The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Vijayalakshmi Atluri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. [Citation Graph (1, 0)][DBLP]
    DBSec, 1994, pp:259-274 [Conf]
  2. Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang
    Modeling and Analysis of Workflows Using Petri Nets. [Citation Graph (1, 0)][DBLP]
    J. Intell. Inf. Syst., 1998, v:10, n:2, pp:131-158 [Journal]
  3. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. [Citation Graph (1, 9)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1996, v:8, n:5, pp:839-854 [Journal]
  4. Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
    A Chinese wall security model for decentralized workflow systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:48-57 [Conf]
  5. Avigdor Gal, Vijayalakshmi Atluri
    An authorization model for temporal data. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:144-153 [Conf]
  6. Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri
    Privacy-preserving semantic interoperation and access control of heterogeneous databases. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:66-77 [Conf]
  7. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
    RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf]
  8. Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
    Selective View Materialization in a Spatial Data Warehouse. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2005, pp:157-167 [Conf]
  9. Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
    Preview: Optimizing View Materialization Cost in Spatial Data Warehouses. [Citation Graph (0, 0)][DBLP]
    DaWaK, 2006, pp:45-54 [Conf]
  10. Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni
    Supporting Delegation in Secure Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:190-202 [Conf]
  11. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. [Citation Graph (0, 0)][DBLP]
    DBSec, 1993, pp:135-158 [Conf]
  12. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 1995, pp:231-247 [Conf]
  13. Vijayalakshmi Atluri, Qi Guo
    STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:31-47 [Conf]
  14. Vijayalakshmi Atluri, Wei-kuang Huang
    An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:240-258 [Conf]
  15. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
    An Execution Model for Multilevel Seccure Workflows. [Citation Graph (0, 0)][DBLP]
    DBSec, 1997, pp:151-165 [Conf]
  16. Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
    Multilevel Secure Transaction Processing: Status and Prospects. [Citation Graph (0, 0)][DBLP]
    DBSec, 1996, pp:79-98 [Conf]
  17. Vijayalakshmi Atluri, Ravi Mukkamala
    An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:255-268 [Conf]
  18. Vijayalakshmi Atluri, Pietro Mazzoleni
    Uniform Indexing for Geospatial Data and Authorizations. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:207-218 [Conf]
  19. Vijayalakshmi Atluri, Heechang Shin
    Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:237-251 [Conf]
  20. Vijayalakshmi Atluri, David L. Spooner
    Workshop Summary. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:287-293 [Conf]
  21. Soon Ae Chun, Vijayalakshmi Atluri
    Protecting Privacy from Continuous High-resolution Satellite Surveillance. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:233-244 [Conf]
  22. Wei-kuang Huang, Vijayalakshmi Atluri
    Analysing the Safety of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:43-57 [Conf]
  23. Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
    A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:209-223 [Conf]
  24. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold
    Panel. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:373- [Conf]
  25. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:252-266 [Conf]
  26. Vijayalakshmi Atluri, Soon Ae Chun
    Handling Dynamic Changes in Decentralized Workflow Execution Environments. [Citation Graph (0, 0)][DBLP]
    DEXA, 2003, pp:813-825 [Conf]
  27. Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
    Domain Knowledge-Based Automatic Workflow Generation. [Citation Graph (0, 0)][DBLP]
    DEXA, 2002, pp:81-92 [Conf]
  28. Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam
    Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse. [Citation Graph (0, 0)][DBLP]
    DEXA, 2006, pp:439-448 [Conf]
  29. Chiara Ghirardini, Soon Ae Chun, Vijayalakshmi Atluri, Ibrahim Kamel, Nabil R. Adam
    A Study on the Indexing of Satellite Images at NASA Regional Application Center. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 2001, pp:859-864 [Conf]
  30. Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun
    Human-Centered Systems for Business Services. [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  31. Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun, Patrizia Fariselli, Julia Culver-Hopper, Olana Bojic, Rick T. Stewart, Jim Fruscione, Nick Mannochio
    Technology transfer of inter-agency government services and their transnational feasibility studies. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:225-226 [Conf]
  32. Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja
    Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications. [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  33. Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, J. Cooper, J. Paczkowski, Christof Bornhövd, I. Nassi, Joachim Schaper
    Semantics-based threat structure mining. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:367-368 [Conf]
  34. Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner
    Secure interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:124-125 [Conf]
  35. Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal
    Agency interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:285-286 [Conf]
  36. Soon Ae Chun, Vijayalakshmi Atluri
    Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery. [Citation Graph (0, 0)][DBLP]
    DG.O, 2003, pp:- [Conf]
  37. Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
    Dynamic Composition of Workflows for Customized eGovernment Service Delivery. [Citation Graph (0, 0)][DBLP]
    DG.O, 2002, pp:- [Conf]
  38. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam
    OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. [Citation Graph (0, 0)][DBLP]
    DG.O, 2002, pp:- [Conf]
  39. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam
    Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations. [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  40. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin
    DM-AMS: employing data mining techniques for alert management. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:103-111 [Conf]
  41. Aabhas V. Paliwal, Nabil R. Adam, Vijayalakshmi Atluri
    Electronic Negotiation of Government Contracts through Transducers. [Citation Graph (0, 0)][DBLP]
    DG.O, 2003, pp:- [Conf]
  42. Li Qin, Vijayalakshmi Atluri
    An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2003, pp:227-236 [Conf]
  43. Li Qin, Vijayalakshmi Atluri
    Ontology-Guided Change Detection to the Semantic Web Data. [Citation Graph (0, 0)][DBLP]
    ER, 2004, pp:624-638 [Conf]
  44. Vijayalakshmi Atluri, Qi Guo
    Unified Index for Mobile Object Data and Authorizations. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2005, pp:80-97 [Conf]
  45. Vijayalakshmi Atluri, Wei-kuang Huang
    An Authorization Model for Workflows. [Citation Graph (0, 0)][DBLP]
    ESORICS, 1996, pp:44-64 [Conf]
  46. Richard D. Holowczak, Soon Ae Chun, Francisco J. Artigas, Vijayalakshmi Atluri
    Customized Geospatial Workflows for E-Government Services. [Citation Graph (0, 0)][DBLP]
    ACM-GIS, 2001, pp:64-69 [Conf]
  47. Vijayalakshmi Atluri, Janice Warner
    Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:369-378 [Conf]
  48. Avigdor Gal, Vijayalakshmi Atluri, Gang Xu
    An Authorization System for Temporal Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2002, pp:339-340 [Conf]
  49. Vandana Pursnani Janeja, Vijayalakshmi Atluri
    FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. [Citation Graph (0, 0)][DBLP]
    ICDM, 2005, pp:661-664 [Conf]
  50. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:134-147 [Conf]
  51. Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri
    Modeling and Evaluation of Distributed Workflow Algorithms. [Citation Graph (0, 0)][DBLP]
    ISAS-SCI (1), 2001, pp:183-188 [Conf]
  52. Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam
    Collusion Set Detection Through Outlier Discovery. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:1-13 [Conf]
  53. Vijayalakshmi Atluri, Ravi Mukkamala
    Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. [Citation Graph (0, 0)][DBLP]
    MASCOTS, 2000, pp:248-0 [Conf]
  54. Mahmoud Youssef, Vijayalakshmi Atluri, Nabil R. Adam
    Preserving mobile customer privacy: an access control system for moving objects and customer profiles. [Citation Graph (0, 0)][DBLP]
    Mobile Data Management, 2005, pp:67-76 [Conf]
  55. Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
    Color Time Petri Net for Interactive Adaptive Multimedia Objects. [Citation Graph (0, 0)][DBLP]
    MMM, 2005, pp:147-157 [Conf]
  56. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
    A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1997, pp:1-12 [Conf]
  57. Wei-kuang Huang, Vijayalakshmi Atluri
    SecureFlow: A Secure Web-Enabled Workflow Management System. [Citation Graph (0, 0)][DBLP]
    ACM Workshop on Role-Based Access Control, 1999, pp:83-94 [Conf]
  58. Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
    Policy-Based Web Service Composition. [Citation Graph (0, 0)][DBLP]
    RIDE, 2004, pp:85-92 [Conf]
  59. Vijayalakshmi Atluri, Nabil R. Adam, Ahmed Gomaa, Igg Adiwijaya
    Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:927-934 [Conf]
  60. Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri
    Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. [Citation Graph (0, 0)][DBLP]
    SAC, 2004, pp:576-583 [Conf]
  61. Vandana Pursnani Janeja, Vijayalakshmi Atluri
    LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:493-497 [Conf]
  62. Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri
    Semantically enhanced enforcement of mobile consumer's privacy preferences. [Citation Graph (0, 0)][DBLP]
    SAC, 2006, pp:1172-1176 [Conf]
  63. Vijayalakshmi Atluri, Janice Warner
    Supporting conditional delegation in secure workflow management systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:49-58 [Conf]
  64. Janice Warner, Vijayalakshmi Atluri
    Inter-instance authorization constraints for secure workflow management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:190-199 [Conf]
  65. Vijayalakshmi Atluri
    Modification of Integrity Constraints Through Knowledge Discovery. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:191-209 [Conf]
  66. Dong-Ho Kim, Il Im, Vijayalakshmi Atluri
    A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:84-91 [Conf]
  67. Dong-Ho Kim, Il Im, Vijayalakshmi Atluri, Michael Bieber, Nabil R. Adam, Yelena Yesha
    A clickstream-based collaborative filtering personalization model: towards a better performance. [Citation Graph (0, 0)][DBLP]
    WIDM, 2004, pp:88-95 [Conf]
  68. Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya
    SI in Digital Libraries. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2000, v:43, n:6, pp:64-72 [Journal]
  69. Vijayalakshmi Atluri, Pierangela Samarati
    Security of Data and Transaction Processing - Guest Editor's Introduction. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2000, v:8, n:1, pp:5-6 [Journal]
  70. Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam
    Using Semantics for Policy-Based Web Service Composition. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2005, v:18, n:1, pp:37-64 [Journal]
  71. Vijayalakshmi Atluri, Ravi Mukkamala
    Employing an extended transaction model in multilevel secure transaction processing. [Citation Graph (0, 0)][DBLP]
    Informatica (Slovenia), 2002, v:26, n:2, pp:- [Journal]
  72. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    A theoretical formulation for degrees of isolation in databases. [Citation Graph (0, 0)][DBLP]
    Information & Software Technology, 1997, v:39, n:1, pp:47-53 [Journal]
  73. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia
    Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1993, v:2, n:4, pp:311-352 [Journal]
  74. Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni
    Chinese wall security for decentralized workflow management systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:6, pp:799-840 [Journal]
  75. Vijayalakshmi Atluri, Wei-kuang Huang
    A Petri Net Based Safety Analysis of Workflow Authorization Models. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:2/3, pp:- [Journal]
  76. Vijayalakshmi Atluri, Wei-kuang Huang
    Enforcing Mandatory and Discretionary Security in Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:4, pp:303-340 [Journal]
  77. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino
    A Semantic-Based Execution Model for Multilevel Secure Workflows. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2000, v:8, n:1, pp:- [Journal]
  78. Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala
    Multilevel Security Transaction Processing. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2001, v:9, n:3, pp:165-195 [Journal]
  79. Vijayalakshmi Atluri, Indrakshi Ray
    Editors' message for the special issue on security. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2004, v:4, n:3, pp:137-138 [Journal]
  80. Li Qin, Vijayalakshmi Atluri
    An Ontology-Guided Approach to Change Detection of the Semantic Web Data. [Citation Graph (0, 0)][DBLP]
    , 2006, v:, n:, pp:130-157 [Journal]
  81. Vijayalakshmi Atluri, Soon Ae Chun
    An Authorization Model for Geospatial Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Dependable Sec. Comput., 2004, v:1, n:4, pp:238-254 [Journal]
  82. Vijayalakshmi Atluri, Avigdor Gal
    An authorization model for temporal and derived data: securing information portals. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:1, pp:62-94 [Journal]
  83. Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri
    The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 1999, v:2, n:1, pp:65-104 [Journal]
  84. Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya, Sujata Banerjee, Richard D. Holowczak
    A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2001, v:13, n:4, pp:705-716 [Journal]
  85. Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari
    A Content-Based Authorization Model for Digital Libraries. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:2, pp:296-315 [Journal]
  86. Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino
    Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. [Citation Graph (0, 22)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1997, v:9, n:5, pp:697-708 [Journal]
  87. Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia
    The Partitioned Synchronization Rule for Planar Extendible Partial Orders. [Citation Graph (0, 3)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1995, v:7, n:5, pp:797-808 [Journal]
  88. Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo
    An authorization system for digital libraries. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2002, v:11, n:1, pp:58-67 [Journal]
  89. Vijayalakshmi Atluri, Heechang Shin
    Efficient Security Policy Enforcement in a Location Based Service Environment. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:61-76 [Conf]
  90. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
    The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:175-184 [Conf]
  91. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
    Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:235-244 [Conf]
  92. Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri
    Adapting spatial constraints of composite multimedia objects to achieve universal access. [Citation Graph (0, 0)][DBLP]
    IPCCC, 2005, pp:519-525 [Conf]
  93. Vijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni
    A decentralized execution model for inter-organizational workflows. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2007, v:22, n:1, pp:55-83 [Journal]

  94. The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP]


  95. Effective anonymization of query logs. [Citation Graph (, )][DBLP]


  96. Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. [Citation Graph (, )][DBLP]


  97. Role Mining in the Presence of Noise. [Citation Graph (, )][DBLP]


  98. An efficient online auditing approach to limit private data disclosure. [Citation Graph (, )][DBLP]


  99. Optimal Boolean Matrix Decomposition: Application to Role Engineering. [Citation Graph (, )][DBLP]


  100. Extended Boolean Matrix Decomposition. [Citation Graph (, )][DBLP]


  101. Texture-Based Remote-Sensing Image Segmentation. [Citation Graph (, )][DBLP]


  102. A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. [Citation Graph (, )][DBLP]


  103. Ensuring Privacy and Security for LBS through Trajectory Partitioning. [Citation Graph (, )][DBLP]


  104. Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP]


  105. Towards formal security analysis of GTRBAC using timed automata. [Citation Graph (, )][DBLP]


  106. Privacy-preserving trust verification. [Citation Graph (, )][DBLP]


  107. Concept-level access control for the Semantic Web. [Citation Graph (, )][DBLP]


  108. Anonymization models for directional location based service environments. [Citation Graph (, )][DBLP]


Search in 0.006secs, Finished in 0.457secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002