(Showing: 1 - 10 of 58)
(Showing: 1 - 58 of 58)
Claudio Bettini, X. Wang and Sushil Jajodia
"Information Release Control: A Learning-Based Architecture"
Journal of Data Semantics, Springer
, v.2
, 2005
, p.176
Claudio Bettini, Sushil Jajodia, and X. Sean Wang
"Reasoning with advanced policy rules and its application to access control"
Journal of Digital Libraries
, v.4
, 2004
, p.156
Claudio Bettini, Sushil Jajodia, X. Wang, and Duminda Wijesekera
"Provisions and obligations in policy rule management"
Journal of Network and Systems Management
, v.11
, 2003
, p.351
Claudio Bettini, X. Wang and Sushil Jajodia
"A Learning-based Aprroach to Information Release Control"
Sixth IFIP TC-11 WG 11.5 Working Conference on Integrity and Internal Control in Information Systems
, 2003
, p.83
Claudio Bettini, X. Wang, and Sushil Jajodia
"Identifying Sensitive Associations in Databases for Release Control"
VLDB Workshop on Secure Data Management in a Connected World (SDM)
, 2004
, p.187
Shiping Chen, Duminda Wijesekera, Sushil Jajodia
"Incorporating Dynamic Constraints in the Flexible Authorization Framework"
Proc. 9th European Symp. on Research in Computer Security (ESORICS)
, 2004
, p.1
Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera
"Parity-based inference control for multi-dimensional range sum queries"
Journal of Computer Security
, v.15
, 2007
Peter Chapin, Christian Skalka, Xiaoyang Sean Wang
"Risk assessment in distributed authorization"
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005
, 2005
, p.33
Lingyu Wang, Anyi Liu, Sushil Jajodia
"Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts"
Computer Communications
, v.29
, 2006
, p.2917
Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia
"SS7 over IP: Signaling internetworking vulnerabilities"
IEEE Network
, v.20
, 2006
, p.32
Csilla Farkas, Alexander Brodsky, Sushil Jajodia
"Unauthorized inferences in semi-structured databases"
Information Sciences
, v.176
, 2006
, p.3269
Joseph Pamula, Paul Ammann, Sushil Jajodia, Vipin Swarup
"A weakest-adversary security metric for network configuration security analysis"
Proc. ACM 2nd Workshop on Quality of Protection, Alexandria, VA
, 2006
, p.31
Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald Ritchey
"A framework for establishing, assessing, and managing trust in inter-organizational relationships"
Proc. ACM Workshop on Secure Web Services (SWS)
, 2006
, p.23
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
"Interactive analysis of attack graphs using relational queries"
Proc.20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, 2006
, p.119
Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
"Creating objects in the flexible authorization framework"
Proc.20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, 2006
, p.1
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia
"GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks"
Journal of Computer Security
, v.14
, 2006
, p.301
Shiping Chen, Xinyuan Wang, Sushil Jajodia
"On anonymity and traceability of peer-to-peer VoIP calls"
IEEE Network
, v.20
, 2006
, p.32
Lingyu Wang, Steven Noel, Sushil Jajodia
"Minimum-cost network hardening using attack graphs"
Computer Communications
, v.29
, 2006
, p.3812
Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli
"Building trust in peer-to-peer systems: A review"
International Journal of Security and Networks
, v.1
, 2006
, p.103
Anoop Singhal, Sushil Jajodia
"Data warehousing and data mining techniques for intrusion detection systems"
Distributed and Parallel Databases
, v.20
, 2006
, p.149
Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia
"LHAP: A lightweight network access control protocol for ad hoc networks"
Ad Hoc Networks
, v.4
, 2006
, p.567
Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia
"A fragile watermarking scheme for detecting malicious modifications of database relations"
Information Sciences
, v.176
, 2006
, p.1350
Claudio Bettini, Sushil Jajodia, X. Sean Wang, and Duminda Wijesekera
"Reasoning with advanced policy rules and its application to access control"
Journal of Digital Libraries
, v.4
, 2004
, p.156
Chao Yao, X. Sean Wang, and Sushil Jajodia
"Checking for k-Anonymity Violation by Views"
VLDB 2005
, 2005
, p.910
Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, and Sushil Jajodia
"Indistinguishability: The other aspect of privacy"
Secure Data Management, Third VLDB Workshop, SDM 2006
, 2006
, p.1
C. Bettini, X. S. Wang, S. Jajodia
"The Role of Quasi-identifiers in k-Anonymity Revisited"
ACM Computing Research Repository
, 2006
arXiv:cs/0611035v
Vipin Swarup, Sushil Jajodia, and Joseph Pamula
"Rule-Based Topological Vulnerability Analysis"
Springer Lecture Notes in Computer Science, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
, v.3685
, 2005
, p.23
Gao, L; Wang, M; Wang, XS
"Evaluating trigger conditions on streaming time series with user-given quality requirements"
JOURNAL OF UNIVERSAL COMPUTER SCIENCE
, v.11
, 2005
, p.1397
View record at Web of Science
Guo, HP; Li, YJ; Jajodia, S
"Chaining watermarks for detecting malicious modifications to streaming data"
INFORMATION SCIENCES
, v.177
, 2007
, p.281
View record at Web of Science
10.1016/j.ins.2006.03.01
Farkas, C; Brodsky, A; Jajodia, S
"Unauthorized inferences in semistructured databases"
INFORMATION SCIENCES
, v.176
, 2006
, p.3269
View record at Web of Science
10.1016/j.ins.2006.01.00
Chen, SP; Wang, XY; Jajodia, S
"On the anonymity and traceability of peer-to-peer VoIP calls"
IEEE NETWORK
, v.20
, 2006
, p.32
View record at Web of Science
Guo, HP; Li, YJ; Liu, AY; Jajodia, S
"A fragile watermarking scheme for detecting malicious modifications of database relations"
INFORMATION SCIENCES
, v.176
, 2006
, p.1350
View record at Web of Science
10.1016/j.ins.2005.06.00
Damiani, E; di Vimercati, SD; Foresti, S; Jajodia, S; Paraboschi, S; Samarati, P
"Metadata management in outsourced encrypted databases"
SECURE DATA MANAGEMENT, PROCEEDINGS
, v.3674
, 2005
, p.16
View record at Web of Science
Bettini, C; Wang, XS; Jajodia, S
"Protecting privacy against location-based personal identification"
SECURE DATA MANAGEMENT, PROCEEDINGS
, v.3674
, 2005
, p.185
View record at Web of Science
Bettini, C; Wang, XS; Jajodia, S
"Information release control: A learning-based architecture"
JOURNAL ON DATA SEMANTICS II
, v.3360
, 2005
, p.176
View record at Web of Science
Chen, SP; Wijesekera, D; Jajodia, S
"Incorporating dynamic constraints in the flexible authorization framework"
COMPUTER SECURITY ESORICS 2004, PROCEEDINGS
, v.3193
, 2004
, p.1
View record at Web of Science
Bettini, C; Wang, XYS; Jajodia, S
"Identifying sensitive associations in databases for release control"
SECURE DATA MANAGEMENT, PROCEEDINGS
, v.3178
, 2004
, p.187
View record at Web of Science
Wang, LY; Noel, S; Jajodia, S
"Minimum-cost network hardening using attack graphs"
COMPUTER COMMUNICATIONS
, v.29
, 2006
, p.3812
View record at Web of Science
10.1016/j.comcom.2006.06.01
Zhu, SC; Yao, C; Liu, DG; Setia, S; Jajodia, S
"Efficient security mechanisms for overlay multicast based content delivery"
COMPUTER COMMUNICATIONS
, v.30
, 2007
, p.793
View record at Web of Science
10.1016/j.comcom.2006.10.00
Alexander Brodsky, Lei Zhang, and Sushil Jajodia
"Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases"
Springer Lecture Notes in Computer Science: 4th VLDB Workshop, SDM 2007
, 2007
, p.81
Lingyu Wang, Sushil Jajodia, and Duminda Wijesekera
"Preserving Privacy in On-line Analytical Processing Data Cubes"
Springer Advances in Information Security: Secure Data Management in Decentralized Systems
, 2007
, p.355
Sushil Jajodia and Duminda Wijesekera
"A Flexible Authorization Framework for E-Commerce"
Springer Lecture Notes in Computer Science: First International Conference, ICDCIT 2004
, 2004
, p.336
Sushil Jajodia and Steven Noel
"Topological Vulnerability Analysis: A Powerful New Approach for Network Attack Prevention, Detection, and Response"
Indian Statistical Institute Monograph Series, World Scientific Press, 2007
, 2007
Steven Noel, Michael Jacobs, Pramod Kalapa, and Sushil Jajodia
"Multiple Coordinated Views for Network Attack Graphs"
IEEE Workshops on Visualization for Computer Security (VizSec'05)
, 2005
, p.12
E. Damiani, S. De Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati
"An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing"
IFIP International Federation for Information Processing: Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007)
, 2007
, p.385
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, and Peng Ning
"Interleaved hop-by-hop authentication against false data injection attacks in sensor networks"
ACM Transactions on Sensor Networks
, v.3
, 2007
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati
"Controlled Information Sharing in Collaborative Distributed Query Processing"
The 28th International Conference on Distributed Computing Systems
, 2008
Lingyu Wang, Anoop Singhal, and Sushil Jajodia
"Toward measuring network security using attack graphs"
Proceedings of the 2007 ACM workshop on Quality of protection
, 2007
, p.49
Lingyu Wang, Anoop Singhal, and Sushil Jajodia
"Measuring the Overall Security of Network Configurations Using Attack Graphs"
Springer Lecture Notes in Computer Science: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, 2007
, p.98
Chao Yao, William H. Winsborough, and Sushil Jajodia
"A Hierarchical Release Control Policy Framework"
IFIP International Federation for Information Processing: IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference
, 2006
, p.121
Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati
"Fragmentation and Encryption to Enforce Privacy in Data Storge"
Springer Lecture Notes in Computer Science: 12th European Symposium On Research In Computer Security
, 2007
, p.171
Lei Zhang, A. Brodsky, V. Swarup, and S. Jajodia
"A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling"
IEEE Workshop on Policies for Distributed Systems and Networks, 2008. POLICY 2008.
, 2008
, p.181
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera
"Maintaining privacy on derived objects"
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
, 2005
, p.10
Lei Zhang, Sushil Jajodia, and Alexander Brodsky
"Information disclosure under realistic assumptions: privacy versus optimality"
Proceedings of the 14th ACM conference on Computer and communications security
, 2007
, p.573
Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, and Pierangela Samarati
"Over-encryption: management of access control evolution on outsourced data"
Proceedings of the 33rd international conference on Very large data bases
, 2007
, p.123
L. Wang and S. Jajodia
"An Approach to Preventing, Correlating, and Predicting Multistep Network Attacks"
Springer, Lecture Notes in Computer Science: Intrusion Detection Systems
, 2008
, p.93
Sergio Mascetti, Claudio Bettini, X. Sean Wang, and Sushil Jajodia
"k-Anonymity in Databases with Timestamped Data"
13th International Symposium on Temporal Representation and Reasoning (TIME 2006)
, 2006
, p.177
Sabrina De Capitani di Vimercati, Sara Forseti, Pierangela Samarati, and Sushil Jajodia
"Access control policies and languages"
International Journal of Computational Science and Engineering
, v.3
, 2007
, p.94
(Showing: 1 - 10 of 58)
(Showing: 1 - 58 of 58)