Search the dblp DataBase
Sushil Jajodia :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Christian S. Jensen , James Clifford , Ramez Elmasri , Shashi K. Gadia , Patrick J. Hayes , Sushil Jajodia A Consensus Glossary of Temporal Database Concepts. [Citation Graph (27, 0)][DBLP ] SIGMOD Record, 1994, v:23, n:1, pp:52-64 [Journal ] Sushil Jajodia , David Mutchler Dynamic Voting. [Citation Graph (25, 24)][DBLP ] SIGMOD Conference, 1987, pp:227-238 [Conf ] Sushil Jajodia , Peter A. Ng , Frederick N. Springsteel The Problem of Equivalence for Entity-Relationship Diagrams. [Citation Graph (20, 0)][DBLP ] IEEE Trans. Software Eng., 1983, v:9, n:5, pp:617-630 [Journal ] Sushil Jajodia , David Mutchler Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database. [Citation Graph (17, 43)][DBLP ] ACM Trans. Database Syst., 1990, v:15, n:2, pp:230-280 [Journal ] Gio Wiederhold , Sushil Jajodia , Witold Litwin Dealing with Granularity of Time in Temporal Databases. [Citation Graph (11, 0)][DBLP ] CAiSE, 1991, pp:124-140 [Conf ] Ouri Wolfson , Sushil Jajodia Distributed Algorithms for Dynamic Replication of Data. [Citation Graph (11, 15)][DBLP ] PODS, 1992, pp:149-163 [Conf ] Sushil Jajodia , David Mutchler Enhancements to the Voting Algorithm. [Citation Graph (10, 11)][DBLP ] VLDB, 1987, pp:399-406 [Conf ] Sushil Jajodia , Ravi S. Sandhu Towards a Multilevel Secure Relational Data Model. [Citation Graph (8, 8)][DBLP ] SIGMOD Conference, 1991, pp:50-59 [Conf ] Xiaoyang Sean Wang , Sushil Jajodia , V. S. Subrahmanian Temporal Modules: An Approach Toward Federated Temporal Databases. [Citation Graph (8, 11)][DBLP ] SIGMOD Conference, 1993, pp:227-236 [Conf ] Catherine Meadows , Sushil Jajodia Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP ] DBSec, 1987, pp:89-101 [Conf ] Sushil Jajodia Managing Replicated Files in Partitioned Distributed Database Systems. [Citation Graph (7, 16)][DBLP ] ICDE, 1987, pp:412-418 [Conf ] Christian S. Jensen , Curtis E. Dyreson , Michael H. Böhlen , James Clifford , Ramez Elmasri , Shashi K. Gadia , Fabio Grandi , Patrick J. Hayes , Sushil Jajodia , Wolfgang Käfer , Nick Kline , Nikos A. Lorentzos , Yannis G. Mitsopoulos , Angelo Montanari , Daniel A. Nonen , Elisa Peressi , Barbara Pernici , John F. Roddick , Nandlal L. Sarda , Maria Rita Scalas , Arie Segev , Richard T. Snodgrass , Michael D. Soo , Abdullah Uz Tansel , Paolo Tiberio , Gio Wiederhold The Consensus Glossary of Temporal Database Concepts - February 1998 Version. [Citation Graph (6, 0)][DBLP ] Temporal Databases, Dagstuhl, 1997, pp:367-405 [Conf ] Xiaoyang Sean Wang , Claudio Bettini , Alexander Brodsky , Sushil Jajodia Logical Design for Temporal Databases with Multiple Granularities. [Citation Graph (6, 8)][DBLP ] ACM Trans. Database Syst., 1997, v:22, n:2, pp:115-170 [Journal ] Sushil Jajodia , David Mutchler Integrating Static and Dynamic Voting Protocols To Enhance File Availability. [Citation Graph (5, 19)][DBLP ] ICDE, 1988, pp:144-153 [Conf ] Sushil Jajodia , Peter A. Ng On the Representation of Relational Structures by Entity-Relationship Diagrams. [Citation Graph (4, 13)][DBLP ] ER, 1983, pp:249-263 [Conf ] Sushil Jajodia , Catherine Meadows Mutual Consistency in Decentralized Distributed Systems. [Citation Graph (4, 10)][DBLP ] ICDE, 1987, pp:396-404 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia A General Framework for Time Granularity and Its Application to Temporal Reasoning. [Citation Graph (4, 0)][DBLP ] Ann. Math. Artif. Intell., 1998, v:22, n:1-2, pp:29-58 [Journal ] Paul Ammann , Sushil Jajodia A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. [Citation Graph (3, 0)][DBLP ] DBSec, 1991, pp:191-202 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Elisa Bertino , Sushil Jajodia Semantic Assumptions and Query Evaluation in Temporal Databases. [Citation Graph (3, 13)][DBLP ] SIGMOD Conference, 1995, pp:257-268 [Conf ] Sushil Jajodia , Pierangela Samarati , V. S. Subrahmanian , Elisa Bertino A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP ] SIGMOD Conference, 1997, pp:474-485 [Conf ] Sushil Jajodia , Ravi S. Sandhu Database Security: Current Status and Key Issues. [Citation Graph (3, 0)][DBLP ] SIGMOD Record, 1990, v:19, n:4, pp:123-126 [Journal ] Pierangela Samarati , Elisa Bertino , Sushil Jajodia An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP ] ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal ] Ouri Wolfson , Sushil Jajodia , Yixiu Huang An Adaptive Data Replication Algorithm. [Citation Graph (3, 28)][DBLP ] ACM Trans. Database Syst., 1997, v:22, n:2, pp:255-314 [Journal ] Sushil Jajodia , David Mutchler A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability. [Citation Graph (3, 0)][DBLP ] IEEE Trans. Software Eng., 1989, v:15, n:1, pp:39-46 [Journal ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf ] Yu Wu , Sushil Jajodia , Xiaoyang Sean Wang Temporal Database Bibliography Update. [Citation Graph (2, 0)][DBLP ] Temporal Databases, Dagstuhl, 1997, pp:338-366 [Conf ] Sushil Jajodia , Peter A. Ng , Frederick N. Springsteel On Universal and Representative Instances for Inconsistent Databases. [Citation Graph (2, 12)][DBLP ] ER, 1983, pp:279-295 [Conf ] Sushil Jajodia , Boris Kogan Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. [Citation Graph (2, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:360-368 [Conf ] Indrajit Ray , Elisa Bertino , Sushil Jajodia , Luigi V. Mancini An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf ] Paul Ammann , Sushil Jajodia Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:125-134 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP ] DBSec, 1994, pp:259-274 [Conf ] Oliver Costich , Sushil Jajodia Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. [Citation Graph (1, 0)][DBLP ] DBSec, 1992, pp:249-266 [Conf ] Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP ] DBSec, 1996, pp:177-194 [Conf ] Sushil Jajodia , Catherine D. McCollum , Barbara T. Blaustein Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1993, pp:109-121 [Conf ] John P. McDermott , Sushil Jajodia Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP ] DBSec, 1992, pp:267-284 [Conf ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP ] DBSec, 1991, pp:297-314 [Conf ] Elisa Bertino , Sushil Jajodia Modeling Multilevel Entities Using Single Level Objects. [Citation Graph (1, 0)][DBLP ] DOOD, 1993, pp:415-428 [Conf ] Sushil Jajodia Universal and Representative Instances Using Unmarked Nulls. [Citation Graph (1, 0)][DBLP ] FSTTCS, 1984, pp:367-378 [Conf ] K. Selçuk Candan , Sushil Jajodia , V. S. Subrahmanian Secure Mediated Databases. [Citation Graph (1, 8)][DBLP ] ICDE, 1996, pp:28-37 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. [Citation Graph (1, 7)][DBLP ] PODS, 1996, pp:68-78 [Conf ] Sushil Jajodia , Boris Kogan Integrating an Object-Oriented Data Model with Multilevel Security. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:76-85 [Conf ] Sushil Jajodia , Ravi S. Sandhu Polyinstantiation Integrity in Multilevel Relations. [Citation Graph (1, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1990, pp:104-115 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP ] VLDB, 1995, pp:218-227 [Conf ] Ouri Wolfson , Sushil Jajodia An Algorithm for Dynamic Data Distribution. [Citation Graph (1, 0)][DBLP ] Workshop on the Management of Replicated Data, 1992, pp:62-65 [Conf ] Sushil Jajodia , Frederick N. Springsteel Lossless Outer Joins with Incomplete Information. [Citation Graph (1, 0)][DBLP ] BIT, 1990, v:30, n:1, pp:34-41 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Mining Temporal Relationships with Multiple Granularities in Time Sequences. [Citation Graph (1, 7)][DBLP ] IEEE Data Eng. Bull., 1998, v:21, n:1, pp:32-38 [Journal ] Sushil Jajodia On Equivalence of Relational and Network Database Models. [Citation Graph (1, 0)][DBLP ] Inf. Process. Lett., 1985, v:20, n:1, pp:51-54 [Journal ] Ouri Wolfson , Sushil Jajodia An Algorithm for Dynamic Data Allocation in Distributed Systems. [Citation Graph (1, 0)][DBLP ] Inf. Process. Lett., 1995, v:53, n:2, pp:113-119 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Database Security: Research and Practice [Citation Graph (1, 0)][DBLP ] Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal ] Xiaoyang Sean Wang , Sushil Jajodia , V. S. Subrahmanian Temporal Modules: An Approach Toward Federated Temporal Databases. [Citation Graph (1, 0)][DBLP ] Inf. Sci., 1995, v:82, n:1-2, pp:103-128 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP ] , 1993, v:, n:, pp:17-44 [Journal ] Vijayalakshmi Atluri , Sushil Jajodia , Elisa Bertino Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal ] Elisa Bertino , Sushil Jajodia , Luigi V. Mancini , Indrajit Ray Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Temporal Semantic Assumptions and Their Use in Databases. [Citation Graph (1, 21)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:277-296 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia , Jia-Ling Lin Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. [Citation Graph (1, 14)][DBLP ] IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:222-237 [Journal ] Paul Ammann , Sushil Jajodia Distributed Timestamp Generation in Planar Lattice Networks. [Citation Graph (1, 0)][DBLP ] ACM Trans. Comput. Syst., 1993, v:11, n:3, pp:205-225 [Journal ] Ravi Mukkamala , Sushil Jajodia A Note on Estimating the Cardinality of the Projection of a Database Relation. [Citation Graph (1, 1)][DBLP ] ACM Trans. Database Syst., 1991, v:16, n:3, pp:564-566 [Journal ] Sushil Jajodia , Frederick N. Springsteel Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. [Citation Graph (1, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:7, pp:811-819 [Journal ] Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:40-55 [Conf ] Vinti Doshi , Amgad Fayad , Sushil Jajodia , Roswitha MacLean Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:298-307 [Conf ] Amgad Fayad , Sushil Jajodia , Catherine D. McCollum Application-Level Isolation Using Data Inconsistency Detection. [Citation Graph (0, 0)][DBLP ] ACSAC, 1999, pp:119-0 [Conf ] Sushil Jajodia , Peng Liu , Catherine D. McCollum Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:73-82 [Conf ] Steven Noel , Sushil Jajodia Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP ] ACSAC, 2005, pp:160-169 [Conf ] Steven Noel , Sushil Jajodia , Brian O'Berry , Michael Jacobs Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:86-95 [Conf ] Steven Noel , Eric Robertson , Sushil Jajodia Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP ] ACSAC, 2004, pp:350-359 [Conf ] Sushil Jajodia , Indrakshi Ray , Paul Ammann Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP ] CAiSE, 1997, pp:75-88 [Conf ] Yingjiu Li , Lingyu Wang , Xiaoyang Sean Wang , Sushil Jajodia Auditing Interval-Based Inference. [Citation Graph (0, 0)][DBLP ] CAiSE, 2002, pp:553-567 [Conf ] Elisa Bertino , Pierangela Samarati , Sushil Jajodia High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf ] Paul Ammann , Sushil Jajodia An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf ] Xinyuan Wang , Shiping Chen , Sushil Jajodia Tracking anonymous peer-to-peer VoIP calls on the internet. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:81-91 [Conf ] Lingyu Wang , Duminda Wijesekera , Sushil Jajodia A logic-based framework for attribute based access control. [Citation Graph (0, 0)][DBLP ] FMSE, 2004, pp:45-55 [Conf ] Duminda Wijesekera , Sushil Jajodia Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf ] Duminda Wijesekera , Sushil Jajodia Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf ] Pierangela Samarati , Paul Ammann , Sushil Jajodia Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf ] Sabrina De Capitani di Vimercati , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Trust management services in relational databases. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:149-160 [Conf ] Bo Zhu , Sanjeev Setia , Sushil Jajodia Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf ] Sushil Jajodia Topological analysis of network attack vulnerability. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:2- [Conf ] Kenneth Smith , Vipin Swarup , Sushil Jajodia , Donald B. Faatz , Todd Cornett , Jeff Hoyt Securely sharing neuroimagery. [Citation Graph (0, 0)][DBLP ] CIKM, 2003, pp:375-377 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. [Citation Graph (0, 0)][DBLP ] CP, 1997, pp:435-449 [Conf ] Åsa Hagström , Sushil Jajodia , Francesco Parisi-Presicce , Duminda Wijesekera Revocations-A Classification. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:44-58 [Conf ] Sushil Jajodia Panel Discussion on the Polyinstantiation Problem: A Position Paper. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:235- [Conf ] Sushil Jajodia , Luigi V. Mancini , Sanjeev Setia A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:168-178 [Conf ] Sushil Jajodia , Ravi S. Sandhu A Formal Framework for Single Level Decomposition of Multilevel Relations. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:152-158 [Conf ] Jia-Ling Lin , Xiaoyang Sean Wang , Sushil Jajodia Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. [Citation Graph (0, 0)][DBLP ] CSFW, 1998, pp:190-201 [Conf ] Peng Liu , Sushil Jajodia Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP ] CSFW, 2001, pp:191-205 [Conf ] Ravi S. Sandhu , Sushil Jajodia , Teresa F. Lunt A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:159-165 [Conf ] Ravi S. Sandhu , Roshan K. Thomas , Sushil Jajodia A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:139-152 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia An Architecture for Supporting Interoperability among Temporal Databases. [Citation Graph (0, 0)][DBLP ] Temporal Databases, Dagstuhl, 1997, pp:36-55 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:135-158 [Conf ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1995, pp:231-247 [Conf ] Vijayalakshmi Atluri , Sushil Jajodia , Thomas F. Keefe , Catherine D. McCollum , Ravi Mukkamala Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP ] DBSec, 1996, pp:79-98 [Conf ] Susan Chapin , Donald B. Faatz , Sushil Jajodia Distributed Policies for Data Management Making Policies Mobile. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:63-76 [Conf ] Shiping Chen , Duminda Wijesekera , Sushil Jajodia FlexFlow: A Flexible Flow Control Policy Specification Framework. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:358-371 [Conf ] Daniel Barbará , Rajni Goel , Sushil Jajodia Protecting File systems Against Corruption Using Checksums. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:113-124 [Conf ] Daniel Barbará , Rajni Goel , Sushil Jajodia Mining Malicious Corruption of Data with Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:175-189 [Conf ] Sushil Jajodia , Ravi Mukkamala , Indrajit Ray A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:199-218 [Conf ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2004, pp:81-94 [Conf ] Peng Liu , Sushil Jajodia , Catherine D. McCollum Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:3-18 [Conf ] Sushil Jajodia , Ravi S. Sandhu Polyinstantiation Integrity in Multilevel Relations Revisited. [Citation Graph (0, 0)][DBLP ] DBSec, 1990, pp:297-308 [Conf ] Sushil Jajodia , Shashi K. Gadia , Gautam Bhargava , Edgar H. Sibley Audit Trail Organization in Relational Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1989, pp:269-281 [Conf ] Sushil Jajodia , Ravi Mukkamala Effects of SeaView Decomposition of Multilevel Relations on Database Performance. [Citation Graph (0, 0)][DBLP ] DBSec, 1991, pp:203-225 [Conf ] Sushil Jajodia , Duminda Wijesekera Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:3-15 [Conf ] Ravi Mukkamala , Jason Gagnon , Sushil Jajodia Integrating Data Mining Techniques with Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:33-46 [Conf ] Ravi Mukkamala , Sushil Jajodia A Novel Approach to Certificate Revocation Management. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:225-238 [Conf ] Ravi Mukkamala , Sushil Jajodia A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP ] DBSec, 1993, pp:199-214 [Conf ] Bhavani M. Thuraisingham , Sushil Jajodia , Pierangela Samarati , John E. Dobson , Martin S. Olivier Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1998, pp:269-284 [Conf ] Bhavani M. Thuraisingham , Linda Schlipper , Pierangela Samarati , Tsau Young Lin , Sushil Jajodia , Chris Clifton Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP ] DBSec, 1997, pp:3-16 [Conf ] Lingyu Wang , Duminda Wijesekera , Sushil Jajodia Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP ] DBSec, 2002, pp:117-131 [Conf ] Lingyu Wang , Chao Yao , Anoop Singhal , Sushil Jajodia Interactive Analysis of Attack Graphs Using Relational Queries. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:119-132 [Conf ] Jacqueline Yang , Duminda Wijesekera , Sushil Jajodia Subject Switching Algorithms for Access Control in Federated Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 2001, pp:61-74 [Conf ] Nicola Zannone , Sushil Jajodia , Duminda Wijesekera Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:1-14 [Conf ] Sabrina De Capitani di Vimercati , Pierangela Samarati , Sushil Jajodia Policies, Models, and Languages for Access Control. [Citation Graph (0, 0)][DBLP ] DNIS, 2005, pp:225-237 [Conf ] Yingjiu Li , Huiping Guo , Sushil Jajodia Tamper detection and localization for categorical data using fragile watermarks. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2004, pp:73-82 [Conf ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:133-141 [Conf ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP ] DSN, 2000, pp:631-640 [Conf ] Hemant Sengar , Duminda Wijesekera , Haining Wang , Sushil Jajodia VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP ] DSN, 2006, pp:393-402 [Conf ] Hemant Sengar , Duminda Wijesekera , Sushil Jajodia Authentication and Integrity in Telecommunication Signaling Network. [Citation Graph (0, 0)][DBLP ] ECBS, 2005, pp:163-170 [Conf ] Daniel Barbará , Rajni Goel , Sushil Jajodia Using Checksums to Detect Data Corruption. [Citation Graph (0, 8)][DBLP ] EDBT, 2000, pp:136-149 [Conf ] Paul K. Blackwell , Sushil Jajodia , Peter A. Ng A View of Database Management Systems as Abstract Data Types. [Citation Graph (0, 8)][DBLP ] ER, 1983, pp:661-668 [Conf ] Shiping Chen , Duminda Wijesekera , Sushil Jajodia Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP ] ESORICS, 2004, pp:1-16 [Conf ] Lingyu Wang , Anyi Liu , Sushil Jajodia An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:247-266 [Conf ] Lingyu Wang , Yingjiu Li , Duminda Wijesekera , Sushil Jajodia Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP ] ESORICS, 2003, pp:100-115 [Conf ] Donald G. Marks , Amihai Motro , Sushil Jajodia Enhancing the Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP ] ESORICS, 1996, pp:290-303 [Conf ] Lingyu Wang , Duminda Wijesekera , Sushil Jajodia Cardinality-Based Inference Control in Sum-Only Data Cubes. [Citation Graph (0, 0)][DBLP ] ESORICS, 2002, pp:55-71 [Conf ] Amihai Motro , Donald G. Marks , Sushil Jajodia Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP ] ESORICS, 1994, pp:431-445 [Conf ] Ravi S. Sandhu , Sushil Jajodia Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP ] ESORICS, 1992, pp:307-328 [Conf ] Yingjiu Li , Sencun Zhu , Lingyu Wang , Sushil Jajodia A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP ] FoIKS, 2002, pp:148-159 [Conf ] Sushil Jajodia , Duminda Wijesekera A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:336-345 [Conf ] Kaushal Sarda , Duminda Wijesekera , Sushil Jajodia Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP ] ICDCIT, 2004, pp:379-384 [Conf ] Peng Liu , Paul Ammann , Sushil Jajodia Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP ] ICDCS, 1999, pp:414-423 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP ] ICDCS, 2003, pp:163-0 [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:749-0 [Conf ] Sushil Jajodia Protecting Critical Information Systems (Abstract). [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:143- [Conf ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP ] ICNP, 2003, pp:326-335 [Conf ] Neil F. Johnson , Zoran Duric , Sushil Jajodia Recovery of Watermarks from Distorted Images. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1999, pp:318-332 [Conf ] Neil F. Johnson , Sushil Jajodia Steganalysis of Images Created Using Current Steganography Software. [Citation Graph (0, 0)][DBLP ] Information Hiding, 1998, pp:273-289 [Conf ] Hemant Sengar , Duminda Wijesekera , Sushil Jajodia MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. [Citation Graph (0, 0)][DBLP ] IPDPS, 2005, pp:- [Conf ] Sencun Zhu , Sushil Jajodia Scalable Group Rekeying for Secure Multicast: A Survey. [Citation Graph (0, 0)][DBLP ] IWDC, 2003, pp:1-10 [Conf ] Neil F. Johnson , Zoran Duric , Sushil Jajodia On Fingerprinting Images for Recognition. [Citation Graph (0, 0)][DBLP ] Multimedia Information Systems, 1999, pp:4-11 [Conf ] Vipin Swarup , Sushil Jajodia , Joseph Pamula Rule-Based Topological Vulnerability Analysis. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:23-37 [Conf ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2004, pp:42-51 [Conf ] Donggang Liu , Peng Ning , Sencun Zhu , Sushil Jajodia Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP ] MobiQuitous, 2005, pp:118-132 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP ] Networked Group Communication, 2003, pp:107-118 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP ] Security for Object-Oriented Systems, 1993, pp:96-116 [Conf ] Yingjiu Li , Lingyu Wang , Sushil Jajodia Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:160-170 [Conf ] Claudio Bettini , Sushil Jajodia , Xiaoyang Sean Wang , Duminda Wijesekera Obligation Monitoring in Policy Management. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:2-12 [Conf ] Lei Zhang , Alexander Brodsky , Sushil Jajodia Toward Information Sharing: Benefit And Risk Access Control (BARAC). [Citation Graph (0, 0)][DBLP ] POLICY, 2006, pp:45-53 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP ] POMC, 2002, pp:66-73 [Conf ] Daniel Barbará , Yi Li , Jia-Ling Lin , Sushil Jajodia , Julia Couto Bootstrapping a Data Mining Intrusion Detection System. [Citation Graph (0, 0)][DBLP ] SAC, 2003, pp:421-425 [Conf ] Maria Calagna , Huiping Guo , Luigi V. Mancini , Sushil Jajodia A robust watermarking system based on SVD compression. [Citation Graph (0, 0)][DBLP ] SAC, 2006, pp:1341-1347 [Conf ] David Keppler , Vipin Swarup , Sushil Jajodia Redirection policies for mission-based information sharing. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:210-218 [Conf ] Sankardas Roy , Sanjeev Setia , Sushil Jajodia Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP ] SASN, 2006, pp:71-82 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Identifying Sensitive Associations in Databases for Release Control. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:187-201 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Protecting Privacy Against Location-Based Personal Identification. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:185-199 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:16-32 [Conf ] Chao Yao , Lingyu Wang , Xiaoyang Sean Wang , Sushil Jajodia Indistinguishability: The Other Aspect of Privacy. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2006, pp:1-17 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. [Citation Graph (0, 0)][DBLP ] SEBD, 2001, pp:339-346 [Conf ] Amgad Fayad , Sushil Jajodia , Donald B. Faatz , Vinti Doshi Going Beyond MAC and DAC Using Mobile Policies. [Citation Graph (0, 0)][DBLP ] SEC, 2001, pp:245-260 [Conf ] Vinti Doshi , Sushil Jajodia Referential Integrity in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP ] SEC, 1992, pp:359-371 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:423-434 [Conf ] Kenneth Smith , Donald B. Faatz , Amgad Fayad , Sushil Jajodia Propagating Modifications to Mobile Policies. [Citation Graph (0, 0)][DBLP ] SEC, 2002, pp:573-584 [Conf ] Douglas E. Williams , Amgad Fayad , Sushil Jajodia , Daniel Calle A User Friendly Guard with Mobile Post-Release Access Control Policy. [Citation Graph (0, 0)][DBLP ] SEC, 2003, pp:265-276 [Conf ] Jiahai Yang , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:171-180 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] SenSys, 2003, pp:308-309 [Conf ] Boris Kogan , Sushil Jajodia Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. [Citation Graph (0, 13)][DBLP ] SIGMOD Conference, 1990, pp:153-162 [Conf ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Mario Finetti , Stefano Paraboschi , Pierangela Samarati , Sushil Jajodia Implementation of a Storage Mechanism for Untrusted DBMSs. [Citation Graph (0, 0)][DBLP ] IEEE Security in Storage Workshop, 2003, pp:38-46 [Conf ] Paul Ammann , Sushil Jajodia , Catherine D. McCollum , Barbara T. Blaustein Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf ] Paul Ammann , Sushil Jajodia , Indrakshi Ray Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf ] Elena Ferrari , Pierangela Samarati , Elisa Bertino , Sushil Jajodia Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf ] Sushil Jajodia , Ravi S. Sandhu A Novel Decomposition of Multilevel Relations into Single-Level Relations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:300-315 [Conf ] Sushil Jajodia , Pierangela Samarati , V. S. Subrahmanian A Logical Language for Expressing Authorizations. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1997, pp:31-42 [Conf ] Lingyu Wang , Sushil Jajodia , Duminda Wijesekera Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf ] Sanjeev Setia , Samir Koussih , Sushil Jajodia , Eric Harder Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf ] Xinyuan Wang , Shiping Chen , Sushil Jajodia Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf ] Paul Ammann , Sushil Jajodia The Integrity Challenge. [Citation Graph (0, 0)][DBLP ] IICIS, 1999, pp:59-70 [Conf ] Giovanni Rumolo , Sushil Jajodia Algebra for Databases with Explicit Markings of Damaged Data. [Citation Graph (0, 0)][DBLP ] IICIS, 1998, pp:103-129 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Free Schedules for Free Agents in Workflow Systems. [Citation Graph (0, 0)][DBLP ] TIME, 2000, pp:31-38 [Conf ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia A General Framework and Reasoning Model for Time Granularity. [Citation Graph (0, 0)][DBLP ] TIME, 1996, pp:104-111 [Conf ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP ] TIME, 2001, pp:111-118 [Conf ] Sergio Mascetti , Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia k-Anonymity in Databases with Timestamped Data. [Citation Graph (0, 0)][DBLP ] TIME, 2006, pp:177-186 [Conf ] Yingjiu Li , Xiaoyang Sean Wang , Sushil Jajodia Discovering Temporal Patterns in Multiple Granularities. [Citation Graph (0, 0)][DBLP ] TSDM, 2000, pp:5-19 [Conf ] Steven Noel , Michael Jacobs , Pramod Kalapa , Sushil Jajodia Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP ] VizSEC, 2005, pp:12- [Conf ] Steven Noel , Sushil Jajodia Managing attack graph complexity through visual hierarchical aggregation. [Citation Graph (0, 0)][DBLP ] VizSEC, 2004, pp:109-118 [Conf ] Claudio Bettini , Sushil Jajodia , Xiaoyang Sean Wang , Duminda Wijesekera Provisions and Obligations in Policy Management and Security Applications. [Citation Graph (0, 0)][DBLP ] VLDB, 2002, pp:502-513 [Conf ] Chao Yao , Xiaoyang Sean Wang , Sushil Jajodia Checking for k-Anonymity Violation by Views. [Citation Graph (0, 0)][DBLP ] VLDB, 2005, pp:910-921 [Conf ] Sushil Jajodia Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP ] WAIM, 2003, pp:1- [Conf ] Nicola Zannone , Sushil Jajodia , Fabio Massacci , Duminda Wijesekera Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:10-19 [Conf ] Roberto Di Pietro , Luigi V. Mancini , Sushil Jajodia Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal ] Sencun Zhu , Shouhuai Xu , Sanjeev Setia , Sushil Jajodia LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP ] Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Solving multi-granularity temporal constraint networks. [Citation Graph (0, 0)][DBLP ] Artif. Intell., 2002, v:140, n:1/2, pp:107-152 [Journal ] Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia An Algebraic Representation of Calendars. [Citation Graph (0, 0)][DBLP ] Ann. Math. Artif. Intell., 2002, v:36, n:1-2, pp:5-38 [Journal ] H. A. Burgdorff , Sushil Jajodia , Frederick N. Springsteel , Yechezkel Zalcstein Alternative Methods for the Reconstruction of Trees from Their Traversals. [Citation Graph (0, 0)][DBLP ] BIT, 1987, v:27, n:2, pp:134-140 [Journal ] Sushil Jajodia , Catherine D. McCollum , Paul Ammann Trusted Recovery. [Citation Graph (0, 2)][DBLP ] Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal ] Sushil Jajodia Recognizing Multivalued Dependencies in Relation Schemas. [Citation Graph (0, 0)][DBLP ] Comput. J., 1986, v:29, n:5, pp:458-459 [Journal ] Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang Design and implementation of a decentralized prototype system for detecting distributed attacks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2002, v:25, n:15, pp:1374-1391 [Journal ] Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Modeling requests among cooperating intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2000, v:23, n:17, pp:1702-1715 [Journal ] Lingyu Wang , Anyi Liu , Sushil Jajodia Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:15, pp:2917-2933 [Journal ] Lingyu Wang , Steven Noel , Sushil Jajodia Minimum-cost network hardening using attack graphs. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2006, v:29, n:18, pp:3812-3824 [Journal ] Ravi S. Sandhu , Sushil Jajodia Integrity principles and mechanisms in database management systems. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:5, pp:413-427 [Journal ] Ravi S. Sandhu , Sushil Jajodia Eliminating polyinstantiation securely. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1992, v:11, n:6, pp:547-562 [Journal ] Sushil Jajodia , Paul Ammann , Catherine D. McCollum Surviving Information Warfare Attacks. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1999, v:32, n:4, pp:57-63 [Journal ] Neil F. Johnson , Sushil Jajodia Exploring Steganography: Seeing the Unseen. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 1998, v:31, n:2, pp:26-34 [Journal ] Sushil Jajodia Database Security and Privacy. [Citation Graph (0, 2)][DBLP ] ACM Comput. Surv., 1996, v:28, n:1, pp:129-131 [Journal ] Sushil Jajodia Managing Security and Privacy of Information. [Citation Graph (0, 0)][DBLP ] ACM Comput. Surv., 1996, v:28, n:4es, pp:0- [Journal ] Sushil Jajodia Chairman's Message. [Citation Graph (0, 0)][DBLP ] IEEE Database Eng. Bull., 1986, v:9, n:3, pp:1- [Journal ] Sushil Jajodia Letter from the TC Chairman. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 1987, v:10, n:3, pp:1- [Journal ] Sushil Jajodia Letter from the TC Chair. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 1988, v:11, n:2, pp:1- [Journal ] Sushil Jajodia , Won Kim From the Issue Editors. [Citation Graph (0, 0)][DBLP ] IEEE Data Eng. Bull., 1989, v:12, n:1, pp:1- [Journal ] Susan Chapin , Donald B. Faatz , Sushil Jajodia , Amgad Fayad Consistent policy enforcement in distributed systems using mobile policies. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:43, n:3, pp:261-280 [Journal ] Yingjiu Li , Peng Ning , Xiaoyang Sean Wang , Sushil Jajodia Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal ] Pierangela Samarati , Paul Ammann , Sushil Jajodia Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Temporal Reasoning in Workflow Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2002, v:11, n:3, pp:269-306 [Journal ] Peng Liu , Paul Ammann , Sushil Jajodia Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal ] Luigi V. Mancini , Indrajit Ray , Sushil Jajodia , Elisa Bertino Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal ] Anoop Singhal , Sushil Jajodia Data warehousing and data mining techniques for intrusion detection systems. [Citation Graph (0, 0)][DBLP ] Distributed and Parallel Databases, 2006, v:20, n:2, pp:149-166 [Journal ] Peng Liu , Peng Ning , Sushil Jajodia Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal ] Ernesto Damiani , Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Selective Data Encryption in Outsourced Dynamic Environments. [Citation Graph (0, 0)][DBLP ] Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:127-142 [Journal ] Sushil Jajodia Distributed Databases: Turing Award Winner Jim Gray on the new millennium. [Citation Graph (0, 0)][DBLP ] IEEE Concurrency, 1999, v:7, n:3, pp:9-10 [Journal ] Xiaoyang Sean Wang , Sushil Jajodia , Sona Mohavni Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. [Citation Graph (0, 0)][DBLP ] International Journal on Artificial Intelligence Tools, 1998, v:7, n:2, pp:319-339 [Journal ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP ] Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal ] Sushil Jajodia , David Mutchler A short technical paper: Determining whether a vote assignment is dominated. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1991, v:56, n:1-3, pp:279-282 [Journal ] Sushil Jajodia , Ravi Mukkamala Measuring the effect of commutative transactions on distributed database performance. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 1993, v:68, n:1-2, pp:91-111 [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal ] Huiping Guo , Yingjiu Li , Anyi Liu , Sushil Jajodia A fragile watermarking scheme for detecting malicious modifications of database relations. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:10, pp:1350-1378 [Journal ] Yingjiu Li , Sencun Zhu , Xiaoyang Sean Wang , Sushil Jajodia Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal ] Csilla Farkas , Alexander Brodsky , Sushil Jajodia Unauthorized inferences in semistructured databases. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2006, v:176, n:22, pp:3269-3299 [Journal ] Huiping Guo , Yingjiu Li , Sushil Jajodia Chaining watermarks for detecting malicious modifications to streaming data. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2007, v:177, n:1, pp:281-298 [Journal ] Paul Ammann , Frank Jaeckle , Sushil Jajodia Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1995, v:3, n:2/3, pp:87-114 [Journal ] Vijayalakshmi Atluri , Elisa Bertino , Sushil Jajodia Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal ] Daniel Barbará , Rajni Goel , Sushil Jajodia A Checksum-based Corruption Detection Technique. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2003, v:11, n:3, pp:315-330 [Journal ] Sushil Jajodia , Vijayalakshmi Atluri , Thomas F. Keefe , Catherine D. McCollum , Ravi Mukkamala Multilevel Security Transaction Processing. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2001, v:9, n:3, pp:165-195 [Journal ] Yingjiu Li , Ningning Wu , Xiaoyang Sean Wang , Sushil Jajodia Enhancing Profiles for Anomaly Detection Using Time Granularities. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2002, v:10, n:1/2, pp:137-158 [Journal ] Peng Liu , Sushil Jajodia , Catherine D. McCollum Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal ] Indrakshi Ray , Paul Ammann , Sushil Jajodia A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal ] Lingyu Wang , Duminda Wijesekera , Sushil Jajodia Cardinality-based inference control in data cubes. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2004, v:12, n:5, pp:655-692 [Journal ] Sencun Zhu , Sanjeev Setia , Shouhuai Xu , Sushil Jajodia GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP ] Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal ] Claudio Bettini , Sushil Jajodia , Xiaoyang Sean Wang , Duminda Wijesekera Provisions and Obligations in Policy Rule Management. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal ] Claudio Bettini , Sushil Jajodia , Xiaoyang Sean Wang , Duminda Wijesekera Reasoning with advanced policy rules and its application to access control. [Citation Graph (0, 0)][DBLP ] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:156-170 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia Information Release Control: A Learning-Based Architecture. [Citation Graph (0, 0)][DBLP ] J. Data Semantics, 2005, v:2, n:, pp:176-198 [Journal ] Sushil Jajodia , Peter A. Ng Translation of entity-relationship diagrams into relational structures. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1984, v:4, n:2-3, pp:123-133 [Journal ] Sushil Jajodia , Peter Ann-Beng Ng , Raymond T. Yeh Introduction to the special issue on the use of entity-relationship concepts in databases and related software. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1984, v:4, n:2-3, pp:95-98 [Journal ] Sushil Jajodia , Ravi Mukkamala , K. V. S. Ramarao A View-Based Dynamic Replication Control Algorithm. [Citation Graph (0, 0)][DBLP ] Nord. J. Comput., 1994, v:1, n:2, pp:214-230 [Journal ] Sanjeev Setia , Sencun Zhu , Sushil Jajodia A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP ] Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal ] Csilla Farkas , Sushil Jajodia The Inference Problem: A Survey. [Citation Graph (0, 0)][DBLP ] SIGKDD Explorations, 2002, v:4, n:2, pp:6-11 [Journal ] Daniel Barbará , Julia Couto , Sushil Jajodia , Ningning Wu ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2001, v:30, n:4, pp:15-24 [Journal ] Sushil Jajodia , Daniel Barbará , Alexander Brodsky , Larry Kerschberg , Amihai Motro , Edgar H. Sibley , Xiaoyang Sean Wang Information Systems Research at George Mason University. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 1997, v:26, n:4, pp:69-74 [Journal ] Chunru Zhang , Kwok-Yan Lam , Sushil Jajodia Scalable Threshold Closure. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:185-206 [Journal ] Yingjiu Li , Vipin Swarup , Sushil Jajodia Fingerprinting Relational Databases: Schemes and Specialties. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:34-45 [Journal ] Pierangela Samarati , Michael K. Reiter , Sushil Jajodia An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal ] Alberto Ceselli , Ernesto Damiani , Sabrina De Capitani di Vimercati , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Modeling and assessing inference exposure in encrypted databases. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:119-152 [Journal ] Duminda Wijesekera , Sushil Jajodia A propositional policy algebra for access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:286-325 [Journal ] Peng Ning , Sushil Jajodia , Xiaoyang Sean Wang Abstraction-based intrusion detection in distributed environments. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:407-452 [Journal ] Vijayalakshmi Atluri , Sushil Jajodia , Elisa Bertino Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal ] Paul Ammann , Vijayalakshmi Atluri , Sushil Jajodia The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal ] Paul Ammann , Sushil Jajodia , Peng Liu Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal ] Paul Ammann , Sushil Jajodia , Padmaja Mavuluri On-The-Fly Reading of Entire Databases. [Citation Graph (0, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:834-838 [Journal ] Alexander Brodsky , Csilla Farkas , Sushil Jajodia Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:900-919 [Journal ] Sushil Jajodia , David Mutchler A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting. [Citation Graph (0, 28)][DBLP ] IEEE Trans. Knowl. Data Eng., 1989, v:1, n:4, pp:459-469 [Journal ] Indrajit Ray , Luigi V. Mancini , Sushil Jajodia , Elisa Bertino ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal ] Kenneth Smith , Barbara T. Blaustein , Sushil Jajodia , LouAnna Notargiacomo Correctness Criteria for Multilevel Secure Transactions. [Citation Graph (0, 3)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:32-45 [Journal ] Pierangela Samarati , Elisa Bertino , Alessandro Ciampichetti , Sushil Jajodia Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP ] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal ] Sushil Jajodia , Pierangela Samarati , Maria Luisa Sapino , V. S. Subrahmanian Flexible support for multiple access control policies. [Citation Graph (0, 0)][DBLP ] ACM Trans. Database Syst., 2001, v:26, n:2, pp:214-260 [Journal ] Duminda Wijesekera , Sushil Jajodia , Francesco Parisi-Presicce , Åsa Hagström Removing permissions in the flexible authorization framework. [Citation Graph (0, 0)][DBLP ] ACM Trans. Database Syst., 2003, v:28, n:3, pp:209-229 [Journal ] Elisa Bertino , Sushil Jajodia , Pierangela Samarati A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2006, v:2, n:4, pp:500-528 [Journal ] Paul Ammann , Sushil Jajodia , Phyllis G. Frankl Globally Consistent Event Ordering in One-Directional Distributed Environments. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:6, pp:665-670 [Journal ] Alessandro Mei , Luigi V. Mancini , Sushil Jajodia Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:885-896 [Journal ] Sushil Jajodia An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:9, pp:1047-1048 [Journal ] Sushil Jajodia , Jian Liu , Peter A. Ng A Scheme of Parallel Processing for MIMD Systems. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1983, v:9, n:4, pp:436-445 [Journal ] Sushil Jajodia , Peter A. Ng Representative Instances and gamma-Acyclic Relational Schemes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1984, v:10, n:6, pp:614-618 [Journal ] Satish K. Tripathi , Yennun Huang , Sushil Jajodia Local Area Networks: Software and Related Issues. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 1987, v:13, n:8, pp:872-879 [Journal ] Shiping Chen , Dongyu Liu , Songqing Chen , Sushil Jajodia V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. [Citation Graph (0, 0)][DBLP ] ACSAC, 2006, pp:43-56 [Conf ] Lingyu Wang , Anoop Singhal , Sushil Jajodia Measuring the Overall Security of Network Configurations Using Attack Graphs. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:98-112 [Conf ] Valentina Ciriani , Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP ] ESORICS, 2007, pp:171-186 [Conf ] Alexander Brodsky , Lei Zhang , Sushil Jajodia Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2007, pp:81-95 [Conf ] Sabrina De Capitani di Vimercati , Sara Foresti , Sushil Jajodia , Stefano Paraboschi , Pierangela Samarati Over-encryption: Management of Access Control Evolution on Outsourced Data. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:123-134 [Conf ] Sencun Zhu , Chao Yao , Donggang Liu , Sanjeev Setia , Sushil Jajodia Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal ] Claudio Bettini , Xiaoyang Sean Wang , Sushil Jajodia The Role of Quasi-identifiers in k-Anonymity Revisited [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Peng Liu , Jie Li , Sushil Jajodia , Paul Ammann Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal ] Sencun Zhu , Sanjeev Setia , Sushil Jajodia , Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP ] TOSN, 2007, v:3, n:3, pp:- [Journal ] Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP ] Information disclosure under realistic assumptions: privacy versus optimality. [Citation Graph (, )][DBLP ] A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP ] A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP ] Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP ] Toward measuring network security using attack graphs. [Citation Graph (, )][DBLP ] Measuring network security using dynamic bayesian network. [Citation Graph (, )][DBLP ] Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP ] Restoring compromised privacy in micro-data disclosure. [Citation Graph (, )][DBLP ] Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. [Citation Graph (, )][DBLP ] An Attack Graph-Based Probabilistic Security Metric. [Citation Graph (, )][DBLP ] Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP ] Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP ] Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP ] On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. [Citation Graph (, )][DBLP ] A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP ] Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP ] Anonymity and Historical-Anonymity in Location-Based Services. [Citation Graph (, )][DBLP ] Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP ] k -Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP ] Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP ] Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. [Citation Graph (, )][DBLP ] Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP ] Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure. [Citation Graph (, )][DBLP ] Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP ] Anonymity in Location-Based Services: Towards a General Framework. [Citation Graph (, )][DBLP ] ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. [Citation Graph (, )][DBLP ] Privacy-Aware Proximity Based Services. [Citation Graph (, )][DBLP ] Anonymity and Diversity in LBS: A Preliminary Investigation. [Citation Graph (, )][DBLP ] A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. [Citation Graph (, )][DBLP ] Topological analysis of network attack vulnerability. [Citation Graph (, )][DBLP ] Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP ] Simulatable Binding: Beyond Simulatable Auditing. [Citation Graph (, )][DBLP ] How Anonymous Is k-Anonymous? Look at Your Quasi-ID. [Citation Graph (, )][DBLP ] L-Cover: Preserving Diversity by Anonymity. [Citation Graph (, )][DBLP ] An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP ] Preserving Anonymity of Recurrent Location-Based Queries. [Citation Graph (, )][DBLP ] Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP ] Key management for multi-user encrypted databases. [Citation Graph (, )][DBLP ] A framework for establishing, assessing, and managing trust in inter-organizational relationships. [Citation Graph (, )][DBLP ] Secure median computation in wireless sensor networks. [Citation Graph (, )][DBLP ] Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies [Citation Graph (, )][DBLP ] Search in 0.020secs, Finished in 0.037secs