The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sushil Jajodia: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Christian S. Jensen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Patrick J. Hayes, Sushil Jajodia
    A Consensus Glossary of Temporal Database Concepts. [Citation Graph (27, 0)][DBLP]
    SIGMOD Record, 1994, v:23, n:1, pp:52-64 [Journal]
  2. Sushil Jajodia, David Mutchler
    Dynamic Voting. [Citation Graph (25, 24)][DBLP]
    SIGMOD Conference, 1987, pp:227-238 [Conf]
  3. Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel
    The Problem of Equivalence for Entity-Relationship Diagrams. [Citation Graph (20, 0)][DBLP]
    IEEE Trans. Software Eng., 1983, v:9, n:5, pp:617-630 [Journal]
  4. Sushil Jajodia, David Mutchler
    Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database. [Citation Graph (17, 43)][DBLP]
    ACM Trans. Database Syst., 1990, v:15, n:2, pp:230-280 [Journal]
  5. Gio Wiederhold, Sushil Jajodia, Witold Litwin
    Dealing with Granularity of Time in Temporal Databases. [Citation Graph (11, 0)][DBLP]
    CAiSE, 1991, pp:124-140 [Conf]
  6. Ouri Wolfson, Sushil Jajodia
    Distributed Algorithms for Dynamic Replication of Data. [Citation Graph (11, 15)][DBLP]
    PODS, 1992, pp:149-163 [Conf]
  7. Sushil Jajodia, David Mutchler
    Enhancements to the Voting Algorithm. [Citation Graph (10, 11)][DBLP]
    VLDB, 1987, pp:399-406 [Conf]
  8. Sushil Jajodia, Ravi S. Sandhu
    Towards a Multilevel Secure Relational Data Model. [Citation Graph (8, 8)][DBLP]
    SIGMOD Conference, 1991, pp:50-59 [Conf]
  9. Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian
    Temporal Modules: An Approach Toward Federated Temporal Databases. [Citation Graph (8, 11)][DBLP]
    SIGMOD Conference, 1993, pp:227-236 [Conf]
  10. Catherine Meadows, Sushil Jajodia
    Integrity Versus Security in Multi-Level Secure Databases. [Citation Graph (7, 0)][DBLP]
    DBSec, 1987, pp:89-101 [Conf]
  11. Sushil Jajodia
    Managing Replicated Files in Partitioned Distributed Database Systems. [Citation Graph (7, 16)][DBLP]
    ICDE, 1987, pp:412-418 [Conf]
  12. Christian S. Jensen, Curtis E. Dyreson, Michael H. Böhlen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Fabio Grandi, Patrick J. Hayes, Sushil Jajodia, Wolfgang Käfer, Nick Kline, Nikos A. Lorentzos, Yannis G. Mitsopoulos, Angelo Montanari, Daniel A. Nonen, Elisa Peressi, Barbara Pernici, John F. Roddick, Nandlal L. Sarda, Maria Rita Scalas, Arie Segev, Richard T. Snodgrass, Michael D. Soo, Abdullah Uz Tansel, Paolo Tiberio, Gio Wiederhold
    The Consensus Glossary of Temporal Database Concepts - February 1998 Version. [Citation Graph (6, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:367-405 [Conf]
  13. Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia
    Logical Design for Temporal Databases with Multiple Granularities. [Citation Graph (6, 8)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:115-170 [Journal]
  14. Sushil Jajodia, David Mutchler
    Integrating Static and Dynamic Voting Protocols To Enhance File Availability. [Citation Graph (5, 19)][DBLP]
    ICDE, 1988, pp:144-153 [Conf]
  15. Sushil Jajodia, Peter A. Ng
    On the Representation of Relational Structures by Entity-Relationship Diagrams. [Citation Graph (4, 13)][DBLP]
    ER, 1983, pp:249-263 [Conf]
  16. Sushil Jajodia, Catherine Meadows
    Mutual Consistency in Decentralized Distributed Systems. [Citation Graph (4, 10)][DBLP]
    ICDE, 1987, pp:396-404 [Conf]
  17. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    A General Framework for Time Granularity and Its Application to Temporal Reasoning. [Citation Graph (4, 0)][DBLP]
    Ann. Math. Artif. Intell., 1998, v:22, n:1-2, pp:29-58 [Journal]
  18. Paul Ammann, Sushil Jajodia
    A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. [Citation Graph (3, 0)][DBLP]
    DBSec, 1991, pp:191-202 [Conf]
  19. Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia
    Semantic Assumptions and Query Evaluation in Temporal Databases. [Citation Graph (3, 13)][DBLP]
    SIGMOD Conference, 1995, pp:257-268 [Conf]
  20. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino
    A Unified Framework for Enforcing Multiple Access Control Policies. [Citation Graph (3, 12)][DBLP]
    SIGMOD Conference, 1997, pp:474-485 [Conf]
  21. Sushil Jajodia, Ravi S. Sandhu
    Database Security: Current Status and Key Issues. [Citation Graph (3, 0)][DBLP]
    SIGMOD Record, 1990, v:19, n:4, pp:123-126 [Journal]
  22. Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    An Authorization Model for a Distributed Hypertext System. [Citation Graph (3, 13)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:4, pp:555-562 [Journal]
  23. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Applying Formal Methods to Semantic-Based Decomposition of Transactions. [Citation Graph (3, 22)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:215-254 [Journal]
  24. Ouri Wolfson, Sushil Jajodia, Yixiu Huang
    An Adaptive Data Replication Algorithm. [Citation Graph (3, 28)][DBLP]
    ACM Trans. Database Syst., 1997, v:22, n:2, pp:255-314 [Journal]
  25. Sushil Jajodia, David Mutchler
    A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability. [Citation Graph (3, 0)][DBLP]
    IEEE Trans. Software Eng., 1989, v:15, n:1, pp:39-46 [Journal]
  26. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    Authorizations in Relational Database Management Systems. [Citation Graph (2, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:130-139 [Conf]
  27. Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang
    Temporal Database Bibliography Update. [Citation Graph (2, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:338-366 [Conf]
  28. Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel
    On Universal and Representative Instances for Inconsistent Databases. [Citation Graph (2, 12)][DBLP]
    ER, 1983, pp:279-295 [Conf]
  29. Sushil Jajodia, Boris Kogan
    Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. [Citation Graph (2, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:360-368 [Conf]
  30. Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini
    An Advanced Commit Protocol for MLS Distributed Database Systems. [Citation Graph (1, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:119-128 [Conf]
  31. Paul Ammann, Sushil Jajodia
    Planar Lattice Security Structures for Multilevel Replicated Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:125-134 [Conf]
  32. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:259-274 [Conf]
  33. Oliver Costich, Sushil Jajodia
    Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:249-266 [Conf]
  34. Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Secure Locking Protocols for Multilevel Database Management Systems. [Citation Graph (1, 0)][DBLP]
    DBSec, 1996, pp:177-194 [Conf]
  35. Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
    Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1993, pp:109-121 [Conf]
  36. John P. McDermott, Sushil Jajodia
    Orange Locking: Channel-Free Database Concurrency Control Via Locking. [Citation Graph (1, 0)][DBLP]
    DBSec, 1992, pp:267-284 [Conf]
  37. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. [Citation Graph (1, 0)][DBLP]
    DBSec, 1991, pp:297-314 [Conf]
  38. Elisa Bertino, Sushil Jajodia
    Modeling Multilevel Entities Using Single Level Objects. [Citation Graph (1, 0)][DBLP]
    DOOD, 1993, pp:415-428 [Conf]
  39. Sushil Jajodia
    Universal and Representative Instances Using Unmarked Nulls. [Citation Graph (1, 0)][DBLP]
    FSTTCS, 1984, pp:367-378 [Conf]
  40. K. Selçuk Candan, Sushil Jajodia, V. S. Subrahmanian
    Secure Mediated Databases. [Citation Graph (1, 8)][DBLP]
    ICDE, 1996, pp:28-37 [Conf]
  41. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. [Citation Graph (1, 7)][DBLP]
    PODS, 1996, pp:68-78 [Conf]
  42. Sushil Jajodia, Boris Kogan
    Integrating an Object-Oriented Data Model with Multilevel Security. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:76-85 [Conf]
  43. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations. [Citation Graph (1, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1990, pp:104-115 [Conf]
  44. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. [Citation Graph (1, 17)][DBLP]
    VLDB, 1995, pp:218-227 [Conf]
  45. Ouri Wolfson, Sushil Jajodia
    An Algorithm for Dynamic Data Distribution. [Citation Graph (1, 0)][DBLP]
    Workshop on the Management of Replicated Data, 1992, pp:62-65 [Conf]
  46. Sushil Jajodia, Frederick N. Springsteel
    Lossless Outer Joins with Incomplete Information. [Citation Graph (1, 0)][DBLP]
    BIT, 1990, v:30, n:1, pp:34-41 [Journal]
  47. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Mining Temporal Relationships with Multiple Granularities in Time Sequences. [Citation Graph (1, 7)][DBLP]
    IEEE Data Eng. Bull., 1998, v:21, n:1, pp:32-38 [Journal]
  48. Sushil Jajodia
    On Equivalence of Relational and Network Database Models. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Lett., 1985, v:20, n:1, pp:51-54 [Journal]
  49. Ouri Wolfson, Sushil Jajodia
    An Algorithm for Dynamic Data Allocation in Distributed Systems. [Citation Graph (1, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:2, pp:113-119 [Journal]
  50. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Database Security: Research and Practice [Citation Graph (1, 0)][DBLP]
    Inf. Syst., 1995, v:20, n:7, pp:537-556 [Journal]
  51. Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian
    Temporal Modules: An Approach Toward Federated Temporal Databases. [Citation Graph (1, 0)][DBLP]
    Inf. Sci., 1995, v:82, n:1-2, pp:103-128 [Journal]
  52. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Access Control in Object-Oriented Database Systems - Some Approaches and Issues. [Citation Graph (1, 0)][DBLP]
    , 1993, v:, n:, pp:17-44 [Journal]
  53. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal]
  54. Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray
    Advanced Transaction Processing in Multilevel Secure File Stores. [Citation Graph (1, 6)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:1, pp:120-135 [Journal]
  55. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    An Extended Authorization Model for Relational Databases. [Citation Graph (1, 16)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:1, pp:85-101 [Journal]
  56. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Temporal Semantic Assumptions and Their Use in Databases. [Citation Graph (1, 21)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:277-296 [Journal]
  57. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin
    Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. [Citation Graph (1, 14)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1998, v:10, n:2, pp:222-237 [Journal]
  58. Paul Ammann, Sushil Jajodia
    Distributed Timestamp Generation in Planar Lattice Networks. [Citation Graph (1, 0)][DBLP]
    ACM Trans. Comput. Syst., 1993, v:11, n:3, pp:205-225 [Journal]
  59. Ravi Mukkamala, Sushil Jajodia
    A Note on Estimating the Cardinality of the Projection of a Database Relation. [Citation Graph (1, 1)][DBLP]
    ACM Trans. Database Syst., 1991, v:16, n:3, pp:564-566 [Journal]
  60. Sushil Jajodia, Frederick N. Springsteel
    Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. [Citation Graph (1, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:7, pp:811-819 [Journal]
  61. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:40-55 [Conf]
  62. Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean
    Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:298-307 [Conf]
  63. Amgad Fayad, Sushil Jajodia, Catherine D. McCollum
    Application-Level Isolation Using Data Inconsistency Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1999, pp:119-0 [Conf]
  64. Sushil Jajodia, Peng Liu, Catherine D. McCollum
    Application-Level Isolation to Cope with Malicious Database Users. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:73-82 [Conf]
  65. Steven Noel, Sushil Jajodia
    Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:160-169 [Conf]
  66. Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs
    Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:86-95 [Conf]
  67. Steven Noel, Eric Robertson, Sushil Jajodia
    Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:350-359 [Conf]
  68. Sushil Jajodia, Indrakshi Ray, Paul Ammann
    Implementing Semantic-Based Decomposition of Transactions. [Citation Graph (0, 0)][DBLP]
    CAiSE, 1997, pp:75-88 [Conf]
  69. Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia
    Auditing Interval-Based Inference. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2002, pp:553-567 [Conf]
  70. Elisa Bertino, Pierangela Samarati, Sushil Jajodia
    High Assurance Discretionary Access Control for Object Bases. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1993, pp:140-150 [Conf]
  71. Paul Ammann, Sushil Jajodia
    An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:118-125 [Conf]
  72. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Non-Timestamped Authorization Model for Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1996, pp:169-178 [Conf]
  73. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Balancing confidentiality and efficiency in untrusted relational DBMSs. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:93-102 [Conf]
  74. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Tracking anonymous peer-to-peer VoIP calls on the internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:81-91 [Conf]
  75. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    A logic-based framework for attribute based access control. [Citation Graph (0, 0)][DBLP]
    FMSE, 2004, pp:45-55 [Conf]
  76. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control: the propositional case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:38-47 [Conf]
  77. Duminda Wijesekera, Sushil Jajodia
    Policy algebras for access control the predicate case. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2002, pp:171-180 [Conf]
  78. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Propagation of Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:136-147 [Conf]
  79. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP: efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:62-72 [Conf]
  80. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Trust management services in relational databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:149-160 [Conf]
  81. Bo Zhu, Sanjeev Setia, Sushil Jajodia
    Providing witness anonymity in peer-to-peer systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:6-16 [Conf]
  82. Sushil Jajodia
    Topological analysis of network attack vulnerability. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:2- [Conf]
  83. Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeff Hoyt
    Securely sharing neuroimagery. [Citation Graph (0, 0)][DBLP]
    CIKM, 2003, pp:375-377 [Conf]
  84. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. [Citation Graph (0, 0)][DBLP]
    CP, 1997, pp:435-449 [Conf]
  85. Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera
    Revocations-A Classification. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:44-58 [Conf]
  86. Sushil Jajodia
    Panel Discussion on the Polyinstantiation Problem: A Position Paper. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:235- [Conf]
  87. Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia
    A Fair Locking Protocol for Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:168-178 [Conf]
  88. Sushil Jajodia, Ravi S. Sandhu
    A Formal Framework for Single Level Decomposition of Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:152-158 [Conf]
  89. Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia
    Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1998, pp:190-201 [Conf]
  90. Peng Liu, Sushil Jajodia
    Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. [Citation Graph (0, 0)][DBLP]
    CSFW, 2001, pp:191-205 [Conf]
  91. Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt
    A New Polyinstantiation Integrity Constraint for Multilevel Relations. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:159-165 [Conf]
  92. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia
    A Secure Kernelized Architecture for Multiple Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:139-152 [Conf]
  93. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    An Architecture for Supporting Interoperability among Temporal Databases. [Citation Graph (0, 0)][DBLP]
    Temporal Databases, Dagstuhl, 1997, pp:36-55 [Conf]
  94. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:135-158 [Conf]
  95. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:231-247 [Conf]
  96. Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
    Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:79-98 [Conf]
  97. Susan Chapin, Donald B. Faatz, Sushil Jajodia
    Distributed Policies for Data Management Making Policies Mobile. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:63-76 [Conf]
  98. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    FlexFlow: A Flexible Flow Control Policy Specification Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:358-371 [Conf]
  99. Daniel Barbará, Rajni Goel, Sushil Jajodia
    Protecting File systems Against Corruption Using Checksums. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:113-124 [Conf]
  100. Daniel Barbará, Rajni Goel, Sushil Jajodia
    Mining Malicious Corruption of Data with Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:175-189 [Conf]
  101. Sushil Jajodia, Ravi Mukkamala, Indrajit Ray
    A Two-tier Coarse Indexing Scheme for MLS Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:199-218 [Conf]
  102. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:81-94 [Conf]
  103. Peng Liu, Sushil Jajodia, Catherine D. McCollum
    Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:3-18 [Conf]
  104. Sushil Jajodia, Ravi S. Sandhu
    Polyinstantiation Integrity in Multilevel Relations Revisited. [Citation Graph (0, 0)][DBLP]
    DBSec, 1990, pp:297-308 [Conf]
  105. Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley
    Audit Trail Organization in Relational Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1989, pp:269-281 [Conf]
  106. Sushil Jajodia, Ravi Mukkamala
    Effects of SeaView Decomposition of Multilevel Relations on Database Performance. [Citation Graph (0, 0)][DBLP]
    DBSec, 1991, pp:203-225 [Conf]
  107. Sushil Jajodia, Duminda Wijesekera
    Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:3-15 [Conf]
  108. Ravi Mukkamala, Jason Gagnon, Sushil Jajodia
    Integrating Data Mining Techniques with Intrusion Detection Methods. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:33-46 [Conf]
  109. Ravi Mukkamala, Sushil Jajodia
    A Novel Approach to Certificate Revocation Management. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:225-238 [Conf]
  110. Ravi Mukkamala, Sushil Jajodia
    A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:199-214 [Conf]
  111. Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier
    Security and Privacy Issues for the World Wide Web: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:269-284 [Conf]
  112. Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton
    Security Issues in Data Warehousing and Data Mining: Panel Discussion. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:3-16 [Conf]
  113. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Towards Secure XML Federations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:117-131 [Conf]
  114. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
    Interactive Analysis of Attack Graphs Using Relational Queries. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:119-132 [Conf]
  115. Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia
    Subject Switching Algorithms for Access Control in Federated Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:61-74 [Conf]
  116. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
    Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:1-14 [Conf]
  117. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia
    Policies, Models, and Languages for Access Control. [Citation Graph (0, 0)][DBLP]
    DNIS, 2005, pp:225-237 [Conf]
  118. Yingjiu Li, Huiping Guo, Sushil Jajodia
    Tamper detection and localization for categorical data using fragile watermarks. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2004, pp:73-82 [Conf]
  119. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Constructing a virtual primary key for fingerprinting relational data. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:133-141 [Conf]
  120. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. [Citation Graph (0, 0)][DBLP]
    DSN, 2000, pp:631-640 [Conf]
  121. Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia
    VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:393-402 [Conf]
  122. Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
    Authentication and Integrity in Telecommunication Signaling Network. [Citation Graph (0, 0)][DBLP]
    ECBS, 2005, pp:163-170 [Conf]
  123. Daniel Barbará, Rajni Goel, Sushil Jajodia
    Using Checksums to Detect Data Corruption. [Citation Graph (0, 8)][DBLP]
    EDBT, 2000, pp:136-149 [Conf]
  124. Paul K. Blackwell, Sushil Jajodia, Peter A. Ng
    A View of Database Management Systems as Abstract Data Types. [Citation Graph (0, 8)][DBLP]
    ER, 1983, pp:661-668 [Conf]
  125. Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    Incorporating Dynamic Constraints in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:1-16 [Conf]
  126. Lingyu Wang, Anyi Liu, Sushil Jajodia
    An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:247-266 [Conf]
  127. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
    Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2003, pp:100-115 [Conf]
  128. Donald G. Marks, Amihai Motro, Sushil Jajodia
    Enhancing the Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:290-303 [Conf]
  129. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Cardinality-Based Inference Control in Sum-Only Data Cubes. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2002, pp:55-71 [Conf]
  130. Amihai Motro, Donald G. Marks, Sushil Jajodia
    Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1994, pp:431-445 [Conf]
  131. Ravi S. Sandhu, Sushil Jajodia
    Polyinstantation for Cover Stories. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1992, pp:307-328 [Conf]
  132. Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia
    A Privacy-Enhanced Microaggregation Method. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2002, pp:148-159 [Conf]
  133. Sushil Jajodia, Duminda Wijesekera
    A Flexible Authorization Framework for E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:336-345 [Conf]
  134. Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia
    Implementing Consistency Checking in Correlating Attacks. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:379-384 [Conf]
  135. Peng Liu, Paul Ammann, Sushil Jajodia
    Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1999, pp:414-423 [Conf]
  136. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Performance Optimizations for Group Key Management Scheme. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2003, pp:163-0 [Conf]
  137. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:749-0 [Conf]
  138. Sushil Jajodia
    Protecting Critical Information Systems (Abstract). [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:143- [Conf]
  139. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. [Citation Graph (0, 0)][DBLP]
    ICNP, 2003, pp:326-335 [Conf]
  140. Neil F. Johnson, Zoran Duric, Sushil Jajodia
    Recovery of Watermarks from Distorted Images. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:318-332 [Conf]
  141. Neil F. Johnson, Sushil Jajodia
    Steganalysis of Images Created Using Current Steganography Software. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1998, pp:273-289 [Conf]
  142. Hemant Sengar, Duminda Wijesekera, Sushil Jajodia
    MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2005, pp:- [Conf]
  143. Sencun Zhu, Sushil Jajodia
    Scalable Group Rekeying for Secure Multicast: A Survey. [Citation Graph (0, 0)][DBLP]
    IWDC, 2003, pp:1-10 [Conf]
  144. Neil F. Johnson, Zoran Duric, Sushil Jajodia
    On Fingerprinting Images for Recognition. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Systems, 1999, pp:4-11 [Conf]
  145. Vipin Swarup, Sushil Jajodia, Joseph Pamula
    Rule-Based Topological Vulnerability Analysis. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:23-37 [Conf]
  146. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2004, pp:42-51 [Conf]
  147. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia
    Practical Broadcast Authentication in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    MobiQuitous, 2005, pp:118-132 [Conf]
  148. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    Networked Group Communication, 2003, pp:107-118 [Conf]
  149. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Enforcing Mandatory Access Control in Object Bases. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:96-116 [Conf]
  150. Yingjiu Li, Lingyu Wang, Sushil Jajodia
    Preventing Interval-Based Inference by Random Data Perturbation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:160-170 [Conf]
  151. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Obligation Monitoring in Policy Management. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:2-12 [Conf]
  152. Lei Zhang, Alexander Brodsky, Sushil Jajodia
    Toward Information Sharing: Benefit And Risk Access Control (BARAC). [Citation Graph (0, 0)][DBLP]
    POLICY, 2006, pp:45-53 [Conf]
  153. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Efficient and secure keys management for wireless mobile communications. [Citation Graph (0, 0)][DBLP]
    POMC, 2002, pp:66-73 [Conf]
  154. Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto
    Bootstrapping a Data Mining Intrusion Detection System. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:421-425 [Conf]
  155. Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia
    A robust watermarking system based on SVD compression. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1341-1347 [Conf]
  156. David Keppler, Vipin Swarup, Sushil Jajodia
    Redirection policies for mission-based information sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:210-218 [Conf]
  157. Sankardas Roy, Sanjeev Setia, Sushil Jajodia
    Attack-resilient hierarchical data aggregation in sensor networks. [Citation Graph (0, 0)][DBLP]
    SASN, 2006, pp:71-82 [Conf]
  158. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Identifying Sensitive Associations in Databases for Release Control. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:187-201 [Conf]
  159. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Protecting Privacy Against Location-Based Personal Identification. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:185-199 [Conf]
  160. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Metadata Management in Outsourced Encrypted Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:16-32 [Conf]
  161. Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia
    Indistinguishability: The Other Aspect of Privacy. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:1-17 [Conf]
  162. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. [Citation Graph (0, 0)][DBLP]
    SEBD, 2001, pp:339-346 [Conf]
  163. Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi
    Going Beyond MAC and DAC Using Mobile Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:245-260 [Conf]
  164. Vinti Doshi, Sushil Jajodia
    Referential Integrity in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 1992, pp:359-371 [Conf]
  165. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Secure Selective Exclusion in Ad Hoc Wireless Network. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:423-434 [Conf]
  166. Kenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia
    Propagating Modifications to Mobile Policies. [Citation Graph (0, 0)][DBLP]
    SEC, 2002, pp:573-584 [Conf]
  167. Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle
    A User Friendly Guard with Mobile Post-Release Access Control Policy. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:265-276 [Conf]
  168. Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    CARDS: A Distributed System for Detecting Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:171-180 [Conf]
  169. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP - efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    SenSys, 2003, pp:308-309 [Conf]
  170. Boris Kogan, Sushil Jajodia
    Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. [Citation Graph (0, 13)][DBLP]
    SIGMOD Conference, 1990, pp:153-162 [Conf]
  171. Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia
    Implementation of a Storage Mechanism for Untrusted DBMSs. [Citation Graph (0, 0)][DBLP]
    IEEE Security in Storage Workshop, 2003, pp:38-46 [Conf]
  172. Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein
    Surviving information warfare attacks on databases. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:164-174 [Conf]
  173. Paul Ammann, Sushil Jajodia, Indrakshi Ray
    Ensuring Atomicity of Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:74-84 [Conf]
  174. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    Supporting Multiple Access Control Policies in Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1996, pp:94-107 [Conf]
  175. Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia
    Providing flexibility in information flow control for object oriented systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:130-140 [Conf]
  176. Sushil Jajodia, Ravi S. Sandhu
    A Novel Decomposition of Multilevel Relations into Single-Level Relations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:300-315 [Conf]
  177. Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian
    A Logical Language for Expressing Authorizations. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1997, pp:31-42 [Conf]
  178. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera
    Securing OLAP Data Cubes Against Privacy Breaches. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:161-0 [Conf]
  179. Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder
    Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2000, pp:215-228 [Conf]
  180. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2004, pp:259-271 [Conf]
  181. Xinyuan Wang, Shiping Chen, Sushil Jajodia
    Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:116-130 [Conf]
  182. Paul Ammann, Sushil Jajodia
    The Integrity Challenge. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:59-70 [Conf]
  183. Giovanni Rumolo, Sushil Jajodia
    Algebra for Databases with Explicit Markings of Damaged Data. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:103-129 [Conf]
  184. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Free Schedules for Free Agents in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    TIME, 2000, pp:31-38 [Conf]
  185. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    A General Framework and Reasoning Model for Time Granularity. [Citation Graph (0, 0)][DBLP]
    TIME, 1996, pp:104-111 [Conf]
  186. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering Calendar-based Temporal Association Rules. [Citation Graph (0, 0)][DBLP]
    TIME, 2001, pp:111-118 [Conf]
  187. Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    k-Anonymity in Databases with Timestamped Data. [Citation Graph (0, 0)][DBLP]
    TIME, 2006, pp:177-186 [Conf]
  188. Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering Temporal Patterns in Multiple Granularities. [Citation Graph (0, 0)][DBLP]
    TSDM, 2000, pp:5-19 [Conf]
  189. Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia
    Multiple Coordinated Views for Network Attack Graphs. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2005, pp:12- [Conf]
  190. Steven Noel, Sushil Jajodia
    Managing attack graph complexity through visual hierarchical aggregation. [Citation Graph (0, 0)][DBLP]
    VizSEC, 2004, pp:109-118 [Conf]
  191. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Management and Security Applications. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:502-513 [Conf]
  192. Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia
    Checking for k-Anonymity Violation by Views. [Citation Graph (0, 0)][DBLP]
    VLDB, 2005, pp:910-921 [Conf]
  193. Sushil Jajodia
    Recent Advances in Access Control Models. [Citation Graph (0, 0)][DBLP]
    WAIM, 2003, pp:1- [Conf]
  194. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
    Maintaining privacy on derived objects. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:10-19 [Conf]
  195. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia
    Providing secrecy in key management protocols for large wireless sensors networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2003, v:1, n:4, pp:455-468 [Journal]
  196. Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia
    LHAP: A lightweight network access control protocol for ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Ad Hoc Networks, 2006, v:4, n:5, pp:567-585 [Journal]
  197. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Solving multi-granularity temporal constraint networks. [Citation Graph (0, 0)][DBLP]
    Artif. Intell., 2002, v:140, n:1/2, pp:107-152 [Journal]
  198. Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    An Algebraic Representation of Calendars. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 2002, v:36, n:1-2, pp:5-38 [Journal]
  199. H. A. Burgdorff, Sushil Jajodia, Frederick N. Springsteel, Yechezkel Zalcstein
    Alternative Methods for the Reconstruction of Trees from Their Traversals. [Citation Graph (0, 0)][DBLP]
    BIT, 1987, v:27, n:2, pp:134-140 [Journal]
  200. Sushil Jajodia, Catherine D. McCollum, Paul Ammann
    Trusted Recovery. [Citation Graph (0, 2)][DBLP]
    Commun. ACM, 1999, v:42, n:7, pp:71-75 [Journal]
  201. Sushil Jajodia
    Recognizing Multivalued Dependencies in Relation Schemas. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1986, v:29, n:5, pp:458-459 [Journal]
  202. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
    Design and implementation of a decentralized prototype system for detecting distributed attacks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2002, v:25, n:15, pp:1374-1391 [Journal]
  203. Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Modeling requests among cooperating intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2000, v:23, n:17, pp:1702-1715 [Journal]
  204. Lingyu Wang, Anyi Liu, Sushil Jajodia
    Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:15, pp:2917-2933 [Journal]
  205. Lingyu Wang, Steven Noel, Sushil Jajodia
    Minimum-cost network hardening using attack graphs. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2006, v:29, n:18, pp:3812-3824 [Journal]
  206. Ravi S. Sandhu, Sushil Jajodia
    Integrity principles and mechanisms in database management systems. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:5, pp:413-427 [Journal]
  207. Ravi S. Sandhu, Sushil Jajodia
    Eliminating polyinstantiation securely. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1992, v:11, n:6, pp:547-562 [Journal]
  208. Sushil Jajodia, Paul Ammann, Catherine D. McCollum
    Surviving Information Warfare Attacks. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:4, pp:57-63 [Journal]
  209. Neil F. Johnson, Sushil Jajodia
    Exploring Steganography: Seeing the Unseen. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1998, v:31, n:2, pp:26-34 [Journal]
  210. Sushil Jajodia
    Database Security and Privacy. [Citation Graph (0, 2)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:1, pp:129-131 [Journal]
  211. Sushil Jajodia
    Managing Security and Privacy of Information. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 1996, v:28, n:4es, pp:0- [Journal]
  212. Sushil Jajodia
    Chairman's Message. [Citation Graph (0, 0)][DBLP]
    IEEE Database Eng. Bull., 1986, v:9, n:3, pp:1- [Journal]
  213. Sushil Jajodia
    Letter from the TC Chairman. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 1987, v:10, n:3, pp:1- [Journal]
  214. Sushil Jajodia
    Letter from the TC Chair. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 1988, v:11, n:2, pp:1- [Journal]
  215. Sushil Jajodia, Won Kim
    From the Issue Editors. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 1989, v:12, n:1, pp:1- [Journal]
  216. Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad
    Consistent policy enforcement in distributed systems using mobile policies. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:261-280 [Journal]
  217. Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia
    Discovering calendar-based temporal association rules. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:44, n:2, pp:193-218 [Journal]
  218. Pierangela Samarati, Paul Ammann, Sushil Jajodia
    Maintaining Replicated Authorizations in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:18, n:1, pp:55-84 [Journal]
  219. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Temporal Reasoning in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2002, v:11, n:3, pp:269-306 [Journal]
  220. Peng Liu, Paul Ammann, Sushil Jajodia
    Rewriting Histories: Recovering from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:7-40 [Journal]
  221. Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino
    Flexible Transaction Dependencies in Database Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:4, pp:399-446 [Journal]
  222. Anoop Singhal, Sushil Jajodia
    Data warehousing and data mining techniques for intrusion detection systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2006, v:20, n:2, pp:149-166 [Journal]
  223. Peng Liu, Peng Ning, Sushil Jajodia
    Avoiding loss of fairness owing to failures in fair data exchange systems. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2001, v:31, n:3, pp:337-350 [Journal]
  224. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Selective Data Encryption in Outsourced Dynamic Environments. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:168, n:, pp:127-142 [Journal]
  225. Sushil Jajodia
    Distributed Databases: Turing Award Winner Jim Gray on the new millennium. [Citation Graph (0, 0)][DBLP]
    IEEE Concurrency, 1999, v:7, n:3, pp:9-10 [Journal]
  226. Xiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni
    Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 1998, v:7, n:2, pp:319-339 [Journal]
  227. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal]
  228. Sushil Jajodia, David Mutchler
    A short technical paper: Determining whether a vote assignment is dominated. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1991, v:56, n:1-3, pp:279-282 [Journal]
  229. Sushil Jajodia, Ravi Mukkamala
    Measuring the effect of commutative transactions on distributed database performance. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 1993, v:68, n:1-2, pp:91-111 [Journal]
  230. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:129, n:1-4, pp:155-195 [Journal]
  231. Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia
    A fragile watermarking scheme for detecting malicious modifications of database relations. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:10, pp:1350-1378 [Journal]
  232. Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia
    Looking into the seeds of time: Discovering temporal patterns in large transaction sets. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:8, pp:1003-1031 [Journal]
  233. Csilla Farkas, Alexander Brodsky, Sushil Jajodia
    Unauthorized inferences in semistructured databases. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:22, pp:3269-3299 [Journal]
  234. Huiping Guo, Yingjiu Li, Sushil Jajodia
    Chaining watermarks for detecting malicious modifications to streaming data. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2007, v:177, n:1, pp:281-298 [Journal]
  235. Paul Ammann, Frank Jaeckle, Sushil Jajodia
    Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1995, v:3, n:2/3, pp:87-114 [Journal]
  236. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal]
  237. Daniel Barbará, Rajni Goel, Sushil Jajodia
    A Checksum-based Corruption Detection Technique. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:315-330 [Journal]
  238. Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
    Multilevel Security Transaction Processing. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:3, pp:165-195 [Journal]
  239. Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia
    Enhancing Profiles for Anomaly Detection Using Time Granularities. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2002, v:10, n:1/2, pp:137-158 [Journal]
  240. Peng Liu, Sushil Jajodia, Catherine D. McCollum
    Intrusion Confinement by Isolation in Information Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:4, pp:- [Journal]
  241. Indrakshi Ray, Paul Ammann, Sushil Jajodia
    A Semantic-Based Transaction Processing Model for Multilevel Transactions. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1998, v:6, n:3, pp:181-217 [Journal]
  242. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
    Cardinality-based inference control in data cubes. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:5, pp:655-692 [Journal]
  243. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
    GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2006, v:14, n:4, pp:301-325 [Journal]
  244. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Provisions and Obligations in Policy Rule Management. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2003, v:11, n:3, pp:- [Journal]
  245. Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera
    Reasoning with advanced policy rules and its application to access control. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:156-170 [Journal]
  246. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    Information Release Control: A Learning-Based Architecture. [Citation Graph (0, 0)][DBLP]
    J. Data Semantics, 2005, v:2, n:, pp:176-198 [Journal]
  247. Sushil Jajodia, Peter A. Ng
    Translation of entity-relationship diagrams into relational structures. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1984, v:4, n:2-3, pp:123-133 [Journal]
  248. Sushil Jajodia, Peter Ann-Beng Ng, Raymond T. Yeh
    Introduction to the special issue on the use of entity-relationship concepts in databases and related software. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1984, v:4, n:2-3, pp:95-98 [Journal]
  249. Sushil Jajodia, Ravi Mukkamala, K. V. S. Ramarao
    A View-Based Dynamic Replication Control Algorithm. [Citation Graph (0, 0)][DBLP]
    Nord. J. Comput., 1994, v:1, n:2, pp:214-230 [Journal]
  250. Sanjeev Setia, Sencun Zhu, Sushil Jajodia
    A comparative performance analysis of reliable group rekey transport protocols for secure multicast. [Citation Graph (0, 0)][DBLP]
    Perform. Eval., 2002, v:49, n:1/4, pp:21-41 [Journal]
  251. Csilla Farkas, Sushil Jajodia
    The Inference Problem: A Survey. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:6-11 [Journal]
  252. Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu
    ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:15-24 [Journal]
  253. Sushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang
    Information Systems Research at George Mason University. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1997, v:26, n:4, pp:69-74 [Journal]
  254. Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia
    Scalable Threshold Closure. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:185-206 [Journal]
  255. Yingjiu Li, Vipin Swarup, Sushil Jajodia
    Fingerprinting Relational Databases: Schemes and Specialties. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:1, pp:34-45 [Journal]
  256. Pierangela Samarati, Michael K. Reiter, Sushil Jajodia
    An authorization model for a public key management service. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:453-482 [Journal]
  257. Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Modeling and assessing inference exposure in encrypted databases. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2005, v:8, n:1, pp:119-152 [Journal]
  258. Duminda Wijesekera, Sushil Jajodia
    A propositional policy algebra for access control. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:286-325 [Journal]
  259. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang
    Abstraction-based intrusion detection in distributed environments. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2001, v:4, n:4, pp:407-452 [Journal]
  260. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal]
  261. Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia
    The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal]
  262. Paul Ammann, Sushil Jajodia, Peng Liu
    Recovery from Malicious Transactions. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:5, pp:1167-1185 [Journal]
  263. Paul Ammann, Sushil Jajodia, Padmaja Mavuluri
    On-The-Fly Reading of Entire Databases. [Citation Graph (0, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:834-838 [Journal]
  264. Alexander Brodsky, Csilla Farkas, Sushil Jajodia
    Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:900-919 [Journal]
  265. Sushil Jajodia, David Mutchler
    A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting. [Citation Graph (0, 28)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1989, v:1, n:4, pp:459-469 [Journal]
  266. Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino
    ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2000, v:12, n:6, pp:880-899 [Journal]
  267. Kenneth Smith, Barbara T. Blaustein, Sushil Jajodia, LouAnna Notargiacomo
    Correctness Criteria for Multilevel Secure Transactions. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:32-45 [Journal]
  268. Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia
    Information Flow Control in Object-Oriented Systems. [Citation Graph (0, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:4, pp:524-538 [Journal]
  269. Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian
    Flexible support for multiple access control policies. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2001, v:26, n:2, pp:214-260 [Journal]
  270. Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström
    Removing permissions in the flexible authorization framework. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2003, v:28, n:3, pp:209-229 [Journal]
  271. Elisa Bertino, Sushil Jajodia, Pierangela Samarati
    A Flexible Authorization Mechanism for Relational Data Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst., 1999, v:17, n:2, pp:101-140 [Journal]
  272. Sencun Zhu, Sanjeev Setia, Sushil Jajodia
    LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2006, v:2, n:4, pp:500-528 [Journal]
  273. Paul Ammann, Sushil Jajodia, Phyllis G. Frankl
    Globally Consistent Event Ordering in One-Directional Distributed Environments. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 1996, v:7, n:6, pp:665-670 [Journal]
  274. Alessandro Mei, Luigi V. Mancini, Sushil Jajodia
    Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2003, v:14, n:9, pp:885-896 [Journal]
  275. Sushil Jajodia
    An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:9, pp:1047-1048 [Journal]
  276. Sushil Jajodia, Jian Liu, Peter A. Ng
    A Scheme of Parallel Processing for MIMD Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1983, v:9, n:4, pp:436-445 [Journal]
  277. Sushil Jajodia, Peter A. Ng
    Representative Instances and gamma-Acyclic Relational Schemes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1984, v:10, n:6, pp:614-618 [Journal]
  278. Satish K. Tripathi, Yennun Huang, Sushil Jajodia
    Local Area Networks: Software and Related Issues. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 1987, v:13, n:8, pp:872-879 [Journal]
  279. Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia
    V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:43-56 [Conf]
  280. Lingyu Wang, Anoop Singhal, Sushil Jajodia
    Measuring the Overall Security of Network Configurations Using Attack Graphs. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:98-112 [Conf]
  281. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Fragmentation and Encryption to Enforce Privacy in Data Storage. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:171-186 [Conf]
  282. Alexander Brodsky, Lei Zhang, Sushil Jajodia
    Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:81-95 [Conf]
  283. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
    Over-encryption: Management of Access Control Evolution on Outsourced Data. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:123-134 [Conf]
  284. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia
    Efficient security mechanisms for overlay multicast based content delivery. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2007, v:30, n:4, pp:793-806 [Journal]
  285. Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia
    The Role of Quasi-identifiers in k-Anonymity Revisited [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]
  286. Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann
    Can-Follow Concurrency Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2007, v:56, n:10, pp:1425-1430 [Journal]
  287. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning
    Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. [Citation Graph (0, 0)][DBLP]
    TOSN, 2007, v:3, n:3, pp:- [Journal]

  288. Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  289. Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. [Citation Graph (, )][DBLP]


  290. Information disclosure under realistic assumptions: privacy versus optimality. [Citation Graph (, )][DBLP]


  291. A data outsourcing architecture combining cryptography and access control. [Citation Graph (, )][DBLP]


  292. A weakest-adversary security metric for network configuration security analysis. [Citation Graph (, )][DBLP]


  293. Assessing query privileges via safe and efficient permission composition. [Citation Graph (, )][DBLP]


  294. Toward measuring network security using attack graphs. [Citation Graph (, )][DBLP]


  295. Measuring network security using dynamic bayesian network. [Citation Graph (, )][DBLP]


  296. Efficiently tracking application interactions using lightweight virtualization. [Citation Graph (, )][DBLP]


  297. Restoring compromised privacy in micro-data disclosure. [Citation Graph (, )][DBLP]


  298. Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. [Citation Graph (, )][DBLP]


  299. An Attack Graph-Based Probabilistic Security Metric. [Citation Graph (, )][DBLP]


  300. Regulating Exceptions in Healthcare Using Policy Spaces. [Citation Graph (, )][DBLP]


  301. Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. [Citation Graph (, )][DBLP]


  302. Providing Mobile Users' Anonymity in Hybrid Networks. [Citation Graph (, )][DBLP]


  303. On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. [Citation Graph (, )][DBLP]


  304. A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. [Citation Graph (, )][DBLP]


  305. Keep a Few: Outsourcing Data While Maintaining Confidentiality. [Citation Graph (, )][DBLP]


  306. Anonymity and Historical-Anonymity in Location-Based Services. [Citation Graph (, )][DBLP]


  307. Privacy Preservation over Untrusted Mobile Networks. [Citation Graph (, )][DBLP]


  308. k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks. [Citation Graph (, )][DBLP]


  309. Controlled Information Sharing in Collaborative Distributed Query Processing. [Citation Graph (, )][DBLP]


  310. Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. [Citation Graph (, )][DBLP]


  311. Tracking Skype VoIP Calls Over The Internet. [Citation Graph (, )][DBLP]


  312. Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure. [Citation Graph (, )][DBLP]


  313. Fast Detection of Denial-of-Service Attacks on IP Telephony. [Citation Graph (, )][DBLP]


  314. Anonymity in Location-Based Services: Towards a General Framework. [Citation Graph (, )][DBLP]


  315. ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. [Citation Graph (, )][DBLP]


  316. Privacy-Aware Proximity Based Services. [Citation Graph (, )][DBLP]


  317. Anonymity and Diversity in LBS: A Preliminary Investigation. [Citation Graph (, )][DBLP]


  318. A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. [Citation Graph (, )][DBLP]


  319. Topological analysis of network attack vulnerability. [Citation Graph (, )][DBLP]


  320. Model-Based Covert Timing Channels: Automated Modeling and Evasion. [Citation Graph (, )][DBLP]


  321. Simulatable Binding: Beyond Simulatable Auditing. [Citation Graph (, )][DBLP]


  322. How Anonymous Is k-Anonymous? Look at Your Quasi-ID. [Citation Graph (, )][DBLP]


  323. L-Cover: Preserving Diversity by Anonymity. [Citation Graph (, )][DBLP]


  324. An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. [Citation Graph (, )][DBLP]


  325. Preserving Anonymity of Recurrent Location-Based Queries. [Citation Graph (, )][DBLP]


  326. Preserving confidentiality of security policies in data outsourcing. [Citation Graph (, )][DBLP]


  327. Key management for multi-user encrypted databases. [Citation Graph (, )][DBLP]


  328. A framework for establishing, assessing, and managing trust in inter-organizational relationships. [Citation Graph (, )][DBLP]


  329. Secure median computation in wireless sensor networks. [Citation Graph (, )][DBLP]


  330. Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies [Citation Graph (, )][DBLP]


Search in 0.861secs, Finished in 0.872secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002