


default search action
Dawn N. Jutla
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Christian Liu
, Peter Bodorik
, Dawn N. Jutla
:
Transforming Automatically BPMN Models to Smart Contracts with Nested Trade Transactions (TABS+). Distributed Ledger Technol. Res. Pract. 3(3): 21:1-21:37 (2024) - 2022
- [c54]Christian G. Liu
, Peter Bodorik, Dawn N. Jutla:
Supporting Long-term Transactions in Smart Contracts. BCCA 2022: 11-19 - 2021
- [c53]Christian Liu
, Peter Bodorik, Dawn N. Jutla:
A Tool for Moving Blockchain Computations Off-Chain. BSCI 2021: 103-109 - [c52]Peter Bodorik, Christian G. Liu
, Dawn N. Jutla:
Using FSMs to Find Patterns for Off-Chain Computing: Finding Patterns for Off-Chain Computing with FSMs. ICBCT 2021: 28-34
2010 – 2019
- 2015
- [c51]Naureen Ali, Dawn N. Jutla, Peter Bodorik
:
PIP: An Injection Pattern for Inserting Privacy Patterns and Services in Software. APF 2015: 144-157 - [c50]Dawn N. Jutla, Peter Bodorik
:
PAUSE: A privacy architecture for heterogeneous big data environments. IEEE BigData 2015: 1919-1928 - 2013
- [c49]Dawn N. Jutla, Peter Bodorik
, Sohail Ali:
Engineering Privacy for Big Data Apps with the Unified Modeling Language. BigData Congress 2013: 38-45 - 2012
- [c48]Dawn N. Jutla, D. Veerasekaran, R. Ding:
Trade-Offs in a Google Distance and a WordNet Hybrid for QoS-Enabled Web Services Composition. IEEE SCC 2012: 312-319 - 2011
- [c47]R. Ding, Dawn N. Jutla:
Flexible Ontology-Independent and QOS-Enabled Dynamic Web Services Composition Using Google Distance. IEEE SCC 2011: 266-273 - [c46]M. S. Qaiser, Peter Bodorik
, Dawn N. Jutla:
Differential Caches for Web Services in Mobile Environments. ICWS 2011: 644-651
2000 – 2009
- 2009
- [j10]Dawn N. Jutla, Dimitri Kanevsky:
wisePad services for vision-, hearing-, and speech-impaired users. Commun. ACM 52(1): 64-69 (2009) - [j9]Xiangdong An
, Dawn N. Jutla, Nick Cercone, Charnyote Pluempitiwiriyawej, Hai Wang:
Uncertain inference control in privacy protection. Int. J. Inf. Sec. 8(6): 423-431 (2009) - 2008
- [j8]Dawn N. Jutla, Wei Yu:
Applying the Delta model to mobile marketing management in the US marketplace. Int. J. Electron. Bus. 6(3): 216-231 (2008) - [c45]Peter Bodorik
, Dawn N. Jutla:
Privacy with Web Serivces: Intelligence Gathering and Enforcement. Web Intelligence/IAT Workshops 2008: 546-549 - [c44]Peter Bodorik
, Dawn N. Jutla, Mike Xuehai Wang:
Consistent privacy preferences (CPP): model, semantics, and properties. SAC 2008: 2368-2375 - 2007
- [c43]Dawn N. Jutla:
Usable SPACE: Security, Privacy, and Context for the Mobile User. Financial Cryptography 2007: 245 - [c42]Nolan Zhang, Peter Bodorik, Dawn N. Jutla:
Compliance of Privacy Policies with Legal Regulations - Compliance of Privacy Policies with Canadian PIPEDA. ICE-B 2007: 277-284 - [c41]Rafiy Saleh, Dawn N. Jutla, Peter Bodorik
:
Management of Users' Privacy Preferences in Context. IRI 2007: 91-97 - 2006
- [j7]Dawn N. Jutla, Peter Bodorik
, Yanjun Zhang:
PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web. Inf. Syst. 31(4-5): 295-320 (2006) - [c40]Xiangdong An
, Dawn N. Jutla, Nick Cercone:
Privacy intrusion detection using dynamic Bayesian networks. ICEC 2006: 208-215 - [c39]Xiangdong An, Dawn N. Jutla, Nick Cercone:
Auditing and Inference Control for Privacy Preservation in Uncertain Environments. EuroSSC 2006: 159-173 - [c38]Yingxin (Sheila) He, Dawn N. Jutla:
Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web. HICSS 2006 - [c37]Xiangdong An
, Dawn N. Jutla, Nick Cercone:
A Bayesian Network Approach to Detecting Privacy Intrusion. IAT Workshops 2006: 73-76 - [c36]Dawn N. Jutla, Dimitri Kanevsky:
Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures. IAT Workshops 2006: 77-84 - [c35]Xiangdong An
, Dawn N. Jutla, Nick Cercone:
Probabilistic Internal Privacy Intrusion Detection. IDEAS 2006: 317-318 - [c34]Xiangdong An, Dawn N. Jutla, Nick Cercone:
Dynamic inference control in privacy preference enforcement. PST 2006: 24 - [c33]Xiangdong An, Dawn N. Jutla, Nick Cercone:
Temporal Context Lie Detection and Generation. Secure Data Management 2006: 30-47 - [c32]Xiangdong An
, Dawn N. Jutla, Nick Cercone:
Privacy Preserving Multiagent Probabilistic Reasoning about Ambiguous Contexts: A Case Study. Web Intelligence 2006: 801-807 - [c31]Xiangdong An
, Dawn N. Jutla, Nick Cercone:
Reasoning about obfuscated private information: who have lied and how to lie. WPES 2006: 85-88 - 2005
- [j6]Dawn N. Jutla, Peter Bodorik
:
Sociotechnical Architecture for Online Privacy. IEEE Secur. Priv. 3(2): 29-39 (2005) - [c30]Wei Yu, Dawn N. Jutla, Shyamala C. Sivakumar:
A Churn-Strategy Alignment Model for Managers in Mobile Telecom. CNSR 2005: 48-53 - [c29]Yaomin Fu, Peter Bodorik
, Dawn N. Jutla:
A Self-Managed Predicate-Based Cache. CNSR 2005: 313-318 - [c28]Dawn N. Jutla, Yanjun Zhang:
Maturing e-Privacy with P3P and Context Agents. EEE 2005: 536-541 - [c27]Yueping Lu, Peter Bodorik
, Dawn N. Jutla:
Evaluation of Integration of ACBL and AOCC Caching Algorithms. IDEAS 2005: 398-405 - [c26]Vlado Keselj
, Dawn N. Jutla:
QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software. Web Intelligence 2005: 718-724 - 2004
- [c25]Dawn N. Jutla, Liming Xu:
Privacy Agents and Ontology for the Semantic Web. AMCIS 2004: 210 - [c24]Peter Bodorik, Dawn N. Jutla, Yueping Lu:
Interoperable Server-Based Cache Consistency Algorithm. IDEAS 2004: 312-321 - [c23]Dawn N. Jutla, Peter Bodorik
, Deyun Gao:
Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. Secure Data Management 2004: 100-117 - [c22]Yiyu Yao, Jingtao Yao, Cory J. Butz, Pawan Lingras, Dawn N. Jutla:
Web-based Support Systems (WSS): A Report of the WIC Canada Research Centre. Web Intelligence 2004: 787-788 - [c21]Dawn N. Jutla, E. Kevin Kelloway, Said Saifi:
Evaluation of User Intervention Mechanisms for Privacy on SME Online Trust. CEC 2004: 281-288 - 2003
- [c20]Peter Bodorik, Dawn N. Jutla:
A Client-Side Business Model for Electronic Privacy. Bled eConference 2003: 1 - [c19]Peter Bodorik, Dawn N. Jutla:
Architecture for User-Controlled e-Privacy. SAC 2003: 609-616 - 2002
- [j5]Dawn N. Jutla, Peter Bodorik
, Jasbir Singh Dhaliwal:
Supporting the e-business readiness of small and medium-sized enterprises: approaches and metrics. Internet Res. 12(2): 139-164 (2002) - [c18]Peter Bodorik, Shawn Best, Dawn N. Jutla:
QoS Monitoring In Middleware. ECIS 2002: 361-370 - [c17]Dawn N. Jutla, Peter Bodorik, Terrance Weatherbee, Barry Hudson:
e-government In Execution : Building Organizational Infrastructure. ECIS 2002: 1465-1476 - [c16]Dawn N. Jutla, Peter Bodorik
, Jasbir Singh Dhaliwal:
Government Support for E-readiness of Small and Medium Sized Enterprises. HICSS 2002: 127 - [c15]Peter Bodorik, Shawn Best, Dawn N. Jutla:
Toolkit for QoS Monitoring in Middleware. ICEIS 2002: 244-249 - [c14]Dawn N. Jutla, Terrance Weatherbee:
Supporting CLEAR: A Strategy for Small and Medium Size Enterprise Adoption of e-Business Practices in Atlantic Canada. E-Business: Multidisciplinary Research and Practice 2002: 169-186 - 2001
- [c13]Dawn N. Jutla, Peter Bodorik
, Y. Cai:
Interoperability for Accessing DBs by E-Commerce Applications. HICSS 2001 - [c12]Dawn N. Jutla, James Craig, Peter Bodorik
:
Enabling and Measuring Electronic Customer Relationship Management Readiness. HICSS 2001 - [c11]Dawn N. Jutla, James Craig, Peter Bodorik
:
A Methodology for Creating E-Business Strategy. HICSS 2001 - 2000
- [c10]Dawn N. Jutla, Peter Bodorik
, Yie Wang:
A Step towards a Suite of E-commerce Benchmarks. EC-Web 2000: 419-428
1990 – 1999
- 1999
- [j4]Dawn N. Jutla, Peter Bodorik
, Catherine Hajnal, Charles Davis:
Making Business Sense of Electronic Commerce. Computer 32(3): 67-75 (1999) - [j3]Dawn N. Jutla, Peter Bodorik
, Yie Wang:
Developing Internet E-Commerce Benchmarks. Inf. Syst. 24(6): 475-493 (1999) - [c9]Peter Bodorik, Dawn N. Jutla, A. Agarwal:
Recoverable Virtual Memory through the Multi-View Memory Computer System. HICSS 1999 - [c8]Dawn N. Jutla, Peter Bodorik, Shaohua Ma, Yie Wang:
WebTP: A Benchmark for Web-based Order Management Systems. HICSS 1999 - [c7]Peter Bodorik, Dawn N. Jutla, Jacob Slonim, A. Agarwal:
Locking with Different Granularities for Reads and Writes in an MVM System. IDEAS 1999: 311-320 - [c6]Dawn N. Jutla, Peter Bodorik, Yie Wang:
WebEC: A Benchmark for the Cybermediary Business Model in E-Commerce. IMSA 1999: 388-392 - 1998
- [j2]Peter Bodorik
, Dawn N. Jutla:
Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems. Comput. J. 41(2): 84-97 (1998) - [c5]Dawn N. Jutla, Peter Bodorik:
Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory. HICSS (3) 1998: 197-206 - [c4]Dawn N. Jutla, Peter Bodorik:
A Benchmark Suite for Electronic Commerce. WebNet 1998 - 1997
- [j1]Dawn N. Jutla, Peter Bodorik:
Improving applications performance: a memory model and cache architecture. SIGARCH Comput. Archit. News 25(4): 22-29 (1997) - [c3]Peter Bodorik, Dawn N. Jutla:
Multi-view Memory To Support OS Locking for Transaction Systems. IDEAS 1997: 45-52 - 1994
- [c2]Peter Bodorik
, Dawn N. Jutla:
Multi-View Access Control Memory Computer System. ACM Conference on Computer Science 1994: 241-248 - 1993
- [c1]Dawn N. Jutla, Peter Bodorik, J. Spruce Riordon:
Integrated Concurrency-Coherence Control in Distributed Shared Memory. ICCI 1993: 251-255
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:02 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint