dblp.uni-trier.dewww.uni-trier.de

Sushil Jajodia

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
358EEMauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009)
2008
357 Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang: Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 CEUR-WS.org 2008
356 Sushil Jajodia, Pierangela Samarati, Stelvio Cimato: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy Springer 2008
355 Sushil Jajodia, Javier López: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings Springer 2008
354EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Assessing query privileges via safe and efficient permission composition. ACM Conference on Computer and Communications Security 2008: 311-322
353EELei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204
352EEClaudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati: Regulating Exceptions in Healthcare Using Policy Spaces. DBSec 2008: 254-267
351EELingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296
350EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Controlled Information Sharing in Collaborative Distributed Query Processing. ICDCS 2008: 303-310
349EELei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia: A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. POLICY 2008: 181-188
348EEClaudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin: A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008
347EESergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008
346EEMarcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30
345EESteven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230
344EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15
343EELei Zhang, Sushil Jajodia, Alexander Brodsky: Simulatable Binding: Beyond Simulatable Auditing. Secure Data Management 2008: 16-31
342EEYih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28
341EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati: Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84
340EESabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Data Security. Wiley Encyclopedia of Computer Science and Engineering 2008
339EEHemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008)
338EESteven Noel, Sushil Jajodia: Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. J. Network Syst. Manage. 16(3): 259-275 (2008)
337EELingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008)
336EESongqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia: Achieving simultaneous distribution control and privacy protection for Internet media delivery. TOMCCAP 4(2): (2008)
2007
335 Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007
334EELei Zhang, Sushil Jajodia, Alexander Brodsky: Information disclosure under realistic assumptions: privacy versus optimality. ACM Conference on Computer and Communications Security 2007: 573-583
333EEBo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267
332EESabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Trust management services in relational databases. ASIACCS 2007: 149-160
331EESushil Jajodia: Topological analysis of network attack vulnerability. ASIACCS 2007: 2
330EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: A data outsourcing architecture combining cryptography and access control. CSAW 2007: 63-69
329EELingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112
328EEValentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragmentation and Encryption to Enforce Privacy in Data Storage. ESORICS 2007: 171-186
327EEXinyuan Wang, Shiping Chen, Sushil Jajodia: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. IEEE Symposium on Security and Privacy 2007: 116-130
326EEClaudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia: Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76
325EEClaudio Bettini, Sushil Jajodia, Linda Pareschi: Anonymity and Diversity in LBS: A Preliminary Investigation. PerCom Workshops 2007: 577-580
324EELingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54
323EEErnesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. SEC 2007: 385-396
322EEAlexander Brodsky, Lei Zhang, Sushil Jajodia: Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. Secure Data Management 2007: 81-95
321EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Over-encryption: Management of Access Control Evolution on Outsourced Data. VLDB 2007: 123-134
320EESabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati: Access Control Policies and Languages in Open Environments. Secure Data Management in Decentralized Systems 2007: 21-58
319EESushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20
318EELingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380
317EEMeng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94
316EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007)
315EEErnesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Selective Data Encryption in Outsourced Dynamic Environments. Electr. Notes Theor. Comput. Sci. 168: 127-142 (2007)
314EEPeng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007)
313EEHuiping Guo, Yingjiu Li, Sushil Jajodia: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007)
312EELingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007)
311EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007)
2006
310 Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Lin, Shiuhpyng Shieh, Sushil Jajodia: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 ACM 2006
309EEBo Zhu, Sanjeev Setia, Sushil Jajodia: Providing witness anonymity in peer-to-peer systems. ACM Conference on Computer and Communications Security 2006: 6-16
308EEShiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia: V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. ACSAC 2006: 43-56
307EENicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14
306EELingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132
305EEHemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402
304EELei Zhang, Alexander Brodsky, Sushil Jajodia: Toward Information Sharing: Benefit And Risk Access Control (BARAC). POLICY 2006: 45-53
303EESushil Jajodia: Topological analysis of network attack vulnerability. PST 2006: 2
302EEJoseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup: A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38
301EEMaria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia: A robust watermarking system based on SVD compression. SAC 2006: 1341-1347
300EEDavid Keppler, Vipin Swarup, Sushil Jajodia: Redirection policies for mission-based information sharing. SACMAT 2006: 210-218
299EESankardas Roy, Sanjeev Setia, Sushil Jajodia: Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82
298EEJoseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey: A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32
297EEChao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17
296EESergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186
295EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006)
294EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: The Role of Quasi-identifiers in k-Anonymity Revisited CoRR abs/cs/0611035: (2006)
293EELingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006)
292EELingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006)
291EEAnoop Singhal, Sushil Jajodia: Data warehousing and data mining techniques for intrusion detection systems. Distributed and Parallel Databases 20(2): 149-166 (2006)
290EEShiping Chen, Xinyuan Wang, Sushil Jajodia: On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network 20(5): 32-37 (2006)
289EEHemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006)
288EEBo Zhu, Sushil Jajodia, Mohan S. Kankanhalli: Building trust in peer-to-peer systems: a review. IJSN 1(1/2): 103-112 (2006)
287EEHuiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006)
286EECsilla Farkas, Alexander Brodsky, Sushil Jajodia: Unauthorized inferences in semistructured databases. Inf. Sci. 176(22): 3269-3299 (2006)
285EEYingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
284EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006)
283EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006)
2005
282 Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous: Journal on Data Semantics II Springer 2005
281 Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005
280 Sushil Jajodia, Chandan Mazumdar: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings Springer 2005
279EEXinyuan Wang, Shiping Chen, Sushil Jajodia: Tracking anonymous peer-to-peer VoIP calls on the internet. ACM Conference on Computer and Communications Security 2005: 81-91
278EESencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55
277EESteven Noel, Sushil Jajodia: Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. ACSAC 2005: 160-169
276EESabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Policies, Models, and Languages for Access Control. DNIS 2005: 225-237
275EEHemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170
274EELingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266
273EEHemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005
272EEVipin Swarup, Sushil Jajodia, Joseph Pamula: Rule-Based Topological Vulnerability Analysis. MMM-ACNS 2005: 23-37
271EEDonggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132
270EEErnesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Metadata Management in Outsourced Encrypted Databases. Secure Data Management 2005: 16-32
269EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199
268EEErnesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Key management for multi-user encrypted databases. StorageSS 2005: 74-83
267EEChao Yao, Xiaoyang Sean Wang, Sushil Jajodia: Checking for k-Anonymity Violation by Views. VLDB 2005: 910-921
266EESteven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia: Multiple Coordinated Views for Network Attack Graphs. VizSEC 2005: 12
265EENicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19
264 Anoop Singhal, Sushil Jajodia: Data Mining for Intrusion Detection. The Data Mining and Knowledge Discovery Handbook 2005: 1225-1237
263EEAlberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1): 119-152 (2005)
262EEYingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005)
261EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Information Release Control: A Learning-Based Architecture. J. Data Semantics 2: 176-198 (2005)
2004
260 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004
259 Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004
258EESteven Noel, Eric Robertson, Sushil Jajodia: Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. ACSAC 2004: 350-359
257 Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94
256EEYingjiu Li, Huiping Guo, Sushil Jajodia: Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82
255EEShiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16
254EELingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55
253EESushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345
252EEKaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384
251EELingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161-
250EESencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271
249EESencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51
248EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201
247EESteven Noel, Sushil Jajodia: Managing attack graph complexity through visual hierarchical aggregation. VizSEC 2004: 109-118
246EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004)
245 Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004)
2003
244 Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003
243 Sushil Jajodia, Pierangela Samarati, Paul F. Syverson: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 ACM 2003
242 Sushil Jajodia, Michiharu Kudo: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003 ACM 2003
241EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72
240EEErnesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Balancing confidentiality and efficiency in untrusted relational DBMSs. ACM Conference on Computer and Communications Security 2003: 93-102
239EESteven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs: Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ACSAC 2003: 86-95
238EEKenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeff Hoyt: Securely sharing neuroimagery. CIKM 2003: 375-377
237 Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371
236EEYingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141
235EELingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115
234EESencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163-
233EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749-
232EESencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335
231EEErnesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia: Implementation of a Storage Mechanism for Untrusted DBMSs. IEEE Security in Storage Workshop 2003: 38-46
230EESencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10
229EESencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118
228 Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto: Bootstrapping a Data Mining Intrusion Detection System. SAC 2003: 421-425
227 Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle: A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276
226EESencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309
225EESushil Jajodia: Recent Advances in Access Control Models. WAIM 2003: 1
224EEDuminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003)
223EEDuminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003)
222EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003)
221 Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
220EEAlessandro Mei, Luigi V. Mancini, Sushil Jajodia: Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distrib. Syst. 14(9): 885-896 (2003)
219 Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003)
218 Daniel Barbará, Rajni Goel, Sushil Jajodia: A Checksum-based Corruption Detection Technique. Journal of Computer Security 11(3): 315-330 (2003)
2002
217 Sushil Jajodia, Pierangela Samarati: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002 ACM 2002
216EEDuminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180
215EEYingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
214 Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131
213 Daniel Barbará, Rajni Goel, Sushil Jajodia: Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189
212EELingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71
211EEYingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159
210EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12
209EERoberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73
208EEYingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170
207 Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434
206 Kenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia: Propagating Modifications to Mobile Policies. SEC 2002: 573-584
205EEClaudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513
204 Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
203EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002)
202EEPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
201EESusan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad: Consistent policy enforcement in distributed systems using mobile policies. Data Knowl. Eng. 43(3): 261-280 (2002)
200 Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases 11(3): 269-306 (2002)
199EEPaul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002)
198 Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002)
197 Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002)
196EECsilla Farkas, Sushil Jajodia: The Inference Problem: A Survey. SIGKDD Explorations 4(2): 6-11 (2002)
2001
195 Hideko S. Kunii, Sushil Jajodia, Arne Sølvberg: Conceptual Modeling - ER 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings Springer 2001
194EEDuminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47
193EEPeng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205
192EEÅsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58
191 Ravi Mukkamala, Sushil Jajodia: A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238
190 Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15
189 Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74
188 Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346
187 Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi: Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260
186EEYingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
185EESushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2): 214-260 (2001)
184EEPeng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
183EEPierangela Samarati, Michael K. Reiter, Sushil Jajodia: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001)
182EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001)
181 Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001)
180EEDaniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record 30(4): 15-24 (2001)
2000
179EEVinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean: Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ACSAC 2000: 298-307
178 Daniel Barbará, Rajni Goel, Sushil Jajodia: Protecting File systems Against Corruption Using Checksums. DBSec 2000: 113-124
177 Susan Chapin, Donald B. Faatz, Sushil Jajodia: Distributed Policies for Data Management Making Policies Mobile. DBSec 2000: 63-76
176EEPeng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640
175EEDaniel Barbará, Rajni Goel, Sushil Jajodia: Using Checksums to Detect Data Corruption. EDBT 2000: 136-149
174EESanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. IEEE Symposium on Security and Privacy 2000: 215-228
173 Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
172EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-38
171EEYingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19
170EEPeng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)
169EEPeng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000)
168EELuigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000)
167EEIndrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000)
166EEAlexander Brodsky, Csilla Farkas, Sushil Jajodia: Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000)
165 Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000)
164 Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): (2000)
1999
163 Sushil Jajodia: Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece Kluwer 1999
162EEAmgad Fayad, Sushil Jajodia, Catherine D. McCollum: Application-Level Isolation Using Data Inconsistency Detection. ACSAC 1999: 119-
161 Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18
160 Ravi Mukkamala, Jason Gagnon, Sushil Jajodia: Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46
159EEPeng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423
158 Sushil Jajodia: Protecting Critical Information Systems (Abstract). ICICS 1999: 143
157 Paul Ammann, Sushil Jajodia: The Integrity Challenge. IICIS 1999: 59-70
156 Neil F. Johnson, Zoran Duric, Sushil Jajodia: Recovery of Watermarks from Distorted Images. Information Hiding 1999: 318-332
155 Neil F. Johnson, Zoran Duric, Sushil Jajodia: On Fingerprinting Images for Recognition. Multimedia Information Systems 1999: 4-11
154EEElisa Bertino, Sushil Jajodia, Pierangela Samarati: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Inf. Syst. 17(2): 101-140 (1999)
153EESushil Jajodia, Catherine D. McCollum, Paul Ammann: Trusted Recovery. Commun. ACM 42(7): 71-75 (1999)
152 Sushil Jajodia, Paul Ammann, Catherine D. McCollum: Surviving Information Warfare Attacks. IEEE Computer 32(4): 57-63 (1999)
151EESushil Jajodia: Distributed Databases: Turing Award Winner Jim Gray on the new millennium. IEEE Concurrency 7(3): 9-10 (1999)
150EEChunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999)
1998
149 Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 Kluwer 1998
148 Opher Etzion, Sushil Jajodia, Suryanarayana M. Sripada: Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997) Springer 1998
147 Sushil Jajodia, M. Tamer Özsu, Asuman Dogac: Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings Springer 1998
146EESushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82
145EESushil Jajodia, Luigi V. Mancini, Sanjeev Setia: A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178
144EEJia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia: Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. CSFW 1998: 190-201
143 Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284
142 Giovanni Rumolo, Sushil Jajodia: Algebra for Databases with Explicit Markings of Damaged Data. IICIS 1998: 103-129
141EENeil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. Information Hiding 1998: 273-289
140 Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998)
139 Neil F. Johnson, Sushil Jajodia: Exploring Steganography: Seeing the Unseen. IEEE Computer 31(2): 26-34 (1998)
138EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998)
137EEElisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998)
136EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin: Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998)
135EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998)
134EEXiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni: Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. International Journal on Artificial Intelligence Tools 7(2): 319-339 (1998)
133 Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998)
1997
132 Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 Chapman Hall 1997
131 Sushil Jajodia, Larry Kerschberg: Advanced Transaction Models and Architectures Kluwer 1997
130 Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88
129 Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449
128 Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218
127 Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16
126EEElena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia: Providing flexibility in information flow control for object oriented systems. IEEE Symposium on Security and Privacy 1997: 130-140
125EEPaul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Surviving information warfare attacks on databases. IEEE Symposium on Security and Privacy 1997: 164-174
124EESushil Jajodia, Pierangela Samarati, V. S. Subrahmanian: A Logical Language for Expressing Authorizations. IEEE Symposium on Security and Privacy 1997: 31-42
123EESushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino: A Unified Framework for Enforcing Multiple Access Control Policies. SIGMOD Conference 1997: 474-485
122EEYu Wu, Sushil Jajodia, Xiaoyang Sean Wang: Temporal Database Bibliography Update. Temporal Databases, Dagstuhl 1997: 338-366
121EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55
120EEChristian S. Jensen, Curtis E. Dyreson, Michael H. Böhlen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Fabio Grandi, Patrick J. Hayes, Sushil Jajodia, Wolfgang Käfer, Nick Kline, Nikos A. Lorentzos, Yannis G. Mitsopoulos, Angelo Montanari, Daniel A. Nonen, Elisa Peressi, Barbara Pernici, John F. Roddick, Nandlal L. Sarda, Maria Rita Scalas, Arie Segev, Richard T. Snodgrass, Michael D. Soo, Abdullah Uz Tansel, Paolo Tiberio, Gio Wiederhold: The Consensus Glossary of Temporal Database Concepts - February 1998 Version. Temporal Databases, Dagstuhl 1997: 367-405
119 Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0-
118 Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0-
117 Sushil Jajodia: Database Security and Privacy. The Computer Science and Engineering Handbook 1997: 1112-1124
116EEXiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia: Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997)
115EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997)
114EEOuri Wolfson, Sushil Jajodia, Yixiu Huang: An Adaptive Data Replication Algorithm. ACM Trans. Database Syst. 22(2): 255-314 (1997)
113EEElisa Bertino, Pierangela Samarati, Sushil Jajodia: An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101 (1997)
112EEPierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538 (1997)
111EEVijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997)
110EEVijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: A theoretical formulation for degrees of isolation in databases. Information & Software Technology 39(1): 47-53 (1997)
109EESushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang: Information Systems Research at George Mason University. SIGMOD Record 26(4): 69-74 (1997)
1996
108 V. S. Subrahmanian, Sushil Jajodia: Multimedia Database System: Issues and Research Direction Springer 1996
107EEIndrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128
106EEElisa Bertino, Sushil Jajodia, Pierangela Samarati: A Non-Timestamped Authorization Model for Data Management Systems. ACM Conference on Computer and Communications Security 1996: 169-178
105 Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194
104 Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98
103EEDonald G. Marks, Amihai Motro, Sushil Jajodia: Enhancing the Controlled Disclosure of Sensitive Information. ESORICS 1996: 290-303
102EEK. Selçuk Candan, Sushil Jajodia, V. S. Subrahmanian: Secure Mediated Databases. ICDE 1996: 28-37
101EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84
100EEElisa Bertino, Sushil Jajodia, Pierangela Samarati: Supporting Multiple Access Control Policies in Database Systems. IEEE Symposium on Security and Privacy 1996: 94-107
99EEClaudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. PODS 1996: 68-78
98 Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework and Reasoning Model for Time Granularity. TIME 1996: 104-111
97 Sushil Jajodia, Ravi Mukkamala: Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control. Performance of Concurrency Control Mechanisms in Centralized Database Systems 1996: 387-405
96EESushil Jajodia: Database Security and Privacy. ACM Comput. Surv. 28(1): 129-131 (1996)
95EESushil Jajodia: Managing Security and Privacy of Information. ACM Comput. Surv. 28(4es): article 79 (1996)
94EEPierangela Samarati, Paul Ammann, Sushil Jajodia: Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996)
93EEKenneth Smith, Barbara T. Blaustein, Sushil Jajodia, LouAnna Notargiacomo: Correctness Criteria for Multilevel Secure Transactions. IEEE Trans. Knowl. Data Eng. 8(1): 32-45 (1996)
92EEPierangela Samarati, Elisa Bertino, Sushil Jajodia: An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8(4): 555-562 (1996)
91EEVijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996)
90EEPaul Ammann, Sushil Jajodia, Phyllis G. Frankl: Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996)
1995
89 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247
88EEClaudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia: Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268
87EEPaul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227
86EEPaul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995)
85EEPaul Ammann, Sushil Jajodia, Padmaja Mavuluri: On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995)
84EEOuri Wolfson, Sushil Jajodia: An Algorithm for Dynamic Data Allocation in Distributed Systems. Inf. Process. Lett. 53(2): 113-119 (1995)
83 Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. Inf. Sci. 82(1-2): 103-128 (1995)
82EEElisa Bertino, Sushil Jajodia, Pierangela Samarati: Database Security: Research and Practice Inf. Syst. 20(7): 537-556 (1995)
81 Paul Ammann, Frank Jaeckle, Sushil Jajodia: Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. Journal of Computer Security 3(2/3): 87-114 (1995)
1994
80EEPaul Ammann, Sushil Jajodia: An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. ACM Conference on Computer and Communications Security 1994: 118-125
79EEPierangela Samarati, Paul Ammann, Sushil Jajodia: Propagation of Authorizations in Distributed Database Systems. ACM Conference on Computer and Communications Security 1994: 136-147
78 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274
77EEAmihai Motro, Donald G. Marks, Sushil Jajodia: Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. ESORICS 1994: 431-445
76 Sushil Jajodia, Ravi Mukkamala, K. V. S. Ramarao: A View-Based Dynamic Replication Control Algorithm. Nord. J. Comput. 1(2): 214-230 (1994)
75EEChristian S. Jensen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Patrick J. Hayes, Sushil Jajodia: A Consensus Glossary of Temporal Database Concepts. SIGMOD Record 23(1): 52-64 (1994)
1993
74 Peter Buneman, Sushil Jajodia: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, D.C., May 26-28, 1993. ACM Press 1993
73 Abdullah Uz Tansel, James Clifford, Shashi K. Gadia, Sushil Jajodia, Arie Segev, Richard T. Snodgrass: Temporal Databases: Theory, Design, and Implementation Benjamin/Cummings 1993
72EEElisa Bertino, Pierangela Samarati, Sushil Jajodia: Authorizations in Relational Database Management Systems. ACM Conference on Computer and Communications Security 1993: 130-139
71EEElisa Bertino, Pierangela Samarati, Sushil Jajodia: High Assurance Discretionary Access Control for Object Bases. ACM Conference on Computer and Communications Security 1993: 140-150
70 Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Access Control in Object-Oriented Database Systems - Some Approaches and Issues. Advanced Database Systems 1993: 17-44
69 Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. DBSec 1993: 109-121
68 Paul Ammann, Sushil Jajodia: Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134
67 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158
66 Ravi Mukkamala, Sushil Jajodia: A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. DBSec 1993: 199-214
65 Elisa Bertino, Sushil Jajodia: Modeling Multilevel Entities Using Single Level Objects. DOOD 1993: 415-428
64EEXiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. SIGMOD Conference 1993: 227-236
63 Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Enforcing Mandatory Access Control in Object Bases. Security for Object-Oriented Systems 1993: 96-116
62 Gio Wiederhold, Sushil Jajodia, Witold Litwin: Integrating Temporal Data in a Heterogeneous Environment. Temporal Databases 1993: 563-579
61EEPaul Ammann, Sushil Jajodia: Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993)
60EESushil Jajodia, Ravi Mukkamala: Measuring the effect of commutative transactions on distributed database performance. Inf. Sci. 68(1-2): 91-111 (1993)
59 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. Journal of Computer Security 2(4): 311-352 (1993)
1992
58 Carl E. Landwehr, Sushil Jajodia: Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 North-Holland 1992
57 Oliver Costich, Sushil Jajodia: Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. DBSec 1992: 249-266
56 John P. McDermott, Sushil Jajodia: Orange Locking: Channel-Free Database Concurrency Control Via Locking. DBSec 1992: 267-284
55EERavi S. Sandhu, Sushil Jajodia: Polyinstantation for Cover Stories. ESORICS 1992: 307-328
54EEOuri Wolfson, Sushil Jajodia: Distributed Algorithms for Dynamic Replication of Data. PODS 1992: 149-163
53 Vinti Doshi, Sushil Jajodia: Referential Integrity in Multilevel Secure Database Management Systems. SEC 1992: 359-371
52 Ouri Wolfson, Sushil Jajodia: An Algorithm for Dynamic Data Distribution. Workshop on the Management of Replicated Data 1992: 62-65
51EERavi S. Sandhu, Sushil Jajodia: Eliminating polyinstantiation securely. Computers & Security 11(6): 547-562 (1992)
1991
50 Gio Wiederhold, Sushil Jajodia, Witold Litwin: Dealing with Granularity of Time in Temporal Databases. CAiSE 1991: 124-140
49 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152
48 Sushil Jajodia: Panel Discussion on the Polyinstantiation Problem: A Position Paper. CSFW 1991: 235
47 Paul Ammann, Sushil Jajodia: A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202
46 Sushil Jajodia, Ravi Mukkamala: Effects of SeaView Decomposition of Multilevel Relations on Database Performance. DBSec 1991: 203-225
45 Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314
44 Sushil Jajodia, Ravi S. Sandhu: A Novel Decomposition of Multilevel Relations into Single-Level Relations. IEEE Symposium on Security and Privacy 1991: 300-315
43EESushil Jajodia, Ravi S. Sandhu: Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59
42EERavi Mukkamala, Sushil Jajodia: A Note on Estimating the Cardinality of the Projection of a Database Relation. ACM Trans. Database Syst. 16(3): 564-566 (1991)
41EERavi S. Sandhu, Sushil Jajodia: Integrity principles and mechanisms in database management systems. Computers & Security 10(5): 413-427 (1991)
40EESushil Jajodia, David Mutchler: A short technical paper: Determining whether a vote assignment is dominated. Inf. Sci. 56(1-3): 279-282 (1991)
1990
39 Sushil Jajodia, Ravi S. Sandhu: A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158
38 Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt: A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165
37 Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308
36 Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations. IEEE Symposium on Security and Privacy 1990: 104-115
35 Sushil Jajodia, Boris Kogan: Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. IEEE Symposium on Security and Privacy 1990: 360-368
34 Sushil Jajodia, Boris Kogan: Integrating an Object-Oriented Data Model with Multilevel Security. IEEE Symposium on Security and Privacy 1990: 76-85
33EEBoris Kogan, Sushil Jajodia: Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. SIGMOD Conference 1990: 153-162
32EESushil Jajodia, David Mutchler: Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database. ACM Trans. Database Syst. 15(2): 230-280 (1990)
31 Sushil Jajodia, Frederick N. Springsteel: Lossless Outer Joins with Incomplete Information. BIT 30(1): 34-41 (1990)
30EESushil Jajodia, Ravi S. Sandhu: Database Security: Current Status and Key Issues. SIGMOD Record 19(4): 123-126 (1990)
1989
29 Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley: Audit Trail Organization in Relational Databases. DBSec 1989: 269-281
28EESushil Jajodia, Won Kim: From the Issue Editors. IEEE Data Eng. Bull. 12(1): 1 (1989)
27EESushil Jajodia, David Mutchler: A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting. IEEE Trans. Knowl. Data Eng. 1(4): 459-469 (1989)
26EESushil Jajodia, David Mutchler: A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability. IEEE Trans. Software Eng. 15(1): 39-46 (1989)
1988
25EESushil Jajodia, David Mutchler: Integrating Static and Dynamic Voting Protocols To Enhance File Availability. ICDE 1988: 144-153
24EESushil Jajodia: Letter from the TC Chair. IEEE Data Eng. Bull. 11(2): 1 (1988)
1987
23 Catherine Meadows, Sushil Jajodia: Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101
22EESushil Jajodia, Catherine Meadows: Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404
21EESushil Jajodia: Managing Replicated Files in Partitioned Distributed Database Systems. ICDE 1987: 412-418
20EESushil Jajodia, David Mutchler: Dynamic Voting. SIGMOD Conference 1987: 227-238
19EESushil Jajodia, David Mutchler: Enhancements to the Voting Algorithm. VLDB 1987: 399-406
18 H. A. Burgdorff, Sushil Jajodia, Frederick N. Springsteel, Yechezkel Zalcstein: Alternative Methods for the Reconstruction of Trees from Their Traversals. BIT 27(2): 134-140 (1987)
17EESushil Jajodia: Letter from the TC Chairman. IEEE Data Eng. Bull. 10(3): 1 (1987)
16 Sushil Jajodia, Frederick N. Springsteel: Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. IEEE Trans. Software Eng. 13(7): 811-819 (1987)
15 Satish K. Tripathi, Yennun Huang, Sushil Jajodia: Local Area Networks: Software and Related Issues. IEEE Trans. Software Eng. 13(8): 872-879 (1987)
14 Sushil Jajodia: An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". IEEE Trans. Software Eng. 13(9): 1047-1048 (1987)
1986
13 Sushil Jajodia: Recognizing Multivalued Dependencies in Relation Schemas. Comput. J. 29(5): 458-459 (1986)
12EESushil Jajodia: Chairman's Message. IEEE Database Eng. Bull. 9(3): 1 (1986)
1985
11 Sushil Jajodia: On Equivalence of Relational and Network Database Models. Inf. Process. Lett. 20(1): 51-54 (1985)
1984
10 Sushil Jajodia: Universal and Representative Instances Using Unmarked Nulls. FSTTCS 1984: 367-378
9 Sushil Jajodia, Peter A. Ng: Representative Instances and gamma-Acyclic Relational Schemes. IEEE Trans. Software Eng. 10(6): 614-618 (1984)
8EESushil Jajodia, Peter A. Ng: Translation of entity-relationship diagrams into relational structures. Journal of Systems and Software 4(2-3): 123-133 (1984)
7EESushil Jajodia, Peter Ann-Beng Ng, Raymond T. Yeh: Introduction to the special issue on the use of entity-relationship concepts in databases and related software. Journal of Systems and Software 4(2-3): 95-98 (1984)
1983
6 Carl G. Davis, Sushil Jajodia, Peter A. Ng, Raymond T. Yeh: Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83) North-Holland 1983
5EESushil Jajodia, Peter A. Ng: On the Representation of Relational Structures by Entity-Relationship Diagrams. ER 1983: 249-263
4EESushil Jajodia, Peter A. Ng, Frederick N. Springsteel: On Universal and Representative Instances for Inconsistent Databases. ER 1983: 279-295
3EEPaul K. Blackwell, Sushil Jajodia, Peter A. Ng: A View of Database Management Systems as Abstract Data Types. ER 1983: 661-668
2 Sushil Jajodia, Jian Liu, Peter A. Ng: A Scheme of Parallel Processing for MIMD Systems. IEEE Trans. Software Eng. 9(4): 436-445 (1983)
1 Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel: The Problem of Equivalence for Entity-Relationship Diagrams. IEEE Trans. Software Eng. 9(5): 617-630 (1983)

Coauthor Index

1Venkata Gopala Krishna Addada [333]
2Paul Ammann [47] [61] [68] [79] [80] [81] [85] [86] [87] [90] [94] [101] [115] [118] [125] [130] [133] [152] [153] [157] [159] [165] [169] [199] [298] [302] [314]
3Claudio Agostino Ardagna [348] [352]
4Vijayalakshmi Atluri (Vijay Atluri) [59] [67] [78] [86] [89] [91] [104] [110] [111] [181] [244]
5Daniel Barbará [109] [175] [178] [180] [213] [218] [228]
6Elisa Bertino [59] [63] [65] [67] [70] [71] [72] [78] [82] [88] [89] [91] [92] [100] [106] [107] [110] [111] [112] [113] [119] [123] [126] [137] [154] [167] [168] [282]
7Claudio Bettini [88] [98] [99] [116] [121] [129] [135] [136] [138] [140] [172] [188] [200] [203] [205] [210] [219] [246] [248] [261] [269] [294] [296] [325] [326] [344] [347] [357]
8Gautam Bhargava [29]
9Paul K. Blackwell [3]
10Barbara T. Blaustein [69] [93] [125]
11Michael H. Böhlen [120]
12Alexander Brodsky [109] [116] [166] [286] [304] [322] [334] [343] [349] [353]
13Peter Buneman [74]
14H. A. Burgdorff [18]
15Maria Calagna [301]
16Daniel Calle [227]
17K. Selçuk Candan [102]
18Alberto Ceselli [263]
19Susan Chapin [177] [201]
20Shiping Chen [237] [255] [279] [290] [308] [327] [336]
21Songqing Chen [308] [336]
22Alessandro Ciampichetti [112]
23Stelvio Cimato [356]
24Valentina Ciriani [328]
25James Clifford [73] [75] [120]
26Chris Clifton (Christopher W. Clifton) [127]
27Mauro Conti [358]
28Todd Cornett [238]
29Oliver Costich [57]
30Julia Couto [180] [228]
31Frédéric Cuppens [259] [260]
32Ernesto Damiani [231] [240] [263] [268] [270] [315] [323]
33Ram Dantu [289]
34Carl G. Davis [6]
35Yves Deswarte [259] [260]
36John E. Dobson [143]
37Asuman Dogac [147]
38Vinti Doshi [53] [179] [187]
39Zoran Duric [155] [156]
40Curtis E. Dyreson [120]
41Ramez Elmasri [75] [120]
42Opher Etzion [148]
43Donald B. Faatz [177] [187] [201] [206] [238]
44Csilla Farkas [166] [196] [286]
45Amgad Fayad [162] [179] [187] [201] [206] [227]
46Elena Ferrari [126]
47Mario Finetti [231]
48Sara Foresti [268] [270] [315] [320] [321] [323] [328] [330] [341] [350] [354]
49Phyllis G. Frankl [90]
50Dario Freni [347]
51Marcel Frigault [346]
52Shashi K. Gadia [29] [73] [75] [120]
53Jason Gagnon [160]
54Anup K. Ghosh [342]
55Steven Gianvecchio [345]
56Rajni Goel [175] [178] [213] [218]
57Fabio Grandi [120]
58Tyrone Grandison [352]
59Huiping Guo [256] [287] [301] [313] [336]
60Åsa Hagström [192] [224]
61Eric Harder [174]
62Patrick J. Hayes [75] [120]
63Jeff Hoyt [238]
64Yennun Huang [15]
65Yih Huang [342]
66Yixiu Huang [114]
67Tania Islam [351]
68Michael Jacobs [239] [266]
69Frank Jaeckle [81]
70Trent Jaeger [244]
71Christian S. Jensen [75] [120]
72Neil F. Johnson [139] [141] [155] [156]
73Wolfgang Käfer [120]
74Pramod Kalapa [266]
75Mohan S. Kankanhalli [288]
76Thomas F. Keefe [104] [181]
77David Keppler [300]
78Larry Kerschberg [109] [131]
79Won Kim [28]
80Roger King [282]
81Nick Kline [120]
82Boris Kogan [33] [34] [35]
83Samir Koussih [174]
84Michiharu Kudo [242]
85Hideko S. Kunii [195]
86Kwok-Yan Lam [150]
87Carl E. Landwehr [58]
88Der-Tsai Lee [310]
89Jie Li [314]
90Yi Li [228]
91Yingjiu Li [171] [186] [198] [208] [211] [215] [221] [235] [236] [256] [257] [262] [285] [287] [312] [313]
92Bao-Shuh Lin [310]
93Ferng-Ching Lin [310]
94Jia-Ling Lin [136] [144] [228]
95Tsau Young Lin [127]
96William List [132] [149]
97Witold Litwin [50] [62]
98Anyi Liu [274] [287] [293]
99Donggang Liu [271] [278] [316]
100Dongyu Liu [308]
101Jian Liu [2]
102Peng Liu [146] [159] [161] [164] [169] [176] [182] [193] [199] [314] [317]
103Tao Long [351]
104Javier López [355]
105Nikos A. Lorentzos [120]
106Teresa F. Lunt [38]
107Roswitha MacLean [179]
108Luigi V. Mancini [105] [107] [119] [137] [145] [167] [168] [207] [209] [220] [222] [301] [358]
109Donald G. Marks [77] [103]
110Rhandi Martin [348]
111Sergio Mascetti [296] [326] [347]
112Fabio Massacci [265]
113Padmaja Mavuluri [85]
114Chandan Mazumdar [280]
115Catherine D. McCollum [69] [104] [125] [146] [152] [153] [161] [162] [164] [181]
116John P. McDermott [56]
117Graeme W. McGregor [132] [149]
118Dennis McLeod [282]
119Catherine Meadows [22] [23]
120Alessandro Mei [220]
121Yannis G. Mitsopoulos [120]
122Sona Mohavni [134]
123Angelo Montanari [120]
124Amihai Motro [77] [103] [109]
125Ravi Mukkamala [42] [46] [60] [66] [76] [97] [104] [128] [160] [181] [191]
126David Mutchler [19] [20] [25] [26] [27] [32] [40]
127Peter A. Ng [1] [2] [3] [4] [5] [6] [8] [9]
128Peter Ann-Beng Ng [7]
129Peng Ning [170] [173] [176] [182] [184] [186] [202] [204] [221] [250] [271] [311]
130Steven Noel [239] [247] [258] [266] [277] [292] [338]
131Daniel A. Nonen [120]
132LouAnna Notargiacomo [93]
133Brian O'Berry [239]
134Martin S. Olivier [143]
135Maria E. Orlowska [282]
136M. Tamer Özsu [147]
137Joseph Pamula [272] [298] [302]
138Stefano Paraboschi [231] [240] [263] [268] [270] [315] [321] [323] [328] [330] [332] [341] [350] [354]
139Linda Pareschi [325]
140Francesco Parisi-Presicce [192] [224]
141Gerardo Pelosi [341]
142Elisa Peressi [120]
143Barbara Pernici [120]
144Roberto Di Pietro [207] [209] [222] [358]
145K. V. S. Ramarao [76]
146Indrajit Ray [105] [107] [119] [128] [137] [167] [168]
147Indrakshi Ray [87] [101] [115] [118] [130] [133] [165]
148Michael K. Reiter [183]
149Ronald W. Ritchey [298]
150Eric Robertson [258]
151John F. Roddick [120]
152Sankardas Roy [299] [333] [358]
153Giovanni Rumolo [142]
154Pierangela Samarati [63] [70] [71] [72] [79] [82] [92] [94] [100] [106] [112] [113] [123] [124] [126] [127] [143] [154] [183] [185] [217] [231] [240] [243] [263] [268] [270] [276] [315] [320] [321] [323] [328] [330] [332] [340] [341] [348] [350] [352] [354] [356] [357]
155Ravi S. Sandhu [30] [36] [37] [38] [39] [41] [43] [44] [45] [49] [51] [55]
156Maria Luisa Sapino [185]
157Kaushal Sarda [252]
158Nandlal L. Sarda [120]
159Maria Rita Scalas [120]
160Linda Schlipper [127]
161Arie Segev [73] [120]
162Hemant Sengar [273] [275] [289] [305] [339]
163Sanjeev Setia [145] [174] [197] [226] [229] [232] [233] [234] [241] [249] [250] [278] [283] [284] [295] [299] [309] [311] [316] [333]
164Bo Shen [336]
165Shiuhpyng Shieh [310]
166Edgar H. Sibley [29] [109]
167Anoop Singhal [264] [291] [306] [324] [329] [337] [346] [351]
168Kenneth Smith [93] [206] [238]
169Richard T. Snodgrass [73] [120]
170Arne Sølvberg [195]
171Michael D. Soo [120]
172Stefano Spaccapietra [282]
173Frederick N. Springsteel [1] [4] [16] [18] [31]
174Suryanarayana M. Sripada [148]
175Angelos Stavrou [342] [348]
176Leon Strous [132] [149] [282]
177V. S. Subrahmanian [64] [83] [102] [108] [123] [124] [185]
178Vipin Swarup [236] [238] [257] [262] [272] [300] [302] [349]
179Paul F. Syverson [243]
180Abdullah Uz Tansel [73] [120]
181Roshan K. Thomas [45] [49]
182Bhavani M. Thuraisingham [127] [143]
183Paolo Tiberio [120]
184Satish K. Tripathi [15]
185Sabrina De Capitani di Vimercati [231] [240] [263] [268] [270] [276] [315] [320] [321] [323] [328] [330] [332] [340] [341] [350] [352] [354]
186Haining Wang [305] [339] [345]
187Lingyu Wang [208] [211] [212] [214] [215] [235] [245] [251] [254] [259] [260] [274] [292] [293] [297] [306] [312] [318] [324] [329] [337] [346] [351] [353]
188Xiaoyang Sean Wang [64] [83] [88] [98] [99] [109] [116] [121] [122] [129] [134] [135] [136] [138] [140] [144] [170] [171] [172] [173] [184] [186] [188] [198] [200] [202] [203] [204] [205] [210] [215] [219] [221] [246] [248] [261] [267] [269] [285] [294] [296] [297] [326] [344] [347] [357]
189Xinyuan Wang [279] [290] [327]
190Gio Wiederhold [50] [62] [120]
191Duminda Wijesekera [189] [190] [192] [194] [205] [210] [212] [214] [216] [219] [223] [224] [235] [237] [245] [246] [251] [252] [253] [254] [255] [265] [273] [275] [281] [289] [305] [307] [312] [318] [339] [345]
192Douglas E. Williams [227]
193Ouri Wolfson [52] [54] [84] [114]
194Ningning Wu [180] [198]
195Yu Wu [122]
196Shouhuai Xu [232] [233] [249] [284] [295]
197Jacqueline Yang [189]
198Jiahai Yang [173]
199Chao Yao [267] [278] [297] [306] [316] [337]
200Raymond T. Yeh [6] [7]
201Meng Yu [317]
202Ting Yu [319] [335]
203Yechezkel Zalcstein [18]
204Wanyu Zang [317]
205Nicola Zannone [265] [307]
206Chunru Zhang [150]
207Lei Zhang [304] [322] [334] [343] [349] [353] [358]
208Bo Zhu [288] [309] [333]
209Sencun Zhu [197] [211] [226] [229] [230] [232] [233] [234] [241] [249] [250] [271] [278] [283] [284] [285] [295] [311] [316]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)