Vaibhav Khadilkar

According to our database1, Vaibhav Khadilkar authored at least 28 papers between 2009 and 2015.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2015
SEMROD: Secure and Efficient MapReduce Over HybriD Clouds.
Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data, Melbourne, Victoria, Australia, May 31, 2015

Design and Implementation of a Semantic Web-Based Inference Controller: A Summary.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

Real-Time Stream Data Analytics for Multi-purpose Social Media Applications.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

2014
RDF-X: a language for sanitizing RDF graphs.
Proceedings of the 23rd International World Wide Web Conference, 2014

Redaction based RDF access control language.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards fine grained RDF access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Secure Data Provenance and Inference Control with Semantic Web.
CRC Press, ISBN: 978-1-4665-6943-0, 2014

2013
REDACT: a framework for sanitizing RDF data.
Proceedings of the 22nd International World Wide Web Conference, 2013

Risk Aware Approach to Data Confidentiality in Cloud Computing.
Proceedings of the Information Systems Security - 9th International Conference, 2013

BigSecret: A Secure Data Management Framework for Key-Value Stores.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Design and Implementation of a Data Mining System for Malware Detection.
J. Integr. Des. Process. Sci., 2012

Secure Data Processing over Hybrid Clouds.
IEEE Data Eng. Bull., 2012

StormRider: harnessing "storm" for social networks.
Proceedings of the 21st World Wide Web Conference, 2012

Jena-HBase: A Distributed, Scalable and Effcient RDF Triple Store.
Proceedings of the ISWC 2012 Posters & Demonstrations Track, 2012

A cloud-based RDF policy engine for assured information sharing.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Cloud-Centric Assured Information Sharing.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2012

Design and Implementation of a Cloud-Based Assured Information Sharing System.
Proceedings of the Computer Network Security, 2012

Design and implementation of SNODSOC: Novel class detection for social network analysis.
Proceedings of the 2012 IEEE International Conference on Intelligence and Security Informatics, 2012

Secure information integration with a semantic web-based framework.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012

Risk-Aware Workload Distribution in Hybrid Clouds.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Secure Data Processing in a Hybrid Cloud
CoRR, 2011

Transforming provenance using redaction.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

A language for provenance access control.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Update-Enabled Triplification of Relational Data into Virtual RDF Stores.
Int. J. Semantic Comput., 2010

Efficient Processing of Large RDF Streams Using Memory Management Algorithms.
Proceedings of the ISWC 2010 Posters & Demonstrations Track: Collected Abstracts, 2010

Bi-directional Translation of Relational Data into Virtual RDF Stores.
Proceedings of the 4th IEEE International Conference on Semantic Computing (ICSC 2010), 2010

Secure data storage and retrieval in the cloud.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Design of a temporal geosocial semantic web for military stabilization and reconstruction operations.
Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, 2009


  Loading...