Jaideep Vaidya

According to our database1, Jaideep Vaidya authored at least 185 papers between 2002 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Editorial.
IEEE Trans. Dependable Sec. Comput., 2019

Deploying ABAC policies using RBAC systems.
Journal of Computer Security, 2019

Security analysis of ABAC under an administrative model.
IET Information Security, 2019

Advances in Hardware Trojan Detection.
IEEE Computer, 2019

PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Information Forensics and Security, 2018

Towards designing robust CAPTCHAs.
Journal of Computer Security, 2018

A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
Journal of Computer Security, 2018

Perfectly Secure and Efficient Two-Party Electronic-Health-Record Linkage.
IEEE Internet Computing, 2018

Differentially Private Outlier Detection in a Collaborative Environment.
Int. J. Cooperative Inf. Syst., 2018

Securely Solving the Distributed Graph Coloring Problem.
CoRR, 2018

Efficient Determination of Equivalence for Encrypted Data.
CoRR, 2018

Privacy-Preserving Statistics.
IEEE Computer, 2018

Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

ASSEMBLE: a collaborative business process development tool.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Analysis and visualization of subjectivity and polarity of Twitter location data.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Web-based application for sentiment analysis of live tweets.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Emergency response plan recommendation and composition system (ERPRCS).
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

2017
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Management Inf. Syst., 2017

Privacy-preserving item-based recommendations over partitioned data with overlaps.
IJBIS, 2017

Migrating from RBAC to temporal RBAC.
IET Information Security, 2017

Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Government Information Quarterly, 2017

Evaluating the Privacy Implications of Frequent Itemset Disclosure.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Secure and Efficient k-NN Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Sentiment based Analysis of Tweets during the US Presidential Elections.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017

Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

A Scalable Privacy-preserving Data Generation Methodology for Exploratory Analysis.
Proceedings of the AMIA 2017, 2017

2016
Accurate and efficient query clustering via top ranked search results.
Web Intelligence, 2016

A Survey of Role Mining.
ACM Comput. Surv., 2016

Privacy Preserving Linear Programming.
CoRR, 2016

Mining temporal roles using many-valued concepts.
Computers & Security, 2016

PrefRank: Quantification and Aggregation of Subjective User Preferences.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Efficient Evaluation of Authorizations for Video Data.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Collaborative Differentially Private Outlier Detection for Categorical Data.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Management Inf. Syst., 2015

Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Sec. Comput., 2015

Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Sec. Comput., 2015

The generalized temporal role mining problem.
Journal of Computer Security, 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS Journal on Computing, 2015

Preserving Privacy in Collaborative Business Process Composition.
Proceedings of the SECRYPT 2015, 2015

Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015

Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015

Lightweight Practical Private One-Way Anonymous Messaging.
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015

Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015

A Privacy-Sensitive Collaborative Approach to Business Process Development.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Practical Private One-way Anonymous Message Routing.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Private Searching on Streaming Data Based on Keyword Frequency.
IEEE Trans. Dependable Sec. Comput., 2014

A Random Decision Tree Framework for Privacy-Preserving Data Mining.
IEEE Trans. Dependable Sec. Comput., 2014

An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optimization Letters, 2014

Detecting inappropriate access to electronic health records using collaborative filtering.
Machine Learning, 2014

A Survey of Privacy-Aware Supply Chain Collaboration: From Theory to Applications.
J. Information Systems, 2014

Security analysis for temporal role based access control.
Journal of Computer Security, 2014

An optimization framework for role mining.
Journal of Computer Security, 2014

Enhancing the government service experience through QR codes on mobile platforms.
Government Information Quarterly, 2014

Security analysis of temporal RBAC under an administrative model.
Computers & Security, 2014

PrefRank: fair aggregation of subjective user preferences.
Proceedings of the Symposium on Applied Computing, 2014

Privacy preserving trusted social feedback.
Proceedings of the Symposium on Applied Computing, 2014

Teaching privacy in an interactive fashion.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Efficient Integrity Verification for Outsourced Collaborative Filtering.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014

Collaboratively Solving the Traveling Salesman Problem with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud.
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014

2013
AMTRAC: An administrative model for temporal role-based access control.
Computers & Security, 2013

Differentially Private Naive Bayes Classification.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

Incorporating Privacy into the Undergraduate Curriculum.
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013

An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Structure-aware graph anonymization.
Web Intelligence and Agent Systems, 2012

Semantics-Based Automated Service Discovery.
IEEE Trans. Services Computing, 2012

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Sec. Comput., 2012

Secure and efficient distributed linear programming.
Journal of Computer Security, 2012

Privacy preserving collaborative filtering for SaaS enabling PaaS clouds.
J. Cloud Computing, 2012

Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012

Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012

Risk Based Access Control Using Classification.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012

Anonymizing set-valued data by nonreciprocal recoding.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Boolean Matrix Decomposition Problem: Theory, Variations and Applications to Data Engineering.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Differentially private search log sanitization with optimal output utility.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

Privacy in the context of digital government.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

Using QR codes for enhancing the scope of digital government services.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Secure composition of cascaded Web services.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Statistical Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011

Introduction.
Journal of Computer Security, 2011

A profile anonymization model for location-based services.
Journal of Computer Security, 2011

Secure construction and publication of contingency tables from distributed data.
Journal of Computer Security, 2011

Differentially Private Search Log Sanitization with Optimal Output Utility
CoRR, 2011

Search Engine Query Clustering Using Top-k Search Results.
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011

Privacy-Preserving Tabu Search for Distributed Graph Coloring.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

UICDS-based information sharing among emergency response application systems.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011

An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Efficient Distributed Linear Programming with Limited Disclosure.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Identifying a critical threat to privacy through automatic image classification.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Privacy-preserving Collaborative Filtering for the Cloud.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Efficient privacy-preserving similar document detection.
VLDB J., 2010

The role mining problem: A formal perspective.
ACM Trans. Inf. Syst. Secur., 2010

Role Engineering via Prioritized Subset Enumeration.
IEEE Trans. Dependable Sec. Comput., 2010

A unified index structure for efficient enforcement of spatiotemporal authorisations.
IJICS, 2010

Privacy Preserving Integration of Health Care Data.
IJCMAM, 2010

Spatial neighborhood based anomaly detection in sensor datasets.
Data Min. Knowl. Discov., 2010

Anonymization models for directional location based service environments.
Computers & Security, 2010

Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Ensuring Privacy and Security for LBS through Trajectory Partitioning.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Automating Security Configuration and Administration: An Access Control Perspective.
Proceedings of the Advances in Information and Computer Security, 2010

UICDS compliant resource management system for emergency response.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010

Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Vertically Partitioned Data.
Proceedings of the Encyclopedia of Database Systems, 2009

Secure Multiparty Computation Methods.
Proceedings of the Encyclopedia of Database Systems, 2009

Privacy-preserving indexing of documents on the network.
VLDB J., 2009

Privacy-Preserving Kth Element Score over Vertically Partitioned Data.
IEEE Trans. Knowl. Data Eng., 2009

Edge-RMP: Minimizing administrative assignments for role-based access control.
Journal of Computer Security, 2009

Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Privacy-preserving linear programming.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
A Survey of Privacy-Preserving Methods Across Vertically Partitioned Data.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Privacy-preserving Naïve Bayes classification.
VLDB J., 2008

Privacy-preserving decision trees over vertically partitioned data.
TKDD, 2008

An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manufacturing & Service Operations Management, 2008

Privacy-preserving SVM classification.
Knowl. Inf. Syst., 2008

Efficient security policy enforcement for the mobile environment.
Journal of Computer Security, 2008

Migrating to optimal RBAC with minimal perturbation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

The role mining problem: finding a minimal descriptive set of roles.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Enabling Better Medical Image Classification Through Secure Collaboration.
Proceedings of the International Conference on Image Processing, 2007

Privacy Preserving Integration of Health Care Data.
Proceedings of the AMIA 2007, 2007

2006
Privacy-preserving SVM using nonlinear kernels on horizontally partitioned data.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Privacy-Preserving SVM Classification on Vertically Partitioned Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006

RoleMiner: mining roles using subset enumeration.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Privacy Preserving Data Mining
Advances in Information Security 19, Springer, ISBN: 978-0-387-25886-7, 2006

2005
Secure set intersection cardinality with application to association rule mining.
Journal of Computer Security, 2005

Collusion Set Detection Through Outlier Discovery.
Proceedings of the Intelligence and Security Informatics, 2005

Privacy-Preserving Top-K Queries.
Proceedings of the 21st International Conference on Data Engineering, 2005

Knowledge Discovery from Transportation Network Data.
Proceedings of the 21st International Conference on Data Engineering, 2005

Privacy-Preserving Decision Trees over Vertically Partitioned Data.
Proceedings of the Data and Applications Security XIX, 2005

2004
Privacy-Preserving Data Mining: Why, How, and When.
IEEE Security & Privacy, 2004

Privacy Preserving Naïve Bayes Classifier for Vertically Partitioned Data.
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004

Privacy-Preserving Outlier Detection.
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004

Privacy-preserving data integration and sharing.
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004

2003
Leveraging the "Multi" in secure multi-party computation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Privacy-preserving k-means clustering over vertically partitioned data.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

2002
Tools for Privacy Preserving Data Mining.
SIGKDD Explorations, 2002

Privacy preserving association rule mining in vertically partitioned data.
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002


  Loading...