BibTeX records: Vijayalakshmi Atluri

download as .bib file

@article{DBLP:journals/tetc/GuptaSVA23,
  author       = {Eeshan Gupta and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Enabling Attribute-Based Access Control in NoSQL Databases},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {11},
  number       = {1},
  pages        = {208--223},
  year         = {2023},
  url          = {https://doi.org/10.1109/TETC.2022.3193577},
  doi          = {10.1109/TETC.2022.3193577},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tetc/GuptaSVA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RayTVMARKRSSV023,
  author       = {Indrajit Ray and
                  Bhavani Thuraisingham and
                  Jaideep Vaidya and
                  Sharad Mehrotra and
                  Vijayalakshmi Atluri and
                  Indrakshi Ray and
                  Murat Kantarcioglu and
                  Ramesh Raskar and
                  Babak Salimi and
                  Steve Simske and
                  Nalini Venkatasubramanian and
                  Vivek K. Singh},
  editor       = {Silvio Ranise and
                  Roberto Carbone and
                  Daniel Takabi},
  title        = {{SAFE-PASS:} Stewardship, Advocacy, Fairness and Empowerment in Privacy,
                  Accountability, Security, and Safety for Vulnerable Groups},
  booktitle    = {Proceedings of the 28th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2023, Trento, Italy, June 7-9, 2023},
  pages        = {145--155},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3589608.3593830},
  doi          = {10.1145/3589608.3593830},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/RayTVMARKRSSV023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2023,
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6},
  doi          = {10.1007/978-3-031-37586-6},
  isbn         = {978-3-031-37585-9},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/VarshithSVA22,
  author       = {H. O. Sai Varshith and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Enabling Attribute-Based Access Control in Linux Kernel},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {1237--1239},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3527293},
  doi          = {10.1145/3488932.3527293},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/VarshithSVA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/TalegaonBASV22,
  author       = {Samir Talegaon and
                  Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Shamik Sural and
                  Jaideep Vaidya},
  editor       = {Sven Dietrich and
                  Omar Chowdhury and
                  Daniel Takabi},
  title        = {Contemporaneous Update and Enforcement of {ABAC} Policies},
  booktitle    = {{SACMAT} '22: The 27th {ACM} Symposium on Access Control Models and
                  Technologies, New York, NY, USA, June 8 - 10, 2022},
  pages        = {31--42},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3532105.3535021},
  doi          = {10.1145/3532105.3535021},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/TalegaonBASV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/PericherlaPSVA22,
  author       = {Amshumaan Pericherla and
                  Proteet Paul and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijay Atluri},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {Towards Supporting Attribute-Based Access Control in Hyperledger Fabric
                  Blockchain},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {648},
  pages        = {360--376},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_21},
  doi          = {10.1007/978-3-031-06975-8\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/PericherlaPSVA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-1,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13554},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17140-6},
  doi          = {10.1007/978-3-031-17140-6},
  isbn         = {978-3-031-17139-0},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-2,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8},
  doi          = {10.1007/978-3-031-17146-8},
  isbn         = {978-3-031-17145-1},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2022-3,
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13556},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17143-7},
  doi          = {10.1007/978-3-031-17143-7},
  isbn         = {978-3-031-17142-0},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2022-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/polity/YaqubCAV21,
  author       = {Ussama Yaqub and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Analyzing social media messages of public sector organizations utilizing
                  sentiment analysis and topic modeling},
  journal      = {Inf. Polity},
  volume       = {26},
  number       = {4},
  pages        = {375--390},
  year         = {2021},
  url          = {https://doi.org/10.3233/IP-210321},
  doi          = {10.3233/IP-210321},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/polity/YaqubCAV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/RoySMVA21,
  author       = {Arindam Roy and
                  Shamik Sural and
                  Arun Kumar Majumdar and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Enabling Workforce Optimization in Constrained Attribute-Based Access
                  Control Systems},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {9},
  number       = {4},
  pages        = {1901--1913},
  year         = {2021},
  url          = {https://doi.org/10.1109/TETC.2019.2944787},
  doi          = {10.1109/TETC.2019.2944787},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/RoySMVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/RoySMVA21,
  author       = {Arindam Roy and
                  Shamik Sural and
                  Arun Kumar Majumdar and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Optimal Employee Recruitment in Organizations under Attribute-Based
                  Access Control},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {12},
  number       = {1},
  pages        = {6:1--6:24},
  year         = {2021},
  url          = {https://doi.org/10.1145/3403950},
  doi          = {10.1145/3403950},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/RoySMVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BatraAVS21,
  author       = {Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Incremental Maintenance of {ABAC} Policies},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {185--196},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3447825},
  doi          = {10.1145/3422337.3447825},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BatraAVS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GuptaSVA21,
  author       = {Eeshan Gupta and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Anupam Joshi and
                  Barbara Carminati and
                  Rakesh M. Verma},
  title        = {Attribute-Based Access Control for NoSQL Databases},
  booktitle    = {{CODASPY} '21: Eleventh {ACM} Conference on Data and Application Security
                  and Privacy, Virtual Event, USA, April 26-28, 2021},
  pages        = {317--319},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3422337.3450323},
  doi          = {10.1145/3422337.3450323},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/GuptaSVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dgov/YaqubSPCAV20,
  author       = {Ussama Yaqub and
                  Nitesh Sharma and
                  Rachit Pabreja and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Location-based Sentiment Analyses and Visualization of Twitter Election
                  Data},
  journal      = {Digit. Gov. Res. Pract.},
  volume       = {1},
  number       = {2},
  pages        = {14:1--14:19},
  year         = {2020},
  url          = {https://doi.org/10.1145/3339909},
  doi          = {10.1145/3339909},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dgov/YaqubSPCAV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/LuCSVAHH20,
  author       = {Haibing Lu and
                  Xi Chen and
                  Junmin Shi and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Yuan Hong and
                  Wei Huang},
  title        = {Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {7:1--7:33},
  year         = {2020},
  url          = {https://doi.org/10.1145/3386599},
  doi          = {10.1145/3386599},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/LuCSVAHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunSMAA20,
  author       = {Soon Ae Chun and
                  Roshan Singh and
                  Pamela Morgan and
                  Nabil R. Adam and
                  Vijay Atluri},
  editor       = {Seok{-}Jin Eom and
                  Jooho Lee},
  title        = {Visual Analytics for Global Migration Policy Discovery and {NGO} Collaboration},
  booktitle    = {dg.o '20: The 21st Annual International Conference on Digital Government
                  Research, Seoul, Republic of Korea, June 15-19, 2020},
  pages        = {109--115},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3396956.3398261},
  doi          = {10.1145/3396956.3398261},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunSMAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/SinghCA20,
  author       = {Roshan Singh and
                  Soon Ae Chun and
                  Vijay Atluri},
  editor       = {Seok{-}Jin Eom and
                  Jooho Lee},
  title        = {Developing Machine Learning Models to Automate News Classification},
  booktitle    = {dg.o '20: The 21st Annual International Conference on Digital Government
                  Research, Seoul, Republic of Korea, June 15-19, 2020},
  pages        = {354--355},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3396956.3397001},
  doi          = {10.1145/3396956.3397001},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/SinghCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AtluriHC20,
  author       = {Vijay Atluri and
                  Yuan Hong and
                  Soon Ae Chun},
  editor       = {Seok{-}Jin Eom and
                  Jooho Lee},
  title        = {Security, Privacy and Trust for Responsible Innovations and Governance},
  booktitle    = {dg.o '20: The 21st Annual International Conference on Digital Government
                  Research, Seoul, Republic of Korea, June 15-19, 2020},
  pages        = {365--366},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3396956.3396978},
  doi          = {10.1145/3396956.3396978},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AtluriHC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinghSVA19,
  author       = {Mahendra Pratap Singh and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Managing attribute-based access control policies in a unified framework
                  using data warehousing and in-memory database},
  journal      = {Comput. Secur.},
  volume       = {86},
  pages        = {183--205},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.cose.2019.06.001},
  doi          = {10.1016/J.COSE.2019.06.001},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinghSVA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/JhaSAV19,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Security analysis of {ABAC} under an administrative model},
  journal      = {{IET} Inf. Secur.},
  volume       = {13},
  number       = {2},
  pages        = {96--103},
  year         = {2019},
  url          = {https://doi.org/10.1049/iet-ifs.2018.5010},
  doi          = {10.1049/IET-IFS.2018.5010},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/JhaSAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/BatraAVS19,
  author       = {Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  title        = {Deploying {ABAC} policies using {RBAC} systems},
  journal      = {J. Comput. Secur.},
  volume       = {27},
  number       = {4},
  pages        = {483--506},
  year         = {2019},
  url          = {https://doi.org/10.3233/JCS-191315},
  doi          = {10.3233/JCS-191315},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/BatraAVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/DasSVA19,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Policy Adaptation in Hierarchical Attribute-based Access Control Systems},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {19},
  number       = {3},
  pages        = {40:1--40:24},
  year         = {2019},
  url          = {https://doi.org/10.1145/3323233},
  doi          = {10.1145/3323233},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/DasSVA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MeshramDSVA19,
  author       = {Augustee Meshram and
                  Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {ABACaaS: Attribute-Based Access Control as a Service},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {153--155},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3302381},
  doi          = {10.1145/3292006.3302381},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MeshramDSVA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/YaqubCAV19,
  author       = {Ussama Yaqub and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Yu{-}Che Chen and
                  Fadi Salem and
                  Anneke Zuiderwijk},
  title        = {Social Media Communication of Public Sector Organizations: {A} Case
                  Study of Northeast {US}},
  booktitle    = {20th Annual International Conference on Digital Government Research,
                  {DG.O} 2019, Dubai, United Arab Emirates, June 18-20, 2019},
  pages        = {248--253},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3325112.3325253},
  doi          = {10.1145/3325112.3325253},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/YaqubCAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunPYPAA19,
  author       = {Soon Ae Chun and
                  Venkata Avinash Paturu and
                  Shengcheng Yuan and
                  Rohit Pathak and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Yu{-}Che Chen and
                  Fadi Salem and
                  Anneke Zuiderwijk},
  title        = {Crime Prediction Model using Deep Neural Networks},
  booktitle    = {20th Annual International Conference on Digital Government Research,
                  {DG.O} 2019, Dubai, United Arab Emirates, June 18-20, 2019},
  pages        = {512--514},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3325112.3328221},
  doi          = {10.1145/3325112.3328221},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunPYPAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/DasSVAR19,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Gerhard Rigoll},
  editor       = {Deepak Garg and
                  N. V. Narendra Kumar and
                  Rudrapatna K. Shyamasundar},
  title        = {VisMAP: Visual Mining of Attribute-Based Access Control Policies},
  booktitle    = {Information Systems Security - 15th International Conference, {ICISS}
                  2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {79--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36945-3\_5},
  doi          = {10.1007/978-3-030-36945-3\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/DasSVAR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BatraAVS19,
  author       = {Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Deepak Garg and
                  N. V. Narendra Kumar and
                  Rudrapatna K. Shyamasundar},
  title        = {Policy Reconciliation and Migration in Attribute Based Access Control},
  booktitle    = {Information Systems Security - 15th International Conference, {ICISS}
                  2019, Hyderabad, India, December 16-20, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11952},
  pages        = {99--120},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36945-3\_6},
  doi          = {10.1007/978-3-030-36945-3\_6},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BatraAVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NathDSVA19,
  author       = {Ronit Nath and
                  Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijay Atluri},
  editor       = {Florian Kerschbaum and
                  Atefeh Mashatan and
                  Jianwei Niu and
                  Adam J. Lee},
  title        = {PolTree: {A} Data Structure for Making Efficient Access Decisions
                  in {ABAC}},
  booktitle    = {Proceedings of the 24th {ACM} Symposium on Access Control Models and
                  Technologies, {SACMAT} 2019, Toronto, ON, Canada, June 03-06, 2019},
  pages        = {25--35},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3322431.3325102},
  doi          = {10.1145/3322431.3325102},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/NathDSVA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/SinghSAV19,
  author       = {Mahendra Pratap Singh and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Sanjay K. Sahay and
                  Nihita Goel and
                  Vishwas Patil and
                  Murtuza Jadliwala},
  title        = {Security Analysis of Unified Access Control Policies},
  booktitle    = {Secure Knowledge Management In Artificial Intelligence Era - 8th International
                  Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1186},
  pages        = {126--146},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-3817-9\_8},
  doi          = {10.1007/978-981-15-3817-9\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/skm/SinghSAV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/DasSVA19,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Central Attribute Authority {(CAA):} {A} Vision for Seamless Sharing
                  of Organizational Resources},
  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,
                  CA, USA, December 12-14, 2019},
  pages        = {209--217},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00034},
  doi          = {10.1109/TPS-ISA48467.2019.00034},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/DasSVA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/GuptaSAV18,
  author       = {Haritabh Gupta and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {A side-channel attack on smartphones: Deciphering key taps using built-in
                  microphones},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {2},
  pages        = {255--281},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-17975},
  doi          = {10.3233/JCS-17975},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/GuptaSAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LorenziUVSA18,
  author       = {David Lorenzi and
                  Emre Uzun and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  title        = {Towards designing robust CAPTCHAs},
  journal      = {J. Comput. Secur.},
  volume       = {26},
  number       = {6},
  pages        = {731--760},
  year         = {2018},
  url          = {https://doi.org/10.3233/JCS-17947},
  doi          = {10.3233/JCS-17947},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LorenziUVSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JhaSAV18,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Specification and Verification of Separation of Duty Constraints in
                  Attribute-Based Access Control},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {4},
  pages        = {897--911},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2017.2771492},
  doi          = {10.1109/TIFS.2017.2771492},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JhaSAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/DasMAVS18,
  author       = {Saptarshi Das and
                  Barsha Mitra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Pierangela Samarati and
                  Indrajit Ray and
                  Indrakshi Ray},
  title        = {Policy Engineering in {RBAC} and {ABAC}},
  booktitle    = {From Database to Cyber Security - Essays Dedicated to Sushil Jajodia
                  on the Occasion of His 70th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {11170},
  pages        = {24--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-04834-1\_2},
  doi          = {10.1007/978-3-030-04834-1\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/DasMAVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BatraAVS18,
  author       = {Gunjan Batra and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Florian Kerschbaum and
                  Stefano Paraboschi},
  title        = {Enabling the Deployment of {ABAC} Policies in {RBAC} Systems},
  booktitle    = {Data and Applications Security and Privacy {XXXII} - 32nd Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2018, Bergamo, Italy, July 16-18, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10980},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-95729-6\_4},
  doi          = {10.1007/978-3-319-95729-6\_4},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/BatraAVS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/YaqubSPCAV18,
  author       = {Ussama Yaqub and
                  Nitesh Sharma and
                  Rachit Pabreja and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Marijn Janssen and
                  Soon Ae Chun and
                  Vishanth Weerakkody},
  title        = {Analysis and visualization of subjectivity and polarity of Twitter
                  location data},
  booktitle    = {Proceedings of the 19th Annual International Conference on Digital
                  Government Research: Governance in the Data Age, {DG.O} 2018, Delft,
                  The Netherlands, May 30 - June 01, 2018},
  pages        = {67:1--67:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3209281.3209313},
  doi          = {10.1145/3209281.3209313},
  timestamp    = {Fri, 08 Sep 2023 14:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/YaqubSPCAV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/SharmaPYACV18,
  author       = {Nitesh Sharma and
                  Rachit Pabreja and
                  Ussama Yaqub and
                  Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Jaideep Vaidya},
  editor       = {Marijn Janssen and
                  Soon Ae Chun and
                  Vishanth Weerakkody},
  title        = {Web-based application for sentiment analysis of live tweets},
  booktitle    = {Proceedings of the 19th Annual International Conference on Digital
                  Government Research: Governance in the Data Age, {DG.O} 2018, Delft,
                  The Netherlands, May 30 - June 01, 2018},
  pages        = {120:1--120:2},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3209281.3209402},
  doi          = {10.1145/3209281.3209402},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/SharmaPYACV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/DasSVA18,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Elisa Bertino and
                  Dan Lin and
                  Jorge Lobo},
  title        = {Using Gini Impurity to Mine Attribute-based Access Control Policies
                  with Environment Attributes},
  booktitle    = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15,
                  2018},
  pages        = {213--215},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3205977.3208949},
  doi          = {10.1145/3205977.3208949},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/DasSVA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/YaqubCAV17,
  author       = {Ussama Yaqub and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Analysis of political discourse on twitter in the context of the 2016
                  {US} presidential elections},
  journal      = {Gov. Inf. Q.},
  volume       = {34},
  number       = {4},
  pages        = {613--626},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.giq.2017.11.001},
  doi          = {10.1016/J.GIQ.2017.11.001},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/giq/YaqubCAV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/MitraSVA17,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Migrating from {RBAC} to temporal {RBAC}},
  journal      = {{IET} Inf. Secur.},
  volume       = {11},
  number       = {5},
  pages        = {294--300},
  year         = {2017},
  url          = {https://doi.org/10.1049/iet-ifs.2016.0258},
  doi          = {10.1049/IET-IFS.2016.0258},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/MitraSVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/RoySMVA17,
  author       = {Arindam Roy and
                  Shamik Sural and
                  Arun Kumar Majumdar and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {On Optimal Employee Assignment in Constrained Role-Based Access Control
                  Systems},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {7},
  number       = {4},
  pages        = {10:1--10:24},
  year         = {2017},
  url          = {https://doi.org/10.1145/2996470},
  doi          = {10.1145/2996470},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/RoySMVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/DasSVA17,
  author       = {Saptarshi Das and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Policy Adaptation in Attribute-Based Access Control for Inter-Organizational
                  Collaboration},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {136--145},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00028},
  doi          = {10.1109/CIC.2017.00028},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/DasSVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/TalukdarBVAS17,
  author       = {Tanay Talukdar and
                  Gunjan Batra and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Shamik Sural},
  title        = {Efficient Bottom-Up Mining of Attribute Based Access Control Policies},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {339--348},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00051},
  doi          = {10.1109/CIC.2017.00051},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/coinco/TalukdarBVAS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunPAFVSL17,
  author       = {Emre Uzun and
                  Gennaro Parlato and
                  Vijayalakshmi Atluri and
                  Anna Lisa Ferrara and
                  Jaideep Vaidya and
                  Shamik Sural and
                  David Lorenzi},
  editor       = {Giovanni Livraga and
                  Sencun Zhu},
  title        = {Preventing Unauthorized Data Flows},
  booktitle    = {Data and Applications Security and Privacy {XXXI} - 31st Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2017, Philadelphia, PA, USA, July 19-21,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10359},
  pages        = {41--62},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61176-1\_3},
  doi          = {10.1007/978-3-319-61176-1\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunPAFVSL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/YaqubCAV17,
  author       = {Ussama Yaqub and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Charles C. Hinnant and
                  Adegboyega Ojo},
  title        = {Sentiment based Analysis of Tweets during the {US} Presidential Elections},
  booktitle    = {Proceedings of the 18th Annual International Conference on Digital
                  Government Research, {DG.O} 2017, Staten Island, NY, USA, June 7-9,
                  2017},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3085228.3085285},
  doi          = {10.1145/3085228.3085285},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/YaqubCAV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/GautamJSVA17,
  author       = {Mayank Gautam and
                  Sadhana Jha and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Edgar R. Weippl},
  title        = {Poster: Constrained Policy Mining in Attribute Based Access Control},
  booktitle    = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
                  and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
                  2017},
  pages        = {121--123},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3078861.3084163},
  doi          = {10.1145/3078861.3084163},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/GautamJSVA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LorenziVASAC17,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Achyuta Aich and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Joseph Calca},
  editor       = {Sabrina De Capitani di Vimercati and
                  Fabio Martinelli},
  title        = {EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans
                  Apart},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 32nd {IFIP} {TC} 11
                  International Conference, {SEC} 2017, Rome, Italy, May 29-31, 2017,
                  Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {502},
  pages        = {281--295},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-58469-0\_19},
  doi          = {10.1007/978-3-319-58469-0\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LorenziVASAC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/gis/AtluriS17,
  author       = {Vijay Atluri and
                  Heechang Shin},
  editor       = {Shashi Shekhar and
                  Hui Xiong and
                  Xun Zhou},
  title        = {Geospatial Authorizations, Efficient Enforcement},
  booktitle    = {Encyclopedia of {GIS}},
  pages        = {730--738},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-17885-1\_503},
  doi          = {10.1007/978-3-319-17885-1\_503},
  timestamp    = {Fri, 03 Apr 2020 17:07:19 +0200},
  biburl       = {https://dblp.org/rec/reference/gis/AtluriS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/gis/ChunA17,
  author       = {Soon Ae Chun and
                  Vijay Atluri},
  editor       = {Shashi Shekhar and
                  Hui Xiong and
                  Xun Zhou},
  title        = {Security Models, Geospatial},
  booktitle    = {Encyclopedia of {GIS}},
  pages        = {1850--1860},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-17885-1\_1178},
  doi          = {10.1007/978-3-319-17885-1\_1178},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/gis/ChunA17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitraSVA16,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Mining temporal roles using many-valued concepts},
  journal      = {Comput. Secur.},
  volume       = {60},
  pages        = {79--94},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.04.002},
  doi          = {10.1016/J.COSE.2016.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitraSVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/MitraSVA16,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {A Survey of Role Mining},
  journal      = {{ACM} Comput. Surv.},
  volume       = {48},
  number       = {4},
  pages        = {50:1--50:37},
  year         = {2016},
  url          = {https://doi.org/10.1145/2871148},
  doi          = {10.1145/2871148},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/MitraSVA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/JhaSAV16,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {An Administrative Model for Collaborative Management of {ABAC} Systems
                  and Its Security Analysis},
  booktitle    = {2nd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016},
  pages        = {64--73},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CIC.2016.022},
  doi          = {10.1109/CIC.2016.022},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/JhaSAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/GuptaSAV16,
  author       = {Haritabh Gupta and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {Deciphering Text from Touchscreen Key Taps},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_1},
  doi          = {10.1007/978-3-319-41483-6\_1},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/GuptaSAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/YakubAV16,
  author       = {Ussama Yakub and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Efficient Evaluation of Authorizations for Video Data},
  booktitle    = {Proceedings of the 9th International Conference on Security of Information
                  and Networks, Newark, NJ, USA, July 20-22, 2016},
  pages        = {16--23},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2947626.2947652},
  doi          = {10.1145/2947626.2947652},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/YakubAV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informs/LuVAL15,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Yingjiu Li},
  title        = {Statistical Database Auditing Without Query Denial Threat},
  journal      = {{INFORMS} J. Comput.},
  volume       = {27},
  number       = {1},
  pages        = {20--34},
  year         = {2015},
  url          = {https://doi.org/10.1287/ijoc.2014.0607},
  doi          = {10.1287/IJOC.2014.0607},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/informs/LuVAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MitraSAV15,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {The generalized temporal role mining problem},
  journal      = {J. Comput. Secur.},
  volume       = {23},
  number       = {1},
  pages        = {31--58},
  year         = {2015},
  url          = {https://doi.org/10.3233/JCS-140512},
  doi          = {10.3233/JCS-140512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MitraSAV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HarikaNJSVA15,
  author       = {Pullamsetty Harika and
                  Marreddy Nagajyothi and
                  John C. John and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Meeting Cardinality Constraints in Role Mining},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {1},
  pages        = {71--84},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2309117},
  doi          = {10.1109/TDSC.2014.2309117},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HarikaNJSVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/RoySMVA15,
  author       = {Arindam Roy and
                  Shamik Sural and
                  Arun Kumar Majumdar and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Minimizing Organizational User Requirement while Meeting Security
                  Constraints},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {6},
  number       = {3},
  pages        = {12:1--12:25},
  year         = {2015},
  url          = {https://doi.org/10.1145/2811269},
  doi          = {10.1145/2811269},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmis/RoySMVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunLAVS15,
  author       = {Emre Uzun and
                  David Lorenzi and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Pierangela Samarati},
  title        = {Migrating from {DAC} to {RBAC}},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_5},
  doi          = {10.1007/978-3-319-20810-7\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunLAVS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JhaSAV15,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Enforcing Separation of Duty in Attribute Based Access Control Systems},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {61--78},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_5},
  doi          = {10.1007/978-3-319-26961-0\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/JhaSAV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SaranaRSVA15,
  author       = {Prasuna Sarana and
                  Arindam Roy and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Role Mining in the Presence of Separation of Duty Constraints},
  booktitle    = {Information Systems Security - 11th International Conference, {ICISS}
                  2015, Kolkata, India, December 16-20, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9478},
  pages        = {98--117},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26961-0\_7},
  doi          = {10.1007/978-3-319-26961-0\_7},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SaranaRSVA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/VaidyaSAL15,
  author       = {Jaideep Vaidya and
                  Basit Shafiq and
                  Vijayalakshmi Atluri and
                  David Lorenzi},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {A Framework for Policy Similarity Evaluation and Migration Based on
                  Change Detection},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_13},
  doi          = {10.1007/978-3-319-25645-0\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/VaidyaSAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SinghSAVY15,
  author       = {Mahendra Pratap Singh and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Ussama Yakub},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Managing Multi-dimensional Multi-granular Security Policies Using
                  Data Warehousing},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_15},
  doi          = {10.1007/978-3-319-25645-0\_15},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SinghSAVY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LorenziCUVSA15,
  author       = {David Lorenzi and
                  Pratik Chattopadhyay and
                  Emre Uzun and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Generating Secure Images for CAPTCHAs through Noise Addition},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {169--172},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2753065},
  doi          = {10.1145/2752952.2753065},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/LorenziCUVSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/LorenziUVSA15,
  author       = {David Lorenzi and
                  Emre Uzun and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Hannes Federrath and
                  Dieter Gollmann},
  title        = {Enhancing the Security of Image CAPTCHAs Through Noise Addition},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 30th {IFIP} {TC} 11
                  International Conference, {SEC} 2015, Hamburg, Germany, May 26-28,
                  2015, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {455},
  pages        = {354--368},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-18467-8\_24},
  doi          = {10.1007/978-3-319-18467-8\_24},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/LorenziUVSA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JhaSVA14,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Security analysis of temporal {RBAC} under an administrative model},
  journal      = {Comput. Secur.},
  volume       = {46},
  pages        = {154--172},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.08.001},
  doi          = {10.1016/J.COSE.2014.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JhaSVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/giq/LorenziVCSA14,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Soon Ae Chun and
                  Basit Shafiq and
                  Vijayalakshmi Atluri},
  title        = {Enhancing the government service experience through {QR} codes on
                  mobile platforms},
  journal      = {Gov. Inf. Q.},
  volume       = {31},
  number       = {1},
  pages        = {6--16},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.giq.2013.05.025},
  doi          = {10.1016/J.GIQ.2013.05.025},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/giq/LorenziVCSA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/LuVA14,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {An optimization framework for role mining},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {1},
  pages        = {1--31},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-130484},
  doi          = {10.3233/JCS-130484},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/LuVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/UzunAVSFPM14,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Anna Lisa Ferrara and
                  Gennaro Parlato and
                  P. Madhusudan},
  title        = {Security analysis for temporal role based access control},
  journal      = {J. Comput. Secur.},
  volume       = {22},
  number       = {6},
  pages        = {961--996},
  year         = {2014},
  url          = {https://doi.org/10.3233/JCS-140510},
  doi          = {10.3233/JCS-140510},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/UzunAVSFPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/LorenziVSCVAAWA14,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Basit Shafiq and
                  Soon Ae Chun and
                  Neelima Vegesna and
                  Zamil S. Alzamil and
                  Nabil R. Adam and
                  Seth Wainer and
                  Vijayalakshmi Atluri},
  editor       = {Gabriel Puron Cid and
                  Scott P. Robertson and
                  Jing Zhang and
                  J. Ram{\'{o}}n Gil{-}Garc{\'{\i}}a},
  title        = {Utilizing social media to improve local government responsiveness},
  booktitle    = {15th Annual International Conference on Digital Government Research,
                  dg.o '14, Aguascalientes, Mexico, June 18-21, 2014},
  pages        = {236--244},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2612733.2612773},
  doi          = {10.1145/2612733.2612773},
  timestamp    = {Thu, 28 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/LorenziVSCVAAWA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/JhaSVA14,
  author       = {Sadhana Jha and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Atul Prakash and
                  Rudrapatna K. Shyamasundar},
  title        = {Temporal {RBAC} Security Analysis Using Logic Programming in the Presence
                  of Administrative Policies},
  booktitle    = {Information Systems Security - 10th International Conference, {ICISS}
                  2014, Hyderabad, India, December 16-20, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8880},
  pages        = {129--148},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13841-1\_8},
  doi          = {10.1007/978-3-319-13841-1\_8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/JhaSVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/BadarVA14,
  author       = {Nazia Badar and
                  Jaideep Vaidya and
                  Vijay Atluri},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {More data, more security challenges: integrating analytics in to the
                  information security curriculum},
  booktitle    = {Proceedings of the 2014 Information Security Curriculum Development
                  Conference, InfoSecCD 2014, Kennesaw, GA, USA, October 11, 2014},
  pages        = {8:1},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2670739.2670743},
  doi          = {10.1145/2670739.2670743},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infoseccd/BadarVA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2014,
  editor       = {Vijay Atluri and
                  G{\"{u}}nther Pernul},
  title        = {Data and Applications Security and Privacy {XXVIII} - 28th Annual
                  {IFIP} {WG} 11.3 Working Conference, DBSec 2014, Vienna, Austria,
                  July 14-16, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8566},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-43936-4},
  doi          = {10.1007/978-3-662-43936-4},
  isbn         = {978-3-662-43935-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaSVA13,
  author       = {Manisha Sharma and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {{AMTRAC:} An administrative model for temporal role-based access control},
  journal      = {Comput. Secur.},
  volume       = {39},
  pages        = {201--218},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.07.005},
  doi          = {10.1016/J.COSE.2013.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaSVA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MitraSAV13,
  author       = {Barsha Mitra and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Toward Mining of Temporal Roles},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {65--80},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_5},
  doi          = {10.1007/978-3-642-39256-6\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MitraSAV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunAVS13,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Shamik Sural},
  editor       = {Lingyu Wang and
                  Basit Shafiq},
  title        = {Analysis of {TRBAC} with Dynamic Temporal Role Hierarchies},
  booktitle    = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7964},
  pages        = {297--304},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39256-6\_22},
  doi          = {10.1007/978-3-642-39256-6\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunAVS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/LorenziVCSNAA13,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Soon Ae Chun and
                  Basit Shafiq and
                  Varuna Naik and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Sehl Mellouli and
                  Luis F. Luna{-}Reyes and
                  Jing Zhang},
  title        = {Community based emergency response},
  booktitle    = {14th Annual International Conference on Digital Government Research,
                  dg.o 2013, Quebec City, QC, Canada, June 17-20, 2013},
  pages        = {82--91},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2479724.2479739},
  doi          = {10.1145/2479724.2479739},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/LorenziVCSNAA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/HachanaCCAM13,
  author       = {Safa{\`{a}} Hachana and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens{-}Boulahia and
                  Vijay Atluri and
                  Stephane Morucci},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {Policy Mining: {A} Bottom-Up Approach toward a Model Based Firewall
                  Management},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {133--147},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_10},
  doi          = {10.1007/978-3-642-45204-8\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/HachanaCCAM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LorenziVSA13,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {Web Services Based Attacks against Image CAPTCHAs},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {214--229},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_16},
  doi          = {10.1007/978-3-642-45204-8\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LorenziVSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/SharmaSAV13,
  author       = {Manisha Sharma and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Aditya Bagchi and
                  Indrakshi Ray},
  title        = {An Administrative Model for Spatio-Temporal Role Based Access Control},
  booktitle    = {Information Systems Security - 9th International Conference, {ICISS}
                  2013, Kolkata, India, December 16-20, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8303},
  pages        = {375--389},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-45204-8\_28},
  doi          = {10.1007/978-3-642-45204-8\_28},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/SharmaSAV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MolloyTLKSA13,
  author       = {Ian M. Molloy and
                  Mahesh V. Tripunitara and
                  Volkmar Lotz and
                  Martin Kuhlmann and
                  Casey Schaufler and
                  Vijay Atluri},
  editor       = {Mauro Conti and
                  Jaideep Vaidya and
                  Andreas Schaad},
  title        = {Panel on granularity in access control},
  booktitle    = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages        = {85--86},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2462410.2462889},
  doi          = {10.1145/2462410.2462889},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MolloyTLKSA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LuVAH12,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Yuan Hong},
  title        = {Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {9},
  number       = {5},
  pages        = {655--669},
  year         = {2012},
  url          = {https://doi.org/10.1109/TDSC.2012.21},
  doi          = {10.1109/TDSC.2012.21},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LuVAH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wias/HeVSAA12,
  author       = {Xiaoyun He and
                  Jaideep Vaidya and
                  Basit Shafiq and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  title        = {Structure-aware graph anonymization},
  journal      = {Web Intell. Agent Syst.},
  volume       = {10},
  number       = {2},
  pages        = {193--208},
  year         = {2012},
  url          = {https://doi.org/10.3233/WIA-2012-0241},
  doi          = {10.3233/WIA-2012-0241},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wias/HeVSAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/VerdeVAC12,
  author       = {Nino Vincenzo Verde and
                  Jaideep Vaidya and
                  Vijay Atluri and
                  Alessandro Colantonio},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu},
  title        = {Role engineering: from theory to practice},
  booktitle    = {Second {ACM} Conference on Data and Application Security and Privacy,
                  {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012},
  pages        = {181--192},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2133601.2133624},
  doi          = {10.1145/2133601.2133624},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/VerdeVAC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MehmoodSVHAA12,
  author       = {Danish Mehmood and
                  Basit Shafiq and
                  Jaideep Vaidya and
                  Yuan Hong and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Privacy-Preserving Subgraph Discovery},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {161--176},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_13},
  doi          = {10.1007/978-3-642-31540-4\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MehmoodSVHAA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/LorenziSVNCA12,
  author       = {David Lorenzi and
                  Basit Shafiq and
                  Jaideep Vaidya and
                  Ghulam Nabi and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri},
  editor       = {John Carlo Bertot and
                  Luis F. Luna{-}Reyes and
                  Sehl Mellouli},
  title        = {Using {QR} codes for enhancing the scope of digital government services},
  booktitle    = {13th Annual International Conference on Digital Government Research,
                  dg.o 2012, College Park, MD, USA, June 4-7, 2012},
  pages        = {21--29},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2307729.2307734},
  doi          = {10.1145/2307729.2307734},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/LorenziSVNCA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/LorenziVUSA12,
  author       = {David Lorenzi and
                  Jaideep Vaidya and
                  Emre Uzun and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {Attacking Image Based CAPTCHAs Using Image Recognition Techniques},
  booktitle    = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35130-3\_23},
  doi          = {10.1007/978-3-642-35130-3\_23},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/LorenziVUSA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/UzunASVPFM12,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Shamik Sural and
                  Jaideep Vaidya and
                  Gennaro Parlato and
                  Anna Lisa Ferrara and
                  Parthasarathy Madhusudan},
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {Analyzing temporal role based access control models},
  booktitle    = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages        = {177--186},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136.2295169},
  doi          = {10.1145/2295136.2295169},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/UzunASVPFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/safeconfig/BadarVAS12,
  author       = {Nazia Badar and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Basit Shafiq},
  editor       = {Ehab Al{-}Shaer and
                  Xinming Ou and
                  Geoffrey G. Xie},
  title        = {Risk Based Access Control Using Classification},
  booktitle    = {Automated Security Management [papers from SafeConfig 2012, Baltimore
                  Inner Harbor, MD, {USA]}},
  pages        = {79--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-319-01433-3\_5},
  doi          = {10.1007/978-3-319-01433-3\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/safeconfig/BadarVAS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/JohnSAV12,
  author       = {John C. John and
                  Shamik Sural and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Dimitris Gritzalis and
                  Steven Furnell and
                  Marianthi Theoharidou},
  title        = {Role Mining under Role-Usage Cardinality Constraint},
  booktitle    = {Information Security and Privacy Research - 27th {IFIP} {TC} 11 Information
                  Security and Privacy Conference, {SEC} 2012, Heraklion, Crete, Greece,
                  June 4-6, 2012. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {376},
  pages        = {150--161},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30436-1\_13},
  doi          = {10.1007/978-3-642-30436-1\_13},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/JohnSAV12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2012,
  editor       = {Vijay Atluri and
                  Jaideep Vaidya and
                  Axel Kern and
                  Murat Kantarcioglu},
  title        = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2295136},
  doi          = {10.1145/2295136},
  isbn         = {978-1-4503-1295-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MondalSA11,
  author       = {Samrat Mondal and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  title        = {Security analysis of {GTRBAC} and its variants using model checking},
  journal      = {Comput. Secur.},
  volume       = {30},
  number       = {2-3},
  pages        = {128--147},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.cose.2010.09.002},
  doi          = {10.1016/J.COSE.2010.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MondalSA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Atluri11,
  author       = {Vijay Atluri},
  title        = {Preface},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {365},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0425},
  doi          = {10.3233/JCS-2011-0425},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/Atluri11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShinAC11,
  author       = {Heechang Shin and
                  Vijayalakshmi Atluri and
                  June{-}Suh Cho},
  title        = {Efficiently enforcing spatiotemporal access control under uncertain
                  location information},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {3},
  pages        = {607--637},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2011-0423},
  doi          = {10.3233/JCS-2011-0423},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShinAC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ShinVA11,
  author       = {Heechang Shin and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {A profile anonymization model for location-based services},
  journal      = {J. Comput. Secur.},
  volume       = {19},
  number       = {5},
  pages        = {795--833},
  year         = {2011},
  url          = {https://doi.org/10.3233/JCS-2010-0416},
  doi          = {10.3233/JCS-2010-0416},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/ShinVA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/FerraioloAG11,
  author       = {David F. Ferraiolo and
                  Vijayalakshmi Atluri and
                  Serban I. Gavrila},
  title        = {The Policy Machine: {A} novel architecture and framework for access
                  control policy specification and enforcement},
  journal      = {J. Syst. Archit.},
  volume       = {57},
  number       = {4},
  pages        = {412--424},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.sysarc.2010.04.005},
  doi          = {10.1016/J.SYSARC.2010.04.005},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/FerraioloAG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/UzunALV11,
  author       = {Emre Uzun and
                  Vijayalakshmi Atluri and
                  Haibing Lu and
                  Jaideep Vaidya},
  editor       = {Yingjiu Li},
  title        = {An Optimization Model for the Extended Role Mining Problem},
  booktitle    = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6818},
  pages        = {76--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22348-8\_8},
  doi          = {10.1007/978-3-642-22348-8\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/UzunALV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AtluriSCNV11,
  author       = {Vijay Atluri and
                  Basit Shafiq and
                  Soon Ae Chun and
                  Ghulam Nabi and
                  Jaideep Vaidya},
  editor       = {John Carlo Bertot and
                  Karine Nahon and
                  Soon Ae Chun and
                  Luis F. Luna{-}Reyes and
                  Vijay Atluri},
  title        = {UICDS-based information sharing among emergency response application
                  systems},
  booktitle    = {Proceedings of the 12th Annual International Conference on Digital
                  Government Research, {DG.O} 2011, College Park, MD, USA, June 12 -
                  15, 2011},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {331--332},
  publisher    = {Digital Government Research Center},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037556.2037611},
  doi          = {10.1145/2037556.2037611},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AtluriSCNV11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdm/LuVASJ11,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Heechang Shin and
                  Lili Jiang},
  title        = {Weighted Rank-One Binary Matrix Factorization},
  booktitle    = {Proceedings of the Eleventh {SIAM} International Conference on Data
                  Mining, {SDM} 2011, April 28-30, 2011, Mesa, Arizona, {USA}},
  pages        = {283--294},
  publisher    = {{SIAM} / Omnipress},
  year         = {2011},
  url          = {https://doi.org/10.1137/1.9781611972818.25},
  doi          = {10.1137/1.9781611972818.25},
  timestamp    = {Wed, 14 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sdm/LuVASJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dgo/2011,
  editor       = {John Carlo Bertot and
                  Karine Nahon and
                  Soon Ae Chun and
                  Luis F. Luna{-}Reyes and
                  Vijay Atluri},
  title        = {Proceedings of the 12th Annual International Conference on Digital
                  Government Research, {DG.O} 2011, College Park, MD, USA, June 12 -
                  15, 2011},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2011},
  url          = {https://doi.org/10.1145/2037556},
  doi          = {10.1145/2037556},
  isbn         = {978-1-4503-0762-8},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011,
  editor       = {Vijay Atluri and
                  Claudia D{\'{\i}}az},
  title        = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
                  in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6879},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23822-2},
  doi          = {10.1007/978-3-642-23822-2},
  isbn         = {978-3-642-23821-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Alturi11,
  author       = {Vijay Alturi},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {{HRU}},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {562--564},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_819},
  doi          = {10.1007/978-1-4419-5906-5\_819},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Alturi11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/AlturiF11,
  author       = {Vijay Alturi and
                  David F. Ferraiolo},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Role-Based Access Control},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {1053--1055},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_829},
  doi          = {10.1007/978-1-4419-5906-5\_829},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/AlturiF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShinVA10,
  author       = {Heechang Shin and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Anonymization models for directional location based service environments},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {59--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.006},
  doi          = {10.1016/J.COSE.2009.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShinVA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/datamine/JanejaAAV10,
  author       = {Vandana Pursnani Janeja and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  title        = {Spatial neighborhood based anomaly detection in sensor datasets},
  journal      = {Data Min. Knowl. Discov.},
  volume       = {20},
  number       = {2},
  pages        = {221--258},
  year         = {2010},
  url          = {https://doi.org/10.1007/s10618-009-0147-0},
  doi          = {10.1007/S10618-009-0147-0},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/datamine/JanejaAAV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/QinA10,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  title        = {Semantics-aware security policy specification for the semantic web
                  data},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {1},
  pages        = {52--75},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.031859},
  doi          = {10.1504/IJICS.2010.031859},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/QinA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AtluriGSV10,
  author       = {Vijayalakshmi Atluri and
                  Qi Guo and
                  Heechang Shin and
                  Jaideep Vaidya},
  title        = {A unified index structure for efficient enforcement of spatiotemporal
                  authorisations},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {4},
  number       = {2},
  pages        = {118--151},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJICS.2010.034814},
  doi          = {10.1504/IJICS.2010.034814},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AtluriGSV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/VaidyaAWG10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Janice Warner and
                  Qi Guo},
  title        = {Role Engineering via Prioritized Subset Enumeration},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {7},
  number       = {3},
  pages        = {300--314},
  year         = {2010},
  url          = {https://doi.org/10.1109/TDSC.2008.61},
  doi          = {10.1109/TDSC.2008.61},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/VaidyaAWG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/VaidyaAG10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo},
  title        = {The role mining problem: {A} formal perspective},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {13},
  number       = {3},
  pages        = {27:1--27:31},
  year         = {2010},
  url          = {https://doi.org/10.1145/1805974.1895983},
  doi          = {10.1145/1805974.1895983},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/VaidyaAG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/VaidyaAGL10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo and
                  Haibing Lu},
  editor       = {Sara Foresti and
                  Sushil Jajodia},
  title        = {Role Mining in the Presence of Noise},
  booktitle    = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
                  {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6166},
  pages        = {97--112},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13739-6\_7},
  doi          = {10.1007/978-3-642-13739-6\_7},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/VaidyaAGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ShafiqVAC10,
  author       = {Basit Shafiq and
                  Jaideep Vaidya and
                  Vijay Atluri and
                  Soon Ae Chun},
  editor       = {Soon Ae Chun and
                  Rodrigo Sandoval and
                  Andrew Philpot},
  title        = {{UICDS} compliant resource management system for emergency response},
  booktitle    = {Proceedings of the 11th Annual International Conference on Digital
                  Government Research, Public Administration Online: Challenges and
                  Opportunities, {DG.O} 2010, Puebla, Mexico, May 17-20, 2010},
  series       = {{ACM} International Conference Proceeding Series},
  pages        = {23--31},
  publisher    = {Digital Government Research Center},
  year         = {2010},
  url          = {http://dl.acm.org/citation.cfm?id=1809882},
  timestamp    = {Fri, 20 Nov 2015 13:56:21 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/ShafiqVAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/ShinVAC10,
  author       = {Heechang Shin and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Sungyong Choi},
  editor       = {Takahiro Hara and
                  Christian S. Jensen and
                  Vijay Kumar and
                  Sanjay Madria and
                  Demetrios Zeinalipour{-}Yazti},
  title        = {Ensuring Privacy and Security for {LBS} through Trajectory Partitioning},
  booktitle    = {Eleventh International Conference on Mobile Data Management, {MDM}
                  2010, Kanas City, Missouri, USA, 23-26 May 2010},
  pages        = {224--226},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/MDM.2010.29},
  doi          = {10.1109/MDM.2010.29},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/ShinVAC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/VaidyaASA10,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Basit Shafiq and
                  Nabil R. Adam},
  editor       = {James B. D. Joshi and
                  Barbara Carminati},
  title        = {Privacy-preserving trust verification},
  booktitle    = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages        = {139--148},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1809842.1809865},
  doi          = {10.1145/1809842.1809865},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/VaidyaASA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/igi/10/YuAA10,
  author       = {Songmei Yu and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Tho Manh Nguyen},
  title        = {Preview},
  booktitle    = {Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval
                  Development - Innovative Methods and Applications},
  pages        = {47--63},
  publisher    = {Information Science Reference},
  year         = {2010},
  url          = {https://doi.org/10.4018/978-1-60566-748-5.ch003},
  doi          = {10.4018/978-1-60566-748-5.CH003},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/igi/10/YuAA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ida/JanejaA09,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri},
  title        = {Spatial outlier detection in heterogeneous neighborhoods},
  journal      = {Intell. Data Anal.},
  volume       = {13},
  number       = {1},
  pages        = {85--107},
  year         = {2009},
  url          = {https://doi.org/10.3233/IDA-2009-0357},
  doi          = {10.3233/IDA-2009-0357},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ida/JanejaA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/QinA09,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  title        = {Evaluating the validity of data instances against ontology evolution
                  over the Semantic Web},
  journal      = {Inf. Softw. Technol.},
  volume       = {51},
  number       = {1},
  pages        = {83--97},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.infsof.2008.01.004},
  doi          = {10.1016/J.INFSOF.2008.01.004},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/QinA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/VaidyaAGL09,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo and
                  Haibing Lu},
  title        = {Edge-RMP: Minimizing administrative assignments for role-based access
                  control},
  journal      = {J. Comput. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {211--235},
  year         = {2009},
  url          = {https://doi.org/10.3233/JCS-2009-0341},
  doi          = {10.3233/JCS-2009-0341},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/VaidyaAGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kais/GuoXAA09,
  author       = {Dihua Guo and
                  Hui Xiong and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {Object discovery in high-resolution remote sensing images: a semantic
                  perspective},
  journal      = {Knowl. Inf. Syst.},
  volume       = {19},
  number       = {2},
  pages        = {211--233},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10115-008-0160-4},
  doi          = {10.1007/S10115-008-0160-4},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kais/GuoXAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cikm/HongHVAA09,
  author       = {Yuan Hong and
                  Xiaoyun He and
                  Jaideep Vaidya and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  editor       = {David Wai{-}Lok Cheung and
                  Il{-}Yeol Song and
                  Wesley W. Chu and
                  Xiaohua Hu and
                  Jimmy Lin},
  title        = {Effective anonymization of query logs},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Information and Knowledge
                  Management, {CIKM} 2009, Hong Kong, China, November 2-6, 2009},
  pages        = {1465--1468},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1645953.1646146},
  doi          = {10.1145/1645953.1646146},
  timestamp    = {Fri, 27 Aug 2021 11:13:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cikm/HongHVAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ShinA09,
  author       = {Heechang Shin and
                  Vijayalakshmi Atluri},
  editor       = {Ehud Gudes and
                  Jaideep Vaidya},
  title        = {Spatiotemporal Access Control Enforcement under Uncertain Location
                  Estimates},
  booktitle    = {Data and Applications Security XXIII, 23rd Annual {IFIP} {WG} 11.3
                  Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5645},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03007-9\_11},
  doi          = {10.1007/978-3-642-03007-9\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ShinA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/edbt/LuLAV09,
  author       = {Haibing Lu and
                  Yingjiu Li and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Martin L. Kersten and
                  Boris Novikov and
                  Jens Teubner and
                  Vladimir Polutin and
                  Stefan Manegold},
  title        = {An efficient online auditing approach to limit private data disclosure},
  booktitle    = {{EDBT} 2009, 12th International Conference on Extending Database Technology,
                  Saint Petersburg, Russia, March 24-26, 2009, Proceedings},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {360},
  pages        = {636--647},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1516360.1516434},
  doi          = {10.1145/1516360.1516434},
  timestamp    = {Wed, 04 May 2022 13:02:27 +0200},
  biburl       = {https://dblp.org/rec/conf/edbt/LuLAV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/LuVAH09,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Yuan Hong},
  editor       = {Wei Wang and
                  Hillol Kargupta and
                  Sanjay Ranka and
                  Philip S. Yu and
                  Xindong Wu},
  title        = {Extended Boolean Matrix Decomposition},
  booktitle    = {{ICDM} 2009, The Ninth {IEEE} International Conference on Data Mining,
                  Miami, Florida, USA, 6-9 December 2009},
  pages        = {317--326},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICDM.2009.61},
  doi          = {10.1109/ICDM.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/LuVAH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MondalSA09,
  author       = {Samrat Mondal and
                  Shamik Sural and
                  Vijayalakshmi Atluri},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Towards formal security analysis of {GTRBAC} using timed automata},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {33--42},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542214},
  doi          = {10.1145/1542207.1542214},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MondalSA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/webi/HeVSAA09,
  author       = {Xiaoyun He and
                  Jaideep Vaidya and
                  Basit Shafiq and
                  Nabil R. Adam and
                  Vijay Atluri},
  title        = {Preserving Privacy in Social Networks: {A} Structure-Aware Approach},
  booktitle    = {2009 {IEEE/WIC/ACM} International Conference on Web Intelligence,
                  {WI} 2009, Milan, Italy, 15-18 September 2009, Main Conference Proceedings},
  pages        = {647--654},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/WI-IAT.2009.108},
  doi          = {10.1109/WI-IAT.2009.108},
  timestamp    = {Thu, 25 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/webi/HeVSAA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriSV08,
  author       = {Vijayalakshmi Atluri and
                  Heechang Shin and
                  Jaideep Vaidya},
  title        = {Efficient security policy enforcement for the mobile environment},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {439--475},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0329},
  doi          = {10.3233/JCS-2008-0329},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriSV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/JanejaA08,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri},
  title        = {Random Walks to Identify Anomalous Free-Form Spatial Scan Windows},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {20},
  number       = {10},
  pages        = {1378--1392},
  year         = {2008},
  url          = {https://doi.org/10.1109/TKDE.2008.96},
  doi          = {10.1109/TKDE.2008.96},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/JanejaA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GuoVA08,
  author       = {Qi Guo and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies},
  booktitle    = {Twenty-Fourth Annual Computer Security Applications Conference, {ACSAC}
                  2008, Anaheim, California, USA, 8-12 December 2008},
  pages        = {237--246},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ACSAC.2008.38},
  doi          = {10.1109/ACSAC.2008.38},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/GuoVA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamEASCVX08,
  author       = {Nabil R. Adam and
                  Vijay Atluri and
                  Soon Ae Chun and
                  John Ellenberger and
                  Basit Shafiq and
                  Jaideep Vaidya and
                  Hui Xiong},
  editor       = {Soon Ae Chun and
                  Marijn Janssen and
                  J. Ram{\'{o}}n Gil{-}Garc{\'{\i}}a},
  title        = {Secure information sharing and analysis for effective emergency management},
  booktitle    = {Proceedings of the 9th Annual International Conference on Digital
                  Government Research, Partnerships for Public Innovation, {DG.O} 2008,
                  Montreal, Canada, May 18-21, 2008},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {289},
  pages        = {407--408},
  publisher    = {Digital Government Research Center},
  year         = {2008},
  url          = {http://dl.acm.org/citation.cfm?id=1367916},
  timestamp    = {Fri, 08 Sep 2023 15:13:05 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamEASCVX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/LuVA08,
  author       = {Haibing Lu and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  editor       = {Gustavo Alonso and
                  Jos{\'{e}} A. Blakeley and
                  Arbee L. P. Chen},
  title        = {Optimal Boolean Matrix Decomposition: Application to Role Engineering},
  booktitle    = {Proceedings of the 24th International Conference on Data Engineering,
                  {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico},
  pages        = {297--306},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICDE.2008.4497438},
  doi          = {10.1109/ICDE.2008.4497438},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/LuVA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/ShinAV08,
  author       = {Heechang Shin and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya},
  editor       = {Xiaofeng Meng and
                  Hui Lei and
                  St{\'{e}}phane Grumbach and
                  Hong Va Leong},
  title        = {A Profile Anonymization Model for Privacy in a Personalized Location
                  Based Service Environment},
  booktitle    = {9th International Conference on Mobile Data Management {(MDM} 2008),
                  Beijing, China, April 27-30, 2008},
  pages        = {73--80},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/MDM.2008.33},
  doi          = {10.1109/MDM.2008.33},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/ShinAV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/VaidyaAGA08,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo and
                  Nabil R. Adam},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Migrating to optimal {RBAC} with minimal perturbation},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377839},
  doi          = {10.1145/1377836.1377839},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/VaidyaAGA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Atluri08,
  author       = {Vijay Atluri},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Panel on role engineering},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {61--62},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377846},
  doi          = {10.1145/1377836.1377846},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Atluri08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FerraioloA08,
  author       = {David F. Ferraiolo and
                  Vijay Atluri},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {A meta model for access control: why is it needed and is it even possible
                  to achieve?},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {153--154},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377860},
  doi          = {10.1145/1377836.1377860},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/FerraioloA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/08/AdamJPACCPBS08,
  author       = {Nabil R. Adam and
                  Vandana P. Janeja and
                  Aabhas V. Paliwal and
                  Vijay Atluri and
                  Soon Ae Chun and
                  Jim Cooper and
                  John Paczkowski and
                  Christof Bornh{\"{o}}vd and
                  Joachim Schaper},
  editor       = {Hsinchun Chen and
                  Lawrence Brandt and
                  Valerie Gregg and
                  Roland Traunm{\"{u}}ller and
                  Sharon S. Dawes and
                  Eduard H. Hovy and
                  Ann Macintosh and
                  Catherine A. Larson},
  title        = {Semantics-Based Threat Structure Mining for Homeland Security},
  booktitle    = {Digital Government: E-Government Research, Case Studies, and Implementation},
  series       = {Integrated Series In Information Systems},
  volume       = {17},
  pages        = {307--329},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-71611-4\_16},
  doi          = {10.1007/978-0-387-71611-4\_16},
  timestamp    = {Tue, 23 Jul 2019 18:38:58 +0200},
  biburl       = {https://dblp.org/rec/books/sp/08/AdamJPACCPBS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/AtluriW08,
  author       = {Vijayalakshmi Atluri and
                  Janice Warner},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Security for Workflow Systems},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {213--230},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_9},
  doi          = {10.1007/978-0-387-48533-1\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/dbsec/AtluriW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/ChunA08,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Geospatial Database Security},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {247--266},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_11},
  doi          = {10.1007/978-0-387-48533-1\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/dbsec/ChunA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/dbsec/AtluriS08,
  author       = {Vijayalakshmi Atluri and
                  Heechang Shin},
  editor       = {Michael Gertz and
                  Sushil Jajodia},
  title        = {Efficiently Enforcing the Security and Privacy Policies in a Mobile
                  Environment},
  booktitle    = {Handbook of Database Security - Applications and Trends},
  pages        = {553--573},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-48533-1\_23},
  doi          = {10.1007/978-0-387-48533-1\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/dbsec/AtluriS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2008,
  editor       = {Vijay Atluri},
  title        = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
                  Working Conference on Data and Applications Security, London, UK,
                  July 13-16, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5094},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70567-3},
  doi          = {10.1007/978-3-540-70567-3},
  isbn         = {978-3-540-70566-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2008,
  editor       = {Vijay Atluri and
                  Marianne Winslett},
  title        = {Proceedings of the 2008 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2008, Alexandria, VA, USA, October 27, 2008},
  publisher    = {{ACM}},
  year         = {2008},
  isbn         = {978-1-60558-289-4},
  timestamp    = {Tue, 11 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/gis/AtluriS08,
  author       = {Vijay Atluri and
                  Heechang Shin},
  editor       = {Shashi Shekhar and
                  Hui Xiong},
  title        = {Geospatial Authorizations, Efficient Enforcement},
  booktitle    = {Encyclopedia of {GIS}},
  pages        = {379--385},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-35973-1\_503},
  doi          = {10.1007/978-0-387-35973-1\_503},
  timestamp    = {Fri, 03 Apr 2020 17:07:19 +0200},
  biburl       = {https://dblp.org/rec/reference/gis/AtluriS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/gis/ChunA08,
  author       = {Soon Ae Chun and
                  Vijay Atluri},
  editor       = {Shashi Shekhar and
                  Hui Xiong},
  title        = {Security Models, Geospatial},
  booktitle    = {Encyclopedia of {GIS}},
  pages        = {1028--1036},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-35973-1\_1178},
  doi          = {10.1007/978-0-387-35973-1\_1178},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/gis/ChunA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/AtluriCMM07,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Ravi Mukkamala and
                  Pietro Mazzoleni},
  title        = {A decentralized execution model for inter-organizational workflows},
  journal      = {Distributed Parallel Databases},
  volume       = {22},
  number       = {1},
  pages        = {55--83},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10619-007-7012-1},
  doi          = {10.1007/S10619-007-7012-1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/AtluriCMM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/AtluriC07,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun},
  title        = {A geotemporal role-based authorisation system},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {143--168},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012247},
  doi          = {10.1504/IJICS.2007.012247},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/AtluriC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriS07,
  author       = {Vijayalakshmi Atluri and
                  Heechang Shin},
  editor       = {Steve Barker and
                  Gail{-}Joon Ahn},
  title        = {Efficient Security Policy Enforcement in a Location Based Service
                  Environment},
  booktitle    = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Redondo Beach, CA, USA,
                  July 8-11, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4602},
  pages        = {61--76},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73538-0\_5},
  doi          = {10.1007/978-3-540-73538-0\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunAA07,
  author       = {Soon Ae Chun and
                  Nabil R. Adam and
                  Vijay Atluri},
  editor       = {Judith Bayard Cushing and
                  Theresa A. Pardo},
  title        = {{MENVIS:} mobile environmental information system},
  booktitle    = {Proceedings of the 8th Annual International Conference on Digital
                  Government Research, Bridging Disciplines {\&} Domains, {DG.O}
                  2007, Philadelphia, Pennsylvania, USA, May 20-23, 2007},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {228},
  pages        = {286--287},
  publisher    = {Digital Government Research Center},
  year         = {2007},
  url          = {http://dl.acm.org/citation.cfm?id=1248522},
  timestamp    = {Fri, 20 Nov 2015 13:56:20 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/GuoXAA07,
  author       = {Dihua Guo and
                  Hui Xiong and
                  Vijay Atluri and
                  Nabil R. Adam},
  editor       = {Zhi{-}Hua Zhou and
                  Hang Li and
                  Qiang Yang},
  title        = {Semantic Feature Selection for Object Discovery in High-Resolution
                  Remote Sensing Imagery},
  booktitle    = {Advances in Knowledge Discovery and Data Mining, 11th Pacific-Asia
                  Conference, {PAKDD} 2007, Nanjing, China, May 22-25, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4426},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71701-0\_10},
  doi          = {10.1007/978-3-540-71701-0\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/GuoXAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/VaidyaAG07,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {The role mining problem: finding a minimal descriptive set of roles},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266870},
  doi          = {10.1145/1266840.1266870},
  timestamp    = {Wed, 29 Jun 2022 15:37:42 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/VaidyaAG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/WarnerAMV07,
  author       = {Janice Warner and
                  Vijayalakshmi Atluri and
                  Ravi Mukkamala and
                  Jaideep Vaidya},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {Using semantics for automatic enforcement of access control policies
                  among dynamic coalitions},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {235--244},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266877},
  doi          = {10.1145/1266840.1266877},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/WarnerAMV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007csaw,
  editor       = {Peng Ning and
                  Vijay Atluri},
  title        = {Proceedings of the 2007 {ACM} workshop on Computer Security Architecture,
                  {CSAW} 2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-890-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007csaw.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007fmse,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Virgil D. Gligor and
                  Heiko Mantel},
  title        = {Proceedings of the 2007 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2007, Fairfax, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-887-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007stc,
  editor       = {Peng Ning and
                  Vijay Atluri and
                  Shouhuai Xu and
                  Moti Yung},
  title        = {Proceedings of the 2nd {ACM} Workshop on Scalable Trusted Computing,
                  {STC} 2007, Alexandria, VA, USA, November 2, 2007},
  publisher    = {{ACM}},
  year         = {2007},
  isbn         = {978-1-59593-888-6},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2007stc.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijswis/QinA06,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  title        = {SemDiff: An Approach to Detecting Semantic Changes to Ontologies},
  journal      = {Int. J. Semantic Web Inf. Syst.},
  volume       = {2},
  number       = {4},
  pages        = {1--32},
  year         = {2006},
  url          = {https://doi.org/10.4018/jswis.2006100101},
  doi          = {10.4018/JSWIS.2006100101},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijswis/QinA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jods/QinA06,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  title        = {An Ontology-Guided Approach to Change Detection of the Semantic Web
                  Data},
  journal      = {J. Data Semant.},
  pages        = {130--157},
  year         = {2006},
  url          = {https://doi.org/10.1007/11617808\_5},
  doi          = {10.1007/11617808\_5},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jods/QinA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MitraPLA06,
  author       = {Prasenjit Mitra and
                  Chi{-}Chun Pan and
                  Peng Liu and
                  Vijayalakshmi Atluri},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Privacy-preserving semantic interoperation and access control of heterogeneous
                  databases},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {66--77},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128831},
  doi          = {10.1145/1128817.1128831},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MitraPLA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/VaidyaAW06,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Janice Warner},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {RoleMiner: mining roles using subset enumeration},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {144--153},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180424},
  doi          = {10.1145/1180405.1180424},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/VaidyaAW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dawak/YuAA06,
  author       = {Songmei Yu and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {A Min Tjoa and
                  Juan Trujillo},
  title        = {Preview: Optimizing View Materialization Cost in Spatial Data Warehouses},
  booktitle    = {Data Warehousing and Knowledge Discovery, 8th International Conference,
                  DaWaK 2006, Krakow, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4081},
  pages        = {45--54},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11823728\_5},
  doi          = {10.1007/11823728\_5},
  timestamp    = {Wed, 09 Jun 2021 08:38:36 +0200},
  biburl       = {https://dblp.org/rec/conf/dawak/YuAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/MukkamalaAWA06,
  author       = {Ravi Mukkamala and
                  Vijayalakshmi Atluri and
                  Janice Warner and
                  Ranjit Abbadasari},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions:
                  {A} Service-Oriented Approach},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {209--223},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_15},
  doi          = {10.1007/11805588\_15},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/MukkamalaAWA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriS06,
  author       = {Vijayalakshmi Atluri and
                  Heechang Shin},
  editor       = {Ernesto Damiani and
                  Peng Liu},
  title        = {Efficient Enforcement of Security Policies Based on Tracking of Mobile
                  Users},
  booktitle    = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Sophia Antipolis, France,
                  July 31-August 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4127},
  pages        = {237--251},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11805588\_17},
  doi          = {10.1007/11805588\_17},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/YuAA06,
  author       = {Songmei Yu and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {St{\'{e}}phane Bressan and
                  Josef K{\"{u}}ng and
                  Roland R. Wagner},
  title        = {Cascaded Star: {A} Hyper-Dimensional Model for a Data Warehouse},
  booktitle    = {Database and Expert Systems Applications, 17th International Conference,
                  {DEXA} 2006, Krak{\'{o}}w, Poland, September 4-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4080},
  pages        = {439--448},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11827405\_43},
  doi          = {10.1007/11827405\_43},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/YuAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamAKGJW06,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Rey Koslowski and
                  Robert Grossman and
                  Vandana Pursnani Janeja and
                  Janice Warner},
  editor       = {Jos{\'{e}} A. B. Fortes and
                  Ann Macintosh},
  title        = {Secure interoperation for effective data mining in border control
                  and homeland security applications},
  booktitle    = {Proceedings of the 7th Annual International Conference on Digital
                  Government Research, {DG.O} 2006, San Diego, California, USA, May
                  21-24, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {151},
  pages        = {124--125},
  publisher    = {Digital Government Research Center},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146598.1146636},
  doi          = {10.1145/1146598.1146636},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamAKGJW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunYAA06,
  author       = {Soon Ae Chun and
                  Yelena Yesha and
                  Nabil R. Adam and
                  Vijay Atluri},
  editor       = {Jos{\'{e}} A. B. Fortes and
                  Ann Macintosh},
  title        = {Challenges in eGovernment technology transfer},
  booktitle    = {Proceedings of the 7th Annual International Conference on Digital
                  Government Research, {DG.O} 2006, San Diego, California, USA, May
                  21-24, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {151},
  pages        = {151--152},
  publisher    = {Digital Government Research Center},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146598.1146646},
  doi          = {10.1145/1146598.1146646},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunYAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamACABC06,
  author       = {Nabil R. Adam and
                  Vijay Atluri and
                  Soon Ae Chun and
                  Francisco J. Artigas and
                  Irfan Bora and
                  Bob Ceberio},
  editor       = {Jos{\'{e}} A. B. Fortes and
                  Ann Macintosh},
  title        = {Constituent-centric municipal government coalition portal},
  booktitle    = {Proceedings of the 7th Annual International Conference on Digital
                  Government Research, {DG.O} 2006, San Diego, California, USA, May
                  21-24, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {151},
  pages        = {365--366},
  publisher    = {Digital Government Research Center},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146598.1146704},
  doi          = {10.1145/1146598.1146704},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamACABC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamAJPYCCPBNS06,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Vandana Pursnani Janeja and
                  Aabhas V. Paliwal and
                  Mahmoud Youssef and
                  Soon Ae Chun and
                  Jim Cooper and
                  John Paczkowski and
                  Christof Bornh{\"{o}}vd and
                  Ike Nassi and
                  Joachim Schaper},
  editor       = {Jos{\'{e}} A. B. Fortes and
                  Ann Macintosh},
  title        = {Semantics-based threat structure mining},
  booktitle    = {Proceedings of the 7th Annual International Conference on Digital
                  Government Research, {DG.O} 2006, San Diego, California, USA, May
                  21-24, 2006},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {151},
  pages        = {367--368},
  publisher    = {Digital Government Research Center},
  year         = {2006},
  url          = {https://doi.org/10.1145/1146598.1146705},
  doi          = {10.1145/1146598.1146705},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamAJPYCCPBNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/YoussefAA06,
  author       = {Mahmoud Youssef and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  editor       = {Hisham Haddad},
  title        = {Semantically enhanced enforcement of mobile consumer's privacy preferences},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Applied Computing (SAC),
                  Dijon, France, April 23-27, 2006},
  pages        = {1172--1176},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1141277.1141554},
  doi          = {10.1145/1141277.1141554},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/YoussefAA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/WarnerA06,
  author       = {Janice Warner and
                  Vijayalakshmi Atluri},
  editor       = {David F. Ferraiolo and
                  Indrakshi Ray},
  title        = {Inter-instance authorization constraints for secure workflow management},
  booktitle    = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages        = {190--199},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1133058.1133085},
  doi          = {10.1145/1133058.1133085},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/WarnerA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iciss/2006,
  editor       = {Aditya Bagchi and
                  Vijayalakshmi Atluri},
  title        = {Information Systems Security, Second International Conference, {ICISS}
                  2006, Kolkata, India, December 19-21, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4332},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11961635},
  doi          = {10.1007/11961635},
  isbn         = {3-540-68962-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/ChunAA05,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {Using Semantics for Policy-Based Web Service Composition},
  journal      = {Distributed Parallel Databases},
  volume       = {18},
  number       = {1},
  pages        = {37--64},
  year         = {2005},
  url          = {https://doi.org/10.1007/s10619-005-1073-9},
  doi          = {10.1007/S10619-005-1073-9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/ChunAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Atluri05,
  author       = {Vijay Atluri},
  title        = {Preface},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {2},
  year         = {2005},
  url          = {https://doi.org/10.1145/1053283.1053285},
  doi          = {10.1145/1053283.1053285},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Atluri05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dawak/YuAA05,
  author       = {Songmei Yu and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {A Min Tjoa and
                  Juan Trujillo},
  title        = {Selective View Materialization in a Spatial Data Warehouse},
  booktitle    = {Data Warehousing and Knowledge Discovery, 7th International Conference,
                  DaWaK 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3589},
  pages        = {157--167},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11546849\_16},
  doi          = {10.1007/11546849\_16},
  timestamp    = {Wed, 09 Jun 2021 08:38:36 +0200},
  biburl       = {https://dblp.org/rec/conf/dawak/YuAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/WarnerAM05,
  author       = {Janice Warner and
                  Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  editor       = {Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {A Credential-Based Approach for Facilitating Automatic Resource Sharing
                  Among Ad-Hoc Dynamic Coalitions},
  booktitle    = {Data and Applications Security XIX, 19th Annual {IFIP} {WG} 11.3 Working
                  Conference on Data and Applications Security, Storrs, CT, USA, August
                  7-10, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3654},
  pages        = {252--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11535706\_19},
  doi          = {10.1007/11535706\_19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/WarnerAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/JanejaAGABL05,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri and
                  Ahmed Gomaa and
                  Nabil R. Adam and
                  Christof Bornh{\"{o}}vd and
                  Tao Lin},
  editor       = {Lois M. L. Delcambre and
                  Genevieve Giuliano},
  title        = {{DM-AMS:} employing data mining techniques for alert management},
  booktitle    = {Proceedings of the 2005 National Conference on Digital Government
                  Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {89},
  pages        = {103--111},
  publisher    = {Digital Government Research Center},
  year         = {2005},
  url          = {http://dl.acm.org/citation.cfm?id=1065254},
  timestamp    = {Fri, 20 Nov 2015 13:56:21 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/JanejaAGABL05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamACFCBSFM05,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Patrizia Fariselli and
                  Julia Culver{-}Hopper and
                  Olana Bojic and
                  Rick T. Stewart and
                  Jim Fruscione and
                  Nick Mannochio},
  editor       = {Lois M. L. Delcambre and
                  Genevieve Giuliano},
  title        = {Technology transfer of inter-agency government services and their
                  transnational feasibility studies},
  booktitle    = {Proceedings of the 2005 National Conference on Digital Government
                  Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {89},
  pages        = {225--226},
  publisher    = {Digital Government Research Center},
  year         = {2005},
  url          = {http://dl.acm.org/citation.cfm?id=1065293},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamACFCBSFM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamAKJWP05,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Rey Koslowski and
                  Vandana Pursnani Janeja and
                  Janice Warner and
                  Aabhas V. Paliwal},
  editor       = {Lois M. L. Delcambre and
                  Genevieve Giuliano},
  title        = {Agency interoperation for effective data mining in border control
                  and homeland security applications},
  booktitle    = {Proceedings of the 2005 National Conference on Digital Government
                  Research, {DG.O} 2005, Atlanta, Georgia, USA, May 15-18, 2005},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {89},
  pages        = {285--286},
  publisher    = {Digital Government Research Center},
  year         = {2005},
  url          = {http://dl.acm.org/citation.cfm?id=1065323},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamAKJWP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtluriG05,
  author       = {Vijayalakshmi Atluri and
                  Qi Guo},
  editor       = {Sabrina De Capitani di Vimercati and
                  Paul F. Syverson and
                  Dieter Gollmann},
  title        = {Unified Index for Mobile Object Data and Authorizations},
  booktitle    = {Computer Security - {ESORICS} 2005, 10th European Symposium on Research
                  in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3679},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11555827\_6},
  doi          = {10.1007/11555827\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtluriG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/JanejaA05,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri},
  title        = {FS\({}^{\mbox{3}}\): {A} Random Walk Based Free-Form Spatial Scan
                  Statistic for Anomalous Window Detection},
  booktitle    = {Proceedings of the 5th {IEEE} International Conference on Data Mining
                  {(ICDM} 2005), 27-30 November 2005, Houston, Texas, {USA}},
  pages        = {661--664},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDM.2005.71},
  doi          = {10.1109/ICDM.2005.71},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdm/JanejaA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WarnerAM05,
  author       = {Janice Warner and
                  Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {An Attribute Graph Based Approach to Map Local Access Control Policies
                  to Credential Based Access Control Policies},
  booktitle    = {Information Systems Security, First International Conference, {ICISS}
                  2005, Kolkata, India, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3803},
  pages        = {134--147},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593980\_10},
  doi          = {10.1007/11593980\_10},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/WarnerAM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmcs/GuoAA05,
  author       = {Dihua Guo and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {Texture-Based Remote-Sensing Image Segmentation},
  booktitle    = {Proceedings of the 2005 {IEEE} International Conference on Multimedia
                  and Expo, {ICME} 2005, July 6-9, 2005, Amsterdam, The Netherlands},
  pages        = {1472--1475},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICME.2005.1521710},
  doi          = {10.1109/ICME.2005.1521710},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmcs/GuoAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/GomaaAA05,
  author       = {Ahmed Gomaa and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  title        = {Adapting spatial constraints of composite multimedia objects to achieve
                  universal access},
  booktitle    = {Proceedings of the 24th {IEEE} International Performance Computing
                  and Communications Conference, {IPCCC} 2005, April 7-9, 2005, Phoenix,
                  Arizona, {USA}},
  pages        = {519--525},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/PCCC.2005.1460624},
  doi          = {10.1109/PCCC.2005.1460624},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/GomaaAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/JanejaAVA05,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri and
                  Jaideep Vaidya and
                  Nabil R. Adam},
  editor       = {Paul B. Kantor and
                  Gheorghe Muresan and
                  Fred S. Roberts and
                  Daniel Dajun Zeng and
                  Fei{-}Yue Wang and
                  Hsinchun Chen and
                  Ralph C. Merkle},
  title        = {Collusion Set Detection Through Outlier Discovery},
  booktitle    = {Intelligence and Security Informatics, {IEEE} International Conference
                  on Intelligence and Security Informatics, {ISI} 2005, Atlanta, GA,
                  USA, May 19-20, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3495},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11427995\_1},
  doi          = {10.1007/11427995\_1},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/JanejaAVA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/YoussefAA05,
  author       = {Mahmoud Youssef and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Panos K. Chrysanthis and
                  George Samaras},
  title        = {Preserving mobile customer privacy: an access control system for moving
                  objects and customer profiles},
  booktitle    = {6th International Conference on Mobile Data Management {(MDM} 2005),
                  Ayia Napa, Cyprus, May 9-13, 2005},
  pages        = {67--76},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1071246.1071257},
  doi          = {10.1145/1071246.1071257},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mdm/YoussefAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmm/GomaaAA05,
  author       = {Ahmed Gomaa and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  editor       = {Yi{-}Ping Phoebe Chen},
  title        = {Color Time Petri Net for Interactive Adaptive Multimedia Objects},
  booktitle    = {11th International Conference on Multi Media Modeling {(MMM} 2005),
                  12-14 January 2005, Melbourne, Australia},
  pages        = {147--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MMMC.2005.26},
  doi          = {10.1109/MMMC.2005.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mmm/GomaaAA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/JanejaA05,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri},
  editor       = {Hisham Haddad and
                  Lorie M. Liebrock and
                  Andrea Omicini and
                  Roger L. Wainwright},
  title        = {LS\({}^{\mbox{3}}\): a Linear Semantic Scan Statistic technique for
                  detecting anomalous windows},
  booktitle    = {Proceedings of the 2005 {ACM} Symposium on Applied Computing (SAC),
                  Santa Fe, New Mexico, USA, March 13-17, 2005},
  pages        = {493--497},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1066677.1066790},
  doi          = {10.1145/1066677.1066790},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/JanejaA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AtluriW05,
  author       = {Vijayalakshmi Atluri and
                  Janice Warner},
  editor       = {Elena Ferrari and
                  Gail{-}Joon Ahn},
  title        = {Supporting conditional delegation in secure workflow management systems},
  booktitle    = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages        = {49--58},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1063979.1063990},
  doi          = {10.1145/1063979.1063990},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/AtluriW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/KimIA05,
  author       = {Dong{-}Ho Kim and
                  Il Im and
                  Vijayalakshmi Atluri},
  title        = {A Clickstream-Based Collaborative Filtering Recommendation Model for
                  E-Commerce},
  booktitle    = {7th {IEEE} International Conference on E-Commerce Technology {(CEC}
                  2005), 19-22 July 2005, M{\"{u}}nchen, Germany},
  pages        = {84--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICECT.2005.1},
  doi          = {10.1109/ICECT.2005.1},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/KimIA05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor       = {Vijay Atluri and
                  Catherine Meadows and
                  Ari Juels},
  title        = {Proceedings of the 12th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-226-7},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005fmse,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Ralf K{\"{u}}sters and
                  John C. Mitchell},
  title        = {Proceedings of the 2005 {ACM} workshop on Formal methods in security
                  engineering, {FMSE} 2005, Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-231-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2005fmse.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dim/2005,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  Atsuhiro Goto},
  title        = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
                  VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-232-1},
  timestamp    = {Wed, 27 Sep 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dim/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sasn/2005,
  editor       = {Vijay Atluri and
                  Peng Ning and
                  Wenliang Du},
  title        = {Proceedings of the 3rd {ACM} Workshop on Security of ad hoc and Sensor
                  Networks, {SASN} 2005, Alexandria, VA, USA, November 7, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-227-5},
  timestamp    = {Fri, 13 Jan 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sasn/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/storagess/2005,
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  William Yurcik and
                  Larry Brumbaugh and
                  Yuanyuan Zhou},
  title        = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-233-X},
  timestamp    = {Mon, 23 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/storagess/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/worm/2005,
  editor       = {Vijay Atluri and
                  Angelos D. Keromytis},
  title        = {Proceedings of the 2005 {ACM} Workshop on Rapid Malcode, {WORM} 2005,
                  Fairfax, VA, USA, November 11, 2005},
  publisher    = {{ACM} Press},
  year         = {2005},
  isbn         = {1-59593-229-1},
  timestamp    = {Fri, 23 Feb 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/worm/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2005,
  editor       = {Vijay Atluri and
                  Sabrina De Capitani di Vimercati and
                  Roger Dingledine},
  title        = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  publisher    = {{ACM}},
  year         = {2005},
  isbn         = {1-59593-228-3},
  timestamp    = {Thu, 09 Mar 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriCM04,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Pietro Mazzoleni},
  title        = {Chinese wall security for decentralized workflow management systems},
  journal      = {J. Comput. Secur.},
  volume       = {12},
  number       = {6},
  pages        = {799--840},
  year         = {2004},
  url          = {https://doi.org/10.3233/jcs-2004-12601},
  doi          = {10.3233/JCS-2004-12601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriCM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jodl/AtluriR04,
  author       = {Vijayalakshmi Atluri and
                  Indrakshi Ray},
  title        = {Editors' message for the special issue on security},
  journal      = {Int. J. Digit. Libr.},
  volume       = {4},
  number       = {3},
  pages        = {137--138},
  year         = {2004},
  url          = {https://doi.org/10.1007/s00799-004-0087-7},
  doi          = {10.1007/S00799-004-0087-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jodl/AtluriR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AtluriC04,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun},
  title        = {An Authorization Model for Geospatial Data},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {1},
  number       = {4},
  pages        = {238--254},
  year         = {2004},
  url          = {https://doi.org/10.1109/TDSC.2004.32},
  doi          = {10.1109/TDSC.2004.32},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/AtluriC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriG04,
  author       = {Vijayalakshmi Atluri and
                  Qi Guo},
  editor       = {Csilla Farkas and
                  Pierangela Samarati},
  title        = {STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal
                  Authorizations},
  booktitle    = {Research Directions in Data and Applications Security XVIII, {IFIP}
                  {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications
                  Security, July 25-28, 2004, Sitges, Catalonia, Spain},
  series       = {{IFIP}},
  volume       = {144},
  pages        = {31--47},
  publisher    = {Kluwer/Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8128-6\_3},
  doi          = {10.1007/1-4020-8128-6\_3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamAC04,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Soon Ae Chun},
  editor       = {Sharon S. Dawes and
                  Eduard H. Hovy and
                  Lois M. L. Delcambre},
  title        = {Human-Centered Systems for Business Services},
  booktitle    = {Proceedings of the 2004 Annual National Conference on Digital Government
                  Research, {DG.O} 2004, Seattle, WA, USA, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1124249},
  timestamp    = {Sat, 07 Jul 2018 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamAC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/AdamAJ04,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Vandana Pursnani Janeja},
  editor       = {Sharon S. Dawes and
                  Eduard H. Hovy and
                  Lois M. L. Delcambre},
  title        = {Agency Interoperation for Effective Data Mining in Border Control
                  and Homeland Security Applications},
  booktitle    = {Proceedings of the 2004 Annual National Conference on Digital Government
                  Research, {DG.O} 2004, Seattle, WA, USA, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1124194},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/AdamAJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/JanejaAA04,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Sharon S. Dawes and
                  Eduard H. Hovy and
                  Lois M. L. Delcambre},
  title        = {Detecting Anomalous Geospatial Trajectories through Spatial Characterization
                  and Spatio-Semantic Associations},
  booktitle    = {Proceedings of the 2004 Annual National Conference on Digital Government
                  Research, {DG.O} 2004, Seattle, WA, USA, 2004},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1124213},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/JanejaAA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/er/QinA04,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  editor       = {Paolo Atzeni and
                  Wesley W. Chu and
                  Hongjun Lu and
                  Shuigeng Zhou and
                  Tok Wang Ling},
  title        = {Ontology-Guided Change Detection to the Semantic Web Data},
  booktitle    = {Conceptual Modeling - {ER} 2004, 23rd International Conference on
                  Conceptual Modeling, Shanghai, China, November 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3288},
  pages        = {624--638},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30464-7\_47},
  doi          = {10.1007/978-3-540-30464-7\_47},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/er/QinA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcit/AtluriW04,
  author       = {Vijayalakshmi Atluri and
                  Janice Warner},
  editor       = {R. K. Ghosh and
                  Hrushikesha Mohanty},
  title        = {Automatic Enforcement of Access Control Policies Among Dynamic Coalitions},
  booktitle    = {Distributed Computing and Internet Technology, First International
                  Conference, {ICDCIT} 2004, Bhubaneswar, India, December 22-24, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3347},
  pages        = {369--378},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30555-2\_43},
  doi          = {10.1007/978-3-540-30555-2\_43},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdcit/AtluriW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ride/ChunAA04,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {Policy-Based Web Service Composition},
  booktitle    = {14th International Workshop on Research Issues in Data Engineering
                  {(RIDE-WS-ECEG} 2004), Web Services for E-Commerce and E-Government
                  Applications, 28-29 March 2004, Boston, MA, {USA}},
  pages        = {85--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/RIDE.2004.1281707},
  doi          = {10.1109/RIDE.2004.1281707},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ride/ChunAA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AdamJA04,
  author       = {Nabil R. Adam and
                  Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Neighborhood based detection of anomalies in high dimensional spatio-temporal
                  sensor datasets},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {576--583},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.968020},
  doi          = {10.1145/967900.968020},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/AdamJA04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/MukkamalaAW04,
  author       = {Ravi Mukkamala and
                  Vijayalakshmi Atluri and
                  Janice Warner},
  editor       = {Paul Dowland and
                  Steven Furnell and
                  Bhavani Thuraisingham and
                  Xiaoyang Sean Wang},
  title        = {A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic
                  Coalitions},
  booktitle    = {Security Management, Integrity, and Internal Control in Information
                  Systems - {IFIP} {TC-11} {WG} 11.1 {\&} {WG} 11.5 Joint Working
                  Conference {[18-19} November 2004, Fairfax, Virginia; {USA]}},
  series       = {{IFIP}},
  volume       = {193},
  pages        = {319--333},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/0-387-31167-X\_21},
  doi          = {10.1007/0-387-31167-X\_21},
  timestamp    = {Tue, 16 May 2023 22:42:09 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/MukkamalaAW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/widm/KimIABAY04,
  author       = {Dong{-}Ho Kim and
                  Il Im and
                  Vijayalakshmi Atluri and
                  Michael Bieber and
                  Nabil R. Adam and
                  Yelena Yesha},
  editor       = {Alberto H. F. Laender and
                  Dongwon Lee and
                  Marc Ronthaler},
  title        = {A clickstream-based collaborative filtering personalization model:
                  towards a better performance},
  booktitle    = {Sixth {ACM} {CIKM} International Workshop on Web Information and Data
                  Management {(WIDM} 2004), Washington, DC, USA, November 12-13, 2004},
  pages        = {88--95},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/1031453.1031470},
  doi          = {10.1145/1031453.1031470},
  timestamp    = {Tue, 29 Dec 2020 18:28:55 +0100},
  biburl       = {https://dblp.org/rec/conf/widm/KimIABAY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004,
  editor       = {Vijayalakshmi Atluri and
                  Michael Backes and
                  David A. Basin and
                  Michael Waidner},
  title        = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {http://dl.acm.org/citation.cfm?id=1030083},
  isbn         = {1-58113-971-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2004ccs,
  editor       = {Vijayalakshmi Atluri and
                  Birgit Pfitzmann and
                  Patrick D. McDaniel},
  title        = {Proceedings of the 11th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-961-6},
  timestamp    = {Fri, 13 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2004ccs.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2004,
  editor       = {Vijay Atluri},
  title        = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS}
                  2004, Fairfax, VA, USA, October 29, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-973-X},
  timestamp    = {Tue, 22 Apr 2008 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sws/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2004,
  editor       = {Vijay Atluri and
                  Paul F. Syverson and
                  Sabrina De Capitani di Vimercati},
  title        = {Proceedings of the 2004 {ACM} Workshop on Privacy in the Electronic
                  Society, {WPES} 2004, Washington, DC, USA, October 28, 2004},
  publisher    = {{ACM}},
  year         = {2004},
  isbn         = {1-58113-968-3},
  timestamp    = {Wed, 16 Feb 2005 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wpes/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/AtluriJY03,
  author       = {Vijay Atluri and
                  Anupam Joshi and
                  Yelena Yesha},
  title        = {Guest editorial},
  journal      = {{VLDB} J.},
  volume       = {12},
  number       = {4},
  pages        = {285},
  year         = {2003},
  url          = {https://doi.org/10.1007/s00778-003-0109-x},
  doi          = {10.1007/S00778-003-0109-X},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/AtluriJY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBFM03,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Elena Ferrari and
                  Pietro Mazzoleni},
  editor       = {Sabrina De Capitani di Vimercati and
                  Indrakshi Ray and
                  Indrajit Ray},
  title        = {Supporting Delegation in Secure Workflow Management Systems},
  booktitle    = {Data and Applications Security {XVII:} Status and Prospects, {IFIP}
                  {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and
                  Application Security, August4-6, 2003, Estes Park, Colorado, {USA}},
  series       = {{IFIP}},
  volume       = {142},
  pages        = {190--202},
  publisher    = {Kluwer/Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/1-4020-8070-0\_14},
  doi          = {10.1007/1-4020-8070-0\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBFM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/AtluriC03,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun},
  editor       = {Vladim{\'{\i}}r Mar{\'{\i}}k and
                  Werner Retschitzegger and
                  Olga Step{\'{a}}nkov{\'{a}}},
  title        = {Handling Dynamic Changes in Decentralized Workflow Execution Environments},
  booktitle    = {Database and Expert Systems Applications, 14th International Conference,
                  {DEXA} 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2736},
  pages        = {813--825},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45227-0\_79},
  doi          = {10.1007/978-3-540-45227-0\_79},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/AtluriC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunA03,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri},
  editor       = {Yigal Arens and
                  Eduard H. Hovy and
                  Peggy Agouris},
  title        = {Ontology-based Workflow Change Management for Flexible eGovernment
                  Service Delivery},
  booktitle    = {Proceedings of the 2003 Annual National Conference on Digital Government
                  Research, {DG.O} 2003, Boston, MA, USA, 2003},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=1123270},
  timestamp    = {Sat, 07 Jul 2018 14:14:28 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/PaliwalAA03,
  author       = {Aabhas V. Paliwal and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri},
  editor       = {Yigal Arens and
                  Eduard H. Hovy and
                  Peggy Agouris},
  title        = {Electronic Negotiation of Government Contracts through Transducers},
  booktitle    = {Proceedings of the 2003 Annual National Conference on Digital Government
                  Research, {DG.O} 2003, Boston, MA, USA, 2003},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=1123243},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/PaliwalAA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecweb/QinA03,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  editor       = {Kurt Bauknecht and
                  A Min Tjoa and
                  Gerald Quirchmayr},
  title        = {An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories},
  booktitle    = {E-Commerce and Web Technologies, 4th International Conference, EC-Web,
                  Prague, Czech Republic, September 2-5, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2738},
  pages        = {227--236},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45229-4\_23},
  doi          = {10.1007/978-3-540-45229-4\_23},
  timestamp    = {Tue, 29 Dec 2020 18:30:42 +0100},
  biburl       = {https://dblp.org/rec/conf/ecweb/QinA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/AtluriAGA03,
  author       = {Vijayalakshmi Atluri and
                  Nabil R. Adam and
                  Ahmed Gomaa and
                  Igg Adiwijaya},
  editor       = {Gary B. Lamont and
                  Hisham Haddad and
                  George A. Papadopoulos and
                  Brajendra Panda},
  title        = {Self-Manifestation of Composite Multimedia Objects to Satisfy Security
                  Constraints},
  booktitle    = {Proceedings of the 2003 {ACM} Symposium on Applied Computing (SAC),
                  March 9-12, 2003, Melbourne, FL, {USA}},
  pages        = {927--934},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/952532.952715},
  doi          = {10.1145/952532.952715},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/AtluriAGA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/xmlsec/QinA03,
  author       = {Li Qin and
                  Vijayalakshmi Atluri},
  editor       = {Sushil Jajodia and
                  Michiharu Kudo},
  title        = {Concept-level access control for the Semantic Web},
  booktitle    = {Proceedings of the 2003 {ACM} Workshop on {XML} Security, Fairfax,
                  VA, USA, October 31, 2003},
  pages        = {94--103},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {https://doi.org/10.1145/968559.968575},
  doi          = {10.1145/968559.968575},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/xmlsec/QinA03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003,
  editor       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Trent Jaeger},
  title        = {Proceedings of the 10th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  publisher    = {{ACM}},
  year         = {2003},
  url          = {http://dl.acm.org/citation.cfm?id=948109},
  isbn         = {1-58113-738-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/informaticaSI/AtluriM02,
  author       = {Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  title        = {Employing an extended transaction model in multilevel secure transaction
                  processing},
  journal      = {Informatica (Slovenia)},
  volume       = {26},
  number       = {2},
  year         = {2002},
  timestamp    = {Mon, 15 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/informaticaSI/AtluriM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/AtluriG02,
  author       = {Vijayalakshmi Atluri and
                  Avigdor Gal},
  title        = {An authorization model for temporal and derived data: securing information
                  portals},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {62--94},
  year         = {2002},
  url          = {https://doi.org/10.1145/504909.504912},
  doi          = {10.1145/504909.504912},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/AtluriG02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AdamABF02,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Elena Ferrari},
  title        = {A Content-Based Authorization Model for Digital Libraries},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {14},
  number       = {2},
  pages        = {296--315},
  year         = {2002},
  url          = {https://doi.org/10.1109/69.991718},
  doi          = {10.1109/69.991718},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AdamABF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vldb/FerrariAABC02,
  author       = {Elena Ferrari and
                  Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Ugo Capuozzo},
  title        = {An authorization system for digital libraries},
  journal      = {{VLDB} J.},
  volume       = {11},
  number       = {1},
  pages        = {58--67},
  year         = {2002},
  url          = {https://doi.org/10.1007/s007780200063},
  doi          = {10.1007/S007780200063},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/vldb/FerrariAABC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriM02,
  author       = {Vijayalakshmi Atluri and
                  Pietro Mazzoleni},
  editor       = {Ehud Gudes and
                  Sujeet Shenoi},
  title        = {Uniform Indexing for Geospatial Data and Authorizations},
  booktitle    = {Research Directions in Data and Applications Security, {IFIP} {WG}
                  11.3 Sixteenth International Conference on Data and Applications Security,
                  July 28-31, 2002, Kings College, Cambridge, {UK}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {256},
  pages        = {207--218},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Wed, 27 Aug 2003 07:52:21 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexa/ChunAA02,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  editor       = {Abdelkader Hameurlain and
                  Rosine Cicchetti and
                  Roland Traunm{\"{u}}ller},
  title        = {Domain Knowledge-Based Automatic Workflow Generation},
  booktitle    = {Database and Expert Systems Applications, 13th International Conference,
                  {DEXA} 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2453},
  pages        = {81--92},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46146-9\_9},
  doi          = {10.1007/3-540-46146-9\_9},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dexa/ChunAA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/ChunAA02,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {Dynamic Composition of Workflows for Customized eGovernment Service
                  Delivery},
  booktitle    = {Proceedings of the 2002 Annual National Conference on Digital Government
                  Research, {DG.O} 2002, Los Angeles, CA, USA, 2002},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2002},
  url          = {http://dl.acm.org/citation.cfm?id=1123127},
  timestamp    = {Sat, 07 Jul 2018 14:13:59 +0200},
  biburl       = {https://dblp.org/rec/conf/dgo/ChunAA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dgo/JanejaAA02,
  author       = {Vandana Pursnani Janeja and
                  Vijayalakshmi Atluri and
                  Nabil R. Adam},
  title        = {{OUTLAW:} Using Geo-Spatial Associations for Outlier Detection and
                  Visual Analysisof Cargo Routes},
  booktitle    = {Proceedings of the 2002 Annual National Conference on Digital Government
                  Research, {DG.O} 2002, Los Angeles, CA, USA, 2002},
  series       = {{ACM} International Conference Proceeding Series},
  publisher    = {Digital Government Research Center},
  year         = {2002},
  url          = {http://dl.acm.org/citation.cfm?id=1123160},
  timestamp    = {Fri, 20 Nov 2015 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dgo/JanejaAA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/GalAX02,
  author       = {Avigdor Gal and
                  Vijayalakshmi Atluri and
                  Gang Xu},
  editor       = {Rakesh Agrawal and
                  Klaus R. Dittrich},
  title        = {An Authorization System for Temporal Data},
  booktitle    = {Proceedings of the 18th International Conference on Data Engineering,
                  San Jose, CA, USA, February 26 - March 1, 2002},
  pages        = {339--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2002},
  url          = {https://doi.org/10.1109/ICDE.2002.994747},
  doi          = {10.1109/ICDE.2002.994747},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/GalAX02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ads/AtluriCHA02,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Richard D. Holowczak and
                  Nabil R. Adam},
  editor       = {William J. McIver Jr. and
                  Ahmed K. Elmagarmid},
  title        = {Automating the Delivery of Governmental Business Services Through
                  Workflow Technology},
  booktitle    = {Advances in Digital Government - Technology, Human Factors, and Policy},
  series       = {Advances in Database Systems},
  volume       = {26},
  pages        = {69--84},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/0-306-47374-7\_4},
  doi          = {10.1007/0-306-47374-7\_4},
  timestamp    = {Tue, 16 May 2017 14:24:24 +0200},
  biburl       = {https://dblp.org/rec/series/ads/AtluriCHA02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2002,
  editor       = {Vijayalakshmi Atluri},
  title        = {Proceedings of the 9th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  publisher    = {{ACM}},
  year         = {2002},
  url          = {http://dl.acm.org/citation.cfm?id=586110},
  isbn         = {1-58113-612-9},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Atluri01,
  author       = {Vijay Atluri},
  title        = {Security for Workflow Systems},
  journal      = {Inf. Secur. Tech. Rep.},
  volume       = {6},
  number       = {2},
  pages        = {59--68},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1363-4127(01)00207-2},
  doi          = {10.1016/S1363-4127(01)00207-2},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/Atluri01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/JajodiaAKMM01,
  author       = {Sushil Jajodia and
                  Vijayalakshmi Atluri and
                  Thomas F. Keefe and
                  Catherine D. McCollum and
                  Ravi Mukkamala},
  title        = {Multilevel Security Transaction Processing},
  journal      = {J. Comput. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {165--195},
  year         = {2001},
  url          = {https://doi.org/10.3233/jcs-2001-9301},
  doi          = {10.3233/JCS-2001-9301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/JajodiaAKMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AdamAABH01,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Igg Adiwijaya and
                  Sujata Banerjee and
                  Richard D. Holowczak},
  title        = {A Dynamic Manifestation Approach for Providing Universal Access to
                  Digital Library Objects},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {13},
  number       = {4},
  pages        = {705--716},
  year         = {2001},
  url          = {https://doi.org/10.1109/69.940742},
  doi          = {10.1109/69.940742},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AdamAABH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtluriCM01,
  author       = {Vijayalakshmi Atluri and
                  Soon Ae Chun and
                  Pietro Mazzoleni},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {A Chinese wall security model for decentralized workflow systems},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {48--57},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.501991},
  doi          = {10.1145/501983.501991},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AtluriCM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriM01,
  author       = {Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  editor       = {Martin S. Olivier and
                  David L. Spooner},
  title        = {An Extended Transaction Model Approach for Multilevel Secure Transaction
                  Processing},
  booktitle    = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth
                  Annual Working Conference on Database and Application Security, July
                  15-18, 2001, Niagara on the Lake, Ontario, Canada},
  series       = {{IFIP} Conference Proceedings},
  volume       = {215},
  pages        = {255--268},
  publisher    = {Kluwer},
  year         = {2001},
  timestamp    = {Tue, 07 May 2002 13:50:19 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dexaw/GhirardiniCAKA01,
  author       = {Chiara Ghirardini and
                  Soon Ae Chun and
                  Vijayalakshmi Atluri and
                  Ibrahim Kamel and
                  Nabil R. Adam},
  editor       = {A Min Tjoa and
                  Roland R. Wagner},
  title        = {A Study on the Indexing of Satellite Images at {NASA} Regional Application
                  Center},
  booktitle    = {12th International Workshop on Database and Expert Systems Applications
                  {(DEXA} 2001), 3-7 September 2001, Munich, Germany},
  pages        = {859--864},
  publisher    = {{IEEE} Computer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/DEXA.2001.953163},
  doi          = {10.1109/DEXA.2001.953163},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dexaw/GhirardiniCAKA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gis/HolowczakCAA01,
  author       = {Richard D. Holowczak and
                  Soon Ae Chun and
                  Francisco J. Artigas and
                  Vijayalakshmi Atluri},
  editor       = {Walid G. Aref},
  title        = {Customized Geospatial Workflows for E-Government Services},
  booktitle    = {{ACM-GIS} 2001, Proceedings of the Ninth {ACM} International Symposium
                  on Advances in Geographic Information Systems, Atlanta, GA, USA, November
                  9-10, 2001},
  pages        = {64--69},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/512161.512176},
  doi          = {10.1145/512161.512176},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/gis/HolowczakCAA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isas-sci/CranfordMA01,
  author       = {Jonathan Cranford and
                  Ravi Mukkamala and
                  Vijayalakshmi Atluri},
  editor       = {Nagib Callaos and
                  Ivan Nunes da Silva and
                  Jorge Molero},
  title        = {Modeling and Evaluation of Distributed Workflow Algorithms},
  booktitle    = {World Multiconference on Systemics, Cybernetics and Informatics, ISAS-SCIs
                  2001, July 22-25, 2001, Orlando, Florida, USA, Proceedings, Volume
                  {I:} Information Systems Development},
  pages        = {183--188},
  publisher    = {{IIIS}},
  year         = {2001},
  timestamp    = {Thu, 03 Jan 2002 12:04:14 +0100},
  biburl       = {https://dblp.org/rec/conf/isas-sci/CranfordMA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/AdamAA00,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Igg Adiwijaya},
  title        = {{SI} in Digital Libraries},
  journal      = {Commun. {ACM}},
  volume       = {43},
  number       = {6},
  pages        = {64--72},
  year         = {2000},
  url          = {https://doi.org/10.1145/336460.336476},
  doi          = {10.1145/336460.336476},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/AdamAA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dpd/AtluriS00,
  author       = {Vijayalakshmi Atluri and
                  Pierangela Samarati},
  title        = {Security of Data and Transaction Processing - Guest Editor's Introduction},
  journal      = {Distributed Parallel Databases},
  volume       = {8},
  number       = {1},
  pages        = {5--6},
  year         = {2000},
  url          = {https://doi.org/10.1023/A:1008727116035},
  doi          = {10.1023/A:1008727116035},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dpd/AtluriS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriHB00,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang and
                  Elisa Bertino},
  title        = {A Semantic-Based Execution Model for Multilevel Secure Workflows},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {1},
  pages        = {3--41},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-8102},
  doi          = {10.3233/JCS-2000-8102},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriHB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriH00,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  title        = {A Petri Net Based Safety Analysis of Workflow Authorization Models},
  journal      = {J. Comput. Secur.},
  volume       = {8},
  number       = {2/3},
  pages        = {209--240},
  year         = {2000},
  url          = {https://doi.org/10.3233/jcs-2000-82-307},
  doi          = {10.3233/JCS-2000-82-307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriH00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GalA00,
  author       = {Avigdor Gal and
                  Vijayalakshmi Atluri},
  editor       = {Dimitris Gritzalis and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {An authorization model for temporal data},
  booktitle    = {{CCS} 2000, Proceedings of the 7th {ACM} Conference on Computer and
                  Communications Security, Athens, Greece, November 1-4, 2000},
  pages        = {144--153},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/352600.352621},
  doi          = {10.1145/352600.352621},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/GalA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/ChunA00,
  author       = {Soon Ae Chun and
                  Vijayalakshmi Atluri},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Protecting Privacy from Continuous High-resolution Satellite Surveillance},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {233--244},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_21},
  doi          = {10.1007/0-306-47008-X\_21},
  timestamp    = {Wed, 29 Jun 2022 15:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/ChunA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RietSORABW00,
  author       = {Reind P. van de Riet and
                  Raban Serban and
                  Sylvia L. Osborn and
                  Arnon Rosenthal and
                  Vijayalakshmi Atluri and
                  Joachim Biskup and
                  Gio Wiederhold},
  editor       = {Bhavani Thuraisingham and
                  Reind P. van de Riet and
                  Klaus R. Dittrich and
                  Zahir Tari},
  title        = {Panel},
  booktitle    = {Data and Application Security, Development and Directions, {IFIP}
                  {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database
                  Security, Schoorl, The Netherlands, August 21-23, 2000},
  series       = {{IFIP} Conference Proceedings},
  volume       = {201},
  pages        = {367--371},
  publisher    = {Kluwer},
  year         = {2000},
  url          = {https://doi.org/10.1007/0-306-47008-X\_34},
  doi          = {10.1007/0-306-47008-X\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RietSORABW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/AtluriM00,
  author       = {Vijayalakshmi Atluri and
                  Ravi Mukkamala},
  title        = {Modeling and Evaluation of Redesigning Methodologies for Distributed
                  Workflows},
  booktitle    = {{MASCOTS} 2000, Proceedings of the 8th International Symposium on
                  Modeling, Analysis and Simulation of Computer and Telecommunication
                  Systems, 29 August - 1 September 2000, San Francisco, California,
                  {USA}},
  pages        = {248--255},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/MASCOT.2000.876546},
  doi          = {10.1109/MASCOT.2000.876546},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/AtluriM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/1999,
  editor       = {Vijayalakshmi Atluri and
                  John Hale},
  title        = {Research Advances in Database and Information Systems Security, {IFIP}
                  {WG} 11.3 Thirteenth International Conference on Database Security,
                  July 26-28, 1999, Seattle, Washington, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {171},
  publisher    = {Kluwer},
  year         = {2000},
  isbn         = {0-7923-7848-2},
  timestamp    = {Thu, 03 Jan 2002 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/rbac/2000,
  editor       = {Klaus Rebensburg and
                  Charles E. Youman and
                  Vijay Atluri},
  title        = {Fifth {ACM} Workshop on Role-Based Access Control, {RBAC} 2000, Berlin,
                  Germany, July 26-27, 2000},
  publisher    = {{ACM}},
  year         = {2000},
  url          = {https://doi.org/10.1145/344287},
  doi          = {10.1145/344287},
  isbn         = {1-58113-259-X},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/BertinoFA99,
  author       = {Elisa Bertino and
                  Elena Ferrari and
                  Vijayalakshmi Atluri},
  title        = {The Specification and Enforcement of Authorization Constraints in
                  Workflow Management Systems},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {2},
  number       = {1},
  pages        = {65--104},
  year         = {1999},
  url          = {https://doi.org/10.1145/300830.300837},
  doi          = {10.1145/300830.300837},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/BertinoFA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/HuangA99,
  author       = {Wei{-}kuang Huang and
                  Vijayalakshmi Atluri},
  editor       = {Charles E. Youman and
                  Sylvia L. Osborn},
  title        = {SecureFlow: {A} Secure Web-Enabled Workflow Management System},
  booktitle    = {Proceedings of the Fourth {ACM} Workshop on Role-Based Access Control,
                  {RBAC} 1999, Fairfax, VA, USA, October 28-29, 1999},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {1999},
  url          = {https://doi.org/10.1145/319171.319179},
  doi          = {10.1145/319171.319179},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/HuangA99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jiis/AdamAH98,
  author       = {Nabil R. Adam and
                  Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  title        = {Modeling and Analysis of Workflows Using Petri Nets},
  journal      = {J. Intell. Inf. Syst.},
  volume       = {10},
  number       = {2},
  pages        = {131--158},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008656726700},
  doi          = {10.1023/A:1008656726700},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jiis/AdamAH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HuangA98,
  author       = {Wei{-}kuang Huang and
                  Vijayalakshmi Atluri},
  editor       = {Sushil Jajodia},
  title        = {Analysing the Safety of Workflow Authorization Models},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {43--57},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Mon, 21 Oct 2002 13:30:47 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HuangA98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriS98,
  author       = {Vijayalakshmi Atluri and
                  David L. Spooner},
  editor       = {Sushil Jajodia},
  title        = {Workshop Summary},
  booktitle    = {Database Security {XII:} Status and Prospects, {IFIP} {TC11} {WG}
                  11.3 Twelfth International Working Conference on Database Security,
                  July 15-17, 1998, Chalkidiki, Greece},
  series       = {{IFIP} Conference Proceedings},
  volume       = {142},
  pages        = {287--293},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Mon, 21 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/AdamAAY98,
  author       = {Nabil R. Adam and
                  Igg Adiwijaya and
                  Vijay Atluri and
                  Yelena Yesha},
  title        = {{EDI} Through {A} Distributed Information Systems Approach},
  booktitle    = {Thirty-First Annual Hawaii International Conference on System Sciences,
                  Kohala Coast, Hawaii, USA, January 6-9, 1998},
  pages        = {354--365},
  publisher    = {{IEEE} Computer Society},
  year         = {1998},
  url          = {https://doi.org/10.1109/HICSS.1998.649230},
  doi          = {10.1109/HICSS.1998.649230},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hicss/AdamAAY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tc11-5/Atluri98,
  author       = {Vijayalakshmi Atluri},
  editor       = {Sushil Jajodia and
                  William List and
                  Graeme W. McGregor and
                  Leon Strous},
  title        = {Modification of Integrity Constraints Through Knowledge Discovery},
  booktitle    = {Integrity and Internal Control in Information Systems, {IFIP} {TC11}
                  Working Group 11.5, Second Working Conference on Integrity and Internal
                  Control in Information Systems: Bridging Business Requirements and
                  Research Results, Warrenton, Virginia, USA, November 19-20, 1998},
  series       = {{IFIP} Conference Proceedings},
  volume       = {136},
  pages        = {191--209},
  publisher    = {Kluwer},
  year         = {1998},
  timestamp    = {Thu, 22 Aug 2002 09:35:37 +0200},
  biburl       = {https://dblp.org/rec/conf/tc11-5/Atluri98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/AtluriBJ97,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {A theoretical formulation for degrees of isolation in databases},
  journal      = {Inf. Softw. Technol.},
  volume       = {39},
  number       = {1},
  pages        = {47--53},
  year         = {1997},
  url          = {https://doi.org/10.1016/0950-5849(96)01109-3},
  doi          = {10.1016/0950-5849(96)01109-3},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/infsof/AtluriBJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriH97,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  title        = {Enforcing Mandatory and Discretionary Security in Workflow Management
                  Systems},
  journal      = {J. Comput. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {303--340},
  year         = {1997},
  url          = {https://doi.org/10.3233/JCS-1997-5403},
  doi          = {10.3233/JCS-1997-5403},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriH97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AtluriJB97,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {Transaction Processing in Multilevel Secure Databases with Kernelized
                  Architectures: Challenges and Solutions},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {9},
  number       = {5},
  pages        = {697--708},
  year         = {1997},
  url          = {https://doi.org/10.1109/69.634749},
  doi          = {10.1109/69.634749},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AtluriJB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriHB97,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang and
                  Elisa Bertino},
  editor       = {Tsau Young Lin and
                  Shelly Qian},
  title        = {An Execution Model for Multilevel Seccure Workflows},
  booktitle    = {Database Securty {XI:} Status and Prospects, {IFIP} {TC11} {WG11.3}
                  Eleventh International Conference on Database Security, 10-13 August
                  1997, Lake Tahoe, California, {USA}},
  series       = {{IFIP} Conference Proceedings},
  volume       = {113},
  pages        = {151--165},
  publisher    = {Chapman {\&} Hall},
  year         = {1997},
  timestamp    = {Wed, 24 Sep 2003 08:16:49 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriHB97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rbac/BertinoFA97,
  author       = {Elisa Bertino and
                  Elena Ferrari and
                  Vijayalakshmi Atluri},
  editor       = {Charles E. Youman and
                  Edward J. Coyne and
                  Trent Jaeger},
  title        = {A flexible model supporting the specification and enforcement of role-based
                  authorization in workflow management systems},
  booktitle    = {Proceedings of the Second Workshop on Role-Based Access Control, {RBAC}
                  1997, Fairfax, VA, USA, November 6-7, 1997},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/266741.266746},
  doi          = {10.1145/266741.266746},
  timestamp    = {Tue, 06 Nov 2018 16:59:23 +0100},
  biburl       = {https://dblp.org/rec/conf/rbac/BertinoFA97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AtluriJB96,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Elisa Bertino},
  title        = {Alternative Correctness Criteria for Concurrent Execution of Transactions
                  in Multilevel Secure Databases},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {8},
  number       = {5},
  pages        = {839--854},
  year         = {1996},
  url          = {https://doi.org/10.1109/69.542034},
  doi          = {10.1109/69.542034},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AtluriJB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriJKMM96,
  author       = {Vijayalakshmi Atluri and
                  Sushil Jajodia and
                  Thomas F. Keefe and
                  Catherine D. McCollum and
                  Ravi Mukkamala},
  editor       = {Pierangela Samarati and
                  Ravi S. Sandhu},
  title        = {Multilevel Secure Transaction Processing: Status and Prospects},
  booktitle    = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} /
                  {WG11.3} Tenth International Conference on Database Security, 22-24
                  July 1996, Como, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {79},
  pages        = {79--98},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 24 Oct 2002 16:14:24 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriJKMM96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriH96,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  editor       = {Pierangela Samarati and
                  Ravi S. Sandhu},
  title        = {An Extended Petri Net Model for Supporting Workflows in a Multilevel
                  Secure Environment},
  booktitle    = {Database Security Volume X, Status and Prospects, {IFIP} {TC11} /
                  {WG11.3} Tenth International Conference on Database Security, 22-24
                  July 1996, Como, Italy},
  series       = {{IFIP} Conference Proceedings},
  volume       = {79},
  pages        = {240--258},
  publisher    = {Chapman {\&} Hall},
  year         = {1996},
  timestamp    = {Thu, 24 Oct 2002 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtluriH96,
  author       = {Vijayalakshmi Atluri and
                  Wei{-}kuang Huang},
  editor       = {Elisa Bertino and
                  Helmut Kurth and
                  Giancarlo Martella and
                  Emilio Montolivo},
  title        = {An Authorization Model for Workflows},
  booktitle    = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
                  in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1146},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-61770-1\_27},
  doi          = {10.1007/3-540-61770-1\_27},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtluriH96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/AmmannAJ95,
  author       = {Paul Ammann and
                  Vijayalakshmi Atluri and
                  Sushil Jajodia},
  title        = {The Partitioned Synchronization Rule for Planar Extendible Partial
                  Orders},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {7},
  number       = {5},
  pages        = {797--808},
  year         = {1995},
  url          = {https://doi.org/10.1109/69.469819},
  doi          = {10.1109/69.469819},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/AmmannAJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ95,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {David L. Spooner and
                  Steven A. Demurjian and
                  John E. Dobson},
  title        = {Providing Different Degrees of Recency Options to Transactions in
                  Multilevel Secure Databases},
  booktitle    = {Database Security {IX:} Status and Prospects, Proceedings of the Ninth
                  Annual {IFIP} {WG11} Working Conference on Database Security, Rensselaerville,
                  New York, USA, 13-16 August 1995},
  series       = {{IFIP} Conference Proceedings},
  volume       = {51},
  pages        = {231--247},
  publisher    = {Chapman {\&} Hall},
  year         = {1995},
  timestamp    = {Thu, 24 Oct 2002 16:18:58 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ94,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Joachim Biskup and
                  Matthew Morgenstern and
                  Carl E. Landwehr},
  title        = {Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols},
  booktitle    = {Database Security, {VIII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Bad Salzdetfurth,
                  Germany, 23-26 August, 1994},
  series       = {{IFIP} Transactions},
  volume       = {{A-60}},
  pages        = {259--274},
  publisher    = {North-Holland},
  year         = {1994},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving Stricter Correctness Requirements in Multilevel Secure Database
                  Management Systems},
  journal      = {J. Comput. Secur.},
  volume       = {2},
  number       = {4},
  pages        = {311--352},
  year         = {1993},
  url          = {https://doi.org/10.3233/JCS-1993-2404},
  doi          = {10.3233/JCS-1993-2404},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  editor       = {Thomas F. Keefe and
                  Carl E. Landwehr},
  title        = {Achieving Stricter Correctness Requirements in Multilevel Secure Databases:
                  The Dynamic Case},
  booktitle    = {Database Security, {VII:} Status and Prospects, Proceedings of the
                  {IFIP} {WG11.3} Working Conference on Database Security, Lake Guntersville,
                  Alabama, USA, 12-15 September, 1993},
  series       = {{IFIP} Transactions},
  volume       = {{A-47}},
  pages        = {135--158},
  publisher    = {North-Holland},
  year         = {1993},
  timestamp    = {Thu, 03 Jan 2002 11:56:17 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AtluriBJ93,
  author       = {Vijayalakshmi Atluri and
                  Elisa Bertino and
                  Sushil Jajodia},
  title        = {Achieving stricter correctness requirements in multilevel secure databases},
  booktitle    = {1993 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 24-26, 1993},
  pages        = {135--147},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/RISP.1993.287636},
  doi          = {10.1109/RISP.1993.287636},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/AtluriBJ93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/JajodiaA92,
  author       = {Sushil Jajodia and
                  Vijayalakshmi Atluri},
  title        = {Alternative correctness criteria for concurrent execution of transactions
                  in multilevel secure databases},
  booktitle    = {1992 {IEEE} Computer Society Symposium on Research in Security and
                  Privacy, Oakland, CA, USA, May 4-6, 1992},
  pages        = {216--224},
  publisher    = {{IEEE} Computer Society},
  year         = {1992},
  url          = {https://doi.org/10.1109/RISP.1992.213259},
  doi          = {10.1109/RISP.1992.213259},
  timestamp    = {Thu, 21 Sep 2023 15:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/JajodiaA92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics