Vijay Atluri
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
143 | Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri: Effective anonymization of query logs. CIKM 2009: 1465-1468 | |
142 | Heechang Shin, Vijayalakshmi Atluri: Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. DBSec 2009: 159-174 | |
141 | Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya: An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 | |
140 | Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong: Extended Boolean Matrix Decomposition. ICDM 2009: 317-326 | |
139 | Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri: Towards formal security analysis of GTRBAC using timed automata. SACMAT 2009: 33-42 | |
138 | Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijay Atluri: Preserving Privacy in Social Networks: A Structure-Aware Approach. Web Intelligence 2009: 647-654 | |
137 | Li Qin, Vijayalakshmi Atluri: Evaluating the validity of data instances against ontology evolution over the Semantic Web. Information & Software Technology 51(1): 83-97 (2009) | |
136 | Vandana Pursnani Janeja, Vijayalakshmi Atluri: Spatial outlier detection in heterogeneous neighborhoods. Intell. Data Anal. 13(1): 85-107 (2009) | |
135 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu: Edge-RMP: Minimizing administrative assignments for role-based access control. Journal of Computer Security 17(2): 211-235 (2009) | |
134 | Dihua Guo, Hui Xiong, Vijayalakshmi Atluri, Nabil R. Adam: Object discovery in high-resolution remote sensing images: a semantic perspective. Knowl. Inf. Syst. 19(2): 211-233 (2009) | |
2008 | ||
133 | Vijay Atluri, Marianne Winslett: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008 ACM 2008 | |
132 | Vijay Atluri: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings Springer 2008 | |
131 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri: The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ACSAC 2008: 237-246 | |
130 | Nabil R. Adam, Vijay Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, Hui Xiong: Secure information sharing and analysis for effective emergency management. DG.O 2008: 407-408 | |
129 | Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri: Optimal Boolean Matrix Decomposition: Application to Role Engineering. ICDE 2008: 297-306 | |
128 | Heechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. MDM 2008: 73-80 | |
127 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam: Migrating to optimal RBAC with minimal perturbation. SACMAT 2008: 11-20 | |
126 | David F. Ferraiolo, Vijay Atluri: A meta model for access control: why is it needed and is it even possible to achieve? SACMAT 2008: 153-154 | |
125 | Vijay Atluri: Panel on role engineering. SACMAT 2008: 61-62 | |
124 | Soon Ae Chun, Vijay Atluri: Security Models, Geospatial. Encyclopedia of GIS 2008: 1028-1036 | |
123 | Vijay Atluri, Heechang Shin: Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2008: 379-385 | |
122 | Vandana Pursnani Janeja, Vijayalakshmi Atluri: Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. IEEE Trans. Knowl. Data Eng. 20(10): 1378-1392 (2008) | |
121 | Vijayalakshmi Atluri, Heechang Shin, Jaideep Vaidya: Efficient security policy enforcement for the mobile environment. Journal of Computer Security 16(4): 439-475 (2008) | |
2007 | ||
120 | Peng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
119 | Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007 | |
118 | Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007 | |
117 | Vijayalakshmi Atluri, Heechang Shin: Efficient Security Policy Enforcement in a Location Based Service Environment. DBSec 2007: 61-76 | |
116 | Soon Ae Chun, Nabil R. Adam, Vijay Atluri: MENVIS: mobile environmental information system. DG.O 2007: 286-287 | |
115 | Dihua Guo, Hui Xiong, Vijay Atluri, Nabil R. Adam: Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery. PAKDD 2007: 71-83 | |
114 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo: The role mining problem: finding a minimal descriptive set of roles. SACMAT 2007: 175-184 | |
113 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya: Using semantics for automatic enforcement of access control policies among dynamic coalitions. SACMAT 2007: 235-244 | |
112 | Vijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni: A decentralized execution model for inter-organizational workflows. Distributed and Parallel Databases 22(1): 55-83 (2007) | |
2006 | ||
111 | Aditya Bagchi, Vijayalakshmi Atluri: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings Springer 2006 | |
110 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner: RoleMiner: mining roles using subset enumeration. ACM Conference on Computer and Communications Security 2006: 144-153 | |
109 | Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77 | |
108 | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari: A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. DBSec 2006: 209-223 | |
107 | Vijayalakshmi Atluri, Heechang Shin: Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. DBSec 2006: 237-251 | |
106 | Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse. DEXA 2006: 439-448 | |
105 | Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner: Secure interoperation for effective data mining in border control and homeland security applications. DG.O 2006: 124-125 | |
104 | Soon Ae Chun, Yelena Yesha, Nabil R. Adam, Vijay Atluri: Challenges in eGovernment technology transfer. DG.O 2006: 151-152 | |
103 | Nabil R. Adam, Vijay Atluri, Soon Ae Chun, Francisco J. Artigas, Irfan Bora, Bob Ceberio: Constituent-centric municipal government coalition portal. DG.O 2006: 365-366 | |
102 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, J. Cooper, J. Paczkowski, Christof Bornhövd, I. Nassi, Joachim Schaper: Semantics-based threat structure mining. DG.O 2006: 367-368 | |
101 | Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Preview: Optimizing View Materialization Cost in Spatial Data Warehouses. DaWaK 2006: 45-54 | |
100 | Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri: Semantically enhanced enforcement of mobile consumer's privacy preferences. SAC 2006: 1172-1176 | |
99 | Janice Warner, Vijayalakshmi Atluri: Inter-instance authorization constraints for secure workflow management. SACMAT 2006: 190-199 | |
98 | Li Qin, Vijayalakshmi Atluri: SemDiff: An Approach to Detecting Semantic Changes to Ontologies. Int. J. Semantic Web Inf. Syst. 2(4): 1-32 (2006) | |
97 | Li Qin, Vijayalakshmi Atluri: An Ontology-Guided Approach to Change Detection of the Semantic Web Data. J. Data Semantics V: 130-157 (2006) | |
2005 | ||
96 | Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005 | |
95 | Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005 | |
94 | Vijay Atluri, Sabrina De Capitani di Vimercati, Roger Dingledine: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 | |
93 | Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005 | |
92 | Vijay Atluri, Pierangela Samarati, Atsuhiro Goto: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005 ACM 2005 | |
91 | Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005 | |
90 | Vijay Atluri, Angelos D. Keromytis: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 ACM Press 2005 | |
89 | Dong-Ho Kim, Il Im, Vijayalakshmi Atluri: A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. CEC 2005: 84-91 | |
88 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. DBSec 2005: 252-266 | |
87 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin: DM-AMS: employing data mining techniques for alert management. DG.O 2005: 103-111 | |
86 | Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun, Patrizia Fariselli, Julia Culver-Hopper, Olana Bojic, Rick T. Stewart, Jim Fruscione, Nick Mannochio: Technology transfer of inter-agency government services and their transnational feasibility studies. DG.O 2005: 225-226 | |
85 | Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal: Agency interoperation for effective data mining in border control and homeland security applications. DG.O 2005: 285-286 | |
84 | Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Selective View Materialization in a Spatial Data Warehouse. DaWaK 2005: 157-167 | |
83 | Vijayalakshmi Atluri, Qi Guo: Unified Index for Mobile Object Data and Authorizations. ESORICS 2005: 80-97 | |
82 | Vandana Pursnani Janeja, Vijayalakshmi Atluri: FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. ICDM 2005: 661-664 | |
81 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ICISS 2005: 134-147 | |
80 | Dihua Guo, Vijayalakshmi Atluri, Nabil R. Adam: Texture-Based Remote-Sensing Image Segmentation. ICME 2005: 1472-1475 | |
79 | Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri: Adapting spatial constraints of composite multimedia objects to achieve universal access. IPCCC 2005: 519-525 | |
78 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam: Collusion Set Detection Through Outlier Discovery. ISI 2005: 1-13 | |
77 | Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri: Color Time Petri Net for Interactive Adaptive Multimedia Objects. MMM 2005: 147-157 | |
76 | Mahmoud Youssef, Vijayalakshmi Atluri, Nabil R. Adam: Preserving mobile customer privacy: an access control system for moving objects and customer profiles. Mobile Data Management 2005: 67-76 | |
75 | Vandana Pursnani Janeja, Vijayalakshmi Atluri: LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. SAC 2005: 493-497 | |
74 | Vijayalakshmi Atluri, Janice Warner: Supporting conditional delegation in secure workflow management systems. SACMAT 2005: 49-58 | |
73 | Vijay Atluri: Preface. ACM Trans. Inf. Syst. Secur. 8(1): 2 (2005) | |
72 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Using Semantics for Policy-Based Web Service Composition. Distributed and Parallel Databases 18(1): 37-64 (2005) | |
2004 | ||
71 | Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick Drew McDaniel: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004 ACM 2004 | |
70 | Vijay Atluri: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004 ACM 2004 | |
69 | Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004 | |
68 | Vijay Atluri, Paul F. Syverson, Sabrina De Capitani di Vimercati: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 ACM 2004 | |
67 | Vijayalakshmi Atluri, Qi Guo: STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. DBSec 2004: 31-47 | |
66 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja: Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications. DG.O 2004 | |
65 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam: Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations. DG.O 2004 | |
64 | Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun: Human-Centered Systems for Business Services. DG.O 2004 | |
63 | Li Qin, Vijayalakshmi Atluri: Ontology-Guided Change Detection to the Semantic Web Data. ER 2004: 624-638 | |
62 | Vijayalakshmi Atluri, Janice Warner: Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. ICDCIT 2004: 369-378 | |
61 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Policy-Based Web Service Composition. RIDE 2004: 85-92 | |
60 | Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri: Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. SAC 2004: 576-583 | |
59 | Dong-Ho Kim, Il Im, Vijayalakshmi Atluri, Michael Bieber, Nabil R. Adam, Yelena Yesha: A clickstream-based collaborative filtering personalization model: towards a better performance. WIDM 2004: 88-95 | |
58 | Vijayalakshmi Atluri, Soon Ae Chun: An Authorization Model for Geospatial Data. IEEE Trans. Dependable Sec. Comput. 1(4): 238-254 (2004) | |
57 | Vijayalakshmi Atluri, Indrakshi Ray: Editors' message for the special issue on security. Int. J. on Digital Libraries 4(3): 137-138 (2004) | |
56 | Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni: Chinese wall security for decentralized workflow management systems. Journal of Computer Security 12(6): 799-840 (2004) | |
2003 | ||
55 | Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003 | |
54 | Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni: Supporting Delegation in Secure Workflow Management Systems. DBSec 2003: 190-202 | |
53 | Vijayalakshmi Atluri, Soon Ae Chun: Handling Dynamic Changes in Decentralized Workflow Execution Environments. DEXA 2003: 813-825 | |
52 | Aabhas V. Paliwal, Nabil R. Adam, Vijayalakshmi Atluri: Electronic Negotiation of Government Contracts through Transducers. DG.O 2003 | |
51 | Soon Ae Chun, Vijayalakshmi Atluri: Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery. DG.O 2003 | |
50 | Li Qin, Vijayalakshmi Atluri: An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories. EC-Web 2003: 227-236 | |
49 | Vijayalakshmi Atluri, Nabil R. Adam, Ahmed Gomaa, Igg Adiwijaya: Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints. SAC 2003: 927-934 | |
48 | Li Qin, Vijayalakshmi Atluri: Concept-level access control for the Semantic Web. XML Security 2003: 94-103 | |
47 | Vijay Atluri, Anupam Joshi, Yelena Yesha: Guest editorial. VLDB J. 12(4): 285 (2003) | |
2002 | ||
46 | Vijayalakshmi Atluri: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18-22, 2002 ACM 2002 | |
45 | Vijayalakshmi Atluri, Pietro Mazzoleni: Uniform Indexing for Geospatial Data and Authorizations. DBSec 2002: 207-218 | |
44 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Domain Knowledge-Based Automatic Workflow Generation. DEXA 2002: 81-92 | |
43 | Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Dynamic Composition of Workflows for Customized eGovernment Service Delivery. DG.O 2002 | |
42 | Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam: OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. DG.O 2002 | |
41 | Avigdor Gal, Vijayalakshmi Atluri, Gang Xu: An Authorization System for Temporal Data. ICDE 2002: 339-340 | |
40 | Vijayalakshmi Atluri, Avigdor Gal: An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur. 5(1): 62-94 (2002) | |
39 | Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari: A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14(2): 296-315 (2002) | |
38 | Vijayalakshmi Atluri, Ravi Mukkamala: Employing an extended transaction model in multilevel secure transaction processing. Informatica (Slovenia) 26(2): (2002) | |
37 | Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo: An authorization system for digital libraries. VLDB J. 11(1): 58-67 (2002) | |
2001 | ||
36 | Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni: A Chinese wall security model for decentralized workflow systems. ACM Conference on Computer and Communications Security 2001: 48-57 | |
35 | Richard D. Holowczak, Soon Ae Chun, Francisco J. Artigas, Vijayalakshmi Atluri: Customized Geospatial Workflows for E-Government Services. ACM-GIS 2001: 64-69 | |
34 | Vijayalakshmi Atluri, Ravi Mukkamala: An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. DBSec 2001: 255-268 | |
33 | Chiara Ghirardini, Soon Ae Chun, Vijayalakshmi Atluri, Ibrahim Kamel, Nabil R. Adam: A Study on the Indexing of Satellite Images at NASA Regional Application Center. DEXA Workshop 2001: 859-864 | |
32 | Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri: Modeling and Evaluation of Distributed Workflow Algorithms. ISAS-SCI (1) 2001: 183-188 | |
31 | Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya, Sujata Banerjee, Richard D. Holowczak: A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects. IEEE Trans. Knowl. Data Eng. 13(4): 705-716 (2001) | |
30 | Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001) | |
2000 | ||
29 | Vijayalakshmi Atluri, John Hale: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA Kluwer 2000 | |
28 | Avigdor Gal, Vijayalakshmi Atluri: An authorization model for temporal data. ACM Conference on Computer and Communications Security 2000: 144-153 | |
27 | Soon Ae Chun, Vijayalakshmi Atluri: Protecting Privacy from Continuous High-resolution Satellite Surveillance. DBSec 2000: 233-244 | |
26 | Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373 | |
25 | Vijayalakshmi Atluri, Ravi Mukkamala: Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. MASCOTS 2000: 248- | |
24 | Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya: SI in Digital Libraries. Commun. ACM 43(6): 64-72 (2000) | |
23 | Vijayalakshmi Atluri, Pierangela Samarati: Security of Data and Transaction Processing - Guest Editor's Introduction. Distributed and Parallel Databases 8(1): 5-6 (2000) | |
22 | Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino: A Semantic-Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1): (2000) | |
21 | Vijayalakshmi Atluri, Wei-kuang Huang: A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security 8(2/3): (2000) | |
1999 | ||
20 | Wei-kuang Huang, Vijayalakshmi Atluri: SecureFlow: A Secure Web-Enabled Workflow Management System. ACM Workshop on Role-Based Access Control 1999: 83-94 | |
19 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104 (1999) | |
1998 | ||
18 | Vijayalakshmi Atluri, David L. Spooner: Workshop Summary. DBSec 1998: 287-293 | |
17 | Wei-kuang Huang, Vijayalakshmi Atluri: Analysing the Safety of Workflow Authorization Models. DBSec 1998: 43-57 | |
16 | Vijayalakshmi Atluri: Modification of Integrity Constraints Through Knowledge Discovery. IICIS 1998: 191-209 | |
15 | Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang: Modeling and Analysis of Workflows Using Petri Nets. J. Intell. Inf. Syst. 10(2): 131-158 (1998) | |
1997 | ||
14 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri: A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ACM Workshop on Role-Based Access Control 1997: 1-12 | |
13 | Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino: An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165 | |
12 | Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997) | |
11 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: A theoretical formulation for degrees of isolation in databases. Information & Software Technology 39(1): 47-53 (1997) | |
10 | Vijayalakshmi Atluri, Wei-kuang Huang: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. Journal of Computer Security 5(4): 303-340 (1997) | |
1996 | ||
9 | Vijayalakshmi Atluri, Wei-kuang Huang: An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. DBSec 1996: 240-258 | |
8 | Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 | |
7 | Vijayalakshmi Atluri, Wei-kuang Huang: An Authorization Model for Workflows. ESORICS 1996: 44-64 | |
6 | Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996) | |
1995 | ||
5 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247 | |
4 | Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) | |
1994 | ||
3 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274 | |
1993 | ||
2 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158 | |
1 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. Journal of Computer Security 2(4): 311-352 (1993) |