default search action
BibTeX records: James B. D. Joshi
@article{DBLP:journals/tdsc/XuLLJML24, author = {Runhua Xu and Bo Li and Chao Li and James B. D. Joshi and Shuai Ma and Jianxin Li}, title = {TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {5}, pages = {4309--4323}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2024.3350206}, doi = {10.1109/TDSC.2024.3350206}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuLLJML24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuLJ23, author = {Runhua Xu and Chao Li and James Joshi}, title = {Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2302--2313}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3179698}, doi = {10.1109/TDSC.2022.3179698}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuLJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/HarrisonPCWMBXH23, author = {Galen Harrison and Przemyslaw J. Porebski and Jiangzhuo Chen and Mandy L. Wilson and Henning S. Mortveit and Parantapa Bhattacharya and Dawen Xie and Stefan Hoops and Anil Vullikanti and Li Xiong and James Joshi and Madhav V. Marathe}, title = {Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {23--33}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00013}, doi = {10.1109/TPS-ISA58951.2023.00013}, timestamp = {Tue, 05 Mar 2024 12:00:59 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/HarrisonPCWMBXH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/KarimiAJA22, author = {Leila Karimi and Maryam Aldairi and James Joshi and Mai Abdelhakim}, title = {An Automatic Attribute-Based Access Control Policy Extraction From Access Logs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2304--2317}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3054331}, doi = {10.1109/TDSC.2021.3054331}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/KarimiAJA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuJ022, author = {Runhua Xu and James Joshi and Chao Li}, title = {{NN-EMD:} Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {4}, pages = {2807--2820}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3074439}, doi = {10.1109/TDSC.2021.3074439}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/XuJ022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/ShyuNIJ22, author = {Mei{-}Ling Shyu and Surya Nepal and Val{\'{e}}rie Issarny and James Joshi}, title = {Guest Editorial: Special Issue on Services Computing for {COVID-19} and Future Pandemics}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {15}, number = {3}, pages = {1175--1177}, year = {2022}, url = {https://doi.org/10.1109/TSC.2022.3179065}, doi = {10.1109/TSC.2022.3179065}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/ShyuNIJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuJK21, author = {Runhua Xu and James Joshi and Prashant Krishnamurthy}, title = {An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {2}, pages = {706--721}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2946073}, doi = {10.1109/TDSC.2019.2946073}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuJK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/XuB00JL21, author = {Runhua Xu and Nathalie Baracaldo and Yi Zhou and Ali Anwar and James Joshi and Heiko Ludwig}, editor = {Nicholas Carlini and Ambra Demontis and Yizheng Chen}, title = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data}, booktitle = {AISec@CCS 2021: Proceedings of the 14th {ACM} Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021}, pages = {181--192}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3474369.3486872}, doi = {10.1145/3474369.3486872}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/XuB00JL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcse/SridharYJP21, author = {Nigamanth Sridhar and Li Yang and James Joshi and Victor Piotrowski}, editor = {Mark Sherriff and Laurence D. Merkle and Pamela A. Cutter and Alvaro E. Monge and Judithe Sheard}, title = {Cybersecurity Education in the Age of Artificial Intelligence}, booktitle = {{SIGCSE} '21: The 52nd {ACM} Technical Symposium on Computer Science Education, Virtual Event, USA, March 13-20, 2021}, pages = {1365}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3408877.3439525}, doi = {10.1145/3408877.3439525}, timestamp = {Wed, 07 Apr 2021 16:26:26 +0200}, biburl = {https://dblp.org/rec/conf/sigcse/SridharYJP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2102-01249, author = {Runhua Xu and Chao Li and James Joshi}, title = {{T3AB:} Transparent and Trustworthy Third-party Authority using Blockchain}, journal = {CoRR}, volume = {abs/2102.01249}, year = {2021}, url = {https://arxiv.org/abs/2102.01249}, eprinttype = {arXiv}, eprint = {2102.01249}, timestamp = {Wed, 20 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2102-01249.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2103-03918, author = {Runhua Xu and Nathalie Baracaldo and Yi Zhou and Ali Anwar and James Joshi and Heiko Ludwig}, title = {FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data}, journal = {CoRR}, volume = {abs/2103.03918}, year = {2021}, url = {https://arxiv.org/abs/2103.03918}, eprinttype = {arXiv}, eprint = {2103.03918}, timestamp = {Tue, 27 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2103-03918.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-08587, author = {Leila Karimi and Mai Abdelhakim and James Joshi}, title = {Adaptive {ABAC} Policy Learning: {A} Reinforcement Learning Approach}, journal = {CoRR}, volume = {abs/2105.08587}, year = {2021}, url = {https://arxiv.org/abs/2105.08587}, eprinttype = {arXiv}, eprint = {2105.08587}, timestamp = {Mon, 31 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-08587.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2108-04417, author = {Runhua Xu and Nathalie Baracaldo and James Joshi}, title = {Privacy-Preserving Machine Learning: Methods, Challenges and Directions}, journal = {CoRR}, volume = {abs/2108.04417}, year = {2021}, url = {https://arxiv.org/abs/2108.04417}, eprinttype = {arXiv}, eprint = {2108.04417}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-04417.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AkhuseyinogluJ20, author = {Nuray Baltaci Akhuseyinoglu and James Joshi}, title = {A constraint and risk-aware approach to attribute-based access control for cyber-physical systems}, journal = {Comput. Secur.}, volume = {96}, pages = {101802}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101802}, doi = {10.1016/J.COSE.2020.101802}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkhuseyinogluJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/XuJ20, author = {Runhua Xu and James Joshi}, title = {Trustworthy and Transparent Third-party Authority}, journal = {{ACM} Trans. Internet Techn.}, volume = {20}, number = {4}, pages = {31:1--31:23}, year = {2020}, url = {https://doi.org/10.1145/3386262}, doi = {10.1145/3386262}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/XuJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/Joshi20, author = {James Joshi}, title = {Editorial}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {13}, number = {1}, pages = {1--2}, year = {2020}, url = {https://doi.org/10.1109/TSC.2020.2967234}, doi = {10.1109/TSC.2020.2967234}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/Joshi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/XuJ20, author = {Runhua Xu and James Joshi}, title = {Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {226--235}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00038}, doi = {10.1109/TPS-ISA50397.2020.00038}, timestamp = {Tue, 26 Jan 2021 14:00:08 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/XuJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-07270, author = {Leila Karimi and Maryam Aldairi and James Joshi and Mai Abdelhakim}, title = {An Automatic Attribute Based Access Control Policy Extraction from Access Logs}, journal = {CoRR}, volume = {abs/2003.07270}, year = {2020}, url = {https://arxiv.org/abs/2003.07270}, eprinttype = {arXiv}, eprint = {2003.07270}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-07270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06191, author = {Runhua Xu and James Joshi}, title = {Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions}, journal = {CoRR}, volume = {abs/2011.06191}, year = {2020}, url = {https://arxiv.org/abs/2011.06191}, eprinttype = {arXiv}, eprint = {2011.06191}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06191.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-10547, author = {Runhua Xu and James Joshi and Chao Li}, title = {{NN-EMD:} Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets}, journal = {CoRR}, volume = {abs/2012.10547}, year = {2020}, url = {https://arxiv.org/abs/2012.10547}, eprinttype = {arXiv}, eprint = {2012.10547}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-10547.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BaracaldoPJ19, author = {Nathalie Baracaldo and Balaji Palanisamy and James Joshi}, title = {{G-SIR:} An Insider Attack Resilient Geo-Social Access Control Framework}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {84--98}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2654438}, doi = {10.1109/TDSC.2017.2654438}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BaracaldoPJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/DustdarNJ19, author = {Schahram Dustdar and Surya Nepal and James Joshi}, title = {Introduction to the Special Section on Advances in Internet-based Collaborative Technologies}, journal = {{ACM} Trans. Internet Techn.}, volume = {19}, number = {3}, year = {2019}, url = {https://doi.org/10.1145/3361071}, doi = {10.1145/3361071}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/DustdarNJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/Joshi19, author = {James Joshi}, title = {Editorial}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {12}, number = {1}, pages = {1--3}, year = {2019}, url = {https://doi.org/10.1109/TSC.2018.2887058}, doi = {10.1109/TSC.2018.2887058}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/Joshi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/XuJL19, author = {Runhua Xu and James B. D. Joshi and Chao Li}, title = {CryptoNN: Training Neural Networks over Encrypted Data}, booktitle = {39th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2019, Dallas, TX, USA, July 7-10, 2019}, pages = {1199--1209}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICDCS.2019.00121}, doi = {10.1109/ICDCS.2019.00121}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/XuJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AldairiKJ19, author = {Maryam Aldairi and Leila Karimi and James Joshi}, title = {A Trust Aware Unsupervised Learning Approach for Insider Threat Detection}, booktitle = {20th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August 1, 2019}, pages = {89--98}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IRI.2019.00027}, doi = {10.1109/IRI.2019.00027}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iri/AldairiKJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icbc/2019, editor = {James Joshi and Surya Nepal and Qi Zhang and Liang{-}Jie Zhang}, title = {Blockchain - {ICBC} 2019 - Second International Conference, Held as Part of the Services Conference Federation, {SCF} 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11521}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23404-1}, doi = {10.1007/978-3-030-23404-1}, isbn = {978-3-030-23403-4}, timestamp = {Wed, 19 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icbc/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1904-07303, author = {Runhua Xu and James B. D. Joshi and Chao Li}, title = {CryptoNN: Training Neural Networks over Encrypted Data}, journal = {CoRR}, volume = {abs/1904.07303}, year = {2019}, url = {http://arxiv.org/abs/1904.07303}, eprinttype = {arXiv}, eprint = {1904.07303}, timestamp = {Thu, 13 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1904-07303.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinLPJ18, author = {Lei Jin and Chao Li and Balaji Palanisamy and James Joshi}, title = {\emph{k-Trustee}: Location injection attack-resilient anonymization for location privacy}, journal = {Comput. Secur.}, volume = {78}, pages = {212--230}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.002}, doi = {10.1016/J.COSE.2018.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinLPJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Joshi18, author = {James Joshi}, title = {Front Cover}, journal = {Computer}, volume = {51}, number = {11}, pages = {1}, year = {2018}, url = {https://doi.org/10.1109/MC.2018.2880358}, doi = {10.1109/MC.2018.2880358}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Joshi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/KarimiJ18, author = {Leila Karimi and James Joshi}, editor = {Naoki Abe and Huan Liu and Calton Pu and Xiaohua Hu and Nesreen K. Ahmed and Mu Qiao and Yang Song and Donald Kossmann and Bing Liu and Kisung Lee and Jiliang Tang and Jingrui He and Jeffrey S. Saltz}, title = {An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies}, booktitle = {{IEEE} International Conference on Big Data {(IEEE} BigData 2018), Seattle, WA, USA, December 10-13, 2018}, pages = {1427--1436}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/BigData.2018.8622037}, doi = {10.1109/BIGDATA.2018.8622037}, timestamp = {Fri, 19 Nov 2021 16:08:20 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/KarimiJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/CarrNJ18, author = {LeRoy Carr III and Anthony Newtson and James Joshi}, title = {Towards Modernizing the Future of American Voting}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {130--135}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00028}, doi = {10.1109/CIC.2018.00028}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/CarrNJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuPJ18, author = {Runhua Xu and Balaji Palanisamy and James Joshi}, title = {QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {1097--1106}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00153}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00153}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/XuPJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/0002J18, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Administration Model for {RBAC}}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_1507}, doi = {10.1007/978-1-4614-8265-9\_1507}, timestamp = {Thu, 14 Feb 2019 09:43:36 +0100}, biburl = {https://dblp.org/rec/reference/db/0002J18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/0002J18a, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {{ANSI/INCITS} {RBAC} Standard}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_1508}, doi = {10.1007/978-1-4614-8265-9\_1508}, timestamp = {Thu, 14 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/db/0002J18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/0002J18b, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {{GEO-RBAC} Model}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_1509}, doi = {10.1007/978-1-4614-8265-9\_1509}, timestamp = {Thu, 14 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/db/0002J18b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/0002J18c, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Role-Based Access Control}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_320}, doi = {10.1007/978-1-4614-8265-9\_320}, timestamp = {Thu, 14 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/db/0002J18c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/0002J18d, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Temporal Access Control}, booktitle = {Encyclopedia of Database Systems, Second Edition}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-1-4614-8265-9\_385}, doi = {10.1007/978-1-4614-8265-9\_385}, timestamp = {Thu, 14 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/reference/db/0002J18d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/Joshi17, author = {James Joshi}, title = {Editorial: {A} Message from the New Editor-in-Chief}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {10}, number = {1}, pages = {3--4}, year = {2017}, url = {https://doi.org/10.1109/TSC.2016.2641638}, doi = {10.1109/TSC.2016.2641638}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/Joshi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdata/LiPJ17, author = {Chao Li and Balaji Palanisamy and James Joshi}, editor = {George Karypis and Jia Zhang}, title = {Differentially Private Trajectory Analysis for Points-of-Interest Recommendation}, booktitle = {2017 {IEEE} International Congress on Big Data, BigData Congress 2017, Honolulu, HI, USA, June 25-30, 2017}, pages = {49--56}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/BigDataCongress.2017.16}, doi = {10.1109/BIGDATACONGRESS.2017.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdata/LiPJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/AkhuseyinogluJ17, author = {Nuray Baltaci Akhuseyinoglu and James Joshi}, title = {A Risk-Aware Access Control Framework for Cyber-Physical Systems}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {349--358}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00052}, doi = {10.1109/CIC.2017.00052}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/AkhuseyinogluJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/KarimiJ17, author = {Leila Karimi and James Joshi}, title = {Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {359--368}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00053}, doi = {10.1109/CIC.2017.00053}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/KarimiJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/KarimiKJT17, author = {Maryam Karimi and Prashant Krishnamurthy and James Joshi and David Tipper}, editor = {Stephan Olariu and Habib Ammari}, title = {Mining Historical Data towards Interference Management in Wireless SDNs}, booktitle = {Proceedings of the 13th {ACM} Symposium on QoS and Security for Wireless and Mobile Networks, Q2SWinet@MSWiM 2017, Miami, FL, USA, November 21 - 25, 2017}, pages = {81--88}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3132114.3132125}, doi = {10.1145/3132114.3132125}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mswim/KarimiKJT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mms/JinLZLJ16, author = {Lei Jin and Xuelian Long and Ke Zhang and Yu{-}Ru Lin and James B. D. Joshi}, title = {Characterizing users' check-in activities using their scores in a location-based social network}, journal = {Multim. Syst.}, volume = {22}, number = {1}, pages = {87--98}, year = {2016}, url = {https://doi.org/10.1007/s00530-014-0395-8}, doi = {10.1007/S00530-014-0395-8}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mms/JinLZLJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/XuJ16, author = {Runhua Xu and James B. D. Joshi}, title = {An Integrated Privacy Preserving Attribute Based Access Control Framework}, booktitle = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {68--76}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLOUD.2016.0019}, doi = {10.1109/CLOUD.2016.0019}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/XuJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/XuJ16, author = {Runhua Xu and James B. D. Joshi}, title = {Enabling Attribute Based Encryption as an Internet Service}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {417--425}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.061}, doi = {10.1109/CIC.2016.061}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/XuJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/SuLLCJ16, author = {Yue Su and Ziyi Lan and Yu{-}Ru Lin and Louise K. Comfort and James Joshi}, title = {Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {495--499}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.075}, doi = {10.1109/CIC.2016.075}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/SuLLCJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/KarimiPJ16, author = {Leila Karimi and Balaji Palanisamy and James Joshi}, title = {A Dynamic Privacy Aware Access Control Model for Location Based Services}, booktitle = {2nd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2016, Pittsburgh, PA, USA, November 1-3, 2016}, pages = {554--557}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CIC.2016.084}, doi = {10.1109/CIC.2016.084}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/KarimiPJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/LiPJ16, author = {Chao Li and Balaji Palanisamy and James Joshi}, editor = {Stephan Reiff{-}Marganiec}, title = {SocialMix: Supporting Privacy-Aware Trusted Social Networking Services}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {115--122}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICWS.2016.23}, doi = {10.1109/ICWS.2016.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/LiPJ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bigdataconf/2016, editor = {James Joshi and George Karypis and Ling Liu and Xiaohua Hu and Ronay Ak and Yinglong Xia and Weijia Xu and Aki{-}Hiro Sato and Sudarsan Rachuri and Lyle H. Ungar and Philip S. Yu and Rama Govindaraju and Toyotaro Suzumura}, title = {2016 {IEEE} International Conference on Big Data {(IEEE} BigData 2016), Washington DC, USA, December 5-8, 2016}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://ieeexplore.ieee.org/xpl/conhome/7818133/proceeding}, isbn = {978-1-4673-9005-7}, timestamp = {Fri, 19 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuJJL15, author = {Jianfeng Lu and James B. D. Joshi and Lei Jin and Yiding Liu}, title = {Towards complexity analysis of User Authorization Query problem in {RBAC}}, journal = {Comput. Secur.}, volume = {48}, pages = {116--130}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.003}, doi = {10.1016/J.COSE.2014.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuJJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsc/ShyuJL15, author = {Mei{-}Ling Shyu and James Joshi and Qiong Liu}, title = {Guest Editors' Introduction}, journal = {Int. J. Semantic Comput.}, volume = {9}, number = {2}, pages = {139--142}, year = {2015}, url = {https://doi.org/10.1142/S1793351X15020018}, doi = {10.1142/S1793351X15020018}, timestamp = {Fri, 03 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsc/ShyuJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RamaswamyCBSJPG14, author = {Lakshmish Ramaswamy and Barbara Carminati and Lujo Bauer and Dongwan Shin and James Joshi and Calton Pu and Dimitris Gritzalis}, title = {Editorial}, journal = {Comput. Secur.}, volume = {41}, pages = {1--2}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.003}, doi = {10.1016/J.COSE.2014.01.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RamaswamyCBSJPG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JungJ14, author = {Youna Jung and James B. D. Joshi}, title = {{CPBAC:} Property-based access control model for secure cooperation in online social networks}, journal = {Comput. Secur.}, volume = {41}, pages = {19--39}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.08.004}, doi = {10.1016/J.COSE.2013.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JungJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eetcc/JoshiP14, author = {James Joshi and Calton Pu}, title = {Welcome Message from the Editors-in-Chief}, journal = {{EAI} Endorsed Trans. Collab. Comput.}, volume = {1}, number = {1}, pages = {e1}, year = {2014}, url = {https://doi.org/10.4108/cc.1.1.e1}, doi = {10.4108/CC.1.1.E1}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eetcc/JoshiP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcis/CarminatiRSJP14, author = {Barbara Carminati and Lakshmish Ramaswamy and Anna Cinzia Squicciarini and James Joshi and Calton Pu}, title = {Preface}, journal = {Int. J. Cooperative Inf. Syst.}, volume = {23}, number = {2}, year = {2014}, url = {https://doi.org/10.1142/S021884301402002X}, doi = {10.1142/S021884301402002X}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcis/CarminatiRSJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/ZhangBTJ14, author = {Chengcui Zhang and Elisa Bertino and Bhavani Thuraisingham and James B. D. Joshi}, title = {Guest editorial: Information reuse, integration, and reusable systems}, journal = {Inf. Syst. Frontiers}, volume = {16}, number = {5}, pages = {749--752}, year = {2014}, url = {https://doi.org/10.1007/s10796-014-9534-1}, doi = {10.1007/S10796-014-9534-1}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/ZhangBTJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/RamaswamyCJP14, author = {Lakshmish Ramaswamy and Barbara Carminati and James B. D. Joshi and Calton Pu}, title = {Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012)}, journal = {Mob. Networks Appl.}, volume = {19}, number = {5}, pages = {634}, year = {2014}, url = {https://doi.org/10.1007/s11036-014-0532-9}, doi = {10.1007/S11036-014-0532-9}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/RamaswamyCJP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/JinPJ14, author = {Lei Jin and Balaji Palanisamy and James B. D. Joshi}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {{POSTER:} Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {1439--1441}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2662386}, doi = {10.1145/2660267.2662386}, timestamp = {Tue, 10 Nov 2020 20:00:23 +0100}, biburl = {https://dblp.org/rec/conf/ccs/JinPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ZargarJT14, author = {Saman Taghavi Zargar and James B. D. Joshi and David Tipper}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {DiCoTraM: {A} distributed and coordinated DDoS flooding attack tailored traffic monitoring}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {120--129}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051881}, doi = {10.1109/IRI.2014.7051881}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/ZargarJT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/PalanisamySJC14, author = {Balaji Palanisamy and Sheldon Sensenig and James B. D. Joshi and Rose Constantino}, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {{LEAF:} {A} privacy-conscious social network-based intervention tool for {IPV} survivors}, booktitle = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, pages = {138--146}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IRI.2014.7051883}, doi = {10.1109/IRI.2014.7051883}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iri/PalanisamySJC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BaracaldoPJ14, author = {Nathalie Baracaldo and Balaji Palanisamy and James B. D. Joshi}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {Geo-Social-RBAC: {A} Location-Based Socially Aware Access Control Framework}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {501--509}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_39}, doi = {10.1007/978-3-319-11698-3\_39}, timestamp = {Thu, 14 Oct 2021 10:08:32 +0200}, biburl = {https://dblp.org/rec/conf/nss/BaracaldoPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wpes/JinTLJ14, author = {Lei Jin and Hassan Takabi and Xuelian Long and James B. D. Joshi}, editor = {Gail{-}Joon Ahn and Anupam Datta}, title = {Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links}, booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society, {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014}, pages = {59--68}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2665943.2665956}, doi = {10.1145/2665943.2665956}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wpes/JinTLJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iri/2014, editor = {James Joshi and Elisa Bertino and Bhavani Thuraisingham and Ling Liu}, title = {Proceedings of the 15th {IEEE} International Conference on Information Reuse and Integration, {IRI} 2014, Redwood City, CA, USA, August 13-15, 2014}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://ieeexplore.ieee.org/xpl/conhome/7036233/proceeding}, isbn = {978-1-4799-5880-1}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinJA13, author = {Lei Jin and James B. D. Joshi and Mohd Anwar}, title = {Mutual-friend based attacks in social network systems}, journal = {Comput. Secur.}, volume = {37}, pages = {15--30}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.003}, doi = {10.1016/J.COSE.2013.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinJA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaracaldoJ13, author = {Nathalie Baracaldo and James Joshi}, title = {An adaptive risk management and access control framework to mitigate insider threats}, journal = {Comput. Secur.}, volume = {39}, pages = {237--254}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.08.001}, doi = {10.1016/J.COSE.2013.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaracaldoJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/ZargarJT13, author = {Saman Taghavi Zargar and James Joshi and David Tipper}, title = {A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {15}, number = {4}, pages = {2046--2069}, year = {2013}, url = {https://doi.org/10.1109/SURV.2013.031413.00127}, doi = {10.1109/SURV.2013.031413.00127}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/ZargarJT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/CaverleePGJ13, author = {James Caverlee and Calton Pu and Dimitrios Georgakopoulos and James Joshi}, title = {Editorial for CollaborateCom 2011 Special Issue}, journal = {Mob. Networks Appl.}, volume = {18}, number = {2}, pages = {235--236}, year = {2013}, url = {https://doi.org/10.1007/s11036-013-0436-0}, doi = {10.1007/S11036-013-0436-0}, timestamp = {Thu, 07 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/CaverleePGJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdp/MasoumzadehJ13, author = {Amirreza Masoumzadeh and James Joshi}, title = {Top Location Anonymization for Geosocial Network Datasets}, journal = {Trans. Data Priv.}, volume = {6}, number = {1}, pages = {107--126}, year = {2013}, url = {http://www.tdp.cat/issues11/abs.a132a13.php}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdp/MasoumzadehJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asunam/LongJ13, author = {Xuelian Long and James Joshi}, editor = {Jon G. Rokne and Christos Faloutsos}, title = {A HITS-based {POI} recommendation algorithm for location-based social networks}, booktitle = {Advances in Social Networks Analysis and Mining 2013, {ASONAM} '13, Niagara, ON, Canada - August 25 - 29, 2013}, pages = {642--647}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2492517.2492652}, doi = {10.1145/2492517.2492652}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/asunam/LongJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MasoumzadehJ13, author = {Amirreza Masoumzadeh and James Joshi}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Privacy settings in social networking systems: what you cannot control}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {149--154}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484331}, doi = {10.1145/2484313.2484331}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MasoumzadehJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/LongJJ13, author = {Xuelian Long and Lei Jin and James Joshi}, editor = {Elisa Bertino and Dimitrios Georgakopoulos and Mudhakar Srivatsa and Surya Nepal and Alessandro Vinciarelli}, title = {Understanding venue popularity in Foursquare}, booktitle = {9th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, October 20-23, 2013}, pages = {409--418}, publisher = {{ICST} / {IEEE}}, year = {2013}, url = {https://doi.org/10.4108/icst.collaboratecom.2013.254258}, doi = {10.4108/ICST.COLLABORATECOM.2013.254258}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/LongJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LongJJ13, author = {Xuelian Long and Lei Jin and James Joshi}, title = {Towards understanding traveler behavior in Location-based Social Networks}, booktitle = {2013 {IEEE} Global Communications Conference, {GLOBECOM} 2013, Atlanta, GA, USA, December 9-13, 2013}, pages = {3182--3187}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/GLOCOM.2013.6831561}, doi = {10.1109/GLOCOM.2013.6831561}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/LongJJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BaracaldoJ13, author = {Nathalie Baracaldo and James Joshi}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Beyond accountability: using obligations to reduce risk exposure and deter insider attacks}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {213--224}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462411}, doi = {10.1145/2462410.2462411}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BaracaldoJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/air/JungKMJ12, author = {Youna Jung and Minsoo Kim and Amirreza Masoumzadeh and James B. D. Joshi}, title = {A survey of security issue in multi-agent systems}, journal = {Artif. Intell. Rev.}, volume = {37}, number = {3}, pages = {239--260}, year = {2012}, url = {https://doi.org/10.1007/s10462-011-9228-8}, doi = {10.1007/S10462-011-9228-8}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/air/JungKMJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JungJ12, author = {Youna Jung and James B. D. Joshi}, title = {CRiBAC: Community-centric role interaction based access control model}, journal = {Comput. Secur.}, volume = {31}, number = {4}, pages = {497--523}, year = {2012}, url = {https://doi.org/10.1016/j.cose.2012.02.002}, doi = {10.1016/J.COSE.2012.02.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JungJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcc/TakabiJ12, author = {Hassan Takabi and James B. D. Joshi}, title = {Semantic-based policy management for cloud computing environments}, journal = {Int. J. Cloud Comput.}, volume = {1}, number = {2/3}, pages = {119--144}, year = {2012}, url = {https://doi.org/10.1504/IJCC.2012.046717}, doi = {10.1504/IJCC.2012.046717}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcc/TakabiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/JoshiBPR12, author = {James Joshi and Elisa Bertino and Calton Pu and Heri Ramampiaro}, title = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue on "Collaborative Computing: Networking, Applications and Worksharing"}, journal = {Mob. Networks Appl.}, volume = {17}, number = {3}, pages = {325--326}, year = {2012}, url = {https://doi.org/10.1007/s11036-012-0367-1}, doi = {10.1007/S11036-012-0367-1}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/JoshiBPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ShiJZPQ12, author = {Weisong Shi and James Joshi and Tao Zhang and Eun K. Park and Juan Quemada}, title = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue on "Collaborative Computing: Networking, Applications and Worksharing"}, journal = {Mob. Networks Appl.}, volume = {17}, number = {3}, pages = {376--377}, year = {2012}, url = {https://doi.org/10.1007/s11036-012-0371-5}, doi = {10.1007/S11036-012-0371-5}, timestamp = {Tue, 16 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/monet/ShiJZPQ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/monet/ChenGJA12, author = {Songqing Chen and Le Gruenwald and James Joshi and Karl Aberer}, title = {ACM/Springer Mobile Networks and Applications {(MONET)} Special Issue on "Collaborative Computing: Networking, Applications and Worksharing"}, journal = {Mob. Networks Appl.}, volume = {17}, number = {4}, pages = {506--507}, year = {2012}, url = {https://doi.org/10.1007/s11036-012-0369-z}, doi = {10.1007/S11036-012-0369-Z}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/monet/ChenGJA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/MasoumzadehJ12, author = {Amirreza Masoumzadeh and James Joshi}, title = {Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {6}, pages = {877--889}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.65}, doi = {10.1109/TDSC.2012.65}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/MasoumzadehJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0003LJ12, author = {Lei Jin and Xuelian Long and James B. D. Joshi}, editor = {Ting Yu and Mihai Christodorescu}, title = {Towards understanding residential privacy by analyzing users' activities in foursquare}, booktitle = {Proceedings of the 2012 {ACM} Workshop on Building analysis datasets and gathering experience returns for security, {BADGERS} '12, Raleigh, North Carolina, USA, October 15, 2012}, pages = {25--32}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382416.2382428}, doi = {10.1145/2382416.2382428}, timestamp = {Mon, 04 Apr 2022 16:00:12 +0200}, biburl = {https://dblp.org/rec/conf/ccs/0003LJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/CarminatiRPJ12, author = {Barbara Carminati and Lakshmish Ramaswamy and Calton Pu and James Joshi}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Preface}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6450885/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/CarminatiRPJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JungKJ12, author = {Youna Jung and Minsoo Kim and James B. D. Joshi}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {Towards secure cooperation in online social networks}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {80--88}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250707}, doi = {10.4108/ICST.COLLABORATECOM.2012.250707}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JungKJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hicss/TakabiJ12, author = {Hassan Takabi and James B. D. Joshi}, title = {Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment}, booktitle = {45th Hawaii International International Conference on Systems Science {(HICSS-45} 2012), Proceedings, 4-7 January 2012, Grand Wailea, Maui, HI, {USA}}, pages = {5500--5508}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/HICSS.2012.475}, doi = {10.1109/HICSS.2012.475}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hicss/TakabiJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/huc/LongJJ12, author = {Xuelian Long and Lei Jin and James Joshi}, editor = {Anind K. Dey and Hao{-}Hua Chu and Gillian R. Hayes}, title = {Exploring trajectory-driven local geographic topics in foursquare}, booktitle = {The 2012 {ACM} Conference on Ubiquitous Computing, Ubicomp '12, Pittsburgh, PA, USA, September 5-8, 2012}, pages = {927--934}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2370216.2370423}, doi = {10.1145/2370216.2370423}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/huc/LongJJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/JinLJA12, author = {Lei Jin and Xuelian Long and James B. D. Joshi and Mohd Anwar}, editor = {Chengcui Zhang and James Joshi and Elisa Bertino and Bhavani Thuraisingham}, title = {Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems}, booktitle = {{IEEE} 13th International Conference on Information Reuse {\&} Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012}, pages = {712--717}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IRI.2012.6303080}, doi = {10.1109/IRI.2012.6303080}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/iri/JinLJA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BaracaldoJ12, author = {Nathalie Baracaldo and James Joshi}, editor = {Vijay Atluri and Jaideep Vaidya and Axel Kern and Murat Kantarcioglu}, title = {A trust-and-risk aware {RBAC} framework: tackling insider threat}, booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '12, Newark, NJ, {USA} - June 20 - 22, 2012}, pages = {167--176}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2295136.2295168}, doi = {10.1145/2295136.2295168}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BaracaldoJ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2012, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2012}, isbn = {978-1-4673-2740-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iri/2012, editor = {Chengcui Zhang and James Joshi and Elisa Bertino and Bhavani Thuraisingham}, title = {{IEEE} 13th International Conference on Information Reuse {\&} Integration, {IRI} 2012, Las Vegas, NV, USA, August 8-10, 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6294629/proceeding}, isbn = {978-1-4673-2282-9}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalizJ11, author = {Dimitris Gritzalis and James Joshi}, title = {Editorial}, journal = {Comput. Secur.}, volume = {30}, number = {2-3}, pages = {89--90}, year = {2011}, url = {https://doi.org/10.1016/j.cose.2010.11.002}, doi = {10.1016/J.COSE.2010.11.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalizJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, title = {Analysing security and privacy issues of using e-mail address as identity}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {34--58}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043730}, doi = {10.1504/IJIPSI.2011.043730}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/MasoumzadehJ11, author = {Amirreza Masoumzadeh and James Joshi}, title = {Ontology-based access control for social network systems}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {1}, number = {1}, pages = {59--78}, year = {2011}, url = {https://doi.org/10.1504/IJIPSI.2011.043731}, doi = {10.1504/IJIPSI.2011.043731}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/MasoumzadehJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jikm/KayaJS11, author = {Mehmet Kaya and James B. D. Joshi and Mei{-}Ling Shyu}, title = {Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration}, journal = {J. Inf. Knowl. Manag.}, volume = {10}, number = {3}, year = {2011}, url = {https://doi.org/10.1142/S0219649211003000}, doi = {10.1142/S0219649211003000}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jikm/KayaJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jikm/LongJ11, author = {Xuelian Long and James Joshi}, title = {BaRMS: {A} Bayesian Reputation Management Approach for {P2P} Systems}, journal = {J. Inf. Knowl. Manag.}, volume = {10}, number = {3}, pages = {273--283}, year = {2011}, url = {https://doi.org/10.1142/S0219649211002985}, doi = {10.1142/S0219649211002985}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jikm/LongJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JoshiC11, author = {James Joshi and Barbara Carminati}, title = {Guest Editorial {SACMAT} 2009 and 2010}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {22:1--22:2}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043622}, doi = {10.1145/2043621.2043622}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JoshiC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/JinTJ11, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Towards active detection of identity clone attacks on online social networks}, booktitle = {First {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings}, pages = {27--38}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1943513.1943520}, doi = {10.1145/1943513.1943520}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/JinTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZargarTJ11, author = {Saman Taghavi Zargar and Hassan Takabi and James B. D. Joshi}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {{DCDIDP:} {A} distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {332--341}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247158}, doi = {10.4108/ICST.COLLABORATECOM.2011.247158}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ZargarTJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/GonzalezAJ11, author = {Jesus M. Gonzalez and Mohd Anwar and James B. D. Joshi}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {A trust-based approach to mitigate rerouting attacks}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {520--523}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247157}, doi = {10.4108/ICST.COLLABORATECOM.2011.247157}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/GonzalezAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/MasoumzadehJ11, author = {Amirreza Masoumzadeh and James B. D. Joshi}, editor = {Elisa Bertino and Maria Luisa Damiani and Gabriel Ghinita}, title = {Anonymizing geo-social network datasets}, booktitle = {Proceedings of the 4th {ACM} {SIGSPATIAL} International Workshop on Security and Privacy in {GIS} and LBS, {SPRINGL} 2011, November 1st, 2011, Chicago, IL, {USA}}, pages = {25--32}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/2071880.2071886}, doi = {10.1145/2071880.2071886}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/MasoumzadehJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AlhajjJS11, author = {Reda Alhajj and James B. D. Joshi and Mei{-}Ling Shyu}, title = {Message from program co-chairs}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada, {USA}}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2011}, url = {https://doi.org/10.1109/IRI.2011.6009499}, doi = {10.1109/IRI.2011.6009499}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/iri/AlhajjJS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/JungKJ11, author = {Youna Jung and Minsoo Kim and James B. D. Joshi}, title = {DRiBAC: Fine-grained dynamic role interaction access control using ontology}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2011, 3-5 August 2011, Las Vegas, Nevada, {USA}}, pages = {88--93}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2011}, url = {https://doi.org/10.1109/IRI.2011.6009526}, doi = {10.1109/IRI.2011.6009526}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/JungKJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BaracaldoMJ11, author = {Nathalie Baracaldo and Amirreza Masoumzadeh and James Joshi}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {A secure, constraint-aware role-based access control interoperation framework}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {200--207}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6060001}, doi = {10.1109/ICNSS.2011.6060001}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BaracaldoMJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/GonzalezAJ11, author = {Jesus M. Gonzalez and Mohd Anwar and James B. D. Joshi}, title = {A trust-based approach against IP-spoofing attacks}, booktitle = {Ninth Annual Conference on Privacy, Security and Trust, {PST} 2011, 19-21 July, 2011, Montreal, Qu{\'{e}}bec, Canada}, pages = {63--70}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/PST.2011.5971965}, doi = {10.1109/PST.2011.5971965}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pst/GonzalezAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/GonzalezAJ11, author = {Jesus M. Gonzalez and Mohd Anwar and James B. D. Joshi}, title = {Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: {A} Survey}, booktitle = {{IEEE} 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011}, pages = {556--563}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/TrustCom.2011.72}, doi = {10.1109/TRUSTCOM.2011.72}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/GonzalezAJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/procedia/MasoumzadehJ11, author = {Amirreza Masoumzadeh and James Joshi}, editor = {Elhadi M. Shakshuki and Muhammad Younas}, title = {An Alternative Approach to k-Anonymity for Location-Based Services}, booktitle = {Proceedings of the 2nd International Conference on Ambient Systems, Networks and Technologies {(ANT} 2011), the 8th International Conference on Mobile Web Information Systems (MobiWIS-2011), Niagara Falls, Ontario, Canada, September 19-21, 2011}, series = {Procedia Computer Science}, volume = {5}, pages = {522--530}, publisher = {Elsevier}, year = {2011}, url = {https://doi.org/10.1016/j.procs.2011.07.068}, doi = {10.1016/J.PROCS.2011.07.068}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/procedia/MasoumzadehJ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2011, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2011}, isbn = {978-1-4673-0683-6}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {Security and Privacy Challenges in Cloud Computing Environments}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {24--31}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.186}, doi = {10.1109/MSP.2010.186}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/AbererJ10, author = {Karl Aberer and James Joshi}, editor = {Karl Aberer and James Joshi}, title = {Message from the general chairs}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--2}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/document/5766988/}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/AbererJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/MasoumzadehJ10, author = {Amirreza Masoumzadeh and James Joshi}, editor = {Karl Aberer and James Joshi}, title = {Preserving structural properties in anonymization of social networks}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.7}, doi = {10.4108/ICST.COLLABORATECOM.2010.7}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/MasoumzadehJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZargarJ10, author = {Saman Taghavi Zargar and James B. D. Joshi}, editor = {Karl Aberer and James Joshi}, title = {A collaborative approach to facilitate intrusion detection and response against DDoS attacks}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--8}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.46}, doi = {10.4108/ICST.COLLABORATECOM.2010.46}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/ZargarJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/TakabiJA10, author = {Hassan Takabi and James B. D. Joshi and Gail{-}Joon Ahn}, title = {SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments}, booktitle = {Workshop Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul, Korea, 19-23 July 2010}, pages = {393--398}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSACW.2010.74}, doi = {10.1109/COMPSACW.2010.74}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/TakabiJA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/ZhangJ10, author = {Yue Zhang and James B. D. Joshi}, editor = {Waleed W. Smari and William K. McQuay}, title = {Role-based domain discovery in decentralized secure interoperations}, booktitle = {2010 International Symposium on Collaborative Technologies and Systems, {CTS} 2010, Chicago, Illinois, USA, May 17-21, 2010}, pages = {84--93}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/CTS.2010.5478522}, doi = {10.1109/CTS.2010.5478522}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/ZhangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ht/GuoJ10, author = {Yanhui Guo and James B. D. Joshi}, editor = {Mark H. Chignell and Elaine G. Toms}, title = {Topic-based personalized recommendation for collaborative tagging system}, booktitle = {HT'10, Proceedings of the 21st {ACM} Conference on Hypertext and Hypermedia, Toronto, Ontario, Canada, June 13-16, 2010}, pages = {61--66}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1810617.1810629}, doi = {10.1145/1810617.1810629}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ht/GuoJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/LongJ10, author = {Xuelian Long and James Joshi}, title = {Enhanced One-Pass {IP} Multimedia Subsystem Authentication Protocol for {UMTS}}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2010, Cape Town, South Africa, 23-27 May 2010}, pages = {1--6}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ICC.2010.5502126}, doi = {10.1109/ICC.2010.5502126}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/LongJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/ZhangJ10, author = {Yue Zhang and James B. D. Joshi}, editor = {Joaquim Filipe and Jos{\'{e}} Cordeiro}, title = {Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments}, booktitle = {{ICEIS} 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8 - 12, 2010}, pages = {356--361}, publisher = {SciTePress}, year = {2010}, timestamp = {Tue, 04 Jan 2011 08:32:08 +0100}, biburl = {https://dblp.org/rec/conf/iceis/ZhangJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AlhajjCHJLRSZ10, author = {Reda Alhajj and Shu{-}Ching Chen and Gongzhu Hu and James B. D. Joshi and Gordon K. Lee and Stuart Harvey Rubin and Mei{-}Ling Shyu and Lotfi A. Zadeh}, title = {Panel title: Critical need for funding of basic and applied research in large-scale computing}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada, {USA}}, pages = {1}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2010}, url = {https://doi.org/10.1109/IRI.2010.5558979}, doi = {10.1109/IRI.2010.5558979}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/AlhajjCHJLRSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/AlhajjJS10, author = {Reda Alhajj and James B. D. Joshi and Mei{-}Ling Shyu}, title = {Message from Program Co-Chairs}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada, {USA}}, pages = {1}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2010}, url = {https://doi.org/10.1109/IRI.2010.5558982}, doi = {10.1109/IRI.2010.5558982}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/AlhajjJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/LongJ10, author = {Xuelian Long and James Joshi}, title = {BaRMS: {A} Bayesian Reputation Management approach for {P2P} systems}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2010, 4-6 August 2010, Las Vegas, Nevada, {USA}}, pages = {147--152}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2010}, url = {https://doi.org/10.1109/IRI.2010.5558948}, doi = {10.1109/IRI.2010.5558948}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/LongJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TakabiJ10, author = {Hassan Takabi and James B. D. Joshi}, editor = {James B. D. Joshi and Barbara Carminati}, title = {StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {55--64}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809853}, doi = {10.1145/1809842.1809853}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TakabiJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/MasoumzadehJ10, author = {Amirreza Masoumzadeh and James B. D. Joshi}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {{OSNAC:} An Ontology-based Access Control Model for Social Networking Systems}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {751--759}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.116}, doi = {10.1109/SOCIALCOM.2010.116}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/MasoumzadehJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/JinTJ10, author = {Lei Jin and Hassan Takabi and James B. D. Joshi}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {Security and Privacy Risks of Using E-mail Address as an Identity}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {906--913}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.134}, doi = {10.1109/SOCIALCOM.2010.134}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/JinTJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2010, editor = {Karl Aberer and James Joshi}, title = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2010}, isbn = {978-963-9995-24-6}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2010, editor = {James B. D. Joshi and Barbara Carminati}, title = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842}, doi = {10.1145/1809842}, isbn = {978-1-4503-0049-0}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/CaicedoJT09, author = {Carlos E. Caicedo and James B. D. Joshi and Summit R. Tuladhar}, title = {IPv6 Security Challenges}, journal = {Computer}, volume = {42}, number = {2}, pages = {36--42}, year = {2009}, url = {https://doi.org/10.1109/MC.2009.54}, doi = {10.1109/MC.2009.54}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/CaicedoJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/TakabiJK09, author = {Hassan Takabi and James B. D. Joshi and Hassan A. Karimi}, editor = {James B. D. Joshi and Tao Zhang}, title = {A collaborative k-anonymity approach for location privacy in location-based services}, booktitle = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, pages = {1--9}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8374}, doi = {10.4108/ICST.COLLABORATECOM2009.8374}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/colcom/TakabiJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gis/MasoumzadehJK09, author = {Amirreza Masoumzadeh and James Joshi and Hassan A. Karimi}, editor = {Divyakant Agrawal and Walid G. Aref and Chang{-}Tien Lu and Mohamed F. Mokbel and Peter Scheuermann and Cyrus Shahabi and Ouri Wolfson}, title = {{LBS} (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users}, booktitle = {17th {ACM} {SIGSPATIAL} International Symposium on Advances in Geographic Information Systems, {ACM-GIS} 2009, November 4-6, 2009, Seattle, Washington, USA, Proceedings}, pages = {464--467}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1653771.1653845}, doi = {10.1145/1653771.1653845}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/gis/MasoumzadehJK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/ZargarMBNJ09, author = {Saman Taghavi Zargar and M. Amir Moulavi and Rajkumar Buyya and Mahmoud Naghibzadeh and James B. D. Joshi}, editor = {Gabriel A. Wainer and Clifford A. Shaffer and Robert M. McGraw and Michael J. Chinni}, title = {{RRNA:} reliable soft real-time network aware grid scheduling algorithm using round trip time}, booktitle = {Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009}, publisher = {{SCS/ACM}}, year = {2009}, url = {http://dl.acm.org/citation.cfm?id=1639809.1639891}, timestamp = {Mon, 10 Dec 2012 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/springsim/ZargarMBNJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sws/TakabiKJS09, author = {Hassan Takabi and Minsoo Kim and James B. D. Joshi and Michael B. Spring}, editor = {Ernesto Damiani and Seth Proctor and Anoop Singhal}, title = {An architecture for specification and enforcement of temporal access control constraints using {OWL}}, booktitle = {Proceedings of the 6th {ACM} Workshop On Secure Web Services, {SWS} 2009, Chicago, Illinois, USA, November 13, 2009}, pages = {21--28}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655121.1655127}, doi = {10.1145/1655121.1655127}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sws/TakabiKJS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2008, editor = {Elisa Bertino and James B. D. Joshi}, title = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, publisher = {Springer / {ICST}}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03354-4}, doi = {10.1007/978-3-642-03354-4}, isbn = {978-3-642-03353-7}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/colcom/2009, editor = {James B. D. Joshi and Tao Zhang}, title = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {http://eudl.eu/proceedings/COLLABORATECOM/2009}, isbn = {978-963-9799-76-9}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2009, editor = {Barbara Carminati and James Joshi}, title = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207}, doi = {10.1145/1542207}, isbn = {978-1-60558-537-6}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/ZhangJ09, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Administration Model for {RBAC}}, booktitle = {Encyclopedia of Database Systems}, pages = {58}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_1507}, doi = {10.1007/978-0-387-39940-9\_1507}, timestamp = {Sun, 02 Jun 2019 21:10:27 +0200}, biburl = {https://dblp.org/rec/reference/db/ZhangJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/ZhangJ09a, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {{ANSI/INCITS} {RBAC} Standard}, booktitle = {Encyclopedia of Database Systems}, pages = {91--92}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_1508}, doi = {10.1007/978-0-387-39940-9\_1508}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/db/ZhangJ09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/ZhangJ09b, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {{GEO-RBAC} Model}, booktitle = {Encyclopedia of Database Systems}, pages = {1244--1245}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_1509}, doi = {10.1007/978-0-387-39940-9\_1509}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/db/ZhangJ09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/ZhangJ09c, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Role Based Access Control}, booktitle = {Encyclopedia of Database Systems}, pages = {2447--2452}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_320}, doi = {10.1007/978-0-387-39940-9\_320}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/db/ZhangJ09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/db/ZhangJ09d, author = {Yue Zhang and James B. D. Joshi}, editor = {Ling Liu and M. Tamer {\"{O}}zsu}, title = {Temporal Access Control}, booktitle = {Encyclopedia of Database Systems}, pages = {2920--2924}, publisher = {Springer {US}}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-39940-9\_385}, doi = {10.1007/978-0-387-39940-9\_385}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/db/ZhangJ09d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/JoshiBGZ08, author = {James B. D. Joshi and Elisa Bertino and Arif Ghafoor and Yue Zhang}, title = {Formal foundations for hybrid hierarchies in {GTRBAC}}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {10}, number = {4}, pages = {2:1--2:39}, year = {2008}, url = {https://doi.org/10.1145/1284680.1284682}, doi = {10.1145/1284680.1284682}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/JoshiBGZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/KimJK08, author = {Minsoo Kim and James B. D. Joshi and Minkoo Kim}, editor = {Elisa Bertino and James B. D. Joshi}, title = {Access Control for Cooperation Systems Based on Group Situation}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {11--23}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_2}, doi = {10.1007/978-3-642-03354-4\_2}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/KimJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JungMJK08, author = {Youna Jung and Amirreza Masoumzadeh and James B. D. Joshi and Minkoo Kim}, editor = {Elisa Bertino and James B. D. Joshi}, title = {RiBAC: Role Interaction Based Access Control Model for Community Computing}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {10}, pages = {304--321}, publisher = {Springer / {ICST}}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-03354-4\_23}, doi = {10.1007/978-3-642-03354-4\_23}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JungMJK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JiangJ08, author = {Michael Jiang and James Joshi}, title = {Message from the {IWSSE} 2008 Workshop Organizers}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {935}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.263}, doi = {10.1109/COMPSAC.2008.263}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/JiangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JiangJ08a, author = {Michael Jiang and James Joshi}, title = {{IWSSE} 2008 Workshop Organization}, booktitle = {Proceedings of the 32nd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2008, 28 July - 1 August 2008, Turku, Finland}, pages = {936}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/COMPSAC.2008.264}, doi = {10.1109/COMPSAC.2008.264}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/JiangJ08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/ZhangJ08, author = {Yue Zhang and James B. D. Joshi}, editor = {Cheng{-}Zhong Xu and Minyi Guo}, title = {Temporal {UAS:} Supporting Efficient {RBAC} Authorization in Presence of the Temporal Role Hierarchy}, booktitle = {2008 {IEEE/IPIP} International Conference on Embedded and Ubiquitous Computing {(EUC} 2008), Shanghai, China, December 17-20, 2008, Volume {II:} Workshops}, pages = {264--271}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/EUC.2008.185}, doi = {10.1109/EUC.2008.185}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/ZhangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/otm/MasoumzadehJ08, author = {Amirreza Masoumzadeh and James B. D. Joshi}, editor = {Robert Meersman and Zahir Tari}, title = {PuRBAC: Purpose-Aware Role-Based Access Control}, booktitle = {On the Move to Meaningful Internet Systems: {OTM} 2008, {OTM} 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and {ODBASE} 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {5332}, pages = {1104--1121}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88873-4\_12}, doi = {10.1007/978-3-540-88873-4\_12}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/otm/MasoumzadehJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangJ08, author = {Yue Zhang and James B. D. Joshi}, editor = {Indrakshi Ray and Ninghui Li}, title = {{UAQ:} a framework for user authorization query processing in {RBAC} extended with hybrid hierarchy and constraints}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {83--92}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377850}, doi = {10.1145/1377836.1377850}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sutc/TuladharCJ08, author = {Summit R. Tuladhar and Carlos E. Caicedo and James B. D. Joshi}, editor = {Mukesh Singhal and Giovanna Di Marzo Serugendo and Jeffrey J. P. Tsai and Wang{-}Chien Lee and Kay R{\"{o}}mer and Yu{-}Chee Tseng and Han C. W. Hsiao}, title = {Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks}, booktitle = {{IEEE} International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing {(SUTC} 2008), 11-13 June 2008, Taichung, Taiwan}, pages = {249--255}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/SUTC.2008.61}, doi = {10.1109/SUTC.2008.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sutc/TuladharCJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/ZhangJ07, author = {Yue Zhang and James B. D. Joshi}, editor = {Ning Zhang and Ajith Abraham}, title = {{SARBAC07:} {A} Scoped Administration Model for {RBAC} with Hybrid Hierarchy}, booktitle = {Proceedings of the Third International Symposium on Information Assurance and Security, {IAS} 2007, August 29-31, 2007, Manchester, United Kingdom}, pages = {149--154}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/IAS.2007.90}, doi = {10.1109/IAS.2007.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/ZhangJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ZhangJ07, author = {Yue Zhang and James B. D. Joshi}, editor = {Juan Quemada and Tao Zhang}, title = {A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing {RBAC} policies}, booktitle = {Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007}, pages = {25--32}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2007}, url = {https://doi.org/10.1109/COLCOM.2007.4553805}, doi = {10.1109/COLCOM.2007.4553805}, timestamp = {Tue, 20 Aug 2024 07:54:45 +0200}, biburl = {https://dblp.org/rec/conf/colcom/ZhangJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/OuyangJ07, author = {Kai Ouyang and James B. D. Joshi}, title = {{CT-RBAC:} {A} Temporal {RBAC} Model with Conditional Periodic Time}, booktitle = {Proceedings of the 26th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New Orleans, Louisiana, {USA}}, pages = {467--474}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/PCCC.2007.358928}, doi = {10.1109/PCCC.2007.358928}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/OuyangJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ZhangJ07, author = {Yue Zhang and James B. D. Joshi}, title = {{ARBAC07:} {A} Role-based Administration Model for {RBAC} with Hybrid Hierarchy}, booktitle = {Proceedings of the {IEEE} International Conference on Information Reuse and Integration, {IRI} 2007, 13-15 August 2007, Las Vegas, Nevada, {USA}}, pages = {196--202}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2007}, url = {https://doi.org/10.1109/IRI.2007.4296620}, doi = {10.1109/IRI.2007.4296620}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/ZhangJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/ChuangPJ06, author = {Michael Chuang and Suronapee Phoomvuthisarn and James B. D. Joshi}, editor = {Enrico Blanzieri and Tao Zhang}, title = {An Integrated Framework for Trust-Based Access Control for Open Systems}, booktitle = {2nd International {ICST} Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2006, Atlanta, GA, USA, November 17-20, 2006}, publisher = {{IEEE} Computer Society / {ICST}}, year = {2006}, url = {https://doi.org/10.1109/COLCOM.2006.361881}, doi = {10.1109/COLCOM.2006.361881}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/ChuangPJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ParkKNJ06, author = {Jun{-}Hyung Park and Minsoo Kim and BongNam Noh and James B. D. Joshi}, title = {A similarity based technique for detecting malicious executable files for computer forensics}, booktitle = {Proceedings of the 2006 {IEEE} International Conference on Information Reuse and Integration, {IRI} - 2006: Heuristic Systems Engineering, September 16-18, 2006, Waikoloa, Hawaii, {USA}}, pages = {188--193}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2006}, url = {https://doi.org/10.1109/IRI.2006.252411}, doi = {10.1109/IRI.2006.252411}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/ParkKNJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itrust/ChandranPJ06, author = {Suroop Mohan Chandran and Korporn Panyim and James B. D. Joshi}, editor = {Ketil St{\o}len and William H. Winsborough and Fabio Martinelli and Fabio Massacci}, title = {A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments}, booktitle = {Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3986}, pages = {33--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11755593\_4}, doi = {10.1007/11755593\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/itrust/ChandranPJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JoshiB06, author = {James B. D. Joshi and Elisa Bertino}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Fine-grained role-based delegation in presence of the hybrid role hierarchy}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {81--90}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133071}, doi = {10.1145/1133058.1133071}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JoshiB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/DuJ06, author = {Siqing Du and James B. D. Joshi}, editor = {David F. Ferraiolo and Indrakshi Ray}, title = {Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy}, booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings}, pages = {228--236}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1133058.1133090}, doi = {10.1145/1133058.1133090}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/DuJ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JoshiBG05, author = {James Joshi and Elisa Bertino and Arif Ghafoor}, title = {An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {2}, number = {2}, pages = {157--175}, year = {2005}, url = {https://doi.org/10.1109/TDSC.2005.18}, doi = {10.1109/TDSC.2005.18}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/JoshiBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattiGBJ05, author = {Rafae Bhatti and Arif Ghafoor and Elisa Bertino and James Joshi}, title = {{X-GTRBAC:} an XML-based policy specification framework and architecture for enterprise-wide access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {2}, pages = {187--227}, year = {2005}, url = {https://doi.org/10.1145/1065545.1065547}, doi = {10.1145/1065545.1065547}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhattiGBJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BhattiSBGJ05, author = {Rafae Bhatti and Basit Shafiq and Elisa Bertino and Arif Ghafoor and James Joshi}, title = {X-gtrbac admin: {A} decentralized administration model for enterprise-wide access control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {8}, number = {4}, pages = {388--423}, year = {2005}, url = {https://doi.org/10.1145/1108906.1108909}, doi = {10.1145/1108906.1108909}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BhattiSBGJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/JoshiBLG05, author = {James Joshi and Elisa Bertino and Usman Latif and Arif Ghafoor}, title = {A Generalized Temporal Role-Based Access Control Model}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {17}, number = {1}, pages = {4--23}, year = {2005}, url = {https://doi.org/10.1109/TKDE.2005.1}, doi = {10.1109/TKDE.2005.1}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/JoshiBLG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ShafiqJBG05, author = {Basit Shafiq and James Joshi and Elisa Bertino and Arif Ghafoor}, title = {Secure Interoperation in a Multidomain Environment Employing {RBAC} Policies}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {17}, number = {11}, pages = {1557--1577}, year = {2005}, url = {https://doi.org/10.1109/TKDE.2005.185}, doi = {10.1109/TKDE.2005.185}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ShafiqJBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ChandranJ05, author = {Suroop Mohan Chandran and James B. D. Joshi}, editor = {Du Zhang and Taghi M. Khoshgoftaar and Mei{-}Ling Shyu}, title = {Towards administration of a hybrid role hierarchy}, booktitle = {Proceedings of the 2005 {IEEE} International Conference on Information Reuse and Integration, {IRI} - 2005, August 15-17, 2005, Las Vegas Hilton, Las Vegas, NV, {USA}}, pages = {500--505}, publisher = {{IEEE} Systems, Man, and Cybernetics Society}, year = {2005}, url = {https://doi.org/10.1109/IRI-05.2005.1506523}, doi = {10.1109/IRI-05.2005.1506523}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/ChandranJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/ChandranJ05, author = {Suroop Mohan Chandran and James B. D. Joshi}, editor = {Anne H. H. Ngu and Masaru Kitsuregawa and Erich J. Neuhold and Jen{-}Yao Chung and Quan Z. Sheng}, title = {\emph{LoT-RBAC}: {A} Location and Time-Based {RBAC} Model}, booktitle = {Web Information Systems Engineering - {WISE} 2005, 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3806}, pages = {361--375}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11581062\_27}, doi = {10.1007/11581062\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/wise/ChandranJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/words/ShafiqMJG05, author = {Basit Shafiq and Ammar Masood and James Joshi and Arif Ghafoor}, title = {A Role-Based Access Control Policy Verification Framework for Real-Time Systems}, booktitle = {10th {IEEE} International Workshop on Object-Oriented Real-Time Dependable Systems {(WORDS} 2005), 2-4 February 2005, Sedona, AZ, {USA}}, pages = {13--20}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WORDS.2005.11}, doi = {10.1109/WORDS.2005.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/words/ShafiqMJG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/words/PiromruenJ05, author = {Smithi Piromruen and James B. D. Joshi}, title = {An {RBAC} Framework for Time Constrained Secure Interoperation in Multi-domain Environments}, booktitle = {10th {IEEE} International Workshop on Object-Oriented Real-Time Dependable Systems {(WORDS} 2005), 2-4 February 2005, Sedona, AZ, {USA}}, pages = {36--48}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/WORDS.2005.18}, doi = {10.1109/WORDS.2005.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/words/PiromruenJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/BhattiBGJ04, author = {Rafae Bhatti and Elisa Bertino and Arif Ghafoor and James Joshi}, title = {XML-Based Specification for Web Services Document Security}, journal = {Computer}, volume = {37}, number = {4}, pages = {41--49}, year = {2004}, url = {https://doi.org/10.1109/MC.2004.1297300}, doi = {10.1109/MC.2004.1297300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/BhattiBGJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/JoshiBBG04, author = {James Joshi and Rafae Bhatti and Elisa Bertino and Arif Ghafoor}, title = {Access-Control Language for Multidomain Environments}, journal = {{IEEE} Internet Comput.}, volume = {8}, number = {6}, pages = {40--50}, year = {2004}, url = {https://doi.org/10.1109/MIC.2004.53}, doi = {10.1109/MIC.2004.53}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/JoshiBBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BhattiJBG04, author = {Rafae Bhatti and James Joshi and Elisa Bertino and Arif Ghafoor}, editor = {Trent Jaeger and Elena Ferrari}, title = {{X-GTRBAC} admin: a decentralized administration model for enterprise wide access control}, booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings}, pages = {78--86}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/990036.990049}, doi = {10.1145/990036.990049}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BhattiJBG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertinoCJDS04, author = {Elisa Bertino and Bruno Crispo and James Joshi and Wengliang (Kevin) Du and Ravi S. Sandhu}, editor = {Trent Jaeger and Elena Ferrari}, title = {Security for grid-based computing systems issues and challenges}, booktitle = {9th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings}, pages = {125}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/990036.990056}, doi = {10.1145/990036.990056}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BertinoCJDS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Joshi03, author = {James B. D. Joshi}, title = {A generalized temporal role based access control model for developing secure systems}, school = {Purdue University, {USA}}, year = {2003}, url = {https://docs.lib.purdue.edu/dissertations/AAI3113822}, timestamp = {Wed, 26 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Joshi03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/BhattiJBG03, author = {Rafae Bhatti and James Joshi and Elisa Bertino and Arif Ghafoor}, editor = {Liang{-}Jie Zhang}, title = {Access Control in Dynamic XML-Based Web-Services with {X-RBAC}}, booktitle = {Proceedings of the International Conference on Web Services, {ICWS} '03, June 23 - 26, 2003, Las Vegas, Nevada, {USA}}, pages = {243--249}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Tue, 04 May 2004 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icws/BhattiJBG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JoshiSGB03, author = {James Joshi and Basit Shafiq and Arif Ghafoor and Elisa Bertino}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Dependencies and separation of duty constraints in {GTRBAC}}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {51--64}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775420}, doi = {10.1145/775412.775420}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JoshiSGB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmm/JoshiLFSG02, author = {James B. D. Joshi and Zhaohui Kevin Li and Husni Fahmi and Basit Shafiq and Arif Ghafoor}, title = {A model for secure multimedia document database system in a distributed environment}, journal = {{IEEE} Trans. Multim.}, volume = {4}, number = {2}, pages = {215--234}, year = {2002}, url = {https://doi.org/10.1109/TMM.2002.1017735}, doi = {10.1109/TMM.2002.1017735}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmm/JoshiLFSG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/JoshiBG02, author = {James Joshi and Elisa Bertino and Arif Ghafoor}, title = {Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model}, booktitle = {26th International Computer Software and Applications Conference {(COMPSAC} 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings}, pages = {951--956}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CMPSAC.2002.1045128}, doi = {10.1109/CMPSAC.2002.1045128}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/JoshiBG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JoshiBG02, author = {James Joshi and Elisa Bertino and Arif Ghafoor}, editor = {Ravi S. Sandhu and Elisa Bertino}, title = {Temporal hierarchies and inheritance semantics for {GTRBAC}}, booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002}, pages = {74--83}, publisher = {{ACM}}, year = {2002}, url = {https://doi.org/10.1145/507711.507724}, doi = {10.1145/507711.507724}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JoshiBG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ads/JoshiGAS02, author = {James B. D. Joshi and Arif Ghafoor and Walid G. Aref and Eugene H. Spafford}, editor = {William J. McIver Jr. and Ahmed K. Elmagarmid}, title = {Security and Privacy Challenges of a Digital Government}, booktitle = {Advances in Digital Government - Technology, Human Factors, and Policy}, series = {Advances in Database Systems}, volume = {26}, pages = {121--136}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/0-306-47374-7\_7}, doi = {10.1007/0-306-47374-7\_7}, timestamp = {Tue, 16 May 2017 14:24:24 +0200}, biburl = {https://dblp.org/rec/series/ads/JoshiGAS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/JoshiAGS01, author = {James Joshi and Walid G. Aref and Arif Ghafoor and Eugene H. Spafford}, title = {Security models for web-based applications}, journal = {Commun. {ACM}}, volume = {44}, number = {2}, pages = {38--44}, year = {2001}, url = {https://doi.org/10.1145/359205.359224}, doi = {10.1145/359205.359224}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/JoshiAGS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/JoshiGAS01, author = {James Joshi and Arif Ghafoor and Walid G. Aref and Eugene H. Spafford}, title = {Digital Government Security Infrastructure Design Challenges}, journal = {Computer}, volume = {34}, number = {2}, pages = {66--72}, year = {2001}, url = {https://doi.org/10.1109/2.901169}, doi = {10.1109/2.901169}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/JoshiGAS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icmcs/JoshiG00, author = {James Joshi and Arif Ghafoor}, title = {A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents}, booktitle = {2000 {IEEE} International Conference on Multimedia and Expo, {ICME} 2000, New York, NY, USA, July 30 - August 2, 2000}, pages = {533--536}, publisher = {{IEEE} Computer Society}, year = {2000}, url = {https://doi.org/10.1109/ICME.2000.869656}, doi = {10.1109/ICME.2000.869656}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icmcs/JoshiG00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/srds/SedighJBG98, author = {Sahra Sedigh and James Joshi and Ahmed R. Bashandy and Arif Ghafoor}, title = {Evaluation of Filtering Mechanisms for {MPEG} Video Communications}, booktitle = {The Seventeenth Symposium on Reliable Distributed Systems, {SRDS} 1998, West Lafayette, Indiana, USA, October 20-22, 1998, Proceedings}, pages = {449--454}, publisher = {{IEEE} Computer Society}, year = {1998}, url = {https://doi.org/10.1109/RELDIS.1998.740539}, doi = {10.1109/RELDIS.1998.740539}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/srds/SedighJBG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.