The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Bhavani M. Thuraisingham: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Bhavani M. Thuraisingham
    Mandatory Security in Object-Oriented Database Systems. [Citation Graph (5, 0)][DBLP]
    OOPSLA, 1989, pp:203-210 [Conf]
  2. Paul D. Stachour, Bhavani M. Thuraisingham
    Design of LDV: A Multilevel Secure Relational Database Management System. [Citation Graph (3, 5)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1990, v:2, n:2, pp:190-209 [Journal]
  3. Matthew Morgenstern, Teresa F. Lunt, Bhavani M. Thuraisingham, David L. Spooner
    Security Issues in Federated Database Systems: Panel Contributions. [Citation Graph (2, 0)][DBLP]
    DBSec, 1991, pp:131-148 [Conf]
  4. Bhavani M. Thuraisingham
    The Use of Conceptual Structures for Handling the Inference Problem. [Citation Graph (2, 0)][DBLP]
    DBSec, 1991, pp:333-362 [Conf]
  5. Thomas F. Keefe, Bhavani M. Thuraisingham, Wei-Tek Tsai
    Secure Query-Processing Strategies. [Citation Graph (2, 0)][DBLP]
    IEEE Computer, 1989, v:22, n:3, pp:63-70 [Journal]
  6. Bhavani M. Thuraisingham
    Towards the Design of a Secure Data/Knowledge Base Management System. [Citation Graph (2, 0)][DBLP]
    Data Knowl. Eng., 1990, v:5, n:, pp:59-72 [Journal]
  7. Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham
    An Adaptive Policy for Improved Timeliness in Secure Database Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1995, pp:199-214 [Conf]
  8. Bhavani M. Thuraisingham
    Multilevel Security for Multimedia Database Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1990, pp:99-116 [Conf]
  9. P. Dwyer, George D. Jelatis, Bhavani M. Thuraisingham
    Multilevel Security in Database Management Systems. [Citation Graph (1, 0)][DBLP]
    Computers & Security, 1987, v:6, n:3, pp:252-260 [Journal]
  10. Bhavani M. Thuraisingham, William Ford, M. Collins, J. O'Keeffe
    Design and Implementation of a Database Inference Controller. [Citation Graph (1, 0)][DBLP]
    Data Knowl. Eng., 1993, v:11, n:3, pp:271-0 [Journal]
  11. Kingsley C. Nwosu, Bhavani M. Thuraisingham, P. Bruce Berra
    Multimedia Database Systems - A New Frontier (Guest Editors' Introduction). [Citation Graph (1, 0)][DBLP]
    IEEE MultiMedia, 1997, v:4, n:3, pp:21-23 [Journal]
  12. Sang Hyuk Son, Rasikan David, Bhavani M. Thuraisingham
    Improving Timeliness in Real-Time Secure Database Systems. [Citation Graph (1, 0)][DBLP]
    SIGMOD Record, 1996, v:25, n:1, pp:29-33 [Journal]
  13. Bhavani M. Thuraisingham
    Current Status of R&D in Trusted Database Management Systems. [Citation Graph (1, 0)][DBLP]
    SIGMOD Record, 1992, v:21, n:3, pp:44-50 [Journal]
  14. Bhavani M. Thuraisingham, Hai-Ping Ko
    Concurrency Control in Trusted Database Management Systems: A Survey. [Citation Graph (1, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:4, pp:52-59 [Journal]
  15. Bhavani M. Thuraisingham, William Ford
    Security Constraints in a Multilevel Secure Distributed Database Management System. [Citation Graph (1, 5)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:2, pp:274-293 [Journal]
  16. Harvey Rubinovitz, Bhavani M. Thuraisingham
    Security Constraint Processing in a Distributed Database Environment. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1994, pp:356-363 [Conf]
  17. Bhavani M. Thuraisingham
    Application of Object-Oriented Technology for Integrating Heterogeneous Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1995, pp:216-221 [Conf]
  18. Bhavani M. Thuraisingham, William Ford
    Parallel Processing and Trusted Database Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1993, pp:162-167 [Conf]
  19. Bhavani M. Thuraisingham
    Network and Web Security and E-Commerce and Other Applications. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:131- [Conf]
  20. Bhavani M. Thuraisingham
    Data and Applications Security: Developments and Directions. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:963-965 [Conf]
  21. Bhavani M. Thuraisingham
    Security Issues for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2003, pp:632-637 [Conf]
  22. Bhavani M. Thuraisingham
    Trust Management in a Distributed Environment. [Citation Graph (0, 0)][DBLP]
    COMPSAC (1), 2005, pp:561-562 [Conf]
  23. Bhavani M. Thuraisingham
    Panel Overview. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 1998, pp:260-261 [Conf]
  24. Bhavani M. Thuraisingham, Marion G. Ceruti
    Understanding Data Mining and applying it to Command, Control, Communications and Intelligence Environments. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2000, pp:171-175 [Conf]
  25. Bhavani M. Thuraisingham, Elena Ferrari
    Web and Information Security: Workshop Summary. [Citation Graph (0, 0)][DBLP]
    COMPSAC, 2002, pp:933- [Conf]
  26. Bhavani M. Thuraisingham
    A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:127-138 [Conf]
  27. Bhavani M. Thuraisingham
    A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - II. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:135-146 [Conf]
  28. Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham
    Detection and Resolution of Anomalies in Firewall Policy Rules. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:15-29 [Conf]
  29. David Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani M. Thuraisingham
    Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:331-346 [Conf]
  30. Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani M. Thuraisingham
    Security and Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:391-399 [Conf]
  31. Donald G. Marks, Leonard J. Binns, Bhavani M. Thuraisingham
    Hypersemantic Data Modeling for Inference Analysis. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:157-180 [Conf]
  32. Sylvia L. Osborn, Bhavani M. Thuraisingham, Pierangela Samarati
    Panel on XML and Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:317-323 [Conf]
  33. Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jun Kong
    Secure Model Management Operations for the Web. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:237-251 [Conf]
  34. Peter J. Sell, Bhavani M. Thuraisingham
    Applying OMT for Designing Multilevel Database Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:41-64 [Conf]
  35. Arnon Rosenthal, James Williams, William R. Herndon, Bhavani M. Thuraisingham
    A Fine-grained Access Control Model for Object-Oriented DBMSs. [Citation Graph (0, 0)][DBLP]
    DBSec, 1994, pp:319-334 [Conf]
  36. D. J. Thomsen, W. T. Tsai, Bhavani M. Thuraisingham
    Prototyping as a Research Tool for MLS/DBMS. [Citation Graph (0, 0)][DBLP]
    DBSec, 1988, pp:63-84 [Conf]
  37. Bhavani M. Thuraisingham
    Web Security and Privacy (Panel). [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:125-126 [Conf]
  38. Bhavani M. Thuraisingham
    Data and Applications Security: Past, Present and the Future. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:375-390 [Conf]
  39. Bhavani M. Thuraisingham
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:357-362 [Conf]
  40. Bhavani M. Thuraisingham
    Security Issues for Data Warehousing and Data Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:11-20 [Conf]
  41. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
    Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:269-284 [Conf]
  42. Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
    Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:3-16 [Conf]
  43. Inja Youn, Csilla Farkas, Bhavani M. Thuraisingham
    Multilevel Secure Teleconferencing over Public Switched Telephone Network. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:99-113 [Conf]
  44. Georges G. Grinstein, Bhavani M. Thuraisingham
    Data Mining and Data Visualization. [Citation Graph (0, 0)][DBLP]
    Workshop on Database Issues for Data Visualization, 1995, pp:54-56 [Conf]
  45. Daniel A. Keim, John Peter Lee, Bhavani M. Thuraisingham, Craig M. Wittenbrink
    Database Issues for Data Visualization: Supporting Interactive Database Explorartion. [Citation Graph (0, 0)][DBLP]
    Workshop on Database Issues for Data Visualization, 1995, pp:12-25 [Conf]
  46. Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham
    Using RDF for Policy Specification and Enforcement. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2004, pp:163-167 [Conf]
  47. Elena Ferrari, Bhavani M. Thuraisingham
    Security and Privacy for Web Databases and Services. [Citation Graph (0, 0)][DBLP]
    EDBT, 2004, pp:17-28 [Conf]
  48. Minos N. Garofalakis, Ioana Manolescu, Marco Mesiti, George A. Mihaila, Ralf Schenkel, Bhavani M. Thuraisingham, Vasilis Vassalos
    What's Next in XML and Databases? [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2004, pp:318-324 [Conf]
  49. Guang-Lei Song, Kang Zhang, Bhavani M. Thuraisingham, Jiannong Cao
    Towards Access Control for Visual Web Model Management. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:722-727 [Conf]
  50. Bhavani M. Thuraisingham, John A. Maurer
    Adaptable Object Request Brokers for Information Survivability of Evolvable Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP]
    FTDCS, 1999, pp:242-245 [Conf]
  51. Bhavani M. Thuraisingham
    Database Management and the Internet: Developments and Challenges. [Citation Graph (0, 0)][DBLP]
    High-Performance Web Databases, 2001, pp:549-554 [Conf]
  52. Hany M. Atchan, Rob Bell, Bhavani M. Thuraisingham
    Knowledge-Based Support for the Development of Database-Centered Applications. [Citation Graph (0, 7)][DBLP]
    ICDE, 1989, pp:394-401 [Conf]
  53. Bhavani M. Thuraisingham, Sandra Heiler, Arnon Rosenthal, Susan Malaika
    Migrating Legacy Databases and Applications (Panel). [Citation Graph (0, 0)][DBLP]
    ICDE, 1998, pp:314- [Conf]
  54. Li Liu, Bhavani M. Thuraisingham
    The Applicability of the Perturbation Model-based Privacy Preserving Data Mining for Real-world Data. [Citation Graph (0, 0)][DBLP]
    ICDM Workshops, 2006, pp:507-512 [Conf]
  55. Edward H. Bensley, Lawrence Fisher, Mike Gates, James Houchens, Arkady Kanevsky, SooHee Kim, Peter C. Krupp, Alice Schafer, Bhavani M. Thuraisingham
    Evolvable real-time C3 systems. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1995, pp:153-0 [Conf]
  56. Bhavani M. Thuraisingham, Arkady Kanevsky, Peter C. Krupp, Alice Schafer, Mike Gates, Thomas Wheeler, Edward H. Bensley, Ruth Ann Sigel, Michael Squadrito
    Evolvable Real-Time C3 Systems-II: Real-Time Infrastructure Requirements. [Citation Graph (0, 0)][DBLP]
    ICECCS, 1996, pp:473-482 [Conf]
  57. Bhavani M. Thuraisingham
    Building Secure Survivable Semantic Webs. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:395-398 [Conf]
  58. Pallabi Parveen, Bhavani M. Thuraisingham
    Face Recognition Using Multiple Classifiers. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:179-186 [Conf]
  59. John A. Maurer, Roman Ginis, Richard Freedman, Michael Squadrito, Steven Wohlever, Bhavani M. Thuraisingham
    Adaptable Real-Time Distributed Object Management for Command and Control Systems. [Citation Graph (0, 0)][DBLP]
    ISADS, 1999, pp:42-0 [Conf]
  60. Bhavani M. Thuraisingham
    Dependable Computing for National Security. [Citation Graph (0, 0)][DBLP]
    ISADS, 2003, pp:333-0 [Conf]
  61. Bhavani M. Thuraisingham
    Object Technology for Building Adaptable and Evolvable Autonomous Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    ISADS, 1999, pp:89-0 [Conf]
  62. Richard Freedman, John A. Maurer, Steven Wohlever, Bhavani M. Thuraisingham, Victor Fay Wolfe, Michael Milligan
    Benchmarking Real-Time Distributed Object Management Systems for Evolvable and Adaptable Command and Control Applications. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:202-205 [Conf]
  63. Insup Lee, Mike Jones, Hermann Kopetz, K. H. Kim, Thomas F. Lawrence, Bhavani M. Thuraisingham
    Fundamental R&D Issues in Real-Time Distributed Computing. [Citation Graph (0, 0)][DBLP]
    ISORC, 2000, pp:215-0 [Conf]
  64. Jungin Kim, Bhavani M. Thuraisingham
    Dependable and Secure TMO Scheme. [Citation Graph (0, 0)][DBLP]
    ISORC, 2006, pp:133-140 [Conf]
  65. Michael Squadrito, Levon Esibov, Lisa Cingiser DiPippo, Victor Fay Wolfe, Gregory Cooper, Bhavani M. Thuraisingham, Peter C. Krupp, Michael Milligan, Russell Johnston
    Concurrency Control in Real-Time Object-Oriented Systems: The Affected Set Priority Ceiling Protocols. [Citation Graph (0, 0)][DBLP]
    ISORC, 1998, pp:96-105 [Conf]
  66. Bhavani M. Thuraisingham, Chris Clifton, John A. Maurer, Marion G. Ceruti
    Real-Time Data Mining of Multimedia Objects. [Citation Graph (0, 0)][DBLP]
    ISORC, 2001, pp:360-365 [Conf]
  67. Bhavani M. Thuraisingham, Latifur Khan, Chris Clifton, John A. Maurer, Marion G. Ceruti
    Dependable Real-Time Data Mining. [Citation Graph (0, 0)][DBLP]
    ISORC, 2005, pp:158-165 [Conf]
  68. Steven Wohlever, Victor Fay Wolfe, Bhavani M. Thuraisingham, Richard Freedman, John A. Maurer
    CORBA-based Real-time Trader Service for Adaptable Command and Control Systems. [Citation Graph (0, 0)][DBLP]
    ISORC, 1999, pp:64-0 [Conf]
  69. Bhavani M. Thuraisingham
    Secure Multimedia Data Management Research Directions. [Citation Graph (0, 0)][DBLP]
    ISMSE, 2002, pp:- [Conf]
  70. Bhavani M. Thuraisingham
    Integrating Object-Oriented Technolgy and Security Technology: A Panel Discussion. [Citation Graph (0, 0)][DBLP]
    OOPSLA, 1993, pp:304- [Conf]
  71. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for Object-Oriented Systems: An Editorial Overview. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:1-7 [Conf]
  72. Bhavani M. Thuraisingham
    Data Mining for Surveillance Applications. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2006, pp:12-14 [Conf]
  73. Bhavani M. Thuraisingham
    Data Mining and Cyber Security. [Citation Graph (0, 0)][DBLP]
    QSIC, 2003, pp:2-0 [Conf]
  74. Roman Ginis, Eric Hughes, Steven Wohlever, Bhavani M. Thuraisingham, Peter C. Krupp, John A. Maurer
    Object-Oriented Data Management and Distribution for Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP]
    RTDB, 1997, pp:77-0 [Conf]
  75. Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
    Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:1-10 [Conf]
  76. Bhavani M. Thuraisingham, Eric Hughes
    Data quality: developments and directions. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:97-102 [Conf]
  77. Eric Hughes, Roman Ginis, Bhavani M. Thuraisingham, Peter C. Krupp, John A. Maurer
    Data Manager for Evolvable Real-time Command and Control Systems. [Citation Graph (0, 1)][DBLP]
    VLDB, 1997, pp:558-561 [Conf]
  78. Bhavani M. Thuraisingham, Chris Clifton, Amar Gupta, Elisa Bertino, Elena Ferrari
    Directions for Web and E-Commerce Applications Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:200-204 [Conf]
  79. Bhavani M. Thuraisingham
    Data Mining for Security Applications. [Citation Graph (0, 0)][DBLP]
    WISI, 2006, pp:1-3 [Conf]
  80. Bhavani M. Thuraisingham
    Dependable Infrastructures and Data Managers for Sensor Networks. [Citation Graph (0, 0)][DBLP]
    WORDS Fall, 2003, pp:11-0 [Conf]
  81. Bhavani M. Thuraisingham, Eric Hughes, Dock Allen
    Dependable Semantic Web. [Citation Graph (0, 0)][DBLP]
    WORDS, 2002, pp:305-310 [Conf]
  82. Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham
    Access control for web data: models and policy languages. [Citation Graph (0, 0)][DBLP]
    Annales des Télécommunications, 2006, v:61, n:3-4, pp:245-266 [Journal]
  83. Bhavani M. Thuraisingham
    Directions for security and privacy for semantic e-business applications. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:12, pp:71-73 [Journal]
  84. Bhavani M. Thuraisingham
    Multilevel security issues in distributed database management systems II. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:8, pp:727-747 [Journal]
  85. Bhavani M. Thuraisingham
    Security issues for federated database systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1994, v:13, n:6, pp:509-525 [Journal]
  86. Bhavani M. Thuraisingham, Harvey H. Rubinovitz
    Multilevel security issues in distributed database management systems - III. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:7, pp:661-674 [Journal]
  87. Bhavani M. Thuraisingham
    Privacy constraint processing in a privacy-enhanced database management system. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2005, v:55, n:2, pp:159-188 [Journal]
  88. Bhavani M. Thuraisingham, Reind P. van de Riet
    Data and applications security (Guest editorial). [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:235-236 [Journal]
  89. Bhavani M. Thuraisingham
    Managing and Mining Multimedia Databases. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 2004, v:13, n:3, pp:739-0 [Journal]
  90. Bhavani M. Thuraisingham
    Web Information Management and its Application to Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 1999, v:8, n:2, pp:107-117 [Journal]
  91. Bhavani M. Thuraisingham
    Representation of One-One Degrees by Decision Problems for System Functions. [Citation Graph (0, 0)][DBLP]
    J. Comput. Syst. Sci., 1982, v:24, n:3, pp:373-377 [Journal]
  92. Bhavani M. Thuraisingham
    Editorial. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2004, v:23, n:3, pp:207-208 [Journal]
  93. Donald G. Marks, Peter J. Sell, Bhavani M. Thuraisingham
    MOMT: A Multilevel Object Modeling Technique for Designing Secure Database Applications. [Citation Graph (0, 0)][DBLP]
    JOOP, 1996, v:9, n:4, pp:22-29 [Journal]
  94. Bhavani M. Thuraisingham
    Towards the Design of a Multilevel Secure Object-Oriented Database Management System. [Citation Graph (0, 0)][DBLP]
    JOOP, 1995, v:8, n:3, pp:42-49 [Journal]
  95. Harvey Rubinovitz, Bhavani M. Thuraisingham
    Design and implementation of a query processor for a trusted distributed data base management system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1993, v:21, n:1, pp:49-69 [Journal]
  96. Bhavani M. Thuraisingham
    System Function Languages. [Citation Graph (0, 0)][DBLP]
    Math. Log. Q., 1993, v:39, n:, pp:357-366 [Journal]
  97. Bhavani M. Thuraisingham
    Security and privacy for multimedia database management systems. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2007, v:33, n:1, pp:13-29 [Journal]
  98. Shail Arora, Mamdouh Ibrahim, Bhavani M. Thuraisingham, T. C. Ting
    Object-oriented technology for health care and medical information systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:4, pp:122-126 [Journal]
  99. Bhavani M. Thuraisingham, Ravi S. Sandhu, T. C. Ting
    Security for object-oriented systems. [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:77-78 [Journal]
  100. Bhavani M. Thuraisingham, T. C. Ting, Peter J. Sell, Ravi S. Sandhu, Thomas F. Keefe
    Integrating security technology and object-oriented technology (panel). [Citation Graph (0, 0)][DBLP]
    OOPS Messenger, 1994, v:5, n:2, pp:59-61 [Journal]
  101. Lisa Cingiser DiPippo, Victor Fay Wolfe, Levon Esibov, Gregory Cooper, Ramachandra Bethmangalkar, Russell Johnston, Bhavani M. Thuraisingham, John Mauer
    Scheduling and Priority Mapping for Static Real-Time Middleware. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2001, v:20, n:2, pp:155-182 [Journal]
  102. Bhavani M. Thuraisingham
    Data Mining, National Security, Privacy and Civil Liberties. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:1-5 [Journal]
  103. P. Bruce Berra, Kingsley C. Nwosu, Bhavani M. Thuraisingham
    ACM Multimedia '94 Conference Workshop on Multimedia Database Management Systems. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1995, v:24, n:1, pp:70-72 [Journal]
  104. Arnon Rosenthal, Leonard J. Seligman, Catherine D. McCollum, Barbara T. Blaustein, Bhavani M. Thuraisingham, Edward Lafferty
    Data Management Research at The MITRE Corporation. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1995, v:24, n:3, pp:77-82 [Journal]
  105. Bhavani M. Thuraisingham
    Computing Transitive Closures of Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1990, v:19, n:3, pp:17-23 [Journal]
  106. Elisa Bertino, Barbara Carminati, Elena Ferrari, Bhavani M. Thuraisingham, Amar Gupta
    Selective and Authentic Third-Party Distribution of XML Documents. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:10, pp:1263-1278 [Journal]
  107. Bhavani M. Thuraisingham, John A. Maurer
    Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1999, v:11, n:1, pp:228-238 [Journal]
  108. Bhavani M. Thuraisingham, T. C. Ting
    Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology. [Citation Graph (0, 1)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:1-2 [Journal]
  109. Victor Fay Wolfe, Lisa Cingiser DiPippo, Gregory Cooper, Russell Johnston, Peter Kortmann, Bhavani M. Thuraisingham
    Real-Time CORBA. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2000, v:11, n:10, pp:1073-1089 [Journal]
  110. Shyh-Kwei Chen, Wei-Tek Tsai, Bhavani M. Thuraisingham
    Recovery Point Selection on a Reverse Binary Tree Task Model. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:8, pp:963-976 [Journal]
  111. Elisa Bertino, L. R. Khan, Ravi S. Sandhu, Bhavani M. Thuraisingham
    Secure knowledge management: confidentiality, trust, and privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2006, v:36, n:3, pp:429-438 [Journal]
  112. Elena Ferrari, Bhavani M. Thuraisingham
    Guest editorial: special issue on privacy preserving data management. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:4, pp:291-292 [Journal]
  113. Ryan Layfield, Murat Kantarcioglu, Bhavani M. Thuraisingham
    Enforcing Honesty in Assured Information Sharing Within a Distributed System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:113-128 [Conf]
  114. Ashraful Alam, Ganesh Subbiah, Latifur Khan, Bhavani M. Thuraisingham
    DAGIS: A Geospatial Semantic Web Services Discovery and Selection Framework. [Citation Graph (0, 0)][DBLP]
    GeoS, 2007, pp:268-277 [Conf]
  115. Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingham, M. Husain, Shaofei Chen, Fang Qiu
    Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:254-261 [Conf]
  116. Ebru Celikel, Murat Kantarcioglu, Bhavani M. Thuraisingham, Elisa Bertino
    Managing Risks in RBAC Employed Distributed Environments. [Citation Graph (0, 0)][DBLP]
    OTM Conferences (2), 2007, pp:1548-1566 [Conf]
  117. Mohammad M. Masud, Latifur Khan, Bhavani M. Thuraisingham
    Feature Based Techniques for Auto-Detection of Novel Email Worms. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:205-216 [Conf]
  118. Bhavani M. Thuraisingham
    Confidentiality, Privacy and Trust Policy Enforcement for the Semantic Web. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:8-11 [Conf]
  119. Bhavani M. Thuraisingham
    Multimedia systems security. [Citation Graph (0, 0)][DBLP]
    MM&Sec, 2007, pp:1-2 [Conf]
  120. William Yurcik, Clay Woolam, Greg Hellings, Latifur Khan, Bhavani M. Thuraisingham
    Toward Trusted Sharing of Network Packet Traces Using Anonymization: Single-Field Privacy/Analysis Tradeoffs [Citation Graph (0, 0)][DBLP]
    CoRR, 2007, v:0, n:, pp:- [Journal]
  121. Bhavani M. Thuraisingham
    Privacy-Preserving Data Mining: Development and Directions. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2005, v:16, n:1, pp:75-87 [Journal]
  122. Gal Lavee, Latifur Khan, Bhavani M. Thuraisingham
    A framework for a video analysis tool for suspicious event detection. [Citation Graph (0, 0)][DBLP]
    Multimedia Tools Appl., 2007, v:35, n:1, pp:109-123 [Journal]
  123. Anna Cinzia Squicciarini, Elisa Bertino, Elena Ferrari, Federica Paci, Bhavani M. Thuraisingham
    PP-trust-X: A system for privacy preserving trust negotiations. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2007, v:10, n:3, pp:- [Journal]
  124. Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingham
    A new intrusion detection system using support vector machines and hierarchical clustering. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2007, v:16, n:4, pp:507-521 [Journal]
  125. Mamoun Awad, Latifur Khan, Bhavani M. Thuraisingham
    Predicting WWW surfing using multiple evidence combination. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  126. Fingerprint Matching Algorithm Based on Tree Comparison using Ratios of Relational Distances. [Citation Graph (, )][DBLP]


  127. Extended RBAC - Based Design and Implementation for a Secure Data Warehouse. [Citation Graph (, )][DBLP]


  128. Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case. [Citation Graph (, )][DBLP]


  129. Centralized Security Labels in Decentralized P2P Networks. [Citation Graph (, )][DBLP]


  130. Assured information sharing between trustworthy, semi-trustworthy and untrustworthy coalition partners. [Citation Graph (, )][DBLP]


  131. Dynamic Service and Data Migration in the Clouds. [Citation Graph (, )][DBLP]


  132. Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]


  133. Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. [Citation Graph (, )][DBLP]


  134. Data Mining for Security Applications. [Citation Graph (, )][DBLP]


  135. Trustworthy Semantic Web Technologies for Secure Knowledge Management. [Citation Graph (, )][DBLP]


  136. Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization. [Citation Graph (, )][DBLP]


  137. Geospatial data qualities as web services performance metrics. [Citation Graph (, )][DBLP]


  138. Content-based ontology matching for GIS datasets. [Citation Graph (, )][DBLP]


  139. Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP]


  140. Geographically-typed semantic schema matching. [Citation Graph (, )][DBLP]


  141. Differences in Fitts' Law Task Performance Based on Environment Scaling. [Citation Graph (, )][DBLP]


  142. Delegation-Based Security Model for Web Services. [Citation Graph (, )][DBLP]


  143. Secure, Highly Available, and High Performance Peer-to-Peer Storage Systems. [Citation Graph (, )][DBLP]


  144. Real-Time Knowledge Discovery and Dissemination for Intelligence Analysis. [Citation Graph (, )][DBLP]


  145. Privacy Preserving Decision Tree Mining from Perturbed Data. [Citation Graph (, )][DBLP]


  146. A Hybrid Model to Detect Malicious Executables. [Citation Graph (, )][DBLP]


  147. Message from the SSW'08 organizers. [Citation Graph (, )][DBLP]


  148. Geospatial Resource Description Framework (GRDF) and security constructs. [Citation Graph (, )][DBLP]


  149. A Practical Approach to Classify Evolving Data Streams: Training with Limited Amount of Labeled Data. [Citation Graph (, )][DBLP]


  150. Data mining for security applications. [Citation Graph (, )][DBLP]


  151. Enhancing Security Modeling for Web Services Using Delegation and Pass-On. [Citation Graph (, )][DBLP]


  152. The SCIFC Model for Information Flow Control in Web Service Composition. [Citation Graph (, )][DBLP]


  153. Policy-Driven Service Composition with Information Flow Control. [Citation Graph (, )][DBLP]


  154. Detecting Remote Exploits Using Data Mining. [Citation Graph (, )][DBLP]


  155. Building Trustworthy Semantic Webs. [Citation Graph (, )][DBLP]


  156. Simulating bioterrorism through epidemiology approximation. [Citation Graph (, )][DBLP]


  157. Data mining for security applications: Mining concept-drifting data streams to detect peer to peer botnet traffic. [Citation Graph (, )][DBLP]


  158. Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. [Citation Graph (, )][DBLP]


  159. QoS Aware Dependable Distributed Stream Processing. [Citation Graph (, )][DBLP]


  160. Data Mining for Security Applications and Its Privacy Implications. [Citation Graph (, )][DBLP]


  161. Data security and integrity: developments and directions. [Citation Graph (, )][DBLP]


  162. Design of a temporal geosocial semantic web for military stabilization and reconstruction operations. [Citation Graph (, )][DBLP]


  163. A Multi-partition Multi-chunk Ensemble Technique to Classify Concept-Drifting Data Streams. [Citation Graph (, )][DBLP]


  164. Classification and Novel Class Detection in Data Streams with Active Mining. [Citation Graph (, )][DBLP]


  165. Integrating Novel Class Detection with Classification for Concept-Drifting Data Streams. [Citation Graph (, )][DBLP]


  166. Classification and Novel Class Detection of Data Streams in a Dynamic Feature Space. [Citation Graph (, )][DBLP]


  167. ROWLBAC: representing role based access control in OWL. [Citation Graph (, )][DBLP]


  168. A semantic web based framework for social network access control. [Citation Graph (, )][DBLP]


  169. Query Processing Techniques for Compliance with Data Confidence Policies. [Citation Graph (, )][DBLP]


  170. Ontology Alignment Using Multiple Contexts. [Citation Graph (, )][DBLP]


  171. Secure Semantic Sensor Web and Pervasive Computing. [Citation Graph (, )][DBLP]


  172. An Effective Evidence Theory Based K-Nearest Neighbor (KNN) Classification. [Citation Graph (, )][DBLP]


  173. R2D: Extracting Relational Structure from RDF Stores. [Citation Graph (, )][DBLP]


  174. Data Mining for Malicious Code Detection and Security Applications. [Citation Graph (, )][DBLP]


  175. Inferring private information using social network data. [Citation Graph (, )][DBLP]


  176. Relationalizing RDF stores for tools reusability. [Citation Graph (, )][DBLP]


  177. Secure peer-to-peer networks for trusted collaboration. [Citation Graph (, )][DBLP]


  178. Incentive and Trust Issues in Assured Information Sharing. [Citation Graph (, )][DBLP]


  179. Building a Geosocial Semantic Web for Military Stabilization and Reconstruction Operations. [Citation Graph (, )][DBLP]


  180. Directions and trends of XML and web service security. [Citation Graph (, )][DBLP]


  181. Reasoning with semantics-aware access control policies for geospatial web services. [Citation Graph (, )][DBLP]


  182. R2D: A Bridge between the Semantic Web and Relational Visualization Tools. [Citation Graph (, )][DBLP]


  183. Semantic Web for Content Based Video Retrieval. [Citation Graph (, )][DBLP]


  184. Semantic Schema Matching without Shared Instances. [Citation Graph (, )][DBLP]


  185. The SCRUB security data sharing infrastructure. [Citation Graph (, )][DBLP]


  186. Measuring anonymization privacy/analysis tradeoffs inherent to sharing network data. [Citation Graph (, )][DBLP]


  187. Storage and Retrieval of Large RDF Graph Using Hadoop and MapReduce. [Citation Graph (, )][DBLP]


  188. Security Engineering: Developments and Directions. [Citation Graph (, )][DBLP]


  189. Privacy preservation in wireless sensor networks: A state-of-the-art survey. [Citation Graph (, )][DBLP]


  190. SODA: A secure object-oriented database system. [Citation Graph (, )][DBLP]


  191. A functional view of multilevel databases. [Citation Graph (, )][DBLP]


  192. Prototyping to explore MLS/DBMS design. [Citation Graph (, )][DBLP]


  193. The applicability of the perturbation based privacy preserving data mining for real-world data. [Citation Graph (, )][DBLP]


Search in 0.016secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002