Sushil Jajodia

According to our database1, Sushil Jajodia authored at least 536 papers between 1983 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Awards

IEEE Fellow

IEEE Fellow 2013, "For contributions to information security, data protection, and privacy".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC.
IEEE Trans. Information Forensics and Security, 2019

Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Information Forensics and Security, 2019

Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center.
IEEE Systems Journal, 2019

Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
Journal of Computer Security, 2019

A methodology for ensuring fair allocation of CSOC effort for alert investigation.
Int. J. Inf. Sec., 2019

Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Computer Communications, 2019

FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

CASFinder: Detecting Common Attack Surface.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

2018
Temporal Granularity.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine.
ACM Trans. Internet Techn., 2018

Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM TIST, 2018

VULCON: A System for Vulnerability Prioritization, Mitigation, and Management.
ACM Trans. Priv. Secur., 2018

Memory Forensic Challenges Under Misused Architectural Features.
IEEE Trans. Information Forensics and Security, 2018

Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Service Oriented Computing and Applications, 2018

Data Synthesis based on Generative Adversarial Networks.
PVLDB, 2018

Hybrid adversarial defense: Merging honeypots and traditional security methods.
Journal of Computer Security, 2018

Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
Journal of Computer Security, 2018

A methodology to measure and monitor level of operational effectiveness of a CSOC.
Int. J. Inf. Sec., 2018

Defending from Stealthy Botnets Using Moving Target Defenses.
IEEE Security & Privacy, 2018

Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception.
IEEE Intelligent Systems, 2018

Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
An Integrated Framework for Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Computer-Aided Human Centric Cyber Situation Awareness.
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017

Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk.
ACM TIST, 2017

A Probabilistic Logic of Cyber Deception.
IEEE Trans. Information Forensics and Security, 2017

An Authorization Model for Multi-Provider Queries.
PVLDB, 2017

Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017

Network Security Metrics
Springer, ISBN: 978-3-319-66504-7, 2017

2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM TIST, 2016

Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Information Forensics and Security, 2016

Profiling Online Social Behaviors for Compromised Account Detection.
IEEE Trans. Information Forensics and Security, 2016

State of the Journal.
IEEE Trans. Computers, 2016

Efficient integrity checks for join queries in the cloud.
Journal of Computer Security, 2016

Minimum cost rule enforcement for cooperative database access.
Journal of Computer Security, 2016

Using temporal probabilistic logic for optimal monitoring of security events with limited resources.
Journal of Computer Security, 2016

Dependable and Resilient Cloud Computing.
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016

AHEAD: A New Architecture for Active Defense.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Threat Modeling for Cloud Data Center Infrastructures.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement.
Proceedings of the 27th International Workshop on Database and Expert Systems Applications, 2016

Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A Moving Target Defense Approach to Disrupting Stealthy Botnets.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Trusted cloud SQL DBS with on-the-fly AES decryption/encryption.
Proceedings of the 2016 IEEE International Conference on Big Data, 2016

Deceiving Attackers by Creating a Virtual Attack Surface.
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016

2015
Pareto-Optimal Adversarial Defense of Enterprise Systems.
ACM Trans. Inf. Syst. Secur., 2015

Loose associations to increase utility in data publishing.
Journal of Computer Security, 2015

Integrity for Approximate Joins on Untrusted Computational Servers.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Numerical SQL Value Expressions Over Encrypted Cloud Databases.
Proceedings of the Database and Expert Systems Applications, 2015

Disrupting stealthy botnets through strategic placement of detectors.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A deception based approach for defeating OS and service fingerprinting.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Now You See Me: Hide and Seek in Physical Address Space.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Network Hardening - An Automated Approach to Improving Network Security
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014

Formation of Awareness.
Proceedings of the Cyber Defense and Situational Awareness, 2014

Recognizing Unexplained Behavior in Network Traffic.
Proceedings of the Network Science and Cybersecurity, 2014

Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014

Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Information Forensics and Security, 2014

k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Sec. Comput., 2014

Fragmentation in Presence of Data Dependencies.
IEEE Trans. Dependable Sec. Comput., 2014

Consistency and enforcement of access rules in cooperative data sharing environment.
Computers & Security, 2014

A probabilistic framework for jammer identification in MANETs.
Ad Hoc Networks, 2014

Gemini: An Emergency Line of Defense against Phishing Attacks.
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014

Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014

Protecting Enterprise Networks through Attack Surface Expansion.
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014

Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014

TrustDump: Reliable Memory Acquisition on Smartphones.
Proceedings of the Computer Security - ESORICS 2014, 2014

Optimizing Integrity Checks for Join Queries in the Cloud.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Consistent Query Plan Generation in Secure Cooperative Data Access.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Metrics suite for network attack graph analytics.
Proceedings of the Cyber and Information Security Research Conference, 2014

Integrity for distributed queries.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Self-healing wireless networks under insider jamming attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Manipulating the attacker's view of a system's attack surface.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

MTD 2014: First ACM Workshop on Moving Target Defense.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Proof of Isolation for Cloud Storage.
Proceedings of the Secure Cloud Computing, 2014

Enabling Collaborative Data Authorization Between Enterprise Clouds.
Proceedings of the Secure Cloud Computing, 2014

Securing Mission-Centric Operations in the Cloud.
Proceedings of the Secure Cloud Computing, 2014

Database Security and Privacy.
Proceedings of the Computing Handbook, 2014

2013
Cyber Maneuver Against External Adversaries and Compromised Nodes.
Proceedings of the Moving Target Defense II, 2013

Providing Users' Anonymity in Mobile Hybrid Networks.
ACM Trans. Internet Techn., 2013

Recoverable Encryption through a Noised Secret over a Large Cloud.
Trans. Large-Scale Data- and Knowledge-Centered Systems, 2013

Preserving privacy against external and internal threats in WSN data aggregation.
Telecommunication Systems, 2013

Integrity for Join Queries in the Cloud.
IEEE Trans. Cloud Computing, 2013

Guest Editorial.
IEEE Systems Journal, 2013

Guest Editorial.
IEEE Systems Journal, 2013

Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Network and Computer Applications, 2013

Enforcing dynamic write privileges in data outsourcing.
Computers & Security, 2013

Blog or block: Detecting blog bots through behavioral biometrics.
Computer Networks, 2013

A Logic Framework for Flexible and Security-Aware Service Composition.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

A Unified Framework for Measuring a Network's Mean Time-to-Compromise.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

An Efficient Approach to Assessing the Risk of Zero-Day Vulnerabilities.
Proceedings of the SECRYPT 2013, 2013

Security and Privacy of Data in a Cloud.
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013

Reducing Attack Surface with VM-Based Phantom Server.
Proceedings of the 32th IEEE Military Communications Conference, 2013

An Efficient Framework for Evaluating the Risk of Zero-Day Vulnerabilities.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013

On information leakage by indexes over data fragments.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Encryption and Fragmentation for Data Confidentiality in the Cloud.
Proceedings of the Foundations of Security Analysis and Design VII, 2013

Reliable mission deployment in vulnerable distributed systems.
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013

TerraCheck: Verification of Dedicated Cloud Storage.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Extending Loose Associations to Multiple Fragments.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Rule Enforcement with Third Parties in Secure Cooperative Data Access.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Welcome message.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A moving target defense mechanism for MANETs based on identity virtualization.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Verification of data redundancy in cloud storage.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
Integrating trust management and access control in data-intensive Web applications.
TWEB, 2012

Secure Data Aggregation in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2012

Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg?
IEEE Trans. Dependable Sec. Comput., 2012

Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification.
Proceedings of the Security and Trust Management - 8th International Workshop, 2012

Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Secure File Allocation and Caching in Large-scale Distributed Systems.
Proceedings of the SECRYPT 2012, 2012

A Mission-centric Framework for Cyber Situational Awareness.
Proceedings of the SECRYPT 2012, 2012

Support for Write Privileges on Outsourced Data.
Proceedings of the Information Security and Privacy Research, 2012

Rule Configuration Checking in Secure Cooperative Data Access.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

On the Accurate Identification of Network Service Dependencies in Distributed Systems.
Proceedings of the Strategies, 2012

NSDMiner: Automated discovery of Network Service Dependencies.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Disk storage isolation and verification in cloud.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Recoverable Encryption through Noised Secret over a Large Cloud.
Proceedings of the Data Management in Cloud, Grid and P2P Systems, 2012

A Probabilistic Framework for Localization of Attackers in MANETs.
Proceedings of the Computer Security - ESORICS 2012, 2012

Time-efficient and cost-effective network hardening using attack graphs.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Enforcing Subscription-Based Authorization Policies in Cloud Scenarios.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Access rule consistency in cooperative data access environment.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Securing password recovery through dispersion.
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012

2011
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies.
VLDB J., 2011

Authorization enforcement in distributed query evaluation.
Journal of Computer Security, 2011

Selective data outsourcing for enforcing privacy.
Journal of Computer Security, 2011

Message from the Guest Editors.
Int. J. Inf. Sec., 2011

The ephemeral legion: producing an expert cyber-security work force from thin air.
Commun. ACM, 2011

Private data indexes for selective access to outsourced data.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Privacy of data outsourced to a cloud for selected readers through client-side encryption.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Trading Elephants for Ants: Efficient Post-attack Reconstitution.
Proceedings of the Security and Privacy in Communication Networks, 2011

Security Considerations in Data Center Configuration Management.
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011

Automatic security analysis using security metrics.
Proceedings of the MILCOM 2011, 2011

Cauldron mission-centric cyber situational awareness with defense in depth.
Proceedings of the MILCOM 2011, 2011

Scalable Analysis of Attack Scenarios.
Proceedings of the Computer Security - ESORICS 2011, 2011

Cooperative Data Access in Multi-cloud Environments.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Scalable Detection of Cyber Attacks.
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011

2010
Topological Vulnerability Analysis.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Cyber SA: Situational Awareness for Cyber Defense.
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010

Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010

Encryption policies for regulating access to outsourced data.
ACM Trans. Database Syst., 2010

Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Combining fragmentation and encryption to protect privacy in data storage.
ACM Trans. Inf. Syst. Secur., 2010

Providing witness anonymity under peer-to-peer settings.
IEEE Trans. Information Forensics and Security, 2010

An Application-Level Data Transparent Authentication Scheme without Communication Overhead.
IEEE Trans. Computers, 2010

Fragments and Loose Associations: Respecting Privacy in Data Publishing.
PVLDB, 2010

Editorial.
Journal of Computer Security, 2010

Measuring Security Risk of Networks Using Attack Graphs.
IJNGC, 2010

Access control for smarter healthcare using policy spaces.
Computers & Security, 2010

QoP and QoS Policy Cognizant Module Composition.
Proceedings of the POLICY 2010, 2010

Tracking Skype VoIP Calls Over The Internet.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Encryption-Based Policy Enforcement for Cloud Storage.
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010

k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010

Providing Mobile Users' Anonymity in Hybrid Networks.
Proceedings of the Computer Security, 2010

Restoring compromised privacy in micro-data disclosure.
Proceedings of the 5th ACM Symposium on Information, 2010

Who is tweeting on Twitter: human, bot, or cyborg?
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

LH*RE: A Scalable Distributed Data Structure with Recoverable Encryption.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Temporal Granularity.
Proceedings of the Encyclopedia of Database Systems, 2009

Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Vehicular Technology, 2009

Privacy-preserving robust data aggregation in wireless sensor networks.
Security and Communication Networks, 2009

Evaluating privacy threats in released database views by symmetric indistinguishability.
Journal of Computer Security, 2009

Model-Driven Development for secure information systems.
Information & Software Technology, 2009

Secure median computation in wireless sensor networks.
Ad Hoc Networks, 2009

Preserving Anonymity of Recurrent Location-Based Queries.
Proceedings of the TIME 2009, 2009

L-Cover: Preserving Diversity by Anonymity.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS.
Proceedings of the MDM 2009, 2009

Privacy-Aware Proximity Based Services.
Proceedings of the MDM 2009, 2009

Online detection of network traffic anomalies using behavioral distance.
Proceedings of the 17th International Workshop on Quality of Service, 2009

Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

Keep a Few: Outsourcing Data While Maintaining Confidentiality.
Proceedings of the Computer Security, 2009

Anonymity and Historical-Anonymity in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

Privacy Preservation over Untrusted Mobile Networks.
Proceedings of the Privacy in Location-Based Applications, 2009

Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009

2008
Data Security.
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008

Security in Data Warehouses and OLAP Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Damage Quarantine and Recovery in Data Processing Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Detecting VoIP Floods Using the Hellinger Distance.
IEEE Trans. Parallel Distrib. Syst., 2008

Achieving simultaneous distribution control and privacy protection for Internet media delivery.
TOMCCAP, 2008

Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs.
J. Network Syst. Manage., 2008

Implementing interactive analysis of attack graphs using relational databases.
Journal of Computer Security, 2008

Preserving confidentiality of security policies in data outsourcing.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Securely computing an approximate median in wireless sensor networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Simulatable Binding: Beyond Simulatable Auditing.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

How Anonymous Is k-Anonymous? Look at Your Quasi-ID.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Model-Based Covert Timing Channels: Automated Modeling and Evasion.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Controlled Information Sharing in Collaborative Distributed Query Processing.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.
Proceedings of the Data and Applications Security XXII, 2008

An Attack Graph-Based Probabilistic Security Metric.
Proceedings of the Data and Applications Security XXII, 2008

Regulating Exceptions in Healthcare Using Policy Spaces.
Proceedings of the Data and Applications Security XXII, 2008

Assessing query privileges via safe and efficient permission composition.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

Efficiently tracking application interactions using lightweight virtualization.
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008

Measuring network security using dynamic bayesian network.
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008

2007
Trusted Recovery.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Preserving Privacy in On-line Analytical Processing Data Cubes.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Access Control Policies and Languages in Open Environments.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Basic Security Concepts.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
TOSN, 2007

Can-Follow Concurrency Control.
IEEE Trans. Computers, 2007

Parity-based inference control for multi-dimensional range sum queries.
Journal of Computer Security, 2007

Chaining watermarks for detecting malicious modifications to streaming data.
Inf. Sci., 2007

Access control policies and languages.
IJCSE, 2007

Selective Data Encryption in Outsourced Dynamic Environments.
Electr. Notes Theor. Comput. Sci., 2007

Efficient security mechanisms for overlay multicast based content delivery.
Computer Communications, 2007

Over-encryption: Management of Access Control Evolution on Outsourced Data.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing.
Proceedings of the New Approaches for Security, 2007

Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Anonymity and Diversity in LBS: A Preliminary Investigation.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Anonymity in Location-Based Services: Towards a General Framework.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

Fragmentation and Encryption to Enforce Privacy in Data Storage.
Proceedings of the Computer Security, 2007

Measuring the Overall Security of Network Configurations Using Attack Graphs.
Proceedings of the Data and Applications Security XXI, 2007

Information disclosure under realistic assumptions: privacy versus optimality.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

Toward measuring network security using attack graphs.
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007

Trust management services in relational databases.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

A data outsourcing architecture combining cryptography and access control.
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Topological analysis of network attack vulnerability.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

Efficient Distributed Detection of Node Replication Attacks in Sensor Networks.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

Preserving Privacy in On-Line Analytical Processing (OLAP)
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007

2006
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks.
TOSN, 2006

SS7 over IP: signaling interworking vulnerabilities.
IEEE Network, 2006

On the anonymity and traceability of peer-to-peer VoIP calls.
IEEE Network, 2006

Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006

A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006

Unauthorized inferences in semistructured databases.
Inf. Sci., 2006

Building trust in peer-to-peer systems: a review.
IJSN, 2006

Data warehousing and data mining techniques for intrusion detection systems.
Distributed and Parallel Databases, 2006

Minimum-cost network hardening using attack graphs.
Computer Communications, 2006

Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts.
Computer Communications, 2006

LHAP: A lightweight network access control protocol for ad hoc networks.
Ad Hoc Networks, 2006

k-Anonymity in Databases with Timestamped Data.
Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME 2006), 2006

A framework for establishing, assessing, and managing trust in inter-organizational relationships.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

DaTA - Data-Transparent Authentication Without Communication Overhead.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society Conference on Sensor, 2006

Indistinguishability: The Other Aspect of Privacy.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Attack-resilient hierarchical data aggregation in sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Redirection policies for mission-based information sharing.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

A robust watermarking system based on SVD compression.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Topological analysis of network attack vulnerability.
Proceedings of the 2006 International Conference on Privacy, 2006

Toward Information Sharing: Benefit And Risk Access Control (BARAC).
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

Fast Detection of Denial-of-Service Attacks on IP Telephony.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006

VoIP Intrusion Detection Through Interacting Protocol State Machines.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Creating Objects in the Flexible Authorization Framework.
Proceedings of the Data and Applications Security XX, 2006

Interactive Analysis of Attack Graphs Using Relational Queries.
Proceedings of the Data and Applications Security XX, 2006

Providing witness anonymity in peer-to-peer systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

A weakest-adversary security metric for network configuration security analysis.
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006

V-COPS: A Vulnerability-Based Cooperative Alert Distribution System.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Modeling and assessing inference exposure in encrypted databases.
ACM Trans. Inf. Syst. Secur., 2005

Fingerprinting Relational Databases: Schemes and Specialties.
IEEE Trans. Dependable Sec. Comput., 2005

Information Release Control: A Learning-Based Architecture.
J. Data Semantics, 2005

Maintaining privacy on derived objects.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Checking for k-Anonymity Violation by Views.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Multiple Coordinated Views for Network Attack Graphs.
Proceedings of the IEEE Workshop on Visualization for Computer Security (VizSEC 2005), 2005

Key management for multi-user encrypted databases.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Securing Topology Maintenance Protocols for Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Securing MAODV: attacks and countermeasures.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor, 2005

Metadata Management in Outsourced Encrypted Databases.
Proceedings of the Secure Data Management, 2005

Protecting Privacy Against Location-Based Personal Identification.
Proceedings of the Secure Data Management, 2005

Practical Broadcast Authentication in Sensor Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Rule-Based Topological Vulnerability Analysis.
Proceedings of the Computer Network Security, 2005

MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005

Authentication and Integrity in Telecommunication Signaling Network.
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005

Policies, Models, and Languages for Access Control.
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005

Tracking anonymous peer-to-peer VoIP calls on the internet.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution.
Proceedings of the Applied Cryptography and Network Security, 2005

Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005

2004
Reasoning with advanced policy rules and its application to access control.
Int. J. on Digital Libraries, 2004

Cardinality-based inference control in data cubes.
Journal of Computer Security, 2004

Managing attack graph complexity through visual hierarchical aggregation.
Proceedings of the Workshop on Visualization and Data Mining for Computer Security (VizSEC/DMSEC 2004), 2004

A Hierarchical Release Control Policy Framework.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Securing OLAP Data Cubes Against Privacy Breaches.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Identifying Sensitive Associations in Databases for Release Control.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks.
Proceedings of the 1st Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2004), 2004

Implementing Consistency Checking in Correlating Attacks.
Proceedings of the Distributed Computing and Internet Technology, 2004

A Flexible Authorization Framework for E-Commerce.
Proceedings of the Distributed Computing and Internet Technology, 2004

Incorporating Dynamic Constraints in the Flexible Authorization Framework.
Proceedings of the Computer Security, 2004

Tamper detection and localization for categorical data using fragile watermarks.
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004

Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

A logic-based framework for attribute based access control.
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004

Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distrib. Syst., 2003

Removing permissions in the flexible authorization framework.
ACM Trans. Database Syst., 2003

A propositional policy algebra for access control.
ACM Trans. Inf. Syst. Secur., 2003

Provisions and Obligations in Policy Rule Management.
J. Network Syst. Manage., 2003

A Checksum-based Corruption Detection Technique.
Journal of Computer Security, 2003

Providing secrecy in key management protocols for large wireless sensors networks.
Ad Hoc Networks, 2003

Recent Advances in Access Control Models.
Proceedings of the Advances in Web-Age Information Management, 2003

A Learning-based Approach to Information Release Control.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Implementation of a Storage Mechanism for Untrusted DBMSs.
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003

LEAP - efficient security mechanisms for large-scale distributed sensor networks.
Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, 2003

A User Friendly Guard with Mobile Post-Release Access Control Policy.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

Bootstrapping a Data Mining Intrusion Detection System.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003

Scalable Group Rekeying for Secure Multicast: A Survey.
Proceedings of the Distributed Computing, 2003

Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003

LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Performance Optimizations for Group Key Management Scheme.
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003

Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
Proceedings of the Computer Security, 2003

Constructing a virtual primary key for fingerprinting relational data.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

FlexFlow: A Flexible Flow Control Policy Specification Framework.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

Securely sharing neuroimagery.
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003

LEAP: efficient security mechanisms for large-scale distributed sensor networks.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Balancing confidentiality and efficiency in untrusted relational DBMSs.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach
Advances in Information Security 9, Springer, 2003

2002
Recovery from Malicious Transactions.
IEEE Trans. Knowl. Data Eng., 2002

The Inference Problem: A Survey.
SIGKDD Explorations, 2002

A comparative performance analysis of reliable group rekey transport protocols for secure multicast.
Perform. Eval., 2002

Enhancing Profiles for Anomaly Detection Using Time Granularities.
Journal of Computer Security, 2002

Temporal Reasoning in Workflow Systems.
Distributed and Parallel Databases, 2002

Consistent policy enforcement in distributed systems using mobile policies.
Data Knowl. Eng., 2002

Design and implementation of a decentralized prototype system for detecting distributed attacks.
Computer Communications, 2002

An Algebraic Representation of Calendars.
Ann. Math. Artif. Intell., 2002

Solving multi-granularity temporal constraint networks.
Artif. Intell., 2002

Provisions and Obligations in Policy Management and Security Applications.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

Propagating Modifications to Mobile Policies.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002

Efficient and secure keys management for wireless mobile communications.
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002

Obligation Monitoring in Policy Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Preventing Interval-Based Inference by Random Data Perturbation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

A Privacy-Enhanced Microaggregation Method.
Proceedings of the Foundations of Information and Knowledge Systems, 2002

Cardinality-Based Inference Control in Sum-Only Data Cubes.
Proceedings of the Computer Security, 2002

Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002

Mining Malicious Corruption of Data with Hidden Markov Models.
Proceedings of the Research Directions in Data and Applications Security, 2002

Policy algebras for access control the predicate case.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002

An Architecture for Anomaly Detection.
Proceedings of the Applications of Data Mining in Computer Security, 2002

2001
Provisional Authorizations.
Proceedings of the E-Commerce Security and Privacy, 2001

Flexible support for multiple access control policies.
ACM Trans. Database Syst., 2001

An authorization model for a public key management service.
ACM Trans. Inf. Syst. Secur., 2001

Abstraction-based intrusion detection in distributed environments.
ACM Trans. Inf. Syst. Secur., 2001

ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection.
SIGMOD Record, 2001

Multilevel Security Transaction Processing.
Journal of Computer Security, 2001

Security in Federated Database Systems.
Inf. Sec. Techn. Report, 2001

Avoiding loss of fairness owing to failures in fair data exchange systems.
Decision Support Systems, 2001

Discovering Calendar-based Temporal Association Rules.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

Going Beyond MAC and DAC Using Mobile Policies.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

Detecting Novel Network Intrusions Using Bayes Estimators.
Proceedings of the First SIAM International Conference on Data Mining, 2001

Subject Switching Algorithms for Access Control in Federated Databases.
Proceedings of the Database and Application Security XV, 2001

A Novel Approach to Certificate Revocation Management.
Proceedings of the Database and Application Security XV, 2001

Recent Advances in Access Control Models.
Proceedings of the Database and Application Security XV, 2001

Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Revocations-A Classification.
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001

Policy algebras for access control: the propositional case.
Proceedings of the CCS 2001, 2001

2000
ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2000

Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures.
IEEE Trans. Knowl. Data Eng., 2000

Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000

Flexible Transaction Dependencies in Database Systems.
Distributed and Parallel Databases, 2000

Rewriting Histories: Recovering from Malicious Transactions.
Distributed and Parallel Databases, 2000

Modeling requests among cooperating intrusion detection systems.
Computer Communications, 2000

Discovering Temporal Patterns in Multiple Granularities.
Proceedings of the Temporal, 2000

Free Schedules for Free Agents in Workflow Systems.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

Kronos: A Scalable Group Re-Keying Approach for Secure Multicast.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Using Checksums to Detect Data Corruption.
Proceedings of the Advances in Database Technology, 2000

Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Distributed Policies for Data Management - Making Policies Mobile.
Proceedings of the Data and Application Security, 2000

Protecting File systems Against Corruption Using Checksums.
Proceedings of the Data and Application Security, 2000

Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

Time granularities in databases, data mining, and temporal reasoning.
Springer, ISBN: 978-3-540-66997-5, 2000

1999
A Flexible Authorization Mechanism for Relational Data Management Systems.
ACM Trans. Inf. Syst., 1999

Scalable Threshold Closure.
Theor. Comput. Sci., 1999

Data replication gaining popularity.
IEEE Concurrency, 1999

Distributed Databases: Turing Award Winner Jim Gray on the new millennium.
IEEE Concurrency, 1999

Computer Security, Fault Tolerance, And Software Assurance.
IEEE Concurrency, 1999

Surviving Information Warfare Attacks.
IEEE Computer, 1999

Trusted Recovery.
Commun. ACM, 1999

The Integrity Challenge.
Proceedings of the Integrity and Internal Control in Information Systems, 1999

On Fingerprinting Images for Recognition.
Proceedings of the MIS '99, 1999

Recovery of Watermarks from Distorted Images.
Proceedings of the Information Hiding, Third International Workshop, 1999

Protecting Critical Information Systems (Abstract).
Proceedings of the Information and Communication Security, Second International Conference, 1999

Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999

Integrating Data Mining Techniques with Intrusion Detection Methods.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

Intrusion Confinement by Isolation in Information Systems.
Proceedings of the Research Advances in Database and Information Systems Security, 1999

Application-Level Isolation Using Data Inconsistency Detection.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999

1998
Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Semantic Assumptions and Their Use in Databases.
IEEE Trans. Knowl. Data Eng., 1998

Advanced Transaction Processing in Multilevel Secure File Stores.
IEEE Trans. Knowl. Data Eng., 1998

A Semantic-Based Transaction Processing Model for Multilevel Transactions.
Journal of Computer Security, 1998

Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information.
International Journal on Artificial Intelligence Tools, 1998

Interview: Amit Sheth On Workflow Technology.
IEEE Concurrency, 1998

Mining Temporal Relationships with Multiple Granularities in Time Sequences.
IEEE Data Eng. Bull., 1998

Exploring Steganography: Seeing the Unseen.
IEEE Computer, 1998

A General Framework for Time Granularity and Its Application to Temporal Reasoning.
Ann. Math. Artif. Intell., 1998

Algebra for Databases with Explicit Markings of Damaged Data.
Proceedings of the Integrity and Internal Control in Information Systems, 1998

Steganalysis of Images Created Using Current Steganography Software.
Proceedings of the Information Hiding, 1998

Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998

Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

A Fair Locking Protocol for Multilevel Secure Databases.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Application-Level Isolation to Cope with Malicious Database Users.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

1997
An Adaptive Data Replication Algorithm.
ACM Trans. Database Syst., 1997

Logical Design for Temporal Databases with Multiple Granularities.
ACM Trans. Database Syst., 1997

Applying Formal Methods to Semantic-Based Decomposition of Transactions.
ACM Trans. Database Syst., 1997

Information Flow Control in Object-Oriented Systems.
IEEE Trans. Knowl. Data Eng., 1997

An Extended Authorization Model for Relational Databases.
IEEE Trans. Knowl. Data Eng., 1997

Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997

Information Systems Research at George Mason University.
SIGMOD Record, 1997

A theoretical formulation for degrees of isolation in databases.
Information & Software Technology, 1997

Rethinking integrity [distributed databases].
IEEE Concurrency, 1997

Semantics-based transaction processing: satisfying conflicting objectives.
IEEE Concurrency, 1997

A Logical Language for Expressing Authorizations.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Providing flexibility in information flow control for object oriented systems.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

Surviving information warfare attacks on databases.
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997

A Unified Framework for Enforcing Multiple Access Control Policies.
Proceedings of the SIGMOD 1997, 1997

Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997

A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997

Temporal Database Bibliography Update.
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997


An Architecture for Supporting Interoperability among Temporal Databases.
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997

Satisfiability of Quantitative Temporal Constraints with Multiple Granularities.
Proceedings of the Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29, 1997

Implementing Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Information Systems Engineering, 1997

Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997

Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997

Database Security and Privacy.
Proceedings of the Computer Science and Engineering Handbook, 1997

1996
Globally Consistent Event Ordering in One-Directional Distributed Environments.
IEEE Trans. Parallel Distrib. Syst., 1996

Correctness Criteria for Multilevel Secure Transactions.
IEEE Trans. Knowl. Data Eng., 1996

An Authorization Model for a Distributed Hypertext System.
IEEE Trans. Knowl. Data Eng., 1996

Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996

Maintaining Replicated Authorizations in Distributed Database Systems.
Data Knowl. Eng., 1996

Managing Security and Privacy of Information.
ACM Comput. Surv., 1996

Database Security and Privacy.
ACM Comput. Surv., 1996

A General Framework and Reasoning Model for Time Granularity.
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996

Supporting Multiple Access Control Policies in Database Systems.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Ensuring Atomicity of Multilevel Transactions.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996

Secure Mediated Databases.
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996

Enhancing the Controlled Disclosure of Sensitive Information.
Proceedings of the Computer Security, 1996

Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996

Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996

An Advanced Commit Protocol for MLS Distributed Database Systems.
Proceedings of the CCS '96, 1996

A Non-Timestamped Authorization Model for Data Management Systems.
Proceedings of the CCS '96, 1996

Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control.
Proceedings of the Performance of Concurrency Control Mechanisms in Centralized Database Systems., 1996

1995
On-The-Fly Reading of Entire Databases.
IEEE Trans. Knowl. Data Eng., 1995

The Partitioned Synchronization Rule for Planar Extendible Partial Orders.
IEEE Trans. Knowl. Data Eng., 1995

Concurrency Control in a Secure Database via a Two-Snapshot Algorithm.
Journal of Computer Security, 1995

Database Security: Research and Practice
Inf. Syst., 1995

An Algorithm for Dynamic Data Allocation in Distributed Systems.
Inf. Process. Lett., 1995

Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions.
Proceedings of the VLDB'95, 1995

Semantic Assumptions and Query Evaluation in Temporal Databases.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
A Consensus Glossary of Temporal Database Concepts.
SIGMOD Record, 1994

A View-Based Dynamic Replication Control Algorithm.
Nord. J. Comput., 1994

Collecting garbage in multilevel secure object stores.
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994

Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information.
Proceedings of the Computer Security, 1994

Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994

Propagation of Authorizations in Distributed Database Systems.
Proceedings of the CCS '94, 1994

An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
Proceedings of the CCS '94, 1994

Benchmarking multilevel secure database systems using the MITRE benchmark.
Proceedings of the 10th Annual Computer Security Applications Conference, 1994

1993
Distributed Timestamp Generation in Planar Lattice Networks.
ACM Trans. Comput. Syst., 1993

Access Control in Object-Oriented Database Systems - Some Approaches and Issues.
Proceedings of the Advanced Database Systems, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
Journal of Computer Security, 1993

Limitations of Relational Data Base Access Controls.
Information Systems Security, 1993

Measuring the effect of commutative transactions on distributed database performance.
Inf. Sci., 1993

A model of atomicity for multilevel transactions.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Achieving stricter correctness requirements in multilevel secure databases.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Temporal Modules: An Approach Toward Federated Temporal Databases.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993

Modeling Multilevel Entities Using Single Level Objects.
Proceedings of the Deductive and Object-Oriented Databases, Third International Conference, 1993

A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems.
Proceedings of the Database Security, 1993

Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases.
Proceedings of the Database Security, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993

Planar Lattice Security Structures for Multilevel Replicated Databases.
Proceedings of the Database Security, 1993

High Assurance Discretionary Access Control for Object Bases.
Proceedings of the CCS '93, 1993

Authorizations in Relational Database Management Systems.
Proceedings of the CCS '93, 1993

Integrating Temporal Data in a Heterogeneous Environment.
Proceedings of the Temporal Databases: Theory, Design, and Implementation., 1993

1992
Eliminating polyinstantiation securely.
Computers & Security, 1992

An Algorithm for Dynamic Data Distribution.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992

Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

A two snapshot algorithm for concurrency control in multi-level secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992

Referential Integrity in Multilevel Secure Database Management Systems.
Proceedings of the IT Security: The Need for International Cooperation, 1992

Distributed Algorithms for Dynamic Replication of Data.
Proceedings of the Eleventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1992

Polyinstantation for Cover Stories.
Proceedings of the Computer Security, 1992

Orange Locking: Channel-Free Database Concurrency Control Via Locking.
Proceedings of the Database Security, 1992

Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture.
Proceedings of the Database Security, 1992

1991
A Note on Estimating the Cardinality of the Projection of a Database Relation.
ACM Trans. Database Syst., 1991

A short technical paper: Determining whether a vote assignment is dominated.
Inf. Sci., 1991

Integrity principles and mechanisms in database management systems.
Computers & Security, 1991

A Novel Decomposition of Multilevel Relations into Single-Level Relations.
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991

Towards a Multilevel Secure Relational Data Model.
Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, 1991

Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
Proceedings of the Database Security, 1991

Effects of SeaView Decomposition of Multilevel Relations on Database Performance.
Proceedings of the Database Security, 1991

A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
Proceedings of the Database Security, 1991

A Secure Kernelized Architecture for Multiple Object-Oriented Databases.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Panel Discussion on the Polyinstantiation Problem: A Position Paper.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991

Dealing with Granularity of Time in Temporal Databases.
Proceedings of the Advanced Information Systems Engineering, 1991

A single-level scheduler for the replicated architecture for multilevel-secure databases.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

An audit model for object-oriented databases.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991

1990
Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database.
ACM Trans. Database Syst., 1990

Database Security: Current Status and Key Issues.
SIGMOD Record, 1990

Lossless Outer Joins with Incomplete Information.
BIT, 1990

Polyinstantiation Integrity in Multilevel Relations.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Integrating an Object-Oriented Data Model with Multilevel Security.
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990

Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture.
Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, 1990

Polyinstantiation Integrity in Multilevel Relations Revisited.
Proceedings of the Database Security, 1990

A New Polyinstantiation Integrity Constraint for Multilevel Relations.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

A Formal Framework for Single Level Decomposition of Multilevel Relations.
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990

Update semantics for multilevel relations.
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990

1989
A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability.
IEEE Trans. Software Eng., 1989

A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting.
IEEE Trans. Knowl. Data Eng., 1989

From the Issue Editors.
IEEE Data Eng. Bull., 1989

Audit Trail Organization in Relational Databases.
Proceedings of the Database Security, 1989

1988
Letter from the TC Chair.
IEEE Data Eng. Bull., 1988

Integrating Static and Dynamic Voting Protocols To Enhance File Availability.
Proceedings of the Fourth International Conference on Data Engineering, 1988

1987
Local Area Networks: Software and Related Issues.
IEEE Trans. Software Eng., 1987

Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation.
IEEE Trans. Software Eng., 1987

An Extension of "Representative Instances and gamma-Acyclic Relational Schemes".
IEEE Trans. Software Eng., 1987

Letter from the TC Chairman.
IEEE Data Eng. Bull., 1987

Alternative Methods for the Reconstruction of Trees from Their Traversals.
BIT, 1987

Enhancements to the Voting Algorithm.
Proceedings of the VLDB'87, 1987

Dynamic Voting.
Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, 1987

Mutual Consistency in Decentralized Distributed Systems.
Proceedings of the Third International Conference on Data Engineering, 1987

Managing Replicated Files in Partitioned Distributed Database Systems.
Proceedings of the Third International Conference on Data Engineering, 1987

Integrity Versus Security in Multi-Level Secure Databases.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987

1986
Chairman's Message.
IEEE Database Eng. Bull., 1986

Recognizing Multivalued Dependencies in Relation Schemas.
Comput. J., 1986

1985
On Equivalence of Relational and Network Database Models.
Inf. Process. Lett., 1985

1984
Representative Instances and gamma-Acyclic Relational Schemes.
IEEE Trans. Software Eng., 1984

Introduction to the special issue on the use of entity-relationship concepts in databases and related software.
Journal of Systems and Software, 1984

Translation of entity-relationship diagrams into relational structures.
Journal of Systems and Software, 1984

Universal and Representative Instances Using Unmarked Nulls.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1984

1983
The Problem of Equivalence for Entity-Relationship Diagrams.
IEEE Trans. Software Eng., 1983

A Scheme of Parallel Processing for MIMD Systems.
IEEE Trans. Software Eng., 1983

Entity-relationship diagrams which are in BCNF.
International Journal of Parallel Programming, 1983

On Universal and Representative Instances for Inconsistent Databases.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

On the Representation of Relational Structures by Entity-Relationship Diagrams.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

A View of Database Management Systems as Abstract Data Types.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983


  Loading...