Sushil Jajodia
Orcid: 0000-0003-3210-558XAffiliations:
- George Mason University, Fairfax, Virginia, USA
According to our database1,
Sushil Jajodia
authored at least 570 papers
between 1983 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2021, "For contributions to cyber security, data protection, and privacy".
IEEE Fellow
IEEE Fellow 2013, "For contributions to information security, data protection, and privacy".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
-
on csis.gmu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACM Trans. Manag. Inf. Syst., June, 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
A Machine Learning and Optimization Framework for Efficient Alert Management in a Cybersecurity Operations Center.
DTRAP, 2024
2023
ACM Trans. Spatial Algorithms Syst., September, 2023
A Novel Team Formation Framework Based on Performance in a Cybersecurity Operations Center.
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Parallel Distributed Syst., 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
ACM Trans. Internet Techn., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Maintaining the level of operational effectiveness of a CSOC under adverse conditions.
Int. J. Inf. Sec., 2022
An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
2021
Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience Against Zero-Day Attacks.
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Trans. Dependable Secur. Comput., 2021
IEEE Syst. J., 2021
Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks.
IEEE Intell. Syst., 2021
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021
Proceedings of the 2021 IEEE Military Communications Conference, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Proceedings of the Data and Applications Security and Privacy XXXV, 2021
2020
ACM Trans. Web, 2020
Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning.
IEEE Trans. Parallel Distributed Syst., 2020
Two Can Play That Game: An Adversarial Evaluation of a Cyber-Alert Inspection System.
ACM Trans. Intell. Syst. Technol., 2020
IEEE Trans. Inf. Forensics Secur., 2020
Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare.
IEEE Syst. J., 2020
Proceedings of the Data and Applications Security and Privacy XXXIV, 2020
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020
2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
Proceedings of the Adversarial and Uncertain Reasoning for Adaptive Cyber Defense, 2019
IEEE Trans. Inf. Forensics Secur., 2019
Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC.
IEEE Trans. Inf. Forensics Secur., 2019
IEEE Syst. J., 2019
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.
J. Comput. Secur., 2019
Int. J. Inf. Sec., 2019
Optimizing the network diversity to improve the resilience of networks against unknown attacks.
Comput. Commun., 2019
FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
ACM Trans. Internet Techn., 2018
Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions.
ACM Trans. Intell. Syst. Technol., 2018
ACM Trans. Priv. Secur., 2018
IEEE Trans. Inf. Forensics Secur., 2018
Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors.
Serv. Oriented Comput. Appl., 2018
J. Comput. Secur., 2018
Surviving unpatchable vulnerabilities through heterogeneous network hardening options.
J. Comput. Secur., 2018
Int. J. Inf. Sec., 2018
IEEE Secur. Priv., 2018
IEEE Intell. Syst., 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
Proceedings of the Theory and Models for Cyber Situation Awareness, 2017
ACM Trans. Intell. Syst. Technol., 2017
Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning.
Proceedings of the 2017 Workshop on Moving Target Defense, 2017
2016
Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning.
ACM Trans. Intell. Syst. Technol., 2016
Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks.
IEEE Trans. Inf. Forensics Secur., 2016
IEEE Trans. Inf. Forensics Secur., 2016
J. Comput. Secur., 2016
Using temporal probabilistic logic for optimal monitoring of security events with limited resources.
J. Comput. Secur., 2016
Proceedings of the 2016 IEEE Symposium on Service-Oriented System Engineering, 2016
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement.
Proceedings of the 27th International Workshop on Database and Expert Systems Applications, 2016
Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks.
Proceedings of the Data and Applications Security and Privacy XXX, 2016
A moving target defense approach to mitigate DDoS attacks against proxy-based architectures.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016
Proceedings of the Cyber Deception, Building the Scientific Foundation, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the Database and Expert Systems Applications, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-04612-9, 2014
Proceedings of the Cyber Defense and Situational Awareness, 2014
Proceedings of the Network Science and Cybersecurity, 2014
Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance.
Proceedings of the Cybersecurity Systems for Human Cognition Augmentation, 2014
Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact.
IEEE Trans. Inf. Forensics Secur., 2014
k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities.
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
Comput. Secur., 2014
Proceedings of the 33rd IEEE International Symposium on Reliable Distributed Systems, 2014
Keeping Intruders at Large - A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the 2014 Workshop on Cyber Security Analytics, 2014
Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Keeping Intruders at Bay: A Graph-theoretic Approach to Reducing the Probability of Successful Network Intrusions.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks.
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Computer Security - ESORICS 2014, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Cyber and Information Security Research Conference, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the Secure Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
Proceedings of the Secure Cloud Computing, 2014
Database Security and Privacy.
Proceedings of the Computing Handbook, 2014
2013
Proceedings of the Moving Target Defense II, 2013
ACM Trans. Internet Techn., 2013
Trans. Large Scale Data Knowl. Centered Syst., 2013
Telecommun. Syst., 2013
Quantitative survivability evaluation of three virtual machine-based server architectures.
J. Netw. Comput. Appl., 2013
Comput. Networks, 2013
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2013
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of the Foundations of Security Analysis and Design VII, 2013
Proceedings of the 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the IEEE Conference on Communications and Network Security, 2013
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
ACM Trans. Web, 2012
IEEE Trans. Inf. Forensics Secur., 2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Security and Trust Management - 8th International Workshop, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Secure File Allocation and Caching in Large-scale Distributed Systems.
Proceedings of the SECRYPT 2012, 2012
A Mission-centric Framework for Cyber Situational Awareness.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
On the Accurate Identification of Network Service Dependencies in Distributed Systems.
Proceedings of the Strategies, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Fourth International Conference on Computational Aspects of Social Networks, 2012
2011
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies.
VLDB J., 2011
IEEE Trans. Dependable Secur. Comput., 2011
Commun. ACM, 2011
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Privacy of data outsourced to a cloud for selected readers through client-side encryption.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 4th Symposium on Configuration Analytics and Automation, SafeConfig 2011, Arlington, VA, USA, October 31, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the MILCOM 2011, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Computer Information Systems - Analysis and Technologies, 2011
2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Cyber Situational Awareness - Issues and Research, 2010
Proceedings of the Data Mining and Knowledge Discovery Handbook, 2nd ed., 2010
ACM Trans. Database Syst., 2010
Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks.
IEEE Trans. Mob. Comput., 2010
ACM Trans. Inf. Syst. Secur., 2010
IEEE Trans. Inf. Forensics Secur., 2010
An Application-Level Data Transparent Authentication Scheme without Communication Overhead.
IEEE Trans. Computers, 2010
Proc. VLDB Endow., 2010
Int. J. Next Gener. Comput., 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Proceedings of the 30th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2010 Workshops), 2010
<i>k</i>-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks.
Proceedings of the Computer Security, 2010
Proceedings of the Computer Security, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
Proceedings of the IEEE International Conference on Cloud Computing, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation.
IEEE Trans. Veh. Technol., 2009
Secur. Commun. Networks, 2009
Evaluating privacy threats in released database views by symmetric indistinguishability.
J. Comput. Secur., 2009
Proceedings of the TIME 2009, 2009
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009
Proceedings of the MDM 2009, 2009
Proceedings of the 17th International Workshop on Quality of Service, 2009
Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the Computer Security, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Proceedings of the Privacy in Location-Based Applications, 2009
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients.
Proceedings of the Data and Applications Security XXIII, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
IEEE Trans. Parallel Distributed Syst., 2008
Achieving simultaneous distribution control and privacy protection for Internet media delivery.
ACM Trans. Multim. Comput. Commun. Appl., 2008
J. Netw. Syst. Manag., 2008
J. Comput. Secur., 2008
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
Proceedings of the 1st ACM Workshop on Virtual Machine Security, 2008
Proceedings of the 4th ACM Workshop on Quality of Protection, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks.
ACM Trans. Sens. Networks, 2007
J. Comput. Secur., 2007
Inf. Sci., 2007
Comput. Commun., 2007
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the New Approaches for Security, 2007
Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007
Proceedings of the Computer Security, 2007
Proceedings of the Data and Applications Security XXI, 2007
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
Proceedings of the 3th ACM Workshop on Quality of Protection, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
Advances in Information Security 29, Springer, ISBN: 978-0-387-46273-8, 2007
2006
ACM Trans. Sens. Networks, 2006
J. Comput. Secur., 2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006
A fragile watermarking scheme for detecting malicious modifications of database relations.
Inf. Sci., 2006
Proceedings of the Second International Workshop on Views on Designing Complex Architectures, 2006
Distributed Parallel Databases, 2006
Comput. Commun., 2006
Ad Hoc Networks, 2006
Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME 2006), 2006
A framework for establishing, assessing, and managing trust in inter-organizational relationships.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks.
Proceedings of the Third Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, 2006
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure.
Proceedings of the Quality of Service - IWQoS 2006: 14th International Workshop, 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Proceedings of the 2nd ACM Workshop on Quality of Protection, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
ACM Trans. Inf. Syst. Secur., 2005
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005
Proceedings of the 2nd IEEE Workshop on Visualization for Computer Security, 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the Secure Data Management, 2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005
Proceedings of the Computer Network Security, 2005
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Proceedings of the Computer Security, 2005
Proceedings of the 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 2005
Proceedings of the Databases in Networked Information Systems, 4th International Workshop, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
Proceedings of the Applied Cryptography and Network Security, 2005
Data Mining for Intrusion Detection.
Proceedings of the Data Mining and Knowledge Discovery Handbook., 2005
2004
Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility.
NeuroImage, 2004
Int. J. Digit. Libr., 2004
Proceedings of the 1st ACM Workshop on Visualization and Data Mining for Computer Security, 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Computer Security, 2004
Proceedings of the 2004 ACM Workshop on Digital Rights Management 2004, Washington, 2004
Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, 2004
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004
2003
Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems.
IEEE Trans. Parallel Distributed Syst., 2003
ACM Trans. Database Syst., 2003
ACM Trans. Inf. Syst. Secur., 2003
Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003
Ad Hoc Networks, 2003
Proceedings of the Advances in Web-Age Information Management, 2003
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003
Proceedings of the 2nd International IEEE Security in Storage Workshop (SISW 2003), 2003
A User Friendly Guard with Mobile Post-Release Access Control Policy.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast.
Proceedings of the Group Communications and Charges; Technology and Business Models, 2003
Proceedings of the Distributed Computing, 2003
Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach.
Proceedings of the 11th IEEE International Conference on Network Protocols (ICNP 2003), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003
Proceedings of the 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 2003
Proceedings of the Computer Security, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
Proceedings of the 2003 ACM CIKM International Conference on Information and Knowledge Management, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003
Advances in Information Security 9, Springer, 2003
2002
A comparative performance analysis of reliable group rekey transport protocols for secure multicast.
Perform. Evaluation, 2002
J. Comput. Secur., 2002
Data Knowl. Eng., 2002
Design and implementation of a decentralized prototype system for detecting distributed attacks.
Comput. Commun., 2002
Proceedings of 28th International Conference on Very Large Data Bases, 2002
Propagating Modifications to Mobile Policies.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Secure Selective Exclusion in Ad Hoc Wireless Network.
Proceedings of the Security in the Information Society: Visions and Perspectives, 2002
Proceedings of the 2002 Workshop on Principles of Mobile Computing, 2002
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002
Proceedings of the Foundations of Information and Knowledge Systems, 2002
Proceedings of the Computer Security, 2002
Towards Secure XML Federations.
Proceedings of the Research Directions in Data and Applications Security, 2002
Mining Malicious Corruption of Data with Hidden Markov Models.
Proceedings of the Research Directions in Data and Applications Security, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002
Proceedings of the Applications of Data Mining in Computer Security, 2002
2001
ACM Trans. Database Syst., 2001
ACM Trans. Inf. Syst. Secur., 2001
ACM Trans. Inf. Syst. Secur., 2001
SIGMOD Rec., 2001
Decis. Support Syst., 2001
Going Beyond MAC and DAC Using Mobile Policies.
Proceedings of the Trusted Information: The New Decade Challenge, 2001
Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001
Proceedings of the First SIAM International Conference on Data Mining, 2001
Subject Switching Algorithms for Access Control in Federated Databases.
Proceedings of the Database and Application Security XV, 2001
A Novel Approach to Certificate Revocation Management.
Proceedings of the Database and Application Security XV, 2001
Recent Advances in Access Control Models.
Proceedings of the Database and Application Security XV, 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 2001
Proceedings of the CCS 2001, 2001
2000
IEEE Trans. Knowl. Data Eng., 2000
IEEE Trans. Knowl. Data Eng., 2000
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity.
Inf. Sci., 2000
Distributed Parallel Databases, 2000
Distributed Parallel Databases, 2000
Comput. Commun., 2000
Proceedings of the Temporal, 2000
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Advances in Database Technology, 2000
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000
Proceedings of the Data and Application Security, 2000
Proceedings of the Data and Application Security, 2000
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000
Springer, ISBN: 978-3-540-66997-5, 2000
1999
ACM Trans. Inf. Syst., 1999
IEEE Concurr., 1999
The Integrity Challenge.
Proceedings of the Integrity and Internal Control in Information Systems, 1999
On Fingerprinting Images for Recognition.
Proceedings of the MIS '99, 1999
Proceedings of the Information Hiding, Third International Workshop, 1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications.
Proceedings of the 19th International Conference on Distributed Computing Systems, Austin, TX, USA, May 31, 1999
Integrating Data Mining Techniques with Intrusion Detection Methods.
Proceedings of the Research Advances in Database and Information Systems Security, 1999
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999
1998
IEEE Trans. Knowl. Data Eng., 1998
IEEE Trans. Knowl. Data Eng., 1998
IEEE Trans. Knowl. Data Eng., 1998
J. Comput. Secur., 1998
Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information.
Int. J. Artif. Intell. Tools, 1998
IEEE Data Eng. Bull., 1998
Ann. Math. Artif. Intell., 1998
Algebra for Databases with Explicit Markings of Damaged Data.
Proceedings of the Integrity and Internal Control in Information Systems, 1998
Proceedings of the Information Hiding, 1998
Security and Privacy Issues for the World Wide Web: Panel Discussion.
Proceedings of the Database Security XII: Status and Prospects, 1998
Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998
1997
ACM Trans. Database Syst., 1997
ACM Trans. Database Syst., 1997
IEEE Trans. Knowl. Data Eng., 1997
IEEE Trans. Knowl. Data Eng., 1997
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997
Inf. Softw. Technol., 1997
IEEE Concurrency, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the 1997 IEEE Symposium on Security and Privacy, 1997
Proceedings of the SIGMOD 1997, 1997
Security Issues in Data Warehousing and Data Mining: Panel Discussion.
Proceedings of the Database Securty XI: Status and Prospects, 1997
A Two-tier Coarse Indexing Scheme for MLS Database Systems.
Proceedings of the Database Securty XI: Status and Prospects, 1997
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997
Proceedings of the Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, 1997
Proceedings of the Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29, 1997
Proceedings of the Advanced Information Systems Engineering, 1997
Flexible Commit Protocols for Advanced Transaction Processing.
Proceedings of the Advanced Transaction Models and Architectures, 1997
Semantic-Based Decomposition of Transactions.
Proceedings of the Advanced Transaction Models and Architectures, 1997
Database Security and Privacy.
Proceedings of the Computer Science and Engineering Handbook, 1997
1996
IEEE Trans. Parallel Distributed Syst., 1996
IEEE Trans. Knowl. Data Eng., 1996
IEEE Trans. Knowl. Data Eng., 1996
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996
Data Knowl. Eng., 1996
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996
Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996
Proceedings of the Twelfth International Conference on Data Engineering, February 26, 1996
Proceedings of the Computer Security, 1996
Secure Locking Protocols for Multilevel Database Management Systems.
Proceedings of the Database Security Volume X, 1996
Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996
Proceedings of the CCS '96, 1996
Proceedings of the CCS '96, 1996
Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control.
Proceedings of the Performance of Concurrency Control Mechanisms in Centralized Database Systems., 1996
1995
IEEE Trans. Knowl. Data Eng., 1995
J. Comput. Secur., 1995
Inf. Process. Lett., 1995
Proceedings of the VLDB'95, 1995
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
A View-Based Dynamic Replication Control Algorithm.
Nord. J. Comput., 1994
Proceedings of the 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994
Proceedings of the Computer Security, 1994
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994
Proceedings of the CCS '94, 1994
Proceedings of the CCS '94, 1994
Proceedings of the 10th Annual Computer Security Applications Conference, 1994
1993
ACM Trans. Comput. Syst., 1993
Proceedings of the Advanced Database Systems, 1993
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
J. Comput. Secur., 1993
Inf. Secur. J. A Glob. Perspect., 1993
Measuring the effect of commutative transactions on distributed database performance.
Inf. Sci., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Enforcing Mandatory Access Control in Object Bases.
Proceedings of the Security for Object-Oriented Systems, 1993
Proceedings of the Deductive and Object-Oriented Databases, Third International Conference, 1993
A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems.
Proceedings of the Database Security, 1993
Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases.
Proceedings of the Database Security, 1993
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993
Planar Lattice Security Structures for Multilevel Replicated Databases.
Proceedings of the Database Security, 1993
Proceedings of the CCS '93, 1993
Proceedings of the CCS '93, 1993
Integrating Temporal Data in a Heterogeneous Environment.
Proceedings of the Temporal Databases: Theory, Design, and Implementation., 1993
1992
An Algorithm for Dynamic Data Distribution.
Proceedings of the Second Workshop on the Management of Replicated Data, 1992
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992
Referential Integrity in Multilevel Secure Database Management Systems.
Proceedings of the IT Security: The Need for International Cooperation, 1992
Proceedings of the Eleventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1992
Orange Locking: Channel-Free Database Concurrency Control Via Locking.
Proceedings of the Database Security, 1992
Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture.
Proceedings of the Database Security, 1992
1991
ACM Trans. Database Syst., 1991
Inf. Sci., 1991
Comput. Secur., 1991
Proceedings of the 1991 IEEE Symposium on Security and Privacy, 1991
Proceedings of the 1991 ACM SIGMOD International Conference on Management of Data, 1991
Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases.
Proceedings of the Database Security, 1991
Effects of SeaView Decomposition of Multilevel Relations on Database Performance.
Proceedings of the Database Security, 1991
A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases.
Proceedings of the Database Security, 1991
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Panel Discussion on the Polyinstantiation Problem: A Position Paper.
Proceedings of the 4th IEEE Computer Security Foundations Workshop, 1991
Proceedings of the Advanced Information Systems Engineering, 1991
A single-level scheduler for the replicated architecture for multilevel-secure databases.
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
Proceedings of the Seventh Annual Computer Security Applications Conference, 1991
1990
ACM Trans. Database Syst., 1990
Database Security: Current Status and Key Issues.
SIGMOD Rec., 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the 1990 IEEE Symposium on Security and Privacy, 1990
Proceedings of the 1990 ACM SIGMOD International Conference on Management of Data, 1990
Polyinstantiation Integrity in Multilevel Relations Revisited.
Proceedings of the Database Security, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Third IEEE Computer Security Foundations Workshop, 1990
Proceedings of the Sixth Annual Computer Security Applications Conference, 1990
1989
A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability.
IEEE Trans. Software Eng., 1989
IEEE Trans. Knowl. Data Eng., 1989
Audit Trail Organization in Relational Databases.
Proceedings of the Database Security, 1989
1988
Proceedings of the Fourth International Conference on Data Engineering, 1988
1987
Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation.
IEEE Trans. Software Eng., 1987
IEEE Trans. Software Eng., 1987
Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, 1987
Proceedings of the Third International Conference on Data Engineering, 1987
Proceedings of the Third International Conference on Data Engineering, 1987
Integrity Versus Security in Multi-Level Secure Databases.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1986
1985
1984
IEEE Trans. Software Eng., 1984
Introduction to the special issue on the use of entity-relationship concepts in databases and related software.
J. Syst. Softw., 1984
J. Syst. Softw., 1984
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1984
1983
IEEE Trans. Software Eng., 1983
On Universal and Representative Instances for Inconsistent Databases.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983
On the Representation of Relational Structures by Entity-Relationship Diagrams.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983
A View of Database Management Systems as Abstract Data Types.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983