BibTeX records: Sushil Jajodia

download as .bib file

@article{DBLP:journals/compsec/VimercatiFJLPS23,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Distributed query execution under access restrictions},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103056},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103056},
  doi          = {10.1016/J.COSE.2022.103056},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/VimercatiFJPSS23,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati and
                  Roberto Sassi},
  title        = {Sentinels and Twins: Effective Integrity Assessment for Distributed
                  Computation},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {34},
  number       = {1},
  pages        = {108--122},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPDS.2022.3215863},
  doi          = {10.1109/TPDS.2022.3215863},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/VimercatiFJPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsas/WolfsonGJT23,
  author       = {Ouri Wolfson and
                  Prabin Giri and
                  Sushil Jajodia and
                  Goce Trajcevski},
  title        = {Geographic-Region Monitoring by Drones in Adversarial Environments},
  journal      = {{ACM} Trans. Spatial Algorithms Syst.},
  volume       = {9},
  number       = {3},
  pages        = {22:1--22:36},
  year         = {2023},
  url          = {https://doi.org/10.1145/3611009},
  doi          = {10.1145/3611009},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsas/WolfsonGJT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/ShahGJCH23,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam and
                  Steve E. Hutchinson},
  title        = {A Novel Team Formation Framework Based on Performance in a Cybersecurity
                  Operations Center},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {16},
  number       = {4},
  pages        = {2359--2371},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSC.2023.3253307},
  doi          = {10.1109/TSC.2023.3253307},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/ShahGJCH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangWSJWL23,
  author       = {Shu Wang and
                  Xinda Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Haining Wang and
                  Qi Li},
  title        = {GraphSPD: Graph-Based Security Patch Detection with Enriched Code
                  Semantics},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {2409--2426},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179479},
  doi          = {10.1109/SP46215.2023.10179479},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/WangWSJWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ShahGJC22,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Maintaining the level of operational effectiveness of a {CSOC} under
                  adverse conditions},
  journal      = {Int. J. Inf. Sec.},
  volume       = {21},
  number       = {3},
  pages        = {637--651},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10207-021-00573-4},
  doi          = {10.1007/S10207-021-00573-4},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ShahGJC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCWSJ22,
  author       = {Yue Li and
                  Zeyu Chen and
                  Haining Wang and
                  Kun Sun and
                  Sushil Jajodia},
  title        = {Understanding Account Recovery in the Wild and its Security Implications},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {620--634},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.2975789},
  doi          = {10.1109/TDSC.2020.2975789},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCWSJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XiongRGJS22,
  author       = {Yanhai Xiong and
                  Giridhar Ramachandran and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  V. S. Subrahmanian},
  title        = {Generating Realistic Fake Equations in Order to Reduce Intellectual
                  Property Theft},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {3},
  pages        = {1434--1445},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3038132},
  doi          = {10.1109/TDSC.2020.3038132},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/XiongRGJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ChenDJLMS22,
  author       = {Haipeng Chen and
                  Andrew Duncklee and
                  Sushil Jajodia and
                  Rui Liu and
                  Sean R. McNamara and
                  V. S. Subrahmanian},
  title        = {{PCAM:} {A} Data-driven Probabilistic Cyber-alert Management Framework},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {3},
  pages        = {67:1--67:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511101},
  doi          = {10.1145/3511101},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ChenDJLMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/VimercatiFJLPS22,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {An authorization model for query execution in the cloud},
  journal      = {{VLDB} J.},
  volume       = {31},
  number       = {3},
  pages        = {555--579},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00778-021-00709-x},
  doi          = {10.1007/S00778-021-00709-X},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/VimercatiFJLPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/Hyeong0PJ22,
  author       = {Jihyeon Hyeong and
                  Jayoung Kim and
                  Noseong Park and
                  Sushil Jajodia},
  editor       = {Mohammad Al Hasan and
                  Li Xiong},
  title        = {An Empirical Study on the Membership Inference Attack against Tabular
                  Data Synthesis Models},
  booktitle    = {Proceedings of the 31st {ACM} International Conference on Information
                  {\&} Knowledge Management, Atlanta, GA, USA, October 17-21, 2022},
  pages        = {4064--4068},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511808.3557546},
  doi          = {10.1145/3511808.3557546},
  timestamp    = {Wed, 19 Oct 2022 12:52:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/Hyeong0PJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2208-08114,
  author       = {Jihyeon Hyeong and
                  Jayoung Kim and
                  Noseong Park and
                  Sushil Jajodia},
  title        = {An Empirical Study on the Membership Inference Attack against Tabular
                  Data Synthesis Models},
  journal      = {CoRR},
  volume       = {abs/2208.08114},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2208.08114},
  doi          = {10.48550/ARXIV.2208.08114},
  eprinttype    = {arXiv},
  eprint       = {2208.08114},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2208-08114.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/HitajHJM21,
  author       = {Dorjan Hitaj and
                  Briland Hitaj and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  title        = {Capture the Bot: Using Adversarial Examples to Improve {CAPTCHA} Robustness
                  to Bot Attacks},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {36},
  number       = {5},
  pages        = {104--112},
  year         = {2021},
  url          = {https://doi.org/10.1109/MIS.2020.3036156},
  doi          = {10.1109/MIS.2020.3036156},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/HitajHJM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/KarunaPJGU21,
  author       = {Prakruthi Karuna and
                  Hemant Purohit and
                  Sushil Jajodia and
                  Rajesh Ganesan and
                  {\"{O}}zlem Uzuner},
  title        = {Fake Document Generation for Cyber Deception by Manipulating Text
                  Comprehensibility},
  journal      = {{IEEE} Syst. J.},
  volume       = {15},
  number       = {1},
  pages        = {835--845},
  year         = {2021},
  url          = {https://doi.org/10.1109/JSYST.2020.2980177},
  doi          = {10.1109/JSYST.2020.2980177},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sj/KarunaPJGU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhangWJS21,
  author       = {Mengyuan Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Network Attack Surface: Lifting the Concept of Attack Surface to the
                  Network Level for Evaluating Networks' Resilience Against Zero-Day
                  Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {1},
  pages        = {310--324},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2018.2889086},
  doi          = {10.1109/TDSC.2018.2889086},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhangWJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/0002JKPSS21,
  author       = {Tanmoy Chakraborty and
                  Sushil Jajodia and
                  Jonathan Katz and
                  Antonio Picariello and
                  Giancarlo Sperl{\`{\i}} and
                  V. S. Subrahmanian},
  title        = {A Fake Online Repository Generation Engine for Cyber Deception},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {2},
  pages        = {518--533},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2019.2898661},
  doi          = {10.1109/TDSC.2019.2898661},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/0002JKPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS21,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Distributed Query Evaluation over Encrypted Data},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {96--114},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_6},
  doi          = {10.1007/978-3-030-81242-3\_6},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/WangWF0J21,
  author       = {Xinda Wang and
                  Shu Wang and
                  Pengbin Feng and
                  Kun Sun and
                  Sushil Jajodia},
  title        = {PatchDB: {A} Large-Scale Security Patch Dataset},
  booktitle    = {51st Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2021, Taipei, Taiwan, June 21-24, 2021},
  pages        = {149--160},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSN48987.2021.00030},
  doi          = {10.1109/DSN48987.2021.00030},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/WangWF0J21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/WolfsonGJT21,
  author       = {Ouri Wolfson and
                  Prabin Giri and
                  Sushil Jajodia and
                  Goce Trajcevski},
  editor       = {Xiaofeng Meng and
                  Fusheng Wang and
                  Chang{-}Tien Lu and
                  Yan Huang and
                  Shashi Shekhar and
                  Xing Xie},
  title        = {Geographic-Region Monitoring by Drones in Adversarial Environments},
  booktitle    = {{SIGSPATIAL} '21: 29th International Conference on Advances in Geographic
                  Information Systems, Virtual Event / Beijing, China, November 2-5,
                  2021},
  pages        = {480--483},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474717.3484216},
  doi          = {10.1145/3474717.3484216},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/gis/WolfsonGJT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WangWFSJBG21,
  author       = {Xinda Wang and
                  Shu Wang and
                  Pengbin Feng and
                  Kun Sun and
                  Sushil Jajodia and
                  Sanae Benchaaboun and
                  Frank Geck},
  title        = {PatchRNN: {A} Deep Learning-Based System for Security Patch Identification},
  booktitle    = {2021 {IEEE} Military Communications Conference, {MILCOM} 2021, San
                  Diego, CA, USA, November 29 - Dec. 2, 2021},
  pages        = {595--600},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/MILCOM52596.2021.9652940},
  doi          = {10.1109/MILCOM52596.2021.9652940},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/milcom/WangWFSJBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/JeonLKLPLUJ21,
  author       = {Jinsung Jeon and
                  Jing Liu and
                  Jayoung Kim and
                  Jaehoon Lee and
                  Noseong Park and
                  Jamie Jooyeon Lee and
                  {\"{O}}zlem Uzuner and
                  Sushil Jajodia},
  editor       = {Carlotta Demeniconi and
                  Ian Davidson},
  title        = {Scalable Graph Synthesis with Adj and 1 - Adj},
  booktitle    = {Proceedings of the 2021 {SIAM} International Conference on Data Mining,
                  {SDM} 2021, Virtual Event, April 29 - May 1, 2021},
  pages        = {307--315},
  publisher    = {{SIAM}},
  year         = {2021},
  url          = {https://doi.org/10.1137/1.9781611976700.35},
  doi          = {10.1137/1.9781611976700.35},
  timestamp    = {Mon, 17 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdm/JeonLKLPLUJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2108-03358,
  author       = {Xinda Wang and
                  Shu Wang and
                  Pengbin Feng and
                  Kun Sun and
                  Sushil Jajodia and
                  Sanae Benchaaboun and
                  Frank Geck},
  title        = {PatchRNN: {A} Deep Learning-Based System for Security Patch Identification},
  journal      = {CoRR},
  volume       = {abs/2108.03358},
  year         = {2021},
  url          = {https://arxiv.org/abs/2108.03358},
  eprinttype    = {arXiv},
  eprint       = {2108.03358},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-03358.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ChenHJLSX20,
  author       = {Haipeng Chen and
                  Qian Han and
                  Sushil Jajodia and
                  Roy Lindelauf and
                  V. S. Subrahmanian and
                  Yanhai Xiong},
  title        = {Disclose or Exploit? {A} Game-Theoretic Approach to Strategic Decision
                  Making in Cyber-Warfare},
  journal      = {{IEEE} Syst. J.},
  volume       = {14},
  number       = {3},
  pages        = {3779--3790},
  year         = {2020},
  url          = {https://doi.org/10.1109/JSYST.2020.2964985},
  doi          = {10.1109/JSYST.2020.2964985},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ChenHJLSX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangXHWZJ20,
  author       = {Yubao Zhang and
                  Jidong Xiao and
                  Shuai Hao and
                  Haining Wang and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Understanding the Manipulation on Recommender Systems through Web
                  Injection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {3807--3818},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2954737},
  doi          = {10.1109/TIFS.2019.2954737},
  timestamp    = {Mon, 10 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangXHWZJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/ShahSGJC20,
  author       = {Ankit Shah and
                  Arunesh Sinha and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert
                  Inspection System},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {11},
  number       = {3},
  pages        = {32:1--32:20},
  year         = {2020},
  url          = {https://doi.org/10.1145/3377554},
  doi          = {10.1145/3377554},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/ShahSGJC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/ShahGJSC20,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Hasan Cam},
  title        = {Adaptive Alert Management for Balancing Optimal Performance among
                  Distributed CSOCs using Reinforcement Learning},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {31},
  number       = {1},
  pages        = {16--33},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPDS.2019.2927977},
  doi          = {10.1109/TPDS.2019.2927977},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/ShahGJSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/ShahGJC20,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {An Outsourcing Model for Alert Analysis in a Cybersecurity Operations
                  Center},
  journal      = {{ACM} Trans. Web},
  volume       = {14},
  number       = {1},
  pages        = {2:1--2:22},
  year         = {2020},
  url          = {https://doi.org/10.1145/3372498},
  doi          = {10.1145/3372498},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/ShahGJC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/WangW0BJ20,
  author       = {Xinda Wang and
                  Shu Wang and
                  Kun Sun and
                  Archer L. Batcheller and
                  Sushil Jajodia},
  title        = {A Machine Learning Approach to Classify Security Patches into Vulnerability
                  Types},
  booktitle    = {8th {IEEE} Conference on Communications and Network Security, {CNS}
                  2020, Avignon, France, June 29 - July 1, 2020},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CNS48642.2020.9162237},
  doi          = {10.1109/CNS48642.2020.9162237},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/WangW0BJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Alhebaishi0J20,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Anoop Singhal and
                  Jaideep Vaidya},
  title        = {Modeling and Mitigating Security Threats in Network Functions Virtualization
                  {(NFV)}},
  booktitle    = {Data and Applications Security and Privacy {XXXIV} - 34th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25-26,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12122},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-49669-2\_1},
  doi          = {10.1007/978-3-030-49669-2\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Alhebaishi0J20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/20/Wang0BJ20,
  author       = {Xinda Wang and
                  Kun Sun and
                  Archer L. Batcheller and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {An Empirical Study of Secret Security Patch in Open Source Software},
  booktitle    = {Adaptive Autonomous Secure Cyber Systems},
  pages        = {269--289},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1\_13},
  doi          = {10.1007/978-3-030-33432-1\_13},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/Wang0BJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/20/JCSS2020,
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adaptive Autonomous Secure Cyber Systems},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-33432-1},
  doi          = {10.1007/978-3-030-33432-1},
  isbn         = {978-3-030-33431-4},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/20/JCSS2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-16204,
  author       = {Dorjan Hitaj and
                  Briland Hitaj and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  title        = {Capture the Bot: Using Adversarial Examples to Improve {CAPTCHA} Robustness
                  to Bot Attacks},
  journal      = {CoRR},
  volume       = {abs/2010.16204},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.16204},
  eprinttype    = {arXiv},
  eprint       = {2010.16204},
  timestamp    = {Tue, 03 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-16204.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/BorborWJS19,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Optimizing the network diversity to improve the resilience of networks
                  against unknown attacks},
  journal      = {Comput. Commun.},
  volume       = {145},
  pages        = {96--112},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.comcom.2019.06.004},
  doi          = {10.1016/J.COMCOM.2019.06.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/BorborWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ShahGJ19,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  title        = {A methodology for ensuring fair allocation of {CSOC} effort for alert
                  investigation},
  journal      = {Int. J. Inf. Sec.},
  volume       = {18},
  number       = {2},
  pages        = {199--218},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10207-018-0407-3},
  doi          = {10.1007/S10207-018-0407-3},
  timestamp    = {Tue, 21 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ShahGJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AlhebaishiWJS19,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Mitigating the insider threat of remote administrators in clouds through
                  maintenance task assignments},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {427--458},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191306},
  doi          = {10.3233/JCS-191306},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AlhebaishiWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ShahGJC19,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations
                  Center},
  journal      = {{IEEE} Syst. J.},
  volume       = {13},
  number       = {1},
  pages        = {1060--1071},
  year         = {2019},
  url          = {https://doi.org/10.1109/JSYST.2018.2809506},
  doi          = {10.1109/JSYST.2018.2809506},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ShahGJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShahGJC19,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert
                  Analysis in a {CSOC}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {5},
  pages        = {1155--1170},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2871744},
  doi          = {10.1109/TIFS.2018.2871744},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShahGJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ShahGJC19a,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {A Two-Step Approach to Optimal Selection of Alerts for Investigation
                  in a {CSOC}},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {7},
  pages        = {1857--1870},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2018.2886465},
  doi          = {10.1109/TIFS.2018.2886465},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ShahGJC19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangXWJS19,
  author       = {Mengyuan Zhang and
                  Yue Xin and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Simon N. Foley},
  title        = {CASFinder: Detecting Common Attack Surface},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {338--358},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_18},
  doi          = {10.1007/978-3-030-22479-0\_18},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangXWJS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/Wang0BJ19,
  author       = {Xinda Wang and
                  Kun Sun and
                  Archer L. Batcheller and
                  Sushil Jajodia},
  title        = {Detecting "0-Day" Vulnerability: An Empirical Study of Secret
                  Security Patch in {OSS}},
  booktitle    = {49th Annual {IEEE/IFIP} International Conference on Dependable Systems
                  and Networks, {DSN} 2019, Portland, OR, USA, June 24-27, 2019},
  pages        = {485--492},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/DSN.2019.00056},
  doi          = {10.1109/DSN.2019.00056},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/Wang0BJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcai/ChenJLPSS19,
  author       = {Haipeng Chen and
                  Sushil Jajodia and
                  Jing Liu and
                  Noseong Park and
                  Vadim Sokolov and
                  V. S. Subrahmanian},
  editor       = {Sarit Kraus},
  title        = {FakeTables: Using GANs to Generate Functional Dependency Preserving
                  Tables with Bounded Real Data},
  booktitle    = {Proceedings of the Twenty-Eighth International Joint Conference on
                  Artificial Intelligence, {IJCAI} 2019, Macao, China, August 10-16,
                  2019},
  pages        = {2074--2080},
  publisher    = {ijcai.org},
  year         = {2019},
  url          = {https://doi.org/10.24963/ijcai.2019/287},
  doi          = {10.24963/IJCAI.2019/287},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ijcai/ChenJLPSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/0003HXZEJ019,
  author       = {Ping Chen and
                  Zhisheng Hu and
                  Jun Xu and
                  Minghui Zhu and
                  Rob Erbacher and
                  Sushil Jajodia and
                  Peng Liu},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {{MTD} Techniques for Memory Protection Against Zero-Day Attacks},
  booktitle    = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  pages        = {129--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6\_7},
  doi          = {10.1007/978-3-030-30719-6\_7},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/0003HXZEJ019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AlbaneseJVCN19,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Sridhar Venkatesan and
                  George Cybenko and
                  Thanh Hong Nguyen},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adaptive Cyber Defenses for Botnet Detection and Mitigation},
  booktitle    = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  pages        = {156--205},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6\_8},
  doi          = {10.1007/978-3-030-30719-6\_8},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/AlbaneseJVCN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/GanesanSJC19,
  author       = {Rajesh Ganesan and
                  Ankit Shah and
                  Sushil Jajodia and
                  Hasan Cam},
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Optimizing Alert Data Management Processes at a Cyber Security Operations
                  Center},
  booktitle    = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  pages        = {206--231},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6\_9},
  doi          = {10.1007/978-3-030-30719-6\_9},
  timestamp    = {Tue, 21 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/GanesanSJC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/11830,
  editor       = {Sushil Jajodia and
                  George Cybenko and
                  Peng Liu and
                  Cliff Wang and
                  Michael P. Wellman},
  title        = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense - Control-
                  and Game-Theoretic Approaches to Cyber Security},
  series       = {Lecture Notes in Computer Science},
  volume       = {11830},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30719-6},
  doi          = {10.1007/978-3-030-30719-6},
  isbn         = {978-3-030-30718-9},
  timestamp    = {Mon, 23 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/11830.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/expert/KarunaPGJ18,
  author       = {Prakruthi Karuna and
                  Hemant Purohit and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  title        = {Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception},
  journal      = {{IEEE} Intell. Syst.},
  volume       = {33},
  number       = {5},
  pages        = {16--25},
  year         = {2018},
  url          = {https://doi.org/10.1109/MIS.2018.2877277},
  doi          = {10.1109/MIS.2018.2877277},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/expert/KarunaPGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/AlbaneseJV18,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Sridhar Venkatesan},
  title        = {Defending from Stealthy Botnets Using Moving Target Defenses},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {16},
  number       = {1},
  pages        = {92--97},
  year         = {2018},
  url          = {https://doi.org/10.1109/MSP.2018.1331034},
  doi          = {10.1109/MSP.2018.1331034},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/AlbaneseJV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ShahGJC18,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {A methodology to measure and monitor level of operational effectiveness
                  of a {CSOC}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {121--134},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0365-1},
  doi          = {10.1007/S10207-017-0365-1},
  timestamp    = {Tue, 21 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/ShahGJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ChakrabortyJPPS18,
  author       = {Tanmoy Chakraborty and
                  Sushil Jajodia and
                  Noseong Park and
                  Andrea Pugliese and
                  Edoardo Serra and
                  V. S. Subrahmanian},
  title        = {Hybrid adversarial defense: Merging honeypots and traditional security
                  methods},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {5},
  pages        = {615--645},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171094},
  doi          = {10.3233/JCS-171094},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ChakrabortyJPPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BorborWJS18,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Surviving unpatchable vulnerabilities through heterogeneous network
                  hardening options},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {6},
  pages        = {761--789},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-171106},
  doi          = {10.3233/JCS-171106},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BorborWJS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/ParkMGJPK18,
  author       = {Noseong Park and
                  Mahmoud Mohammadi and
                  Kshitij Gorde and
                  Sushil Jajodia and
                  Hongkyu Park and
                  Youngmin Kim},
  title        = {Data Synthesis based on Generative Adversarial Networks},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {11},
  number       = {10},
  pages        = {1071--1083},
  year         = {2018},
  url          = {http://www.vldb.org/pvldb/vol11/p1071-park.pdf},
  doi          = {10.14778/3231751.3231757},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/ParkMGJPK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/soca/ShahGJC18,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Adaptive reallocation of cybersecurity analysts to sensors for balancing
                  risk between sensors},
  journal      = {Serv. Oriented Comput. Appl.},
  volume       = {12},
  number       = {2},
  pages        = {123--135},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11761-018-0235-3},
  doi          = {10.1007/S11761-018-0235-3},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/soca/ShahGJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangZSLHJ18,
  author       = {Ning Zhang and
                  Ruide Zhang and
                  Kun Sun and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Sushil Jajodia},
  title        = {Memory Forensic Challenges Under Misused Architectural Features},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {9},
  pages        = {2345--2358},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2819119},
  doi          = {10.1109/TIFS.2018.2819119},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangZSLHJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/FarrisSCGJ18,
  author       = {Katheryn A. Farris and
                  Ankit Shah and
                  George Cybenko and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  title        = {{VULCON:} {A} System for Vulnerability Prioritization, Mitigation,
                  and Management},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {21},
  number       = {4},
  pages        = {16:1--16:28},
  year         = {2018},
  url          = {https://doi.org/10.1145/3196884},
  doi          = {10.1145/3196884},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/FarrisSCGJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/ShahGJC18,
  author       = {Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Dynamic Optimization of the Level of Operational Effectiveness of
                  a {CSOC} Under Adverse Conditions},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {9},
  number       = {5},
  pages        = {51:1--51:20},
  year         = {2018},
  url          = {https://doi.org/10.1145/3173457},
  doi          = {10.1145/3173457},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/ShahGJC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/JajodiaPSS17,
  author       = {Sushil Jajodia and
                  Noseong Park and
                  Edoardo Serra and
                  V. S. Subrahmanian},
  title        = {{SHARE:} {A} Stackelberg Honey-Based Adversarial Reasoning Engine},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {18},
  number       = {3},
  pages        = {30:1--30:41},
  year         = {2018},
  url          = {https://doi.org/10.1145/3137571},
  doi          = {10.1145/3137571},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/JajodiaPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Alhebaishi0JS18,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Modeling and Mitigating the Insider Threat of Remote Administrators
                  in Clouds},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_1},
  doi          = {10.1007/978-3-319-95729-6\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Alhebaishi0JS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/BettiniWJ18,
  author       = {Claudio Bettini and
                  X. Sean Wang and
                  Sushil Jajodia},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Temporal Granularity},
  booktitle    = {Encyclopedia of Database Systems, Second Edition},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-1-4614-8265-9\_397},
  doi          = {10.1007/978-1-4614-8265-9\_397},
  timestamp    = {Thu, 14 Feb 2019 09:43:36 +0100},
  biburl       = {https://dblp.org/rec/reference/db/BettiniWJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1806-03384,
  author       = {Noseong Park and
                  Mahmoud Mohammadi and
                  Kshitij Gorde and
                  Sushil Jajodia and
                  Hongkyu Park and
                  Youngmin Kim},
  title        = {Data Synthesis based on Generative Adversarial Networks},
  journal      = {CoRR},
  volume       = {abs/1806.03384},
  year         = {2018},
  url          = {http://arxiv.org/abs/1806.03384},
  eprinttype    = {arXiv},
  eprint       = {1806.03384},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1806-03384.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-05921,
  author       = {Ankit Shah and
                  Arunesh Sinha and
                  Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert
                  Inspection System},
  journal      = {CoRR},
  volume       = {abs/1810.05921},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.05921},
  eprinttype    = {arXiv},
  eprint       = {1810.05921},
  timestamp    = {Tue, 21 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-05921.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WangJS17,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Network Security Metrics},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66505-4},
  doi          = {10.1007/978-3-319-66505-4},
  isbn         = {978-3-319-66504-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WangJS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/VimercatiFJLPS17,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {An Authorization Model for Multi-Provider Queries},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {11},
  number       = {3},
  pages        = {256--268},
  year         = {2017},
  url          = {http://www.vldb.org/pvldb/vol11/p256-vimercati.pdf},
  doi          = {10.14778/3157794.3157796},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/VimercatiFJLPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JajodiaPPPSSS17,
  author       = {Sushil Jajodia and
                  Noseong Park and
                  Fabio Pierazzi and
                  Andrea Pugliese and
                  Edoardo Serra and
                  Gerardo I. Simari and
                  V. S. Subrahmanian},
  title        = {A Probabilistic Logic of Cyber Deception},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {11},
  pages        = {2532--2544},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2710945},
  doi          = {10.1109/TIFS.2017.2710945},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tifs/JajodiaPPPSSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/GanesanJC17,
  author       = {Rajesh Ganesan and
                  Sushil Jajodia and
                  Hasan Cam},
  title        = {Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {8},
  number       = {4},
  pages        = {52:1--52:32},
  year         = {2017},
  url          = {https://doi.org/10.1145/2914795},
  doi          = {10.1145/2914795},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/GanesanJC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VenkatesanASGJ17,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Ankit Shah and
                  Rajesh Ganesan and
                  Sushil Jajodia},
  editor       = {Hamed Okhravi and
                  Xinming Ou},
  title        = {Detecting Stealthy Botnets in a Resource-Constrained Environment using
                  Reinforcement Learning},
  booktitle    = {Proceedings of the 2017 Workshop on Moving Target Defense, MTD@CCS
                  2017, Dallas, TX, USA, October 30, 2017},
  pages        = {75--85},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140549.3140552},
  doi          = {10.1145/3140549.3140552},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VenkatesanASGJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Borbor0JS17,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Securing Networks Against Unpatchable and Unknown Vulnerabilities
                  Using Heterogeneous Hardening Options},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {509--528},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_28},
  doi          = {10.1007/978-3-319-61176-1\_28},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/Borbor0JS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/AlbaneseCCHHJ0MNRSWY17,
  author       = {Massimiliano Albanese and
                  Nancy J. Cooke and
                  Gonz{\'{a}}lez Coty and
                  David Hall and
                  Christopher G. Healey and
                  Sushil Jajodia and
                  Peng Liu and
                  Michael D. McNeese and
                  Peng Ning and
                  Douglas S. Reeves and
                  V. S. Subrahmanian and
                  Cliff Wang and
                  John Yen},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Computer-Aided Human Centric Cyber Situation Awareness},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {3--25},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_1},
  doi          = {10.1007/978-3-319-61152-5\_1},
  timestamp    = {Mon, 03 Jan 2022 21:52:37 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/AlbaneseCCHHJ0MNRSWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/JajodiaA17,
  author       = {Sushil Jajodia and
                  Massimiliano Albanese},
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {An Integrated Framework for Cyber Situation Awareness},
  booktitle    = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5\_2},
  doi          = {10.1007/978-3-319-61152-5\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/lncs/JajodiaA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/10030,
  editor       = {Peng Liu and
                  Sushil Jajodia and
                  Cliff Wang},
  title        = {Theory and Models for Cyber Situation Awareness},
  series       = {Lecture Notes in Computer Science},
  volume       = {10030},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61152-5},
  doi          = {10.1007/978-3-319-61152-5},
  isbn         = {978-3-319-61151-8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/lncs/10030.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VimercatiFJPS16,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Efficient integrity checks for join queries in the cloud},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {347--378},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160545},
  doi          = {10.3233/JCS-160545},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VimercatiFJPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LeKAJ16,
  author       = {Meixing Le and
                  Krishna Kant and
                  Malek Athamnah and
                  Sushil Jajodia},
  title        = {Minimum cost rule enforcement for cooperative database access},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {379--403},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160548},
  doi          = {10.3233/JCS-160548},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LeKAJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JajodiaPSS16,
  author       = {Sushil Jajodia and
                  Noseong Park and
                  Edoardo Serra and
                  V. S. Subrahmanian},
  title        = {Using temporal probabilistic logic for optimal monitoring of security
                  events with limited resources},
  journal      = {J. Comput. Secur.},
  volume       = {24},
  number       = {6},
  pages        = {735--791},
  year         = {2016},
  url          = {https://doi.org/10.3233/JCS-160555},
  doi          = {10.3233/JCS-160555},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JajodiaPSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/MontuschiMCCRDE16,
  author       = {Paolo Montuschi and
                  Edward J. McCluskey and
                  Samarjit Chakraborty and
                  Jason Cong and
                  Ram{\'{o}}n M. Rodr{\'{\i}}guez{-}Dagnino and
                  Fred Douglis and
                  Lieven Eeckhout and
                  Gernot Heiser and
                  Sushil Jajodia and
                  Ruby B. Lee and
                  Dinesh Manocha and
                  Tom{\'{a}}s F. Pena and
                  Isabelle Puaut and
                  Hanan Samet and
                  Donatella Sciuto},
  title        = {State of the Journal},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {7},
  pages        = {2014--2018},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2016.2568358},
  doi          = {10.1109/TC.2016.2568358},
  timestamp    = {Thu, 27 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/MontuschiMCCRDE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RuanWWJ16,
  author       = {Xin Ruan and
                  Zhenyu Wu and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Profiling Online Social Behaviors for Compromised Account Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {1},
  pages        = {176--187},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2015.2482465},
  doi          = {10.1109/TIFS.2015.2482465},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RuanWWJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhangWJSA16,
  author       = {Mengyuan Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  title        = {Network Diversity: {A} Security Metric for Evaluating the Resilience
                  of Networks Against Zero-Day Attacks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {1071--1086},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2516916},
  doi          = {10.1109/TIFS.2016.2516916},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhangWJSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/GanesanJSC16,
  author       = {Rajesh Ganesan and
                  Sushil Jajodia and
                  Ankit Shah and
                  Hasan Cam},
  title        = {Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using
                  Reinforcement Learning},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {8},
  number       = {1},
  pages        = {4:1--4:21},
  year         = {2016},
  url          = {https://doi.org/10.1145/2882969},
  doi          = {10.1145/2882969},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tist/GanesanJSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/JajodiaLS16,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  editor       = {James Joshi and
                  George Karypis and
                  Ling Liu and
                  Xiaohua Hu and
                  Ronay Ak and
                  Yinglong Xia and
                  Weijia Xu and
                  Aki{-}Hiro Sato and
                  Sudarsan Rachuri and
                  Lyle H. Ungar and
                  Philip S. Yu and
                  Rama Govindaraju and
                  Toyotaro Suzumura},
  title        = {Trusted cloud {SQL} {DBS} with on-the-fly {AES} decryption/encryption},
  booktitle    = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016),
                  Washington DC, USA, December 5-8, 2016},
  pages        = {3666--3675},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/BigData.2016.7841034},
  doi          = {10.1109/BIGDATA.2016.7841034},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/JajodiaLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VenkatesanACJ16,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  George Cybenko and
                  Sushil Jajodia},
  editor       = {Peng Liu and
                  Cliff Wang},
  title        = {A Moving Target Defense Approach to Disrupting Stealthy Botnets},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Moving Target Defense, MTD@CCS
                  2016, Vienna, Austria, October 24, 2016},
  pages        = {37--46},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2995272.2995280},
  doi          = {10.1145/2995272.2995280},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VenkatesanACJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenkatesanAAJW16,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Kareem Amin and
                  Sushil Jajodia and
                  Mason Wright},
  title        = {A moving target defense approach to mitigate DDoS attacks against
                  proxy-based architectures},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {198--206},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860486},
  doi          = {10.1109/CNS.2016.7860486},
  timestamp    = {Mon, 22 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenkatesanAAJW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BorborWJS16,
  author       = {Daniel Borbor and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Diversifying Network Services Under Cost Constraints for Better Resilience
                  Against Unknown Attacks},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_21},
  doi          = {10.1007/978-3-319-41483-6\_21},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BorborWJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/JajodiaLS16,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {On-the-Fly {AES256} Decryption/Encryption for Trusted Cloud {SQL}
                  {DBS:} Position Statement},
  booktitle    = {27th International Workshop on Database and Expert Systems Applications,
                  {DEXA} 2016 Workshops, Porto, Portugal, September 5-8, 2016},
  pages        = {19--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/DEXA.2016.020},
  doi          = {10.1109/DEXA.2016.020},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/JajodiaLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/AlhebaishiWJS16,
  author       = {Nawaf Alhebaishi and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Lingyu Wang and
                  Nora Cuppens{-}Boulahia and
                  Nadia Tawbi and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Threat Modeling for Cloud Data Center Infrastructures},
  booktitle    = {Foundations and Practice of Security - 9th International Symposium,
                  {FPS} 2016, Qu{\'{e}}bec City, QC, Canada, October 24-25, 2016,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10128},
  pages        = {302--319},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-51966-1\_20},
  doi          = {10.1007/978-3-319-51966-1\_20},
  timestamp    = {Sun, 02 Oct 2022 16:01:32 +0200},
  biburl       = {https://dblp.org/rec/conf/fps/AlhebaishiWJS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/GaspariJMP16,
  author       = {Fabio De Gaspari and
                  Sushil Jajodia and
                  Luigi V. Mancini and
                  Agostino Panico},
  editor       = {Nicholas J. Multari and
                  Anoop Singhal and
                  David O. Manz},
  title        = {{AHEAD:} {A} New Architecture for Active Defense},
  booktitle    = {Proceedings of the 2016 {ACM} Workshop on Automated Decision Making
                  for Active Cyber Defense, SafeConfig@CCS 2016, Vienna, Austria, October
                  24, 2016},
  pages        = {11--16},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994475.2994481},
  doi          = {10.1145/2994475.2994481},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/GaspariJMP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/AlbaneseJJP16,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  R. Jhawa and
                  Vincenzo Piuri},
  title        = {Dependable and Resilient Cloud Computing},
  booktitle    = {2016 {IEEE} Symposium on Service-Oriented System Engineering, {SOSE}
                  2016, Oxford, United Kingdom, March 29 - April 2, 2016},
  pages        = {3},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/SOSE.2016.53},
  doi          = {10.1109/SOSE.2016.53},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sose/AlbaneseJJP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/16/AlbaneseBJ16,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Deceiving Attackers by Creating a Virtual Attack Surface},
  booktitle    = {Cyber Deception, Building the Scientific Foundation},
  pages        = {169--201},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3\_8},
  doi          = {10.1007/978-3-319-32699-3\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/16/AlbaneseBJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/JSSW2016,
  editor       = {Sushil Jajodia and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Deception, Building the Scientific Foundation},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32699-3},
  doi          = {10.1007/978-3-319-32699-3},
  isbn         = {978-3-319-32697-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/JSSW2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2015gramsec,
  editor       = {Sjouke Mauw and
                  Barbara Kordy and
                  Sushil Jajodia},
  title        = {Graphical Models for Security - Second International Workshop, GraMSec
                  2015, Verona, Italy, July 13, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29968-6},
  doi          = {10.1007/978-3-319-29968-6},
  isbn         = {978-3-319-29967-9},
  timestamp    = {Thu, 23 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/2015gramsec.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VimercatiFJLPS15,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Loose associations to increase utility in data publishing},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {59--88},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140513},
  doi          = {10.3233/JCS-140513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VimercatiFJLPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SerraJPRS15,
  author       = {Edoardo Serra and
                  Sushil Jajodia and
                  Andrea Pugliese and
                  Antonino Rullo and
                  V. S. Subrahmanian},
  title        = {Pareto-Optimal Adversarial Defense of Enterprise Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {11:1--11:39},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699907},
  doi          = {10.1145/2699907},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/SerraJPRS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangSLHJ15,
  author       = {Ning Zhang and
                  Kun Sun and
                  Wenjing Lou and
                  Yiwei Thomas Hou and
                  Sushil Jajodia},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Now You See Me: Hide and Seek in Physical Address Space},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {321--331},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714600},
  doi          = {10.1145/2714576.2714600},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangSLHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VenkatesanAJ15,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  title        = {Disrupting stealthy botnets through strategic placement of detectors},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {95--103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346816},
  doi          = {10.1109/CNS.2015.7346816},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VenkatesanAJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJ15,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia},
  title        = {A deception based approach for defeating {OS} and service fingerprinting},
  booktitle    = {2015 {IEEE} Conference on Communications and Network Security, {CNS}
                  2015, Florence, Italy, September 28-30, 2015},
  pages        = {317--325},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CNS.2015.7346842},
  doi          = {10.1109/CNS.2015.7346842},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/JajodiaLS15,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  editor       = {Qiming Chen and
                  Abdelkader Hameurlain and
                  Farouk Toumani and
                  Roland R. Wagner and
                  Hendrik Decker},
  title        = {Numerical {SQL} Value Expressions Over Encrypted Cloud Databases},
  booktitle    = {Database and Expert Systems Applications - 26th International Conference,
                  {DEXA} 2015, Valencia, Spain, September 1-4, 2015, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9262},
  pages        = {455--478},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22852-5\_38},
  doi          = {10.1007/978-3-319-22852-5\_38},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/JajodiaLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VimercatiFJPS15,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Integrity for Approximate Joins on Untrusted Computational Servers},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {446--459},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_30},
  doi          = {10.1007/978-3-319-18467-8\_30},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VimercatiFJPS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2015,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0},
  doi          = {10.1007/978-3-319-26961-0},
  isbn         = {978-3-319-26960-3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wistp/2015,
  editor       = {Raja Naeem Akram and
                  Sushil Jajodia},
  title        = {Information Security Theory and Practice - 9th {IFIP} {WG} 11.2 International
                  Conference, {WISTP} 2015 Heraklion, Crete, Greece, August 24-25, 2015
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9311},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24018-3},
  doi          = {10.1007/978-3-319-24018-3},
  isbn         = {978-3-319-24017-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/56,
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1},
  doi          = {10.1007/978-3-319-14039-1},
  isbn         = {978-3-319-14038-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/56.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/JajodiaLS15,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {On-the fly {AES} Decryption/Encryption for Cloud {SQL} Databases},
  journal      = {CoRR},
  volume       = {abs/1512.06423},
  year         = {2015},
  url          = {http://arxiv.org/abs/1512.06423},
  eprinttype    = {arXiv},
  eprint       = {1512.06423},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/JajodiaLS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/sbcs/WangAJ14,
  author       = {Lingyu Wang and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  title        = {Network Hardening - An Automated Approach to Improving Network Security},
  series       = {Springer Briefs in Computer Science},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04612-9},
  doi          = {10.1007/978-3-319-04612-9},
  isbn         = {978-3-319-04611-2},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/sbcs/WangAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/AlbaneseBJT14,
  author       = {Massimiliano Albanese and
                  Alessandra De Benedictis and
                  Sushil Jajodia and
                  Don J. Torrieri},
  title        = {A probabilistic framework for jammer identification in MANETs},
  journal      = {Ad Hoc Networks},
  volume       = {14},
  pages        = {84--94},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.adhoc.2013.11.007},
  doi          = {10.1016/J.ADHOC.2013.11.007},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/AlbaneseBJT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeKJ14,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  title        = {Consistency and enforcement of access rules in cooperative data sharing
                  environment},
  journal      = {Comput. Secur.},
  volume       = {41},
  pages        = {3--18},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.08.011},
  doi          = {10.1016/J.COSE.2013.08.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangJSCN14,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Pengsu Cheng and
                  Steven Noel},
  title        = {k-Zero Day Safety: {A} Network Security Metric for Measuring the Risk
                  of Unknown Vulnerabilities},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {30--44},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.24},
  doi          = {10.1109/TDSC.2013.24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangJSCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VimercatiFJLPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Fragmentation in Presence of Data Dependencies},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {6},
  pages        = {510--523},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.2295798},
  doi          = {10.1109/TDSC.2013.2295798},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VimercatiFJLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyCSJ14,
  author       = {Sankardas Roy and
                  Mauro Conti and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Secure Data Aggregation in Wireless Sensor Networks: Filtering out
                  the Attacker's Impact},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {4},
  pages        = {681--694},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2307197},
  doi          = {10.1109/TIFS.2014.2307197},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RoyCSJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/JajodiaS14,
  author       = {Sushil Jajodia and
                  Kun Sun},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {{MTD} 2014: First {ACM} Workshop on Moving Target Defense},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {1550--1551},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660385},
  doi          = {10.1145/2660267.2660385},
  timestamp    = {Tue, 10 Nov 2020 20:00:23 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/JajodiaS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/LiZTJ14,
  author       = {Longquan Li and
                  Sencun Zhu and
                  Don J. Torrieri and
                  Sushil Jajodia},
  title        = {Self-healing wireless networks under insider jamming attacks},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {220--228},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997489},
  doi          = {10.1109/CNS.2014.6997489},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/LiZTJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/VimercatiFJLPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Integrity for distributed queries},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {364--372},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997505},
  doi          = {10.1109/CNS.2014.6997505},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/VimercatiFJLPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJC14,
  author       = {Massimiliano Albanese and
                  Ermanno Battista and
                  Sushil Jajodia and
                  Valentina Casola},
  title        = {Manipulating the attacker's view of a system's attack surface},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {472--480},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997517},
  doi          = {10.1109/CNS.2014.6997517},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/NoelJ14,
  author       = {Steven Noel and
                  Sushil Jajodia},
  editor       = {Robert K. Abercrombie and
                  Jeffrey Todd McDonald},
  title        = {Metrics suite for network attack graph analytics},
  booktitle    = {Cyber and Information Security Research Conference, {CISR} '14, Oak
                  Ridge, TN, USA, April 8-10, 2014},
  pages        = {5--8},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2602087.2602117},
  doi          = {10.1145/2602087.2602117},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/NoelJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJPS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Optimizing Integrity Checks for Join Queries in the Cloud},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {33--48},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_3},
  doi          = {10.1007/978-3-662-43936-4\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ14,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Consistent Query Plan Generation in Secure Cooperative Data Access},
  booktitle    = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  pages        = {227--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4\_15},
  doi          = {10.1007/978-3-662-43936-4\_15},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SunSWJJ14,
  author       = {He Sun and
                  Kun Sun and
                  Yuewu Wang and
                  Jiwu Jing and
                  Sushil Jajodia},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {TrustDump: Reliable Memory Acquisition on Smartphones},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8712},
  pages        = {202--218},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11203-9\_12},
  doi          = {10.1007/978-3-319-11203-9\_12},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/SunSWJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangZJSA14,
  author       = {Lingyu Wang and
                  Mengyuan Zhang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Massimiliano Albanese},
  editor       = {Miroslaw Kutylowski and
                  Jaideep Vaidya},
  title        = {Modeling Network Diversity for Evaluating the Robustness of Networks
                  against Zero-Day Attacks},
  booktitle    = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
                  in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8713},
  pages        = {494--511},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11212-1\_28},
  doi          = {10.1007/978-3-319-11212-1\_28},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangZJSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ShakarianKAJ14,
  author       = {Paulo Shakarian and
                  Nimish Kulkarni and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Joaquim Filipe},
  title        = {Keeping Intruders at Bay: {A} Graph-theoretic Approach to Reducing
                  the Probability of Successful Network Intrusions},
  booktitle    = {E-Business and Telecommunications - 11th International Joint Conference,
                  {ICETE} 2014, Vienna, Austria, August 28-30, 2014, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {554},
  pages        = {191--211},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-25915-4\_11},
  doi          = {10.1007/978-3-319-25915-4\_11},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ShakarianKAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/CybenkoJW014,
  author       = {George Cybenko and
                  Sushil Jajodia and
                  Michael P. Wellman and
                  Peng Liu},
  editor       = {Atul Prakash and
                  Rudrapatna K. Shyamasundar},
  title        = {Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building
                  the Scientific Foundation},
  booktitle    = {Information Systems Security - 10th International Conference, {ICISS}
                  2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13841-1\_1},
  doi          = {10.1007/978-3-319-13841-1\_1},
  timestamp    = {Wed, 12 May 2021 16:44:21 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/CybenkoJW014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/SunJ14,
  author       = {Kun Sun and
                  Sushil Jajodia},
  editor       = {Ehab Al{-}Shaer and
                  Krishna Kant},
  title        = {Protecting Enterprise Networks through Attack Surface Expansion},
  booktitle    = {Proceedings of the 2014 Workshop on Cyber Security Analytics, Intelligence
                  and Automation, SafeConfig '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {29--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2665936.2665939},
  doi          = {10.1145/2665936.2665939},
  timestamp    = {Thu, 13 Feb 2020 15:16:46 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/SunJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/ShakarianPAJ14,
  author       = {Paulo Shakarian and
                  Damon Paulo and
                  Massimiliano Albanese and
                  Sushil Jajodia},
  editor       = {Mohammad S. Obaidat and
                  Andreas Holzinger and
                  Pierangela Samarati},
  title        = {Keeping Intruders at Large - {A} Graph-theoretic Approach to Reducing
                  the Probability of Successful Network Intrusions},
  booktitle    = {{SECRYPT} 2014 - Proceedings of the 11th International Conference
                  on Security and Cryptography, Vienna, Austria, 28-30 August, 2014},
  pages        = {19--30},
  publisher    = {SciTePress},
  year         = {2014},
  url          = {https://doi.org/10.5220/0005013800190030},
  doi          = {10.5220/0005013800190030},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/ShakarianPAJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/XuWJ14,
  author       = {Zhang Xu and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Gemini: An Emergency Line of Defense against Phishing Attacks},
  booktitle    = {33rd {IEEE} International Symposium on Reliable Distributed Systems,
                  {SRDS} 2014, Nara, Japan, October 6-9, 2014},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/SRDS.2014.26},
  doi          = {10.1109/SRDS.2014.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/XuWJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/chb/VimercatiFJS14,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Heikki Topi and
                  Allen Tucker},
  title        = {Database Security and Privacy},
  booktitle    = {Computing Handbook, Third Edition: Information Systems and Information
                  Technology},
  pages        = {53: 1--21},
  publisher    = {{CRC} Press},
  year         = {2014},
  timestamp    = {Tue, 17 Jun 2014 13:41:03 +0200},
  biburl       = {https://dblp.org/rec/books/crc/chb/VimercatiFJS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/WangSJJ14,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Proof of Isolation for Cloud Storage},
  booktitle    = {Secure Cloud Computing},
  pages        = {95--121},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_5},
  doi          = {10.1007/978-1-4614-9278-8\_5},
  timestamp    = {Thu, 13 Feb 2020 15:16:45 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/WangSJJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/LeKJ14,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Enabling Collaborative Data Authorization Between Enterprise Clouds},
  booktitle    = {Secure Cloud Computing},
  pages        = {149--169},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_7},
  doi          = {10.1007/978-1-4614-9278-8\_7},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/LeKJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/securecloud14/AlbaneseJJP14,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Ravi Jhawar and
                  Vincenzo Piuri},
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Securing Mission-Centric Operations in the Cloud},
  booktitle    = {Secure Cloud Computing},
  pages        = {239--259},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8\_11},
  doi          = {10.1007/978-1-4614-9278-8\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/securecloud14/AlbaneseJJP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14,
  author       = {Massimiliano Albanese and
                  Robert F. Erbacher and
                  Sushil Jajodia and
                  Cristian Molinaro and
                  Fabio Persia and
                  Antonio Picariello and
                  Giancarlo Sperl{\`{\i}} and
                  V. S. Subrahmanian},
  editor       = {Robinson E. Pino},
  title        = {Recognizing Unexplained Behavior in Network Traffic},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {39--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_3},
  doi          = {10.1007/978-1-4614-7597-2\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseCJ14,
  author       = {Massimiliano Albanese and
                  Hasan {\c{C}}am and
                  Sushil Jajodia},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Automated Cyber Situation Awareness Tools and Models for Improving
                  Analyst Performance},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_3},
  doi          = {10.1007/978-3-319-10374-7\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseJ14,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Formation of Awareness},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_4},
  doi          = {10.1007/978-3-319-11391-3\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/securecloud2014,
  editor       = {Sushil Jajodia and
                  Krishna Kant and
                  Pierangela Samarati and
                  Anoop Singhal and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Secure Cloud Computing},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-9278-8},
  doi          = {10.1007/978-1-4614-9278-8},
  isbn         = {978-1-4614-9277-1},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/securecloud2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2014mtd,
  editor       = {Sushil Jajodia and
                  Kun Sun},
  title        = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
                  {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663474},
  doi          = {10.1145/2663474},
  isbn         = {978-1-4503-3150-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2014mtd.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2014,
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Anas Abou El Kalam and
                  Thierry Sans},
  title        = {{ICT} Systems Security and Privacy Protection - 29th {IFIP} {TC} 11
                  International Conference, {SEC} 2014, Marrakech, Morocco, June 2-4,
                  2014. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55415-5},
  doi          = {10.1007/978-3-642-55415-5},
  isbn         = {978-3-642-55414-8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/ChuGKWJ13,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Aaron Koehl and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Blog or block: Detecting blog bots through behavioral biometrics},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {3},
  pages        = {634--646},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.10.005},
  doi          = {10.1016/J.COMNET.2012.10.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/ChuGKWJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VimercatiFJLPS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Enforcing dynamic write privileges in data outsourcing},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {47--63},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.01.008},
  doi          = {10.1016/J.COSE.2013.01.008},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YangZWYZLJ13,
  author       = {Yan Yang and
                  Yulong Zhang and
                  Alex Hai Wang and
                  Meng Yu and
                  Wanyu Zang and
                  Peng Liu and
                  Sushil Jajodia},
  title        = {Quantitative survivability evaluation of three virtual machine-based
                  server architectures},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {36},
  number       = {2},
  pages        = {781--790},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.jnca.2012.12.006},
  doi          = {10.1016/J.JNCA.2012.12.006},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/YangZWYZLJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JajodiaS13,
  author       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Guest Editorial},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {2},
  pages        = {178},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2013.2245815},
  doi          = {10.1109/JSYST.2013.2245815},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/JajodiaS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/JajodiaS13a,
  author       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Guest Editorial},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {350},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2013.2245816},
  doi          = {10.1109/JSYST.2013.2245816},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/JajodiaS13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/VimercatiFJPS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Integrity for Join Queries in the Cloud},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {1},
  number       = {2},
  pages        = {187--200},
  year         = {2013},
  url          = {https://doi.org/10.1109/TCC.2013.18},
  doi          = {10.1109/TCC.2013.18},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/VimercatiFJPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/telsys/0004ZCPJM13,
  author       = {Lei Zhang and
                  Honggang Zhang and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi Vincenzo Mancini},
  title        = {Preserving privacy against external and internal threats in {WSN}
                  data aggregation},
  journal      = {Telecommun. Syst.},
  volume       = {52},
  number       = {4},
  pages        = {2163--2176},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11235-011-9539-8},
  doi          = {10.1007/S11235-011-9539-8},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/telsys/0004ZCPJM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tlsdkcs/JajodiaLS13,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {Recoverable Encryption through a Noised Secret over a Large Cloud},
  journal      = {Trans. Large Scale Data Knowl. Centered Syst.},
  volume       = {9},
  pages        = {42--64},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40069-8\_3},
  doi          = {10.1007/978-3-642-40069-8\_3},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tlsdkcs/JajodiaLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ArdagnaJSS13,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  title        = {Providing Users' Anonymity in Mobile Hybrid Networks},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {12},
  number       = {3},
  pages        = {7:1--7:33},
  year         = {2013},
  url          = {https://doi.org/10.1145/2461321.2461322},
  doi          = {10.1145/2461321.2461322},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ArdagnaJSS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSJJ13,
  author       = {Zhan Wang and
                  Kun Sun and
                  Jiwu Jing and
                  Sushil Jajodia},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {Verification of data redundancy in cloud storage},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {11--18},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484407},
  doi          = {10.1145/2484402.2484407},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangSJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/JajodiaLT13,
  author       = {Sushil Jajodia and
                  Wenjing Lou and
                  Wade Trappe},
  title        = {Welcome message},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682675},
  doi          = {10.1109/CNS.2013.6682675},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/JajodiaLT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlbaneseBJS13,
  author       = {Massimiliano Albanese and
                  Alessandra De Benedictis and
                  Sushil Jajodia and
                  Kun Sun},
  title        = {A moving target defense mechanism for MANETs based on identity virtualization},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {278--286},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682717},
  doi          = {10.1109/CNS.2013.6682717},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlbaneseBJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJLPS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Extending Loose Associations to Multiple Fragments},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_1},
  doi          = {10.1007/978-3-642-39256-6\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJLPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJJ13,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {TerraCheck: Verification of Dedicated Cloud Storage},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_8},
  doi          = {10.1007/978-3-642-39256-6\_8},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ13,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Rule Enforcement with Third Parties in Secure Cooperative Data Access},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {282--288},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_20},
  doi          = {10.1007/978-3-642-39256-6\_20},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlbaneseJJP13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Ravi Jhawar and
                  Vincenzo Piuri},
  title        = {Reliable mission deployment in vulnerable distributed systems},
  booktitle    = {43rd Annual {IEEE/IFIP} Conference on Dependable Systems and Networks
                  Workshop, {DSN} Workshops 2013, Budapest, Hungary, June 24-27, 2013},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/DSNW.2013.6615514},
  doi          = {10.1109/DSNW.2013.6615514},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/AlbaneseJJP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fosad/VimercatiEFJLS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Robert F. Erbacher and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Pierangela Samarati},
  editor       = {Alessandro Aldini and
                  Javier L{\'{o}}pez and
                  Fabio Martinelli},
  title        = {Encryption and Fragmentation for Data Confidentiality in the Cloud},
  booktitle    = {Foundations of Security Analysis and Design {VII} - {FOSAD} 2012/2013
                  Tutorial Lectures},
  series       = {Lecture Notes in Computer Science},
  volume       = {8604},
  pages        = {212--243},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-10082-1\_8},
  doi          = {10.1007/978-3-319-10082-1\_8},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/fosad/VimercatiEFJLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/VimercatiFJPS13,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Chee Yong Chan and
                  Jiaheng Lu and
                  Kjetil N{\o}rv{\aa}g and
                  Egemen Tanin},
  title        = {On information leakage by indexes over data fragments},
  booktitle    = {Workshops Proceedings of the 29th {IEEE} International Conference
                  on Data Engineering, {ICDE} 2013, Brisbane, Australia, April 8-12,
                  2013},
  pages        = {94--98},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICDEW.2013.6547434},
  doi          = {10.1109/ICDEW.2013.6547434},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/VimercatiFJPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/AlbaneseJSW13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Lingyu Wang},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {456},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-44788-8\_19},
  doi          = {10.1007/978-3-662-44788-8\_19},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/AlbaneseJSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/WangWSJ13,
  author       = {Li Wang and
                  Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia},
  editor       = {Joe Senftle and
                  Mike Beltrani and
                  Kari Karwedsky},
  title        = {Reducing Attack Surface with VM-Based Phantom Server},
  booktitle    = {32th {IEEE} Military Communications Conference, {MILCOM} 2013, San
                  Diego, CA, USA, November 18-20, 2013},
  pages        = {1429--1435},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/MILCOM.2013.242},
  doi          = {10.1109/MILCOM.2013.242},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/WangWSJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Jajodia13,
  author       = {Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Security and Privacy of Data in a Cloud},
  booktitle    = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
                  Italy, August 30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8425},
  pages        = {18--22},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-06811-4\_4},
  doi          = {10.1007/978-3-319-06811-4\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/Jajodia13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlbaneseJSW13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Lingyu Wang},
  editor       = {Pierangela Samarati},
  title        = {An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {207--218},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223168/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlbaneseJSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/JajodiaLS13,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {Key Recovery Using Noised Secret Sharing with Discounts over Large
                  Clouds},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {700--707},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.105},
  doi          = {10.1109/SOCIALCOM.2013.105},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/JajodiaLS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/NzoukouWJS13,
  author       = {William Nzoukou and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {A Unified Framework for Measuring a Network's Mean Time-to-Compromise},
  booktitle    = {{IEEE} 32nd Symposium on Reliable Distributed Systems, {SRDS} 2013,
                  Braga, Portugal, 1-3 October 2013},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SRDS.2013.30},
  doi          = {10.1109/SRDS.2013.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/NzoukouWJS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/AlbaneseJM13,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Cristian Molinaro},
  title        = {A Logic Framework for Flexible and Security-Aware Service Composition},
  booktitle    = {2013 {IEEE} 10th International Conference on Ubiquitous Intelligence
                  and Computing and 2013 {IEEE} 10th International Conference on Autonomic
                  and Trusted Computing, {UIC/ATC} 2013, Vietri sul Mare, Sorrento Peninsula,
                  Italy, December 18-21, 2013},
  pages        = {337--346},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/UIC-ATC.2013.11},
  doi          = {10.1109/UIC-ATC.2013.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uic/AlbaneseJM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TorrieriZJ13,
  author       = {Don J. Torrieri and
                  Sencun Zhu and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Cyber Maneuver Against External Adversaries and Compromised Nodes},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_5},
  doi          = {10.1007/978-1-4614-5416-8\_5},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6},
  doi          = {10.1007/978-3-642-40203-6},
  isbn         = {978-3-642-40202-9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/100,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8},
  doi          = {10.1007/978-1-4614-5416-8},
  isbn         = {978-1-4614-5415-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ChuGWJ12,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {Detecting Automation of Twitter Accounts: Are You a Human, Bot, or
                  Cyborg?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {811--824},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.75},
  doi          = {10.1109/TDSC.2012.75},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ChuGWJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/RoyCSJ12,
  author       = {Sankardas Roy and
                  Mauro Conti and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Secure Data Aggregation in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {3},
  pages        = {1040--1052},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2012.2189568},
  doi          = {10.1109/TIFS.2012.2189568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/RoyCSJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tweb/VimercatiFJPPS12,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Giuseppe Psaila and
                  Pierangela Samarati},
  title        = {Integrating trust management and access control in data-intensive
                  Web applications},
  journal      = {{ACM} Trans. Web},
  volume       = {6},
  number       = {2},
  pages        = {6:1--6:43},
  year         = {2012},
  url          = {https://doi.org/10.1145/2180861.2180863},
  doi          = {10.1145/2180861.2180863},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tweb/VimercatiFJPPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cason/JajodiaLS12,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {Securing password recovery through dispersion},
  booktitle    = {Fourth International Conference on Computational Aspects of Social
                  Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012},
  pages        = {228--233},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CASoN.2012.6412407},
  doi          = {10.1109/CASON.2012.6412407},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cason/JajodiaLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/LeKJ12,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {Access rule consistency in cooperative data access environment},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {11--20},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250467},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250467},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/LeKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VimercatiFJL12,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Enforcing Subscription-Based Authorization Policies in Cloud Scenarios},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {314--329},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_24},
  doi          = {10.1007/978-3-642-31540-4\_24},
  timestamp    = {Fri, 27 Dec 2019 21:29:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/VimercatiFJL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/AlbaneseJN12,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Steven Noel},
  editor       = {Robert S. Swarz and
                  Philip Koopman and
                  Michel Cukier},
  title        = {Time-efficient and cost-effective network hardening using attack graphs},
  booktitle    = {{IEEE/IFIP} International Conference on Dependable Systems and Networks,
                  {DSN} 2012, Boston, MA, USA, June 25-28, 2012},
  pages        = {1--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/DSN.2012.6263942},
  doi          = {10.1109/DSN.2012.6263942},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/AlbaneseJN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbaneseBJS12,
  author       = {Massimiliano Albanese and
                  Alessandra De Benedictis and
                  Sushil Jajodia and
                  Paulo Shakarian},
  editor       = {Sara Foresti and
                  Moti Yung and
                  Fabio Martinelli},
  title        = {A Probabilistic Framework for Localization of Attackers in MANETs},
  booktitle    = {Computer Security - {ESORICS} 2012 - 17th European Symposium on Research
                  in Computer Security, Pisa, Italy, September 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7459},
  pages        = {145--162},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33167-1\_9},
  doi          = {10.1007/978-3-642-33167-1\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlbaneseBJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globe/JajodiaLS12,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  editor       = {Abdelkader Hameurlain and
                  Farookh Khadeer Hussain and
                  Franck Morvan and
                  A Min Tjoa},
  title        = {Recoverable Encryption through Noised Secret over a Large Cloud},
  booktitle    = {Data Management in Cloud, Grid and {P2P} Systems - 5th International
                  Conference, Globe 2012, Vienna, Austria, September 5-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7450},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32344-7\_2},
  doi          = {10.1007/978-3-642-32344-7\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globe/JajodiaLS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WangSJJ12,
  author       = {Zhan Wang and
                  Kun Sun and
                  Sushil Jajodia and
                  Jiwu Jing},
  title        = {Disk storage isolation and verification in cloud},
  booktitle    = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim,
                  CA, USA, December 3-7, 2012},
  pages        = {771--776},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/GLOCOM.2012.6503206},
  doi          = {10.1109/GLOCOM.2012.6503206},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/WangSJJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/NatarajanNLJH12,
  author       = {Arun Natarajan and
                  Peng Ning and
                  Yao Liu and
                  Sushil Jajodia and
                  Steve E. Hutchinson},
  editor       = {Albert G. Greenberg and
                  Kazem Sohraby},
  title        = {NSDMiner: Automated discovery of Network Service Dependencies},
  booktitle    = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
                  25-30, 2012},
  pages        = {2507--2515},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/INFCOM.2012.6195642},
  doi          = {10.1109/INFCOM.2012.6195642},
  timestamp    = {Fri, 07 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/NatarajanNLJH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/PeddycordNJ12,
  author       = {Barry W. Peddycord III and
                  Peng Ning and
                  Sushil Jajodia},
  editor       = {Carolyn Rowland},
  title        = {On the Accurate Identification of Network Service Dependencies in
                  Distributed Systems},
  booktitle    = {Strategies, Tools , and Techniques: Proceedings of the 26th Large
                  Installation System Administration Conference, {LISA} 2012, San Diego,
                  CA, USA, December 9-14, 2012},
  pages        = {181--194},
  publisher    = {{USENIX} Association},
  year         = {2012},
  url          = {https://www.usenix.org/conference/lisa12/technical-sessions/presentation/peddycord},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lisa/PeddycordNJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/LeKJ12,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Rule Configuration Checking in Secure Cooperative Data Access},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {135--149},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_8},
  doi          = {10.1007/978-3-319-01433-3\_8},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/LeKJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/VimercatiFJPS12,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Support for Write Privileges on Outsourced Data},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {199--210},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_17},
  doi          = {10.1007/978-3-642-30436-1\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/VimercatiFJPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Jajodia12,
  author       = {Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {A Mission-centric Framework for Cyber Situational Awareness},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/Jajodia12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/MauroMJ12,
  author       = {Alessio Di Mauro and
                  Alessandro Mei and
                  Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Wenjing Lou and
                  Jianying Zhou},
  title        = {Secure File Allocation and Caching in Large-scale Distributed Systems},
  booktitle    = {{SECRYPT} 2012 - Proceedings of the International Conference on Security
                  and Cryptography, Rome, Italy, 24-27 July, 2012, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {182--191},
  publisher    = {SciTePress},
  year         = {2012},
  timestamp    = {Thu, 07 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/MauroMJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/srds/ChengWJS12,
  author       = {Pengsu Cheng and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal},
  title        = {Aggregating {CVSS} Base Scores for Semantics-Rich Network Security
                  Metrics},
  booktitle    = {{IEEE} 31st Symposium on Reliable Distributed Systems, {SRDS} 2012,
                  Irvine, CA, USA, October 8-11, 2012},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/SRDS.2012.4},
  doi          = {10.1109/SRDS.2012.4},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/srds/ChengWJS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/NazzicariASJ12,
  author       = {Nelson Nazzicari and
                  Javier Almillategui and
                  Angelos Stavrou and
                  Sushil Jajodia},
  editor       = {Audun J{\o}sang and
                  Pierangela Samarati and
                  Marinella Petrocchi},
  title        = {Switchwall: Automated Topology Fingerprinting and Behavior Deviation
                  Identification},
  booktitle    = {Security and Trust Management - 8th International Workshop, {STM}
                  2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7783},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38004-4\_11},
  doi          = {10.1007/978-3-642-38004-4\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/NazzicariASJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/LocastoGJS11,
  author       = {Michael E. Locasto and
                  Anup K. Ghosh and
                  Sushil Jajodia and
                  Angelos Stavrou},
  title        = {The ephemeral legion: producing an expert cyber-security work force
                  from thin air},
  journal      = {Commun. {ACM}},
  volume       = {54},
  number       = {1},
  pages        = {129--131},
  year         = {2011},
  url          = {https://doi.org/10.1145/1866739.1866764},
  doi          = {10.1145/1866739.1866764},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/LocastoGJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/JajodiaZ11,
  author       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Message from the Guest Editors},
  journal      = {Int. J. Inf. Sec.},
  volume       = {10},
  number       = {5},
  pages        = {267--268},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10207-011-0131-8},
  doi          = {10.1007/S10207-011-0131-8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/JajodiaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CirianiVFJPS11,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Selective data outsourcing for enforcing privacy},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {531--566},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0422},
  doi          = {10.3233/JCS-2011-0422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/CirianiVFJPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VimercatiFJPS11,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Authorization enforcement in distributed query evaluation},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {4},
  pages        = {751--794},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0413},
  doi          = {10.3233/JCS-2010-0413},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VimercatiFJPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/GabrielliMSJ11,
  author       = {Andrea Gabrielli and
                  Luigi V. Mancini and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Securing Topology Maintenance Protocols for Sensor Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {3},
  pages        = {450--465},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2009.46},
  doi          = {10.1109/TDSC.2009.46},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/GabrielliMSJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/MascettiFBWJ11,
  author       = {Sergio Mascetti and
                  Dario Freni and
                  Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Privacy in geo-social networks: proximity notification with untrusted
                  service providers and curious buddies},
  journal      = {{VLDB} J.},
  volume       = {20},
  number       = {4},
  pages        = {541--566},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00778-010-0213-7},
  doi          = {10.1007/S00778-010-0213-7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/MascettiFBWJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisim/AlbaneseJPS11,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Andrea Pugliese and
                  V. S. Subrahmanian},
  editor       = {Nabendu Chaki and
                  Agostino Cortesi},
  title        = {Scalable Detection of Cyber Attacks},
  booktitle    = {Computer Information Systems - Analysis and Technologies - 10th International
                  Conference, {CISIM} 2011, Kolkata, India, December 14-16, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {245},
  pages        = {9--18},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27245-5\_4},
  doi          = {10.1007/978-3-642-27245-5\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisim/AlbaneseJPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LeKJ11,
  author       = {Meixing Le and
                  Krishna Kant and
                  Sushil Jajodia},
  editor       = {Yingjiu Li},
  title        = {Cooperative Data Access in Multi-cloud Environments},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {14--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_4},
  doi          = {10.1007/978-3-642-22348-8\_4},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/LeKJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AlbaneseJPS11,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia and
                  Andrea Pugliese and
                  V. S. Subrahmanian},
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Scalable Analysis of Attack Scenarios},
  booktitle    = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  pages        = {416--433},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2\_23},
  doi          = {10.1007/978-3-642-23822-2\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AlbaneseJPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/SunJLCTS11,
  author       = {Kun Sun and
                  Sushil Jajodia and
                  Jason H. Li and
                  Yi Cheng and
                  Wei Tang and
                  Anoop Singhal},
  title        = {Automatic security analysis using security metrics},
  booktitle    = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore,
                  MD, USA, November 7-10, 2011},
  pages        = {1207--1212},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/MILCOM.2011.6127465},
  doi          = {10.1109/MILCOM.2011.6127465},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/SunJLCTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/JajodiaNKAW11,
  author       = {Sushil Jajodia and
                  Steven Noel and
                  Pramod Kalapa and
                  Massimiliano Albanese and
                  John Williams},
  title        = {Cauldron mission-centric cyber situational awareness with defense
                  in depth},
  booktitle    = {{MILCOM} 2011 - 2011 {IEEE} Military Communications Conference, Baltimore,
                  MD, USA, November 7-10, 2011},
  pages        = {1339--1344},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/MILCOM.2011.6127490},
  doi          = {10.1109/MILCOM.2011.6127490},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/JajodiaNKAW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/KantLJ11,
  author       = {Krishna Kant and
                  Meixing Le and
                  Sushil Jajodia},
  editor       = {John Banghart and
                  Ehab Al{-}Shaer and
                  Tony Sager and
                  HariGovind V. Ramasamy},
  title        = {Security Considerations in Data Center Configuration Management},
  booktitle    = {4th Symposium on Configuration Analytics and Automation, SafeConfig
                  2011, Arlington, VA, USA, October 31 - November 1, 2011},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/SafeConfig.2011.6111676},
  doi          = {10.1109/SAFECONFIG.2011.6111676},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/safeconfig/KantLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LeWJSGJ11,
  author       = {Meixing Le and
                  Zhaohui Wang and
                  Quan Jia and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Muttukrishnan Rajarajan and
                  Fred Piper and
                  Haining Wang and
                  George Kesidis},
  title        = {Trading Elephants for Ants: Efficient Post-attack Reconstitution},
  booktitle    = {Security and Privacy in Communication Networks - 7th International
                  {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {96},
  pages        = {460--469},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31909-9\_27},
  doi          = {10.1007/978-3-642-31909-9\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LeWJSGJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/VimercatiFJPS11,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Private data indexes for selective access to outsourced data},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {69--80},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046566},
  doi          = {10.1145/2046556.2046566},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/VimercatiFJPS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/LitwinJS11,
  author       = {Witold Litwin and
                  Sushil Jajodia and
                  Thomas J. E. Schwarz},
  editor       = {Yan Chen and
                  Jaideep Vaidya},
  title        = {Privacy of data outsourced to a cloud for selected readers through
                  client-side encryption},
  booktitle    = {Proceedings of the 10th annual {ACM} workshop on Privacy in the electronic
                  society, {WPES} 2011, Chicago, IL, USA, October 17, 2011},
  pages        = {171--176},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/2046556.2046580},
  doi          = {10.1145/2046556.2046580},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/LitwinJS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2011,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1},
  doi          = {10.1007/978-3-642-25560-1},
  isbn         = {978-3-642-25559-5},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/crypt/2011,
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Encyclopedia of Cryptography and Security, 2nd Ed},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5},
  doi          = {10.1007/978-1-4419-5906-5},
  isbn         = {978-1-4419-5905-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/54,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9},
  doi          = {10.1007/978-1-4614-0977-9},
  isbn         = {978-1-4614-0976-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/54.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArdagnaVFGJS10,
  author       = {Claudio A. Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Tyrone Grandison and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Access control for smarter healthcare using policy spaces},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {848--858},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.07.001},
  doi          = {10.1016/J.COSE.2010.07.001},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ArdagnaVFGJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijngc/NoelWSJ10,
  author       = {Steven Noel and
                  Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  title        = {Measuring Security Risk of Networks Using Attack Graphs},
  journal      = {Int. J. Next Gener. Comput.},
  volume       = {1},
  number       = {1},
  year         = {2010},
  url          = {http://perpetualinnovation.net/ojs/index.php/ijngc/article/view/68},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijngc/NoelWSJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JajodiaM10,
  author       = {Sushil Jajodia and
                  Jonathan K. Millen},
  title        = {Editorial},
  journal      = {J. Comput. Secur.},
  volume       = {18},
  number       = {2},
  pages        = {187},
  year         = {2010},
  url          = {https://doi.org/10.3233/JCS-2010-0402},
  doi          = {10.3233/JCS-2010-0402},
  timestamp    = {Wed, 23 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcs/JajodiaM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pvldb/VimercatiFJPS10,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Fragments and Loose Associations: Respecting Privacy in Data Publishing},
  journal      = {Proc. {VLDB} Endow.},
  volume       = {3},
  number       = {1},
  pages        = {1370--1381},
  year         = {2010},
  url          = {http://www.vldb.org/pvldb/vldb2010/pvldb\_vol3/R121.pdf},
  doi          = {10.14778/1920841.1921009},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pvldb/VimercatiFJPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/ChenCWZJ10,
  author       = {Songqing Chen and
                  Shiping Chen and
                  Xinyuan Wang and
                  Zhao Zhang and
                  Sushil Jajodia},
  title        = {An Application-Level Data Transparent Authentication Scheme without
                  Communication Overhead},
  journal      = {{IEEE} Trans. Computers},
  volume       = {59},
  number       = {7},
  pages        = {943--954},
  year         = {2010},
  url          = {https://doi.org/10.1109/TC.2010.80},
  doi          = {10.1109/TC.2010.80},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/ChenCWZJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhuSJW10,
  author       = {Bo Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Providing witness anonymity under peer-to-peer settings},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {5},
  number       = {2},
  pages        = {324--336},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIFS.2010.2041821},
  doi          = {10.1109/TIFS.2010.2041821},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhuSJW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CirianiVFJPS10,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Combining fragmentation and encryption to protect privacy in data
                  storage},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {22:1--22:33},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1805978},
  doi          = {10.1145/1805974.1805978},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CirianiVFJPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/ZhuSJRW10,
  author       = {Bo Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Sankardas Roy and
                  Lingyu Wang},
  title        = {Localized Multicast: Efficient and Distributed Replica Detection in
                  Large-Scale Sensor Networks},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {9},
  number       = {7},
  pages        = {913--926},
  year         = {2010},
  url          = {https://doi.org/10.1109/TMC.2010.40},
  doi          = {10.1109/TMC.2010.40},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/ZhuSJRW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/VimercatiFJPS10,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Encryption policies for regulating access to outsourced data},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {35},
  number       = {2},
  pages        = {12:1--12:46},
  year         = {2010},
  url          = {https://doi.org/10.1145/1735886.1735891},
  doi          = {10.1145/1735886.1735891},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tods/VimercatiFJPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/ZhangZCPJM10,
  author       = {Lei Zhang and
                  Honggang Zhang and
                  Mauro Conti and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi Vincenzo Mancini},
  title        = {Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless
                  Sensor Networks},
  booktitle    = {10th {IEEE} International Conference on Computer and Information Technology,
                  {CIT} 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010},
  pages        = {910--915},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CIT.2010.169},
  doi          = {10.1109/CIT.2010.169},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/ZhangZCPJM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/JajodiaLS10,
  author       = {Sushil Jajodia and
                  Witold Litwin and
                  Thomas J. E. Schwarz},
  title        = {LH*RE: {A} Scalable Distributed Data Structure with Recoverable Encryption},
  booktitle    = {{IEEE} International Conference on Cloud Computing, {CLOUD} 2010,
                  Miami, FL, USA, 5-10 July, 2010},
  pages        = {354--361},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/CLOUD.2010.41},
  doi          = {10.1109/CLOUD.2010.41},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/JajodiaLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChuGWJ10,
  author       = {Zi Chu and
                  Steven Gianvecchio and
                  Haining Wang and
                  Sushil Jajodia},
  editor       = {Carrie Gates and
                  Michael Franz and
                  John P. McDermott},
  title        = {Who is tweeting on Twitter: human, bot, or cyborg?},
  booktitle    = {Twenty-Sixth Annual Computer Security Applications Conference, {ACSAC}
                  2010, Austin, Texas, USA, 6-10 December 2010},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1920261.1920265},
  doi          = {10.1145/1920261.1920265},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/ChuGWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangBJ10,
  author       = {Lei Zhang and
                  Alexander Brodsky and
                  Sushil Jajodia},
  editor       = {Dengguo Feng and
                  David A. Basin and
                  Peng Liu},
  title        = {Restoring compromised privacy in micro-data disclosure},
  booktitle    = {Proceedings of the 5th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2010, Beijing, China, April 13-16,
                  2010},
  pages        = {36--47},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1755688.1755694},
  doi          = {10.1145/1755688.1755694},
  timestamp    = {Fri, 03 Jun 2022 12:02:10 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangBJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaJSS10,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {Providing Mobile Users' Anonymity in Hybrid Networks},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {540--557},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_33},
  doi          = {10.1007/978-3-642-15497-3\_33},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaJSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangJSN10,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Anoop Singhal and
                  Steven Noel},
  editor       = {Dimitris Gritzalis and
                  Bart Preneel and
                  Marianthi Theoharidou},
  title        = {\emph{k}-Zero Day Safety: Measuring the Security Risk of Networks
                  against Unknown Attacks},
  booktitle    = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
                  in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6345},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15497-3\_35},
  doi          = {10.1007/978-3-642-15497-3\_35},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangJSN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/VimercatiFJPPS10,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Gerardo Pelosi and
                  Pierangela Samarati},
  title        = {Encryption-Based Policy Enforcement for Cloud Storage},
  booktitle    = {30th {IEEE} International Conference on Distributed Computing Systems
                  Workshops {(ICDCS} 2010 Workshops), 21-25 June 2010, Genova, Italy},
  pages        = {42--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDCSW.2010.35},
  doi          = {10.1109/ICDCSW.2010.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/VimercatiFJPPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/SengarRWWJ10,
  author       = {Hemant Sengar and
                  Zhen Ren and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Tracking Skype VoIP Calls Over The Internet},
  booktitle    = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications,
                  Joint Conference of the {IEEE} Computer and Communications Societies,
                  15-19 March 2010, San Diego, CA, {USA}},
  pages        = {96--100},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/INFCOM.2010.5462266},
  doi          = {10.1109/INFCOM.2010.5462266},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/infocom/SengarRWWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/SeymerSWJ10,
  author       = {Paul Seymer and
                  Angelos Stavrou and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {QoP and QoS Policy Cognizant Module Composition},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {77--86},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.16},
  doi          = {10.1109/POLICY.2010.16},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/SeymerSWJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dmkdh/SinghalJ10,
  author       = {Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Oded Maimon and
                  Lior Rokach},
  title        = {Data Mining for Intrusion Detection},
  booktitle    = {Data Mining and Knowledge Discovery Handbook, 2nd ed},
  pages        = {1171--1180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-09823-4\_61},
  doi          = {10.1007/978-0-387-09823-4\_61},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/reference/dmkdh/SinghalJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaN10,
  author       = {Sushil Jajodia and
                  Steven Noel},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Topological Vulnerability Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_7},
  doi          = {10.1007/978-1-4419-0140-8\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2010,
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6},
  doi          = {10.1007/978-3-642-13739-6},
  isbn         = {978-3-642-13738-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2010,
  editor       = {Sushil Jajodia and
                  Jianying Zhou},
  title        = {Security and Privacy in Communication Networks - 6th Iternational
                  {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010.
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {50},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16161-2},
  doi          = {10.1007/978-3-642-16161-2},
  isbn         = {978-3-642-16160-5},
  timestamp    = {Sun, 07 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/46,
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8},
  doi          = {10.1007/978-1-4419-0140-8},
  isbn         = {978-1-4419-0139-2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/46.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1007-0408,
  author       = {Sergio Mascetti and
                  Dario Freni and
                  Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Privacy in geo-social networks: proximity notification with untrusted
                  service providers and curious buddies},
  journal      = {CoRR},
  volume       = {abs/1007.0408},
  year         = {2010},
  url          = {http://arxiv.org/abs/1007.0408},
  eprinttype    = {arXiv},
  eprint       = {1007.0408},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1007-0408.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/RoyCSJ09,
  author       = {Sankardas Roy and
                  Mauro Conti and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Secure median computation in wireless sensor networks},
  journal      = {Ad Hoc Networks},
  volume       = {7},
  number       = {8},
  pages        = {1448--1462},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.adhoc.2009.04.007},
  doi          = {10.1016/J.ADHOC.2009.04.007},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/RoyCSJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/Fernandez-MedinaJTJ09,
  author       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Jan J{\"{u}}rjens and
                  Juan Trujillo and
                  Sushil Jajodia},
  title        = {Model-Driven Development for secure information systems},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {5},
  pages        = {809--814},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.05.010},
  doi          = {10.1016/J.INFSOF.2008.05.010},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/Fernandez-MedinaJTJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/YaoWWBJ09,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Claudio Bettini and
                  Sushil Jajodia},
  title        = {Evaluating privacy threats in released database views by symmetric
                  indistinguishability},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {5--42},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0317},
  doi          = {10.3233/JCS-2009-0317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/YaoWWBJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ContiZRPJM09,
  author       = {Mauro Conti and
                  Lei Zhang and
                  Sankardas Roy and
                  Roberto Di Pietro and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  title        = {Privacy-preserving robust data aggregation in wireless sensor networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2},
  number       = {2},
  pages        = {195--213},
  year         = {2009},
  url          = {https://doi.org/10.1002/sec.95},
  doi          = {10.1002/SEC.95},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ContiZRPJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/RenLZJ09,
  author       = {Kui Ren and
                  Wenjing Lou and
                  Bo Zhu and
                  Sushil Jajodia},
  title        = {Secure and Efficient Multicast in Wireless Sensor Networks Allowing
                  Ad hoc Group Formation},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {58},
  number       = {4},
  pages        = {2018--2029},
  year         = {2009},
  url          = {https://doi.org/10.1109/TVT.2008.2003961},
  doi          = {10.1109/TVT.2008.2003961},
  timestamp    = {Wed, 14 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/RenLZJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CirianiVFJPS09,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Enforcing Confidentiality Constraints on Sensitive Databases with
                  Lightweight Trusted Clients},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_15},
  doi          = {10.1007/978-3-642-03007-9\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/CirianiVFJPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BettiniMWFJ09,
  author       = {Claudio Bettini and
                  Sergio Mascetti and
                  Xiaoyang Sean Wang and
                  Dario Freni and
                  Sushil Jajodia},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {Anonymity and Historical-Anonymity in Location-Based Services},
  booktitle    = {Privacy in Location-Based Applications, Research Issues and Emerging
                  Trends [This book was partially born out of the First International
                  Workshop on Privacy in Location-Based Applications (PiLBA 2008) held
                  in Malaga, Spain, in October 2008, in conjunction with the 13th European
                  Symposium on Research in Computer Security]},
  series       = {Lecture Notes in Computer Science},
  volume       = {5599},
  pages        = {1--30},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03511-1\_1},
  doi          = {10.1007/978-3-642-03511-1\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BettiniMWFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaJSS09,
  author       = {Claudio A. Ardagna and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Angelos Stavrou},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {Privacy Preservation over Untrusted Mobile Networks},
  booktitle    = {Privacy in Location-Based Applications, Research Issues and Emerging
                  Trends [This book was partially born out of the First International
                  Workshop on Privacy in Location-Based Applications (PiLBA 2008) held
                  in Malaga, Spain, in October 2008, in conjunction with the 13th European
                  Symposium on Research in Computer Security]},
  series       = {Lecture Notes in Computer Science},
  volume       = {5599},
  pages        = {84--105},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03511-1\_4},
  doi          = {10.1007/978-3-642-03511-1\_4},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaJSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CirianiVFJPS09,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Michael Backes and
                  Peng Ning},
  title        = {Keep a Few: Outsourcing Data While Maintaining Confidentiality},
  booktitle    = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
                  in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5789},
  pages        = {440--455},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04444-1\_27},
  doi          = {10.1007/978-3-642-04444-1\_27},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CirianiVFJPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/CirianiVFJPS09,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Fragmentation Design for Efficient Query Execution over Sensitive
                  Distributed Databases},
  booktitle    = {29th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2009), 22-26 June 2009, Montreal, Qu{\'{e}}bec, Canada},
  pages        = {32--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDCS.2009.52},
  doi          = {10.1109/ICDCS.2009.52},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/CirianiVFJPS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SengarWWWJ09,
  author       = {Hemant Sengar and
                  Xinyuan Wang and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Online detection of network traffic anomalies using behavioral distance},
  booktitle    = {17th International Workshop on Quality of Service, IWQoS 2009, Charleston,
                  South Carolina, USA, 13-15 July 2009},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/IWQoS.2009.5201415},
  doi          = {10.1109/IWQOS.2009.5201415},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SengarWWWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/MascettiBFWJ09,
  author       = {Sergio Mascetti and
                  Claudio Bettini and
                  Dario Freni and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Yu{-}Chee Tseng and
                  Peter Scheuermann and
                  Ralf Hartmut G{\"{u}}ting and
                  Wang{-}Chien Lee and
                  Chung{-}Ta King and
                  Evaggelia Pitoura},
  title        = {Privacy-Aware Proximity Based Services},
  booktitle    = {{MDM} 2009, Tenth International Conference on Mobile Data Management,
                  Taipei, Taiwan, 18-20 May 2009},
  pages        = {31--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MDM.2009.14},
  doi          = {10.1109/MDM.2009.14},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/MascettiBFWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/MascettiBWFJ09,
  author       = {Sergio Mascetti and
                  Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Dario Freni and
                  Sushil Jajodia},
  editor       = {Yu{-}Chee Tseng and
                  Peter Scheuermann and
                  Ralf Hartmut G{\"{u}}ting and
                  Wang{-}Chien Lee and
                  Chung{-}Ta King and
                  Evaggelia Pitoura},
  title        = {ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in
                  {LBS}},
  booktitle    = {{MDM} 2009, Tenth International Conference on Mobile Data Management,
                  Taipei, Taiwan, 18-20 May 2009},
  pages        = {172--181},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/MDM.2009.28},
  doi          = {10.1109/MDM.2009.28},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/MascettiBWFJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangWJB09,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {L-Cover: Preserving Diversity by Anonymity},
  booktitle    = {Secure Data Management, 6th {VLDB} Workshop, {SDM} 2009, Lyon, France,
                  August 28, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5776},
  pages        = {158--171},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04219-5\_10},
  doi          = {10.1007/978-3-642-04219-5\_10},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangWJB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/RiboniPBJ09,
  author       = {Daniele Riboni and
                  Linda Pareschi and
                  Claudio Bettini and
                  Sushil Jajodia},
  editor       = {Carsten Lutz and
                  Jean{-}Fran{\c{c}}ois Raskin},
  title        = {Preserving Anonymity of Recurrent Location-Based Queries},
  booktitle    = {{TIME} 2009, 16th International Symposium on Temporal Representation
                  and Reasoning, Bressanone-Brixen, Italy, 23-25 July 2009, Proceedings},
  pages        = {62--69},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIME.2009.8},
  doi          = {10.1109/TIME.2009.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/RiboniPBJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009-5599,
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {Privacy in Location-Based Applications, Research Issues and Emerging
                  Trends [This book was partially born out of the First International
                  Workshop on Privacy in Location-Based Applications (PiLBA 2008) held
                  in Malaga, Spain, in October 2008, in conjunction with the 13th European
                  Symposium on Research in Computer Security]},
  series       = {Lecture Notes in Computer Science},
  volume       = {5599},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03511-1},
  doi          = {10.1007/978-3-642-03511-1},
  isbn         = {978-3-642-03510-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2009-5599.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/db/BettiniWJ09,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Ling Liu and
                  M. Tamer {\"{O}}zsu},
  title        = {Temporal Granularity},
  booktitle    = {Encyclopedia of Database Systems},
  pages        = {2968--2973},
  publisher    = {Springer {US}},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-39940-9\_397},
  doi          = {10.1007/978-0-387-39940-9\_397},
  timestamp    = {Sun, 02 Jun 2019 21:10:27 +0200},
  biburl       = {https://dblp.org/rec/reference/db/BettiniWJ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangYSJ08,
  author       = {Lingyu Wang and
                  Chao Yao and
                  Anoop Singhal and
                  Sushil Jajodia},
  title        = {Implementing interactive analysis of attack graphs using relational
                  databases},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {419--437},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0327},
  doi          = {10.3233/JCS-2008-0327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangYSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/NoelJ08,
  author       = {Steven Noel and
                  Sushil Jajodia},
  title        = {Optimal {IDS} Sensor Placement and Alert Prioritization Using Attack
                  Graphs},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {16},
  number       = {3},
  pages        = {259--275},
  year         = {2008},
  url          = {https://doi.org/10.1007/s10922-008-9109-x},
  doi          = {10.1007/S10922-008-9109-X},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/NoelJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tomccap/ChenCGSJ08,
  author       = {Songqing Chen and
                  Shiping Chen and
                  Huiping Guo and
                  Bo Shen and
                  Sushil Jajodia},
  title        = {Achieving simultaneous distribution control and privacy protection
                  for Internet media delivery},
  journal      = {{ACM} Trans. Multim. Comput. Commun. Appl.},
  volume       = {4},
  number       = {2},
  pages        = {9:1--9:23},
  year         = {2008},
  url          = {https://doi.org/10.1145/1352012.1352013},
  doi          = {10.1145/1352012.1352013},
  timestamp    = {Tue, 19 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tomccap/ChenCGSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/SengarWWJ08,
  author       = {Hemant Sengar and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Detecting VoIP Floods Using the Hellinger Distance},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {19},
  number       = {6},
  pages        = {794--805},
  year         = {2008},
  url          = {https://doi.org/10.1109/TPDS.2007.70786},
  doi          = {10.1109/TPDS.2007.70786},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/SengarWWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuangSGJ08,
  author       = {Yih Huang and
                  Angelos Stavrou and
                  Anup K. Ghosh and
                  Sushil Jajodia},
  editor       = {Jason Nieh and
                  Angelos Stavrou},
  title        = {Efficiently tracking application interactions using lightweight virtualization},
  booktitle    = {Proceedings of the 1st {ACM} Workshop on Virtual Machine Security,
                  VMSec 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {19--28},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456482.1456486},
  doi          = {10.1145/1456482.1456486},
  timestamp    = {Wed, 04 May 2022 13:02:17 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HuangSGJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FrigaultWSJ08,
  author       = {Marcel Frigault and
                  Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Andy Ozment and
                  Ketil St{\o}len},
  title        = {Measuring network security using dynamic bayesian network},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Quality of Protection, QoP
                  2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {23--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456362.1456368},
  doi          = {10.1145/1456362.1456368},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FrigaultWSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VimercatiFJPS08,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Peng Ning and
                  Paul F. Syverson and
                  Somesh Jha},
  title        = {Assessing query privileges via safe and efficient permission composition},
  booktitle    = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages        = {311--322},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1455770.1455810},
  doi          = {10.1145/1455770.1455810},
  timestamp    = {Tue, 10 Nov 2020 19:59:27 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VimercatiFJPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZhangWJB08,
  author       = {Lei Zhang and
                  Lingyu Wang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Vijay Atluri},
  title        = {Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {190--204},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_15},
  doi          = {10.1007/978-3-540-70567-3\_15},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZhangWJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ArdagnaVGJS08,
  author       = {Claudio Agostino Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Tyrone Grandison and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Vijay Atluri},
  title        = {Regulating Exceptions in Healthcare Using Policy Spaces},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {254--267},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_20},
  doi          = {10.1007/978-3-540-70567-3\_20},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ArdagnaVGJS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangILSJ08,
  author       = {Lingyu Wang and
                  Tania Islam and
                  Tao Long and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Vijay Atluri},
  title        = {An Attack Graph-Based Probabilistic Security Metric},
  booktitle    = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3\_22},
  doi          = {10.1007/978-3-540-70567-3\_22},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangILSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ArdagnaSJSM08,
  author       = {Claudio A. Ardagna and
                  Angelos Stavrou and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Rhandi Martin},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks},
  booktitle    = {Proceedings of the 1st International Workshop on Privacy in Location-Based
                  Applications, Malaga, Spain, October 9, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {397},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-397/paper6.pdf},
  timestamp    = {Fri, 10 Mar 2023 16:22:59 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ArdagnaSJSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MascettiFBWJ08,
  author       = {Sergio Mascetti and
                  Dario Freni and
                  Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {On the Impact of User Movement Simulations in the Evaluation of {LBS}
                  Privacy- Preserving Techniques},
  booktitle    = {Proceedings of the 1st International Workshop on Privacy in Location-Based
                  Applications, Malaga, Spain, October 9, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {397},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-397/paper5.pdf},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/MascettiFBWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/VimercatiFJPS08,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Controlled Information Sharing in Collaborative Distributed Query
                  Processing},
  booktitle    = {28th {IEEE} International Conference on Distributed Computing Systems
                  {(ICDCS} 2008), 17-20 June 2008, Beijing, China},
  pages        = {303--310},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDCS.2008.62},
  doi          = {10.1109/ICDCS.2008.62},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/VimercatiFJPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ZhangBSJ08,
  author       = {Lei Zhang and
                  Alexander Brodsky and
                  Vipin Swarup and
                  Sushil Jajodia},
  title        = {A Framework for Maximizing Utility of Sanitized Documents Based on
                  Meta-labeling},
  booktitle    = {9th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2008), 2-4 June 2008, Palisades, New York,
                  {USA}},
  pages        = {181--188},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/POLICY.2008.20},
  doi          = {10.1109/POLICY.2008.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ZhangBSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/GianvecchioWWJ08,
  author       = {Steven Gianvecchio and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {Model-Based Covert Timing Channels: Automated Modeling and Evasion},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {211--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_12},
  doi          = {10.1007/978-3-540-87403-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/GianvecchioWWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ08,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {How Anonymous Is k-Anonymous? Look at Your Quasi-ID},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_1},
  doi          = {10.1007/978-3-540-85259-9\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/ZhangJB08,
  author       = {Lei Zhang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Simulatable Binding: Beyond Simulatable Auditing},
  booktitle    = {Secure Data Management, 5th {VLDB} Workshop, {SDM} 2008, Auckland,
                  New Zealand, August 24, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5159},
  pages        = {16--31},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85259-9\_2},
  doi          = {10.1007/978-3-540-85259-9\_2},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdmw/ZhangJB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/RoyCSJ08,
  author       = {Sankardas Roy and
                  Mauro Conti and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Albert Levi and
                  Peng Liu and
                  Refik Molva},
  title        = {Securely computing an approximate median in wireless sensor networks},
  booktitle    = {4th International {ICST} Conference on Security and Privacy in Communication
                  Networks, {SECURECOMM} 2008, Istanbul, Turkey, September 22-25, 2008},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1460877.1460885},
  doi          = {10.1145/1460877.1460885},
  timestamp    = {Tue, 06 Nov 2018 16:58:12 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/RoyCSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/VimercatiFJPPS08,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Gerardo Pelosi and
                  Pierangela Samarati},
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Preserving confidentiality of security policies in data outsourcing},
  booktitle    = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {75--84},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456403.1456417},
  doi          = {10.1145/1456403.1456417},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/VimercatiFJPPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/WangJ08,
  author       = {Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Security in Data Warehouses and {OLAP} Systems},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {191--212},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_8},
  doi          = {10.1007/978-0-387-48533-1\_8},
  timestamp    = {Mon, 07 Dec 2020 17:16:27 +0100},
  biburl       = {https://dblp.org/rec/reference/dbsec/WangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/LiuJY08,
  author       = {Peng Liu and
                  Sushil Jajodia and
                  Meng Yu},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Damage Quarantine and Recovery in Data Processing Systems},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {383--407},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_16},
  doi          = {10.1007/978-0-387-48533-1\_16},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/dbsec/LiuJY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/wiley/VimercatiSJ08,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sushil Jajodia},
  editor       = {Benjamin W. Wah},
  title        = {Data Security},
  booktitle    = {Wiley Encyclopedia of Computer Science and Engineering},
  publisher    = {John Wiley {\&} Sons, Inc.},
  year         = {2008},
  url          = {https://doi.org/10.1002/9780470050118.ecse096},
  doi          = {10.1002/9780470050118.ECSE096},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/wiley/VimercatiSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2008pilba,
  editor       = {Claudio Bettini and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  Xiaoyang Sean Wang},
  title        = {Proceedings of the 1st International Workshop on Privacy in Location-Based
                  Applications, Malaga, Spain, October 9, 2008},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {397},
  publisher    = {CEUR-WS.org},
  year         = {2008},
  url          = {https://ceur-ws.org/Vol-397},
  urn          = {urn:nbn:de:0074-397-1},
  timestamp    = {Fri, 10 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/2008pilba.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2008,
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5},
  doi          = {10.1007/978-3-540-88313-5},
  isbn         = {978-3-540-88312-8},
  timestamp    = {Thu, 29 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2008,
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Stelvio Cimato},
  title        = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
                  Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
                  September 7-10, 2008, Milano, Italy},
  series       = {{IFIP}},
  volume       = {278},
  publisher    = {Springer},
  year         = {2008},
  isbn         = {978-0-387-09698-8},
  timestamp    = {Wed, 17 Sep 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:reference/dbsec/2008,
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Handbook of Database Security - Applications and Trends},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1},
  doi          = {10.1007/978-0-387-48533-1},
  isbn         = {978-0-387-48532-4},
  timestamp    = {Mon, 07 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/reference/dbsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}},
  series       = {Advances in Information Security},
  volume       = {29},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46274-5},
  doi          = {10.1007/978-0-387-46274-5},
  isbn         = {978-0-387-46273-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuYLSJ07,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Efficient security mechanisms for overlay multicast based content
                  delivery},
  journal      = {Comput. Commun.},
  volume       = {30},
  number       = {4},
  pages        = {793--806},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comcom.2006.10.003},
  doi          = {10.1016/J.COMCOM.2006.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuYLSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcse/VimercatiFSJ07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Pierangela Samarati and
                  Sushil Jajodia},
  title        = {Access control policies and languages},
  journal      = {Int. J. Comput. Sci. Eng.},
  volume       = {3},
  number       = {2},
  pages        = {94--102},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJCSE.2007.015739},
  doi          = {10.1504/IJCSE.2007.015739},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcse/VimercatiFSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GuoLJ07,
  author       = {Huiping Guo and
                  Yingjiu Li and
                  Sushil Jajodia},
  title        = {Chaining watermarks for detecting malicious modifications to streaming
                  data},
  journal      = {Inf. Sci.},
  volume       = {177},
  number       = {1},
  pages        = {281--298},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ins.2006.03.014},
  doi          = {10.1016/J.INS.2006.03.014},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/GuoLJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangLJW07,
  author       = {Lingyu Wang and
                  Yingjiu Li and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Parity-based inference control for multi-dimensional range sum queries},
  journal      = {J. Comput. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {417--445},
  year         = {2007},
  url          = {https://doi.org/10.3233/jcs-2007-15401},
  doi          = {10.3233/JCS-2007-15401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangLJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/LiuLJA07,
  author       = {Peng Liu and
                  Jie Li and
                  Sushil Jajodia and
                  Paul Ammann},
  title        = {Can-Follow Concurrency Control},
  journal      = {{IEEE} Trans. Computers},
  volume       = {56},
  number       = {10},
  pages        = {1425--1430},
  year         = {2007},
  url          = {https://doi.org/10.1109/TC.2007.70761},
  doi          = {10.1109/TC.2007.70761},
  timestamp    = {Mon, 13 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/LiuLJA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJN07,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {Interleaved hop-by-hop authentication against false data injection
                  attacks in sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {3},
  number       = {3},
  pages        = {14},
  year         = {2007},
  url          = {https://doi.org/10.1145/1267060.1267062},
  doi          = {10.1145/1267060.1267062},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ZhuASJR07,
  author       = {Bo Zhu and
                  Venkata Gopala Krishna Addada and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Sankardas Roy},
  title        = {Efficient Distributed Detection of Node Replication Attacks in Sensor
                  Networks},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {257--267},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.26},
  doi          = {10.1109/ACSAC.2007.26},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ZhuASJR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Jajodia07,
  author       = {Sushil Jajodia},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Topological analysis of network attack vulnerability},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229288},
  doi          = {10.1145/1229285.1229288},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Jajodia07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangSJ07,
  author       = {Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {G{\"{u}}nter Karjoth and
                  Ketil St{\o}len},
  title        = {Toward measuring network security using attack graphs},
  booktitle    = {Proceedings of the 3th {ACM} Workshop on Quality of Protection, QoP
                  2007, Alexandria, VA, USA, October 29, 2007},
  pages        = {49--54},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314257.1314273},
  doi          = {10.1145/1314257.1314273},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VimercatiFJPS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {A data outsourcing architecture combining cryptography and access
                  control},
  booktitle    = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  pages        = {63--69},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1314466.1314477},
  doi          = {10.1145/1314466.1314477},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/VimercatiFJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VimercatiJPS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Trust management services in relational databases},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {149--160},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229308},
  doi          = {10.1145/1229285.1229308},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VimercatiJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangJB07,
  author       = {Lei Zhang and
                  Sushil Jajodia and
                  Alexander Brodsky},
  editor       = {Peng Ning and
                  Sabrina De Capitani di Vimercati and
                  Paul F. Syverson},
  title        = {Information disclosure under realistic assumptions: privacy versus
                  optimality},
  booktitle    = {Proceedings of the 2007 {ACM} Conference on Computer and Communications
                  Security, {CCS} 2007, Alexandria, Virginia, USA, October 28-31, 2007},
  pages        = {573--583},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1315245.1315316},
  doi          = {10.1145/1315245.1315316},
  timestamp    = {Tue, 10 Nov 2020 20:00:14 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangJB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangSJ07,
  author       = {Lingyu Wang and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Measuring the Overall Security of Network Configurations Using Attack
                  Graphs},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_9},
  doi          = {10.1007/978-3-540-73538-0\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangSJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CirianiVFJPS07,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Joachim Biskup and
                  Javier L{\'{o}}pez},
  title        = {Fragmentation and Encryption to Enforce Privacy in Data Storage},
  booktitle    = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research
                  In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4734},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74835-9\_12},
  doi          = {10.1007/978-3-540-74835-9\_12},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CirianiVFJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/BettiniMWJ07,
  author       = {Claudio Bettini and
                  Sergio Mascetti and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Christian Becker and
                  Christian S. Jensen and
                  Jianwen Su and
                  Daniela Nicklas},
  title        = {Anonymity in Location-Based Services: Towards a General Framework},
  booktitle    = {8th International Conference on Mobile Data Management {(MDM} 2007),
                  Mannheim, Germany, May 7-11, 2007},
  pages        = {69--76},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/MDM.2007.19},
  doi          = {10.1109/MDM.2007.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/BettiniMWJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/BettiniJP07,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Linda Pareschi},
  title        = {Anonymity and Diversity in {LBS:} {A} Preliminary Investigation},
  booktitle    = {Fifth Annual {IEEE} International Conference on Pervasive Computing
                  and Communications - Workshops (PerCom Workshops 2007), 19-23 March
                  2007, White Plains, New York, {USA}},
  pages        = {577--580},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/PERCOMW.2007.23},
  doi          = {10.1109/PERCOMW.2007.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/percom/BettiniJP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BrodskyZJ07,
  author       = {Alexander Brodsky and
                  Lei Zhang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Answering Queries Based on Imprecision and Uncertainty Trade-Offs
                  in Numeric Databases},
  booktitle    = {Secure Data Management, 4th {VLDB} Workshop, {SDM} 2007, Vienna, Austria,
                  September 23-24, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4721},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75248-6\_6},
  doi          = {10.1007/978-3-540-75248-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BrodskyZJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DamianiVFJPS07,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Hein S. Venter and
                  Mariki M. Eloff and
                  Les Labuschagne and
                  Jan H. P. Eloff and
                  Rossouw von Solms},
  title        = {An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing},
  booktitle    = {New Approaches for Security, Privacy and Trust in Complex Environments,
                  Proceedings of the {IFIP} {TC-11} 22nd International Information Security
                  Conference {(SEC} 2007), 14-16 May 2007, Sandton, South Africa},
  series       = {{IFIP}},
  volume       = {232},
  pages        = {385--396},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-72367-9\_33},
  doi          = {10.1007/978-0-387-72367-9\_33},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/DamianiVFJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangCJ07,
  author       = {Xinyuan Wang and
                  Shiping Chen and
                  Sushil Jajodia},
  title        = {Network Flow Watermarking Attack on Low-Latency Anonymous Communication
                  Systems},
  booktitle    = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
                  May 2007, Oakland, California, {USA}},
  pages        = {116--130},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SP.2007.30},
  doi          = {10.1109/SP.2007.30},
  timestamp    = {Thu, 21 Sep 2023 15:57:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangCJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/VimercatiFJPS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Christoph Koch and
                  Johannes Gehrke and
                  Minos N. Garofalakis and
                  Divesh Srivastava and
                  Karl Aberer and
                  Anand Deshpande and
                  Daniela Florescu and
                  Chee Yong Chan and
                  Venkatesh Ganti and
                  Carl{-}Christian Kanne and
                  Wolfgang Klas and
                  Erich J. Neuhold},
  title        = {Over-encryption: Management of Access Control Evolution on Outsourced
                  Data},
  booktitle    = {Proceedings of the 33rd International Conference on Very Large Data
                  Bases, University of Vienna, Austria, September 23-27, 2007},
  pages        = {123--134},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {http://www.vldb.org/conf/2007/papers/research/p123-decapitani.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/VimercatiFJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaY07,
  author       = {Sushil Jajodia and
                  Ting Yu},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Basic Security Concepts},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_1},
  doi          = {10.1007/978-0-387-27696-0\_1},
  timestamp    = {Mon, 04 Apr 2022 16:00:08 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/VimercatiFJS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Access Control Policies and Languages in Open Environments},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {21--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_2},
  doi          = {10.1007/978-0-387-27696-0\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/VimercatiFJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YuLZJ07,
  author       = {Meng Yu and
                  Peng Liu and
                  Wanyu Zang and
                  Sushil Jajodia},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Trusted Recovery},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {59--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_3},
  doi          = {10.1007/978-0-387-27696-0\_3},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YuLZJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Preserving Privacy in On-line Analytical Processing Data Cubes},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {355--380},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_11},
  doi          = {10.1007/978-0-387-27696-0\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/33,
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  publisher    = {Springer},
  year         = {2007},
  isbn         = {978-0-387-27694-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/33.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/ZhuXSJ06,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LHAP:} {A} lightweight network access control protocol for ad hoc
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {4},
  number       = {5},
  pages        = {567--585},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.adhoc.2005.06.002},
  doi          = {10.1016/J.ADHOC.2005.06.002},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/ZhuXSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangLJ06,
  author       = {Lingyu Wang and
                  Anyi Liu and
                  Sushil Jajodia},
  title        = {Using attack graphs for correlating, hypothesizing, and predicting
                  intrusion alerts},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {15},
  pages        = {2917--2933},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.04.001},
  doi          = {10.1016/J.COMCOM.2006.04.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangNJ06,
  author       = {Lingyu Wang and
                  Steven Noel and
                  Sushil Jajodia},
  title        = {Minimum-cost network hardening using attack graphs},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {18},
  pages        = {3812--3824},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2006.06.018},
  doi          = {10.1016/J.COMCOM.2006.06.018},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangNJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/SinghalJ06,
  author       = {Anoop Singhal and
                  Sushil Jajodia},
  title        = {Data warehousing and data mining techniques for intrusion detection
                  systems},
  journal      = {Distributed Parallel Databases},
  volume       = {20},
  number       = {2},
  pages        = {149--166},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10619-006-9496-5},
  doi          = {10.1007/S10619-006-9496-5},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/SinghalJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsn/ZhuJK06,
  author       = {Bo Zhu and
                  Sushil Jajodia and
                  Mohan S. Kankanhalli},
  title        = {Building trust in peer-to-peer systems: a review},
  journal      = {Int. J. Secur. Networks},
  volume       = {1},
  number       = {1/2},
  pages        = {103--112},
  year         = {2006},
  url          = {https://doi.org/10.1504/IJSN.2006.010827},
  doi          = {10.1504/IJSN.2006.010827},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsn/ZhuJK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/LiZWJ06,
  author       = {Yingjiu Li and
                  Sencun Zhu and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Looking into the seeds of time: Discovering temporal patterns in large
                  transaction sets},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {8},
  pages        = {1003--1031},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2005.01.019},
  doi          = {10.1016/J.INS.2005.01.019},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/LiZWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/GuoLLJ06,
  author       = {Huiping Guo and
                  Yingjiu Li and
                  Anyi Liu and
                  Sushil Jajodia},
  title        = {A fragile watermarking scheme for detecting malicious modifications
                  of database relations},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {10},
  pages        = {1350--1378},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2005.06.003},
  doi          = {10.1016/J.INS.2005.06.003},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/GuoLLJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/FarkasBJ06,
  author       = {Csilla Farkas and
                  Alexander Brodsky and
                  Sushil Jajodia},
  title        = {Unauthorized inferences in semistructured databases},
  journal      = {Inf. Sci.},
  volume       = {176},
  number       = {22},
  pages        = {3269--3299},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.ins.2006.01.004},
  doi          = {10.1016/J.INS.2006.01.004},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/FarkasBJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ZhuSXJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Shouhuai Xu and
                  Sushil Jajodia},
  title        = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast
                  in Ad-Hoc Networks},
  journal      = {J. Comput. Secur.},
  volume       = {14},
  number       = {4},
  pages        = {301--325},
  year         = {2006},
  url          = {https://doi.org/10.3233/jcs-2006-14401},
  doi          = {10.3233/JCS-2006-14401},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ZhuSXJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/ChenWJ06,
  author       = {Shiping Chen and
                  Xinyuan Wang and
                  Sushil Jajodia},
  title        = {On the anonymity and traceability of peer-to-peer VoIP calls},
  journal      = {{IEEE} Netw.},
  volume       = {20},
  number       = {5},
  pages        = {32--37},
  year         = {2006},
  url          = {https://doi.org/10.1109/MNET.2006.1705881},
  doi          = {10.1109/MNET.2006.1705881},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/ChenWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/SengarDWJ06,
  author       = {Hemant Sengar and
                  Ram Dantu and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {{SS7} over {IP:} signaling interworking vulnerabilities},
  journal      = {{IEEE} Netw.},
  volume       = {20},
  number       = {6},
  pages        = {32--41},
  year         = {2006},
  url          = {https://doi.org/10.1109/MNET.2006.273119},
  doi          = {10.1109/MNET.2006.273119},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/SengarDWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/ZhuSJ06,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LEAP+:} Efficient security mechanisms for large-scale distributed
                  sensor networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {2},
  number       = {4},
  pages        = {500--528},
  year         = {2006},
  url          = {https://doi.org/10.1145/1218556.1218559},
  doi          = {10.1145/1218556.1218559},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosn/ZhuSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/ChenLCJ06,
  author       = {Shiping Chen and
                  Dongyu Liu and
                  Songqing Chen and
                  Sushil Jajodia},
  title        = {{V-COPS:} {A} Vulnerability-Based Cooperative Alert Distribution System},
  booktitle    = {22nd Annual Computer Security Applications Conference {(ACSAC} 2006),
                  11-15 December 2006, Miami Beach, Florida, {USA}},
  pages        = {43--56},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ACSAC.2006.54},
  doi          = {10.1109/ACSAC.2006.54},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/ChenLCJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuSJ06,
  author       = {Bo Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Providing witness anonymity in peer-to-peer systems},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {6--16},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180408},
  doi          = {10.1145/1180405.1180408},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PamulaJAS06,
  author       = {Joseph Pamula and
                  Sushil Jajodia and
                  Paul Ammann and
                  Vipin Swarup},
  editor       = {G{\"{u}}nter Karjoth and
                  Fabio Massacci},
  title        = {A weakest-adversary security metric for network configuration security
                  analysis},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Quality of Protection, QoP
                  2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {31--38},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1179494.1179502},
  doi          = {10.1145/1179494.1179502},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PamulaJAS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ZannoneJW06,
  author       = {Nicola Zannone and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Creating Objects in the Flexible Authorization Framework},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_1},
  doi          = {10.1007/11805588\_1},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ZannoneJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangYSJ06,
  author       = {Lingyu Wang and
                  Chao Yao and
                  Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Interactive Analysis of Attack Graphs Using Relational Queries},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {119--132},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_9},
  doi          = {10.1007/11805588\_9},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangYSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/SengarWWJ06,
  author       = {Hemant Sengar and
                  Duminda Wijesekera and
                  Haining Wang and
                  Sushil Jajodia},
  title        = {VoIP Intrusion Detection Through Interacting Protocol State Machines},
  booktitle    = {2006 International Conference on Dependable Systems and Networks {(DSN}
                  2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings},
  pages        = {393--402},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DSN.2006.73},
  doi          = {10.1109/DSN.2006.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/SengarWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/SengarWWJ06,
  author       = {Hemant Sengar and
                  Haining Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Fast Detection of Denial-of-Service Attacks on {IP} Telephony},
  booktitle    = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS
                  2006, New Haven, CT, USA, 19-21 June 2006, Proceedings},
  pages        = {199--208},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWQOS.2006.250469},
  doi          = {10.1109/IWQOS.2006.250469},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/SengarWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/ChenCGSJ06,
  author       = {Songqing Chen and
                  Shiping Chen and
                  Huiping Guo and
                  Bo Shen and
                  Sushil Jajodia},
  title        = {Efficient Proxy-Based Internet Media Distribution Control and Privacy
                  Protection Infrastructure},
  booktitle    = {Quality of Service - IWQoS 2006: 14th International Workshop, IWQoS
                  2006, New Haven, CT, USA, 19-21 June 2006, Proceedings},
  pages        = {209--218},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IWQOS.2006.250470},
  doi          = {10.1109/IWQOS.2006.250470},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwqos/ChenCGSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ZhangBJ06,
  author       = {Lei Zhang and
                  Alexander Brodsky and
                  Sushil Jajodia},
  title        = {Toward Information Sharing: Benefit And Risk Access Control {(BARAC)}},
  booktitle    = {7th {IEEE} International Workshop on Policies for Distributed Systems
                  and Networks {(POLICY} 2006), 5-7 June 2006, London, Ontario, Canada},
  pages        = {45--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/POLICY.2006.36},
  doi          = {10.1109/POLICY.2006.36},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ZhangBJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/Jajodia06,
  author       = {Sushil Jajodia},
  title        = {Topological analysis of network attack vulnerability},
  booktitle    = {Proceedings of the 2006 International Conference on Privacy, Security
                  and Trust: Bridge the Gap Between {PST} Technologies and Business
                  Services, {PST} 2006, Markham, Ontario, Canada, October 30 - November
                  1, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {380},
  pages        = {2},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1501434.1501437},
  doi          = {10.1145/1501434.1501437},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/Jajodia06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CalagnaGMJ06,
  author       = {Maria Calagna and
                  Huiping Guo and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  editor       = {Hisham Haddad},
  title        = {A robust watermarking system based on \emph{SVD} compression},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {1341--1347},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141590},
  doi          = {10.1145/1141277.1141590},
  timestamp    = {Tue, 06 Nov 2018 11:06:49 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/CalagnaGMJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KepplerSJ06,
  author       = {David Keppler and
                  Vipin Swarup and
                  Sushil Jajodia},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Redirection policies for mission-based information sharing},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {210--218},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133088},
  doi          = {10.1145/1133058.1133088},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KepplerSJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sasn/RoySJ06,
  author       = {Sankardas Roy and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Sencun Zhu and
                  Donggang Liu},
  title        = {Attack-resilient hierarchical data aggregation in sensor networks},
  booktitle    = {Proceedings of the 4th {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2006, Alexandria, VA, USA, October 30, 2006},
  pages        = {71--82},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180345.1180355},
  doi          = {10.1145/1180345.1180355},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/RoySJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/YaoWWJ06,
  author       = {Chao Yao and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Indistinguishability: The Other Aspect of Privacy},
  booktitle    = {Secure Data Management, Third {VLDB} Workshop, {SDM} 2006, Seoul,
                  Korea, September 10-11, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4165},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11844662\_1},
  doi          = {10.1007/11844662\_1},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/YaoWWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/ZhuJKBD06,
  author       = {Bo Zhu and
                  Sushil Jajodia and
                  Mohan S. Kankanhalli and
                  Feng Bao and
                  Robert H. Deng},
  title        = {An Anonymous Routing Protocol with The Local-repair Mechanism for
                  Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the Third Annual {IEEE} Communications Society on Sensor
                  and Ad Hoc Communications and Networks, {SECON} 2006, September 25-28,
                  2006, Reston, VA, {USA}},
  pages        = {70--79},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SAHCN.2006.288411},
  doi          = {10.1109/SAHCN.2006.288411},
  timestamp    = {Fri, 30 Apr 2021 18:04:33 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/ZhuJKBD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/ChenCWJ06,
  author       = {Songqing Chen and
                  Shiping Chen and
                  Xinyuan Wang and
                  Sushil Jajodia},
  title        = {DaTA - Data-Transparent Authentication Without Communication Overhead},
  booktitle    = {Second International Conference on Security and Privacy in Communication
                  Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
                  2, 2006 - September 1, 2006},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/SECCOMW.2006.359567},
  doi          = {10.1109/SECCOMW.2006.359567},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/ChenCWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/PamulaAJR06,
  author       = {Joseph Pamula and
                  Paul Ammann and
                  Sushil Jajodia and
                  Ronald W. Ritchey},
  editor       = {Ari Juels and
                  Ernesto Damiani and
                  Alban Gabillon},
  title        = {A framework for establishing, assessing, and managing trust in inter-organizational
                  relationships},
  booktitle    = {Proceedings of the 3rd {ACM} Workshop On Secure Web Services, {SWS}
                  2006, Alexandria, VA, USA, November 3, 2006},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180367.1180374},
  doi          = {10.1145/1180367.1180374},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sws/PamulaAJR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/MascettiBWJ06,
  author       = {Sergio Mascetti and
                  Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {James Pustejovsky and
                  Peter Z. Revesz},
  title        = {k-Anonymity in Databases with Timestamped Data},
  booktitle    = {13th International Symposium on Temporal Representation and Reasoning
                  {(TIME} 2006), 15-17 June 2006, Budapest, Hungary},
  pages        = {177--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIME.2006.20},
  doi          = {10.1109/TIME.2006.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/MascettiBWJ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/DamianiVFJPS07,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Maurice H. ter Beek and
                  Fabio Gadducci},
  title        = {Selective Data Encryption in Outsourced Dynamic Environments},
  booktitle    = {Proceedings of the Second International Workshop on Views on Designing
                  Complex Architectures, VODCA@FOSAD 2006, Bertinoro, Italy, September
                  16-17, 2006},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {168},
  pages        = {127--142},
  publisher    = {Elsevier},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.entcs.2006.11.003},
  doi          = {10.1016/J.ENTCS.2006.11.003},
  timestamp    = {Tue, 24 Jan 2023 11:14:31 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/DamianiVFJPS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2006,
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-272-0},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611035,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {The Role of Quasi-identifiers in k-Anonymity Revisited},
  journal      = {CoRR},
  volume       = {abs/cs/0611035},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611035},
  eprinttype    = {arXiv},
  eprint       = {cs/0611035},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611035.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jods/BettiniWJ05,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Information Release Control: {A} Learning-Based Architecture},
  journal      = {J. Data Semant.},
  volume       = {2},
  pages        = {176--198},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30567-5\_7},
  doi          = {10.1007/978-3-540-30567-5\_7},
  timestamp    = {Wed, 16 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jods/BettiniWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiSJ05,
  author       = {Yingjiu Li and
                  Vipin Swarup and
                  Sushil Jajodia},
  title        = {Fingerprinting Relational Databases: Schemes and Specialties},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {2},
  number       = {1},
  pages        = {34--45},
  year         = {2005},
  url          = {https://doi.org/10.1109/TDSC.2005.12},
  doi          = {10.1109/TDSC.2005.12},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CeselliDVJPS05,
  author       = {Alberto Ceselli and
                  Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Modeling and assessing inference exposure in encrypted databases},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {119--152},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053289},
  doi          = {10.1145/1053283.1053289},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/CeselliDVJPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ZhuYLSJ05,
  author       = {Sencun Zhu and
                  Chao Yao and
                  Donggang Liu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {John Ioannidis and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Efficient Security Mechanisms for Overlay Multicast-Based Content
                  Distribution},
  booktitle    = {Applied Cryptography and Network Security, Third International Conference,
                  {ACNS} 2005, New York, NY, USA, June 7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3531},
  pages        = {40--55},
  year         = {2005},
  url          = {https://doi.org/10.1007/11496137\_4},
  doi          = {10.1007/11496137\_4},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ZhuYLSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NoelJ05,
  author       = {Steven Noel and
                  Sushil Jajodia},
  title        = {Understanding Complex Network Attack Graphs through Clustered Adjacency
                  Matrices},
  booktitle    = {21st Annual Computer Security Applications Conference {(ACSAC} 2005),
                  5-9 December 2005, Tucson, AZ, {USA}},
  pages        = {160--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/CSAC.2005.58},
  doi          = {10.1109/CSAC.2005.58},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NoelJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangCJ05,
  author       = {Xinyuan Wang and
                  Shiping Chen and
                  Sushil Jajodia},
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Tracking anonymous peer-to-peer VoIP calls on the internet},
  booktitle    = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages        = {81--91},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102120.1102133},
  doi          = {10.1145/1102120.1102133},
  timestamp    = {Tue, 19 Sep 2023 14:44:32 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/WangCJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dnis/VimercatiSJ05,
  author       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sushil Jajodia},
  editor       = {Subhash Bhalla},
  title        = {Policies, Models, and Languages for Access Control},
  booktitle    = {Databases in Networked Information Systems, 4th International Workshop,
                  {DNIS} 2005, Aizu-Wakamatsu, Japan, March 28-30, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3433},
  pages        = {225--237},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-31970-2\_18},
  doi          = {10.1007/978-3-540-31970-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/dnis/VimercatiSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecbs/SengarWJ05,
  author       = {Hemant Sengar and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Authentication and Integrity in Telecommunication Signaling Network},
  booktitle    = {12th {IEEE} International Conference on the Engineering of Computer-Based
                  Systems {(ECBS} 2005), 4-7 April 2005, Greenbelt, MD, {USA}},
  pages        = {163--170},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ECBS.2005.19},
  doi          = {10.1109/ECBS.2005.19},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecbs/SengarWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLJ05,
  author       = {Lingyu Wang and
                  Anyi Liu and
                  Sushil Jajodia},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {An Efficient and Unified Approach to Correlating, Hypothesizing, and
                  Predicting Intrusion Alerts},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_15},
  doi          = {10.1007/11555827\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipps/SengarWJ05,
  author       = {Hemant Sengar and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {MTPSec: Customizable Secure {MTP3} Tunnels in the {SS7} Network},
  booktitle    = {19th International Parallel and Distributed Processing Symposium {(IPDPS}
                  2005), {CD-ROM} / Abstracts Proceedings, 4-8 April 2005, Denver, CO,
                  {USA}},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/IPDPS.2005.297},
  doi          = {10.1109/IPDPS.2005.297},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipps/SengarWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SwarupJP05,
  author       = {Vipin Swarup and
                  Sushil Jajodia and
                  Joseph Pamula},
  editor       = {Vladimir Gorodetsky and
                  Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Rule-Based Topological Vulnerability Analysis},
  booktitle    = {Computer Network Security, Third International Workshop on Mathematical
                  Methods, Models, and Architectures for Computer Network Security,
                  {MMM-ACNS} 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3685},
  pages        = {23--37},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11560326\_3},
  doi          = {10.1007/11560326\_3},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SwarupJP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/LiuNZJ05,
  author       = {Donggang Liu and
                  Peng Ning and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {Practical Broadcast Authentication in Sensor Networks},
  booktitle    = {2nd Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, {USA}},
  pages        = {118--132},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MOBIQUITOUS.2005.49},
  doi          = {10.1109/MOBIQUITOUS.2005.49},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/LiuNZJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/DamianiVFJPS05,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Metadata Management in Outsourced Encrypted Databases},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {16--32},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_2},
  doi          = {10.1007/11552338\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/DamianiVFJPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ05,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Protecting Privacy Against Location-Based Personal Identification},
  booktitle    = {Secure Data Management, Second {VLDB} Workshop, {SDM} 2005, Trondheim,
                  Norway, September 2-3, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3674},
  pages        = {185--199},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11552338\_13},
  doi          = {10.1007/11552338\_13},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secon/RoyASJ05,
  author       = {Sankardas Roy and
                  Venkata Gopala Krishna Addada and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Securing {MAODV:} attacks and countermeasures},
  booktitle    = {Proceedings of the Second Annual {IEEE} Communications Society Conference
                  on Sensor and Ad Hoc Communications and Networks, {SECON} 2005, September
                  26-29, 2005, Santa Clara, CA, {USA}},
  pages        = {521--532},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SAHCN.2005.1557104},
  doi          = {10.1109/SAHCN.2005.1557104},
  timestamp    = {Fri, 30 Apr 2021 18:04:33 +0200},
  biburl       = {https://dblp.org/rec/conf/secon/RoyASJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GabrielliMSJ05,
  author       = {Andrea Gabrielli and
                  Luigi V. Mancini and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Securing Topology Maintenance Protocols for Sensor Networks},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {101--112},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.34},
  doi          = {10.1109/SECURECOMM.2005.34},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GabrielliMSJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/DamianiVFJPS05,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  William Yurcik and
                  Larry Brumbaugh and
                  Yuanyuan Zhou},
  title        = {Key management for multi-user encrypted databases},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {74--83},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103780.1103792},
  doi          = {10.1145/1103780.1103792},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/DamianiVFJPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NoelJKJ05,
  author       = {Steven Noel and
                  Michael Jacobs and
                  Pramod Kalapa and
                  Sushil Jajodia},
  editor       = {Kwan{-}Liu Ma and
                  Stephen C. North and
                  William Yurcik},
  title        = {Multiple Coordinated Views for Network Attack Graphs},
  booktitle    = {2nd {IEEE} Workshop on Visualization for Computer Security, VizSEC
                  2005, Minneapolis, MN, USA, October 26, 2005},
  pages        = {12},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/VIZSEC.2005.14},
  doi          = {10.1109/VIZSEC.2005.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NoelJKJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/YaoWJ05,
  author       = {Chao Yao and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Klemens B{\"{o}}hm and
                  Christian S. Jensen and
                  Laura M. Haas and
                  Martin L. Kersten and
                  Per{-}{\AA}ke Larson and
                  Beng Chin Ooi},
  title        = {Checking for k-Anonymity Violation by Views},
  booktitle    = {Proceedings of the 31st International Conference on Very Large Data
                  Bases, Trondheim, Norway, August 30 - September 2, 2005},
  pages        = {910--921},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {http://www.vldb.org/archives/website/2005/program/paper/fri/p910-yao.pdf},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/YaoWJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/ZannoneJMW05,
  author       = {Nicola Zannone and
                  Sushil Jajodia and
                  Fabio Massacci and
                  Duminda Wijesekera},
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Maintaining privacy on derived objects},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages        = {10--19},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1102199.1102202},
  doi          = {10.1145/1102199.1102202},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/ZannoneJMW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/datamining2005/SinghalJ05,
  author       = {Anoop Singhal and
                  Sushil Jajodia},
  editor       = {Oded Maimon and
                  Lior Rokach},
  title        = {Data Mining for Intrusion Detection},
  booktitle    = {The Data Mining and Knowledge Discovery Handbook},
  pages        = {1225--1237},
  publisher    = {Springer},
  year         = {2005},
  timestamp    = {Mon, 05 Sep 2005 12:46:21 +0200},
  biburl       = {https://dblp.org/rec/books/sp/datamining2005/SinghalJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2005,
  editor       = {Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Storrs, CT, USA, August
                  7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3654},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535706},
  doi          = {10.1007/11535706},
  isbn         = {3-540-28138-X},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2005,
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980},
  doi          = {10.1007/11593980},
  isbn         = {3-540-30706-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:journals/jods/2005-2,
  editor       = {Stefano Spaccapietra and
                  Elisa Bertino and
                  Sushil Jajodia and
                  Roger King and
                  Dennis McLeod and
                  Maria E. Orlowska and
                  Leon Strous},
  title        = {Journal on Data Semantics {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3360},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b104761},
  doi          = {10.1007/B104761},
  isbn         = {3-540-24208-2},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jods/2005-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/WangWJ04,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {Cardinality-based inference control in data cubes},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {5},
  pages        = {655--692},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12501},
  doi          = {10.3233/JCS-2004-12501},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/WangWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/BettiniJWW04,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang and
                  Duminda Wijesekera},
  title        = {Reasoning with advanced policy rules and its application to access
                  control},
  journal      = {Int. J. Digit. Libr.},
  volume       = {4},
  number       = {3},
  pages        = {156--170},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00799-004-0078-8},
  doi          = {10.1007/S00799-004-0078-8},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/BettiniJWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/neuroimage/SmithJSHHFC04,
  author       = {Kenneth P. Smith and
                  Sushil Jajodia and
                  Vipin Swarup and
                  Jeffrey Hoyt and
                  Gail Hamilton and
                  Donald B. Faatz and
                  Todd Cornett},
  title        = {Enabling the sharing of neuroimaging data through well-defined intermediate
                  levels of visibility},
  journal      = {NeuroImage},
  volume       = {22},
  number       = {4},
  pages        = {1646--1656},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.neuroimage.2004.03.048},
  doi          = {10.1016/J.NEUROIMAGE.2004.03.048},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/neuroimage/SmithJSHHFC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NoelRJ04,
  author       = {Steven Noel and
                  Eric Robertson and
                  Sushil Jajodia},
  title        = {Correlating Intrusion Events and Building Attack Scenarios Through
                  Attack Graph Distances},
  booktitle    = {20th Annual Computer Security Applications Conference {(ACSAC} 2004),
                  6-10 December 2004, Tucson, AZ, {USA}},
  pages        = {350--359},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/CSAC.2004.11},
  doi          = {10.1109/CSAC.2004.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NoelRJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangWJ04,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {A logic-based framework for attribute based access control},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  pages        = {45--55},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029133.1029140},
  doi          = {10.1145/1029133.1029140},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LiSJ04,
  author       = {Yingjiu Li and
                  Vipin Swarup and
                  Sushil Jajodia},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {Defending Against Additive Attacks with Maximal Errors in Watermarking
                  Relational Databases},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {81--94},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_6},
  doi          = {10.1007/1-4020-8128-6\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LiSJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LiGJ04,
  author       = {Yingjiu Li and
                  Huiping Guo and
                  Sushil Jajodia},
  editor       = {Aggelos Kiayias and
                  Moti Yung},
  title        = {Tamper detection and localization for categorical data using fragile
                  watermarks},
  booktitle    = {Proceedings of the 2004 {ACM} Workshop on Digital Rights Management
                  2004, Washington, DC, USA, October 25, 2004},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029146.1029159},
  doi          = {10.1145/1029146.1029159},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LiGJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenWJ04,
  author       = {Shiping Chen and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Incorporating Dynamic Constraints in the Flexible Authorization Framework},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_1},
  doi          = {10.1007/978-3-540-30108-0\_1},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/JajodiaW04,
  author       = {Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {R. K. Ghosh and
                  Hrushikesha Mohanty},
  title        = {A Flexible Authorization Framework for E-Commerce},
  booktitle    = {Distributed Computing and Internet Technology, First International
                  Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3347},
  pages        = {336--345},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30555-2\_39},
  doi          = {10.1007/978-3-540-30555-2\_39},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/JajodiaW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/SardaWJ04,
  author       = {Kaushal Sarda and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {R. K. Ghosh and
                  Hrushikesha Mohanty},
  title        = {Implementing Consistency Checking in Correlating Attacks},
  booktitle    = {Distributed Computing and Internet Technology, First International
                  Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3347},
  pages        = {379--384},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30555-2\_44},
  doi          = {10.1007/978-3-540-30555-2\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/SardaWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobiquitous/ZhuSXJ04,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Shouhuai Xu and
                  Sushil Jajodia},
  title        = {{GKMPAN:} An Efficient Group Rekeying Scheme for Secure Multicast
                  in Ad-Hoc Networks},
  booktitle    = {1st Annual International Conference on Mobile and Ubiquitous Systems
                  (MobiQuitous 2004), Networking and Services, 22-25 August 2004, Cambridge,
                  MA, {USA}},
  pages        = {42--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/MOBIQ.2004.1331709},
  doi          = {10.1109/MOBIQ.2004.1331709},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobiquitous/ZhuSXJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/BettiniWJ04,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Willem Jonker and
                  Milan Petkovic},
  title        = {Identifying Sensitive Associations in Databases for Release Control},
  booktitle    = {Secure Data Management, {VLDB} 2004 Workshop, {SDM} 2004, Toronto,
                  Canada, August 30, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3178},
  pages        = {187--201},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30073-1\_14},
  doi          = {10.1007/978-3-540-30073-1\_14},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sdmw/BettiniWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/WangJW04,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Securing {OLAP} Data Cubes Against Privacy Breaches},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {161},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301322},
  doi          = {10.1109/SECPRI.2004.1301322},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/WangJW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ZhuSJN04,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia and
                  Peng Ning},
  title        = {An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected
                  False Data in Sensor Networks},
  booktitle    = {2004 {IEEE} Symposium on Security and Privacy (S{\&}P 2004), 9-12
                  May 2004, Berkeley, CA, {USA}},
  pages        = {259--271},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/SECPRI.2004.1301328},
  doi          = {10.1109/SECPRI.2004.1301328},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/ZhuSJN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/YaoWJ04,
  author       = {Chao Yao and
                  William H. Winsborough and
                  Sushil Jajodia},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {A Hierarchical Release Control Policy Framework},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {121--137},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_8},
  doi          = {10.1007/0-387-31167-X\_8},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/YaoWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/NoelJ04,
  author       = {Steven Noel and
                  Sushil Jajodia},
  editor       = {Carla E. Brodley and
                  Philip Chan and
                  Richard Lippmann and
                  William Yurcik},
  title        = {Managing attack graph complexity through visual hierarchical aggregation},
  booktitle    = {1st {ACM} Workshop on Visualization and Data Mining for Computer Security,
                  VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004},
  pages        = {109--118},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1029208.1029225},
  doi          = {10.1145/1029208.1029225},
  timestamp    = {Wed, 24 Feb 2021 16:44:20 +0100},
  biburl       = {https://dblp.org/rec/conf/vizsec/NoelJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Information Security Management, Education and Privacy, {IFIP} 18th
                  World Computer Congress, {TC11} 19th International Information Security
                  Workshops, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {148},
  publisher    = {Kluwer},
  year         = {2004},
  isbn         = {1-4020-8144-8},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ifip11/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2004,
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  isbn         = {1-4020-8142-1},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tc11-5/2003,
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b116855},
  doi          = {10.1007/B116855},
  isbn         = {978-1-4020-7900-9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/NingJW03,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Intrusion Detection in Distributed Systems - An Abstraction-Based
                  Approach},
  series       = {Advances in Information Security},
  volume       = {9},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0467-2},
  doi          = {10.1007/978-1-4615-0467-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/NingJW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/PietroMJ03,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Providing secrecy in key management protocols for large wireless sensors
                  networks},
  journal      = {Ad Hoc Networks},
  volume       = {1},
  number       = {4},
  pages        = {455--468},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1570-8705(03)00046-5},
  doi          = {10.1016/S1570-8705(03)00046-5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/PietroMJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/LiNWJ03,
  author       = {Yingjiu Li and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Discovering calendar-based temporal association rules},
  journal      = {Data Knowl. Eng.},
  volume       = {44},
  number       = {2},
  pages        = {193--218},
  year         = {2003},
  timestamp    = {Thu, 27 Nov 2003 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dke/LiNWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BarbaraGJ03,
  author       = {Daniel Barbar{\'{a}} and
                  Rajni Goel and
                  Sushil Jajodia},
  title        = {A Checksum-based Corruption Detection Technique},
  journal      = {J. Comput. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {315--330},
  year         = {2003},
  url          = {https://doi.org/10.3233/jcs-2003-11303},
  doi          = {10.3233/JCS-2003-11303},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BarbaraGJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnsm/BettiniJWW03,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang and
                  Duminda Wijesekera},
  title        = {Provisions and Obligations in Policy Rule Management},
  journal      = {J. Netw. Syst. Manag.},
  volume       = {11},
  number       = {3},
  pages        = {351--372},
  year         = {2003},
  url          = {https://doi.org/10.1023/A:1025711105609},
  doi          = {10.1023/A:1025711105609},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnsm/BettiniJWW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WijesekeraJ03,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  title        = {A propositional policy algebra for access control},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {6},
  number       = {2},
  pages        = {286--325},
  year         = {2003},
  url          = {https://doi.org/10.1145/762476.762481},
  doi          = {10.1145/762476.762481},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/WijesekeraJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/WijesekeraJPH03,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia and
                  Francesco Parisi{-}Presicce and
                  {\AA}sa Hagstr{\"{o}}m},
  title        = {Removing permissions in the flexible authorization framework},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {28},
  number       = {3},
  pages        = {209--229},
  year         = {2003},
  url          = {https://doi.org/10.1145/937598.937599},
  doi          = {10.1145/937598.937599},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/WijesekeraJPH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/MeiMJ03,
  author       = {Alessandro Mei and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed
                  File Systems},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {14},
  number       = {9},
  pages        = {885--896},
  year         = {2003},
  url          = {https://doi.org/10.1109/TPDS.2003.1233711},
  doi          = {10.1109/TPDS.2003.1233711},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/MeiMJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/NoelJOJ03,
  author       = {Steven Noel and
                  Sushil Jajodia and
                  Brian O'Berry and
                  Michael Jacobs},
  title        = {Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs},
  booktitle    = {19th Annual Computer Security Applications Conference {(ACSAC} 2003),
                  8-12 December 2003, Las Vegas, NV, {USA}},
  pages        = {86--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/CSAC.2003.1254313},
  doi          = {10.1109/CSAC.2003.1254313},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/NoelJOJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {{LEAP:} efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {62--72},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948120},
  doi          = {10.1145/948109.948120},
  timestamp    = {Tue, 10 Nov 2020 20:00:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DamianiVJPS03,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sushil Jajodia and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Balancing confidentiality and efficiency in untrusted relational DBMSs},
  booktitle    = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/948109.948124},
  doi          = {10.1145/948109.948124},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/DamianiVJPS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/SmithSJFCH03,
  author       = {Kenneth P. Smith and
                  Vipin Swarup and
                  Sushil Jajodia and
                  Donald B. Faatz and
                  Todd Cornett and
                  Jeffrey Hoyt},
  title        = {Securely sharing neuroimagery},
  booktitle    = {Proceedings of the 2003 {ACM} {CIKM} International Conference on Information
                  and Knowledge Management, New Orleans, Louisiana, USA, November 2-8,
                  2003},
  pages        = {375--377},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/956863.956934},
  doi          = {10.1145/956863.956934},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cikm/SmithSJFCH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChenWJ03,
  author       = {Shiping Chen and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {FlexFlow: {A} Flexible Flow Control Policy Specification Framework},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {358--371},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_26},
  doi          = {10.1007/1-4020-8070-0\_26},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChenWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/drm/LiSJ03,
  author       = {Yingjiu Li and
                  Vipin Swarup and
                  Sushil Jajodia},
  editor       = {Moti Yung},
  title        = {Constructing a virtual primary key for fingerprinting relational data},
  booktitle    = {Proceedings of the 2003 {ACM} workshop on Digital rights management
                  2003, Washington, DC, USA, October 27, 2003},
  pages        = {133--141},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/947380.947398},
  doi          = {10.1145/947380.947398},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/LiSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangLWJ03,
  author       = {Lingyu Wang and
                  Yingjiu Li and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Einar Snekkenes and
                  Dieter Gollmann},
  title        = {Precisely Answering Multi-dimensional Range Queries without Privacy
                  Breaches},
  booktitle    = {Computer Security - {ESORICS} 2003, 8th European Symposium on Research
                  in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2808},
  pages        = {100--115},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39650-5\_6},
  doi          = {10.1007/978-3-540-39650-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangLWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Performance Optimizations for Group Key Management Scheme},
  booktitle    = {23rd International Conference on Distributed Computing Systems {(ICDCS}
                  2003), 19-22 May 2003, Providence, RI, {USA}},
  pages        = {163},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICDCS.2003.1203463},
  doi          = {10.1109/ICDCS.2003.1203463},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/ZhuXSJ03,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {{LHAP:} {A} Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc
                  Networks},
  booktitle    = {23rd International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2003 Workshops), 19-22 May 2003, Providence, RI, {USA}},
  pages        = {749},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICDCSW.2003.1203642},
  doi          = {10.1109/ICDCSW.2003.1203642},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/ZhuXSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icnp/ZhuXSJ03,
  author       = {Sencun Zhu and
                  Shouhuai Xu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  title        = {Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks:
                  {A} Probabilistic Approach},
  booktitle    = {11th {IEEE} International Conference on Network Protocols {(ICNP}
                  2003), 4-7 November 2003, Atlanta, GA, {USA}},
  pages        = {326--335},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/ICNP.2003.1249782},
  doi          = {10.1109/ICNP.2003.1249782},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icnp/ZhuXSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwdc/ZhuJ03,
  author       = {Sencun Zhu and
                  Sushil Jajodia},
  editor       = {Samir R. Das and
                  Sajal K. Das},
  title        = {Scalable Group Rekeying for Secure Multicast: {A} Survey},
  booktitle    = {Distributed Computing - {IWDC} 2003, 5th International Workshop, Kolkata,
                  India, December 27-30, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2918},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24604-6\_1},
  doi          = {10.1007/978-3-540-24604-6\_1},
  timestamp    = {Tue, 10 Sep 2019 13:47:28 +0200},
  biburl       = {https://dblp.org/rec/conf/iwdc/ZhuJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ngc/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Burkhard Stiller and
                  Georg Carle and
                  Martin Karsten and
                  Peter Reichl},
  title        = {Adding Reliable and Self-healing Key Distribution to the Subset Difference
                  Group Rekeying Method for Secure Multicast},
  booktitle    = {Group Communications and Charges; Technology and Business Models,
                  5th {COST264} International Workshop on Networked Group Communications,
                  {NGC} 2003, and 3rd International Workshop on Internet Charging and
                  QoS Technologies, {ICQT} 2003, Munich, Germany, September 16-19, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2816},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39405-1\_10},
  doi          = {10.1007/978-3-540-39405-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ngc/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/BarbaraLLJC03,
  author       = {Daniel Barbar{\'{a}} and
                  Yi Li and
                  Jia{-}Ling Lin and
                  Sushil Jajodia and
                  Julia Couto},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Bootstrapping a Data Mining Intrusion Detection System},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {421--425},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952616},
  doi          = {10.1145/952532.952616},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/BarbaraLLJC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/WilliamsFJC03,
  author       = {Douglas E. Williams and
                  Amgad Fayad and
                  Sushil Jajodia and
                  Daniel Calle},
  editor       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati and
                  Pierangela Samarati and
                  Sokratis K. Katsikas},
  title        = {A User Friendly Guard with Mobile Post-Release Access Control Policy},
  booktitle    = {Security and Privacy in the Age of Uncertainty, {IFIP} {TC11} 18\({}^{\mbox{th}}\)
                  International Conference on Information Security (SEC2003), May 26-28,
                  2003, Athens, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {250},
  pages        = {265--276},
  publisher    = {Kluwer},
  year         = {2003},
  timestamp    = {Fri, 25 Apr 2003 10:12:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/WilliamsFJC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sensys/ZhuSJ03,
  author       = {Sencun Zhu and
                  Sanjeev Setia and
                  Sushil Jajodia},
  editor       = {Ian F. Akyildiz and
                  Deborah Estrin and
                  David E. Culler and
                  Mani B. Srivastava},
  title        = {{LEAP} - efficient security mechanisms for large-scale distributed
                  sensor networks},
  booktitle    = {Proceedings of the 1st International Conference on Embedded Networked
                  Sensor Systems, SenSys 2003, Los Angeles, California, USA, November
                  5-7, 2003},
  pages        = {308--309},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/958491.958534},
  doi          = {10.1145/958491.958534},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sensys/ZhuSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/DamianiVFPSJ03,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Mario Finetti and
                  Stefano Paraboschi and
                  Pierangela Samarati and
                  Sushil Jajodia},
  title        = {Implementation of a Storage Mechanism for Untrusted DBMSs},
  booktitle    = {2nd International {IEEE} Security in Storage Workshop {(SISW} 2003),
                  Information Assurance, The Storage Security Perspective, 31 October
                  2003, Washington, DC, {USA}},
  pages        = {38--46},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SISW.2003.10006},
  doi          = {10.1109/SISW.2003.10006},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/DamianiVFPSJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/BettiniWJ03,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Leon Strous},
  title        = {A Learning-based Approach to Information Release Control},
  booktitle    = {Integrity and Internal Control in Information Systems {VI} - {IFIP}
                  {TC11/WG11.5} Sixth Working Conference on Integrity and Internal Control
                  in Information Systems {(IICIS)} 13-14 November 2003, Lausanne, Switzerland},
  series       = {{IFIP}},
  volume       = {140},
  pages        = {83--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-7901-X\_6},
  doi          = {10.1007/1-4020-7901-X\_6},
  timestamp    = {Tue, 23 May 2017 01:07:20 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/BettiniWJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waim/Jajodia03,
  author       = {Sushil Jajodia},
  editor       = {Guozhu Dong and
                  Changjie Tang and
                  Wei Wang},
  title        = {Recent Advances in Access Control Models},
  booktitle    = {Advances in Web-Age Information Management, 4th International Conference,
                  {WAIM} 2003, Chengdu, China, August 17-19, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2762},
  pages        = {1},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45160-0\_1},
  doi          = {10.1007/978-3-540-45160-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/waim/Jajodia03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003,
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=948109},
  isbn         = {1-58113-738-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2003,
  editor       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Paul F. Syverson},
  title        = {Proceedings of the 2003 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2003, Washington, DC, USA, October 30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-776-1},
  timestamp    = {Wed, 16 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/xmlsec/2003,
  editor       = {Sushil Jajodia and
                  Michiharu Kudo},
  title        = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax,
                  VA, USA, October 31, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  isbn         = {1-58113-777-X},
  timestamp    = {Thu, 07 Feb 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/xmlsec/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ai/BettiniWJ02,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Solving multi-granularity temporal constraint networks},
  journal      = {Artif. Intell.},
  volume       = {140},
  number       = {1/2},
  pages        = {107--152},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0004-3702(02)00223-0},
  doi          = {10.1016/S0004-3702(02)00223-0},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ai/BettiniWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/NingWJ02,
  author       = {Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {An Algebraic Representation of Calendars},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {36},
  number       = {1-2},
  pages        = {5--38},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1015835418881},
  doi          = {10.1023/A:1015835418881},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/NingWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NingJW02,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Design and implementation of a decentralized prototype system for
                  detecting distributed attacks},
  journal      = {Comput. Commun.},
  volume       = {25},
  number       = {15},
  pages        = {1374--1391},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0140-3664(02)00039-7},
  doi          = {10.1016/S0140-3664(02)00039-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NingJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/ChapinFJF02,
  author       = {Susan Chapin and
                  Donald B. Faatz and
                  Sushil Jajodia and
                  Amgad Fayad},
  title        = {Consistent policy enforcement in distributed systems using mobile
                  policies},
  journal      = {Data Knowl. Eng.},
  volume       = {43},
  number       = {3},
  pages        = {261--280},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0169-023X(02)00128-3},
  doi          = {10.1016/S0169-023X(02)00128-3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/ChapinFJF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/BettiniWJ02,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Temporal Reasoning in Workflow Systems},
  journal      = {Distributed Parallel Databases},
  volume       = {11},
  number       = {3},
  pages        = {269--306},
  year         = {2002},
  url          = {https://doi.org/10.1023/A:1014048800604},
  doi          = {10.1023/A:1014048800604},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/BettiniWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiWWJ02,
  author       = {Yingjiu Li and
                  Ningning Wu and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Enhancing Profiles for Anomaly Detection Using Time Granularities},
  journal      = {J. Comput. Secur.},
  volume       = {10},
  number       = {1/2},
  pages        = {137--158},
  year         = {2002},
  url          = {https://doi.org/10.3233/jcs-2002-101-206},
  doi          = {10.3233/JCS-2002-101-206},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiWWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pe/SetiaZJ02,
  author       = {Sanjeev Setia and
                  Sencun Zhu and
                  Sushil Jajodia},
  title        = {A comparative performance analysis of reliable group rekey transport
                  protocols for secure multicast},
  journal      = {Perform. Evaluation},
  volume       = {49},
  number       = {1/4},
  pages        = {21--41},
  year         = {2002},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pe/SetiaZJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigkdd/FarkasJ02,
  author       = {Csilla Farkas and
                  Sushil Jajodia},
  title        = {The Inference Problem: {A} Survey},
  journal      = {{SIGKDD} Explor.},
  volume       = {4},
  number       = {2},
  pages        = {6--11},
  year         = {2002},
  url          = {https://doi.org/10.1145/772862.772864},
  doi          = {10.1145/772862.772864},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigkdd/FarkasJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AmmannJL02,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Peng Liu},
  title        = {Recovery from Malicious Transactions},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {14},
  number       = {5},
  pages        = {1167--1185},
  year         = {2002},
  url          = {https://doi.org/10.1109/TKDE.2002.1033782},
  doi          = {10.1109/TKDE.2002.1033782},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AmmannJL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/LiWWJ02,
  author       = {Yingjiu Li and
                  Lingyu Wang and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Anne Banks Pidduck and
                  John Mylopoulos and
                  Carson C. Woo and
                  M. Tamer {\"{O}}zsu},
  title        = {Auditing Interval-Based Inference},
  booktitle    = {Advanced Information Systems Engineering, 14th International Conference,
                  CAiSE 2002, Toronto, Canada, May 27-31, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2348},
  pages        = {553--567},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-47961-9\_38},
  doi          = {10.1007/3-540-47961-9\_38},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/LiWWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WijesekeraJ02,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri},
  title        = {Policy algebras for access control the predicate case},
  booktitle    = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages        = {171--180},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/586110.586134},
  doi          = {10.1145/586110.586134},
  timestamp    = {Tue, 10 Nov 2020 20:00:47 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WijesekeraJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WangWJ02,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Towards Secure {XML} Federations},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {117--131},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 02 Jan 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/WangWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarbaraGJ02,
  author       = {Daniel Barbar{\'{a}} and
                  Rajni Goel and
                  Sushil Jajodia},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Mining Malicious Corruption of Data with Hidden Markov Models},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {175--189},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarbaraGJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WangWJ02,
  author       = {Lingyu Wang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Cardinality-Based Inference Control in Sum-Only Data Cubes},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_4},
  doi          = {10.1007/3-540-45853-0\_4},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WangWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/foiks/LiZWJ02,
  author       = {Yingjiu Li and
                  Sencun Zhu and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Thomas Eiter and
                  Klaus{-}Dieter Schewe},
  title        = {A Privacy-Enhanced Microaggregation Method},
  booktitle    = {Foundations of Information and Knowledge Systems, Second International
                  Symposium, FoIKS 2002 Salzau Castle, Germany, February 20-23, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2284},
  pages        = {148--159},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45758-5\_10},
  doi          = {10.1007/3-540-45758-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/foiks/LiZWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/LiWJ02,
  author       = {Yingjiu Li and
                  Lingyu Wang and
                  Sushil Jajodia},
  editor       = {Roger Dingledine and
                  Paul F. Syverson},
  title        = {Preventing Interval-Based Inference by Random Data Perturbation},
  booktitle    = {Privacy Enhancing Technologies, Second International Workshop, {PET}
                  2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2482},
  pages        = {160--170},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36467-6\_12},
  doi          = {10.1007/3-540-36467-6\_12},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/pet/LiWJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/BettiniJWW02,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang and
                  Duminda Wijesekera},
  title        = {Obligation Monitoring in Policy Management},
  booktitle    = {3rd International Workshop on Policies for Distributed Systems and
                  Networks {(POLICY} 2002), 5-7 June 2002, Monterey, CA, {USA}},
  pages        = {2--12},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/POLICY.2002.1011288},
  doi          = {10.1109/POLICY.2002.1011288},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/BettiniJWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pomc/PietroMJ02,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Efficient and secure keys management for wireless mobile communications},
  booktitle    = {Proceedings of the 2002 Workshop on Principles of Mobile Computing,
                  {POMC} 2002, October 30-31, 2002, Toulouse, France},
  pages        = {66--73},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {https://doi.org/10.1145/584490.584504},
  doi          = {10.1145/584490.584504},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pomc/PietroMJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PietroMJ02,
  author       = {Roberto Di Pietro and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Secure Selective Exclusion in Ad Hoc Wireless Network},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {423--434},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/PietroMJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/SmithFFJ02,
  author       = {Kenneth P. Smith and
                  Donald B. Faatz and
                  Amgad Fayad and
                  Sushil Jajodia},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Propagating Modifications to Mobile Policies},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {573--584},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Mon, 29 Aug 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/SmithFFJ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/BettiniJWW02,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang and
                  Duminda Wijesekera},
  title        = {Provisions and Obligations in Policy Management and Security Applications},
  booktitle    = {Proceedings of 28th International Conference on Very Large Data Bases,
                  {VLDB} 2002, Hong Kong, August 20-23, 2002},
  pages        = {502--513},
  publisher    = {Morgan Kaufmann},
  year         = {2002},
  url          = {http://www.vldb.org/conf/2002/S14P03.pdf},
  doi          = {10.1016/B978-155860869-6/50051-2},
  timestamp    = {Thu, 12 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/BettiniJWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/02/BarbaraCJW02,
  author       = {Daniel Barbar{\'{a}} and
                  Julia Couto and
                  Sushil Jajodia and
                  Ningning Wu},
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {An Architecture for Anomaly Detection},
  booktitle    = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0\_3},
  doi          = {10.1007/978-1-4615-0953-0\_3},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/BarbaraCJW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/02/BJ2002,
  editor       = {Daniel Barbar{\'{a}} and
                  Sushil Jajodia},
  title        = {Applications of Data Mining in Computer Security},
  series       = {Advances in Information Security},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-0953-0},
  doi          = {10.1007/978-1-4615-0953-0},
  isbn         = {9781461353218},
  timestamp    = {Fri, 26 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/02/BJ2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2002,
  editor       = {Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Proceedings of the 2002 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2002, Washington, DC, USA, November 21, 2002},
  publisher    = {{ACM}},
  year         = {2002},
  isbn         = {1-58113-633-1},
  timestamp    = {Wed, 16 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/LiuNJ01,
  author       = {Peng Liu and
                  Peng Ning and
                  Sushil Jajodia},
  title        = {Avoiding loss of fairness owing to failures in fair data exchange
                  systems},
  journal      = {Decis. Support Syst.},
  volume       = {31},
  number       = {3},
  pages        = {337--350},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0167-9236(00)00141-X},
  doi          = {10.1016/S0167-9236(00)00141-X},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dss/LiuNJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/JajodiaW01,
  author       = {Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Security in Federated Database Systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {6},
  number       = {2},
  pages        = {69--79},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1363-4127(01)00208-4},
  doi          = {10.1016/S1363-4127(01)00208-4},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/JajodiaW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JajodiaAKMM01,
  author       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Thomas F. Keefe and
                  Catherine D. McCollum and
                  Ravi Mukkamala},
  title        = {Multilevel Security Transaction Processing},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {165--195},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-9301},
  doi          = {10.3233/JCS-2001-9301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JajodiaAKMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/BarbaraCJW01,
  author       = {Daniel Barbar{\'{a}} and
                  Julia Couto and
                  Sushil Jajodia and
                  Ningning Wu},
  title        = {{ADAM:} {A} Testbed for Exploring the Use of Data Mining in Intrusion
                  Detection},
  journal      = {{SIGMOD} Rec.},
  volume       = {30},
  number       = {4},
  pages        = {15--24},
  year         = {2001},
  url          = {https://doi.org/10.1145/604264.604268},
  doi          = {10.1145/604264.604268},
  timestamp    = {Fri, 05 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigmod/BarbaraCJW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/NingJW01,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Abstraction-based intrusion detection in distributed environments},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {407--452},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503342},
  doi          = {10.1145/503339.503342},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/NingJW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/SamaratiRJ01,
  author       = {Pierangela Samarati and
                  Michael K. Reiter and
                  Sushil Jajodia},
  title        = {An authorization model for a public key management service},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {453--482},
  year         = {2001},
  url          = {https://doi.org/10.1145/503339.503343},
  doi          = {10.1145/503339.503343},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/SamaratiRJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/JajodiaSSS01,
  author       = {Sushil Jajodia and
                  Pierangela Samarati and
                  Maria Luisa Sapino and
                  V. S. Subrahmanian},
  title        = {Flexible support for multiple access control policies},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {26},
  number       = {2},
  pages        = {214--260},
  year         = {2001},
  url          = {https://doi.org/10.1145/383891.383894},
  doi          = {10.1145/383891.383894},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tods/JajodiaSSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WijesekeraJ01,
  author       = {Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Policy algebras for access control: the propositional case},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501990},
  doi          = {10.1145/501983.501990},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WijesekeraJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/HagstromJPW01,
  author       = {{\AA}sa Hagstr{\"{o}}m and
                  Sushil Jajodia and
                  Francesco Parisi{-}Presicce and
                  Duminda Wijesekera},
  title        = {Revocations-A Classification},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {44--58},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930135},
  doi          = {10.1109/CSFW.2001.930135},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/HagstromJPW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LiuJ01,
  author       = {Peng Liu and
                  Sushil Jajodia},
  title        = {Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance},
  booktitle    = {14th {IEEE} Computer Security Foundations Workshop {(CSFW-14} 2001),
                  11-13 June 2001, Cape Breton, Nova Scotia, Canada},
  pages        = {191--205},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/CSFW.2001.930146},
  doi          = {10.1109/CSFW.2001.930146},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/LiuJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaW01,
  author       = {Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {Recent Advances in Access Control Models},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {3--15},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 13:50:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/YangWJ01,
  author       = {Jacqueline Yang and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {Subject Switching Algorithms for Access Control in Federated Databases},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {61--74},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/YangWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MukkamalaJ01,
  author       = {Ravi Mukkamala and
                  Sushil Jajodia},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {A Novel Approach to Certificate Revocation Management},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {225--238},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MukkamalaJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/BarbaraWJ01,
  author       = {Daniel Barbar{\'{a}} and
                  Ningning Wu and
                  Sushil Jajodia},
  editor       = {Vipin Kumar and
                  Robert L. Grossman},
  title        = {Detecting Novel Network Intrusions Using Bayes Estimators},
  booktitle    = {Proceedings of the First {SIAM} International Conference on Data Mining,
                  {SDM} 2001, Chicago, IL, USA, April 5-7, 2001},
  pages        = {1--17},
  publisher    = {{SIAM}},
  year         = {2001},
  url          = {https://doi.org/10.1137/1.9781611972719.28},
  doi          = {10.1137/1.9781611972719.28},
  timestamp    = {Wed, 17 May 2017 14:24:53 +0200},
  biburl       = {https://dblp.org/rec/conf/sdm/BarbaraWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sebd/BettiniWJ01,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Augusto Celentano and
                  Letizia Tanca and
                  Paolo Tiberio},
  title        = {Minimizing Agent Synchronization in Workflow Systems with Temporal
                  Constraints},
  booktitle    = {Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, {SEBD} 2001,
                  Venezia, Italy, 27-29 Giugno 2001},
  pages        = {339--346},
  year         = {2001},
  timestamp    = {Mon, 18 Jan 2016 11:07:09 +0100},
  biburl       = {https://dblp.org/rec/conf/sebd/BettiniWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/FayadJFD01,
  author       = {Amgad Fayad and
                  Sushil Jajodia and
                  Donald B. Faatz and
                  Vinti Doshi},
  editor       = {Michel Dupuy and
                  Pierre Paradinas},
  title        = {Going Beyond {MAC} and {DAC} Using Mobile Policies},
  booktitle    = {Trusted Information: The New Decade Challenge, {IFIP} {TC11} Sixteenth
                  Annual Working Conference on Information Security (IFIP/Sec'01), June
                  11-13, 2001, Paris, France},
  series       = {{IFIP} Conference Proceedings},
  volume       = {193},
  pages        = {245--260},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Fri, 26 Jul 2002 13:05:24 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/FayadJFD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/LiNWJ01,
  author       = {Yingjiu Li and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Discovering Calendar-based Temporal Association Rules},
  booktitle    = {Eigth International Symposium on Temporal Representation and Reasoning,
                  TIME-01, Civdale del Friuli, Italy, June 14-16, 2001},
  pages        = {111--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/TIME.2001.930706},
  doi          = {10.1109/TIME.2001.930706},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/LiNWJ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaKS01,
  author       = {Sushil Jajodia and
                  Michiharu Kudo and
                  V. S. Subrahmanian},
  editor       = {Anup K. Ghosh},
  title        = {Provisional Authorizations},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {133--159},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_8},
  doi          = {10.1007/978-1-4615-1467-1\_8},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaKS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/er/2001,
  editor       = {Hideko S. Kunii and
                  Sushil Jajodia and
                  Arne S{\o}lvberg},
  title        = {Conceptual Modeling - {ER} 2001, 20th International Conference on
                  Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2224},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45581-7},
  doi          = {10.1007/3-540-45581-7},
  isbn         = {3-540-42866-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0007577,
  author       = {Claudio Bettini and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Time granularities in databases, data mining, and temporal reasoning},
  publisher    = {Springer},
  year         = {2000},
  url          = {http://www.springer.com/computer/swe/book/978-3-540-66997-5},
  isbn         = {978-3-540-66997-5},
  timestamp    = {Mon, 18 Apr 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/daglib/0007577.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NingWJ00,
  author       = {Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Modeling requests among cooperating intrusion detection systems},
  journal      = {Comput. Commun.},
  volume       = {23},
  number       = {17},
  pages        = {1702--1715},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0140-3664(00)00256-5},
  doi          = {10.1016/S0140-3664(00)00256-5},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NingWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/LiuAJ00,
  author       = {Peng Liu and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {Rewriting Histories: Recovering from Malicious Transactions},
  journal      = {Distributed Parallel Databases},
  volume       = {8},
  number       = {1},
  pages        = {7--40},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1008731200105},
  doi          = {10.1023/A:1008731200105},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/LiuAJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/ManciniRJB00,
  author       = {Luigi V. Mancini and
                  Indrajit Ray and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {Flexible Transaction Dependencies in Database Systems},
  journal      = {Distributed Parallel Databases},
  volume       = {8},
  number       = {4},
  pages        = {399--446},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1008738705440},
  doi          = {10.1023/A:1008738705440},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/ManciniRJB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/RayAJ00,
  author       = {Indrakshi Ray and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {Using semantic correctness in multidatabases to achieve local autonomy,
                  distribute coordination, and maintain global integrity},
  journal      = {Inf. Sci.},
  volume       = {129},
  number       = {1-4},
  pages        = {155--195},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0020-0255(00)00062-1},
  doi          = {10.1016/S0020-0255(00)00062-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/RayAJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LiuJM00,
  author       = {Peng Liu and
                  Sushil Jajodia and
                  Catherine D. McCollum},
  title        = {Intrusion Confinement by Isolation in Information Systems},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {243--279},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-8402},
  doi          = {10.3233/JCS-2000-8402},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LiuJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/RayMJB00,
  author       = {Indrajit Ray and
                  Luigi V. Mancini and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {{ASEP:} {A} Secure and Flexible Commit Protocol for {MLS} Distributed
                  Database Systems},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {12},
  number       = {6},
  pages        = {880--899},
  year         = {2000},
  url          = {https://doi.org/10.1109/69.895800},
  doi          = {10.1109/69.895800},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/RayMJB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BrodskyFJ00,
  author       = {Alexander Brodsky and
                  Csilla Farkas and
                  Sushil Jajodia},
  title        = {Secure Databases: Constraints, Inference Channels, and Monitoring
                  Disclosures},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {12},
  number       = {6},
  pages        = {900--919},
  year         = {2000},
  url          = {https://doi.org/10.1109/69.895801},
  doi          = {10.1109/69.895801},
  timestamp    = {Wed, 13 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tkde/BrodskyFJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoshiFJM00,
  author       = {Vinti Doshi and
                  Amgad Fayad and
                  Sushil Jajodia and
                  Roswitha MacLean},
  title        = {Using Attribute Certificates with Mobile Policies in Electronic Commerce
                  Applications},
  booktitle    = {16th Annual Computer Security Applications Conference {(ACSAC} 2000),
                  11-15 December 2000, New Orleans, Louisiana, {USA}},
  pages        = {298--307},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ACSAC.2000.898884},
  doi          = {10.1109/ACSAC.2000.898884},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/DoshiFJM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChapinFJ00,
  author       = {Susan Chapin and
                  Donald B. Faatz and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Distributed Policies for Data Management - Making Policies Mobile},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {63--75},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_6},
  doi          = {10.1007/0-306-47008-X\_6},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChapinFJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarbaraGJ00,
  author       = {Daniel Barbar{\'{a}} and
                  Rajni Goel and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Protecting File systems Against Corruption Using Checksums},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {113--124},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_10},
  doi          = {10.1007/0-306-47008-X\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BarbaraGJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dsn/LiuNJ00,
  author       = {Peng Liu and
                  Peng Ning and
                  Sushil Jajodia},
  title        = {Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange
                  Protocols},
  booktitle    = {2000 International Conference on Dependable Systems and Networks {(DSN}
                  2000) (formerly {FTCS-30} and DCCA-8), 25-28 June 2000, New York,
                  NY, {USA}},
  pages        = {631--640},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/ICDSN.2000.857600},
  doi          = {10.1109/ICDSN.2000.857600},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dsn/LiuNJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/BarbaraGJ00,
  author       = {Daniel Barbar{\'{a}} and
                  Rajni Goel and
                  Sushil Jajodia},
  editor       = {Carlo Zaniolo and
                  Peter C. Lockemann and
                  Marc H. Scholl and
                  Torsten Grust},
  title        = {Using Checksums to Detect Data Corruption},
  booktitle    = {Advances in Database Technology - {EDBT} 2000, 7th International Conference
                  on Extending Database Technology, Konstanz, Germany, March 27-31,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1777},
  pages        = {136--149},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-46439-5\_9},
  doi          = {10.1007/3-540-46439-5\_9},
  timestamp    = {Thu, 23 Jun 2022 19:56:44 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/BarbaraGJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/YangNWJ00,
  author       = {Jiahai Yang and
                  Peng Ning and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Sihan Qing and
                  Jan H. P. Eloff},
  title        = {{CARDS:} {A} Distributed System for Detecting Coordinated Attacks},
  booktitle    = {Information Security for Global Information Infrastructures, {IFIP}
                  {TC11} Fifteenth Annual Working Conference on Information Security,
                  August 22-24, 2000, Beijing, China},
  series       = {{IFIP} Conference Proceedings},
  volume       = {175},
  pages        = {171--180},
  publisher    = {Kluwer},
  year         = {2000},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/YangNWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/SetiaKJH00,
  author       = {Sanjeev Setia and
                  Samir Koussih and
                  Sushil Jajodia and
                  Eric Harder},
  title        = {Kronos: {A} Scalable Group Re-Keying Approach for Secure Multicast},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {215--228},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848459},
  doi          = {10.1109/SECPRI.2000.848459},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/SetiaKJH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/BettiniWJ00,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Free Schedules for Free Agents in Workflow Systems},
  booktitle    = {Seventh International Workshop on Temporal Representation and Reasoning,
                  {TIME} 2000, Nova Scotia, Canada, July 7-9, 2000},
  pages        = {31--37},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/TIME.2000.856582},
  doi          = {10.1109/TIME.2000.856582},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/BettiniWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tsdm/LiWJ00,
  author       = {Yingjiu Li and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {John F. Roddick and
                  Kathleen Hornsby},
  title        = {Discovering Temporal Patterns in Multiple Granularities},
  booktitle    = {Temporal, Spatial, and Spatio-Temporal Data Mining, First International
                  Workshop {TSDM} 2000 Lyon, France, September 12, 2000, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2007},
  pages        = {5--19},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45244-3\_2},
  doi          = {10.1007/3-540-45244-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/tsdm/LiWJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2000,
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {http://dl.acm.org/citation.cfm?id=352600},
  isbn         = {1-58113-203-4},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/JajodiaMA99,
  author       = {Sushil Jajodia and
                  Catherine D. McCollum and
                  Paul Ammann},
  title        = {Trusted Recovery},
  journal      = {Commun. {ACM}},
  volume       = {42},
  number       = {7},
  pages        = {71--75},
  year         = {1999},
  url          = {https://doi.org/10.1145/306549.306580},
  doi          = {10.1145/306549.306580},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/JajodiaMA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JajodiaAM99,
  author       = {Sushil Jajodia and
                  Paul Ammann and
                  Catherine D. McCollum},
  title        = {Surviving Information Warfare Attacks},
  journal      = {Computer},
  volume       = {32},
  number       = {4},
  pages        = {57--63},
  year         = {1999},
  url          = {https://doi.org/10.1109/2.755006},
  doi          = {10.1109/2.755006},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JajodiaAM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/AmmannJ99,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  title        = {Computer Security, Fault Tolerance, And Software Assurance},
  journal      = {{IEEE} Concurr.},
  volume       = {7},
  number       = {1},
  pages        = {4--6},
  year         = {1999},
  url          = {https://doi.org/10.1109/MCC.1999.749129},
  doi          = {10.1109/MCC.1999.749129},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeecc/AmmannJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/Jajodia99a,
  author       = {Sushil Jajodia},
  title        = {Data replication gaining popularity},
  journal      = {{IEEE} Concurr.},
  volume       = {7},
  number       = {2},
  pages        = {85--86},
  year         = {1999},
  url          = {https://doi.org/10.1109/MCC.1999.766976},
  doi          = {10.1109/MCC.1999.766976},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeecc/Jajodia99a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/Jajodia99,
  author       = {Sushil Jajodia},
  title        = {Distributed Databases: Turing Award Winner Jim Gray on the new millennium},
  journal      = {{IEEE} Concurr.},
  volume       = {7},
  number       = {3},
  pages        = {9--10},
  year         = {1999},
  url          = {https://doi.org/10.1109/MCC.1999.788774},
  doi          = {10.1109/MCC.1999.788774},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeecc/Jajodia99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhangLJ99,
  author       = {Chunru Zhang and
                  Kwok{-}Yan Lam and
                  Sushil Jajodia},
  title        = {Scalable Threshold Closure},
  journal      = {Theor. Comput. Sci.},
  volume       = {226},
  number       = {1-2},
  pages        = {185--206},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0304-3975(99)00072-9},
  doi          = {10.1016/S0304-3975(99)00072-9},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhangLJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tois/BertinoJS99,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {A Flexible Authorization Mechanism for Relational Data Management
                  Systems},
  journal      = {{ACM} Trans. Inf. Syst.},
  volume       = {17},
  number       = {2},
  pages        = {101--140},
  year         = {1999},
  url          = {https://doi.org/10.1145/306686.306687},
  doi          = {10.1145/306686.306687},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tois/BertinoJS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/FayadJM99,
  author       = {Amgad Fayad and
                  Sushil Jajodia and
                  Catherine D. McCollum},
  title        = {Application-Level Isolation Using Data Inconsistency Detection},
  booktitle    = {15th Annual Computer Security Applications Conference {(ACSAC} 1999),
                  6-10 December 1999, Scottsdale, AZ, {USA}},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/CSAC.1999.816019},
  doi          = {10.1109/CSAC.1999.816019},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/FayadJM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/LiuJM99,
  author       = {Peng Liu and
                  Sushil Jajodia and
                  Catherine D. McCollum},
  editor       = {Vijayalakshmi Atluri and
                  John Hale},
  title        = {Intrusion Confinement by Isolation in Information Systems},
  booktitle    = {Research Advances in Database and Information Systems Security, {IFIP}
                  {WG} 11.3 Thirteenth International Conference on Database Security,
                  July 26-28, 1999, Seattle, Washington, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {171},
  pages        = {3--18},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Tue, 09 Jul 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/LiuJM99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MukkamalaGJ99,
  author       = {Ravi Mukkamala and
                  Jason Gagnon and
                  Sushil Jajodia},
  editor       = {Vijayalakshmi Atluri and
                  John Hale},
  title        = {Integrating Data Mining Techniques with Intrusion Detection Methods},
  booktitle    = {Research Advances in Database and Information Systems Security, {IFIP}
                  {WG} 11.3 Thirteenth International Conference on Database Security,
                  July 26-28, 1999, Seattle, Washington, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {171},
  pages        = {33--46},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MukkamalaGJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/LiuAJ99,
  author       = {Peng Liu and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {Incorporating Transaction Semantics to Reduce Reprocessing Overhead
                  in Replicated Mobile Data Applications},
  booktitle    = {Proceedings of the 19th International Conference on Distributed Computing
                  Systems, Austin, TX, USA, May 31 - June 4, 1999},
  pages        = {414--423},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICDCS.1999.776543},
  doi          = {10.1109/ICDCS.1999.776543},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/LiuAJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/Jajodia99,
  author       = {Sushil Jajodia},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Protecting Critical Information Systems (Abstract)},
  booktitle    = {Information and Communication Security, Second International Conference,
                  ICICS'99, Sydney, Australia, November 9-11, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1726},
  pages        = {143},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-47942-0\_12},
  doi          = {10.1007/978-3-540-47942-0\_12},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/Jajodia99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JohnsonDJ99,
  author       = {Neil F. Johnson and
                  Zoran Duric and
                  Sushil Jajodia},
  editor       = {Andreas Pfitzmann},
  title        = {Recovery of Watermarks from Distorted Images},
  booktitle    = {Information Hiding, Third International Workshop, IH'99, Dresden,
                  Germany, September 29 - October 1, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1768},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/10719724\_22},
  doi          = {10.1007/10719724\_22},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JohnsonDJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mis/JohnsonDJ99,
  author       = {Neil F. Johnson and
                  Zoran Duric and
                  Sushil Jajodia},
  editor       = {Leana Golubchik and
                  Vassilis J. Tsotras},
  title        = {On Fingerprinting Images for Recognition},
  booktitle    = {{MIS} '99, 5th Workshop on Multimedia Information Systems, 21-23 October
                  1999, Indian Wells, California, Proceedings},
  pages        = {4--11},
  year         = {1999},
  timestamp    = {Tue, 12 Mar 2013 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mis/JohnsonDJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/AmmannJ99,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  editor       = {Margaret E. van Biene{-}Hershey and
                  Leon Strous},
  title        = {The Integrity Challenge},
  booktitle    = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, Third Working Conference on Integrity and Internal
                  Control in Information Systems: Strategic Views on the Need for Control,
                  Amsterdam, The Netherlands, November 18-19, 1999},
  series       = {{IFIP} Conference Proceedings},
  volume       = {165},
  pages        = {59--70},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Thu, 22 Aug 2002 09:18:50 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/AmmannJ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/1998,
  editor       = {Sushil Jajodia},
  title        = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  publisher    = {Kluwer},
  year         = {1999},
  isbn         = {0-7923-8488-1},
  timestamp    = {Mon, 21 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amai/BettiniWJ98,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {A General Framework for Time Granularity and Its Application to Temporal
                  Reasoning},
  journal      = {Ann. Math. Artif. Intell.},
  volume       = {22},
  number       = {1-2},
  pages        = {29--58},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1018938007511},
  doi          = {10.1023/A:1018938007511},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amai/BettiniWJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/JohnsonJ98,
  author       = {Neil F. Johnson and
                  Sushil Jajodia},
  title        = {Exploring Steganography: Seeing the Unseen},
  journal      = {Computer},
  volume       = {31},
  number       = {2},
  pages        = {26--34},
  year         = {1998},
  url          = {https://doi.org/10.1109/MC.1998.4655281},
  doi          = {10.1109/MC.1998.4655281},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/JohnsonJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/BettiniWJ98,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Mining Temporal Relationships with Multiple Granularities in Time
                  Sequences},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {21},
  number       = {1},
  pages        = {32--38},
  year         = {1998},
  url          = {http://sites.computer.org/debull/98mar/bettini1.ps},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/BettiniWJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/Jajodia98,
  author       = {Sushil Jajodia},
  title        = {Interview: Amit Sheth On Workflow Technology},
  journal      = {{IEEE} Concurr.},
  volume       = {6},
  number       = {2},
  pages        = {21--23},
  year         = {1998},
  url          = {https://doi.org/10.1109/MCC.1998.678785},
  doi          = {10.1109/MCC.1998.678785},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeecc/Jajodia98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijait/WangJM98,
  author       = {Xiaoyang Sean Wang and
                  Sushil Jajodia and
                  Sona Mohavni},
  title        = {Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal
                  Information},
  journal      = {Int. J. Artif. Intell. Tools},
  volume       = {7},
  number       = {2},
  pages        = {319--339},
  year         = {1998},
  url          = {https://doi.org/10.1142/S0218213098000159},
  doi          = {10.1142/S0218213098000159},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijait/WangJM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/RayAJ98,
  author       = {Indrakshi Ray and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {A Semantic-Based Transaction Processing Model for Multilevel Transactions},
  journal      = {J. Comput. Secur.},
  volume       = {6},
  number       = {3},
  pages        = {181--217},
  year         = {1998},
  url          = {https://doi.org/10.3233/jcs-980108},
  doi          = {10.3233/JCS-980108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/RayAJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BertinoJMR98,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Luigi V. Mancini and
                  Indrajit Ray},
  title        = {Advanced Transaction Processing in Multilevel Secure File Stores},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {10},
  number       = {1},
  pages        = {120--135},
  year         = {1998},
  url          = {https://doi.org/10.1109/69.667095},
  doi          = {10.1109/69.667095},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/BertinoJMR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BettiniWJL98,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia and
                  Jia{-}Ling Lin},
  title        = {Discovering Frequent Event Patterns with Multiple Granularities in
                  Time Sequences},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {10},
  number       = {2},
  pages        = {222--237},
  year         = {1998},
  url          = {https://doi.org/10.1109/69.683754},
  doi          = {10.1109/69.683754},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/BettiniWJL98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BettiniWJ98,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Temporal Semantic Assumptions and Their Use in Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {10},
  number       = {2},
  pages        = {277--296},
  year         = {1998},
  url          = {https://doi.org/10.1109/69.683757},
  doi          = {10.1109/69.683757},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/BettiniWJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JajodiaLM98,
  author       = {Sushil Jajodia and
                  Peng Liu and
                  Catherine D. McCollum},
  title        = {Application-Level Isolation to Cope with Malicious Database Users},
  booktitle    = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
                  7-11 December 1998, Scottsdale, AZ, {USA}},
  pages        = {73--82},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSAC.1998.738580},
  doi          = {10.1109/CSAC.1998.738580},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JajodiaLM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JajodiaMS98,
  author       = {Sushil Jajodia and
                  Luigi V. Mancini and
                  Sanjeev Setia},
  title        = {A Fair Locking Protocol for Multilevel Secure Databases},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {168--178},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683167},
  doi          = {10.1109/CSFW.1998.683167},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/JajodiaMS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/LinWJ98,
  author       = {Jia{-}Ling Lin and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  title        = {Abstraction-Based Misuse Detection: High-Level Specifications and
                  Adaptable Strategies},
  booktitle    = {Proceedings of the 11th {IEEE} Computer Security Foundations Workshop,
                  Rockport, Massachusetts, USA, June 9-11, 1998},
  pages        = {190--201},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/CSFW.1998.683169},
  doi          = {10.1109/CSFW.1998.683169},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/LinWJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThuraisinghamJSDO98,
  author       = {Bhavani Thuraisingham and
                  Sushil Jajodia and
                  Pierangela Samarati and
                  John E. Dobson and
                  Martin S. Olivier},
  editor       = {Sushil Jajodia},
  title        = {Security and Privacy Issues for the World Wide Web: Panel Discussion},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {269--284},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThuraisinghamJSDO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/JohnsonJ98,
  author       = {Neil F. Johnson and
                  Sushil Jajodia},
  editor       = {David Aucsmith},
  title        = {Steganalysis of Images Created Using Current Steganography Software},
  booktitle    = {Information Hiding, Second International Workshop, Portland, Oregon,
                  USA, April 14-17, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1525},
  pages        = {273--289},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49380-8\_19},
  doi          = {10.1007/3-540-49380-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/JohnsonJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/RumoloJ98,
  author       = {Giovanni Rumolo and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  William List and
                  Graeme W. McGregor and
                  Leon Strous},
  title        = {Algebra for Databases with Explicit Markings of Damaged Data},
  booktitle    = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, Second Working Conference on Integrity and Internal
                  Control in Information Systems: Bridging Business Requirements and
                  Research Results, Warrenton, Virginia, USA, November 19-20, 1998},
  series       = {{IFIP} Conference Proceedings},
  volume       = {136},
  pages        = {103--129},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Thu, 22 Aug 2002 09:35:37 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/RumoloJ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dagstuhl/TDB97,
  editor       = {Opher Etzion and
                  Sushil Jajodia and
                  Suryanarayana M. Sripada},
  title        = {Temporal Databases: Research and Practice. (the book grow out of a
                  Dagstuhl Seminar, June 23-27, 1997)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1399},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053695},
  doi          = {10.1007/BFB0053695},
  isbn         = {3-540-64519-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/TDB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mis/1998,
  editor       = {Sushil Jajodia and
                  M. Tamer {\"{O}}zsu and
                  Asuman Dogac},
  title        = {Advances in Multimedia Information Systems, 4th International Workshop,
                  MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1508},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49651-3},
  doi          = {10.1007/3-540-49651-3},
  isbn         = {3-540-65107-1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mis/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tc11-5/1998,
  editor       = {Sushil Jajodia and
                  William List and
                  Graeme W. McGregor and
                  Leon Strous},
  title        = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, Second Working Conference on Integrity and Internal
                  Control in Information Systems: Bridging Business Requirements and
                  Research Results, Warrenton, Virginia, USA, November 19-20, 1998},
  series       = {{IFIP} Conference Proceedings},
  volume       = {136},
  publisher    = {Kluwer},
  year         = {1998},
  isbn         = {0-412-84770-1},
  timestamp    = {Thu, 22 Aug 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/AmmannJ97,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  title        = {Semantics-based transaction processing: satisfying conflicting objectives},
  journal      = {{IEEE} Concurrency},
  volume       = {5},
  number       = {2},
  pages        = {8--10},
  year         = {1997},
  url          = {https://doi.org/10.1109/4434.588269},
  doi          = {10.1109/4434.588269},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeecc/AmmannJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeecc/AmmannJ97a,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  title        = {Rethinking integrity [distributed databases]},
  journal      = {{IEEE} Concurrency},
  volume       = {5},
  number       = {4},
  pages        = {5--6},
  year         = {1997},
  url          = {https://doi.org/10.1109/4434.641618},
  doi          = {10.1109/4434.641618},
  timestamp    = {Wed, 06 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeecc/AmmannJ97a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/AtluriBJ97,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {A theoretical formulation for degrees of isolation in databases},
  journal      = {Inf. Softw. Technol.},
  volume       = {39},
  number       = {1},
  pages        = {47--53},
  year         = {1997},
  url          = {https://doi.org/10.1016/0950-5849(96)01109-3},
  doi          = {10.1016/0950-5849(96)01109-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/AtluriBJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/JajodiaBBKMSW97,
  author       = {Sushil Jajodia and
                  Daniel Barbar{\'{a}} and
                  Alexander Brodsky and
                  Larry Kerschberg and
                  Amihai Motro and
                  Edgar H. Sibley and
                  Xiaoyang Sean Wang},
  title        = {Information Systems Research at George Mason University},
  journal      = {{SIGMOD} Rec.},
  volume       = {26},
  number       = {4},
  pages        = {69--74},
  year         = {1997},
  url          = {https://doi.org/10.1145/271074.271095},
  doi          = {10.1145/271074.271095},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/JajodiaBBKMSW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/BertinoSJ97,
  author       = {Elisa Bertino and
                  Pierangela Samarati and
                  Sushil Jajodia},
  title        = {An Extended Authorization Model for Relational Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {1},
  pages        = {85--101},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.567051},
  doi          = {10.1109/69.567051},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/BertinoSJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SamaratiBCJ97,
  author       = {Pierangela Samarati and
                  Elisa Bertino and
                  Alessandro Ciampichetti and
                  Sushil Jajodia},
  title        = {Information Flow Control in Object-Oriented Systems},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {4},
  pages        = {524--538},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.617048},
  doi          = {10.1109/69.617048},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SamaratiBCJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AtluriJB97,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {Transaction Processing in Multilevel Secure Databases with Kernelized
                  Architectures: Challenges and Solutions},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {5},
  pages        = {697--708},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.634749},
  doi          = {10.1109/69.634749},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AtluriJB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/WangBBJ97,
  author       = {Xiaoyang Sean Wang and
                  Claudio Bettini and
                  Alexander Brodsky and
                  Sushil Jajodia},
  title        = {Logical Design for Temporal Databases with Multiple Granularities},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {22},
  number       = {2},
  pages        = {115--170},
  year         = {1997},
  url          = {https://doi.org/10.1145/249978.249979},
  doi          = {10.1145/249978.249979},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/WangBBJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/AmmannJR97,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  title        = {Applying Formal Methods to Semantic-Based Decomposition of Transactions},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {22},
  number       = {2},
  pages        = {215--254},
  year         = {1997},
  url          = {https://doi.org/10.1145/249978.249981},
  doi          = {10.1145/249978.249981},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/AmmannJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/WolfsonJH97,
  author       = {Ouri Wolfson and
                  Sushil Jajodia and
                  Yixiu Huang},
  title        = {An Adaptive Data Replication Algorithm},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {22},
  number       = {2},
  pages        = {255--314},
  year         = {1997},
  url          = {https://doi.org/10.1145/249978.249982},
  doi          = {10.1145/249978.249982},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tods/WolfsonJH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/JajodiaRA97,
  author       = {Sushil Jajodia and
                  Indrakshi Ray and
                  Paul Ammann},
  editor       = {Antoni Oliv{\'{e}} and
                  Joan Antoni Pastor},
  title        = {Implementing Semantic-Based Decomposition of Transactions},
  booktitle    = {Advanced Information Systems Engineering, 9th International Conference
                  CAiSE'97, Barcelona, Catalonia, Spain, June 16-20, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1250},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-63107-0\_6},
  doi          = {10.1007/3-540-63107-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/JajodiaRA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cp/BettiniWJ97,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Gert Smolka},
  title        = {Satisfiability of Quantitative Temporal Constraints with Multiple
                  Granularities},
  booktitle    = {Principles and Practice of Constraint Programming - CP97, Third International
                  Conference, Linz, Austria, October 29 - November 1, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1330},
  pages        = {435--449},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0017458},
  doi          = {10.1007/BFB0017458},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/cp/BettiniWJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/BettiniWJ97,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Opher Etzion and
                  Sushil Jajodia and
                  Suryanarayana M. Sripada},
  title        = {An Architecture for Supporting Interoperability among Temporal Databases},
  booktitle    = {Temporal Databases: Research and Practice. (the book grow out of a
                  Dagstuhl Seminar, June 23-27, 1997)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1399},
  pages        = {36--55},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0053697},
  doi          = {10.1007/BFB0053697},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/BettiniWJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/WuJW97,
  author       = {Yu Wu and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  editor       = {Opher Etzion and
                  Sushil Jajodia and
                  Suryanarayana M. Sripada},
  title        = {Temporal Database Bibliography Update},
  booktitle    = {Temporal Databases: Research and Practice. (the book grow out of a
                  Dagstuhl Seminar, June 23-27, 1997)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1399},
  pages        = {338--366},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0053709},
  doi          = {10.1007/BFB0053709},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/WuJW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dagstuhl/JensenDBCEGGHJKKLMMNPPRSSSSSTTW97,
  author       = {Christian S. Jensen and
                  Curtis E. Dyreson and
                  Michael H. B{\"{o}}hlen and
                  James Clifford and
                  Ramez Elmasri and
                  Shashi K. Gadia and
                  Fabio Grandi and
                  Patrick J. Hayes and
                  Sushil Jajodia and
                  Wolfgang K{\"{a}}fer and
                  Nick Kline and
                  Nikos A. Lorentzos and
                  Yannis G. Mitsopoulos and
                  Angelo Montanari and
                  Daniel A. Nonen and
                  Elisa Peressi and
                  Barbara Pernici and
                  John F. Roddick and
                  Nandlal L. Sarda and
                  Maria Rita Scalas and
                  Arie Segev and
                  Richard T. Snodgrass and
                  Michael D. Soo and
                  Abdullah Uz Tansel and
                  Paolo Tiberio and
                  Gio Wiederhold},
  editor       = {Opher Etzion and
                  Sushil Jajodia and
                  Suryanarayana M. Sripada},
  title        = {The Consensus Glossary of Temporal Database Concepts - February 1998
                  Version},
  booktitle    = {Temporal Databases: Research and Practice. (the book grow out of a
                  Dagstuhl Seminar, June 23-27, 1997)},
  series       = {Lecture Notes in Computer Science},
  volume       = {1399},
  pages        = {367--405},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0053710},
  doi          = {10.1007/BFB0053710},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dagstuhl/JensenDBCEGGHJKKLMMNPPRSSSSSTTW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ThuraisinghamSSLJC97,
  author       = {Bhavani Thuraisingham and
                  Linda Schlipper and
                  Pierangela Samarati and
                  Tsau Young Lin and
                  Sushil Jajodia and
                  Chris Clifton},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {Security Issues in Data Warehousing and Data Mining: Panel Discussion},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {3--16},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ThuraisinghamSSLJC97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaMR97,
  author       = {Sushil Jajodia and
                  Ravi Mukkamala and
                  Indrajit Ray},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {A Two-tier Coarse Indexing Scheme for {MLS} Database Systems},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {199--218},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Thu, 24 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaMR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/JajodiaSSB97,
  author       = {Sushil Jajodia and
                  Pierangela Samarati and
                  V. S. Subrahmanian and
                  Elisa Bertino},
  editor       = {Joan Peckham},
  title        = {A Unified Framework for Enforcing Multiple Access Control Policies},
  booktitle    = {{SIGMOD} 1997, Proceedings {ACM} {SIGMOD} International Conference
                  on Management of Data, May 13-15, 1997, Tucson, Arizona, {USA}},
  pages        = {474--485},
  publisher    = {{ACM} Press},
  year         = {1997},
  url          = {https://doi.org/10.1145/253260.253364},
  doi          = {10.1145/253260.253364},
  timestamp    = {Mon, 14 Jun 2021 15:39:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/JajodiaSSB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaSS97,
  author       = {Sushil Jajodia and
                  Pierangela Samarati and
                  V. S. Subrahmanian},
  title        = {A Logical Language for Expressing Authorizations},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {31--42},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601312},
  doi          = {10.1109/SECPRI.1997.601312},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaSS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/FerrariSBJ97,
  author       = {Elena Ferrari and
                  Pierangela Samarati and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Providing flexibility in information flow control for object oriented
                  systems},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {130--140},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601328},
  doi          = {10.1109/SECPRI.1997.601328},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/FerrariSBJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AmmannJMB97,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Catherine D. McCollum and
                  Barbara T. Blaustein},
  title        = {Surviving information warfare attacks on databases},
  booktitle    = {1997 {IEEE} Symposium on Security and Privacy, May 4-7, 1997, Oakland,
                  CA, {USA}},
  pages        = {164--174},
  publisher    = {{IEEE} Computer Society},
  year         = {1997},
  url          = {https://doi.org/10.1109/SECPRI.1997.601331},
  doi          = {10.1109/SECPRI.1997.601331},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AmmannJMB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/kl/jajodiaK97/AmmannJR97,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  editor       = {Sushil Jajodia and
                  Larry Kerschberg},
  title        = {Semantic-Based Decomposition of Transactions},
  booktitle    = {Advanced Transaction Models and Architectures},
  publisher    = {Kluwer},
  year         = {1997},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/kl/jajodiaK97/AmmannJR97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/kl/jajodiaK97/ManciniRJB97,
  author       = {Luigi V. Mancini and
                  Indrajit Ray and
                  Sushil Jajodia and
                  Elisa Bertino},
  editor       = {Sushil Jajodia and
                  Larry Kerschberg},
  title        = {Flexible Commit Protocols for Advanced Transaction Processing},
  booktitle    = {Advanced Transaction Models and Architectures},
  publisher    = {Kluwer},
  year         = {1997},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/kl/jajodiaK97/ManciniRJB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/kl/JajodiaK97,
  editor       = {Sushil Jajodia and
                  Larry Kerschberg},
  title        = {Advanced Transaction Models and Architectures},
  publisher    = {Kluwer},
  year         = {1997},
  isbn         = {0-7923-9880-7},
  timestamp    = {Mon, 05 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/kl/JajodiaK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/tc11-5/1997,
  editor       = {Sushil Jajodia and
                  William List and
                  Graeme W. McGregor and
                  Leon Strous},
  title        = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, First Working Conference on Integrity and Internal
                  Control in Information Systems: Increasing the confidence in Information
                  Systems, Zurich, Switzerland, December 4-5, 1997},
  series       = {{IFIP} Conference Proceedings},
  volume       = {109},
  publisher    = {Chapman Hall},
  year         = {1997},
  isbn         = {0-412-82600-3},
  timestamp    = {Thu, 22 Aug 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/1997.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/tucker97/Jajodia97,
  author       = {Sushil Jajodia},
  editor       = {Allen B. Tucker},
  title        = {Database Security and Privacy},
  booktitle    = {The Computer Science and Engineering Handbook},
  pages        = {1112--1124},
  publisher    = {{CRC} Press},
  year         = {1997},
  timestamp    = {Sun, 09 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/crc/tucker97/Jajodia97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Jajodia96,
  author       = {Sushil Jajodia},
  title        = {Database Security and Privacy},
  journal      = {{ACM} Comput. Surv.},
  volume       = {28},
  number       = {1},
  pages        = {129--131},
  year         = {1996},
  url          = {https://doi.org/10.1145/234313.234370},
  doi          = {10.1145/234313.234370},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Jajodia96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/Jajodia96a,
  author       = {Sushil Jajodia},
  title        = {Managing Security and Privacy of Information},
  journal      = {{ACM} Comput. Surv.},
  volume       = {28},
  number       = {4es},
  pages        = {79},
  year         = {1996},
  url          = {https://doi.org/10.1145/242224.242327},
  doi          = {10.1145/242224.242327},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/Jajodia96a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dke/SamaratiAJ96,
  author       = {Pierangela Samarati and
                  Paul Ammann and
                  Sushil Jajodia},
  title        = {Maintaining Replicated Authorizations in Distributed Database Systems},
  journal      = {Data Knowl. Eng.},
  volume       = {18},
  number       = {1},
  pages        = {55--84},
  year         = {1996},
  url          = {https://doi.org/10.1016/0169-023X(95)00000-I},
  doi          = {10.1016/0169-023X(95)00000-I},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dke/SamaratiAJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SmithBJN96,
  author       = {Kenneth P. Smith and
                  Barbara T. Blaustein and
                  Sushil Jajodia and
                  LouAnna Notargiacomo},
  title        = {Correctness Criteria for Multilevel Secure Transactions},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {8},
  number       = {1},
  pages        = {32--45},
  year         = {1996},
  url          = {https://doi.org/10.1109/69.485627},
  doi          = {10.1109/69.485627},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SmithBJN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/SamaratiBJ96,
  author       = {Pierangela Samarati and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {An Authorization Model for a Distributed Hypertext System},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {8},
  number       = {4},
  pages        = {555--562},
  year         = {1996},
  url          = {https://doi.org/10.1109/69.536249},
  doi          = {10.1109/69.536249},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/SamaratiBJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AtluriJB96,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {Alternative Correctness Criteria for Concurrent Execution of Transactions
                  in Multilevel Secure Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {8},
  number       = {5},
  pages        = {839--854},
  year         = {1996},
  url          = {https://doi.org/10.1109/69.542034},
  doi          = {10.1109/69.542034},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AtluriJB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/AmmannJF96,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Phyllis G. Frankl},
  title        = {Globally Consistent Event Ordering in One-Directional Distributed
                  Environments},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {7},
  number       = {6},
  pages        = {665--670},
  year         = {1996},
  url          = {https://doi.org/10.1109/71.506704},
  doi          = {10.1109/71.506704},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/AmmannJF96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/RayBJM96,
  author       = {Indrajit Ray and
                  Elisa Bertino and
                  Sushil Jajodia and
                  Luigi V. Mancini},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {An Advanced Commit Protocol for {MLS} Distributed Database Systems},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {119--128},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238198},
  doi          = {10.1145/238168.238198},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/RayBJM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertinoJS96,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {A Non-Timestamped Authorization Model for Data Management Systems},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {169--178},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238211},
  doi          = {10.1145/238168.238211},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertinoJS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriJKMM96,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Thomas F. Keefe and
                  Catherine D. McCollum and
                  Ravi Mukkamala},
  editor       = {Pierangela Samarati and
                  Ravi S. Sandhu},
  title        = {Multilevel Secure Transaction Processing: Status and Prospects},
  booktitle    = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} /
                  {WG11.3} Tenth International Conference on Database Security, 22-24
                  July 1996, Como, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {79},
  pages        = {79--98},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 24 Oct 2002 16:14:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriJKMM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaMR96,
  author       = {Sushil Jajodia and
                  Luigi V. Mancini and
                  Indrajit Ray},
  editor       = {Pierangela Samarati and
                  Ravi S. Sandhu},
  title        = {Secure Locking Protocols for Multilevel Database Management Systems},
  booktitle    = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} /
                  {WG11.3} Tenth International Conference on Database Security, 22-24
                  July 1996, Como, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {79},
  pages        = {177--194},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 24 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaMR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarksMJ96,
  author       = {Donald G. Marks and
                  Amihai Motro and
                  Sushil Jajodia},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {Enhancing the Controlled Disclosure of Sensitive Information},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_42},
  doi          = {10.1007/3-540-61770-1\_42},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MarksMJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/CandanJS96,
  author       = {K. Sel{\c{c}}uk Candan and
                  Sushil Jajodia and
                  V. S. Subrahmanian},
  editor       = {Stanley Y. W. Su},
  title        = {Secure Mediated Databases},
  booktitle    = {Proceedings of the Twelfth International Conference on Data Engineering,
                  February 26 - March 1, 1996, New Orleans, Louisiana, {USA}},
  pages        = {28--37},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/ICDE.1996.492086},
  doi          = {10.1109/ICDE.1996.492086},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/CandanJS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/BettiniWJ96,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Richard Hull},
  title        = {Testing Complex Temporal Relationships Involving Multiple Granularities
                  and Its Application to Data Mining},
  booktitle    = {Proceedings of the Fifteenth {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, June 3-5, 1996, Montreal, Canada},
  pages        = {68--78},
  publisher    = {{ACM} Press},
  year         = {1996},
  url          = {https://doi.org/10.1145/237661.237680},
  doi          = {10.1145/237661.237680},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pods/BettiniWJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AmmannJR96,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  title        = {Ensuring Atomicity of Multilevel Transactions},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {74--84},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502671},
  doi          = {10.1109/SECPRI.1996.502671},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AmmannJR96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BertinoJS96,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Supporting Multiple Access Control Policies in Database Systems},
  booktitle    = {1996 {IEEE} Symposium on Security and Privacy, May 6-8, 1996, Oakland,
                  CA, {USA}},
  pages        = {94--107},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/SECPRI.1996.502673},
  doi          = {10.1109/SECPRI.1996.502673},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BertinoJS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/time/BettiniWJ96,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Sushil Jajodia},
  editor       = {Luca Chittaro and
                  Scott D. Goodwin and
                  Howard J. Hamilton and
                  Angelo Montanari},
  title        = {A General Framework and Reasoning Model for Time Granularity},
  booktitle    = {Proceedings of the Third International Workshop on Temporal Representation
                  and Reasoning, TIME-96, Key West, Florida, USA, May 19-20, 1996},
  pages        = {104--111},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/TIME.1996.555688},
  doi          = {10.1109/TIME.1996.555688},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/time/BettiniWJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/ph/kumar96/JajodiaM96,
  author       = {Sushil Jajodia and
                  Ravi Mukkamala},
  editor       = {Vijay Kumar},
  title        = {Reduction in Transaction Conflicts Using Semantics-Based Concurrency
                  Control},
  booktitle    = {Performance of Concurrency Control Mechanisms in Centralized Database
                  Systems},
  pages        = {387--405},
  publisher    = {Prentice-Hall},
  year         = {1996},
  timestamp    = {Mon, 05 Aug 2019 11:49:10 +0200},
  biburl       = {https://dblp.org/rec/books/ph/kumar96/JajodiaM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/SubrahmanianJ96,
  editor       = {V. S. Subrahmanian and
                  Sushil Jajodia},
  title        = {Multimedia Database System: Issues and Research Direction},
  publisher    = {Springer},
  year         = {1996},
  isbn         = {3-540-58710-1},
  timestamp    = {Tue, 06 Aug 2019 09:54:56 +0200},
  biburl       = {https://dblp.org/rec/books/sp/SubrahmanianJ96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/WolfsonJ95,
  author       = {Ouri Wolfson and
                  Sushil Jajodia},
  title        = {An Algorithm for Dynamic Data Allocation in Distributed Systems},
  journal      = {Inf. Process. Lett.},
  volume       = {53},
  number       = {2},
  pages        = {113--119},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(94)00182-X},
  doi          = {10.1016/0020-0190(94)00182-X},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/WolfsonJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/is/BertinoJS95,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Database Security: Research and Practice},
  journal      = {Inf. Syst.},
  volume       = {20},
  number       = {7},
  pages        = {537--556},
  year         = {1995},
  url          = {https://doi.org/10.1016/0306-4379(95)00029-4},
  doi          = {10.1016/0306-4379(95)00029-4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/is/BertinoJS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangJS95,
  author       = {Xiaoyang Sean Wang and
                  Sushil Jajodia and
                  V. S. Subrahmanian},
  title        = {Temporal Modules: An Approach Toward Federated Temporal Databases},
  journal      = {Inf. Sci.},
  volume       = {82},
  number       = {1-2},
  pages        = {103--128},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0255(94)00062-G},
  doi          = {10.1016/0020-0255(94)00062-G},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangJS95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AmmannJJ95,
  author       = {Paul Ammann and
                  Frank Jaeckle and
                  Sushil Jajodia},
  title        = {Concurrency Control in a Secure Database via a Two-Snapshot Algorithm},
  journal      = {J. Comput. Secur.},
  volume       = {3},
  number       = {2/3},
  pages        = {87--114},
  year         = {1995},
  url          = {https://doi.org/10.3233/JCS-1994/1995-32-302},
  doi          = {10.3233/JCS-1994/1995-32-302},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AmmannJJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AmmannAJ95,
  author       = {Paul Ammann and
                  Vijayalakshmi Atluri and
                  Sushil Jajodia},
  title        = {The Partitioned Synchronization Rule for Planar Extendible Partial
                  Orders},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {7},
  number       = {5},
  pages        = {797--808},
  year         = {1995},
  url          = {https://doi.org/10.1109/69.469819},
  doi          = {10.1109/69.469819},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AmmannAJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AmmannJM95,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Padmaja Mavuluri},
  title        = {On-The-Fly Reading of Entire Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {7},
  number       = {5},
  pages        = {834--838},
  year         = {1995},
  url          = {https://doi.org/10.1109/69.469836},
  doi          = {10.1109/69.469836},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AmmannJM95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ95,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Providing Different Degrees of Recency Options to Transactions in
                  Multilevel Secure Databases},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {231--247},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/BettiniWBJ95,
  author       = {Claudio Bettini and
                  Xiaoyang Sean Wang and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Michael J. Carey and
                  Donovan A. Schneider},
  title        = {Semantic Assumptions and Query Evaluation in Temporal Databases},
  booktitle    = {Proceedings of the 1995 {ACM} {SIGMOD} International Conference on
                  Management of Data, San Jose, California, USA, May 22-25, 1995},
  pages        = {257--268},
  publisher    = {{ACM} Press},
  year         = {1995},
  url          = {https://doi.org/10.1145/223784.223843},
  doi          = {10.1145/223784.223843},
  timestamp    = {Tue, 16 Aug 2022 23:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/BettiniWBJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/AmmannJR95,
  author       = {Paul Ammann and
                  Sushil Jajodia and
                  Indrakshi Ray},
  editor       = {Umeshwar Dayal and
                  Peter M. D. Gray and
                  Shojiro Nishio},
  title        = {Using Formal Methods to Reason about Semantics-Based Decompositions
                  of Transactions},
  booktitle    = {VLDB'95, Proceedings of 21th International Conference on Very Large
                  Data Bases, September 11-15, 1995, Zurich, Switzerland},
  pages        = {218--227},
  publisher    = {Morgan Kaufmann},
  year         = {1995},
  url          = {http://www.vldb.org/conf/1995/P218.PDF},
  timestamp    = {Tue, 20 Feb 2018 15:19:44 +0100},
  biburl       = {https://dblp.org/rec/conf/vldb/AmmannJR95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/njc/JajodiaMR94,
  author       = {Sushil Jajodia and
                  Ravi Mukkamala and
                  K. V. S. Ramarao},
  title        = {A View-Based Dynamic Replication Control Algorithm},
  journal      = {Nord. J. Comput.},
  volume       = {1},
  number       = {2},
  pages        = {214--230},
  year         = {1994},
  timestamp    = {Wed, 14 Jan 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/njc/JajodiaMR94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/JensenCEGHJ94,
  author       = {Christian S. Jensen and
                  James Clifford and
                  Ramez Elmasri and
                  Shashi K. Gadia and
                  Patrick J. Hayes and
                  Sushil Jajodia},
  title        = {A Consensus Glossary of Temporal Database Concepts},
  journal      = {{SIGMOD} Rec.},
  volume       = {23},
  number       = {1},
  pages        = {52--64},
  year         = {1994},
  url          = {https://doi.org/10.1145/181550.181560},
  doi          = {10.1145/181550.181560},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/JensenCEGHJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/DoshiHJM94,
  author       = {Vinti Doshi and
                  William R. Herndon and
                  Sushil Jajodia and
                  Catherine D. McCollum},
  title        = {Benchmarking multilevel secure database systems using the {MITRE}
                  benchmark},
  booktitle    = {10th Annual Computer Security Applications Conference, {ACSAC} 1994,
                  5-9 December, 1994 Orlando, FL, {USA}},
  pages        = {86--95},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/CSAC.1994.367318},
  doi          = {10.1109/CSAC.1994.367318},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/DoshiHJM94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AmmannJ94,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {An Efficient Multiversion Algorithm for Secure Servicing of Transaction
                  Reads},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {118--125},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191201},
  doi          = {10.1145/191177.191201},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AmmannJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SamaratiAJ94,
  author       = {Pierangela Samarati and
                  Paul Ammann and
                  Sushil Jajodia},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {Propagation of Authorizations in Distributed Database Systems},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {136--147},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191204},
  doi          = {10.1145/191177.191204},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SamaratiAJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ94,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Joachim Biskup and
                  Matthew Morgenstern and
                  Carl E. Landwehr},
  title        = {Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols},
  booktitle    = {Database Security, {VIII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth,
                  Germany, 23-26 August, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-60}},
  pages        = {259--274},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MotroMJ94,
  author       = {Amihai Motro and
                  Donald G. Marks and
                  Sushil Jajodia},
  editor       = {Dieter Gollmann},
  title        = {Aggregation in Relational Databases: Controlled Disclosure of Sensitive
                  Information},
  booktitle    = {Computer Security - {ESORICS} 94, Third European Symposium on Research
                  in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {875},
  pages        = {431--445},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58618-0\_77},
  doi          = {10.1007/3-540-58618-0\_77},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MotroMJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BertinoMJ94,
  author       = {Elisa Bertino and
                  Luigi V. Mancini and
                  Sushil Jajodia},
  title        = {Collecting garbage in multilevel secure object stores},
  booktitle    = {1994 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 16-18, 1994},
  pages        = {106--120},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/RISP.1994.296588},
  doi          = {10.1109/RISP.1994.296588},
  timestamp    = {Thu, 21 Sep 2023 15:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BertinoMJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JajodiaM93,
  author       = {Sushil Jajodia and
                  Ravi Mukkamala},
  title        = {Measuring the effect of commutative transactions on distributed database
                  performance},
  journal      = {Inf. Sci.},
  volume       = {68},
  number       = {1-2},
  pages        = {91--111},
  year         = {1993},
  url          = {https://doi.org/10.1016/0020-0255(93)90023-F},
  doi          = {10.1016/0020-0255(93)90023-F},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JajodiaM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SandhuJ93,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia},
  title        = {Limitations of Relational Data Base Access Controls},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {2},
  number       = {1},
  pages        = {57--72},
  year         = {1993},
  url          = {https://doi.org/10.1080/19393559308551345},
  doi          = {10.1080/19393559308551345},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SandhuJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving Stricter Correctness Requirements in Multilevel Secure Database
                  Management Systems},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {311--352},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-2404},
  doi          = {10.3233/JCS-1993-2404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/AmmannJ93,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  title        = {Distributed Timestamp Generation in Planar Lattice Networks},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {11},
  number       = {3},
  pages        = {205--225},
  year         = {1993},
  url          = {https://doi.org/10.1145/152864.152865},
  doi          = {10.1145/152864.152865},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/AmmannJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertinoSJ93,
  author       = {Elisa Bertino and
                  Pierangela Samarati and
                  Sushil Jajodia},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {Authorizations in Relational Database Management Systems},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {130--139},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168605},
  doi          = {10.1145/168588.168605},
  timestamp    = {Tue, 10 Nov 2020 20:00:40 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertinoSJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BertinoSJ93a,
  author       = {Elisa Bertino and
                  Pierangela Samarati and
                  Sushil Jajodia},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu and
                  Victoria Ashby},
  title        = {High Assurance Discretionary Access Control for Object Bases},
  booktitle    = {{CCS} '93, Proceedings of the 1st {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 3-5, 1993},
  pages        = {140--150},
  publisher    = {{ACM}},
  year         = {1993},
  url          = {https://doi.org/10.1145/168588.168606},
  doi          = {10.1145/168588.168606},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BertinoSJ93a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaMB93,
  author       = {Sushil Jajodia and
                  Catherine D. McCollum and
                  Barbara T. Blaustein},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Integrating Concurrency Control and Commit Algorithms in Distributed
                  Multilevel Secure Databases},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {109--121},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaMB93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AmmannJ93,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Planar Lattice Security Structures for Multilevel Replicated Databases},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {125--134},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AmmannJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Achieving Stricter Correctness Requirements in Multilevel Secure Databases:
                  The Dynamic Case},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {135--158},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MukkamalaJ93,
  author       = {Ravi Mukkamala and
                  Sushil Jajodia},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {A Performance Comparison of two Decomposition Techniques for Multilevel
                  Secure Database Systems},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {199--214},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/MukkamalaJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dood/BertinoJ93,
  author       = {Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Stefano Ceri and
                  Katsumi Tanaka and
                  Shalom Tsur},
  title        = {Modeling Multilevel Entities Using Single Level Objects},
  booktitle    = {Deductive and Object-Oriented Databases, Third International Conference,
                  DOOD'93, Phoenix, Arizona, USA, December 6-8, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {760},
  pages        = {415--428},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57530-8\_27},
  doi          = {10.1007/3-540-57530-8\_27},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/dood/BertinoJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/oopsla/BertinoJS93,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Bhavani Thuraisingham and
                  Ravi S. Sandhu and
                  T. C. Ting},
  title        = {Enforcing Mandatory Access Control in Object Bases},
  booktitle    = {Security for Object-Oriented Systems, Proceedings of the {OOPSLA-93}
                  Conference Workshop on Security for Object-Oriented Systems, Washington,
                  DC, USA, 26 September 1993},
  series       = {Workshops in Computing},
  pages        = {96--116},
  publisher    = {Springer},
  year         = {1993},
  timestamp    = {Wed, 29 Jun 2022 15:37:45 +0200},
  biburl       = {https://dblp.org/rec/conf/oopsla/BertinoJS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/WangJS93,
  author       = {Xiaoyang Sean Wang and
                  Sushil Jajodia and
                  V. S. Subrahmanian},
  editor       = {Peter Buneman and
                  Sushil Jajodia},
  title        = {Temporal Modules: An Approach Toward Federated Temporal Databases},
  booktitle    = {Proceedings of the 1993 {ACM} {SIGMOD} International Conference on
                  Management of Data, Washington, DC, USA, May 26-28, 1993},
  pages        = {227--236},
  publisher    = {{ACM} Press},
  year         = {1993},
  url          = {https://doi.org/10.1145/170035.170074},
  doi          = {10.1145/170035.170074},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/WangJS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BlausteinJMN93,
  author       = {Barbara T. Blaustein and
                  Sushil Jajodia and
                  Catherine D. McCollum and
                  LouAnna Notargiacomo},
  title        = {A model of atomicity for multilevel transactions},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {120--134},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287637},
  doi          = {10.1109/RISP.1993.287637},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BlausteinJMN93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving stricter correctness requirements in multilevel secure databases},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {135--147},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287636},
  doi          = {10.1109/RISP.1993.287636},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/lncs/BertinoJS93,
  author       = {Elisa Bertino and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Nabil R. Adam and
                  Bharat K. Bhargava},
  title        = {Access Control in Object-Oriented Database Systems - Some Approaches
                  and Issues},
  booktitle    = {Advanced Database Systems},
  series       = {Lecture Notes in Computer Science},
  volume       = {759},
  pages        = {17--44},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-57507-3\_2},
  doi          = {10.1007/3-540-57507-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/journals/lncs/BertinoJS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/bc/tanselCGSS93/WiederholdJL93,
  author       = {Gio Wiederhold and
                  Sushil Jajodia and
                  Witold Litwin},
  editor       = {Abdullah Uz Tansel and
                  James Clifford and
                  Shashi K. Gadia and
                  Arie Segev and
                  Richard T. Snodgrass},
  title        = {Integrating Temporal Data in a Heterogeneous Environment},
  booktitle    = {Temporal Databases: Theory, Design, and Implementation},
  pages        = {563--579},
  publisher    = {Benjamin/Cummings},
  year         = {1993},
  timestamp    = {Wed, 07 Aug 2019 16:42:16 +0200},
  biburl       = {https://dblp.org/rec/books/bc/tanselCGSS93/WiederholdJL93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/bc/TanselCGJSS93,
  editor       = {Abdullah Uz Tansel and
                  James Clifford and
                  Shashi K. Gadia and
                  Sushil Jajodia and
                  Arie Segev and
                  Richard T. Snodgrass},
  title        = {Temporal Databases: Theory, Design, and Implementation},
  publisher    = {Benjamin/Cummings},
  year         = {1993},
  isbn         = {0-8053-2413-5},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/bc/TanselCGJSS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sigmod/93,
  editor       = {Peter Buneman and
                  Sushil Jajodia},
  title        = {Proceedings of the 1993 {ACM} {SIGMOD} International Conference on
                  Management of Data, Washington, DC, USA, May 26-28, 1993},
  publisher    = {{ACM} Press},
  year         = {1993},
  url          = {https://doi.org/10.1145/170035},
  doi          = {10.1145/170035},
  isbn         = {978-0-89791-592-2},
  timestamp    = {Thu, 11 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SandhuJ92,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia},
  title        = {Eliminating polyinstantiation securely},
  journal      = {Comput. Secur.},
  volume       = {11},
  number       = {6},
  pages        = {547--562},
  year         = {1992},
  url          = {https://doi.org/10.1016/0167-4048(92)90191-S},
  doi          = {10.1016/0167-4048(92)90191-S},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SandhuJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CostichJ92,
  author       = {Oliver Costich and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Carl E. Landwehr},
  title        = {Maintaining Multilevel Transaction Atomicity in {MLS} Database Systems
                  with Kernelized Architecture},
  booktitle    = {Database Security, {VI:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21
                  August 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-21}},
  pages        = {249--266},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/CostichJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/McDermottJ92,
  author       = {John P. McDermott and
                  Sushil Jajodia},
  editor       = {Bhavani Thuraisingham and
                  Carl E. Landwehr},
  title        = {Orange Locking: Channel-Free Database Concurrency Control Via Locking},
  booktitle    = {Database Security, {VI:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Vancouver, Canada, 19-21
                  August 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-21}},
  pages        = {267--284},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Mon, 18 Feb 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/McDermottJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SandhuJ92,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia},
  editor       = {Yves Deswarte and
                  G{\'{e}}rard Eizenberg and
                  Jean{-}Jacques Quisquater},
  title        = {Polyinstantation for Cover Stories},
  booktitle    = {Computer Security - {ESORICS} 92, Second European Symposium on Research
                  in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {648},
  pages        = {307--328},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/BFb0013905},
  doi          = {10.1007/BFB0013905},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SandhuJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pods/WolfsonJ92,
  author       = {Ouri Wolfson and
                  Sushil Jajodia},
  editor       = {Moshe Y. Vardi and
                  Paris C. Kanellakis},
  title        = {Distributed Algorithms for Dynamic Replication of Data},
  booktitle    = {Proceedings of the Eleventh {ACM} {SIGACT-SIGMOD-SIGART} Symposium
                  on Principles of Database Systems, June 2-4, 1992, San Diego, California,
                  {USA}},
  pages        = {149--163},
  publisher    = {{ACM} Press},
  year         = {1992},
  url          = {https://doi.org/10.1145/137097.137858},
  doi          = {10.1145/137097.137858},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pods/WolfsonJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/DoshiJ92,
  author       = {Vinti Doshi and
                  Sushil Jajodia},
  editor       = {Guy G. Gable and
                  William J. Caelli},
  title        = {Referential Integrity in Multilevel Secure Database Management Systems},
  booktitle    = {{IT} Security: The Need for International Cooperation, Proceedings
                  of the {IFIP} TC11, Eigth International Conference on Information
                  Security, IFIP/Sec '92, Singapore, 27-29 May 1992},
  series       = {{IFIP} Transactions},
  volume       = {{A-15}},
  pages        = {359--371},
  publisher    = {North-Holland},
  year         = {1992},
  timestamp    = {Wed, 20 Feb 2002 11:18:35 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/DoshiJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AmmannJJ92,
  author       = {Paul Ammann and
                  Frank Jaeckle and
                  Sushil Jajodia},
  title        = {A two snapshot algorithm for concurrency control in multi-level secure
                  databases},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {204--215},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213260},
  doi          = {10.1109/RISP.1992.213260},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AmmannJJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaA92,
  author       = {Sushil Jajodia and
                  Vijayalakshmi Atluri},
  title        = {Alternative correctness criteria for concurrent execution of transactions
                  in multilevel secure databases},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {216--224},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213259},
  doi          = {10.1109/RISP.1992.213259},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaA92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wmrd/WolfsonJ92,
  author       = {Ouri Wolfson and
                  Sushil Jajodia},
  editor       = {Jehan{-}Fran{\c{c}}ois P{\^{a}}ris and
                  Hector Garcia{-}Molina},
  title        = {An Algorithm for Dynamic Data Distribution},
  booktitle    = {Proceedings of the Second Workshop on the Management of Replicated
                  Data, November 12-13, 1992, Monterey, California, {USA}},
  pages        = {62--65},
  publisher    = {{IEEE} Computer Society Press},
  year         = {1992},
  timestamp    = {Sun, 28 Jul 2019 16:59:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wmrd/WolfsonJ92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/1991,
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  publisher    = {North-Holland},
  year         = {1992},
  isbn         = {0-444-89518-3},
  timestamp    = {Fri, 15 Feb 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/1991.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SandhuJ91,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia},
  title        = {Integrity principles and mechanisms in database management systems},
  journal      = {Comput. Secur.},
  volume       = {10},
  number       = {5},
  pages        = {413--427},
  year         = {1991},
  url          = {https://doi.org/10.1016/0167-4048(91)90068-O},
  doi          = {10.1016/0167-4048(91)90068-O},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SandhuJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/JajodiaM91,
  author       = {Sushil Jajodia and
                  David Mutchler},
  title        = {A short technical paper: Determining whether a vote assignment is
                  dominated},
  journal      = {Inf. Sci.},
  volume       = {56},
  number       = {1-3},
  pages        = {279--282},
  year         = {1991},
  url          = {https://doi.org/10.1016/0020-0255(91)90034-R},
  doi          = {10.1016/0020-0255(91)90034-R},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/JajodiaM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/MukkamalaJ91,
  author       = {Ravi Mukkamala and
                  Sushil Jajodia},
  title        = {A Note on Estimating the Cardinality of the Projection of a Database
                  Relation},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {16},
  number       = {3},
  pages        = {564--566},
  year         = {1991},
  url          = {https://doi.org/10.1145/111197.111218},
  doi          = {10.1145/111197.111218},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/MukkamalaJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/McDermottJS91,
  author       = {John P. McDermott and
                  Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {A single-level scheduler for the replicated architecture for multilevel-secure
                  databases},
  booktitle    = {Seventh Annual Computer Security Applications Conference, {ACSAC}
                  1991, 2-6 December, 1991, San Antonio, Texas, {USA}},
  pages        = {2--11},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSAC.1991.213023},
  doi          = {10.1109/CSAC.1991.213023},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/McDermottJS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/KoganJ91,
  author       = {Boris Y. Kogan and
                  Sushil Jajodia},
  title        = {An audit model for object-oriented databases},
  booktitle    = {Seventh Annual Computer Security Applications Conference, {ACSAC}
                  1991, 2-6 December, 1991, San Antonio, Texas, {USA}},
  pages        = {90--99},
  publisher    = {{IEEE}},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSAC.1991.213015},
  doi          = {10.1109/CSAC.1991.213015},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/KoganJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caise/WiederholdJL91,
  author       = {Gio Wiederhold and
                  Sushil Jajodia and
                  Witold Litwin},
  editor       = {Rudolf Andersen and
                  Janis A. Bubenko Jr. and
                  Arne S{\o}lvberg},
  title        = {Dealing with Granularity of Time in Temporal Databases},
  booktitle    = {Advanced Information Systems Engineering, CAiSE'91, Trondheim, Norway,
                  May 13-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {498},
  pages        = {124--140},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-54059-8\_83},
  doi          = {10.1007/3-540-54059-8\_83},
  timestamp    = {Sat, 07 Sep 2019 11:59:25 +0200},
  biburl       = {https://dblp.org/rec/conf/caise/WiederholdJL91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SandhuTJ91,
  author       = {Ravi S. Sandhu and
                  Roshan K. Thomas and
                  Sushil Jajodia},
  title        = {A Secure Kernelized Architecture for Multiple Object-Oriented Databases},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {139--152},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/CSFW.1991.151580},
  doi          = {10.1109/CSFW.1991.151580},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SandhuTJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/Jajodia91,
  author       = {Sushil Jajodia},
  title        = {Panel Discussion on the Polyinstantiation Problem: {A} Position Paper},
  booktitle    = {4th {IEEE} Computer Security Foundations Workshop - CSFW'91, Franconia,
                  New Hampshire, USA, June 18-20, 1991, Proceedings},
  pages        = {235},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  timestamp    = {Thu, 19 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/Jajodia91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AmmannJ91,
  author       = {Paul Ammann and
                  Sushil Jajodia},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level
                  Databases},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {191--202},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 12:14:34 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AmmannJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaM91,
  author       = {Sushil Jajodia and
                  Ravi Mukkamala},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Effects of SeaView Decomposition of Multilevel Relations on Database
                  Performance},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {203--225},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/SanhuTJ91,
  author       = {Ravi S. Sandhu and
                  Roshan K. Thomas and
                  Sushil Jajodia},
  editor       = {Carl E. Landwehr and
                  Sushil Jajodia},
  title        = {Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented
                  Databases},
  booktitle    = {Database Security, {V:} Status and Prospects, Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Shepherdstown, West Virginia,
                  USA, 4-7 November, 1991},
  series       = {{IFIP} Transactions},
  volume       = {{A-6}},
  pages        = {297--314},
  publisher    = {North-Holland},
  year         = {1991},
  timestamp    = {Fri, 15 Feb 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/SanhuTJ91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/JajodiaS91,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  editor       = {James Clifford and
                  Roger King},
  title        = {Towards a Multilevel Secure Relational Data Model},
  booktitle    = {Proceedings of the 1991 {ACM} {SIGMOD} International Conference on
                  Management of Data, Denver, Colorado, USA, May 29-31, 1991},
  pages        = {50--59},
  publisher    = {{ACM} Press},
  year         = {1991},
  url          = {https://doi.org/10.1145/115790.115796},
  doi          = {10.1145/115790.115796},
  timestamp    = {Mon, 21 Jun 2021 16:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/JajodiaS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaS91,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {A Novel Decomposition of Multilevel Relations into Single-Level Relations},
  booktitle    = {Proceedings of the 1991 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 20-22, 1991},
  pages        = {300--315},
  publisher    = {{IEEE} Computer Society},
  year         = {1991},
  url          = {https://doi.org/10.1109/RISP.1991.130797},
  doi          = {10.1109/RISP.1991.130797},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/90,
  editor       = {Sushil Jajodia and
                  Carl E. Landwehr},
  title        = {Database Security, {IV:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21,
                  1990},
  publisher    = {North-Holland},
  year         = {1991},
  isbn         = {0-444-89076-9},
  timestamp    = {Wed, 20 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bit/JajodiaS90,
  author       = {Sushil Jajodia and
                  Frederick N. Springsteel},
  title        = {Lossless Outer Joins with Incomplete Information},
  journal      = {{BIT}},
  volume       = {30},
  number       = {1},
  pages        = {34--41},
  year         = {1990},
  url          = {https://doi.org/10.1007/BF01932129},
  doi          = {10.1007/BF01932129},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bit/JajodiaS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigmod/JajodiaS90,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {Database Security: Current Status and Key Issues},
  journal      = {{SIGMOD} Rec.},
  volume       = {19},
  number       = {4},
  pages        = {123--126},
  year         = {1990},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigmod/JajodiaS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tods/JajodiaM90,
  author       = {Sushil Jajodia and
                  David Mutchler},
  title        = {Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated
                  Database},
  journal      = {{ACM} Trans. Database Syst.},
  volume       = {15},
  number       = {2},
  pages        = {230--280},
  year         = {1990},
  url          = {https://doi.org/10.1145/78922.78926},
  doi          = {10.1145/78922.78926},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tods/JajodiaM90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JajodiaSS90,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu and
                  Edgar H. Sibley},
  title        = {Update semantics for multilevel relations},
  booktitle    = {Sixth Annual Computer Security Applications Conference, {ACSAC} 1990,
                  3-7 December, 1990, Tucson, Arizona, {USA}},
  pages        = {103--112},
  publisher    = {{IEEE}},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSAC.1990.143757},
  doi          = {10.1109/CSAC.1990.143757},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/JajodiaSS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/JajodiaS90,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {A Formal Framework for Single Level Decomposition of Multilevel Relations},
  booktitle    = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
                  New Hampshire, USA, June 12-14, 1990, Proceedings},
  pages        = {152--158},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSFW.1990.128195},
  doi          = {10.1109/CSFW.1990.128195},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/JajodiaS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SandhuJL90,
  author       = {Ravi S. Sandhu and
                  Sushil Jajodia and
                  Teresa F. Lunt},
  title        = {A New Polyinstantiation Integrity Constraint for Multilevel Relations},
  booktitle    = {Third {IEEE} Computer Security Foundations Workshop - CSFW'90, Franconia,
                  New Hampshire, USA, June 12-14, 1990, Proceedings},
  pages        = {159--165},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/CSFW.1990.128196},
  doi          = {10.1109/CSFW.1990.128196},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SandhuJL90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaS90,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  editor       = {Sushil Jajodia and
                  Carl E. Landwehr},
  title        = {Polyinstantiation Integrity in Multilevel Relations Revisited},
  booktitle    = {Database Security, {IV:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Halifax, UK, September 18-21,
                  1990},
  pages        = {297--308},
  publisher    = {North-Holland},
  year         = {1990},
  timestamp    = {Wed, 20 Jun 2018 17:22:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/KoganJ90,
  author       = {Boris Kogan and
                  Sushil Jajodia},
  editor       = {Hector Garcia{-}Molina and
                  H. V. Jagadish},
  title        = {Concurrency Control in Multilevel-Secure Databases Based on Replicated
                  Architecture},
  booktitle    = {Proceedings of the 1990 {ACM} {SIGMOD} International Conference on
                  Management of Data, Atlantic City, NJ, USA, May 23-25, 1990},
  pages        = {153--162},
  publisher    = {{ACM} Press},
  year         = {1990},
  url          = {https://doi.org/10.1145/93597.98725},
  doi          = {10.1145/93597.98725},
  timestamp    = {Tue, 16 Aug 2022 23:04:20 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/KoganJ90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaK90,
  author       = {Sushil Jajodia and
                  Boris Kogan},
  title        = {Integrating an Object-Oriented Data Model with Multilevel Security},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {76--85},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63840},
  doi          = {10.1109/RISP.1990.63840},
  timestamp    = {Thu, 21 Sep 2023 15:57:34 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaS90,
  author       = {Sushil Jajodia and
                  Ravi S. Sandhu},
  title        = {Polyinstantiation Integrity in Multilevel Relations},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {104--115},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63843},
  doi          = {10.1109/RISP.1990.63843},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaS90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaK90a,
  author       = {Sushil Jajodia and
                  Boris Kogan},
  title        = {Transaction Processing in Multilevel-Secure Databases Using Replicated
                  Architecture},
  booktitle    = {Proceedings of the 1990 {IEEE} Symposium on Security and Privacy,
                  Oakland, California, USA, May 7-9, 1990},
  pages        = {360--368},
  publisher    = {{IEEE} Computer Society},
  year         = {1990},
  url          = {https://doi.org/10.1109/RISP.1990.63864},
  doi          = {10.1109/RISP.1990.63864},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaK90a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/JajodiaK89,
  author       = {Sushil Jajodia and
                  Won Kim},
  title        = {From the Issue Editors},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {12},
  number       = {1},
  pages        = {1},
  year         = {1989},
  url          = {http://sites.computer.org/debull/89MAR-CD.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/JajodiaK89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/JajodiaM89,
  author       = {Sushil Jajodia and
                  David Mutchler},
  title        = {A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {1},
  number       = {4},
  pages        = {459--469},
  year         = {1989},
  url          = {https://doi.org/10.1109/69.43421},
  doi          = {10.1109/69.43421},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/JajodiaM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JajodiaM89,
  author       = {Sushil Jajodia and
                  David Mutchler},
  title        = {A Pessimistic Consistency Control Algorithm for Replicated Files which
                  Achieves High Availability},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {15},
  number       = {1},
  pages        = {39--46},
  year         = {1989},
  url          = {https://doi.org/10.1109/32.21724},
  doi          = {10.1109/32.21724},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JajodiaM89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JajodiaGBS89,
  author       = {Sushil Jajodia and
                  Shashi K. Gadia and
                  Gautam Bhargava and
                  Edgar H. Sibley},
  editor       = {David L. Spooner and
                  Carl E. Landwehr},
  title        = {Audit Trail Organization in Relational Databases},
  booktitle    = {Database Security, {III:} Status and Prospects. Results of the {IFIP}
                  {WG} 11.3 Workshop on Database Security, Monterey, California, USA,
                  September 5-7, 1989},
  pages        = {269--281},
  publisher    = {North-Holland},
  year         = {1989},
  timestamp    = {Wed, 16 Jul 2014 19:05:09 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JajodiaGBS89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/Jajodia88,
  author       = {Sushil Jajodia},
  title        = {Letter from the {TC} Chair},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {11},
  number       = {2},
  pages        = {1},
  year         = {1988},
  url          = {http://sites.computer.org/debull/88JUN-CD.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/Jajodia88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/JajodiaM88,
  author       = {Sushil Jajodia and
                  David Mutchler},
  title        = {Integrating Static and Dynamic Voting Protocols To Enhance File Availability},
  booktitle    = {Proceedings of the Fourth International Conference on Data Engineering,
                  February 1-5, 1988, Los Angeles, California, {USA}},
  pages        = {144--153},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/ICDE.1988.105456},
  doi          = {10.1109/ICDE.1988.105456},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/JajodiaM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dpds/1988,
  editor       = {Sushil Jajodia and
                  Won Kim and
                  Abraham Silberschatz},
  title        = {Proceedings of the International Symposium on Databases in Parallel
                  and Distributed Systems, Austin, Texas, USA, December 5-7, 1988},
  publisher    = {{IEEE} Computer Society},
  year         = {1988},
  url          = {https://doi.org/10.1109/DPDS.1988},
  doi          = {10.1109/DPDS.1988},
  isbn         = {0-8186-0893-5},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dpds/1988.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bit/BurgdorffJSZ87,
  author       = {H. A. Burgdorff and
                  Sushil Jajodia and
                  Frederick N. Springsteel and
                  Yechezkel Zalcstein},
  title        = {Alternative Methods for the Reconstruction of Trees from Their Traversals},
  journal      = {{BIT}},
  volume       = {27},
  number       = {2},
  pages        = {133--140},
  year         = {1987},
  url          = {https://doi.org/10.1007/BF01934177},
  doi          = {10.1007/BF01934177},
  timestamp    = {Tue, 22 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/bit/BurgdorffJSZ87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/Jajodia87,
  author       = {Sushil Jajodia},
  title        = {Letter from the {TC} Chairman},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {10},
  number       = {3},
  pages        = {1},
  year         = {1987},
  url          = {http://sites.computer.org/debull/87SEP-CD.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/Jajodia87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JajodiaS87,
  author       = {Sushil Jajodia and
                  Frederick N. Springsteel},
  title        = {Construction of Universal Instances for Loop-Free Network Databases
                  Using a Join-Like Operation},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {13},
  number       = {7},
  pages        = {811--819},
  year         = {1987},
  url          = {https://doi.org/10.1109/TSE.1987.233492},
  doi          = {10.1109/TSE.1987.233492},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JajodiaS87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/TripathiHJ87,
  author       = {Satish K. Tripathi and
                  Yennun Huang and
                  Sushil Jajodia},
  title        = {Local Area Networks: Software and Related Issues},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {13},
  number       = {8},
  pages        = {872--879},
  year         = {1987},
  url          = {https://doi.org/10.1109/TSE.1987.233506},
  doi          = {10.1109/TSE.1987.233506},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/TripathiHJ87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/Jajodia87,
  author       = {Sushil Jajodia},
  title        = {An Extension of "Representative Instances and gamma-Acyclic Relational
                  Schemes"},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {13},
  number       = {9},
  pages        = {1047--1048},
  year         = {1987},
  url          = {https://doi.org/10.1109/TSE.1987.233792},
  doi          = {10.1109/TSE.1987.233792},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/Jajodia87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MeadowsJ87,
  author       = {Catherine Meadows and
                  Sushil Jajodia},
  editor       = {Carl E. Landwehr},
  title        = {Integrity Versus Security in Multi-Level Secure Databases},
  booktitle    = {Database Security: Status and Prospects. Results of the {IFIP} {WG}
                  11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987},
  pages        = {89--101},
  publisher    = {North-Holland},
  year         = {1987},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MeadowsJ87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/JajodiaM87,
  author       = {Sushil Jajodia and
                  Catherine A. Meadows},
  title        = {Mutual Consistency in Decentralized Distributed Systems},
  booktitle    = {Proceedings of the Third International Conference on Data Engineering,
                  February 3-5, 1987, Los Angeles, California, {USA}},
  pages        = {396--404},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/ICDE.1987.7272405},
  doi          = {10.1109/ICDE.1987.7272405},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/JajodiaM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/Jajodia87,
  author       = {Sushil Jajodia},
  title        = {Managing Replicated Files in Partitioned Distributed Database Systems},
  booktitle    = {Proceedings of the Third International Conference on Data Engineering,
                  February 3-5, 1987, Los Angeles, California, {USA}},
  pages        = {412--418},
  publisher    = {{IEEE} Computer Society},
  year         = {1987},
  url          = {https://doi.org/10.1109/ICDE.1987.7272407},
  doi          = {10.1109/ICDE.1987.7272407},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/Jajodia87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/JajodiaM87,
  author       = {Sushil Jajodia and
                  David Mutchler},
  editor       = {Umeshwar Dayal and
                  Irving L. Traiger},
  title        = {Dynamic Voting},
  booktitle    = {Proceedings of the Association for Computing Machinery Special Interest
                  Group on Management of Data 1987 Annual Conference, San Francisco,
                  CA, USA, May 27-29, 1987},
  pages        = {227--238},
  publisher    = {{ACM} Press},
  year         = {1987},
  url          = {https://doi.org/10.1145/38713.38740},
  doi          = {10.1145/38713.38740},
  timestamp    = {Mon, 21 Jun 2021 16:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/JajodiaM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vldb/JajodiaM87,
  author       = {Sushil Jajodia and
                  David Mutchler},
  editor       = {Peter M. Stocker and
                  William Kent and
                  Peter Hammersley},
  title        = {Enhancements to the Voting Algorithm},
  booktitle    = {VLDB'87, Proceedings of 13th International Conference on Very Large
                  Data Bases, September 1-4, 1987, Brighton, England},
  pages        = {399--406},
  publisher    = {Morgan Kaufmann},
  year         = {1987},
  url          = {http://www.vldb.org/conf/1987/P399.PDF},
  timestamp    = {Wed, 29 Mar 2017 16:45:24 +0200},
  biburl       = {https://dblp.org/rec/conf/vldb/JajodiaM87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/Jajodia86,
  author       = {Sushil Jajodia},
  title        = {Recognizing Multivalued Dependencies in Relation Schemas},
  journal      = {Comput. J.},
  volume       = {29},
  number       = {5},
  pages        = {458--459},
  year         = {1986},
  url          = {https://doi.org/10.1093/comjnl/29.5.458},
  doi          = {10.1093/COMJNL/29.5.458},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/Jajodia86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/Jajodia86,
  author       = {Sushil Jajodia},
  title        = {Chairman's Message},
  journal      = {{IEEE} Database Eng. Bull.},
  volume       = {9},
  number       = {3},
  pages        = {1},
  year         = {1986},
  url          = {http://sites.computer.org/debull/86SEP-CD.pdf},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/Jajodia86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/Jajodia85,
  author       = {Sushil Jajodia},
  title        = {On Equivalence of Relational and Network Database Models},
  journal      = {Inf. Process. Lett.},
  volume       = {20},
  number       = {1},
  pages        = {51--54},
  year         = {1985},
  url          = {https://doi.org/10.1016/0020-0190(85)90130-9},
  doi          = {10.1016/0020-0190(85)90130-9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/Jajodia85.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/JajodiaNY84,
  author       = {Sushil Jajodia and
                  Peter Ann{-}Beng Ng and
                  Raymond T. Yeh},
  title        = {Introduction to the special issue on the use of entity-relationship
                  concepts in databases and related software},
  journal      = {J. Syst. Softw.},
  volume       = {4},
  number       = {2-3},
  pages        = {95--98},
  year         = {1984},
  url          = {https://doi.org/10.1016/0164-1212(84)90001-3},
  doi          = {10.1016/0164-1212(84)90001-3},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/JajodiaNY84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/JajodiaN84,
  author       = {Sushil Jajodia and
                  Peter A. Ng},
  title        = {Translation of entity-relationship diagrams into relational structures},
  journal      = {J. Syst. Softw.},
  volume       = {4},
  number       = {2-3},
  pages        = {123--133},
  year         = {1984},
  url          = {https://doi.org/10.1016/0164-1212(84)90003-7},
  doi          = {10.1016/0164-1212(84)90003-7},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/JajodiaN84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JajodiaN84,
  author       = {Sushil Jajodia and
                  Peter A. Ng},
  title        = {Representative Instances and gamma-Acyclic Relational Schemes},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {10},
  number       = {6},
  pages        = {614--618},
  year         = {1984},
  url          = {https://doi.org/10.1109/TSE.1984.5010290},
  doi          = {10.1109/TSE.1984.5010290},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JajodiaN84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/Jajodia84,
  author       = {Sushil Jajodia},
  editor       = {Mathai Joseph and
                  R. K. Shyamasundar},
  title        = {Universal and Representative Instances Using Unmarked Nulls},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  Fourth Conference, Bangalore, India, December 13-15, 1984, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {181},
  pages        = {367--378},
  publisher    = {Springer},
  year         = {1984},
  url          = {https://doi.org/10.1007/3-540-13883-8\_83},
  doi          = {10.1007/3-540-13883-8\_83},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/Jajodia84.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijpp/JajodiaNS83,
  author       = {Sushil Jajodia and
                  Peter A. Ng and
                  Frederick N. Springsteel},
  title        = {Entity-relationship diagrams which are in {BCNF}},
  journal      = {Int. J. Parallel Program.},
  volume       = {12},
  number       = {4},
  pages        = {269--283},
  year         = {1983},
  url          = {https://doi.org/10.1007/BF00991622},
  doi          = {10.1007/BF00991622},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijpp/JajodiaNS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JajodiaLN83,
  author       = {Sushil Jajodia and
                  Jian Liu and
                  Peter A. Ng},
  title        = {A Scheme of Parallel Processing for {MIMD} Systems},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {9},
  number       = {4},
  pages        = {436--445},
  year         = {1983},
  url          = {https://doi.org/10.1109/TSE.1983.234780},
  doi          = {10.1109/TSE.1983.234780},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JajodiaLN83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/JajodiaNS83,
  author       = {Sushil Jajodia and
                  Peter A. Ng and
                  Frederick N. Springsteel},
  title        = {The Problem of Equivalence for Entity-Relationship Diagrams},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {9},
  number       = {5},
  pages        = {617--630},
  year         = {1983},
  url          = {https://doi.org/10.1109/TSE.1983.235262},
  doi          = {10.1109/TSE.1983.235262},
  timestamp    = {Wed, 17 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/JajodiaNS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/JajodiaN83,
  author       = {Sushil Jajodia and
                  Peter A. Ng},
  editor       = {Carl G. Davis and
                  Sushil Jajodia and
                  Peter A. Ng and
                  Raymond T. Yeh},
  title        = {On the Representation of Relational Structures by Entity-Relationship
                  Diagrams},
  booktitle    = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach
                  (ER'83), Anaheim, California, {USA}},
  pages        = {249--263},
  publisher    = {North-Holland},
  year         = {1983},
  timestamp    = {Tue, 19 Jun 2018 19:05:56 +0200},
  biburl       = {https://dblp.org/rec/conf/er/JajodiaN83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/JajodiaNS83,
  author       = {Sushil Jajodia and
                  Peter A. Ng and
                  Frederick N. Springsteel},
  editor       = {Carl G. Davis and
                  Sushil Jajodia and
                  Peter A. Ng and
                  Raymond T. Yeh},
  title        = {On Universal and Representative Instances for Inconsistent Databases},
  booktitle    = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach
                  (ER'83), Anaheim, California, {USA}},
  pages        = {279--295},
  publisher    = {North-Holland},
  year         = {1983},
  timestamp    = {Tue, 18 Sep 2012 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/JajodiaNS83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/BlackwellJN83,
  author       = {Paul K. Blackwell and
                  Sushil Jajodia and
                  Peter A. Ng},
  editor       = {Carl G. Davis and
                  Sushil Jajodia and
                  Peter A. Ng and
                  Raymond T. Yeh},
  title        = {A View of Database Management Systems as Abstract Data Types},
  booktitle    = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach
                  (ER'83), Anaheim, California, {USA}},
  pages        = {661--668},
  publisher    = {North-Holland},
  year         = {1983},
  timestamp    = {Wed, 29 Mar 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/BlackwellJN83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/er/83,
  editor       = {Carl G. Davis and
                  Sushil Jajodia and
                  Peter A. Ng and
                  Raymond T. Yeh},
  title        = {Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach
                  (ER'83), Anaheim, California, {USA}},
  publisher    = {North-Holland},
  year         = {1983},
  isbn         = {0-444-86777-5},
  timestamp    = {Tue, 19 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/83.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics