|
Search the dblp DataBase
Vijayalakshmi Atluri:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP] DBSec, 1994, pp:259-274 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang
Modeling and Analysis of Workflows Using Petri Nets. [Citation Graph (1, 0)][DBLP] J. Intell. Inf. Syst., 1998, v:10, n:2, pp:131-158 [Journal]
- Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal]
- Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
A Chinese wall security model for decentralized workflow systems. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:48-57 [Conf]
- Avigdor Gal, Vijayalakshmi Atluri
An authorization model for temporal data. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2000, pp:144-153 [Conf]
- Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri
Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:66-77 [Conf]
- Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf]
- Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
Selective View Materialization in a Spatial Data Warehouse. [Citation Graph (0, 0)][DBLP] DaWaK, 2005, pp:157-167 [Conf]
- Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
Preview: Optimizing View Materialization Cost in Spatial Data Warehouses. [Citation Graph (0, 0)][DBLP] DaWaK, 2006, pp:45-54 [Conf]
- Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni
Supporting Delegation in Secure Workflow Management Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:190-202 [Conf]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP] DBSec, 1993, pp:135-158 [Conf]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP] DBSec, 1995, pp:231-247 [Conf]
- Vijayalakshmi Atluri, Qi Guo
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:31-47 [Conf]
- Vijayalakshmi Atluri, Wei-kuang Huang
An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. [Citation Graph (0, 0)][DBLP] DBSec, 1996, pp:240-258 [Conf]
- Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP] DBSec, 1997, pp:151-165 [Conf]
- Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP] DBSec, 1996, pp:79-98 [Conf]
- Vijayalakshmi Atluri, Ravi Mukkamala
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:255-268 [Conf]
- Vijayalakshmi Atluri, Pietro Mazzoleni
Uniform Indexing for Geospatial Data and Authorizations. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:207-218 [Conf]
- Vijayalakshmi Atluri, Heechang Shin
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:237-251 [Conf]
- Vijayalakshmi Atluri, David L. Spooner
Workshop Summary. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:287-293 [Conf]
- Soon Ae Chun, Vijayalakshmi Atluri
Protecting Privacy from Continuous High-resolution Satellite Surveillance. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:233-244 [Conf]
- Wei-kuang Huang, Vijayalakshmi Atluri
Analysing the Safety of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP] DBSec, 1998, pp:43-57 [Conf]
- Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:209-223 [Conf]
- Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
Panel. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:373- [Conf]
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] DBSec, 2005, pp:252-266 [Conf]
- Vijayalakshmi Atluri, Soon Ae Chun
Handling Dynamic Changes in Decentralized Workflow Execution Environments. [Citation Graph (0, 0)][DBLP] DEXA, 2003, pp:813-825 [Conf]
- Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
Domain Knowledge-Based Automatic Workflow Generation. [Citation Graph (0, 0)][DBLP] DEXA, 2002, pp:81-92 [Conf]
- Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse. [Citation Graph (0, 0)][DBLP] DEXA, 2006, pp:439-448 [Conf]
- Chiara Ghirardini, Soon Ae Chun, Vijayalakshmi Atluri, Ibrahim Kamel, Nabil R. Adam
A Study on the Indexing of Satellite Images at NASA Regional Application Center. [Citation Graph (0, 0)][DBLP] DEXA Workshop, 2001, pp:859-864 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun
Human-Centered Systems for Business Services. [Citation Graph (0, 0)][DBLP] DG.O, 2004, pp:- [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun, Patrizia Fariselli, Julia Culver-Hopper, Olana Bojic, Rick T. Stewart, Jim Fruscione, Nick Mannochio
Technology transfer of inter-agency government services and their transnational feasibility studies. [Citation Graph (0, 0)][DBLP] DG.O, 2005, pp:225-226 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja
Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications. [Citation Graph (0, 0)][DBLP] DG.O, 2004, pp:- [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, J. Cooper, J. Paczkowski, Christof Bornhövd, I. Nassi, Joachim Schaper
Semantics-based threat structure mining. [Citation Graph (0, 0)][DBLP] DG.O, 2006, pp:367-368 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner
Secure interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP] DG.O, 2006, pp:124-125 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal
Agency interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP] DG.O, 2005, pp:285-286 [Conf]
- Soon Ae Chun, Vijayalakshmi Atluri
Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery. [Citation Graph (0, 0)][DBLP] DG.O, 2003, pp:- [Conf]
- Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
Dynamic Composition of Workflows for Customized eGovernment Service Delivery. [Citation Graph (0, 0)][DBLP] DG.O, 2002, pp:- [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam
OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. [Citation Graph (0, 0)][DBLP] DG.O, 2002, pp:- [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam
Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations. [Citation Graph (0, 0)][DBLP] DG.O, 2004, pp:- [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin
DM-AMS: employing data mining techniques for alert management. [Citation Graph (0, 0)][DBLP] DG.O, 2005, pp:103-111 [Conf]
- Aabhas V. Paliwal, Nabil R. Adam, Vijayalakshmi Atluri
Electronic Negotiation of Government Contracts through Transducers. [Citation Graph (0, 0)][DBLP] DG.O, 2003, pp:- [Conf]
- Li Qin, Vijayalakshmi Atluri
An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories. [Citation Graph (0, 0)][DBLP] EC-Web, 2003, pp:227-236 [Conf]
- Li Qin, Vijayalakshmi Atluri
Ontology-Guided Change Detection to the Semantic Web Data. [Citation Graph (0, 0)][DBLP] ER, 2004, pp:624-638 [Conf]
- Vijayalakshmi Atluri, Qi Guo
Unified Index for Mobile Object Data and Authorizations. [Citation Graph (0, 0)][DBLP] ESORICS, 2005, pp:80-97 [Conf]
- Vijayalakshmi Atluri, Wei-kuang Huang
An Authorization Model for Workflows. [Citation Graph (0, 0)][DBLP] ESORICS, 1996, pp:44-64 [Conf]
- Richard D. Holowczak, Soon Ae Chun, Francisco J. Artigas, Vijayalakshmi Atluri
Customized Geospatial Workflows for E-Government Services. [Citation Graph (0, 0)][DBLP] ACM-GIS, 2001, pp:64-69 [Conf]
- Vijayalakshmi Atluri, Janice Warner
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] ICDCIT, 2004, pp:369-378 [Conf]
- Avigdor Gal, Vijayalakshmi Atluri, Gang Xu
An Authorization System for Temporal Data. [Citation Graph (0, 0)][DBLP] ICDE, 2002, pp:339-340 [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri
FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. [Citation Graph (0, 0)][DBLP] ICDM, 2005, pp:661-664 [Conf]
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. [Citation Graph (0, 0)][DBLP] ICISS, 2005, pp:134-147 [Conf]
- Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri
Modeling and Evaluation of Distributed Workflow Algorithms. [Citation Graph (0, 0)][DBLP] ISAS-SCI (1), 2001, pp:183-188 [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP] ISI, 2005, pp:1-13 [Conf]
- Vijayalakshmi Atluri, Ravi Mukkamala
Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. [Citation Graph (0, 0)][DBLP] MASCOTS, 2000, pp:248-0 [Conf]
- Mahmoud Youssef, Vijayalakshmi Atluri, Nabil R. Adam
Preserving mobile customer privacy: an access control system for moving objects and customer profiles. [Citation Graph (0, 0)][DBLP] Mobile Data Management, 2005, pp:67-76 [Conf]
- Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
Color Time Petri Net for Interactive Adaptive Multimedia Objects. [Citation Graph (0, 0)][DBLP] MMM, 2005, pp:147-157 [Conf]
- Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1997, pp:1-12 [Conf]
- Wei-kuang Huang, Vijayalakshmi Atluri
SecureFlow: A Secure Web-Enabled Workflow Management System. [Citation Graph (0, 0)][DBLP] ACM Workshop on Role-Based Access Control, 1999, pp:83-94 [Conf]
- Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
Policy-Based Web Service Composition. [Citation Graph (0, 0)][DBLP] RIDE, 2004, pp:85-92 [Conf]
- Vijayalakshmi Atluri, Nabil R. Adam, Ahmed Gomaa, Igg Adiwijaya
Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints. [Citation Graph (0, 0)][DBLP] SAC, 2003, pp:927-934 [Conf]
- Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. [Citation Graph (0, 0)][DBLP] SAC, 2004, pp:576-583 [Conf]
- Vandana Pursnani Janeja, Vijayalakshmi Atluri
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. [Citation Graph (0, 0)][DBLP] SAC, 2005, pp:493-497 [Conf]
- Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri
Semantically enhanced enforcement of mobile consumer's privacy preferences. [Citation Graph (0, 0)][DBLP] SAC, 2006, pp:1172-1176 [Conf]
- Vijayalakshmi Atluri, Janice Warner
Supporting conditional delegation in secure workflow management systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:49-58 [Conf]
- Janice Warner, Vijayalakshmi Atluri
Inter-instance authorization constraints for secure workflow management. [Citation Graph (0, 0)][DBLP] SACMAT, 2006, pp:190-199 [Conf]
- Vijayalakshmi Atluri
Modification of Integrity Constraints Through Knowledge Discovery. [Citation Graph (0, 0)][DBLP] IICIS, 1998, pp:191-209 [Conf]
- Dong-Ho Kim, Il Im, Vijayalakshmi Atluri
A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. [Citation Graph (0, 0)][DBLP] CEC, 2005, pp:84-91 [Conf]
- Dong-Ho Kim, Il Im, Vijayalakshmi Atluri, Michael Bieber, Nabil R. Adam, Yelena Yesha
A clickstream-based collaborative filtering personalization model: towards a better performance. [Citation Graph (0, 0)][DBLP] WIDM, 2004, pp:88-95 [Conf]
- Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya
SI in Digital Libraries. [Citation Graph (0, 0)][DBLP] Commun. ACM, 2000, v:43, n:6, pp:64-72 [Journal]
- Vijayalakshmi Atluri, Pierangela Samarati
Security of Data and Transaction Processing - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2000, v:8, n:1, pp:5-6 [Journal]
- Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
Using Semantics for Policy-Based Web Service Composition. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2005, v:18, n:1, pp:37-64 [Journal]
- Vijayalakshmi Atluri, Ravi Mukkamala
Employing an extended transaction model in multilevel secure transaction processing. [Citation Graph (0, 0)][DBLP] Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP] Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal]
- Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal]
- Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
Chinese wall security for decentralized workflow management systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:6, pp:799-840 [Journal]
- Vijayalakshmi Atluri, Wei-kuang Huang
A Petri Net Based Safety Analysis of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
- Vijayalakshmi Atluri, Wei-kuang Huang
Enforcing Mandatory and Discretionary Security in Workflow Management Systems. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 1997, v:5, n:4, pp:303-340 [Journal]
- Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
A Semantic-Based Execution Model for Multilevel Secure Workflows. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
- Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
Multilevel Security Transaction Processing. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2001, v:9, n:3, pp:165-195 [Journal]
- Vijayalakshmi Atluri, Indrakshi Ray
Editors' message for the special issue on security. [Citation Graph (0, 0)][DBLP] Int. J. on Digital Libraries, 2004, v:4, n:3, pp:137-138 [Journal]
- Li Qin, Vijayalakshmi Atluri
An Ontology-Guided Approach to Change Detection of the Semantic Web Data. [Citation Graph (0, 0)][DBLP] , 2006, v:, n:, pp:130-157 [Journal]
- Vijayalakshmi Atluri, Soon Ae Chun
An Authorization Model for Geospatial Data. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:4, pp:238-254 [Journal]
- Vijayalakshmi Atluri, Avigdor Gal
An authorization model for temporal and derived data: securing information portals. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:62-94 [Journal]
- Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:65-104 [Journal]
- Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya, Sujata Banerjee, Richard D. Holowczak
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2001, v:13, n:4, pp:705-716 [Journal]
- Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari
A Content-Based Authorization Model for Digital Libraries. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:296-315 [Journal]
- Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP] IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal]
- Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia
The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP] IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal]
- Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo
An authorization system for digital libraries. [Citation Graph (0, 0)][DBLP] VLDB J., 2002, v:11, n:1, pp:58-67 [Journal]
- Vijayalakshmi Atluri, Heechang Shin
Efficient Security Policy Enforcement in a Location Based Service Environment. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:61-76 [Conf]
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:175-184 [Conf]
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:235-244 [Conf]
- Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
Adapting spatial constraints of composite multimedia objects to achieve universal access. [Citation Graph (0, 0)][DBLP] IPCCC, 2005, pp:519-525 [Conf]
- Vijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni
A decentralized execution model for inter-organizational workflows. [Citation Graph (0, 0)][DBLP] Distributed and Parallel Databases, 2007, v:22, n:1, pp:55-83 [Journal]
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP]
Effective anonymization of query logs. [Citation Graph (, )][DBLP]
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. [Citation Graph (, )][DBLP]
Role Mining in the Presence of Noise. [Citation Graph (, )][DBLP]
An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP]
Optimal Boolean Matrix Decomposition: Application to Role Engineering. [Citation Graph (, )][DBLP]
Extended Boolean Matrix Decomposition. [Citation Graph (, )][DBLP]
Texture-Based Remote-Sensing Image Segmentation. [Citation Graph (, )][DBLP]
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. [Citation Graph (, )][DBLP]
Ensuring Privacy and Security for LBS through Trajectory Partitioning. [Citation Graph (, )][DBLP]
Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP]
Towards formal security analysis of GTRBAC using timed automata. [Citation Graph (, )][DBLP]
Privacy-preserving trust verification. [Citation Graph (, )][DBLP]
Concept-level access control for the Semantic Web. [Citation Graph (, )][DBLP]
Anonymization models for directional location based service environments. [Citation Graph (, )][DBLP]
Search in 0.012secs, Finished in 0.016secs
|