Vijayalakshmi Atluri

According to our database1, Vijayalakshmi Atluri authored at least 215 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Security analysis of ABAC under an administrative model.
IET Information Security, 2019

PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

ABACaaS: Attribute-Based Access Control as a Service.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Information Forensics and Security, 2018

Towards designing robust CAPTCHAs.
Journal of Computer Security, 2018

A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
Journal of Computer Security, 2018

Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

Analysis and visualization of subjectivity and polarity of Twitter location data.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Web-based application for sentiment analysis of live tweets.
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

Enabling the Deployment of ABAC Policies in RBAC Systems.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

Policy Engineering in RBAC and ABAC.
Proceedings of the From Database to Cyber Security, 2018

2017
Security Models, Geospatial.
Proceedings of the Encyclopedia of GIS., 2017

Geospatial Authorizations, Efficient Enforcement.
Proceedings of the Encyclopedia of GIS., 2017

On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.
ACM Trans. Management Inf. Syst., 2017

Migrating from RBAC to temporal RBAC.
IET Information Security, 2017

Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Government Information Quarterly, 2017

EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Poster: Constrained Policy Mining in Attribute Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Sentiment based Analysis of Tweets during the US Presidential Elections.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017

Preventing Unauthorized Data Flows.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Efficient Bottom-Up Mining of Attribute Based Access Control Policies.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

2016
A Survey of Role Mining.
ACM Comput. Surv., 2016

Mining temporal roles using many-valued concepts.
Computers & Security, 2016

Efficient Evaluation of Authorizations for Video Data.
Proceedings of the 9th International Conference on Security of Information and Networks, 2016

Deciphering Text from Touchscreen Key Taps.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Minimizing Organizational User Requirement while Meeting Security Constraints.
ACM Trans. Management Inf. Syst., 2015

Meeting Cardinality Constraints in Role Mining.
IEEE Trans. Dependable Sec. Comput., 2015

The generalized temporal role mining problem.
Journal of Computer Security, 2015

Statistical Database Auditing Without Query Denial Threat.
INFORMS Journal on Computing, 2015

Enhancing the Security of Image CAPTCHAs Through Noise Addition.
Proceedings of the ICT Systems Security and Privacy Protection, 2015

Generating Secure Images for CAPTCHAs through Noise Addition.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015

Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.
Proceedings of the Network and System Security - 9th International Conference, 2015

Role Mining in the Presence of Separation of Duty Constraints.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Enforcing Separation of Duty in Attribute Based Access Control Systems.
Proceedings of the Information Systems Security - 11th International Conference, 2015

Migrating from DAC to RBAC.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
Security analysis for temporal role based access control.
Journal of Computer Security, 2014

An optimization framework for role mining.
Journal of Computer Security, 2014

Enhancing the government service experience through QR codes on mobile platforms.
Government Information Quarterly, 2014

Security analysis of temporal RBAC under an administrative model.
Computers & Security, 2014

More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014

Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014

Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014

2013
AMTRAC: An administrative model for temporal role-based access control.
Computers & Security, 2013

Panel on granularity in access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

An Administrative Model for Spatio-Temporal Role Based Access Control.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Web Services Based Attacks against Image CAPTCHAs.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.
Proceedings of the Information Systems Security - 9th International Conference, 2013

Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013

Analysis of TRBAC with Dynamic Temporal Role Hierarchies.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Toward Mining of Temporal Roles.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Structure-aware graph anonymization.
Web Intelligence and Agent Systems, 2012

Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.
IEEE Trans. Dependable Sec. Comput., 2012

Role Mining under Role-Usage Cardinality Constraint.
Proceedings of the Information Security and Privacy Research, 2012

Risk Based Access Control Using Classification.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Analyzing temporal role based access control models.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
Proceedings of the Information Systems Security, 8th International Conference, 2012

Using QR codes for enhancing the scope of digital government services.
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Role engineering: from theory to practice.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Role-Based Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

HRU.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.
Journal of Systems Architecture - Embedded Systems Design, 2011

A profile anonymization model for location-based services.
Journal of Computer Security, 2011

Efficiently enforcing spatiotemporal access control under uncertain location information.
Journal of Computer Security, 2011

Preface.
Journal of Computer Security, 2011

Security analysis of GTRBAC and its variants using model checking.
Computers & Security, 2011

Weighted Rank-One Binary Matrix Factorization.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

UICDS-based information sharing among emergency response application systems.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011

An Optimization Model for the Extended Role Mining Problem.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

2010
The role mining problem: A formal perspective.
ACM Trans. Inf. Syst. Secur., 2010

Role Engineering via Prioritized Subset Enumeration.
IEEE Trans. Dependable Sec. Comput., 2010

Semantics-aware security policy specification for the semantic web data.
IJICS, 2010

A unified index structure for efficient enforcement of spatiotemporal authorisations.
IJICS, 2010

Spatial neighborhood based anomaly detection in sensor datasets.
Data Min. Knowl. Discov., 2010

Anonymization models for directional location based service environments.
Computers & Security, 2010

Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Ensuring Privacy and Security for LBS through Trajectory Partitioning.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

UICDS compliant resource management system for emergency response.
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010

Role Mining in the Presence of Noise.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Object discovery in high-resolution remote sensing images: a semantic perspective.
Knowl. Inf. Syst., 2009

Edge-RMP: Minimizing administrative assignments for role-based access control.
Journal of Computer Security, 2009

Evaluating the validity of data instances against ontology evolution over the Semantic Web.
Information & Software Technology, 2009

Spatial outlier detection in heterogeneous neighborhoods.
Intell. Data Anal., 2009

Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Towards formal security analysis of GTRBAC using timed automata.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Extended Boolean Matrix Decomposition.
Proceedings of the ICDM 2009, 2009

An efficient online auditing approach to limit private data disclosure.
Proceedings of the EDBT 2009, 2009

Spatiotemporal Access Control Enforcement under Uncertain Location Estimates.
Proceedings of the Data and Applications Security XXIII, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Security Models, Geospatial.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Authorizations, Efficient Enforcement.
Proceedings of the Encyclopedia of GIS., 2008

Geospatial Database Security.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Security for Workflow Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Random Walks to Identify Anomalous Free-Form Spatial Scan Windows.
IEEE Trans. Knowl. Data Eng., 2008

Efficient security policy enforcement for the mobile environment.
Journal of Computer Security, 2008

Migrating to optimal RBAC with minimal perturbation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

A meta model for access control: why is it needed and is it even possible to achieve?
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Panel on role engineering.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008

Optimal Boolean Matrix Decomposition: Application to Role Engineering.
Proceedings of the 24th International Conference on Data Engineering, 2008

Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
A geotemporal role-based authorisation system.
IJICS, 2007

A decentralized execution model for inter-organizational workflows.
Distributed and Parallel Databases, 2007

Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

The role mining problem: finding a minimal descriptive set of roles.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

MENVIS: mobile environmental information system.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

Efficient Security Policy Enforcement in a Location Based Service Environment.
Proceedings of the Data and Applications Security XXI, 2007

2006
An Ontology-Guided Approach to Change Detection of the Semantic Web Data.
, 2006

SemDiff: An Approach to Detecting Semantic Changes to Ontologies.
Int. J. Semantic Web Inf. Syst., 2006

Inter-instance authorization constraints for secure workflow management.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Semantically enhanced enforcement of mobile consumer's privacy preferences.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Challenges in eGovernment technology transfer.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Secure interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Semantics-based threat structure mining.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Constituent-centric municipal government coalition portal.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Proceedings of the Data and Applications Security XX, 2006

Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.
Proceedings of the Data and Applications Security XX, 2006

Preview: Optimizing View Materialization Cost in Spatial Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 8th International Conference, 2006

RoleMiner: mining roles using subset enumeration.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Preface.
ACM Trans. Inf. Syst. Secur., 2005

Using Semantics for Policy-Based Web Service Composition.
Distributed and Parallel Databases, 2005

A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce.
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005

Supporting conditional delegation in secure workflow management systems.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Color Time Petri Net for Interactive Adaptive Multimedia Objects.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005

Preserving mobile customer privacy: an access control system for moving objects and customer profiles.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

Collusion Set Detection Through Outlier Discovery.
Proceedings of the Intelligence and Security Informatics, 2005

Adapting spatial constraints of composite multimedia objects to achieve universal access.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Texture-Based Remote-Sensing Image Segmentation.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005

FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Unified Index for Mobile Object Data and Authorizations.
Proceedings of the Computer Security, 2005

DM-AMS: employing data mining techniques for alert management.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Agency interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Technology transfer of inter-agency government services and their transnational feasibility studies.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Data and Applications Security XIX, 2005

Selective View Materialization in a Spatial Data Warehouse.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

2004
An Authorization Model for Geospatial Data.
IEEE Trans. Dependable Sec. Comput., 2004

Editors' message for the special issue on security.
Int. J. on Digital Libraries, 2004

Chinese wall security for decentralized workflow management systems.
Journal of Computer Security, 2004

A clickstream-based collaborative filtering personalization model: towards a better performance.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004

A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Policy-Based Web Service Composition.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.
Proceedings of the Distributed Computing and Internet Technology, 2004

Ontology-Guided Change Detection to the Semantic Web Data.
Proceedings of the Conceptual Modeling, 2004

Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Human-Centered Systems for Business Services.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Guest editorial.
VLDB J., 2003

Concept-level access control for the Semantic Web.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories.
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003

Electronic Negotiation of Government Contracts through Transducers.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

Handling Dynamic Changes in Decentralized Workflow Execution Environments.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Supporting Delegation in Secure Workflow Management Systems.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Automating the Delivery of Governmental Business Services Through Workflow Technology.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002

An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

An authorization model for temporal and derived data: securing information portals.
ACM Trans. Inf. Syst. Secur., 2002

Employing an extended transaction model in multilevel secure transaction processing.
Informatica (Slovenia), 2002

An Authorization System for Temporal Data.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Dynamic Composition of Workflows for Customized eGovernment Service Delivery.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Domain Knowledge-Based Automatic Workflow Generation.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

Uniform Indexing for Geospatial Data and Authorizations.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects.
IEEE Trans. Knowl. Data Eng., 2001

Multilevel Security Transaction Processing.
Journal of Computer Security, 2001

Security for Workflow Systems.
Inf. Sec. Techn. Report, 2001

Modeling and Evaluation of Distributed Workflow Algorithms.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

Customized Geospatial Workflows for E-Government Services.
Proceedings of the ACM-GIS 2001, 2001

A Study on the Indexing of Satellite Images at NASA Regional Application Center.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.
Proceedings of the Database and Application Security XV, 2001

A Chinese wall security model for decentralized workflow systems.
Proceedings of the CCS 2001, 2001

2000
A Semantic-Based Execution Model for Multilevel Secure Workflows.
Journal of Computer Security, 2000

A Petri Net Based Safety Analysis of Workflow Authorization Models.
Journal of Computer Security, 2000

Security of Data and Transaction Processing - Guest Editor's Introduction.
Distributed and Parallel Databases, 2000

SI in Digital Libraries.
Commun. ACM, 2000

Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows.
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000


Protecting Privacy from Continuous High-resolution Satellite Surveillance.
Proceedings of the Data and Application Security, 2000

An authorization model for temporal data.
Proceedings of the CCS 2000, 2000

1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999

SecureFlow: A Secure Web-Enabled Workflow Management System.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

1998
Modeling and Analysis of Workflows Using Petri Nets.
J. Intell. Inf. Syst., 1998

Modification of Integrity Constraints Through Knowledge Discovery.
Proceedings of the Integrity and Internal Control in Information Systems, 1998

EDI Through A Distributed Information Systems Approach.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

Analysing the Safety of Workflow Authorization Models.
Proceedings of the Database Security XII: Status and Prospects, 1998

Workshop Summary.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997

Enforcing Mandatory and Discretionary Security in Workflow Management Systems.
Journal of Computer Security, 1997

A theoretical formulation for degrees of isolation in databases.
Information & Software Technology, 1997

A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

An Execution Model for Multilevel Seccure Workflows.
Proceedings of the Database Securty XI: Status and Prospects, 1997

1996
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996

An Authorization Model for Workflows.
Proceedings of the Computer Security, 1996

Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996

An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment.
Proceedings of the Database Security Volume X, 1996

1995
The Partitioned Synchronization Rule for Planar Extendible Partial Orders.
IEEE Trans. Knowl. Data Eng., 1995

Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994

1993
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
Journal of Computer Security, 1993

Achieving stricter correctness requirements in multilevel secure databases.
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993

Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993

1992
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992


  Loading...