}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AmmannJM95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ95, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {231--247}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/BettiniWBJ95, author = {Claudio Bettini and Xiaoyang Sean Wang and Elisa Bertino and Sushil Jajodia}, editor = {Michael J. Carey and Donovan A. Schneider}, title = {Semantic Assumptions and Query Evaluation in Temporal Databases}, booktitle = {Proceedings of the 1995 {ACM} {SIGMOD} International Conference on Management of Data, San Jose, California, USA, May 22-25, 1995}, pages = {257--268}, publisher = {{ACM} Press}, year = {1995}, url = {https://doi.org/10.1145/223784.223843}, doi = {10.1145/223784.223843}, timestamp = {Tue, 16 Aug 2022 23:04:20 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/BettiniWBJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/AmmannJR95, author = {Paul Ammann and Sushil Jajodia and Indrakshi Ray}, editor = {Umeshwar Dayal and Peter M. D. Gray and Shojiro Nishio}, title = {Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions}, booktitle = {VLDB'95, Proceedings of 21th International Conference on Very Large Data Bases, September 11-15, 1995, Zurich, Switzerland}, pages = {218--227}, publisher = {Morgan Kaufmann}, year = {1995}, url = {http://www.vldb.org/conf/1995/P218.PDF}, timestamp = {Tue, 20 Feb 2018 15:19:44 +0100}, biburl = {https://dblp.org/rec/conf/vldb/AmmannJR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/njc/JajodiaMR94, author = {Sushil Jajodia and Ravi Mukkamala and K. V. S. Ramarao}, title = {A View-Based Dynamic Replication Control Algorithm}, journal = {Nord. J. Comput.}, volume = {1}, number = {2}, pages = {214--230}, year = {1994}, timestamp = {Wed, 14 Jan 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/njc/JajodiaMR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/JensenCEGHJ94, author = {Christian S. Jensen and James Clifford and Ramez Elmasri and Shashi K. Gadia and Patrick J. Hayes and Sushil Jajodia}, title = {A Consensus Glossary of Temporal Database Concepts}, journal = {{SIGMOD} Rec.}, volume = {23}, number = {1}, pages = {52--64}, year = {1994}, url = {https://doi.org/10.1145/181550.181560}, doi = {10.1145/181550.181560}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/JensenCEGHJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DoshiHJM94, author = {Vinti Doshi and William R. Herndon and Sushil Jajodia and Catherine D. McCollum}, title = {Benchmarking multilevel secure database systems using the {MITRE} benchmark}, booktitle = {10th Annual Computer Security Applications Conference, {ACSAC} 1994, 5-9 December, 1994 Orlando, FL, {USA}}, pages = {86--95}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/CSAC.1994.367318}, doi = {10.1109/CSAC.1994.367318}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/DoshiHJM94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AmmannJ94, author = {Paul Ammann and Sushil Jajodia}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {118--125}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191201}, doi = {10.1145/191177.191201}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AmmannJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SamaratiAJ94, author = {Pierangela Samarati and Paul Ammann and Sushil Jajodia}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {Propagation of Authorizations in Distributed Database Systems}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {136--147}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191204}, doi = {10.1145/191177.191204}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SamaratiAJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ94, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {Joachim Biskup and Matthew Morgenstern and Carl E. Landwehr}, title = {Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols}, booktitle = {Database Security, {VIII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994}, series = {{IFIP} Transactions}, volume = {{A-60}}, pages = {259--274}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MotroMJ94, author = {Amihai Motro and Donald G. Marks and Sushil Jajodia}, editor = {Dieter Gollmann}, title = {Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information}, booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {875}, pages = {431--445}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-58618-0\_77}, doi = {10.1007/3-540-58618-0\_77}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MotroMJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BertinoMJ94, author = {Elisa Bertino and Luigi V. Mancini and Sushil Jajodia}, title = {Collecting garbage in multilevel secure object stores}, booktitle = {1994 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 16-18, 1994}, pages = {106--120}, publisher = {{IEEE} Computer Society}, year = {1994}, url = {https://doi.org/10.1109/RISP.1994.296588}, doi = {10.1109/RISP.1994.296588}, timestamp = {Thu, 21 Sep 2023 15:57:36 +0200}, biburl = {https://dblp.org/rec/conf/sp/BertinoMJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JajodiaM93, author = {Sushil Jajodia and Ravi Mukkamala}, title = {Measuring the effect of commutative transactions on distributed database performance}, journal = {Inf. Sci.}, volume = {68}, number = {1-2}, pages = {91--111}, year = {1993}, url = {https://doi.org/10.1016/0020-0255(93)90023-F}, doi = {10.1016/0020-0255(93)90023-F}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JajodiaM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SandhuJ93, author = {Ravi S. Sandhu and Sushil Jajodia}, title = {Limitations of Relational Data Base Access Controls}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {2}, number = {1}, pages = {57--72}, year = {1993}, url = {https://doi.org/10.1080/19393559308551345}, doi = {10.1080/19393559308551345}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SandhuJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems}, journal = {J. Comput. Secur.}, volume = {2}, number = {4}, pages = {311--352}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-2404}, doi = {10.3233/JCS-1993-2404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/AmmannJ93, author = {Paul Ammann and Sushil Jajodia}, title = {Distributed Timestamp Generation in Planar Lattice Networks}, journal = {{ACM} Trans. Comput. Syst.}, volume = {11}, number = {3}, pages = {205--225}, year = {1993}, url = {https://doi.org/10.1145/152864.152865}, doi = {10.1145/152864.152865}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/AmmannJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertinoSJ93, author = {Elisa Bertino and Pierangela Samarati and Sushil Jajodia}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {Authorizations in Relational Database Management Systems}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {130--139}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168605}, doi = {10.1145/168588.168605}, timestamp = {Tue, 10 Nov 2020 20:00:40 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertinoSJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BertinoSJ93a, author = {Elisa Bertino and Pierangela Samarati and Sushil Jajodia}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu and Victoria Ashby}, title = {High Assurance Discretionary Access Control for Object Bases}, booktitle = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993}, pages = {140--150}, publisher = {{ACM}}, year = {1993}, url = {https://doi.org/10.1145/168588.168606}, doi = {10.1145/168588.168606}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BertinoSJ93a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaMB93, author = {Sushil Jajodia and Catherine D. McCollum and Barbara T. Blaustein}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {109--121}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaMB93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AmmannJ93, author = {Paul Ammann and Sushil Jajodia}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Planar Lattice Security Structures for Multilevel Replicated Databases}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {125--134}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AmmannJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {135--158}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MukkamalaJ93, author = {Ravi Mukkamala and Sushil Jajodia}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {199--214}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/MukkamalaJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dood/BertinoJ93, author = {Elisa Bertino and Sushil Jajodia}, editor = {Stefano Ceri and Katsumi Tanaka and Shalom Tsur}, title = {Modeling Multilevel Entities Using Single Level Objects}, booktitle = {Deductive and Object-Oriented Databases, Third International Conference, DOOD'93, Phoenix, Arizona, USA, December 6-8, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {760}, pages = {415--428}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57530-8\_27}, doi = {10.1007/3-540-57530-8\_27}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/dood/BertinoJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/oopsla/BertinoJS93, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, editor = {Bhavani Thuraisingham and Ravi S. Sandhu and T. C. Ting}, title = {Enforcing Mandatory Access Control in Object Bases}, booktitle = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93} Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993}, series = {Workshops in Computing}, pages = {96--116}, publisher = {Springer}, year = {1993}, timestamp = {Wed, 29 Jun 2022 15:37:45 +0200}, biburl = {https://dblp.org/rec/conf/oopsla/BertinoJS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/WangJS93, author = {Xiaoyang Sean Wang and Sushil Jajodia and V. S. Subrahmanian}, editor = {Peter Buneman and Sushil Jajodia}, title = {Temporal Modules: An Approach Toward Federated Temporal Databases}, booktitle = {Proceedings of the 1993 {ACM} {SIGMOD} International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993}, pages = {227--236}, publisher = {{ACM} Press}, year = {1993}, url = {https://doi.org/10.1145/170035.170074}, doi = {10.1145/170035.170074}, timestamp = {Thu, 11 Mar 2021 15:20:15 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/WangJS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BlausteinJMN93, author = {Barbara T. Blaustein and Sushil Jajodia and Catherine D. McCollum and LouAnna Notargiacomo}, title = {A model of atomicity for multilevel transactions}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {120--134}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287637}, doi = {10.1109/RISP.1993.287637}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/BlausteinJMN93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving stricter correctness requirements in multilevel secure databases}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {135--147}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287636}, doi = {10.1109/RISP.1993.287636}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/lncs/BertinoJS93, author = {Elisa Bertino and Sushil Jajodia and Pierangela Samarati}, editor = {Nabil R. Adam and Bharat K. Bhargava}, title = {Access Control in Object-Oriented Database Systems - Some Approaches and Issues}, booktitle = {Advanced Database Systems}, series = {Lecture Notes in Computer Science}, volume = {759}, pages = {17--44}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-57507-3\_2}, doi = {10.1007/3-540-57507-3\_2}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/journals/lncs/BertinoJS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/bc/tanselCGSS93/WiederholdJL93, author = {Gio Wiederhold and Sushil Jajodia and Witold Litwin}, editor = {Abdullah Uz Tansel and James Clifford and Shashi K. Gadia and Arie Segev and Richard T. Snodgrass}, title = {Integrating Temporal Data in a Heterogeneous Environment}, booktitle = {Temporal Databases: Theory, Design, and Implementation}, pages = {563--579}, publisher = {Benjamin/Cummings}, year = {1993}, timestamp = {Wed, 07 Aug 2019 16:42:16 +0200}, biburl = {https://dblp.org/rec/books/bc/tanselCGSS93/WiederholdJL93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/bc/TanselCGJSS93, editor = {Abdullah Uz Tansel and James Clifford and Shashi K. Gadia and Sushil Jajodia and Arie Segev and Richard T. Snodgrass}, title = {Temporal Databases: Theory, Design, and Implementation}, publisher = {Benjamin/Cummings}, year = {1993}, isbn = {0-8053-2413-5}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/bc/TanselCGJSS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigmod/93, editor = {Peter Buneman and Sushil Jajodia}, title = {Proceedings of the 1993 {ACM} {SIGMOD} International Conference on Management of Data, Washington, DC, USA, May 26-28, 1993}, publisher = {{ACM} Press}, year = {1993}, url = {https://doi.org/10.1145/170035}, doi = {10.1145/170035}, isbn = {978-0-89791-592-2}, timestamp = {Thu, 11 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigmod/93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SandhuJ92, author = {Ravi S. Sandhu and Sushil Jajodia}, title = {Eliminating polyinstantiation securely}, journal = {Comput. Secur.}, volume = {11}, number = {6}, pages = {547--562}, year = {1992}, url = {https://doi.org/10.1016/0167-4048(92)90191-S}, doi = {10.1016/0167-4048(92)90191-S}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SandhuJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/CostichJ92, author = {Oliver Costich and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Carl E. Landwehr}, title = {Maintaining Multilevel Transaction Atomicity in {MLS} Database Systems with Kernelized Architecture}, booktitle = {Database Security, {VI:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992}, series = {{IFIP} Transactions}, volume = {{A-21}}, pages = {249--266}, publisher = {North-Holland}, year = {1992}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/CostichJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/McDermottJ92, author = {John P. McDermott and Sushil Jajodia}, editor = {Bhavani Thuraisingham and Carl E. Landwehr}, title = {Orange Locking: Channel-Free Database Concurrency Control Via Locking}, booktitle = {Database Security, {VI:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992}, series = {{IFIP} Transactions}, volume = {{A-21}}, pages = {267--284}, publisher = {North-Holland}, year = {1992}, timestamp = {Mon, 18 Feb 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/McDermottJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/SandhuJ92, author = {Ravi S. Sandhu and Sushil Jajodia}, editor = {Yves Deswarte and G{\'{e}}rard Eizenberg and Jean{-}Jacques Quisquater}, title = {Polyinstantation for Cover Stories}, booktitle = {Computer Security - {ESORICS} 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {648}, pages = {307--328}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/BFb0013905}, doi = {10.1007/BFB0013905}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/esorics/SandhuJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pods/WolfsonJ92, author = {Ouri Wolfson and Sushil Jajodia}, editor = {Moshe Y. Vardi and Paris C. Kanellakis}, title = {Distributed Algorithms for Dynamic Replication of Data}, booktitle = {Proceedings of the Eleventh {ACM} {SIGACT-SIGMOD-SIGART} Symposium on Principles of Database Systems, June 2-4, 1992, San Diego, California, {USA}}, pages = {149--163}, publisher = {{ACM} Press}, year = {1992}, url = {https://doi.org/10.1145/137097.137858}, doi = {10.1145/137097.137858}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pods/WolfsonJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/DoshiJ92, author = {Vinti Doshi and Sushil Jajodia}, editor = {Guy G. Gable and William J. Caelli}, title = {Referential Integrity in Multilevel Secure Database Management Systems}, booktitle = {{IT} Security: The Need for International Cooperation, Proceedings of the {IFIP} TC11, Eigth International Conference on Information Security, IFIP/Sec '92, Singapore, 27-29 May 1992}, series = {{IFIP} Transactions}, volume = {{A-15}}, pages = {359--371}, publisher = {North-Holland}, year = {1992}, timestamp = {Wed, 20 Feb 2002 11:18:35 +0100}, biburl = {https://dblp.org/rec/conf/sec/DoshiJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AmmannJJ92, author = {Paul Ammann and Frank Jaeckle and Sushil Jajodia}, title = {A two snapshot algorithm for concurrency control in multi-level secure databases}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {204--215}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213260}, doi = {10.1109/RISP.1992.213260}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/AmmannJJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaA92, author = {Sushil Jajodia and Vijayalakshmi Atluri}, title = {Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {216--224}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213259}, doi = {10.1109/RISP.1992.213259}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaA92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wmrd/WolfsonJ92, author = {Ouri Wolfson and Sushil Jajodia}, editor = {Jehan{-}Fran{\c{c}}ois P{\^{a}}ris and Hector Garcia{-}Molina}, title = {An Algorithm for Dynamic Data Distribution}, booktitle = {Proceedings of the Second Workshop on the Management of Replicated Data, November 12-13, 1992, Monterey, California, {USA}}, pages = {62--65}, publisher = {{IEEE} Computer Society Press}, year = {1992}, timestamp = {Sun, 28 Jul 2019 16:59:35 +0200}, biburl = {https://dblp.org/rec/conf/wmrd/WolfsonJ92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/1991, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, publisher = {North-Holland}, year = {1992}, isbn = {0-444-89518-3}, timestamp = {Fri, 15 Feb 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/1991.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SandhuJ91, author = {Ravi S. Sandhu and Sushil Jajodia}, title = {Integrity principles and mechanisms in database management systems}, journal = {Comput. Secur.}, volume = {10}, number = {5}, pages = {413--427}, year = {1991}, url = {https://doi.org/10.1016/0167-4048(91)90068-O}, doi = {10.1016/0167-4048(91)90068-O}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SandhuJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/JajodiaM91, author = {Sushil Jajodia and David Mutchler}, title = {A short technical paper: Determining whether a vote assignment is dominated}, journal = {Inf. Sci.}, volume = {56}, number = {1-3}, pages = {279--282}, year = {1991}, url = {https://doi.org/10.1016/0020-0255(91)90034-R}, doi = {10.1016/0020-0255(91)90034-R}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/JajodiaM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/MukkamalaJ91, author = {Ravi Mukkamala and Sushil Jajodia}, title = {A Note on Estimating the Cardinality of the Projection of a Database Relation}, journal = {{ACM} Trans. Database Syst.}, volume = {16}, number = {3}, pages = {564--566}, year = {1991}, url = {https://doi.org/10.1145/111197.111218}, doi = {10.1145/111197.111218}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/MukkamalaJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/McDermottJS91, author = {John P. McDermott and Sushil Jajodia and Ravi S. Sandhu}, title = {A single-level scheduler for the replicated architecture for multilevel-secure databases}, booktitle = {Seventh Annual Computer Security Applications Conference, {ACSAC} 1991, 2-6 December, 1991, San Antonio, Texas, {USA}}, pages = {2--11}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/CSAC.1991.213023}, doi = {10.1109/CSAC.1991.213023}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/McDermottJS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KoganJ91, author = {Boris Y. Kogan and Sushil Jajodia}, title = {An audit model for object-oriented databases}, booktitle = {Seventh Annual Computer Security Applications Conference, {ACSAC} 1991, 2-6 December, 1991, San Antonio, Texas, {USA}}, pages = {90--99}, publisher = {{IEEE}}, year = {1991}, url = {https://doi.org/10.1109/CSAC.1991.213015}, doi = {10.1109/CSAC.1991.213015}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/KoganJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/WiederholdJL91, author = {Gio Wiederhold and Sushil Jajodia and Witold Litwin}, editor = {Rudolf Andersen and Janis A. Bubenko Jr. and Arne S{\o}lvberg}, title = {Dealing with Granularity of Time in Temporal Databases}, booktitle = {Advanced Information Systems Engineering, CAiSE'91, Trondheim, Norway, May 13-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {498}, pages = {124--140}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-54059-8\_83}, doi = {10.1007/3-540-54059-8\_83}, timestamp = {Sat, 07 Sep 2019 11:59:25 +0200}, biburl = {https://dblp.org/rec/conf/caise/WiederholdJL91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SandhuTJ91, author = {Ravi S. Sandhu and Roshan K. Thomas and Sushil Jajodia}, title = {A Secure Kernelized Architecture for Multiple Object-Oriented Databases}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {139--152}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/CSFW.1991.151580}, doi = {10.1109/CSFW.1991.151580}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SandhuTJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Jajodia91, author = {Sushil Jajodia}, title = {Panel Discussion on the Polyinstantiation Problem: {A} Position Paper}, booktitle = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia, New Hampshire, USA, June 18-20, 1991, Proceedings}, pages = {235}, publisher = {{IEEE} Computer Society}, year = {1991}, timestamp = {Thu, 19 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/Jajodia91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AmmannJ91, author = {Paul Ammann and Sushil Jajodia}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {191--202}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 12:14:34 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AmmannJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaM91, author = {Sushil Jajodia and Ravi Mukkamala}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Effects of SeaView Decomposition of Multilevel Relations on Database Performance}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {203--225}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/SanhuTJ91, author = {Ravi S. Sandhu and Roshan K. Thomas and Sushil Jajodia}, editor = {Carl E. Landwehr and Sushil Jajodia}, title = {Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases}, booktitle = {Database Security, {V:} Status and Prospects, Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991}, series = {{IFIP} Transactions}, volume = {{A-6}}, pages = {297--314}, publisher = {North-Holland}, year = {1991}, timestamp = {Fri, 15 Feb 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/SanhuTJ91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/JajodiaS91, author = {Sushil Jajodia and Ravi S. Sandhu}, editor = {James Clifford and Roger King}, title = {Towards a Multilevel Secure Relational Data Model}, booktitle = {Proceedings of the 1991 {ACM} {SIGMOD} International Conference on Management of Data, Denver, Colorado, USA, May 29-31, 1991}, pages = {50--59}, publisher = {{ACM} Press}, year = {1991}, url = {https://doi.org/10.1145/115790.115796}, doi = {10.1145/115790.115796}, timestamp = {Mon, 21 Jun 2021 16:00:48 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/JajodiaS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaS91, author = {Sushil Jajodia and Ravi S. Sandhu}, title = {A Novel Decomposition of Multilevel Relations into Single-Level Relations}, booktitle = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 20-22, 1991}, pages = {300--315}, publisher = {{IEEE} Computer Society}, year = {1991}, url = {https://doi.org/10.1109/RISP.1991.130797}, doi = {10.1109/RISP.1991.130797}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/90, editor = {Sushil Jajodia and Carl E. Landwehr}, title = {Database Security, {IV:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990}, publisher = {North-Holland}, year = {1991}, isbn = {0-444-89076-9}, timestamp = {Wed, 20 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bit/JajodiaS90, author = {Sushil Jajodia and Frederick N. Springsteel}, title = {Lossless Outer Joins with Incomplete Information}, journal = {{BIT}}, volume = {30}, number = {1}, pages = {34--41}, year = {1990}, url = {https://doi.org/10.1007/BF01932129}, doi = {10.1007/BF01932129}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bit/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigmod/JajodiaS90, author = {Sushil Jajodia and Ravi S. Sandhu}, title = {Database Security: Current Status and Key Issues}, journal = {{SIGMOD} Rec.}, volume = {19}, number = {4}, pages = {123--126}, year = {1990}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigmod/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tods/JajodiaM90, author = {Sushil Jajodia and David Mutchler}, title = {Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database}, journal = {{ACM} Trans. Database Syst.}, volume = {15}, number = {2}, pages = {230--280}, year = {1990}, url = {https://doi.org/10.1145/78922.78926}, doi = {10.1145/78922.78926}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tods/JajodiaM90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/JajodiaSS90, author = {Sushil Jajodia and Ravi S. Sandhu and Edgar H. Sibley}, title = {Update semantics for multilevel relations}, booktitle = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990, 3-7 December, 1990, Tucson, Arizona, {USA}}, pages = {103--112}, publisher = {{IEEE}}, year = {1990}, url = {https://doi.org/10.1109/CSAC.1990.143757}, doi = {10.1109/CSAC.1990.143757}, timestamp = {Wed, 16 Oct 2019 14:14:56 +0200}, biburl = {https://dblp.org/rec/conf/acsac/JajodiaSS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/JajodiaS90, author = {Sushil Jajodia and Ravi S. Sandhu}, title = {A Formal Framework for Single Level Decomposition of Multilevel Relations}, booktitle = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings}, pages = {152--158}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/CSFW.1990.128195}, doi = {10.1109/CSFW.1990.128195}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/csfw/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SandhuJL90, author = {Ravi S. Sandhu and Sushil Jajodia and Teresa F. Lunt}, title = {A New Polyinstantiation Integrity Constraint for Multilevel Relations}, booktitle = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia, New Hampshire, USA, June 12-14, 1990, Proceedings}, pages = {159--165}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/CSFW.1990.128196}, doi = {10.1109/CSFW.1990.128196}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SandhuJL90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaS90, author = {Sushil Jajodia and Ravi S. Sandhu}, editor = {Sushil Jajodia and Carl E. Landwehr}, title = {Polyinstantiation Integrity in Multilevel Relations Revisited}, booktitle = {Database Security, {IV:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990}, pages = {297--308}, publisher = {North-Holland}, year = {1990}, timestamp = {Wed, 20 Jun 2018 17:22:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/KoganJ90, author = {Boris Kogan and Sushil Jajodia}, editor = {Hector Garcia{-}Molina and H. V. Jagadish}, title = {Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture}, booktitle = {Proceedings of the 1990 {ACM} {SIGMOD} International Conference on Management of Data, Atlantic City, NJ, USA, May 23-25, 1990}, pages = {153--162}, publisher = {{ACM} Press}, year = {1990}, url = {https://doi.org/10.1145/93597.98725}, doi = {10.1145/93597.98725}, timestamp = {Tue, 16 Aug 2022 23:04:20 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/KoganJ90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaK90, author = {Sushil Jajodia and Boris Kogan}, title = {Integrating an Object-Oriented Data Model with Multilevel Security}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {76--85}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63840}, doi = {10.1109/RISP.1990.63840}, timestamp = {Thu, 21 Sep 2023 15:57:34 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaS90, author = {Sushil Jajodia and Ravi S. Sandhu}, title = {Polyinstantiation Integrity in Multilevel Relations}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {104--115}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63843}, doi = {10.1109/RISP.1990.63843}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaS90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaK90a, author = {Sushil Jajodia and Boris Kogan}, title = {Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture}, booktitle = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990}, pages = {360--368}, publisher = {{IEEE} Computer Society}, year = {1990}, url = {https://doi.org/10.1109/RISP.1990.63864}, doi = {10.1109/RISP.1990.63864}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaK90a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/JajodiaK89, author = {Sushil Jajodia and Won Kim}, title = {From the Issue Editors}, journal = {{IEEE} Data Eng. Bull.}, volume = {12}, number = {1}, pages = {1}, year = {1989}, url = {http://sites.computer.org/debull/89MAR-CD.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/JajodiaK89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/JajodiaM89, author = {Sushil Jajodia and David Mutchler}, title = {A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {1}, number = {4}, pages = {459--469}, year = {1989}, url = {https://doi.org/10.1109/69.43421}, doi = {10.1109/69.43421}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/JajodiaM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JajodiaM89, author = {Sushil Jajodia and David Mutchler}, title = {A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability}, journal = {{IEEE} Trans. Software Eng.}, volume = {15}, number = {1}, pages = {39--46}, year = {1989}, url = {https://doi.org/10.1109/32.21724}, doi = {10.1109/32.21724}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JajodiaM89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JajodiaGBS89, author = {Sushil Jajodia and Shashi K. Gadia and Gautam Bhargava and Edgar H. Sibley}, editor = {David L. Spooner and Carl E. Landwehr}, title = {Audit Trail Organization in Relational Databases}, booktitle = {Database Security, {III:} Status and Prospects. Results of the {IFIP} {WG} 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989}, pages = {269--281}, publisher = {North-Holland}, year = {1989}, timestamp = {Wed, 16 Jul 2014 19:05:09 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JajodiaGBS89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/Jajodia88, author = {Sushil Jajodia}, title = {Letter from the {TC} Chair}, journal = {{IEEE} Data Eng. Bull.}, volume = {11}, number = {2}, pages = {1}, year = {1988}, url = {http://sites.computer.org/debull/88JUN-CD.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/Jajodia88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/JajodiaM88, author = {Sushil Jajodia and David Mutchler}, title = {Integrating Static and Dynamic Voting Protocols To Enhance File Availability}, booktitle = {Proceedings of the Fourth International Conference on Data Engineering, February 1-5, 1988, Los Angeles, California, {USA}}, pages = {144--153}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/ICDE.1988.105456}, doi = {10.1109/ICDE.1988.105456}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/JajodiaM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dpds/1988, editor = {Sushil Jajodia and Won Kim and Abraham Silberschatz}, title = {Proceedings of the International Symposium on Databases in Parallel and Distributed Systems, Austin, Texas, USA, December 5-7, 1988}, publisher = {{IEEE} Computer Society}, year = {1988}, url = {https://doi.org/10.1109/DPDS.1988}, doi = {10.1109/DPDS.1988}, isbn = {0-8186-0893-5}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dpds/1988.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bit/BurgdorffJSZ87, author = {H. A. Burgdorff and Sushil Jajodia and Frederick N. Springsteel and Yechezkel Zalcstein}, title = {Alternative Methods for the Reconstruction of Trees from Their Traversals}, journal = {{BIT}}, volume = {27}, number = {2}, pages = {133--140}, year = {1987}, url = {https://doi.org/10.1007/BF01934177}, doi = {10.1007/BF01934177}, timestamp = {Tue, 22 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bit/BurgdorffJSZ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/Jajodia87, author = {Sushil Jajodia}, title = {Letter from the {TC} Chairman}, journal = {{IEEE} Data Eng. Bull.}, volume = {10}, number = {3}, pages = {1}, year = {1987}, url = {http://sites.computer.org/debull/87SEP-CD.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/Jajodia87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JajodiaS87, author = {Sushil Jajodia and Frederick N. Springsteel}, title = {Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation}, journal = {{IEEE} Trans. Software Eng.}, volume = {13}, number = {7}, pages = {811--819}, year = {1987}, url = {https://doi.org/10.1109/TSE.1987.233492}, doi = {10.1109/TSE.1987.233492}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JajodiaS87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/TripathiHJ87, author = {Satish K. Tripathi and Yennun Huang and Sushil Jajodia}, title = {Local Area Networks: Software and Related Issues}, journal = {{IEEE} Trans. Software Eng.}, volume = {13}, number = {8}, pages = {872--879}, year = {1987}, url = {https://doi.org/10.1109/TSE.1987.233506}, doi = {10.1109/TSE.1987.233506}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/TripathiHJ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/Jajodia87, author = {Sushil Jajodia}, title = {An Extension of "Representative Instances and gamma-Acyclic Relational Schemes"}, journal = {{IEEE} Trans. Software Eng.}, volume = {13}, number = {9}, pages = {1047--1048}, year = {1987}, url = {https://doi.org/10.1109/TSE.1987.233792}, doi = {10.1109/TSE.1987.233792}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/Jajodia87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MeadowsJ87, author = {Catherine Meadows and Sushil Jajodia}, editor = {Carl E. Landwehr}, title = {Integrity Versus Security in Multi-Level Secure Databases}, booktitle = {Database Security: Status and Prospects. Results of the {IFIP} {WG} 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987}, pages = {89--101}, publisher = {North-Holland}, year = {1987}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MeadowsJ87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/JajodiaM87, author = {Sushil Jajodia and Catherine A. Meadows}, title = {Mutual Consistency in Decentralized Distributed Systems}, booktitle = {Proceedings of the Third International Conference on Data Engineering, February 3-5, 1987, Los Angeles, California, {USA}}, pages = {396--404}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/ICDE.1987.7272405}, doi = {10.1109/ICDE.1987.7272405}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/JajodiaM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Jajodia87, author = {Sushil Jajodia}, title = {Managing Replicated Files in Partitioned Distributed Database Systems}, booktitle = {Proceedings of the Third International Conference on Data Engineering, February 3-5, 1987, Los Angeles, California, {USA}}, pages = {412--418}, publisher = {{IEEE} Computer Society}, year = {1987}, url = {https://doi.org/10.1109/ICDE.1987.7272407}, doi = {10.1109/ICDE.1987.7272407}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/Jajodia87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/JajodiaM87, author = {Sushil Jajodia and David Mutchler}, editor = {Umeshwar Dayal and Irving L. Traiger}, title = {Dynamic Voting}, booktitle = {Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, San Francisco, CA, USA, May 27-29, 1987}, pages = {227--238}, publisher = {{ACM} Press}, year = {1987}, url = {https://doi.org/10.1145/38713.38740}, doi = {10.1145/38713.38740}, timestamp = {Mon, 21 Jun 2021 16:00:48 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/JajodiaM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/JajodiaM87, author = {Sushil Jajodia and David Mutchler}, editor = {Peter M. Stocker and William Kent and Peter Hammersley}, title = {Enhancements to the Voting Algorithm}, booktitle = {VLDB'87, Proceedings of 13th International Conference on Very Large Data Bases, September 1-4, 1987, Brighton, England}, pages = {399--406}, publisher = {Morgan Kaufmann}, year = {1987}, url = {http://www.vldb.org/conf/1987/P399.PDF}, timestamp = {Wed, 29 Mar 2017 16:45:24 +0200}, biburl = {https://dblp.org/rec/conf/vldb/JajodiaM87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/Jajodia86, author = {Sushil Jajodia}, title = {Recognizing Multivalued Dependencies in Relation Schemas}, journal = {Comput. J.}, volume = {29}, number = {5}, pages = {458--459}, year = {1986}, url = {https://doi.org/10.1093/comjnl/29.5.458}, doi = {10.1093/COMJNL/29.5.458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/Jajodia86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/debu/Jajodia86, author = {Sushil Jajodia}, title = {Chairman's Message}, journal = {{IEEE} Database Eng. Bull.}, volume = {9}, number = {3}, pages = {1}, year = {1986}, url = {http://sites.computer.org/debull/86SEP-CD.pdf}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/debu/Jajodia86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/Jajodia85, author = {Sushil Jajodia}, title = {On Equivalence of Relational and Network Database Models}, journal = {Inf. Process. Lett.}, volume = {20}, number = {1}, pages = {51--54}, year = {1985}, url = {https://doi.org/10.1016/0020-0190(85)90130-9}, doi = {10.1016/0020-0190(85)90130-9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/Jajodia85.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/JajodiaNY84, author = {Sushil Jajodia and Peter Ann{-}Beng Ng and Raymond T. Yeh}, title = {Introduction to the special issue on the use of entity-relationship concepts in databases and related software}, journal = {J. Syst. Softw.}, volume = {4}, number = {2-3}, pages = {95--98}, year = {1984}, url = {https://doi.org/10.1016/0164-1212(84)90001-3}, doi = {10.1016/0164-1212(84)90001-3}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/JajodiaNY84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/JajodiaN84, author = {Sushil Jajodia and Peter A. Ng}, title = {Translation of entity-relationship diagrams into relational structures}, journal = {J. Syst. Softw.}, volume = {4}, number = {2-3}, pages = {123--133}, year = {1984}, url = {https://doi.org/10.1016/0164-1212(84)90003-7}, doi = {10.1016/0164-1212(84)90003-7}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/JajodiaN84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JajodiaN84, author = {Sushil Jajodia and Peter A. Ng}, title = {Representative Instances and gamma-Acyclic Relational Schemes}, journal = {{IEEE} Trans. Software Eng.}, volume = {10}, number = {6}, pages = {614--618}, year = {1984}, url = {https://doi.org/10.1109/TSE.1984.5010290}, doi = {10.1109/TSE.1984.5010290}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JajodiaN84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fsttcs/Jajodia84, author = {Sushil Jajodia}, editor = {Mathai Joseph and R. K. Shyamasundar}, title = {Universal and Representative Instances Using Unmarked Nulls}, booktitle = {Foundations of Software Technology and Theoretical Computer Science, Fourth Conference, Bangalore, India, December 13-15, 1984, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {181}, pages = {367--378}, publisher = {Springer}, year = {1984}, url = {https://doi.org/10.1007/3-540-13883-8\_83}, doi = {10.1007/3-540-13883-8\_83}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/fsttcs/Jajodia84.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijpp/JajodiaNS83, author = {Sushil Jajodia and Peter A. Ng and Frederick N. Springsteel}, title = {Entity-relationship diagrams which are in {BCNF}}, journal = {Int. J. Parallel Program.}, volume = {12}, number = {4}, pages = {269--283}, year = {1983}, url = {https://doi.org/10.1007/BF00991622}, doi = {10.1007/BF00991622}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijpp/JajodiaNS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JajodiaLN83, author = {Sushil Jajodia and Jian Liu and Peter A. Ng}, title = {A Scheme of Parallel Processing for {MIMD} Systems}, journal = {{IEEE} Trans. Software Eng.}, volume = {9}, number = {4}, pages = {436--445}, year = {1983}, url = {https://doi.org/10.1109/TSE.1983.234780}, doi = {10.1109/TSE.1983.234780}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JajodiaLN83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/JajodiaNS83, author = {Sushil Jajodia and Peter A. Ng and Frederick N. Springsteel}, title = {The Problem of Equivalence for Entity-Relationship Diagrams}, journal = {{IEEE} Trans. Software Eng.}, volume = {9}, number = {5}, pages = {617--630}, year = {1983}, url = {https://doi.org/10.1109/TSE.1983.235262}, doi = {10.1109/TSE.1983.235262}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/JajodiaNS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/JajodiaN83, author = {Sushil Jajodia and Peter A. Ng}, editor = {Carl G. Davis and Sushil Jajodia and Peter A. Ng and Raymond T. Yeh}, title = {On the Representation of Relational Structures by Entity-Relationship Diagrams}, booktitle = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, {USA}}, pages = {249--263}, publisher = {North-Holland}, year = {1983}, timestamp = {Tue, 19 Jun 2018 19:05:56 +0200}, biburl = {https://dblp.org/rec/conf/er/JajodiaN83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/JajodiaNS83, author = {Sushil Jajodia and Peter A. Ng and Frederick N. Springsteel}, editor = {Carl G. Davis and Sushil Jajodia and Peter A. Ng and Raymond T. Yeh}, title = {On Universal and Representative Instances for Inconsistent Databases}, booktitle = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, {USA}}, pages = {279--295}, publisher = {North-Holland}, year = {1983}, timestamp = {Tue, 18 Sep 2012 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/JajodiaNS83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/BlackwellJN83, author = {Paul K. Blackwell and Sushil Jajodia and Peter A. Ng}, editor = {Carl G. Davis and Sushil Jajodia and Peter A. Ng and Raymond T. Yeh}, title = {A View of Database Management Systems as Abstract Data Types}, booktitle = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, {USA}}, pages = {661--668}, publisher = {North-Holland}, year = {1983}, timestamp = {Wed, 29 Mar 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/BlackwellJN83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/er/83, editor = {Carl G. Davis and Sushil Jajodia and Peter A. Ng and Raymond T. Yeh}, title = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, {USA}}, publisher = {North-Holland}, year = {1983}, isbn = {0-444-86777-5}, timestamp = {Tue, 19 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/83.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.