Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Vijayalakshmi Atluri
@article{DBLP:journals/tetc/GuptaSVA23, author = {Eeshan Gupta and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Enabling Attribute-Based Access Control in NoSQL Databases}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {11}, number = {1}, pages = {208--223}, year = {2023}, url = {https://doi.org/10.1109/TETC.2022.3193577}, doi = {10.1109/TETC.2022.3193577}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tetc/GuptaSVA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RayTVMARKRSSV023, author = {Indrajit Ray and Bhavani Thuraisingham and Jaideep Vaidya and Sharad Mehrotra and Vijayalakshmi Atluri and Indrakshi Ray and Murat Kantarcioglu and Ramesh Raskar and Babak Salimi and Steve Simske and Nalini Venkatasubramanian and Vivek K. Singh}, editor = {Silvio Ranise and Roberto Carbone and Daniel Takabi}, title = {{SAFE-PASS:} Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups}, booktitle = {Proceedings of the 28th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023}, pages = {145--155}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3589608.3593830}, doi = {10.1145/3589608.3593830}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/RayTVMARKRSSV023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2023, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6}, doi = {10.1007/978-3-031-37586-6}, isbn = {978-3-031-37585-9}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/VarshithSVA22, author = {H. O. Sai Varshith and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Enabling Attribute-Based Access Control in Linux Kernel}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {1237--1239}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3527293}, doi = {10.1145/3488932.3527293}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/VarshithSVA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TalegaonBASV22, author = {Samir Talegaon and Gunjan Batra and Vijayalakshmi Atluri and Shamik Sural and Jaideep Vaidya}, editor = {Sven Dietrich and Omar Chowdhury and Daniel Takabi}, title = {Contemporaneous Update and Enforcement of {ABAC} Policies}, booktitle = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022}, pages = {31--42}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3532105.3535021}, doi = {10.1145/3532105.3535021}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/TalegaonBASV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/PericherlaPSVA22, author = {Amshumaan Pericherla and Proteet Paul and Shamik Sural and Jaideep Vaidya and Vijay Atluri}, editor = {Weizhi Meng and Simone Fischer{-}H{\"{u}}bner and Christian Damsgaard Jensen}, title = {Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain}, booktitle = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11 International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15, 2022, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {648}, pages = {360--376}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-06975-8\_21}, doi = {10.1007/978-3-031-06975-8\_21}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/PericherlaPSVA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-1, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6}, doi = {10.1007/978-3-031-17140-6}, isbn = {978-3-031-17139-0}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-2, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8}, doi = {10.1007/978-3-031-17146-8}, isbn = {978-3-031-17145-1}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2022-3, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13556}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17143-7}, doi = {10.1007/978-3-031-17143-7}, isbn = {978-3-031-17142-0}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2022-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/polity/YaqubCAV21, author = {Ussama Yaqub and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling}, journal = {Inf. Polity}, volume = {26}, number = {4}, pages = {375--390}, year = {2021}, url = {https://doi.org/10.3233/IP-210321}, doi = {10.3233/IP-210321}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/polity/YaqubCAV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/RoySMVA21, author = {Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {9}, number = {4}, pages = {1901--1913}, year = {2021}, url = {https://doi.org/10.1109/TETC.2019.2944787}, doi = {10.1109/TETC.2019.2944787}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/RoySMVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/RoySMVA21, author = {Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Optimal Employee Recruitment in Organizations under Attribute-Based Access Control}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {12}, number = {1}, pages = {6:1--6:24}, year = {2021}, url = {https://doi.org/10.1145/3403950}, doi = {10.1145/3403950}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/RoySMVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BatraAVS21, author = {Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Incremental Maintenance of {ABAC} Policies}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {185--196}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3447825}, doi = {10.1145/3422337.3447825}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BatraAVS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/GuptaSVA21, author = {Eeshan Gupta and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Anupam Joshi and Barbara Carminati and Rakesh M. Verma}, title = {Attribute-Based Access Control for NoSQL Databases}, booktitle = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021}, pages = {317--319}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3422337.3450323}, doi = {10.1145/3422337.3450323}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/GuptaSVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dgov/YaqubSPCAV20, author = {Ussama Yaqub and Nitesh Sharma and Rachit Pabreja and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Location-based Sentiment Analyses and Visualization of Twitter Election Data}, journal = {Digit. Gov. Res. Pract.}, volume = {1}, number = {2}, pages = {14:1--14:19}, year = {2020}, url = {https://doi.org/10.1145/3339909}, doi = {10.1145/3339909}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dgov/YaqubSPCAV20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/LuCSVAHH20, author = {Haibing Lu and Xi Chen and Junmin Shi and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong and Wei Huang}, title = {Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {11}, number = {2}, pages = {7:1--7:33}, year = {2020}, url = {https://doi.org/10.1145/3386599}, doi = {10.1145/3386599}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/LuCSVAHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunSMAA20, author = {Soon Ae Chun and Roshan Singh and Pamela Morgan and Nabil R. Adam and Vijay Atluri}, editor = {Seok{-}Jin Eom and Jooho Lee}, title = {Visual Analytics for Global Migration Policy Discovery and {NGO} Collaboration}, booktitle = {dg.o '20: The 21st Annual International Conference on Digital Government Research, Seoul, Republic of Korea, June 15-19, 2020}, pages = {109--115}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3396956.3398261}, doi = {10.1145/3396956.3398261}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ChunSMAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/SinghCA20, author = {Roshan Singh and Soon Ae Chun and Vijay Atluri}, editor = {Seok{-}Jin Eom and Jooho Lee}, title = {Developing Machine Learning Models to Automate News Classification}, booktitle = {dg.o '20: The 21st Annual International Conference on Digital Government Research, Seoul, Republic of Korea, June 15-19, 2020}, pages = {354--355}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3396956.3397001}, doi = {10.1145/3396956.3397001}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/SinghCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AtluriHC20, author = {Vijay Atluri and Yuan Hong and Soon Ae Chun}, editor = {Seok{-}Jin Eom and Jooho Lee}, title = {Security, Privacy and Trust for Responsible Innovations and Governance}, booktitle = {dg.o '20: The 21st Annual International Conference on Digital Government Research, Seoul, Republic of Korea, June 15-19, 2020}, pages = {365--366}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3396956.3396978}, doi = {10.1145/3396956.3396978}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AtluriHC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinghSVA19, author = {Mahendra Pratap Singh and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database}, journal = {Comput. Secur.}, volume = {86}, pages = {183--205}, year = {2019}, url = {https://doi.org/10.1016/j.cose.2019.06.001}, doi = {10.1016/J.COSE.2019.06.001}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinghSVA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/JhaSAV19, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Security analysis of {ABAC} under an administrative model}, journal = {{IET} Inf. Secur.}, volume = {13}, number = {2}, pages = {96--103}, year = {2019}, url = {https://doi.org/10.1049/iet-ifs.2018.5010}, doi = {10.1049/IET-IFS.2018.5010}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/JhaSAV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BatraAVS19, author = {Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, title = {Deploying {ABAC} policies using {RBAC} systems}, journal = {J. Comput. Secur.}, volume = {27}, number = {4}, pages = {483--506}, year = {2019}, url = {https://doi.org/10.3233/JCS-191315}, doi = {10.3233/JCS-191315}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/BatraAVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/DasSVA19, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Policy Adaptation in Hierarchical Attribute-based Access Control Systems}, journal = {{ACM} Trans. Internet Techn.}, volume = {19}, number = {3}, pages = {40:1--40:24}, year = {2019}, url = {https://doi.org/10.1145/3323233}, doi = {10.1145/3323233}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/DasSVA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/MeshramDSVA19, author = {Augustee Meshram and Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {ABACaaS: Attribute-Based Access Control as a Service}, booktitle = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, pages = {153--155}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006.3302381}, doi = {10.1145/3292006.3302381}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/MeshramDSVA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/YaqubCAV19, author = {Ussama Yaqub and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Yu{-}Che Chen and Fadi Salem and Anneke Zuiderwijk}, title = {Social Media Communication of Public Sector Organizations: {A} Case Study of Northeast {US}}, booktitle = {20th Annual International Conference on Digital Government Research, {DG.O} 2019, Dubai, United Arab Emirates, June 18-20, 2019}, pages = {248--253}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3325112.3325253}, doi = {10.1145/3325112.3325253}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/YaqubCAV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunPYPAA19, author = {Soon Ae Chun and Venkata Avinash Paturu and Shengcheng Yuan and Rohit Pathak and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Yu{-}Che Chen and Fadi Salem and Anneke Zuiderwijk}, title = {Crime Prediction Model using Deep Neural Networks}, booktitle = {20th Annual International Conference on Digital Government Research, {DG.O} 2019, Dubai, United Arab Emirates, June 18-20, 2019}, pages = {512--514}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3325112.3328221}, doi = {10.1145/3325112.3328221}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ChunPYPAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/DasSVAR19, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri and Gerhard Rigoll}, editor = {Deepak Garg and N. V. Narendra Kumar and Rudrapatna K. Shyamasundar}, title = {VisMAP: Visual Mining of Attribute-Based Access Control Policies}, booktitle = {Information Systems Security - 15th International Conference, {ICISS} 2019, Hyderabad, India, December 16-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {79--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36945-3\_5}, doi = {10.1007/978-3-030-36945-3\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/DasSVAR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BatraAVS19, author = {Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Deepak Garg and N. V. Narendra Kumar and Rudrapatna K. Shyamasundar}, title = {Policy Reconciliation and Migration in Attribute Based Access Control}, booktitle = {Information Systems Security - 15th International Conference, {ICISS} 2019, Hyderabad, India, December 16-20, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11952}, pages = {99--120}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36945-3\_6}, doi = {10.1007/978-3-030-36945-3\_6}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BatraAVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NathDSVA19, author = {Ronit Nath and Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijay Atluri}, editor = {Florian Kerschbaum and Atefeh Mashatan and Jianwei Niu and Adam J. Lee}, title = {PolTree: {A} Data Structure for Making Efficient Access Decisions in {ABAC}}, booktitle = {Proceedings of the 24th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019}, pages = {25--35}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3322431.3325102}, doi = {10.1145/3322431.3325102}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/NathDSVA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/SinghSAV19, author = {Mahendra Pratap Singh and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Sanjay K. Sahay and Nihita Goel and Vishwas Patil and Murtuza Jadliwala}, title = {Security Analysis of Unified Access Control Policies}, booktitle = {Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1186}, pages = {126--146}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-3817-9\_8}, doi = {10.1007/978-981-15-3817-9\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/skm/SinghSAV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/DasSVA19, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Central Attribute Authority {(CAA):} {A} Vision for Seamless Sharing of Organizational Resources}, booktitle = {First {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {209--217}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TPS-ISA48467.2019.00034}, doi = {10.1109/TPS-ISA48467.2019.00034}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/DasSVA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GuptaSAV18, author = {Haritabh Gupta and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {A side-channel attack on smartphones: Deciphering key taps using built-in microphones}, journal = {J. Comput. Secur.}, volume = {26}, number = {2}, pages = {255--281}, year = {2018}, url = {https://doi.org/10.3233/JCS-17975}, doi = {10.3233/JCS-17975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/GuptaSAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LorenziUVSA18, author = {David Lorenzi and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, title = {Towards designing robust CAPTCHAs}, journal = {J. Comput. Secur.}, volume = {26}, number = {6}, pages = {731--760}, year = {2018}, url = {https://doi.org/10.3233/JCS-17947}, doi = {10.3233/JCS-17947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LorenziUVSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JhaSAV18, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {13}, number = {4}, pages = {897--911}, year = {2018}, url = {https://doi.org/10.1109/TIFS.2017.2771492}, doi = {10.1109/TIFS.2017.2771492}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JhaSAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/DasMAVS18, author = {Saptarshi Das and Barsha Mitra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Pierangela Samarati and Indrajit Ray and Indrakshi Ray}, title = {Policy Engineering in {RBAC} and {ABAC}}, booktitle = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia on the Occasion of His 70th Birthday}, series = {Lecture Notes in Computer Science}, volume = {11170}, pages = {24--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-04834-1\_2}, doi = {10.1007/978-3-030-04834-1\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/DasMAVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BatraAVS18, author = {Gunjan Batra and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Florian Kerschbaum and Stefano Paraboschi}, title = {Enabling the Deployment of {ABAC} Policies in {RBAC} Systems}, booktitle = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP} {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10980}, pages = {51--68}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-95729-6\_4}, doi = {10.1007/978-3-319-95729-6\_4}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BatraAVS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/YaqubSPCAV18, author = {Ussama Yaqub and Nitesh Sharma and Rachit Pabreja and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Marijn Janssen and Soon Ae Chun and Vishanth Weerakkody}, title = {Analysis and visualization of subjectivity and polarity of Twitter location data}, booktitle = {Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, {DG.O} 2018, Delft, The Netherlands, May 30 - June 01, 2018}, pages = {67:1--67:10}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209281.3209313}, doi = {10.1145/3209281.3209313}, timestamp = {Fri, 08 Sep 2023 14:37:47 +0200}, biburl = {https://dblp.org/rec/conf/dgo/YaqubSPCAV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/SharmaPYACV18, author = {Nitesh Sharma and Rachit Pabreja and Ussama Yaqub and Vijayalakshmi Atluri and Soon Ae Chun and Jaideep Vaidya}, editor = {Marijn Janssen and Soon Ae Chun and Vishanth Weerakkody}, title = {Web-based application for sentiment analysis of live tweets}, booktitle = {Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, {DG.O} 2018, Delft, The Netherlands, May 30 - June 01, 2018}, pages = {120:1--120:2}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3209281.3209402}, doi = {10.1145/3209281.3209402}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/SharmaPYACV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/DasSVA18, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {213--215}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3208949}, doi = {10.1145/3205977.3208949}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/DasSVA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/YaqubCAV17, author = {Ussama Yaqub and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Analysis of political discourse on twitter in the context of the 2016 {US} presidential elections}, journal = {Gov. Inf. Q.}, volume = {34}, number = {4}, pages = {613--626}, year = {2017}, url = {https://doi.org/10.1016/j.giq.2017.11.001}, doi = {10.1016/J.GIQ.2017.11.001}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/giq/YaqubCAV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/MitraSVA17, author = {Barsha Mitra and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Migrating from {RBAC} to temporal {RBAC}}, journal = {{IET} Inf. Secur.}, volume = {11}, number = {5}, pages = {294--300}, year = {2017}, url = {https://doi.org/10.1049/iet-ifs.2016.0258}, doi = {10.1049/IET-IFS.2016.0258}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/MitraSVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/RoySMVA17, author = {Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {On Optimal Employee Assignment in Constrained Role-Based Access Control Systems}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {7}, number = {4}, pages = {10:1--10:24}, year = {2017}, url = {https://doi.org/10.1145/2996470}, doi = {10.1145/2996470}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/RoySMVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/DasSVA17, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {136--145}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00028}, doi = {10.1109/CIC.2017.00028}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/DasSVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/TalukdarBVAS17, author = {Tanay Talukdar and Gunjan Batra and Jaideep Vaidya and Vijayalakshmi Atluri and Shamik Sural}, title = {Efficient Bottom-Up Mining of Attribute Based Access Control Policies}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {339--348}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00051}, doi = {10.1109/CIC.2017.00051}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/coinco/TalukdarBVAS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/UzunPAFVSL17, author = {Emre Uzun and Gennaro Parlato and Vijayalakshmi Atluri and Anna Lisa Ferrara and Jaideep Vaidya and Shamik Sural and David Lorenzi}, editor = {Giovanni Livraga and Sencun Zhu}, title = {Preventing Unauthorized Data Flows}, booktitle = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP} {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10359}, pages = {41--62}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61176-1\_3}, doi = {10.1007/978-3-319-61176-1\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/UzunPAFVSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/YaqubCAV17, author = {Ussama Yaqub and Soon Ae Chun and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Charles C. Hinnant and Adegboyega Ojo}, title = {Sentiment based Analysis of Tweets during the {US} Presidential Elections}, booktitle = {Proceedings of the 18th Annual International Conference on Digital Government Research, {DG.O} 2017, Staten Island, NY, USA, June 7-9, 2017}, pages = {1--10}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3085228.3085285}, doi = {10.1145/3085228.3085285}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/YaqubCAV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GautamJSVA17, author = {Mayank Gautam and Sadhana Jha and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: Constrained Policy Mining in Attribute Based Access Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {121--123}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084163}, doi = {10.1145/3078861.3084163}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GautamJSVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LorenziVASAC17, author = {David Lorenzi and Jaideep Vaidya and Achyuta Aich and Shamik Sural and Vijayalakshmi Atluri and Joseph Calca}, editor = {Sabrina De Capitani di Vimercati and Fabio Martinelli}, title = {EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart}, booktitle = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11 International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {502}, pages = {281--295}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-58469-0\_19}, doi = {10.1007/978-3-319-58469-0\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LorenziVASAC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/gis/AtluriS17, author = {Vijay Atluri and Heechang Shin}, editor = {Shashi Shekhar and Hui Xiong and Xun Zhou}, title = {Geospatial Authorizations, Efficient Enforcement}, booktitle = {Encyclopedia of {GIS}}, pages = {730--738}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-17885-1\_503}, doi = {10.1007/978-3-319-17885-1\_503}, timestamp = {Fri, 03 Apr 2020 17:07:19 +0200}, biburl = {https://dblp.org/rec/reference/gis/AtluriS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/gis/ChunA17, author = {Soon Ae Chun and Vijay Atluri}, editor = {Shashi Shekhar and Hui Xiong and Xun Zhou}, title = {Security Models, Geospatial}, booktitle = {Encyclopedia of {GIS}}, pages = {1850--1860}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-17885-1\_1178}, doi = {10.1007/978-3-319-17885-1\_1178}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/gis/ChunA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitraSVA16, author = {Barsha Mitra and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Mining temporal roles using many-valued concepts}, journal = {Comput. Secur.}, volume = {60}, pages = {79--94}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.04.002}, doi = {10.1016/J.COSE.2016.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitraSVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/MitraSVA16, author = {Barsha Mitra and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {A Survey of Role Mining}, journal = {{ACM} Comput. Surv.}, volume = {48}, number = {4}, pages = {50:1--50:37}, year = {2016}, url = {https://doi.org/10.1145/2871148}, doi = {10.1145/2871148}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/MitraSVA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/JhaSAV16, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {An Administrative Model for Collaborative Management of {ABAC} Systems and Its Security Analysis}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {64--73}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.022}, doi = {10.1109/CIC.2016.022}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/JhaSAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/GuptaSAV16, author = {Haritabh Gupta and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Silvio Ranise and Vipin Swarup}, title = {Deciphering Text from Touchscreen Key Taps}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {3--18}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_1}, doi = {10.1007/978-3-319-41483-6\_1}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/GuptaSAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sin/YakubAV16, author = {Ussama Yakub and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Efficient Evaluation of Authorizations for Video Data}, booktitle = {Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016}, pages = {16--23}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2947626.2947652}, doi = {10.1145/2947626.2947652}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sin/YakubAV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informs/LuVAL15, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Yingjiu Li}, title = {Statistical Database Auditing Without Query Denial Threat}, journal = {{INFORMS} J. Comput.}, volume = {27}, number = {1}, pages = {20--34}, year = {2015}, url = {https://doi.org/10.1287/ijoc.2014.0607}, doi = {10.1287/IJOC.2014.0607}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/informs/LuVAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MitraSAV15, author = {Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {The generalized temporal role mining problem}, journal = {J. Comput. Secur.}, volume = {23}, number = {1}, pages = {31--58}, year = {2015}, url = {https://doi.org/10.3233/JCS-140512}, doi = {10.3233/JCS-140512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MitraSAV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HarikaNJSVA15, author = {Pullamsetty Harika and Marreddy Nagajyothi and John C. John and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Meeting Cardinality Constraints in Role Mining}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {1}, pages = {71--84}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2309117}, doi = {10.1109/TDSC.2014.2309117}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HarikaNJSVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/RoySMVA15, author = {Arindam Roy and Shamik Sural and Arun Kumar Majumdar and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Minimizing Organizational User Requirement while Meeting Security Constraints}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {6}, number = {3}, pages = {12:1--12:25}, year = {2015}, url = {https://doi.org/10.1145/2811269}, doi = {10.1145/2811269}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmis/RoySMVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/UzunLAVS15, author = {Emre Uzun and David Lorenzi and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Pierangela Samarati}, title = {Migrating from {DAC} to {RBAC}}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {69--84}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_5}, doi = {10.1007/978-3-319-20810-7\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/UzunLAVS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/JhaSAV15, author = {Sadhana Jha and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Enforcing Separation of Duty in Attribute Based Access Control Systems}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {61--78}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_5}, doi = {10.1007/978-3-319-26961-0\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/JhaSAV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SaranaRSVA15, author = {Prasuna Sarana and Arindam Roy and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Role Mining in the Presence of Separation of Duty Constraints}, booktitle = {Information Systems Security - 11th International Conference, {ICISS} 2015, Kolkata, India, December 16-20, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9478}, pages = {98--117}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26961-0\_7}, doi = {10.1007/978-3-319-26961-0\_7}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SaranaRSVA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/VaidyaSAL15, author = {Jaideep Vaidya and Basit Shafiq and Vijayalakshmi Atluri and David Lorenzi}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {A Framework for Policy Similarity Evaluation and Migration Based on Change Detection}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {191--205}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_13}, doi = {10.1007/978-3-319-25645-0\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/VaidyaSAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SinghSAVY15, author = {Mahendra Pratap Singh and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya and Ussama Yakub}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {221--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_15}, doi = {10.1007/978-3-319-25645-0\_15}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/SinghSAVY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LorenziCUVSA15, author = {David Lorenzi and Pratik Chattopadhyay and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Generating Secure Images for CAPTCHAs through Noise Addition}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {169--172}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2753065}, doi = {10.1145/2752952.2753065}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LorenziCUVSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/LorenziUVSA15, author = {David Lorenzi and Emre Uzun and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, editor = {Hannes Federrath and Dieter Gollmann}, title = {Enhancing the Security of Image CAPTCHAs Through Noise Addition}, booktitle = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11 International Conference, {SEC} 2015, Hamburg, Germany, May 26-28, 2015, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {455}, pages = {354--368}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-18467-8\_24}, doi = {10.1007/978-3-319-18467-8\_24}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/LorenziUVSA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JhaSVA14, author = {Sadhana Jha and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Security analysis of temporal {RBAC} under an administrative model}, journal = {Comput. Secur.}, volume = {46}, pages = {154--172}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.08.001}, doi = {10.1016/J.COSE.2014.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JhaSVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/giq/LorenziVCSA14, author = {David Lorenzi and Jaideep Vaidya and Soon Ae Chun and Basit Shafiq and Vijayalakshmi Atluri}, title = {Enhancing the government service experience through {QR} codes on mobile platforms}, journal = {Gov. Inf. Q.}, volume = {31}, number = {1}, pages = {6--16}, year = {2014}, url = {https://doi.org/10.1016/j.giq.2013.05.025}, doi = {10.1016/J.GIQ.2013.05.025}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/giq/LorenziVCSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LuVA14, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {An optimization framework for role mining}, journal = {J. Comput. Secur.}, volume = {22}, number = {1}, pages = {1--31}, year = {2014}, url = {https://doi.org/10.3233/JCS-130484}, doi = {10.3233/JCS-130484}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/LuVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/UzunAVSFPM14, author = {Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural and Anna Lisa Ferrara and Gennaro Parlato and P. Madhusudan}, title = {Security analysis for temporal role based access control}, journal = {J. Comput. Secur.}, volume = {22}, number = {6}, pages = {961--996}, year = {2014}, url = {https://doi.org/10.3233/JCS-140510}, doi = {10.3233/JCS-140510}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/UzunAVSFPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/LorenziVSCVAAWA14, author = {David Lorenzi and Jaideep Vaidya and Basit Shafiq and Soon Ae Chun and Neelima Vegesna and Zamil S. Alzamil and Nabil R. Adam and Seth Wainer and Vijayalakshmi Atluri}, editor = {Gabriel Puron Cid and Scott P. Robertson and Jing Zhang and J. Ram{\'{o}}n Gil{-}Garc{\'{\i}}a}, title = {Utilizing social media to improve local government responsiveness}, booktitle = {15th Annual International Conference on Digital Government Research, dg.o '14, Aguascalientes, Mexico, June 18-21, 2014}, pages = {236--244}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2612733.2612773}, doi = {10.1145/2612733.2612773}, timestamp = {Thu, 28 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/LorenziVSCVAAWA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/JhaSVA14, author = {Sadhana Jha and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Atul Prakash and Rudrapatna K. Shyamasundar}, title = {Temporal {RBAC} Security Analysis Using Logic Programming in the Presence of Administrative Policies}, booktitle = {Information Systems Security - 10th International Conference, {ICISS} 2014, Hyderabad, India, December 16-20, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8880}, pages = {129--148}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13841-1\_8}, doi = {10.1007/978-3-319-13841-1\_8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/JhaSVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/BadarVA14, author = {Nazia Badar and Jaideep Vaidya and Vijay Atluri}, editor = {Michael E. Whitman and Humayun Zafar}, title = {More data, more security challenges: integrating analytics in to the information security curriculum}, booktitle = {Proceedings of the 2014 Information Security Curriculum Development Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014}, pages = {8:1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2670739.2670743}, doi = {10.1145/2670739.2670743}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infoseccd/BadarVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2014, editor = {Vijay Atluri and G{\"{u}}nther Pernul}, title = {Data and Applications Security and Privacy {XXVIII} - 28th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8566}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-43936-4}, doi = {10.1007/978-3-662-43936-4}, isbn = {978-3-662-43935-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaSVA13, author = {Manisha Sharma and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {{AMTRAC:} An administrative model for temporal role-based access control}, journal = {Comput. Secur.}, volume = {39}, pages = {201--218}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.07.005}, doi = {10.1016/J.COSE.2013.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaSVA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MitraSAV13, author = {Barsha Mitra and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Lingyu Wang and Basit Shafiq}, title = {Toward Mining of Temporal Roles}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {65--80}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_5}, doi = {10.1007/978-3-642-39256-6\_5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MitraSAV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/UzunAVS13, author = {Emre Uzun and Vijayalakshmi Atluri and Jaideep Vaidya and Shamik Sural}, editor = {Lingyu Wang and Basit Shafiq}, title = {Analysis of {TRBAC} with Dynamic Temporal Role Hierarchies}, booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP} {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7964}, pages = {297--304}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39256-6\_22}, doi = {10.1007/978-3-642-39256-6\_22}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/UzunAVS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/LorenziVCSNAA13, author = {David Lorenzi and Jaideep Vaidya and Soon Ae Chun and Basit Shafiq and Varuna Naik and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Sehl Mellouli and Luis F. Luna{-}Reyes and Jing Zhang}, title = {Community based emergency response}, booktitle = {14th Annual International Conference on Digital Government Research, dg.o 2013, Quebec City, QC, Canada, June 17-20, 2013}, pages = {82--91}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2479724.2479739}, doi = {10.1145/2479724.2479739}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/LorenziVCSNAA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/HachanaCCAM13, author = {Safa{\`{a}} Hachana and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and Vijay Atluri and Stephane Morucci}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall Management}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {133--147}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_10}, doi = {10.1007/978-3-642-45204-8\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LorenziVSA13, author = {David Lorenzi and Jaideep Vaidya and Shamik Sural and Vijayalakshmi Atluri}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {Web Services Based Attacks against Image CAPTCHAs}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {214--229}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_16}, doi = {10.1007/978-3-642-45204-8\_16}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LorenziVSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/SharmaSAV13, author = {Manisha Sharma and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Aditya Bagchi and Indrakshi Ray}, title = {An Administrative Model for Spatio-Temporal Role Based Access Control}, booktitle = {Information Systems Security - 9th International Conference, {ICISS} 2013, Kolkata, India, December 16-20, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8303}, pages = {375--389}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-45204-8\_28}, doi = {10.1007/978-3-642-45204-8\_28}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/SharmaSAV13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MolloyTLKSA13, author = {Ian M. Molloy and Mahesh V. Tripunitara and Volkmar Lotz and Martin Kuhlmann and Casey Schaufler and Vijay Atluri}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Panel on granularity in access control}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {85--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462889}, doi = {10.1145/2462410.2462889}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MolloyTLKSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LuVAH12, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong}, title = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {655--669}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.21}, doi = {10.1109/TDSC.2012.21}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wias/HeVSAA12, author = {Xiaoyun He and Jaideep Vaidya and Basit Shafiq and Nabil R. Adam and Vijayalakshmi Atluri}, title = {Structure-aware graph anonymization}, journal = {Web Intell. Agent Syst.}, volume = {10}, number = {2}, pages = {193--208}, year = {2012}, url = {https://doi.org/10.3233/WIA-2012-0241}, doi = {10.3233/WIA-2012-0241}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wias/HeVSAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/VerdeVAC12, author = {Nino Vincenzo Verde and Jaideep Vaidya and Vijay Atluri and Alessandro Colantonio}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Role engineering: from theory to practice}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {181--192}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133624}, doi = {10.1145/2133601.2133624}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/VerdeVAC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MehmoodSVHAA12, author = {Danish Mehmood and Basit Shafiq and Jaideep Vaidya and Yuan Hong and Nabil R. Adam and Vijayalakshmi Atluri}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Privacy-Preserving Subgraph Discovery}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {161--176}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_13}, doi = {10.1007/978-3-642-31540-4\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MehmoodSVHAA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/LorenziSVNCA12, author = {David Lorenzi and Basit Shafiq and Jaideep Vaidya and Ghulam Nabi and Soon Ae Chun and Vijayalakshmi Atluri}, editor = {John Carlo Bertot and Luis F. Luna{-}Reyes and Sehl Mellouli}, title = {Using {QR} codes for enhancing the scope of digital government services}, booktitle = {13th Annual International Conference on Digital Government Research, dg.o 2012, College Park, MD, USA, June 4-7, 2012}, pages = {21--29}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2307729.2307734}, doi = {10.1145/2307729.2307734}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/LorenziSVNCA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/LorenziVUSA12, author = {David Lorenzi and Jaideep Vaidya and Emre Uzun and Shamik Sural and Vijayalakshmi Atluri}, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {Attacking Image Based CAPTCHAs Using Image Recognition Techniques}, booktitle = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {327--342}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35130-3\_23}, doi = {10.1007/978-3-642-35130-3\_23}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/LorenziVUSA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/UzunASVPFM12, author = {Emre Uzun and Vijayalakshmi Atluri and Shamik Sural and Jaideep Vaidya and Gennaro Parlato and Anna Lisa Ferrara and Parthasarathy Madhusudan}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {Analyzing temporal role based access control models}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {177--186}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295169}, doi = {10.1145/2295136.2295169}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/UzunASVPFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/safeconfig/BadarVAS12, author = {Nazia Badar and Jaideep Vaidya and Vijayalakshmi Atluri and Basit Shafiq}, editor = {Ehab Al{-}Shaer and Xinming Ou and Geoffrey G. Xie}, title = {Risk Based Access Control Using Classification}, booktitle = {Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, {USA]}}, pages = {79--95}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-319-01433-3\_5}, doi = {10.1007/978-3-319-01433-3\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/safeconfig/BadarVAS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/JohnSAV12, author = {John C. John and Shamik Sural and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Dimitris Gritzalis and Steven Furnell and Marianthi Theoharidou}, title = {Role Mining under Role-Usage Cardinality Constraint}, booktitle = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {376}, pages = {150--161}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30436-1\_13}, doi = {10.1007/978-3-642-30436-1\_13}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/JohnSAV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2012, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136}, doi = {10.1145/2295136}, isbn = {978-1-4503-1295-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MondalSA11, author = {Samrat Mondal and Shamik Sural and Vijayalakshmi Atluri}, title = {Security analysis of {GTRBAC} and its variants using model checking}, journal = {Comput. Secur.}, volume = {30}, number = {2-3}, pages = {128--147}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.09.002}, doi = {10.1016/J.COSE.2010.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MondalSA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Atluri11, author = {Vijay Atluri}, title = {Preface}, journal = {J. Comput. Secur.}, volume = {19}, number = {3}, pages = {365}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0425}, doi = {10.3233/JCS-2011-0425}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Atluri11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShinAC11, author = {Heechang Shin and Vijayalakshmi Atluri and June{-}Suh Cho}, title = {Efficiently enforcing spatiotemporal access control under uncertain location information}, journal = {J. Comput. Secur.}, volume = {19}, number = {3}, pages = {607--637}, year = {2011}, url = {https://doi.org/10.3233/JCS-2011-0423}, doi = {10.3233/JCS-2011-0423}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShinAC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ShinVA11, author = {Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {A profile anonymization model for location-based services}, journal = {J. Comput. Secur.}, volume = {19}, number = {5}, pages = {795--833}, year = {2011}, url = {https://doi.org/10.3233/JCS-2010-0416}, doi = {10.3233/JCS-2010-0416}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ShinVA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/FerraioloAG11, author = {David F. Ferraiolo and Vijayalakshmi Atluri and Serban I. Gavrila}, title = {The Policy Machine: {A} novel architecture and framework for access control policy specification and enforcement}, journal = {J. Syst. Archit.}, volume = {57}, number = {4}, pages = {412--424}, year = {2011}, url = {https://doi.org/10.1016/j.sysarc.2010.04.005}, doi = {10.1016/J.SYSARC.2010.04.005}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/FerraioloAG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/UzunALV11, author = {Emre Uzun and Vijayalakshmi Atluri and Haibing Lu and Jaideep Vaidya}, editor = {Yingjiu Li}, title = {An Optimization Model for the Extended Role Mining Problem}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {76--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_8}, doi = {10.1007/978-3-642-22348-8\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/UzunALV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AtluriSCNV11, author = {Vijay Atluri and Basit Shafiq and Soon Ae Chun and Ghulam Nabi and Jaideep Vaidya}, editor = {John Carlo Bertot and Karine Nahon and Soon Ae Chun and Luis F. Luna{-}Reyes and Vijay Atluri}, title = {UICDS-based information sharing among emergency response application systems}, booktitle = {Proceedings of the 12th Annual International Conference on Digital Government Research, {DG.O} 2011, College Park, MD, USA, June 12 - 15, 2011}, series = {{ACM} International Conference Proceeding Series}, pages = {331--332}, publisher = {Digital Government Research Center}, year = {2011}, url = {https://doi.org/10.1145/2037556.2037611}, doi = {10.1145/2037556.2037611}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AtluriSCNV11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sdm/LuVASJ11, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Heechang Shin and Lili Jiang}, title = {Weighted Rank-One Binary Matrix Factorization}, booktitle = {Proceedings of the Eleventh {SIAM} International Conference on Data Mining, {SDM} 2011, April 28-30, 2011, Mesa, Arizona, {USA}}, pages = {283--294}, publisher = {{SIAM} / Omnipress}, year = {2011}, url = {https://doi.org/10.1137/1.9781611972818.25}, doi = {10.1137/1.9781611972818.25}, timestamp = {Wed, 14 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sdm/LuVASJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dgo/2011, editor = {John Carlo Bertot and Karine Nahon and Soon Ae Chun and Luis F. Luna{-}Reyes and Vijay Atluri}, title = {Proceedings of the 12th Annual International Conference on Digital Government Research, {DG.O} 2011, College Park, MD, USA, June 12 - 15, 2011}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2011}, url = {https://doi.org/10.1145/2037556}, doi = {10.1145/2037556}, isbn = {978-1-4503-0762-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/esorics/2011, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2}, doi = {10.1007/978-3-642-23822-2}, isbn = {978-3-642-23821-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Alturi11, author = {Vijay Alturi}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {{HRU}}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {562--564}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_819}, doi = {10.1007/978-1-4419-5906-5\_819}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Alturi11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/AlturiF11, author = {Vijay Alturi and David F. Ferraiolo}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Role-Based Access Control}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1053--1055}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_829}, doi = {10.1007/978-1-4419-5906-5\_829}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/AlturiF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShinVA10, author = {Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Anonymization models for directional location based service environments}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {59--73}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.006}, doi = {10.1016/J.COSE.2009.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShinVA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/datamine/JanejaAAV10, author = {Vandana Pursnani Janeja and Nabil R. Adam and Vijayalakshmi Atluri and Jaideep Vaidya}, title = {Spatial neighborhood based anomaly detection in sensor datasets}, journal = {Data Min. Knowl. Discov.}, volume = {20}, number = {2}, pages = {221--258}, year = {2010}, url = {https://doi.org/10.1007/s10618-009-0147-0}, doi = {10.1007/S10618-009-0147-0}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/datamine/JanejaAAV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/QinA10, author = {Li Qin and Vijayalakshmi Atluri}, title = {Semantics-aware security policy specification for the semantic web data}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {1}, pages = {52--75}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.031859}, doi = {10.1504/IJICS.2010.031859}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/QinA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AtluriGSV10, author = {Vijayalakshmi Atluri and Qi Guo and Heechang Shin and Jaideep Vaidya}, title = {A unified index structure for efficient enforcement of spatiotemporal authorisations}, journal = {Int. J. Inf. Comput. Secur.}, volume = {4}, number = {2}, pages = {118--151}, year = {2010}, url = {https://doi.org/10.1504/IJICS.2010.034814}, doi = {10.1504/IJICS.2010.034814}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AtluriGSV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/VaidyaAWG10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Janice Warner and Qi Guo}, title = {Role Engineering via Prioritized Subset Enumeration}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {7}, number = {3}, pages = {300--314}, year = {2010}, url = {https://doi.org/10.1109/TDSC.2008.61}, doi = {10.1109/TDSC.2008.61}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/VaidyaAWG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/VaidyaAG10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo}, title = {The role mining problem: {A} formal perspective}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {27:1--27:31}, year = {2010}, url = {https://doi.org/10.1145/1805974.1895983}, doi = {10.1145/1805974.1895983}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/VaidyaAGL10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Haibing Lu}, editor = {Sara Foresti and Sushil Jajodia}, title = {Role Mining in the Presence of Noise}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {97--112}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_7}, doi = {10.1007/978-3-642-13739-6\_7}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/VaidyaAGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ShafiqVAC10, author = {Basit Shafiq and Jaideep Vaidya and Vijay Atluri and Soon Ae Chun}, editor = {Soon Ae Chun and Rodrigo Sandoval and Andrew Philpot}, title = {{UICDS} compliant resource management system for emergency response}, booktitle = {Proceedings of the 11th Annual International Conference on Digital Government Research, Public Administration Online: Challenges and Opportunities, {DG.O} 2010, Puebla, Mexico, May 17-20, 2010}, series = {{ACM} International Conference Proceeding Series}, pages = {23--31}, publisher = {Digital Government Research Center}, year = {2010}, url = {http://dl.acm.org/citation.cfm?id=1809882}, timestamp = {Fri, 20 Nov 2015 13:56:21 +0100}, biburl = {https://dblp.org/rec/conf/dgo/ShafiqVAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/ShinVAC10, author = {Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri and Sungyong Choi}, editor = {Takahiro Hara and Christian S. Jensen and Vijay Kumar and Sanjay Madria and Demetrios Zeinalipour{-}Yazti}, title = {Ensuring Privacy and Security for {LBS} through Trajectory Partitioning}, booktitle = {Eleventh International Conference on Mobile Data Management, {MDM} 2010, Kanas City, Missouri, USA, 23-26 May 2010}, pages = {224--226}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/MDM.2010.29}, doi = {10.1109/MDM.2010.29}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/ShinVAC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VaidyaASA10, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Basit Shafiq and Nabil R. Adam}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Privacy-preserving trust verification}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {139--148}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809865}, doi = {10.1145/1809842.1809865}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VaidyaASA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/igi/10/YuAA10, author = {Songmei Yu and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Tho Manh Nguyen}, title = {Preview}, booktitle = {Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development - Innovative Methods and Applications}, pages = {47--63}, publisher = {Information Science Reference}, year = {2010}, url = {https://doi.org/10.4018/978-1-60566-748-5.ch003}, doi = {10.4018/978-1-60566-748-5.CH003}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/igi/10/YuAA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ida/JanejaA09, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri}, title = {Spatial outlier detection in heterogeneous neighborhoods}, journal = {Intell. Data Anal.}, volume = {13}, number = {1}, pages = {85--107}, year = {2009}, url = {https://doi.org/10.3233/IDA-2009-0357}, doi = {10.3233/IDA-2009-0357}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ida/JanejaA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/QinA09, author = {Li Qin and Vijayalakshmi Atluri}, title = {Evaluating the validity of data instances against ontology evolution over the Semantic Web}, journal = {Inf. Softw. Technol.}, volume = {51}, number = {1}, pages = {83--97}, year = {2009}, url = {https://doi.org/10.1016/j.infsof.2008.01.004}, doi = {10.1016/J.INFSOF.2008.01.004}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/QinA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/VaidyaAGL09, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Haibing Lu}, title = {Edge-RMP: Minimizing administrative assignments for role-based access control}, journal = {J. Comput. Secur.}, volume = {17}, number = {2}, pages = {211--235}, year = {2009}, url = {https://doi.org/10.3233/JCS-2009-0341}, doi = {10.3233/JCS-2009-0341}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/VaidyaAGL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kais/GuoXAA09, author = {Dihua Guo and Hui Xiong and Vijayalakshmi Atluri and Nabil R. Adam}, title = {Object discovery in high-resolution remote sensing images: a semantic perspective}, journal = {Knowl. Inf. Syst.}, volume = {19}, number = {2}, pages = {211--233}, year = {2009}, url = {https://doi.org/10.1007/s10115-008-0160-4}, doi = {10.1007/S10115-008-0160-4}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kais/GuoXAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cikm/HongHVAA09, author = {Yuan Hong and Xiaoyun He and Jaideep Vaidya and Nabil R. Adam and Vijayalakshmi Atluri}, editor = {David Wai{-}Lok Cheung and Il{-}Yeol Song and Wesley W. Chu and Xiaohua Hu and Jimmy Lin}, title = {Effective anonymization of query logs}, booktitle = {Proceedings of the 18th {ACM} Conference on Information and Knowledge Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009}, pages = {1465--1468}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1645953.1646146}, doi = {10.1145/1645953.1646146}, timestamp = {Fri, 27 Aug 2021 11:13:00 +0200}, biburl = {https://dblp.org/rec/conf/cikm/HongHVAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ShinA09, author = {Heechang Shin and Vijayalakshmi Atluri}, editor = {Ehud Gudes and Jaideep Vaidya}, title = {Spatiotemporal Access Control Enforcement under Uncertain Location Estimates}, booktitle = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5645}, pages = {159--174}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03007-9\_11}, doi = {10.1007/978-3-642-03007-9\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ShinA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/LuLAV09, author = {Haibing Lu and Yingjiu Li and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Martin L. Kersten and Boris Novikov and Jens Teubner and Vladimir Polutin and Stefan Manegold}, title = {An efficient online auditing approach to limit private data disclosure}, booktitle = {{EDBT} 2009, 12th International Conference on Extending Database Technology, Saint Petersburg, Russia, March 24-26, 2009, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {360}, pages = {636--647}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1516360.1516434}, doi = {10.1145/1516360.1516434}, timestamp = {Wed, 04 May 2022 13:02:27 +0200}, biburl = {https://dblp.org/rec/conf/edbt/LuLAV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/LuVAH09, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri and Yuan Hong}, editor = {Wei Wang and Hillol Kargupta and Sanjay Ranka and Philip S. Yu and Xindong Wu}, title = {Extended Boolean Matrix Decomposition}, booktitle = {{ICDM} 2009, The Ninth {IEEE} International Conference on Data Mining, Miami, Florida, USA, 6-9 December 2009}, pages = {317--326}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDM.2009.61}, doi = {10.1109/ICDM.2009.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/LuVAH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MondalSA09, author = {Samrat Mondal and Shamik Sural and Vijayalakshmi Atluri}, editor = {Barbara Carminati and James Joshi}, title = {Towards formal security analysis of {GTRBAC} using timed automata}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {33--42}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542214}, doi = {10.1145/1542207.1542214}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MondalSA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/webi/HeVSAA09, author = {Xiaoyun He and Jaideep Vaidya and Basit Shafiq and Nabil R. Adam and Vijay Atluri}, title = {Preserving Privacy in Social Networks: {A} Structure-Aware Approach}, booktitle = {2009 {IEEE/WIC/ACM} International Conference on Web Intelligence, {WI} 2009, Milan, Italy, 15-18 September 2009, Main Conference Proceedings}, pages = {647--654}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/WI-IAT.2009.108}, doi = {10.1109/WI-IAT.2009.108}, timestamp = {Thu, 25 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/webi/HeVSAA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriSV08, author = {Vijayalakshmi Atluri and Heechang Shin and Jaideep Vaidya}, title = {Efficient security policy enforcement for the mobile environment}, journal = {J. Comput. Secur.}, volume = {16}, number = {4}, pages = {439--475}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0329}, doi = {10.3233/JCS-2008-0329}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriSV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/JanejaA08, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri}, title = {Random Walks to Identify Anomalous Free-Form Spatial Scan Windows}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {20}, number = {10}, pages = {1378--1392}, year = {2008}, url = {https://doi.org/10.1109/TKDE.2008.96}, doi = {10.1109/TKDE.2008.96}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/JanejaA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GuoVA08, author = {Qi Guo and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies}, booktitle = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC} 2008, Anaheim, California, USA, 8-12 December 2008}, pages = {237--246}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ACSAC.2008.38}, doi = {10.1109/ACSAC.2008.38}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GuoVA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamEASCVX08, author = {Nabil R. Adam and Vijay Atluri and Soon Ae Chun and John Ellenberger and Basit Shafiq and Jaideep Vaidya and Hui Xiong}, editor = {Soon Ae Chun and Marijn Janssen and J. Ram{\'{o}}n Gil{-}Garc{\'{\i}}a}, title = {Secure information sharing and analysis for effective emergency management}, booktitle = {Proceedings of the 9th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, {DG.O} 2008, Montreal, Canada, May 18-21, 2008}, series = {{ACM} International Conference Proceeding Series}, volume = {289}, pages = {407--408}, publisher = {Digital Government Research Center}, year = {2008}, url = {http://dl.acm.org/citation.cfm?id=1367916}, timestamp = {Fri, 08 Sep 2023 15:13:05 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AdamEASCVX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/LuVA08, author = {Haibing Lu and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Gustavo Alonso and Jos{\'{e}} A. Blakeley and Arbee L. P. Chen}, title = {Optimal Boolean Matrix Decomposition: Application to Role Engineering}, booktitle = {Proceedings of the 24th International Conference on Data Engineering, {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico}, pages = {297--306}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDE.2008.4497438}, doi = {10.1109/ICDE.2008.4497438}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/LuVA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/ShinAV08, author = {Heechang Shin and Vijayalakshmi Atluri and Jaideep Vaidya}, editor = {Xiaofeng Meng and Hui Lei and St{\'{e}}phane Grumbach and Hong Va Leong}, title = {A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment}, booktitle = {9th International Conference on Mobile Data Management {(MDM} 2008), Beijing, China, April 27-30, 2008}, pages = {73--80}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/MDM.2008.33}, doi = {10.1109/MDM.2008.33}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/ShinAV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VaidyaAGA08, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Nabil R. Adam}, editor = {Indrakshi Ray and Ninghui Li}, title = {Migrating to optimal {RBAC} with minimal perturbation}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377839}, doi = {10.1145/1377836.1377839}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VaidyaAGA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Atluri08, author = {Vijay Atluri}, editor = {Indrakshi Ray and Ninghui Li}, title = {Panel on role engineering}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {61--62}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377846}, doi = {10.1145/1377836.1377846}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Atluri08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FerraioloA08, author = {David F. Ferraiolo and Vijay Atluri}, editor = {Indrakshi Ray and Ninghui Li}, title = {A meta model for access control: why is it needed and is it even possible to achieve?}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {153--154}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377860}, doi = {10.1145/1377836.1377860}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/FerraioloA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/08/AdamJPACCPBS08, author = {Nabil R. Adam and Vandana P. Janeja and Aabhas V. Paliwal and Vijay Atluri and Soon Ae Chun and Jim Cooper and John Paczkowski and Christof Bornh{\"{o}}vd and Joachim Schaper}, editor = {Hsinchun Chen and Lawrence Brandt and Valerie Gregg and Roland Traunm{\"{u}}ller and Sharon S. Dawes and Eduard H. Hovy and Ann Macintosh and Catherine A. Larson}, title = {Semantics-Based Threat Structure Mining for Homeland Security}, booktitle = {Digital Government: E-Government Research, Case Studies, and Implementation}, series = {Integrated Series In Information Systems}, volume = {17}, pages = {307--329}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-71611-4\_16}, doi = {10.1007/978-0-387-71611-4\_16}, timestamp = {Tue, 23 Jul 2019 18:38:58 +0200}, biburl = {https://dblp.org/rec/books/sp/08/AdamJPACCPBS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/AtluriW08, author = {Vijayalakshmi Atluri and Janice Warner}, editor = {Michael Gertz and Sushil Jajodia}, title = {Security for Workflow Systems}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {213--230}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_9}, doi = {10.1007/978-0-387-48533-1\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/dbsec/AtluriW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/ChunA08, author = {Soon Ae Chun and Vijayalakshmi Atluri}, editor = {Michael Gertz and Sushil Jajodia}, title = {Geospatial Database Security}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {247--266}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_11}, doi = {10.1007/978-0-387-48533-1\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/dbsec/ChunA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/dbsec/AtluriS08, author = {Vijayalakshmi Atluri and Heechang Shin}, editor = {Michael Gertz and Sushil Jajodia}, title = {Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment}, booktitle = {Handbook of Database Security - Applications and Trends}, pages = {553--573}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-48533-1\_23}, doi = {10.1007/978-0-387-48533-1\_23}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/dbsec/AtluriS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2008, editor = {Vijay Atluri}, title = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3}, doi = {10.1007/978-3-540-70567-3}, isbn = {978-3-540-70566-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2008, editor = {Vijay Atluri and Marianne Winslett}, title = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008}, publisher = {{ACM}}, year = {2008}, isbn = {978-1-60558-289-4}, timestamp = {Tue, 11 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/gis/AtluriS08, author = {Vijay Atluri and Heechang Shin}, editor = {Shashi Shekhar and Hui Xiong}, title = {Geospatial Authorizations, Efficient Enforcement}, booktitle = {Encyclopedia of {GIS}}, pages = {379--385}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-35973-1\_503}, doi = {10.1007/978-0-387-35973-1\_503}, timestamp = {Fri, 03 Apr 2020 17:07:19 +0200}, biburl = {https://dblp.org/rec/reference/gis/AtluriS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/gis/ChunA08, author = {Soon Ae Chun and Vijay Atluri}, editor = {Shashi Shekhar and Hui Xiong}, title = {Security Models, Geospatial}, booktitle = {Encyclopedia of {GIS}}, pages = {1028--1036}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-35973-1\_1178}, doi = {10.1007/978-0-387-35973-1\_1178}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/gis/ChunA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/AtluriCMM07, author = {Vijayalakshmi Atluri and Soon Ae Chun and Ravi Mukkamala and Pietro Mazzoleni}, title = {A decentralized execution model for inter-organizational workflows}, journal = {Distributed Parallel Databases}, volume = {22}, number = {1}, pages = {55--83}, year = {2007}, url = {https://doi.org/10.1007/s10619-007-7012-1}, doi = {10.1007/S10619-007-7012-1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/AtluriCMM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijics/AtluriC07, author = {Vijayalakshmi Atluri and Soon Ae Chun}, title = {A geotemporal role-based authorisation system}, journal = {Int. J. Inf. Comput. Secur.}, volume = {1}, number = {1/2}, pages = {143--168}, year = {2007}, url = {https://doi.org/10.1504/IJICS.2007.012247}, doi = {10.1504/IJICS.2007.012247}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijics/AtluriC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriS07, author = {Vijayalakshmi Atluri and Heechang Shin}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Efficient Security Policy Enforcement in a Location Based Service Environment}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {61--76}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_5}, doi = {10.1007/978-3-540-73538-0\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunAA07, author = {Soon Ae Chun and Nabil R. Adam and Vijay Atluri}, editor = {Judith Bayard Cushing and Theresa A. Pardo}, title = {{MENVIS:} mobile environmental information system}, booktitle = {Proceedings of the 8th Annual International Conference on Digital Government Research, Bridging Disciplines {\&} Domains, {DG.O} 2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007}, series = {{ACM} International Conference Proceeding Series}, volume = {228}, pages = {286--287}, publisher = {Digital Government Research Center}, year = {2007}, url = {http://dl.acm.org/citation.cfm?id=1248522}, timestamp = {Fri, 20 Nov 2015 13:56:20 +0100}, biburl = {https://dblp.org/rec/conf/dgo/ChunAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/GuoXAA07, author = {Dihua Guo and Hui Xiong and Vijay Atluri and Nabil R. Adam}, editor = {Zhi{-}Hua Zhou and Hang Li and Qiang Yang}, title = {Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery}, booktitle = {Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia Conference, {PAKDD} 2007, Nanjing, China, May 22-25, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4426}, pages = {71--83}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71701-0\_10}, doi = {10.1007/978-3-540-71701-0\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/GuoXAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VaidyaAG07, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {The role mining problem: finding a minimal descriptive set of roles}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {175--184}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266870}, doi = {10.1145/1266840.1266870}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VaidyaAG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WarnerAMV07, author = {Janice Warner and Vijayalakshmi Atluri and Ravi Mukkamala and Jaideep Vaidya}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Using semantics for automatic enforcement of access control policies among dynamic coalitions}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {235--244}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266877}, doi = {10.1145/1266840.1266877}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/WarnerAMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007csaw, editor = {Peng Ning and Vijay Atluri}, title = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture, {CSAW} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-890-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007csaw.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007fmse, editor = {Peng Ning and Vijay Atluri and Virgil D. Gligor and Heiko Mantel}, title = {Proceedings of the 2007 {ACM} workshop on Formal methods in security engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-887-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2007stc, editor = {Peng Ning and Vijay Atluri and Shouhuai Xu and Moti Yung}, title = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing, {STC} 2007, Alexandria, VA, USA, November 2, 2007}, publisher = {{ACM}}, year = {2007}, isbn = {978-1-59593-888-6}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2007stc.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijswis/QinA06, author = {Li Qin and Vijayalakshmi Atluri}, title = {SemDiff: An Approach to Detecting Semantic Changes to Ontologies}, journal = {Int. J. Semantic Web Inf. Syst.}, volume = {2}, number = {4}, pages = {1--32}, year = {2006}, url = {https://doi.org/10.4018/jswis.2006100101}, doi = {10.4018/JSWIS.2006100101}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijswis/QinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jods/QinA06, author = {Li Qin and Vijayalakshmi Atluri}, title = {An Ontology-Guided Approach to Change Detection of the Semantic Web Data}, journal = {J. Data Semant.}, pages = {130--157}, year = {2006}, url = {https://doi.org/10.1007/11617808\_5}, doi = {10.1007/11617808\_5}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jods/QinA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MitraPLA06, author = {Prasenjit Mitra and Chi{-}Chun Pan and Peng Liu and Vijayalakshmi Atluri}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Privacy-preserving semantic interoperation and access control of heterogeneous databases}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {66--77}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128831}, doi = {10.1145/1128817.1128831}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MitraPLA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/VaidyaAW06, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Janice Warner}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {RoleMiner: mining roles using subset enumeration}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {144--153}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180424}, doi = {10.1145/1180405.1180424}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/VaidyaAW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dawak/YuAA06, author = {Songmei Yu and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {A Min Tjoa and Juan Trujillo}, title = {Preview: Optimizing View Materialization Cost in Spatial Data Warehouses}, booktitle = {Data Warehousing and Knowledge Discovery, 8th International Conference, DaWaK 2006, Krakow, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4081}, pages = {45--54}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11823728\_5}, doi = {10.1007/11823728\_5}, timestamp = {Wed, 09 Jun 2021 08:38:36 +0200}, biburl = {https://dblp.org/rec/conf/dawak/YuAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/MukkamalaAWA06, author = {Ravi Mukkamala and Vijayalakshmi Atluri and Janice Warner and Ranjit Abbadasari}, editor = {Ernesto Damiani and Peng Liu}, title = {A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: {A} Service-Oriented Approach}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {209--223}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_15}, doi = {10.1007/11805588\_15}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/MukkamalaAWA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriS06, author = {Vijayalakshmi Atluri and Heechang Shin}, editor = {Ernesto Damiani and Peng Liu}, title = {Efficient Enforcement of Security Policies Based on Tracking of Mobile Users}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {237--251}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_17}, doi = {10.1007/11805588\_17}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/YuAA06, author = {Songmei Yu and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {St{\'{e}}phane Bressan and Josef K{\"{u}}ng and Roland R. Wagner}, title = {Cascaded Star: {A} Hyper-Dimensional Model for a Data Warehouse}, booktitle = {Database and Expert Systems Applications, 17th International Conference, {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4080}, pages = {439--448}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11827405\_43}, doi = {10.1007/11827405\_43}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/YuAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamAKGJW06, author = {Nabil R. Adam and Vijayalakshmi Atluri and Rey Koslowski and Robert Grossman and Vandana Pursnani Janeja and Janice Warner}, editor = {Jos{\'{e}} A. B. Fortes and Ann Macintosh}, title = {Secure interoperation for effective data mining in border control and homeland security applications}, booktitle = {Proceedings of the 7th Annual International Conference on Digital Government Research, {DG.O} 2006, San Diego, California, USA, May 21-24, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {151}, pages = {124--125}, publisher = {Digital Government Research Center}, year = {2006}, url = {https://doi.org/10.1145/1146598.1146636}, doi = {10.1145/1146598.1146636}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AdamAKGJW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunYAA06, author = {Soon Ae Chun and Yelena Yesha and Nabil R. Adam and Vijay Atluri}, editor = {Jos{\'{e}} A. B. Fortes and Ann Macintosh}, title = {Challenges in eGovernment technology transfer}, booktitle = {Proceedings of the 7th Annual International Conference on Digital Government Research, {DG.O} 2006, San Diego, California, USA, May 21-24, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {151}, pages = {151--152}, publisher = {Digital Government Research Center}, year = {2006}, url = {https://doi.org/10.1145/1146598.1146646}, doi = {10.1145/1146598.1146646}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ChunYAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamACABC06, author = {Nabil R. Adam and Vijay Atluri and Soon Ae Chun and Francisco J. Artigas and Irfan Bora and Bob Ceberio}, editor = {Jos{\'{e}} A. B. Fortes and Ann Macintosh}, title = {Constituent-centric municipal government coalition portal}, booktitle = {Proceedings of the 7th Annual International Conference on Digital Government Research, {DG.O} 2006, San Diego, California, USA, May 21-24, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {151}, pages = {365--366}, publisher = {Digital Government Research Center}, year = {2006}, url = {https://doi.org/10.1145/1146598.1146704}, doi = {10.1145/1146598.1146704}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AdamACABC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamAJPYCCPBNS06, author = {Nabil R. Adam and Vijayalakshmi Atluri and Vandana Pursnani Janeja and Aabhas V. Paliwal and Mahmoud Youssef and Soon Ae Chun and Jim Cooper and John Paczkowski and Christof Bornh{\"{o}}vd and Ike Nassi and Joachim Schaper}, editor = {Jos{\'{e}} A. B. Fortes and Ann Macintosh}, title = {Semantics-based threat structure mining}, booktitle = {Proceedings of the 7th Annual International Conference on Digital Government Research, {DG.O} 2006, San Diego, California, USA, May 21-24, 2006}, series = {{ACM} International Conference Proceeding Series}, volume = {151}, pages = {367--368}, publisher = {Digital Government Research Center}, year = {2006}, url = {https://doi.org/10.1145/1146598.1146705}, doi = {10.1145/1146598.1146705}, timestamp = {Wed, 27 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AdamAJPYCCPBNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/YoussefAA06, author = {Mahmoud Youssef and Nabil R. Adam and Vijayalakshmi Atluri}, editor = {Hisham Haddad}, title = {Semantically enhanced enforcement of mobile consumer's privacy preferences}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC), Dijon, France, April 23-27, 2006}, pages = {1172--1176}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1141277.1141554}, doi = {10.1145/1141277.1141554}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/YoussefAA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WarnerA06, author = {Janice Warner and Vijayalakshmi Atluri}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Inter-instance authorization constraints for secure workflow management}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {190--199}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133085}, doi = {10.1145/1133058.1133085}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/WarnerA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iciss/2006, editor = {Aditya Bagchi and Vijayalakshmi Atluri}, title = {Information Systems Security, Second International Conference, {ICISS} 2006, Kolkata, India, December 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4332}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11961635}, doi = {10.1007/11961635}, isbn = {3-540-68962-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/ChunAA05, author = {Soon Ae Chun and Vijayalakshmi Atluri and Nabil R. Adam}, title = {Using Semantics for Policy-Based Web Service Composition}, journal = {Distributed Parallel Databases}, volume = {18}, number = {1}, pages = {37--64}, year = {2005}, url = {https://doi.org/10.1007/s10619-005-1073-9}, doi = {10.1007/S10619-005-1073-9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/ChunAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/Atluri05, author = {Vijay Atluri}, title = {Preface}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {1}, pages = {2}, year = {2005}, url = {https://doi.org/10.1145/1053283.1053285}, doi = {10.1145/1053283.1053285}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/Atluri05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dawak/YuAA05, author = {Songmei Yu and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {A Min Tjoa and Juan Trujillo}, title = {Selective View Materialization in a Spatial Data Warehouse}, booktitle = {Data Warehousing and Knowledge Discovery, 7th International Conference, DaWaK 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3589}, pages = {157--167}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11546849\_16}, doi = {10.1007/11546849\_16}, timestamp = {Wed, 09 Jun 2021 08:38:36 +0200}, biburl = {https://dblp.org/rec/conf/dawak/YuAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/WarnerAM05, author = {Janice Warner and Vijayalakshmi Atluri and Ravi Mukkamala}, editor = {Sushil Jajodia and Duminda Wijesekera}, title = {A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions}, booktitle = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3654}, pages = {252--266}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11535706\_19}, doi = {10.1007/11535706\_19}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/WarnerAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/JanejaAGABL05, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri and Ahmed Gomaa and Nabil R. Adam and Christof Bornh{\"{o}}vd and Tao Lin}, editor = {Lois M. L. Delcambre and Genevieve Giuliano}, title = {{DM-AMS:} employing data mining techniques for alert management}, booktitle = {Proceedings of the 2005 National Conference on Digital Government Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {89}, pages = {103--111}, publisher = {Digital Government Research Center}, year = {2005}, url = {http://dl.acm.org/citation.cfm?id=1065254}, timestamp = {Fri, 20 Nov 2015 13:56:21 +0100}, biburl = {https://dblp.org/rec/conf/dgo/JanejaAGABL05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamACFCBSFM05, author = {Nabil R. Adam and Vijayalakshmi Atluri and Soon Ae Chun and Patrizia Fariselli and Julia Culver{-}Hopper and Olana Bojic and Rick T. Stewart and Jim Fruscione and Nick Mannochio}, editor = {Lois M. L. Delcambre and Genevieve Giuliano}, title = {Technology transfer of inter-agency government services and their transnational feasibility studies}, booktitle = {Proceedings of the 2005 National Conference on Digital Government Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {89}, pages = {225--226}, publisher = {Digital Government Research Center}, year = {2005}, url = {http://dl.acm.org/citation.cfm?id=1065293}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/AdamACFCBSFM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamAKJWP05, author = {Nabil R. Adam and Vijayalakshmi Atluri and Rey Koslowski and Vandana Pursnani Janeja and Janice Warner and Aabhas V. Paliwal}, editor = {Lois M. L. Delcambre and Genevieve Giuliano}, title = {Agency interoperation for effective data mining in border control and homeland security applications}, booktitle = {Proceedings of the 2005 National Conference on Digital Government Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005}, series = {{ACM} International Conference Proceeding Series}, volume = {89}, pages = {285--286}, publisher = {Digital Government Research Center}, year = {2005}, url = {http://dl.acm.org/citation.cfm?id=1065323}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/AdamAKJWP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AtluriG05, author = {Vijayalakshmi Atluri and Qi Guo}, editor = {Sabrina De Capitani di Vimercati and Paul F. Syverson and Dieter Gollmann}, title = {Unified Index for Mobile Object Data and Authorizations}, booktitle = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3679}, pages = {80--97}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11555827\_6}, doi = {10.1007/11555827\_6}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AtluriG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/JanejaA05, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri}, title = {FS\({}^{\mbox{3}}\): {A} Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection}, booktitle = {Proceedings of the 5th {IEEE} International Conference on Data Mining {(ICDM} 2005), 27-30 November 2005, Houston, Texas, {USA}}, pages = {661--664}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICDM.2005.71}, doi = {10.1109/ICDM.2005.71}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdm/JanejaA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/WarnerAM05, author = {Janice Warner and Vijayalakshmi Atluri and Ravi Mukkamala}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies}, booktitle = {Information Systems Security, First International Conference, {ICISS} 2005, Kolkata, India, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3803}, pages = {134--147}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593980\_10}, doi = {10.1007/11593980\_10}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/WarnerAM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/GuoAA05, author = {Dihua Guo and Vijayalakshmi Atluri and Nabil R. Adam}, title = {Texture-Based Remote-Sensing Image Segmentation}, booktitle = {Proceedings of the 2005 {IEEE} International Conference on Multimedia and Expo, {ICME} 2005, July 6-9, 2005, Amsterdam, The Netherlands}, pages = {1472--1475}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICME.2005.1521710}, doi = {10.1109/ICME.2005.1521710}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icmcs/GuoAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/GomaaAA05, author = {Ahmed Gomaa and Nabil R. Adam and Vijayalakshmi Atluri}, title = {Adapting spatial constraints of composite multimedia objects to achieve universal access}, booktitle = {Proceedings of the 24th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2005, April 7-9, 2005, Phoenix, Arizona, {USA}}, pages = {519--525}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/PCCC.2005.1460624}, doi = {10.1109/PCCC.2005.1460624}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/GomaaAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/JanejaAVA05, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri and Jaideep Vaidya and Nabil R. Adam}, editor = {Paul B. Kantor and Gheorghe Muresan and Fred S. Roberts and Daniel Dajun Zeng and Fei{-}Yue Wang and Hsinchun Chen and Ralph C. Merkle}, title = {Collusion Set Detection Through Outlier Discovery}, booktitle = {Intelligence and Security Informatics, {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA, USA, May 19-20, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3495}, pages = {1--13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11427995\_1}, doi = {10.1007/11427995\_1}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/JanejaAVA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/YoussefAA05, author = {Mahmoud Youssef and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Panos K. Chrysanthis and George Samaras}, title = {Preserving mobile customer privacy: an access control system for moving objects and customer profiles}, booktitle = {6th International Conference on Mobile Data Management {(MDM} 2005), Ayia Napa, Cyprus, May 9-13, 2005}, pages = {67--76}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1071246.1071257}, doi = {10.1145/1071246.1071257}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mdm/YoussefAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmm/GomaaAA05, author = {Ahmed Gomaa and Nabil R. Adam and Vijayalakshmi Atluri}, editor = {Yi{-}Ping Phoebe Chen}, title = {Color Time Petri Net for Interactive Adaptive Multimedia Objects}, booktitle = {11th International Conference on Multi Media Modeling {(MMM} 2005), 12-14 January 2005, Melbourne, Australia}, pages = {147--157}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/MMMC.2005.26}, doi = {10.1109/MMMC.2005.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mmm/GomaaAA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/JanejaA05, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri}, editor = {Hisham Haddad and Lorie M. Liebrock and Andrea Omicini and Roger L. Wainwright}, title = {LS\({}^{\mbox{3}}\): a Linear Semantic Scan Statistic technique for detecting anomalous windows}, booktitle = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005}, pages = {493--497}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1066677.1066790}, doi = {10.1145/1066677.1066790}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/JanejaA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AtluriW05, author = {Vijayalakshmi Atluri and Janice Warner}, editor = {Elena Ferrari and Gail{-}Joon Ahn}, title = {Supporting conditional delegation in secure workflow management systems}, booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings}, pages = {49--58}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1063979.1063990}, doi = {10.1145/1063979.1063990}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AtluriW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/KimIA05, author = {Dong{-}Ho Kim and Il Im and Vijayalakshmi Atluri}, title = {A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce}, booktitle = {7th {IEEE} International Conference on E-Commerce Technology {(CEC} 2005), 19-22 July 2005, M{\"{u}}nchen, Germany}, pages = {84--91}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICECT.2005.1}, doi = {10.1109/ICECT.2005.1}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/KimIA05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005fmse, editor = {Vijay Atluri and Pierangela Samarati and Ralf K{\"{u}}sters and John C. Mitchell}, title = {Proceedings of the 2005 {ACM} workshop on Formal methods in security engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-231-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2005fmse.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dim/2005, editor = {Vijay Atluri and Pierangela Samarati and Atsuhiro Goto}, title = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-232-1}, timestamp = {Wed, 27 Sep 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dim/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sasn/2005, editor = {Vijay Atluri and Peng Ning and Wenliang Du}, title = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-227-5}, timestamp = {Fri, 13 Jan 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sasn/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/storagess/2005, editor = {Vijay Atluri and Pierangela Samarati and William Yurcik and Larry Brumbaugh and Yuanyuan Zhou}, title = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-233-X}, timestamp = {Mon, 23 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/storagess/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/worm/2005, editor = {Vijay Atluri and Angelos D. Keromytis}, title = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005, Fairfax, VA, USA, November 11, 2005}, publisher = {{ACM} Press}, year = {2005}, isbn = {1-59593-229-1}, timestamp = {Fri, 23 Feb 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/worm/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2005, editor = {Vijay Atluri and Sabrina De Capitani di Vimercati and Roger Dingledine}, title = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-228-3}, timestamp = {Thu, 09 Mar 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriCM04, author = {Vijayalakshmi Atluri and Soon Ae Chun and Pietro Mazzoleni}, title = {Chinese wall security for decentralized workflow management systems}, journal = {J. Comput. Secur.}, volume = {12}, number = {6}, pages = {799--840}, year = {2004}, url = {https://doi.org/10.3233/jcs-2004-12601}, doi = {10.3233/JCS-2004-12601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriCM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jodl/AtluriR04, author = {Vijayalakshmi Atluri and Indrakshi Ray}, title = {Editors' message for the special issue on security}, journal = {Int. J. Digit. Libr.}, volume = {4}, number = {3}, pages = {137--138}, year = {2004}, url = {https://doi.org/10.1007/s00799-004-0087-7}, doi = {10.1007/S00799-004-0087-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jodl/AtluriR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/AtluriC04, author = {Vijayalakshmi Atluri and Soon Ae Chun}, title = {An Authorization Model for Geospatial Data}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {1}, number = {4}, pages = {238--254}, year = {2004}, url = {https://doi.org/10.1109/TDSC.2004.32}, doi = {10.1109/TDSC.2004.32}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/AtluriC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriG04, author = {Vijayalakshmi Atluri and Qi Guo}, editor = {Csilla Farkas and Pierangela Samarati}, title = {STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations}, booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, pages = {31--47}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8128-6\_3}, doi = {10.1007/1-4020-8128-6\_3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamAC04, author = {Nabil R. Adam and Vijayalakshmi Atluri and Soon Ae Chun}, editor = {Sharon S. Dawes and Eduard H. Hovy and Lois M. L. Delcambre}, title = {Human-Centered Systems for Business Services}, booktitle = {Proceedings of the 2004 Annual National Conference on Digital Government Research, {DG.O} 2004, Seattle, WA, USA, 2004}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1124249}, timestamp = {Sat, 07 Jul 2018 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/dgo/AdamAC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/AdamAJ04, author = {Nabil R. Adam and Vijayalakshmi Atluri and Vandana Pursnani Janeja}, editor = {Sharon S. Dawes and Eduard H. Hovy and Lois M. L. Delcambre}, title = {Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications}, booktitle = {Proceedings of the 2004 Annual National Conference on Digital Government Research, {DG.O} 2004, Seattle, WA, USA, 2004}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1124194}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/AdamAJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/JanejaAA04, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Sharon S. Dawes and Eduard H. Hovy and Lois M. L. Delcambre}, title = {Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations}, booktitle = {Proceedings of the 2004 Annual National Conference on Digital Government Research, {DG.O} 2004, Seattle, WA, USA, 2004}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1124213}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/JanejaAA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/er/QinA04, author = {Li Qin and Vijayalakshmi Atluri}, editor = {Paolo Atzeni and Wesley W. Chu and Hongjun Lu and Shuigeng Zhou and Tok Wang Ling}, title = {Ontology-Guided Change Detection to the Semantic Web Data}, booktitle = {Conceptual Modeling - {ER} 2004, 23rd International Conference on Conceptual Modeling, Shanghai, China, November 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3288}, pages = {624--638}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30464-7\_47}, doi = {10.1007/978-3-540-30464-7\_47}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/er/QinA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcit/AtluriW04, author = {Vijayalakshmi Atluri and Janice Warner}, editor = {R. K. Ghosh and Hrushikesha Mohanty}, title = {Automatic Enforcement of Access Control Policies Among Dynamic Coalitions}, booktitle = {Distributed Computing and Internet Technology, First International Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3347}, pages = {369--378}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30555-2\_43}, doi = {10.1007/978-3-540-30555-2\_43}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdcit/AtluriW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ride/ChunAA04, author = {Soon Ae Chun and Vijayalakshmi Atluri and Nabil R. Adam}, title = {Policy-Based Web Service Composition}, booktitle = {14th International Workshop on Research Issues in Data Engineering {(RIDE-WS-ECEG} 2004), Web Services for E-Commerce and E-Government Applications, 28-29 March 2004, Boston, MA, {USA}}, pages = {85--92}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/RIDE.2004.1281707}, doi = {10.1109/RIDE.2004.1281707}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ride/ChunAA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AdamJA04, author = {Nabil R. Adam and Vandana Pursnani Janeja and Vijayalakshmi Atluri}, editor = {Hisham Haddad and Andrea Omicini and Roger L. Wainwright and Lorie M. Liebrock}, title = {Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets}, booktitle = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004}, pages = {576--583}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/967900.968020}, doi = {10.1145/967900.968020}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/AdamJA04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/MukkamalaAW04, author = {Ravi Mukkamala and Vijayalakshmi Atluri and Janice Warner}, editor = {Paul Dowland and Steven Furnell and Bhavani Thuraisingham and Xiaoyang Sean Wang}, title = {A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions}, booktitle = {Security Management, Integrity, and Internal Control in Information Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}}, series = {{IFIP}}, volume = {193}, pages = {319--333}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/0-387-31167-X\_21}, doi = {10.1007/0-387-31167-X\_21}, timestamp = {Tue, 16 May 2023 22:42:09 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/MukkamalaAW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/widm/KimIABAY04, author = {Dong{-}Ho Kim and Il Im and Vijayalakshmi Atluri and Michael Bieber and Nabil R. Adam and Yelena Yesha}, editor = {Alberto H. F. Laender and Dongwon Lee and Marc Ronthaler}, title = {A clickstream-based collaborative filtering personalization model: towards a better performance}, booktitle = {Sixth {ACM} {CIKM} International Workshop on Web Information and Data Management {(WIDM} 2004), Washington, DC, USA, November 12-13, 2004}, pages = {88--95}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1031453.1031470}, doi = {10.1145/1031453.1031470}, timestamp = {Tue, 29 Dec 2020 18:28:55 +0100}, biburl = {https://dblp.org/rec/conf/widm/KimIABAY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1030083}, isbn = {1-58113-971-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004ccs, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-961-6}, timestamp = {Fri, 13 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004ccs.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sws/2004, editor = {Vijay Atluri}, title = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS} 2004, Fairfax, VA, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-973-X}, timestamp = {Tue, 22 Apr 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sws/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wpes/2004, editor = {Vijay Atluri and Paul F. Syverson and Sabrina De Capitani di Vimercati}, title = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic Society, {WPES} 2004, Washington, DC, USA, October 28, 2004}, publisher = {{ACM}}, year = {2004}, isbn = {1-58113-968-3}, timestamp = {Wed, 16 Feb 2005 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/AtluriJY03, author = {Vijay Atluri and Anupam Joshi and Yelena Yesha}, title = {Guest editorial}, journal = {{VLDB} J.}, volume = {12}, number = {4}, pages = {285}, year = {2003}, url = {https://doi.org/10.1007/s00778-003-0109-x}, doi = {10.1007/S00778-003-0109-X}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/AtluriJY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBFM03, author = {Vijayalakshmi Atluri and Elisa Bertino and Elena Ferrari and Pietro Mazzoleni}, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {Supporting Delegation in Secure Workflow Management Systems}, booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, pages = {190--202}, publisher = {Kluwer/Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-8070-0\_14}, doi = {10.1007/1-4020-8070-0\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBFM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/AtluriC03, author = {Vijayalakshmi Atluri and Soon Ae Chun}, editor = {Vladim{\'{\i}}r Mar{\'{\i}}k and Werner Retschitzegger and Olga Step{\'{a}}nkov{\'{a}}}, title = {Handling Dynamic Changes in Decentralized Workflow Execution Environments}, booktitle = {Database and Expert Systems Applications, 14th International Conference, {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2736}, pages = {813--825}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45227-0\_79}, doi = {10.1007/978-3-540-45227-0\_79}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/AtluriC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunA03, author = {Soon Ae Chun and Vijayalakshmi Atluri}, editor = {Yigal Arens and Eduard H. Hovy and Peggy Agouris}, title = {Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery}, booktitle = {Proceedings of the 2003 Annual National Conference on Digital Government Research, {DG.O} 2003, Boston, MA, USA, 2003}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=1123270}, timestamp = {Sat, 07 Jul 2018 14:14:28 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ChunA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/PaliwalAA03, author = {Aabhas V. Paliwal and Nabil R. Adam and Vijayalakshmi Atluri}, editor = {Yigal Arens and Eduard H. Hovy and Peggy Agouris}, title = {Electronic Negotiation of Government Contracts through Transducers}, booktitle = {Proceedings of the 2003 Annual National Conference on Digital Government Research, {DG.O} 2003, Boston, MA, USA, 2003}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=1123243}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/PaliwalAA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecweb/QinA03, author = {Li Qin and Vijayalakshmi Atluri}, editor = {Kurt Bauknecht and A Min Tjoa and Gerald Quirchmayr}, title = {An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories}, booktitle = {E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2738}, pages = {227--236}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45229-4\_23}, doi = {10.1007/978-3-540-45229-4\_23}, timestamp = {Tue, 29 Dec 2020 18:30:42 +0100}, biburl = {https://dblp.org/rec/conf/ecweb/QinA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/AtluriAGA03, author = {Vijayalakshmi Atluri and Nabil R. Adam and Ahmed Gomaa and Igg Adiwijaya}, editor = {Gary B. Lamont and Hisham Haddad and George A. Papadopoulos and Brajendra Panda}, title = {Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints}, booktitle = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC), March 9-12, 2003, Melbourne, FL, {USA}}, pages = {927--934}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/952532.952715}, doi = {10.1145/952532.952715}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sac/AtluriAGA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/xmlsec/QinA03, author = {Li Qin and Vijayalakshmi Atluri}, editor = {Sushil Jajodia and Michiharu Kudo}, title = {Concept-level access control for the Semantic Web}, booktitle = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax, VA, USA, October 31, 2003}, pages = {94--103}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/968559.968575}, doi = {10.1145/968559.968575}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/xmlsec/QinA03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2003, editor = {Sushil Jajodia and Vijayalakshmi Atluri and Trent Jaeger}, title = {Proceedings of the 10th {ACM} Conference on Computer and Communications Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003}, publisher = {{ACM}}, year = {2003}, url = {http://dl.acm.org/citation.cfm?id=948109}, isbn = {1-58113-738-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/informaticaSI/AtluriM02, author = {Vijayalakshmi Atluri and Ravi Mukkamala}, title = {Employing an extended transaction model in multilevel secure transaction processing}, journal = {Informatica (Slovenia)}, volume = {26}, number = {2}, year = {2002}, timestamp = {Mon, 15 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/informaticaSI/AtluriM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/AtluriG02, author = {Vijayalakshmi Atluri and Avigdor Gal}, title = {An authorization model for temporal and derived data: securing information portals}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {5}, number = {1}, pages = {62--94}, year = {2002}, url = {https://doi.org/10.1145/504909.504912}, doi = {10.1145/504909.504912}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/AtluriG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AdamABF02, author = {Nabil R. Adam and Vijayalakshmi Atluri and Elisa Bertino and Elena Ferrari}, title = {A Content-Based Authorization Model for Digital Libraries}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {14}, number = {2}, pages = {296--315}, year = {2002}, url = {https://doi.org/10.1109/69.991718}, doi = {10.1109/69.991718}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AdamABF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/vldb/FerrariAABC02, author = {Elena Ferrari and Nabil R. Adam and Vijayalakshmi Atluri and Elisa Bertino and Ugo Capuozzo}, title = {An authorization system for digital libraries}, journal = {{VLDB} J.}, volume = {11}, number = {1}, pages = {58--67}, year = {2002}, url = {https://doi.org/10.1007/s007780200063}, doi = {10.1007/S007780200063}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/vldb/FerrariAABC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriM02, author = {Vijayalakshmi Atluri and Pietro Mazzoleni}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Uniform Indexing for Geospatial Data and Authorizations}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {207--218}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexa/ChunAA02, author = {Soon Ae Chun and Vijayalakshmi Atluri and Nabil R. Adam}, editor = {Abdelkader Hameurlain and Rosine Cicchetti and Roland Traunm{\"{u}}ller}, title = {Domain Knowledge-Based Automatic Workflow Generation}, booktitle = {Database and Expert Systems Applications, 13th International Conference, {DEXA} 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2453}, pages = {81--92}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46146-9\_9}, doi = {10.1007/3-540-46146-9\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dexa/ChunAA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/ChunAA02, author = {Soon Ae Chun and Vijayalakshmi Atluri and Nabil R. Adam}, title = {Dynamic Composition of Workflows for Customized eGovernment Service Delivery}, booktitle = {Proceedings of the 2002 Annual National Conference on Digital Government Research, {DG.O} 2002, Los Angeles, CA, USA, 2002}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2002}, url = {http://dl.acm.org/citation.cfm?id=1123127}, timestamp = {Sat, 07 Jul 2018 14:13:59 +0200}, biburl = {https://dblp.org/rec/conf/dgo/ChunAA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dgo/JanejaAA02, author = {Vandana Pursnani Janeja and Vijayalakshmi Atluri and Nabil R. Adam}, title = {{OUTLAW:} Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes}, booktitle = {Proceedings of the 2002 Annual National Conference on Digital Government Research, {DG.O} 2002, Los Angeles, CA, USA, 2002}, series = {{ACM} International Conference Proceeding Series}, publisher = {Digital Government Research Center}, year = {2002}, url = {http://dl.acm.org/citation.cfm?id=1123160}, timestamp = {Fri, 20 Nov 2015 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dgo/JanejaAA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/GalAX02, author = {Avigdor Gal and Vijayalakshmi Atluri and Gang Xu}, editor = {Rakesh Agrawal and Klaus R. Dittrich}, title = {An Authorization System for Temporal Data}, booktitle = {Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26 - March 1, 2002}, pages = {339--340}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/ICDE.2002.994747}, doi = {10.1109/ICDE.2002.994747}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/GalAX02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ads/AtluriCHA02, author = {Vijayalakshmi Atluri and Soon Ae Chun and Richard D. Holowczak and Nabil R. Adam}, editor = {William J. McIver Jr. and Ahmed K. Elmagarmid}, title = {Automating the Delivery of Governmental Business Services Through Workflow Technology}, booktitle = {Advances in Digital Government - Technology, Human Factors, and Policy}, series = {Advances in Database Systems}, volume = {26}, pages = {69--84}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/0-306-47374-7\_4}, doi = {10.1007/0-306-47374-7\_4}, timestamp = {Tue, 16 May 2017 14:24:24 +0200}, biburl = {https://dblp.org/rec/series/ads/AtluriCHA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2002, editor = {Vijayalakshmi Atluri}, title = {Proceedings of the 9th {ACM} Conference on Computer and Communications Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002}, publisher = {{ACM}}, year = {2002}, url = {http://dl.acm.org/citation.cfm?id=586110}, isbn = {1-58113-612-9}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Atluri01, author = {Vijay Atluri}, title = {Security for Workflow Systems}, journal = {Inf. Secur. Tech. Rep.}, volume = {6}, number = {2}, pages = {59--68}, year = {2001}, url = {https://doi.org/10.1016/S1363-4127(01)00207-2}, doi = {10.1016/S1363-4127(01)00207-2}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Atluri01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/JajodiaAKMM01, author = {Sushil Jajodia and Vijayalakshmi Atluri and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala}, title = {Multilevel Security Transaction Processing}, journal = {J. Comput. Secur.}, volume = {9}, number = {3}, pages = {165--195}, year = {2001}, url = {https://doi.org/10.3233/jcs-2001-9301}, doi = {10.3233/JCS-2001-9301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/JajodiaAKMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AdamAABH01, author = {Nabil R. Adam and Vijayalakshmi Atluri and Igg Adiwijaya and Sujata Banerjee and Richard D. Holowczak}, title = {A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {13}, number = {4}, pages = {705--716}, year = {2001}, url = {https://doi.org/10.1109/69.940742}, doi = {10.1109/69.940742}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AdamAABH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AtluriCM01, author = {Vijayalakshmi Atluri and Soon Ae Chun and Pietro Mazzoleni}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {A Chinese wall security model for decentralized workflow systems}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {48--57}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.501991}, doi = {10.1145/501983.501991}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AtluriCM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriM01, author = {Vijayalakshmi Atluri and Ravi Mukkamala}, editor = {Martin S. Olivier and David L. Spooner}, title = {An Extended Transaction Model Approach for Multilevel Secure Transaction Processing}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {255--268}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 13:50:19 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dexaw/GhirardiniCAKA01, author = {Chiara Ghirardini and Soon Ae Chun and Vijayalakshmi Atluri and Ibrahim Kamel and Nabil R. Adam}, editor = {A Min Tjoa and Roland R. Wagner}, title = {A Study on the Indexing of Satellite Images at {NASA} Regional Application Center}, booktitle = {12th International Workshop on Database and Expert Systems Applications {(DEXA} 2001), 3-7 September 2001, Munich, Germany}, pages = {859--864}, publisher = {{IEEE} Computer Society}, year = {2001}, url = {https://doi.org/10.1109/DEXA.2001.953163}, doi = {10.1109/DEXA.2001.953163}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dexaw/GhirardiniCAKA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/HolowczakCAA01, author = {Richard D. Holowczak and Soon Ae Chun and Francisco J. Artigas and Vijayalakshmi Atluri}, editor = {Walid G. Aref}, title = {Customized Geospatial Workflows for E-Government Services}, booktitle = {{ACM-GIS} 2001, Proceedings of the Ninth {ACM} International Symposium on Advances in Geographic Information Systems, Atlanta, GA, USA, November 9-10, 2001}, pages = {64--69}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/512161.512176}, doi = {10.1145/512161.512176}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/gis/HolowczakCAA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isas-sci/CranfordMA01, author = {Jonathan Cranford and Ravi Mukkamala and Vijayalakshmi Atluri}, editor = {Nagib Callaos and Ivan Nunes da Silva and Jorge Molero}, title = {Modeling and Evaluation of Distributed Workflow Algorithms}, booktitle = {World Multiconference on Systemics, Cybernetics and Informatics, ISAS-SCIs 2001, July 22-25, 2001, Orlando, Florida, USA, Proceedings, Volume {I:} Information Systems Development}, pages = {183--188}, publisher = {{IIIS}}, year = {2001}, timestamp = {Thu, 03 Jan 2002 12:04:14 +0100}, biburl = {https://dblp.org/rec/conf/isas-sci/CranfordMA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/AdamAA00, author = {Nabil R. Adam and Vijayalakshmi Atluri and Igg Adiwijaya}, title = {{SI} in Digital Libraries}, journal = {Commun. {ACM}}, volume = {43}, number = {6}, pages = {64--72}, year = {2000}, url = {https://doi.org/10.1145/336460.336476}, doi = {10.1145/336460.336476}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/AdamAA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dpd/AtluriS00, author = {Vijayalakshmi Atluri and Pierangela Samarati}, title = {Security of Data and Transaction Processing - Guest Editor's Introduction}, journal = {Distributed Parallel Databases}, volume = {8}, number = {1}, pages = {5--6}, year = {2000}, url = {https://doi.org/10.1023/A:1008727116035}, doi = {10.1023/A:1008727116035}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dpd/AtluriS00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriHB00, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang and Elisa Bertino}, title = {A Semantic-Based Execution Model for Multilevel Secure Workflows}, journal = {J. Comput. Secur.}, volume = {8}, number = {1}, pages = {3--41}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-8102}, doi = {10.3233/JCS-2000-8102}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriHB00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriH00, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang}, title = {A Petri Net Based Safety Analysis of Workflow Authorization Models}, journal = {J. Comput. Secur.}, volume = {8}, number = {2/3}, pages = {209--240}, year = {2000}, url = {https://doi.org/10.3233/jcs-2000-82-307}, doi = {10.3233/JCS-2000-82-307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriH00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GalA00, author = {Avigdor Gal and Vijayalakshmi Atluri}, editor = {Dimitris Gritzalis and Sushil Jajodia and Pierangela Samarati}, title = {An authorization model for temporal data}, booktitle = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000}, pages = {144--153}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/352600.352621}, doi = {10.1145/352600.352621}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/GalA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/ChunA00, author = {Soon Ae Chun and Vijayalakshmi Atluri}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Protecting Privacy from Continuous High-resolution Satellite Surveillance}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {233--244}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_21}, doi = {10.1007/0-306-47008-X\_21}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/ChunA00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RietSORABW00, author = {Reind P. van de Riet and Raban Serban and Sylvia L. Osborn and Arnon Rosenthal and Vijayalakshmi Atluri and Joachim Biskup and Gio Wiederhold}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Panel}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {367--371}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_34}, doi = {10.1007/0-306-47008-X\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RietSORABW00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mascots/AtluriM00, author = {Vijayalakshmi Atluri and Ravi Mukkamala}, title = {Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows}, booktitle = {{MASCOTS} 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August - 1 September 2000, San Francisco, California, {USA}}, pages = {248--255}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/MASCOT.2000.876546}, doi = {10.1109/MASCOT.2000.876546}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mascots/AtluriM00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/1999, editor = {Vijayalakshmi Atluri and John Hale}, title = {Research Advances in Database and Information Systems Security, {IFIP} {WG} 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {171}, publisher = {Kluwer}, year = {2000}, isbn = {0-7923-7848-2}, timestamp = {Thu, 03 Jan 2002 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/rbac/2000, editor = {Klaus Rebensburg and Charles E. Youman and Vijay Atluri}, title = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin, Germany, July 26-27, 2000}, publisher = {{ACM}}, year = {2000}, url = {https://doi.org/10.1145/344287}, doi = {10.1145/344287}, isbn = {1-58113-259-X}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/rbac/2000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BertinoFA99, author = {Elisa Bertino and Elena Ferrari and Vijayalakshmi Atluri}, title = {The Specification and Enforcement of Authorization Constraints in Workflow Management Systems}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {2}, number = {1}, pages = {65--104}, year = {1999}, url = {https://doi.org/10.1145/300830.300837}, doi = {10.1145/300830.300837}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BertinoFA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/HuangA99, author = {Wei{-}kuang Huang and Vijayalakshmi Atluri}, editor = {Charles E. Youman and Sylvia L. Osborn}, title = {SecureFlow: {A} Secure Web-Enabled Workflow Management System}, booktitle = {Proceedings of the Fourth {ACM} Workshop on Role-Based Access Control, {RBAC} 1999, Fairfax, VA, USA, October 28-29, 1999}, pages = {83--94}, publisher = {{ACM}}, year = {1999}, url = {https://doi.org/10.1145/319171.319179}, doi = {10.1145/319171.319179}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/rbac/HuangA99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jiis/AdamAH98, author = {Nabil R. Adam and Vijayalakshmi Atluri and Wei{-}kuang Huang}, title = {Modeling and Analysis of Workflows Using Petri Nets}, journal = {J. Intell. Inf. Syst.}, volume = {10}, number = {2}, pages = {131--158}, year = {1998}, url = {https://doi.org/10.1023/A:1008656726700}, doi = {10.1023/A:1008656726700}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jiis/AdamAH98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HuangA98, author = {Wei{-}kuang Huang and Vijayalakshmi Atluri}, editor = {Sushil Jajodia}, title = {Analysing the Safety of Workflow Authorization Models}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {43--57}, publisher = {Kluwer}, year = {1998}, timestamp = {Mon, 21 Oct 2002 13:30:47 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HuangA98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriS98, author = {Vijayalakshmi Atluri and David L. Spooner}, editor = {Sushil Jajodia}, title = {Workshop Summary}, booktitle = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG} 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece}, series = {{IFIP} Conference Proceedings}, volume = {142}, pages = {287--293}, publisher = {Kluwer}, year = {1998}, timestamp = {Mon, 21 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/AdamAAY98, author = {Nabil R. Adam and Igg Adiwijaya and Vijay Atluri and Yelena Yesha}, title = {{EDI} Through {A} Distributed Information Systems Approach}, booktitle = {Thirty-First Annual Hawaii International Conference on System Sciences, Kohala Coast, Hawaii, USA, January 6-9, 1998}, pages = {354--365}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/HICSS.1998.649230}, doi = {10.1109/HICSS.1998.649230}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/AdamAAY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tc11-5/Atluri98, author = {Vijayalakshmi Atluri}, editor = {Sushil Jajodia and William List and Graeme W. McGregor and Leon Strous}, title = {Modification of Integrity Constraints Through Knowledge Discovery}, booktitle = {Integrity and Internal Control in Information Systems, {IFIP} {TC11} Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998}, series = {{IFIP} Conference Proceedings}, volume = {136}, pages = {191--209}, publisher = {Kluwer}, year = {1998}, timestamp = {Thu, 22 Aug 2002 09:35:37 +0200}, biburl = {https://dblp.org/rec/conf/tc11-5/Atluri98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/AtluriBJ97, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {A theoretical formulation for degrees of isolation in databases}, journal = {Inf. Softw. Technol.}, volume = {39}, number = {1}, pages = {47--53}, year = {1997}, url = {https://doi.org/10.1016/0950-5849(96)01109-3}, doi = {10.1016/0950-5849(96)01109-3}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/infsof/AtluriBJ97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriH97, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang}, title = {Enforcing Mandatory and Discretionary Security in Workflow Management Systems}, journal = {J. Comput. Secur.}, volume = {5}, number = {4}, pages = {303--340}, year = {1997}, url = {https://doi.org/10.3233/JCS-1997-5403}, doi = {10.3233/JCS-1997-5403}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriH97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AtluriJB97, author = {Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino}, title = {Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {9}, number = {5}, pages = {697--708}, year = {1997}, url = {https://doi.org/10.1109/69.634749}, doi = {10.1109/69.634749}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AtluriJB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriHB97, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang and Elisa Bertino}, editor = {Tsau Young Lin and Shelly Qian}, title = {An Execution Model for Multilevel Seccure Workflows}, booktitle = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3} Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {113}, pages = {151--165}, publisher = {Chapman {\&} Hall}, year = {1997}, timestamp = {Wed, 24 Sep 2003 08:16:49 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriHB97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rbac/BertinoFA97, author = {Elisa Bertino and Elena Ferrari and Vijayalakshmi Atluri}, editor = {Charles E. Youman and Edward J. Coyne and Trent Jaeger}, title = {A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems}, booktitle = {Proceedings of the Second Workshop on Role-Based Access Control, {RBAC} 1997, Fairfax, VA, USA, November 6-7, 1997}, pages = {1--12}, publisher = {{ACM}}, year = {1997}, url = {https://doi.org/10.1145/266741.266746}, doi = {10.1145/266741.266746}, timestamp = {Tue, 06 Nov 2018 16:59:23 +0100}, biburl = {https://dblp.org/rec/conf/rbac/BertinoFA97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AtluriJB96, author = {Vijayalakshmi Atluri and Sushil Jajodia and Elisa Bertino}, title = {Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {8}, number = {5}, pages = {839--854}, year = {1996}, url = {https://doi.org/10.1109/69.542034}, doi = {10.1109/69.542034}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AtluriJB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriJKMM96, author = {Vijayalakshmi Atluri and Sushil Jajodia and Thomas F. Keefe and Catherine D. McCollum and Ravi Mukkamala}, editor = {Pierangela Samarati and Ravi S. Sandhu}, title = {Multilevel Secure Transaction Processing: Status and Prospects}, booktitle = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} / {WG11.3} Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy}, series = {{IFIP} Conference Proceedings}, volume = {79}, pages = {79--98}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 24 Oct 2002 16:14:24 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriJKMM96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriH96, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang}, editor = {Pierangela Samarati and Ravi S. Sandhu}, title = {An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment}, booktitle = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} / {WG11.3} Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy}, series = {{IFIP} Conference Proceedings}, volume = {79}, pages = {240--258}, publisher = {Chapman {\&} Hall}, year = {1996}, timestamp = {Thu, 24 Oct 2002 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AtluriH96, author = {Vijayalakshmi Atluri and Wei{-}kuang Huang}, editor = {Elisa Bertino and Helmut Kurth and Giancarlo Martella and Emilio Montolivo}, title = {An Authorization Model for Workflows}, booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1146}, pages = {44--64}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-61770-1\_27}, doi = {10.1007/3-540-61770-1\_27}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AtluriH96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/AmmannAJ95, author = {Paul Ammann and Vijayalakshmi Atluri and Sushil Jajodia}, title = {The Partitioned Synchronization Rule for Planar Extendible Partial Orders}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {7}, number = {5}, pages = {797--808}, year = {1995}, url = {https://doi.org/10.1109/69.469819}, doi = {10.1109/69.469819}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/AmmannAJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ95, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {David L. Spooner and Steven A. Demurjian and John E. Dobson}, title = {Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases}, booktitle = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995}, series = {{IFIP} Conference Proceedings}, volume = {51}, pages = {231--247}, publisher = {Chapman {\&} Hall}, year = {1995}, timestamp = {Thu, 24 Oct 2002 16:18:58 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ94, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {Joachim Biskup and Matthew Morgenstern and Carl E. Landwehr}, title = {Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols}, booktitle = {Database Security, {VIII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994}, series = {{IFIP} Transactions}, volume = {{A-60}}, pages = {259--274}, publisher = {North-Holland}, year = {1994}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems}, journal = {J. Comput. Secur.}, volume = {2}, number = {4}, pages = {311--352}, year = {1993}, url = {https://doi.org/10.3233/JCS-1993-2404}, doi = {10.3233/JCS-1993-2404}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, editor = {Thomas F. Keefe and Carl E. Landwehr}, title = {Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case}, booktitle = {Database Security, {VII:} Status and Prospects, Proceedings of the {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville, Alabama, USA, 12-15 September, 1993}, series = {{IFIP} Transactions}, volume = {{A-47}}, pages = {135--158}, publisher = {North-Holland}, year = {1993}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/AtluriBJ93, author = {Vijayalakshmi Atluri and Elisa Bertino and Sushil Jajodia}, title = {Achieving stricter correctness requirements in multilevel secure databases}, booktitle = {1993 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 24-26, 1993}, pages = {135--147}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/RISP.1993.287636}, doi = {10.1109/RISP.1993.287636}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/JajodiaA92, author = {Sushil Jajodia and Vijayalakshmi Atluri}, title = {Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases}, booktitle = {1992 {IEEE} Computer Society Symposium on Research in Security and Privacy, Oakland, CA, USA, May 4-6, 1992}, pages = {216--224}, publisher = {{IEEE} Computer Society}, year = {1992}, url = {https://doi.org/10.1109/RISP.1992.213259}, doi = {10.1109/RISP.1992.213259}, timestamp = {Thu, 21 Sep 2023 15:57:35 +0200}, biburl = {https://dblp.org/rec/conf/sp/JajodiaA92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.