2009 | ||
---|---|---|
373 | Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang: Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]. Springer 2009 | |
372 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. DBSec 2009: 225-239 | |
371 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Keep a Few: Outsourcing Data While Maintaining Confidentiality. ESORICS 2009: 440-455 | |
370 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases. ICDCS 2009: 32-39 | |
369 | Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. Mobile Data Management 2009: 172-181 | |
368 | Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang, Sushil Jajodia: Privacy-Aware Proximity Based Services. Mobile Data Management 2009: 31-40 | |
367 | Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: Anonymity and Historical-Anonymity in Location-Based Services. Privacy in Location-Based Applications 2009: 1-30 | |
366 | Claudio Agostino Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou: Privacy Preservation over Untrusted Mobile Networks. Privacy in Location-Based Applications 2009: 84-105 | |
365 | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: L-Cover: Preserving Diversity by Anonymity. Secure Data Management 2009: 158-171 | |
364 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Granularity. Encyclopedia of Database Systems 2009: 2968-2973 | |
363 | Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia: Secure median computation in wireless sensor networks. Ad Hoc Networks 7(8): 1448-1462 (2009) | |
362 | Eduardo Fernández-Medina, Jan Jürjens, Juan Trujillo, Sushil Jajodia: Model-Driven Development for secure information systems. Information & Software Technology 51(5): 809-814 (2009) | |
361 | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009) | |
360 | Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi V. Mancini: Privacy-preserving robust data aggregation in wireless sensor networks. Security and Communication Networks 2(2): 195-213 (2009) | |
2008 | ||
359 | Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang: Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 CEUR-WS.org 2008 | |
358 | Sushil Jajodia, Pierangela Samarati, Stelvio Cimato: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy Springer 2008 | |
357 | Sushil Jajodia, Javier López: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings Springer 2008 | |
356 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Assessing query privileges via safe and efficient permission composition. ACM Conference on Computer and Communications Security 2008: 311-322 | |
355 | Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky: Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. DBSec 2008: 190-204 | |
354 | Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati: Regulating Exceptions in Healthcare Using Policy Spaces. DBSec 2008: 254-267 | |
353 | Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia: An Attack Graph-Based Probabilistic Security Metric. DBSec 2008: 283-296 | |
352 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Controlled Information Sharing in Collaborative Distributed Query Processing. ICDCS 2008: 303-310 | |
351 | Lei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia: A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling. POLICY 2008: 181-188 | |
350 | Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin: A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks. PiLBA 2008 | |
349 | Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008 | |
348 | Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring network security using dynamic bayesian network. QoP 2008: 23-30 | |
347 | Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Model-Based Covert Timing Channels: Automated Modeling and Evasion. RAID 2008: 211-230 | |
346 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15 | |
345 | Lei Zhang, Sushil Jajodia, Alexander Brodsky: Simulatable Binding: Beyond Simulatable Auditing. Secure Data Management 2008: 16-31 | |
344 | Yih Huang, Angelos Stavrou, Anup K. Ghosh, Sushil Jajodia: Efficiently tracking application interactions using lightweight virtualization. VMSec 2008: 19-28 | |
343 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati: Preserving confidentiality of security policies in data outsourcing. WPES 2008: 75-84 | |
342 | Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Data Security. Wiley Encyclopedia of Computer Science and Engineering 2008 | |
341 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Detecting VoIP Floods Using the Hellinger Distance. IEEE Trans. Parallel Distrib. Syst. 19(6): 794-805 (2008) | |
340 | Steven Noel, Sushil Jajodia: Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. J. Network Syst. Manage. 16(3): 259-275 (2008) | |
339 | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Implementing interactive analysis of attack graphs using relational databases. Journal of Computer Security 16(4): 419-437 (2008) | |
338 | Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia: Achieving simultaneous distribution control and privacy protection for Internet media delivery. TOMCCAP 4(2): (2008) | |
2007 | ||
337 | Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007 | |
336 | Lei Zhang, Sushil Jajodia, Alexander Brodsky: Information disclosure under realistic assumptions: privacy versus optimality. ACM Conference on Computer and Communications Security 2007: 573-583 | |
335 | Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy: Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. ACSAC 2007: 257-267 | |
334 | Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Trust management services in relational databases. ASIACCS 2007: 149-160 | |
333 | Sushil Jajodia: Topological analysis of network attack vulnerability. ASIACCS 2007: 2 | |
332 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: A data outsourcing architecture combining cryptography and access control. CSAW 2007: 63-69 | |
331 | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Measuring the Overall Security of Network Configurations Using Attack Graphs. DBSec 2007: 98-112 | |
330 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Fragmentation and Encryption to Enforce Privacy in Data Storage. ESORICS 2007: 171-186 | |
329 | Xinyuan Wang, Shiping Chen, Sushil Jajodia: Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems. IEEE Symposium on Security and Privacy 2007: 116-130 | |
328 | Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia: Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76 | |
327 | Claudio Bettini, Sushil Jajodia, Linda Pareschi: Anonymity and Diversity in LBS: A Preliminary Investigation. PerCom Workshops 2007: 577-580 | |
326 | Lingyu Wang, Anoop Singhal, Sushil Jajodia: Toward measuring network security using attack graphs. QoP 2007: 49-54 | |
325 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. SEC 2007: 385-396 | |
324 | Alexander Brodsky, Lei Zhang, Sushil Jajodia: Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases. Secure Data Management 2007: 81-95 | |
323 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Over-encryption: Management of Access Control Evolution on Outsourced Data. VLDB 2007: 123-134 | |
322 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati: Access Control Policies and Languages in Open Environments. Secure Data Management in Decentralized Systems 2007: 21-58 | |
321 | Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 | |
320 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Preserving Privacy in On-line Analytical Processing Data Cubes. Secure Data Management in Decentralized Systems 2007: 355-380 | |
319 | Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia: Trusted Recovery. Secure Data Management in Decentralized Systems 2007: 59-94 | |
318 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient security mechanisms for overlay multicast based content delivery. Computer Communications 30(4): 793-806 (2007) | |
317 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Selective Data Encryption in Outsourced Dynamic Environments. Electr. Notes Theor. Comput. Sci. 168: 127-142 (2007) | |
316 | Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann: Can-Follow Concurrency Control. IEEE Trans. Computers 56(10): 1425-1430 (2007) | |
315 | Huiping Guo, Yingjiu Li, Sushil Jajodia: Chaining watermarks for detecting malicious modifications to streaming data. Inf. Sci. 177(1): 281-298 (2007) | |
314 | Lingyu Wang, Yingjiu Li, Sushil Jajodia, Duminda Wijesekera: Parity-based inference control for multi-dimensional range sum queries. Journal of Computer Security 15(4): 417-445 (2007) | |
313 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. TOSN 3(3): (2007) | |
2006 | ||
312 | Ferng-Ching Lin, Der-Tsai Lee, Bao-Shuh Paul Lin, Shiuhpyng Shieh, Sushil Jajodia: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 ACM 2006 | |
311 | Bo Zhu, Sanjeev Setia, Sushil Jajodia: Providing witness anonymity in peer-to-peer systems. ACM Conference on Computer and Communications Security 2006: 6-16 | |
310 | Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia: V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. ACSAC 2006: 43-56 | |
309 | Nicola Zannone, Sushil Jajodia, Duminda Wijesekera: Creating Objects in the Flexible Authorization Framework. DBSec 2006: 1-14 | |
308 | Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia: Interactive Analysis of Attack Graphs Using Relational Queries. DBSec 2006: 119-132 | |
307 | Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia: VoIP Intrusion Detection Through Interacting Protocol State Machines. DSN 2006: 393-402 | |
306 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia: Fast Detection of Denial-of-Service Attacks on IP Telephony. IWQoS 2006: 199-208 | |
305 | Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia: Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure. IWQoS 2006: 209-218 | |
304 | Lei Zhang, Alexander Brodsky, Sushil Jajodia: Toward Information Sharing: Benefit And Risk Access Control (BARAC). POLICY 2006: 45-53 | |
303 | Sushil Jajodia: Topological analysis of network attack vulnerability. PST 2006: 2 | |
302 | Joseph Pamula, Sushil Jajodia, Paul Ammann, Vipin Swarup: A weakest-adversary security metric for network configuration security analysis. QoP 2006: 31-38 | |
301 | Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia: A robust watermarking system based on SVD compression. SAC 2006: 1341-1347 | |
300 | David Keppler, Vipin Swarup, Sushil Jajodia: Redirection policies for mission-based information sharing. SACMAT 2006: 210-218 | |
299 | Sankardas Roy, Sanjeev Setia, Sushil Jajodia: Attack-resilient hierarchical data aggregation in sensor networks. SASN 2006: 71-82 | |
298 | Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald W. Ritchey: A framework for establishing, assessing, and managing trust in inter-organizational relationships. SWS 2006: 23-32 | |
297 | Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17 | |
296 | Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186 | |
295 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A lightweight network access control protocol for ad hoc networks. Ad Hoc Networks 4(5): 567-585 (2006) | |
294 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: The Role of Quasi-identifiers in k-Anonymity Revisited CoRR abs/cs/0611035: (2006) | |
293 | Lingyu Wang, Anyi Liu, Sushil Jajodia: Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts. Computer Communications 29(15): 2917-2933 (2006) | |
292 | Lingyu Wang, Steven Noel, Sushil Jajodia: Minimum-cost network hardening using attack graphs. Computer Communications 29(18): 3812-3824 (2006) | |
291 | Anoop Singhal, Sushil Jajodia: Data warehousing and data mining techniques for intrusion detection systems. Distributed and Parallel Databases 20(2): 149-166 (2006) | |
290 | Shiping Chen, Xinyuan Wang, Sushil Jajodia: On the anonymity and traceability of peer-to-peer VoIP calls. IEEE Network 20(5): 32-37 (2006) | |
289 | Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia: SS7 over IP: signaling interworking vulnerabilities. IEEE Network 20(6): 32-41 (2006) | |
288 | Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli: Building trust in peer-to-peer systems: a review. IJSN 1(1/2): 103-112 (2006) | |
287 | Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176(10): 1350-1378 (2006) | |
286 | Csilla Farkas, Alexander Brodsky, Sushil Jajodia: Unauthorized inferences in semistructured databases. Inf. Sci. 176(22): 3269-3299 (2006) | |
285 | Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006) | |
284 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Journal of Computer Security 14(4): 301-325 (2006) | |
283 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP+: Efficient security mechanisms for large-scale distributed sensor networks. TOSN 2(4): 500-528 (2006) | |
2005 | ||
282 | Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous: Journal on Data Semantics II Springer 2005 | |
281 | Sushil Jajodia, Duminda Wijesekera: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Springer 2005 | |
280 | Sushil Jajodia, Chandan Mazumdar: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings Springer 2005 | |
279 | Xinyuan Wang, Shiping Chen, Sushil Jajodia: Tracking anonymous peer-to-peer VoIP calls on the internet. ACM Conference on Computer and Communications Security 2005: 81-91 | |
278 | Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia: Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution. ACNS 2005: 40-55 | |
277 | Steven Noel, Sushil Jajodia: Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. ACSAC 2005: 160-169 | |
276 | Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia: Policies, Models, and Languages for Access Control. DNIS 2005: 225-237 | |
275 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: Authentication and Integrity in Telecommunication Signaling Network. ECBS 2005: 163-170 | |
274 | Lingyu Wang, Anyi Liu, Sushil Jajodia: An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. ESORICS 2005: 247-266 | |
273 | Hemant Sengar, Duminda Wijesekera, Sushil Jajodia: MTPSec: Customizable Secure MTP3 Tunnels in the SS7 Network. IPDPS 2005 | |
272 | Vipin Swarup, Sushil Jajodia, Joseph Pamula: Rule-Based Topological Vulnerability Analysis. MMM-ACNS 2005: 23-37 | |
271 | Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia: Practical Broadcast Authentication in Sensor Networks. MobiQuitous 2005: 118-132 | |
270 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Metadata Management in Outsourced Encrypted Databases. Secure Data Management 2005: 16-32 | |
269 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199 | |
268 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Key management for multi-user encrypted databases. StorageSS 2005: 74-83 | |
267 | Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia: Checking for k-Anonymity Violation by Views. VLDB 2005: 910-921 | |
266 | Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia: Multiple Coordinated Views for Network Attack Graphs. VizSEC 2005: 12 | |
265 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera: Maintaining privacy on derived objects. WPES 2005: 10-19 | |
264 | Anoop Singhal, Sushil Jajodia: Data Mining for Intrusion Detection. The Data Mining and Knowledge Discovery Handbook 2005: 1225-1237 | |
263 | Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Modeling and assessing inference exposure in encrypted databases. ACM Trans. Inf. Syst. Secur. 8(1): 119-152 (2005) | |
262 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans. Dependable Sec. Comput. 2(1): 34-45 (2005) | |
261 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Information Release Control: A Learning-Based Architecture. J. Data Semantics 2: 176-198 (2005) | |
2004 | ||
260 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Information Security Management, Education and Privacy, IFIP 18th World Computer Congress, TC11 19th International Information Security Workshops, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
259 | Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang: Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France Kluwer 2004 | |
258 | Steven Noel, Eric Robertson, Sushil Jajodia: Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. ACSAC 2004: 350-359 | |
257 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. DBSec 2004: 81-94 | |
256 | Yingjiu Li, Huiping Guo, Sushil Jajodia: Tamper detection and localization for categorical data using fragile watermarks. Digital Rights Management Workshop 2004: 73-82 | |
255 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: Incorporating Dynamic Constraints in the Flexible Authorization Framework. ESORICS 2004: 1-16 | |
254 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: A logic-based framework for attribute based access control. FMSE 2004: 45-55 | |
253 | Sushil Jajodia, Duminda Wijesekera: A Flexible Authorization Framework for E-Commerce. ICDCIT 2004: 336-345 | |
252 | Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia: Implementing Consistency Checking in Correlating Attacks. ICDCIT 2004: 379-384 | |
251 | Lingyu Wang, Sushil Jajodia, Duminda Wijesekera: Securing OLAP Data Cubes Against Privacy Breaches. IEEE Symposium on Security and Privacy 2004: 161- | |
250 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning: An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. IEEE Symposium on Security and Privacy 2004: 259-271 | |
249 | Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia: GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. MobiQuitous 2004: 42-51 | |
248 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201 | |
247 | Steven Noel, Sushil Jajodia: Managing attack graph complexity through visual hierarchical aggregation. VizSEC 2004: 109-118 | |
246 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004) | |
245 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-based inference control in data cubes. Journal of Computer Security 12(5): 655-692 (2004) | |
2003 | ||
244 | Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003 | |
243 | Sushil Jajodia, Pierangela Samarati, Paul F. Syverson: Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 ACM 2003 | |
242 | Sushil Jajodia, Michiharu Kudo: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003 ACM 2003 | |
241 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP: efficient security mechanisms for large-scale distributed sensor networks. ACM Conference on Computer and Communications Security 2003: 62-72 | |
240 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati: Balancing confidentiality and efficiency in untrusted relational DBMSs. ACM Conference on Computer and Communications Security 2003: 93-102 | |
239 | Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs: Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. ACSAC 2003: 86-95 | |
238 | Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeff Hoyt: Securely sharing neuroimagery. CIKM 2003: 375-377 | |
237 | Shiping Chen, Duminda Wijesekera, Sushil Jajodia: FlexFlow: A Flexible Flow Control Policy Specification Framework. DBSec 2003: 358-371 | |
236 | Yingjiu Li, Vipin Swarup, Sushil Jajodia: Constructing a virtual primary key for fingerprinting relational data. Digital Rights Management Workshop 2003: 133-141 | |
235 | Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia: Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. ESORICS 2003: 100-115 | |
234 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Performance Optimizations for Group Key Management Scheme. ICDCS 2003: 163- | |
233 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: LHAP: A Lightweight Hop-by-Hop Authentication Protocol for Ad-Hoc Networks. ICDCS Workshops 2003: 749- | |
232 | Sencun Zhu, Shouhuai Xu, Sanjeev Setia, Sushil Jajodia: Establishing Pairwise Keys for Secure Communication in Ad Hoc Networks: A Probabilistic Approach. ICNP 2003: 326-335 | |
231 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Mario Finetti, Stefano Paraboschi, Pierangela Samarati, Sushil Jajodia: Implementation of a Storage Mechanism for Untrusted DBMSs. IEEE Security in Storage Workshop 2003: 38-46 | |
230 | Sencun Zhu, Sushil Jajodia: Scalable Group Rekeying for Secure Multicast: A Survey. IWDC 2003: 1-10 | |
229 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Networked Group Communication 2003: 107-118 | |
228 | Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto: Bootstrapping a Data Mining Intrusion Detection System. SAC 2003: 421-425 | |
227 | Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle: A User Friendly Guard with Mobile Post-Release Access Control Policy. SEC 2003: 265-276 | |
226 | Sencun Zhu, Sanjeev Setia, Sushil Jajodia: LEAP - efficient security mechanisms for large-scale distributed sensor networks. SenSys 2003: 308-309 | |
225 | Sushil Jajodia: Recent Advances in Access Control Models. WAIM 2003: 1 | |
224 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström: Removing permissions in the flexible authorization framework. ACM Trans. Database Syst. 28(3): 209-229 (2003) | |
223 | Duminda Wijesekera, Sushil Jajodia: A propositional policy algebra for access control. ACM Trans. Inf. Syst. Secur. 6(2): 286-325 (2003) | |
222 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Providing secrecy in key management protocols for large wireless sensors networks. Ad Hoc Networks 1(4): 455-468 (2003) | |
221 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003) | |
220 | Alessandro Mei, Luigi V. Mancini, Sushil Jajodia: Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems. IEEE Trans. Parallel Distrib. Syst. 14(9): 885-896 (2003) | |
219 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): (2003) | |
218 | Daniel Barbará, Rajni Goel, Sushil Jajodia: A Checksum-based Corruption Detection Technique. Journal of Computer Security 11(3): 315-330 (2003) | |
2002 | ||
217 | Sushil Jajodia, Pierangela Samarati: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002 ACM 2002 | |
216 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control the predicate case. ACM Conference on Computer and Communications Security 2002: 171-180 | |
215 | Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567 | |
214 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Towards Secure XML Federations. DBSec 2002: 117-131 | |
213 | Daniel Barbará, Rajni Goel, Sushil Jajodia: Mining Malicious Corruption of Data with Hidden Markov Models. DBSec 2002: 175-189 | |
212 | Lingyu Wang, Duminda Wijesekera, Sushil Jajodia: Cardinality-Based Inference Control in Sum-Only Data Cubes. ESORICS 2002: 55-71 | |
211 | Yingjiu Li, Sencun Zhu, Lingyu Wang, Sushil Jajodia: A Privacy-Enhanced Microaggregation Method. FoIKS 2002: 148-159 | |
210 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12 | |
209 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Efficient and secure keys management for wireless mobile communications. POMC 2002: 66-73 | |
208 | Yingjiu Li, Lingyu Wang, Sushil Jajodia: Preventing Interval-Based Inference by Random Data Perturbation. Privacy Enhancing Technologies 2002: 160-170 | |
207 | Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia: Secure Selective Exclusion in Ad Hoc Wireless Network. SEC 2002: 423-434 | |
206 | Kenneth Smith, Donald B. Faatz, Amgad Fayad, Sushil Jajodia: Propagating Modifications to Mobile Policies. SEC 2002: 573-584 | |
205 | Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513 | |
204 | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002) | |
203 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002) | |
202 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002) | |
201 | Susan Chapin, Donald B. Faatz, Sushil Jajodia, Amgad Fayad: Consistent policy enforcement in distributed systems using mobile policies. Data Knowl. Eng. 43(3): 261-280 (2002) | |
200 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases 11(3): 269-306 (2002) | |
199 | Paul Ammann, Sushil Jajodia, Peng Liu: Recovery from Malicious Transactions. IEEE Trans. Knowl. Data Eng. 14(5): 1167-1185 (2002) | |
198 | Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002) | |
197 | Sanjeev Setia, Sencun Zhu, Sushil Jajodia: A comparative performance analysis of reliable group rekey transport protocols for secure multicast. Perform. Eval. 49(1/4): 21-41 (2002) | |
196 | Csilla Farkas, Sushil Jajodia: The Inference Problem: A Survey. SIGKDD Explorations 4(2): 6-11 (2002) | |
2001 | ||
195 | Hideko S. Kunii, Sushil Jajodia, Arne Sølvberg: Conceptual Modeling - ER 2001, 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001, Proceedings Springer 2001 | |
194 | Duminda Wijesekera, Sushil Jajodia: Policy algebras for access control: the propositional case. ACM Conference on Computer and Communications Security 2001: 38-47 | |
193 | Peng Liu, Sushil Jajodia: Multi-Phase Damage Confinement in Database Systems for Intrusion Tolerance. CSFW 2001: 191-205 | |
192 | Åsa Hagström, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera: Revocations-A Classification. CSFW 2001: 44-58 | |
191 | Ravi Mukkamala, Sushil Jajodia: A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238 | |
190 | Sushil Jajodia, Duminda Wijesekera: Recent Advances in Access Control Models. DBSec 2001: 3-15 | |
189 | Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia: Subject Switching Algorithms for Access Control in Federated Databases. DBSec 2001: 61-74 | |
188 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346 | |
187 | Amgad Fayad, Sushil Jajodia, Donald B. Faatz, Vinti Doshi: Going Beyond MAC and DAC Using Mobile Policies. SEC 2001: 245-260 | |
186 | Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118 | |
185 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian: Flexible support for multiple access control policies. ACM Trans. Database Syst. 26(2): 214-260 (2001) | |
184 | Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001) | |
183 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia: An authorization model for a public key management service. ACM Trans. Inf. Syst. Secur. 4(4): 453-482 (2001) | |
182 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding loss of fairness owing to failures in fair data exchange systems. Decision Support Systems 31(3): 337-350 (2001) | |
181 | Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001) | |
180 | Daniel Barbará, Julia Couto, Sushil Jajodia, Ningning Wu: ADAM: A Testbed for Exploring the Use of Data Mining in Intrusion Detection. SIGMOD Record 30(4): 15-24 (2001) | |
2000 | ||
179 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean: Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ACSAC 2000: 298-307 | |
178 | Daniel Barbará, Rajni Goel, Sushil Jajodia: Protecting File systems Against Corruption Using Checksums. DBSec 2000: 113-124 | |
177 | Susan Chapin, Donald B. Faatz, Sushil Jajodia: Distributed Policies for Data Management Making Policies Mobile. DBSec 2000: 63-76 | |
176 | Peng Liu, Peng Ning, Sushil Jajodia: Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange Protocols. DSN 2000: 631-640 | |
175 | Daniel Barbará, Rajni Goel, Sushil Jajodia: Using Checksums to Detect Data Corruption. EDBT 2000: 136-149 | |
174 | Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder: Kronos: A Scalable Group Re-Keying Approach for Secure Multicast. IEEE Symposium on Security and Privacy 2000: 215-228 | |
173 | Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180 | |
172 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-38 | |
171 | Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19 | |
170 | Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000) | |
169 | Peng Liu, Paul Ammann, Sushil Jajodia: Rewriting Histories: Recovering from Malicious Transactions. Distributed and Parallel Databases 8(1): 7-40 (2000) | |
168 | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Transaction Dependencies in Database Systems. Distributed and Parallel Databases 8(4): 399-446 (2000) | |
167 | Indrajit Ray, Luigi V. Mancini, Sushil Jajodia, Elisa Bertino: ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 12(6): 880-899 (2000) | |
166 | Alexander Brodsky, Csilla Farkas, Sushil Jajodia: Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures. IEEE Trans. Knowl. Data Eng. 12(6): 900-919 (2000) | |
165 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity. Inf. Sci. 129(1-4): 155-195 (2000) | |
164 | Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. Journal of Computer Security 8(4): (2000) | |
1999 | ||
163 | Sushil Jajodia: Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece Kluwer 1999 | |
162 | Amgad Fayad, Sushil Jajodia, Catherine D. McCollum: Application-Level Isolation Using Data Inconsistency Detection. ACSAC 1999: 119- | |
161 | Peng Liu, Sushil Jajodia, Catherine D. McCollum: Intrusion Confinement by Isolation in Information Systems. DBSec 1999: 3-18 | |
160 | Ravi Mukkamala, Jason Gagnon, Sushil Jajodia: Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46 | |
159 | Peng Liu, Paul Ammann, Sushil Jajodia: Incorporating Transaction Semantics to Reduce Reprocessing Overhead in Replicated Mobile Data Applications. ICDCS 1999: 414-423 | |
158 | Sushil Jajodia: Protecting Critical Information Systems (Abstract). ICICS 1999: 143 | |
157 | Paul Ammann, Sushil Jajodia: The Integrity Challenge. IICIS 1999: 59-70 | |
156 | Neil F. Johnson, Zoran Duric, Sushil Jajodia: Recovery of Watermarks from Distorted Images. Information Hiding 1999: 318-332 | |
155 | Neil F. Johnson, Zoran Duric, Sushil Jajodia: On Fingerprinting Images for Recognition. Multimedia Information Systems 1999: 4-11 | |
154 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: A Flexible Authorization Mechanism for Relational Data Management Systems. ACM Trans. Inf. Syst. 17(2): 101-140 (1999) | |
153 | Sushil Jajodia, Catherine D. McCollum, Paul Ammann: Trusted Recovery. Commun. ACM 42(7): 71-75 (1999) | |
152 | Sushil Jajodia, Paul Ammann, Catherine D. McCollum: Surviving Information Warfare Attacks. IEEE Computer 32(4): 57-63 (1999) | |
151 | Sushil Jajodia: Distributed Databases: Turing Award Winner Jim Gray on the new millennium. IEEE Concurrency 7(3): 9-10 (1999) | |
150 | Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia: Scalable Threshold Closure. Theor. Comput. Sci. 226(1-2): 185-206 (1999) | |
1998 | ||
149 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 Kluwer 1998 | |
148 | Opher Etzion, Sushil Jajodia, Suryanarayana M. Sripada: Temporal Databases: Research and Practice. (the book grow out of a Dagstuhl Seminar, June 23-27, 1997) Springer 1998 | |
147 | Sushil Jajodia, M. Tamer Özsu, Asuman Dogac: Advances in Multimedia Information Systems, 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998, Proceedings Springer 1998 | |
146 | Sushil Jajodia, Peng Liu, Catherine D. McCollum: Application-Level Isolation to Cope with Malicious Database Users. ACSAC 1998: 73-82 | |
145 | Sushil Jajodia, Luigi V. Mancini, Sanjeev Setia: A Fair Locking Protocol for Multilevel Secure Databases. CSFW 1998: 168-178 | |
144 | Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia: Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. CSFW 1998: 190-201 | |
143 | Bhavani M. Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier: Security and Privacy Issues for the World Wide Web: Panel Discussion. DBSec 1998: 269-284 | |
142 | Giovanni Rumolo, Sushil Jajodia: Algebra for Databases with Explicit Markings of Damaged Data. IICIS 1998: 103-129 | |
141 | Neil F. Johnson, Sushil Jajodia: Steganalysis of Images Created Using Current Steganography Software. Information Hiding 1998: 273-289 | |
140 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998) | |
139 | Neil F. Johnson, Sushil Jajodia: Exploring Steganography: Seeing the Unseen. IEEE Computer 31(2): 26-34 (1998) | |
138 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998) | |
137 | Elisa Bertino, Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Advanced Transaction Processing in Multilevel Secure File Stores. IEEE Trans. Knowl. Data Eng. 10(1): 120-135 (1998) | |
136 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin: Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998) | |
135 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998) | |
134 | Xiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni: Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. International Journal on Artificial Intelligence Tools 7(2): 319-339 (1998) | |
133 | Indrakshi Ray, Paul Ammann, Sushil Jajodia: A Semantic-Based Transaction Processing Model for Multilevel Transactions. Journal of Computer Security 6(3): 181-217 (1998) | |
1997 | ||
132 | Sushil Jajodia, William List, Graeme W. McGregor, Leon Strous: Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 Chapman Hall 1997 | |
131 | Sushil Jajodia, Larry Kerschberg: Advanced Transaction Models and Architectures Kluwer 1997 | |
130 | Sushil Jajodia, Indrakshi Ray, Paul Ammann: Implementing Semantic-Based Decomposition of Transactions. CAiSE 1997: 75-88 | |
129 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449 | |
128 | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 | |
127 | Bhavani M. Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton: Security Issues in Data Warehousing and Data Mining: Panel Discussion. DBSec 1997: 3-16 | |
126 | Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia: Providing flexibility in information flow control for object oriented systems. IEEE Symposium on Security and Privacy 1997: 130-140 | |
125 | Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Surviving information warfare attacks on databases. IEEE Symposium on Security and Privacy 1997: 164-174 | |
124 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian: A Logical Language for Expressing Authorizations. IEEE Symposium on Security and Privacy 1997: 31-42 | |
123 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino: A Unified Framework for Enforcing Multiple Access Control Policies. SIGMOD Conference 1997: 474-485 | |
122 | Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang: Temporal Database Bibliography Update. Temporal Databases, Dagstuhl 1997: 338-366 | |
121 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55 | |
120 | Christian S. Jensen, Curtis E. Dyreson, Michael H. Böhlen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Fabio Grandi, Patrick J. Hayes, Sushil Jajodia, Wolfgang Käfer, Nick Kline, Nikos A. Lorentzos, Yannis G. Mitsopoulos, Angelo Montanari, Daniel A. Nonen, Elisa Peressi, Barbara Pernici, John F. Roddick, Nandlal L. Sarda, Maria Rita Scalas, Arie Segev, Richard T. Snodgrass, Michael D. Soo, Abdullah Uz Tansel, Paolo Tiberio, Gio Wiederhold: The Consensus Glossary of Temporal Database Concepts - February 1998 Version. Temporal Databases, Dagstuhl 1997: 367-405 | |
119 | Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, Elisa Bertino: Flexible Commit Protocols for Advanced Transaction Processing. Advanced Transaction Models and Architectures 1997: 0- | |
118 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Semantic-Based Decomposition of Transactions. Advanced Transaction Models and Architectures 1997: 0- | |
117 | Sushil Jajodia: Database Security and Privacy. The Computer Science and Engineering Handbook 1997: 1112-1124 | |
116 | Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia: Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997) | |
115 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Applying Formal Methods to Semantic-Based Decomposition of Transactions. ACM Trans. Database Syst. 22(2): 215-254 (1997) | |
114 | Ouri Wolfson, Sushil Jajodia, Yixiu Huang: An Adaptive Data Replication Algorithm. ACM Trans. Database Syst. 22(2): 255-314 (1997) | |
113 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia: An Extended Authorization Model for Relational Databases. IEEE Trans. Knowl. Data Eng. 9(1): 85-101 (1997) | |
112 | Pierangela Samarati, Elisa Bertino, Alessandro Ciampichetti, Sushil Jajodia: Information Flow Control in Object-Oriented Systems. IEEE Trans. Knowl. Data Eng. 9(4): 524-538 (1997) | |
111 | Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997) | |
110 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: A theoretical formulation for degrees of isolation in databases. Information & Software Technology 39(1): 47-53 (1997) | |
109 | Sushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang: Information Systems Research at George Mason University. SIGMOD Record 26(4): 69-74 (1997) | |
1996 | ||
108 | V. S. Subrahmanian, Sushil Jajodia: Multimedia Database System: Issues and Research Direction Springer 1996 | |
107 | Indrajit Ray, Elisa Bertino, Sushil Jajodia, Luigi V. Mancini: An Advanced Commit Protocol for MLS Distributed Database Systems. ACM Conference on Computer and Communications Security 1996: 119-128 | |
106 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: A Non-Timestamped Authorization Model for Data Management Systems. ACM Conference on Computer and Communications Security 1996: 169-178 | |
105 | Sushil Jajodia, Luigi V. Mancini, Indrajit Ray: Secure Locking Protocols for Multilevel Database Management Systems. DBSec 1996: 177-194 | |
104 | Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 | |
103 | Donald G. Marks, Amihai Motro, Sushil Jajodia: Enhancing the Controlled Disclosure of Sensitive Information. ESORICS 1996: 290-303 | |
102 | K. Selçuk Candan, Sushil Jajodia, V. S. Subrahmanian: Secure Mediated Databases. ICDE 1996: 28-37 | |
101 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Ensuring Atomicity of Multilevel Transactions. IEEE Symposium on Security and Privacy 1996: 74-84 | |
100 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Supporting Multiple Access Control Policies in Database Systems. IEEE Symposium on Security and Privacy 1996: 94-107 | |
99 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. PODS 1996: 68-78 | |
98 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework and Reasoning Model for Time Granularity. TIME 1996: 104-111 | |
97 | Sushil Jajodia, Ravi Mukkamala: Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control. Performance of Concurrency Control Mechanisms in Centralized Database Systems 1996: 387-405 | |
96 | Sushil Jajodia: Database Security and Privacy. ACM Comput. Surv. 28(1): 129-131 (1996) | |
95 | Sushil Jajodia: Managing Security and Privacy of Information. ACM Comput. Surv. 28(4es): article 79 (1996) | |
94 | Pierangela Samarati, Paul Ammann, Sushil Jajodia: Maintaining Replicated Authorizations in Distributed Database Systems. Data Knowl. Eng. 18(1): 55-84 (1996) | |
93 | Kenneth Smith, Barbara T. Blaustein, Sushil Jajodia, LouAnna Notargiacomo: Correctness Criteria for Multilevel Secure Transactions. IEEE Trans. Knowl. Data Eng. 8(1): 32-45 (1996) | |
92 | Pierangela Samarati, Elisa Bertino, Sushil Jajodia: An Authorization Model for a Distributed Hypertext System. IEEE Trans. Knowl. Data Eng. 8(4): 555-562 (1996) | |
91 | Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996) | |
90 | Paul Ammann, Sushil Jajodia, Phyllis G. Frankl: Globally Consistent Event Ordering in One-Directional Distributed Environments. IEEE Trans. Parallel Distrib. Syst. 7(6): 665-670 (1996) | |
1995 | ||
89 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247 | |
88 | Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia: Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268 | |
87 | Paul Ammann, Sushil Jajodia, Indrakshi Ray: Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions. VLDB 1995: 218-227 | |
86 | Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) | |
85 | Paul Ammann, Sushil Jajodia, Padmaja Mavuluri: On-The-Fly Reading of Entire Databases. IEEE Trans. Knowl. Data Eng. 7(5): 834-838 (1995) | |
84 | Ouri Wolfson, Sushil Jajodia: An Algorithm for Dynamic Data Allocation in Distributed Systems. Inf. Process. Lett. 53(2): 113-119 (1995) | |
83 | Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. Inf. Sci. 82(1-2): 103-128 (1995) | |
82 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Database Security: Research and Practice Inf. Syst. 20(7): 537-556 (1995) | |
81 | Paul Ammann, Frank Jaeckle, Sushil Jajodia: Concurrency Control in a Secure Database via a Two-Snapshot Algorithm. Journal of Computer Security 3(2/3): 87-114 (1995) | |
1994 | ||
80 | Paul Ammann, Sushil Jajodia: An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. ACM Conference on Computer and Communications Security 1994: 118-125 | |
79 | Pierangela Samarati, Paul Ammann, Sushil Jajodia: Propagation of Authorizations in Distributed Database Systems. ACM Conference on Computer and Communications Security 1994: 136-147 | |
78 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274 | |
77 | Amihai Motro, Donald G. Marks, Sushil Jajodia: Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. ESORICS 1994: 431-445 | |
76 | Sushil Jajodia, Ravi Mukkamala, K. V. S. Ramarao: A View-Based Dynamic Replication Control Algorithm. Nord. J. Comput. 1(2): 214-230 (1994) | |
75 | Christian S. Jensen, James Clifford, Ramez Elmasri, Shashi K. Gadia, Patrick J. Hayes, Sushil Jajodia: A Consensus Glossary of Temporal Database Concepts. SIGMOD Record 23(1): 52-64 (1994) | |
1993 | ||
74 | Peter Buneman, Sushil Jajodia: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, Washington, D.C., May 26-28, 1993. ACM Press 1993 | |
73 | Abdullah Uz Tansel, James Clifford, Shashi K. Gadia, Sushil Jajodia, Arie Segev, Richard T. Snodgrass: Temporal Databases: Theory, Design, and Implementation Benjamin/Cummings 1993 | |
72 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia: Authorizations in Relational Database Management Systems. ACM Conference on Computer and Communications Security 1993: 130-139 | |
71 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia: High Assurance Discretionary Access Control for Object Bases. ACM Conference on Computer and Communications Security 1993: 140-150 | |
70 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Access Control in Object-Oriented Database Systems - Some Approaches and Issues. Advanced Database Systems 1993: 17-44 | |
69 | Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein: Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases. DBSec 1993: 109-121 | |
68 | Paul Ammann, Sushil Jajodia: Planar Lattice Security Structures for Multilevel Replicated Databases. DBSec 1993: 125-134 | |
67 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158 | |
66 | Ravi Mukkamala, Sushil Jajodia: A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. DBSec 1993: 199-214 | |
65 | Elisa Bertino, Sushil Jajodia: Modeling Multilevel Entities Using Single Level Objects. DOOD 1993: 415-428 | |
64 | Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. SIGMOD Conference 1993: 227-236 | |
63 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati: Enforcing Mandatory Access Control in Object Bases. Security for Object-Oriented Systems 1993: 96-116 | |
62 | Gio Wiederhold, Sushil Jajodia, Witold Litwin: Integrating Temporal Data in a Heterogeneous Environment. Temporal Databases 1993: 563-579 | |
61 | Paul Ammann, Sushil Jajodia: Distributed Timestamp Generation in Planar Lattice Networks. ACM Trans. Comput. Syst. 11(3): 205-225 (1993) | |
60 | Sushil Jajodia, Ravi Mukkamala: Measuring the effect of commutative transactions on distributed database performance. Inf. Sci. 68(1-2): 91-111 (1993) | |
59 | Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. Journal of Computer Security 2(4): 311-352 (1993) | |
1992 | ||
58 | Carl E. Landwehr, Sushil Jajodia: Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 North-Holland 1992 | |
57 | Oliver Costich, Sushil Jajodia: Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. DBSec 1992: 249-266 | |
56 | John P. McDermott, Sushil Jajodia: Orange Locking: Channel-Free Database Concurrency Control Via Locking. DBSec 1992: 267-284 | |
55 | Ravi S. Sandhu, Sushil Jajodia: Polyinstantation for Cover Stories. ESORICS 1992: 307-328 | |
54 | Ouri Wolfson, Sushil Jajodia: Distributed Algorithms for Dynamic Replication of Data. PODS 1992: 149-163 | |
53 | Vinti Doshi, Sushil Jajodia: Referential Integrity in Multilevel Secure Database Management Systems. SEC 1992: 359-371 | |
52 | Ouri Wolfson, Sushil Jajodia: An Algorithm for Dynamic Data Distribution. Workshop on the Management of Replicated Data 1992: 62-65 | |
51 | Ravi S. Sandhu, Sushil Jajodia: Eliminating polyinstantiation securely. Computers & Security 11(6): 547-562 (1992) | |
1991 | ||
50 | Gio Wiederhold, Sushil Jajodia, Witold Litwin: Dealing with Granularity of Time in Temporal Databases. CAiSE 1991: 124-140 | |
49 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: A Secure Kernelized Architecture for Multiple Object-Oriented Databases. CSFW 1991: 139-152 | |
48 | Sushil Jajodia: Panel Discussion on the Polyinstantiation Problem: A Position Paper. CSFW 1991: 235 | |
47 | Paul Ammann, Sushil Jajodia: A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. DBSec 1991: 191-202 | |
46 | Sushil Jajodia, Ravi Mukkamala: Effects of SeaView Decomposition of Multilevel Relations on Database Performance. DBSec 1991: 203-225 | |
45 | Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia: Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. DBSec 1991: 297-314 | |
44 | Sushil Jajodia, Ravi S. Sandhu: A Novel Decomposition of Multilevel Relations into Single-Level Relations. IEEE Symposium on Security and Privacy 1991: 300-315 | |
43 | Sushil Jajodia, Ravi S. Sandhu: Towards a Multilevel Secure Relational Data Model. SIGMOD Conference 1991: 50-59 | |
42 | Ravi Mukkamala, Sushil Jajodia: A Note on Estimating the Cardinality of the Projection of a Database Relation. ACM Trans. Database Syst. 16(3): 564-566 (1991) | |
41 | Ravi S. Sandhu, Sushil Jajodia: Integrity principles and mechanisms in database management systems. Computers & Security 10(5): 413-427 (1991) | |
40 | Sushil Jajodia, David Mutchler: A short technical paper: Determining whether a vote assignment is dominated. Inf. Sci. 56(1-3): 279-282 (1991) | |
1990 | ||
39 | Sushil Jajodia, Ravi S. Sandhu: A Formal Framework for Single Level Decomposition of Multilevel Relations. CSFW 1990: 152-158 | |
38 | Ravi S. Sandhu, Sushil Jajodia, Teresa F. Lunt: A New Polyinstantiation Integrity Constraint for Multilevel Relations. CSFW 1990: 159-165 | |
37 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations Revisited. DBSec 1990: 297-308 | |
36 | Sushil Jajodia, Ravi S. Sandhu: Polyinstantiation Integrity in Multilevel Relations. IEEE Symposium on Security and Privacy 1990: 104-115 | |
35 | Sushil Jajodia, Boris Kogan: Transaction Processing in Multilevel-Secure Databases Using Replicated Architecture. IEEE Symposium on Security and Privacy 1990: 360-368 | |
34 | Sushil Jajodia, Boris Kogan: Integrating an Object-Oriented Data Model with Multilevel Security. IEEE Symposium on Security and Privacy 1990: 76-85 | |
33 | Boris Kogan, Sushil Jajodia: Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture. SIGMOD Conference 1990: 153-162 | |
32 | Sushil Jajodia, David Mutchler: Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database. ACM Trans. Database Syst. 15(2): 230-280 (1990) | |
31 | Sushil Jajodia, Frederick N. Springsteel: Lossless Outer Joins with Incomplete Information. BIT 30(1): 34-41 (1990) | |
30 | Sushil Jajodia, Ravi S. Sandhu: Database Security: Current Status and Key Issues. SIGMOD Record 19(4): 123-126 (1990) | |
1989 | ||
29 | Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley: Audit Trail Organization in Relational Databases. DBSec 1989: 269-281 | |
28 | Sushil Jajodia, Won Kim: From the Issue Editors. IEEE Data Eng. Bull. 12(1): 1 (1989) | |
27 | Sushil Jajodia, David Mutchler: A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting. IEEE Trans. Knowl. Data Eng. 1(4): 459-469 (1989) | |
26 | Sushil Jajodia, David Mutchler: A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability. IEEE Trans. Software Eng. 15(1): 39-46 (1989) | |
1988 | ||
25 | Sushil Jajodia, David Mutchler: Integrating Static and Dynamic Voting Protocols To Enhance File Availability. ICDE 1988: 144-153 | |
24 | Sushil Jajodia: Letter from the TC Chair. IEEE Data Eng. Bull. 11(2): 1 (1988) | |
1987 | ||
23 | Catherine Meadows, Sushil Jajodia: Integrity Versus Security in Multi-Level Secure Databases. DBSec 1987: 89-101 | |
22 | Sushil Jajodia, Catherine Meadows: Mutual Consistency in Decentralized Distributed Systems. ICDE 1987: 396-404 | |
21 | Sushil Jajodia: Managing Replicated Files in Partitioned Distributed Database Systems. ICDE 1987: 412-418 | |
20 | Sushil Jajodia, David Mutchler: Dynamic Voting. SIGMOD Conference 1987: 227-238 | |
19 | Sushil Jajodia, David Mutchler: Enhancements to the Voting Algorithm. VLDB 1987: 399-406 | |
18 | H. A. Burgdorff, Sushil Jajodia, Frederick N. Springsteel, Yechezkel Zalcstein: Alternative Methods for the Reconstruction of Trees from Their Traversals. BIT 27(2): 134-140 (1987) | |
17 | Sushil Jajodia: Letter from the TC Chairman. IEEE Data Eng. Bull. 10(3): 1 (1987) | |
16 | Sushil Jajodia, Frederick N. Springsteel: Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation. IEEE Trans. Software Eng. 13(7): 811-819 (1987) | |
15 | Satish K. Tripathi, Yennun Huang, Sushil Jajodia: Local Area Networks: Software and Related Issues. IEEE Trans. Software Eng. 13(8): 872-879 (1987) | |
14 | Sushil Jajodia: An Extension of "Representative Instances and gamma-Acyclic Relational Schemes". IEEE Trans. Software Eng. 13(9): 1047-1048 (1987) | |
1986 | ||
13 | Sushil Jajodia: Recognizing Multivalued Dependencies in Relation Schemas. Comput. J. 29(5): 458-459 (1986) | |
12 | Sushil Jajodia: Chairman's Message. IEEE Database Eng. Bull. 9(3): 1 (1986) | |
1985 | ||
11 | Sushil Jajodia: On Equivalence of Relational and Network Database Models. Inf. Process. Lett. 20(1): 51-54 (1985) | |
1984 | ||
10 | Sushil Jajodia: Universal and Representative Instances Using Unmarked Nulls. FSTTCS 1984: 367-378 | |
9 | Sushil Jajodia, Peter A. Ng: Representative Instances and gamma-Acyclic Relational Schemes. IEEE Trans. Software Eng. 10(6): 614-618 (1984) | |
8 | Sushil Jajodia, Peter A. Ng: Translation of entity-relationship diagrams into relational structures. Journal of Systems and Software 4(2-3): 123-133 (1984) | |
7 | Sushil Jajodia, Peter Ann-Beng Ng, Raymond T. Yeh: Introduction to the special issue on the use of entity-relationship concepts in databases and related software. Journal of Systems and Software 4(2-3): 95-98 (1984) | |
1983 | ||
6 | Carl G. Davis, Sushil Jajodia, Peter A. Ng, Raymond T. Yeh: Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83) North-Holland 1983 | |
5 | Sushil Jajodia, Peter A. Ng: On the Representation of Relational Structures by Entity-Relationship Diagrams. ER 1983: 249-263 | |
4 | Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel: On Universal and Representative Instances for Inconsistent Databases. ER 1983: 279-295 | |
3 | Paul K. Blackwell, Sushil Jajodia, Peter A. Ng: A View of Database Management Systems as Abstract Data Types. ER 1983: 661-668 | |
2 | Sushil Jajodia, Jian Liu, Peter A. Ng: A Scheme of Parallel Processing for MIMD Systems. IEEE Trans. Software Eng. 9(4): 436-445 (1983) | |
1 | Sushil Jajodia, Peter A. Ng, Frederick N. Springsteel: The Problem of Equivalence for Entity-Relationship Diagrams. IEEE Trans. Software Eng. 9(5): 617-630 (1983) |