The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vijay Varadharajan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Claudio Calvelli, Vijay Varadharajan
    Authentication and Revocation in SPM (Extended Abstract). [Citation Graph (1, 0)][DBLP]
    Operating Systems Review, 1993, v:27, n:4, pp:42-57 [Journal]
  2. Ching Lin, Vijay Varadharajan
    Trust Based Risk Management for Distributed System Security - A New Approach. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:6-13 [Conf]
  3. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
    Enhancing Grid Security with Trust Management. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2004, pp:303-310 [Conf]
  4. Yan Wang, Vijay Varadharajan
    Trust2: Developing Trust in Peer-to-Peer Environments. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2005, pp:24-34 [Conf]
  5. Michael Hitchens, Rajan Shankaran, Vijay Varadharajan
    Securing the Ad-Hoc On-demand Distance Vector Protocol. [Citation Graph (0, 0)][DBLP]
    ISCA PDCS, 2004, pp:353-360 [Conf]
  6. Yun Bai, Vijay Varadharajan
    Analysis and Implementation of a Formal Authorisation Policy Design Approach. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:14-25 [Conf]
  7. Yun Bai, Vijay Varadharajan
    A High Level Language for Conventional Access Control Models. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:273-283 [Conf]
  8. Yun Bai, Vijay Varadharajan
    Authorization in Object Oriented Databases. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:270-280 [Conf]
  9. Michael Hitchens, Vijay Varadharajan, Gregory Saunders
    Policy Administration Domains. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:286-302 [Conf]
  10. Yi Mu, Vijay Varadharajan
    Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:368-377 [Conf]
  11. Yi Mu, Vijay Varadharajan
    On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:134-145 [Conf]
  12. Yi Mu, Vijay Varadharajan, Yan-Xia Lin
    New Micropayment Schemes Based on PayWords. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:283-293 [Conf]
  13. Yi Mu, Junqi Zhang, Vijay Varadharajan
    m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:395-405 [Conf]
  14. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:117-128 [Conf]
  15. Chun Ruan, Vijay Varadharajan
    Resolving Conflicts in Authorization Delegations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:271-285 [Conf]
  16. Chun Ruan, Vijay Varadharajan
    A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:402-413 [Conf]
  17. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    An Analysis of Access Control Models. [Citation Graph (0, 0)][DBLP]
    ACISP, 1999, pp:281-293 [Conf]
  18. Vijay Varadharajan, Phillip Allen
    Support for joint action based security policies. [Citation Graph (0, 0)][DBLP]
    ACISP, 1996, pp:207-218 [Conf]
  19. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Security Issues in Asynchronous Transfer Mode. [Citation Graph (0, 0)][DBLP]
    ACISP, 1997, pp:76-89 [Conf]
  20. Vlad Ingar Wietrzyk, Makoto Takizawa, Vijay Varadharajan
    A Strategy for MLS Workflow. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:159-175 [Conf]
  21. Chun Ruan, Vijay Varadharajan
    An Authorization Model for E-consent Requirement in a Health Care Application. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:191-205 [Conf]
  22. Ching Lin, Vijay Varadharajan
    Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:176-190 [Conf]
  23. Yi Mu, Vijay Varadharajan
    Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:293-299 [Conf]
  24. Michael Hitchens, Vijay Varadharajan
    esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:105-116 [Conf]
  25. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:2-8 [Conf]
  26. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1997, pp:9-15 [Conf]
  27. Rajan Shankaran, Vijay Varadharajan
    Secure Signaling and Access Control for ATM Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:212-222 [Conf]
  28. Vijay Varadharajan, C. Crall, Joe Pato
    Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:178-189 [Conf]
  29. Vijay Varadharajan, Yi Mu
    On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1996, pp:78-87 [Conf]
  30. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    Fair On-line Gambling. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2000, pp:394-400 [Conf]
  31. Udaya Kiran Tupakula, Vijay Varadharajan
    A Practical Method to Counteract Denial of Service Attacks. [Citation Graph (0, 0)][DBLP]
    ACSC, 2003, pp:275-284 [Conf]
  32. Yan Zhang, Vijay Varadharajan
    A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP]
    ACSC, 2001, pp:215-222 [Conf]
  33. Weiliang Zhao, Vijay Varadharajan, Yi Mu
    A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2003, pp:105-109 [Conf]
  34. Udaya Kiran Tupakula, Vijay Varadharajan
    Analysis of traceback techniques. [Citation Graph (0, 0)][DBLP]
    ACSW Frontiers, 2006, pp:115-124 [Conf]
  35. Vlad Ingar Wietrzyk, Mehmet A. Orgun, Vijay Varadharajan
    On the Analysis of On-Line Database Reorganization. [Citation Graph (0, 0)][DBLP]
    ADBIS-DASFAA, 2000, pp:293-306 [Conf]
  36. Yi Mu, Vijay Varadharajan
    Towards a Protection Model for Supporting Multiple Access Control Policies. [Citation Graph (0, 0)][DBLP]
    Australasian Database Conference, 2000, pp:107-114 [Conf]
  37. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Scalable Multi-service Group Key Management Scheme. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:172- [Conf]
  38. Venkatesan Balakrishnan, Vijay Varadharajan
    Designing Secure Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    AINA, 2005, pp:5-8 [Conf]
  39. Junqi Zhang, Vijay Varadharajan, Yi Mu
    Securing XML Document Sources and Their Distribution. [Citation Graph (0, 0)][DBLP]
    AINA (1), 2004, pp:562-567 [Conf]
  40. Venkatesan Balakrishnan, Vijay Varadharajan, Phillip Lucs, Udaya Kiran Tupakula
    Trust Enhanced Secure Mobile Ad-Hoc Network Routing. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (2), 2007, pp:27-33 [Conf]
  41. Tri Van Le, Khanh Quoc Nguyen, Vijay Varadharajan
    How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:208-218 [Conf]
  42. Vijay Varadharajan
    Network Security Policy Models. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:74-95 [Conf]
  43. Vijay Varadharajan
    Security enhanced mobile agents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:200-209 [Conf]
  44. Vijay Varadharajan
    Trapdoor Rings and Their Use in Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1985, pp:369-395 [Conf]
  45. Yun Bai, Vijay Varadharajan
    A Logic For State Transformations in Authorization Policies. [Citation Graph (0, 0)][DBLP]
    CSFW, 1997, pp:173-182 [Conf]
  46. Claudio Calvelli, Vijay Varadharajan
    An Analysis of some Delegation Protocols for Distributed Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 1992, pp:92-110 [Conf]
  47. Vijay Varadharajan
    Petri Net Based Modelling of Information Flow Security Requirements. [Citation Graph (0, 0)][DBLP]
    CSFW, 1990, pp:51-61 [Conf]
  48. Vijay Varadharajan
    Hook-Up Property of Information Flow Secure Nets. [Citation Graph (0, 0)][DBLP]
    CSFW, 1991, pp:154-175 [Conf]
  49. Chun Ruan, Vijay Varadharajan, Yan Zhang
    Delegatable Authorization Program and Its Application. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2003, pp:267-273 [Conf]
  50. Yun Bai, Vijay Varadharajan
    A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:317-330 [Conf]
  51. Sarath Indrakanti, Vijay Varadharajan
    An Authorization Architecture for Web Services. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:222-236 [Conf]
  52. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi
    Secure Authorisation for Web Services. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:163-175 [Conf]
  53. Chun Ruan, Vijay Varadharajan
    Decentralized Temporal Authorization Administration. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:917-926 [Conf]
  54. Chun Ruan, Vijay Varadharajan
    Implementing Authorization Delegations Using Graph. [Citation Graph (0, 0)][DBLP]
    DEXA, 2006, pp:904-913 [Conf]
  55. Feng Bao, Robert H. Deng, Khanh Quoc Nguyen, Vijay Varadharajan
    Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:858-863 [Conf]
  56. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
    Batching Proofs of Knowledge and Its Applications. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:844-849 [Conf]
  57. Yan Wang, Vijay Varadharajan
    Interaction Trust Evaluation in Decentralized Environments. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2004, pp:144-153 [Conf]
  58. Yan Wang, Vijay Varadharajan
    Two-Phase Peer Evaluation in P2P E-Commerce Environments. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:654-657 [Conf]
  59. Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters
    A Trust based Access Control Framework for P2P File-Sharing Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  60. Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi
    Authorisation Service in .Net My Services. [Citation Graph (0, 0)][DBLP]
    ICWI, 2003, pp:1115-1118 [Conf]
  61. Yan Wang, Vijay Varadharajan
    A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. [Citation Graph (0, 0)][DBLP]
    IAT, 2005, pp:88-94 [Conf]
  62. Hongxue Wang, Vijay Varadharajan, Yan Zhang
    Towards a Generic Logic for Analysing Network Protocols. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshop on Internet, 2000, pp:0-0 [Conf]
  63. Pascal Molli, Hala Skaf-Molli, Claude Godart, Pradeep Ray, Rajan Shankaran, Vijay Varadharajan
    Integrating Network Services for Virtual Teams. [Citation Graph (0, 0)][DBLP]
    ICEIS (2), 2001, pp:1034-1039 [Conf]
  64. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2005, pp:331-336 [Conf]
  65. Yun Bai, Vijay Varadharajan
    A language for specifying sequences of authorization transformations and its applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:39-49 [Conf]
  66. Michael Hitchens, Vijay Varadharajan
    RBAC for XML Document Stores. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:131-143 [Conf]
  67. Michael Hitchens, Vijay Varadharajan
    Issues in the Design of a Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:22-38 [Conf]
  68. Chuan-Kun Wu, Vijay Varadharajan
    Fair Exchange of Digital Signatures with Offline Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    ICICS, 2001, pp:466-470 [Conf]
  69. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:145-157 [Conf]
  70. Khanh Quoc Nguyen, Feng Bao, Yi Mu, Vijay Varadharajan
    Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:103-118 [Conf]
  71. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:243-251 [Conf]
  72. Yi Mu, Vijay Varadharajan
    An Internet Anonymous Auction Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:171-182 [Conf]
  73. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Analysis and Modelling of Trust in Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:106-119 [Conf]
  74. Vijay Varadharajan
    Authorization and Trust Enhanced Security for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:1-20 [Conf]
  75. Zaobin Gan, Ching Lin, Vijay Varadharajan
    A Middleware-Based Script Language. [Citation Graph (0, 0)][DBLP]
    ICMB, 2005, pp:690-693 [Conf]
  76. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
    A Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2001, pp:297-304 [Conf]
  77. Vlad Ingar Wietrzyk, Makoto Takizawa, Mehmet A. Orgun, Vijay Varadharajan
    A Secure Transaction Environment for Workflows in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2001, pp:198-208 [Conf]
  78. Chuan-Kun Wu, Vijay Varadharajan
    Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:146-0 [Conf]
  79. Yuko Murayama, Vijay Varadharajan
    Message from the IWSEC Workshop Co-Chairs. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 1999, pp:132-0 [Conf]
  80. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
    Authorization Service for Web Services and its Implementation. [Citation Graph (0, 0)][DBLP]
    ICWS, 2004, pp:774-777 [Conf]
  81. Vijay Varadharajan, Yi Mu
    Design of Secure End-toEnd Protocols for Mobile Systems. [Citation Graph (0, 0)][DBLP]
    IFIP World Conference on Mobile Communications, 1996, pp:258-266 [Conf]
  82. Chun Ruan, Vijay Varadharajan, Yan Zhang
    Evaluation of Authorization with Delegation and Negation. [Citation Graph (0, 0)][DBLP]
    IIS, 2003, pp:547-551 [Conf]
  83. Udaya Kiran Tupakula, Vijay Varadharajan
    A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. [Citation Graph (0, 0)][DBLP]
    Integrated Network Management, 2003, pp:113-116 [Conf]
  84. Yi Mu, Vijay Varadharajan, Khanh Quoc Nguyen
    Delegated Decryption. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 1999, pp:258-269 [Conf]
  85. Yi Mu, Vijay Varadharajan
    Distributed Signcryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2000, pp:155-164 [Conf]
  86. Yi Mu, Vijay Varadharajan
    Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:223-231 [Conf]
  87. Vijay Varadharajan
    A Multilevel Security Policy for Networks. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1990, pp:710-718 [Conf]
  88. Khanh Quoc Nguyen, Vijay Varadharajan, Yi Mu
    A New Efficient Off-line Anonymous Cash Scheme. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1997, pp:193-201 [Conf]
  89. Yi Mu, Khanh Quoc Nguyen, Vijay Varadharajan
    A Fair Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP]
    ISEC, 2001, pp:20-32 [Conf]
  90. Chun Ruan, Vijay Varadharajan
    Integration of Graph Based Authorization Policies. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2006, pp:359-368 [Conf]
  91. Chun Ruan, Vijay Varadharajan, Yan Zhang
    Logic-Based Reasoning on Delegatable Authorizations. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2002, pp:185-193 [Conf]
  92. Chun Ruan, Vijay Varadharajan
    Supporting E-consent on Health Data by Logic. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2003, pp:392-396 [Conf]
  93. Chun Ruan, Vijay Varadharajan
    Data Protection in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2005, pp:191-199 [Conf]
  94. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:313-320 [Conf]
  95. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    Undeniable Confirmer Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:235-246 [Conf]
  96. Chun Ruan, Vijay Varadharajan, Yan Zhang
    A Logic Model for Temporal Authorization Delegation with Negation. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:310-324 [Conf]
  97. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
    Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. [Citation Graph (0, 0)][DBLP]
    ISWS, 2005, pp:35-44 [Conf]
  98. Weiliang Zhao, Vijay Varadharajan
    Efficient TTP-Free Mental Poker Protocols. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:745-750 [Conf]
  99. Junqi Zhang, Vijay Varadharajan, Yi Mu
    A Secure PIM-SM Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP]
    IWDC, 2004, pp:276-288 [Conf]
  100. Yi Mu, Vijay Varadharajan
    A New Scheme of Credit based Payment for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    LCN, 1998, pp:278-0 [Conf]
  101. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
    Secure Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP]
    LCN, 2001, pp:296-323 [Conf]
  102. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
    Secure Multicast Extensions for Mobile Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1999, pp:106-116 [Conf]
  103. Vijay Varadharajan
    Security in High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1996, pp:2-11 [Conf]
  104. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Security services and public key infrastructure for ATM networks. [Citation Graph (0, 0)][DBLP]
    LCN, 1997, pp:253-263 [Conf]
  105. Vijay Varadharajan
    Secure Networked Computing. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:27- [Conf]
  106. Michael Hitchens, Vijay Varadharajan, Gregory Saunders
    Security Policy Management in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:290-294 [Conf]
  107. Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
    Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2002, pp:851-856 [Conf]
  108. Michael Hitchens, Vijay Varadharajan
    Tower: A Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP]
    POLICY, 2001, pp:88-106 [Conf]
  109. Hongxue Wang, Vijay Varadharajan, Yan Zhang
    A Secure Communication Scheme for Multiagent Systems. [Citation Graph (0, 0)][DBLP]
    PRIMA, 1998, pp:174-185 [Conf]
  110. Yun Bai, Vijay Varadharajan
    On Formal Languages for Sequences of Authorization Transformations. [Citation Graph (0, 0)][DBLP]
    SAFECOMP, 1999, pp:375-384 [Conf]
  111. Michael Hitchens, Vijay Varadharajan
    Elements of a Language for Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:371-380 [Conf]
  112. Vijay Varadharajan, Thomas Hardjono
    Security model for distributed object framework and its applicability to CORBA. [Citation Graph (0, 0)][DBLP]
    SEC, 1996, pp:452-463 [Conf]
  113. Zaobin Gan, Vijay Varadharajan
    Design and Implementation of a Practical Secure Distributed Healthcare Application. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:431-436 [Conf]
  114. Zaobin Gan, Dengwei Wei, Vijay Varadharajan
    Improving Software Security Through an Integrated Approach. [Citation Graph (0, 0)][DBLP]
    SECRYPT, 2006, pp:437-442 [Conf]
  115. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Fair Trading Protocol With Off-line Anonymous Credit Card Payment. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:186-195 [Conf]
  116. Vijay Varadharajan, Phillip Allen, Stewart Black
    An Analysis of the Proxy Problem in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 1991, pp:255-277 [Conf]
  117. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Modelling Trust Relationships in Distributed Environments. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:40-49 [Conf]
  118. Ching Lin, Vijay Varadharajan, Yan Wang
    Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:151-160 [Conf]
  119. Ching Lin, Vijay Varadharajan, Yan Wang, Yi Mu
    On the Design of a New Trust Model for Mobile Agent Security. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:60-69 [Conf]
  120. Ching Lin, Vijay Varadharajan, Yan Wang, Vineet Pruthi
    Trust Enhanced Security for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:231-238 [Conf]
  121. Vijay Varadharajan
    Design of enterprise-wide secure networked system. [Citation Graph (0, 0)][DBLP]
    WETICE, 1996, pp:100-105 [Conf]
  122. Yan Wang, Vijay Varadharajan
    A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:730-735 [Conf]
  123. Vijay Varadharajan
    Trustworthy Computing (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    WISE, 2004, pp:13-16 [Conf]
  124. Junqi Zhang, Vijay Varadharajan, Yi Mu
    ID-based Secure PIM-SM Schemes. [Citation Graph (0, 0)][DBLP]
    Wireless and Optical Communications, 2006, pp:190-195 [Conf]
  125. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
    Architectural Framework for Web Services Authorization. [Citation Graph (0, 0)][DBLP]
    WSMDEIS, 2005, pp:75-84 [Conf]
  126. Zaobin Gan, Deng-Wen Wei, Vijay Varadharajan
    Evaluating the Performance and Scalability of Web Application Systems. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:111-114 [Conf]
  127. D. Foster, Vijay Varadharajan
    Security and Trust Enhanced Mobile Agent Based System Design. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:155-160 [Conf]
  128. Zaobin Gan, Deng-Wen Wei, Jin-Long Zhang, Vijay Varadharajan
    Business-Process-Oriented Software Requirements Automatic Generator. [Citation Graph (0, 0)][DBLP]
    ICITA (1), 2005, pp:95-98 [Conf]
  129. Hongxue Wang, Vijay Varadharajan, John K. Slaney
    Towards Perfect Objects. [Citation Graph (0, 0)][DBLP]
    TOOLS (32), 1999, pp:115-126 [Conf]
  130. Panos Katsavos, Vijay Varadharajan
    A Secure Frame Relay Service. [Citation Graph (0, 0)][DBLP]
    Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1539-1558 [Journal]
  131. Vijay Varadharajan, Claudio Calvelli
    Key management for a secure LAN-SMDS network. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1996, v:19, n:9-10, pp:813-823 [Journal]
  132. Vijay Varadharajan, Panos Katsavos
    High-speed network security. I. SMDS and frame relay. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1997, v:20, n:10, pp:832-847 [Journal]
  133. Vijay Varadharajan, P. W. Sanders
    Practical secure electronic mail system with public key distribution. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1985, v:8, n:3, pp:121-127 [Journal]
  134. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    Security for cluster based ad hoc networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 2004, v:27, n:5, pp:488-501 [Journal]
  135. Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
    On the design of secure ATM networks. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:15-16, pp:1512-1525 [Journal]
  136. Chris J. Mitchell, Vijay Varadharajan
    Modified forms of cipher block chaining. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:1, pp:37-40 [Journal]
  137. Vijay Varadharajan, Stewart Black
    Multilevel security in a distributed object-oriented system. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:1, pp:51-68 [Journal]
  138. Vijay Varadharajan, Claudio Calvelli
    Extending the schematic protection model - II. Revocation. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1996, v:15, n:6, pp:525-536 [Journal]
  139. Vijay Varadharajan, K. D. Baker
    Net-Based System Design Representation and Analysis. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 1987, v:2, n:4, pp:167-178 [Journal]
  140. Yun Bai, Vijay Varadharajan
    On transformation of authorization policies. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2003, v:45, n:3, pp:333-357 [Journal]
  141. Yun Bai, Vijay Varadharajan
    Object Oriented Database with Authorization Policies. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 2002, v:53, n:3-4, pp:229-250 [Journal]
  142. Yun Bai, Yan Zhang, Vijay Varadharajan
    On the sequence of authorization policy transformations. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:120-131 [Journal]
  143. Chun Ruan, Vijay Varadharajan
    A formal graph based framework for supporting authorization delegations and conflict resolutions. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2003, v:1, n:4, pp:211-222 [Journal]
  144. Yi Mu, Vijay Varadharajan
    Group Cryptography: Signature and Encryption. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal]
  145. Guangrong Chen, Vijay Varadharajan, Pradeep Ray, P. Zuluaga
    Management for eBusiness in the New Millennium: A Report on APNOMS 2001. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal]
  146. Udaya Kiran Tupakula, Vijay Varadharajan
    Tracing DoS Floods: An Automated Approach. [Citation Graph (0, 0)][DBLP]
    J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal]
  147. Vijay Varadharajan
    A petri net model for system design and refinement. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1991, v:15, n:3, pp:239-250 [Journal]
  148. Yan Wang, Vijay Varadharajan
    Secure route structures for parallel mobile agents based systems using fast binary dispatch. [Citation Graph (0, 0)][DBLP]
    Mobile Information Systems, 2005, v:1, n:3, pp:185-205 [Journal]
  149. Gregory Saunders, Michael Hitchens, Vijay Varadharajan
    Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:4, pp:6-20 [Journal]
  150. Vijay Varadharajan
    Extending the Schematic Protection Model II: Revocation. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1997, v:31, n:1, pp:64-77 [Journal]
  151. Vijay Varadharajan, Phillip Allen
    Joint Actions Based Authorization Schemes. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1996, v:30, n:3, pp:32-45 [Journal]
  152. Vijay Varadharajan, Khanh Quoc Nguyen, Yi Mu
    On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:173-184 [Journal]
  153. Vijay Varadharajan, Claudio Calvelli
    An Access Control Model and Its Use in Representing Mental Health Application Access Policy. [Citation Graph (0, 4)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:81-95 [Journal]
  154. Ghassan Chaddoud, Vijay Varadharajan, Isabelle Chrisment, André Schaff
    Gestion efficace de la sécurité des communications de groupe pour le service SSM. [Citation Graph (0, 0)][DBLP]
    Technique et Science Informatiques, 2004, v:23, n:9, pp:1107-1135 [Journal]
  155. Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan
    Achieving secure and flexible M-services through tickets. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:6, pp:697-708 [Journal]
  156. Vijay Varadharajan, D. Foster
    A Security Architecture for Mobile Agent Based Applications. [Citation Graph (0, 0)][DBLP]
    World Wide Web, 2003, v:6, n:1, pp:93-122 [Journal]
  157. Yan Wang, Vijay Varadharajan
    Role-based Recommendation and Trust Evaluation. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2007, pp:278-288 [Conf]

  158. A Hybrid Trust Model for Enhancing Security in Distributed Systems. [Citation Graph (, )][DBLP]


  159. ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. [Citation Graph (, )][DBLP]


  160. Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. [Citation Graph (, )][DBLP]


  161. Trust management for trusted computing platforms in web services. [Citation Graph (, )][DBLP]


  162. Trust Relationship Modelling in E-commerce-Based Social Network. [Citation Graph (, )][DBLP]


  163. Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  164. On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. [Citation Graph (, )][DBLP]


  165. Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. [Citation Graph (, )][DBLP]


  166. Reasoning on Weighted Delegatable Authorizations. [Citation Graph (, )][DBLP]


  167. Trust Enhanced Authorization for Mobile Agents. [Citation Graph (, )][DBLP]


  168. The Design of A Rule-based and Event-driven Trust Management Framework. [Citation Graph (, )][DBLP]


  169. SBAC: Service Based Access Control. [Citation Graph (, )][DBLP]


  170. Trust Management for Web Services. [Citation Graph (, )][DBLP]


  171. Critical Issues in Trust Management for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  172. Secure Interoperation in Multidomain Environments Employing UCON Policies. [Citation Graph (, )][DBLP]


  173. Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. [Citation Graph (, )][DBLP]


  174. DoSTRACK: a system for defending against DoS attacks. [Citation Graph (, )][DBLP]


  175. Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  176. Trust and Recommendations in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP]


  177. A New Security Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  178. Mobile Agent and Web Service Integration Security Architecture. [Citation Graph (, )][DBLP]


  179. A New Security Scheme for Integration of Mobile Agents and Web Services. [Citation Graph (, )][DBLP]


  180. A Novel Approach of Web Search Based on Community Wisdom. [Citation Graph (, )][DBLP]


  181. A Property-Dependent Agent Transfer Protocol. [Citation Graph (, )][DBLP]


  182. Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. [Citation Graph (, )][DBLP]


  183. Evolution and challenges in trust and security in information system infrastructures. [Citation Graph (, )][DBLP]


  184. TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP]


  185. Property Based Attestation and Trusted Computing: Analysis and Challenges. [Citation Graph (, )][DBLP]


  186. Verification of network security protocols. [Citation Graph (, )][DBLP]


  187. A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. [Citation Graph (, )][DBLP]


Search in 3.042secs, Finished in 3.048secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002