James B. D. Joshi

Orcid: 0000-0003-4519-9802

Affiliations:
  • University of Pittsburgh, Pennsylvania, USA


According to our database1, James B. D. Joshi authored at least 157 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services.
IEEE Trans. Dependable Secur. Comput., 2023

Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities.
Proceedings of the 5th IEEE International Conference on Trust, 2023

2022
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics.
IEEE Trans. Serv. Comput., 2022

NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets.
IEEE Trans. Dependable Secur. Comput., 2022

An Automatic Attribute-Based Access Control Policy Extraction From Access Logs.
IEEE Trans. Dependable Secur. Comput., 2022

2021
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput., 2021

Privacy-Preserving Machine Learning: Methods, Challenges and Directions.
CoRR, 2021

Adaptive ABAC Policy Learning: A Reinforcement Learning Approach.
CoRR, 2021

T3AB: Transparent and Trustworthy Third-party Authority using Blockchain.
CoRR, 2021

Cybersecurity Education in the Age of Artificial Intelligence.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Trustworthy and Transparent Third-party Authority.
ACM Trans. Internet Techn., 2020

A constraint and risk-aware approach to attribute-based access control for cyber-physical systems.
Comput. Secur., 2020

Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020

2019
Editorial.
IEEE Trans. Serv. Comput., 2019

Introduction to the Special Section on Advances in Internet-based Collaborative Technologies.
ACM Trans. Internet Techn., 2019

G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework.
IEEE Trans. Dependable Secur. Comput., 2019

A Trust Aware Unsupervised Learning Approach for Insider Threat Detection.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

CryptoNN: Training Neural Networks over Encrypted Data.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Temporal Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Role-Based Access Control.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

GEO-RBAC Model.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

ANSI/INCITS RBAC Standard.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Administration Model for RBAC.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Front Cover.
Computer, 2018

<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018

QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Modernizing the Future of American Voting.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Editorial: A Message from the New Editor-in-Chief.
IEEE Trans. Serv. Comput., 2017

Mining Historical Data towards Interference Management in Wireless SDNs.
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017

Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

A Risk-Aware Access Control Framework for Cyber-Physical Systems.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Differentially Private Trajectory Analysis for Points-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst., 2016

SocialMix: Supporting Privacy-Aware Trusted Social Networking Services.
Proceedings of the IEEE International Conference on Web Services, 2016

Enabling Attribute Based Encryption as an Internet Service.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

A Dynamic Privacy Aware Access Control Model for Location Based Services.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

An Integrated Privacy Preserving Attribute Based Access Control Framework.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Guest Editors' Introduction.
Int. J. Semantic Comput., 2015

Towards complexity analysis of User Authorization Query problem in RBAC.
Comput. Secur., 2015

2014
Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012).
Mob. Networks Appl., 2014

Guest editorial: Information reuse, integration, and reusable systems.
Inf. Syst. Frontiers, 2014

Preface.
Int. J. Cooperative Inf. Syst., 2014

Welcome Message from the Editors-in-Chief.
EAI Endorsed Trans. Collab. Comput., 2014

Editorial.
Comput. Secur., 2014

CPBAC: Property-based access control model for secure cooperation in online social networks.
Comput. Secur., 2014

Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework.
Proceedings of the Network and System Security - 8th International Conference, 2014

DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

LEAF: A privacy-conscious social network-based intervention tool for IPV survivors.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Top Location Anonymization for Geosocial Network Datasets.
Trans. Data Priv., 2013

Editorial for CollaborateCom 2011 Special Issue.
Mob. Networks Appl., 2013

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks.
IEEE Commun. Surv. Tutorials, 2013

Mutual-friend based attacks in social network systems.
Comput. Secur., 2013

An adaptive risk management and access control framework to mitigate insider threats.
Comput. Secur., 2013

Beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Towards understanding traveler behavior in Location-based Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Understanding venue popularity in Foursquare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Privacy settings in social networking systems: what you cannot control.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A HITS-based POI recommendation algorithm for location-based social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks.
IEEE Trans. Dependable Secur. Comput., 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012

ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012

Semantic-based policy management for cloud computing environments.
Int. J. Cloud Comput., 2012

CRiBAC: Community-centric role interaction based access control model.
Comput. Secur., 2012

A survey of security issue in multi-agent systems.
Artif. Intell. Rev., 2012

A trust-and-risk aware RBAC framework: tackling insider threat.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Exploring trajectory-driven local geographic topics in foursquare.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Towards secure cooperation in online social networks.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Preface.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Towards understanding residential privacy by analyzing users' activities in foursquare.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012

2011
Guest Editorial SACMAT 2009 and 2010.
ACM Trans. Inf. Syst. Secur., 2011

An Alternative Approach to k-Anonymity for Location-Based Services.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

BaRMS: A Bayesian Reputation Management Approach for P2P Systems.
J. Inf. Knowl. Manag., 2011

Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration.
J. Inf. Knowl. Manag., 2011

Ontology-based access control for social network systems.
Int. J. Inf. Priv. Secur. Integr., 2011

Analysing security and privacy issues of using e-mail address as identity.
Int. J. Inf. Priv. Secur. Integr., 2011

Editorial.
Comput. Secur., 2011

Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A trust-based approach against IP-spoofing attacks.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

A secure, constraint-aware role-based access control interoperation framework.
Proceedings of the 5th International Conference on Network and System Security, 2011

DRiBAC: Fine-grained dynamic role interaction access control using ontology.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011

Anonymizing geo-social network datasets.
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

A trust-based approach to mitigate rerouting attacks.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Towards active detection of identity clone attacks on online social networks.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Security and Privacy Challenges in Cloud Computing Environments.
IEEE Secur. Priv., 2010

OSNAC: An Ontology-based Access Control Model for Social Networking Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Security and Privacy Risks of Using E-mail Address as an Identity.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Message from Program Co-Chairs.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Panel title: Critical need for funding of basic and applied research in large-scale computing.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010

Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS.
Proceedings of IEEE International Conference on Communications, 2010

Topic-based personalized recommendation for collaborative tagging system.
Proceedings of the HT'10, 2010

Role-based domain discovery in decentralized secure interoperations.
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010

SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A collaborative approach to facilitate intrusion detection and response against DDoS attacks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Preserving structural properties in anonymization of social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Message from the general chairs.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Temporal Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Role Based Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

GEO-RBAC Model.
Proceedings of the Encyclopedia of Database Systems, 2009

ANSI/INCITS RBAC Standard.
Proceedings of the Encyclopedia of Database Systems, 2009

Administration Model for RBAC.
Proceedings of the Encyclopedia of Database Systems, 2009

IPv6 Security Challenges.
Computer, 2009

An architecture for specification and enforcement of temporal access control constraints using OWL.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009

RRNA: reliable soft real-time network aware grid scheduling algorithm using round trip time.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

A collaborative k-anonymity approach for location privacy in location-based services.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

2008
Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur., 2008

Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

PuRBAC: Purpose-Aware Role-Based Access Control.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

IWSSE 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the IWSSE 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Access Control for Cooperation Systems Based on Group Situation.
Proceedings of the Collaborative Computing: Networking, 2008

RiBAC: Role Interaction Based Access Control Model for Community Computing.
Proceedings of the Collaborative Computing: Networking, 2008

2007
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
Proceedings of the Third International Symposium on Information Assurance and Security, 2007

2006
Fine-grained role-based delegation in presence of the hybrid role hierarchy.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.
Proceedings of the Trust Management, 4th International Conference, 2006

A similarity based technique for detecting malicious executable files for computer forensics.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

An Integrated Framework for Trust-Based Access Control for Open Systems.
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006

2005
Secure Interoperation in a Multidomain Environment Employing RBAC Policies.
IEEE Trans. Knowl. Data Eng., 2005

A Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Knowl. Data Eng., 2005

X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005

An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Dependable Secur. Comput., 2005

A Role-Based Access Control Policy Verification Framework for Real-Time Systems.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

<i>LoT-RBAC</i>: A Location and Time-Based RBAC Model.
Proceedings of the Web Information Systems Engineering, 2005

Towards administration of a hybrid role hierarchy.
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

2004
Access-Control Language for Multidomain Environments.
IEEE Internet Comput., 2004

XML-Based Specification for Web Services Document Security.
Computer, 2004

X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

2003
Dependencies and separation of duty constraints in GTRBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
Security and Privacy Challenges of a Digital Government.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002

A model for secure multimedia document database system in a distributed environment.
IEEE Trans. Multim., 2002

Temporal hierarchies and inheritance semantics for GTRBAC.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2001
Digital Government Security Infrastructure Design Challenges.
Computer, 2001

Security models for web-based applications.
Commun. ACM, 2001

2000
A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1998
Evaluation of Filtering Mechanisms for MPEG Video Communications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998


  Loading...