Metrics suite for network attack graph analytics
Steven Noel
,
Sushil Jajodia
CISR '14 Proceedings of the 9th Annual Cyber and Information Security Research Conference, 2014
frames are not supported
Verification of data redundancy in cloud storage
Zhan Wang
,
Kun Sun
,
Jiwu Jing
,
Sushil Jajodia
Cloud Computing '13 Proceedings of the 2013 international workshop on Security in cloud computing, 2013
frames are not supported
Providing Users’ Anonymity in Mobile Hybrid Networks
Claudio A. Ardagna
,
Sushil Jajodia
,
Pierangela Samarati
,
Angelos Stavrou
ACM Transactions on Internet Technology (TOIT), 2013
frames are not supported
Integrating trust management and access control in data-intensive Web applications
Sabrina De Capitani Di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Giuseppe Psaila
,
Pierangela Samarati
ACM Transactions on the Web (TWEB), 2012
frames are not supported
Private data indexes for selective access to outsourced data
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
WPES '11 Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
frames are not supported
Privacy of data outsourced to a cloud for selected readers through client-side encryption
Witold Litwin
,
Sushil Jajodia
,
Thomas Schwarz
WPES '11 Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011
frames are not supported
The ephemeral legion: producing an expert cyber-security work force from thin air
Michael E. Locasto
,
Anup K. Ghosh
,
Sushil Jajodia
,
Angelos Stavrou
Communications of the ACM, 2011
frames are not supported
Who is tweeting on Twitter: human, bot, or cyborg?
Zi Chu
,
Steven Gianvecchio
,
Haining Wang
,
Sushil Jajodia
ACSAC '10 Proceedings of the 26th Annual Computer Security Applications Conference, 2010
frames are not supported
Combining fragmentation and encryption to protect privacy in data storage
Valentina Ciriani
,
Sabrina De Capitani Di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
ACM Transactions on Information and System Security (TISSEC), 2010
frames are not supported
Restoring compromised privacy in micro-data disclosure
Lei Zhang
,
Alexander Brodsky
,
Sushil Jajodia
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, 2010
frames are not supported
Encryption policies for regulating access to outsourced data
Sabrina De Capitani Di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
ACM Transactions on Database Systems (TODS), 2010
frames are not supported
Measuring network security using dynamic bayesian network
Marcel Frigault
,
Lingyu Wang
,
Anoop Singhal
,
Sushil Jajodia
QoP '08 Proceedings of the 4th ACM workshop on Quality of protection, 2008
frames are not supported
Efficiently tracking application interactions using lightweight virtualization
Yih Huang
,
Angelos Stavrou
,
Anup K. Ghosh
,
Sushil Jajodia
VMSec '08 Proceedings of the 1st ACM workshop on Virtual machine security, 2008
frames are not supported
Assessing query privileges via safe and efficient permission composition
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
CCS '08 Proceedings of the 15th ACM conference on Computer and communications security, 2008
frames are not supported
Preserving confidentiality of security policies in data outsourcing
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Gerardo Pelosi
,
Pierangela Samarati
WPES '08 Proceedings of the 7th ACM workshop on Privacy in the electronic society, 2008
frames are not supported
Securely computing an approximate median in wireless sensor networks
Sankardas Roy
,
Mauro Conti
,
Sanjeev Setia
,
Sushil Jajodia
SecureComm '08 Proceedings of the 4th international conference on Security and privacy in communication netowrks, 2008
frames are not supported
Achieving simultaneous distribution control and privacy protection for Internet media delivery
Songqing Chen
,
Shiping Chen
,
Huiping Guo
,
Bo Shen
,
Sushil Jajodia
ACM Transactions on Multimedia Computing, Communications, and Applications (TOMM), 2008
frames are not supported
A data outsourcing architecture combining cryptography and access control
Sabrina De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
CSAW '07 Proceedings of the 2007 ACM workshop on Computer security architecture, 2007
frames are not supported
Toward measuring network security using attack graphs
Lingyu Wang
,
Anoop Singhal
,
Sushil Jajodia
QoP '07 Proceedings of the 2007 ACM workshop on Quality of protection, 2007
frames are not supported
Information disclosure under realistic assumptions: privacy versus optimality
Lei Zhang
,
Sushil Jajodia
,
Alexander Brodsky
CCS '07 Proceedings of the 14th ACM conference on Computer and communications security, 2007
frames are not supported
Interleaved hop-by-hop authentication against false data injection attacks in sensor networks
Sencun Zhu
,
Sanjeev Setia
,
Sushil Jajodia
,
Peng Ning
ACM Transactions on Sensor Networks (TOSN), 2007
frames are not supported
Trust management services in relational databases
Sabrina De Capitani di Vimercati
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
frames are not supported
Topological analysis of network attack vulnerability
Sushil Jajodia
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security, 2007
frames are not supported
A framework for establishing, assessing, and managing trust in inter-organizational relationships
Joseph Pamula
,
Paul Ammann
,
Sushil Jajodia
,
Ronald Ritchey
SWS '06 Proceedings of the 3rd ACM workshop on Secure web services, 2006
frames are not supported
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu
,
Sanjeev Setia
,
Sushil Jajodia
ACM Transactions on Sensor Networks (TOSN), 2006
frames are not supported
A weakest-adversary security metric for network configuration security analysis
Joseph Pamula
,
Sushil Jajodia
,
Paul Ammann
,
Vipin Swarup
QoP '06 Proceedings of the 2nd ACM workshop on Quality of protection, 2006
frames are not supported
Attack-resilient hierarchical data aggregation in sensor networks
Sankardas Roy
,
Sanjeev Setia
,
Sushil Jajodia
SASN '06 Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks, 2006
frames are not supported
Providing witness anonymity in peer-to-peer systems
Bo Zhu
,
Sanjeev Setia
,
Sushil Jajodia
CCS '06 Proceedings of the 13th ACM conference on Computer and communications security, 2006
frames are not supported
Redirection policies for mission-based information sharing
David Keppler
,
Vipin Swarup
,
Sushil Jajodia
SACMAT '06 Proceedings of the eleventh ACM symposium on Access control models and technologies, 2006
frames are not supported
A robust watermarking system based on
SVD
compression
Maria Calagna
,
Huiping Guo
,
Luigi V. Mancini
,
Sushil Jajodia
SAC '06 Proceedings of the 2006 ACM symposium on Applied computing, 2006
frames are not supported
Key management for multi-user encrypted databases
Ernesto Damiani
,
S. De Capitani di Vimercati
,
Sara Foresti
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
StorageSS '05 Proceedings of the 2005 ACM workshop on Storage security and survivability, 2005
frames are not supported
Maintaining privacy on derived objects
Nicola Zannone
,
Sushil Jajodia
,
Fabio Massacci
,
Duminda Wijesekera
WPES '05 Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005
frames are not supported
Tracking anonymous peer-to-peer VoIP calls on the internet
Xinyuan Wang
,
Shiping Chen
,
Sushil Jajodia
CCS '05 Proceedings of the 12th ACM conference on Computer and communications security, 2005
frames are not supported
Modeling and assessing inference exposure in encrypted databases
Alberto Ceselli
,
Ernesto Damiani
,
Sabrina De Capitani Di Vimercati
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
ACM Transactions on Information and System Security (TISSEC), 2005
frames are not supported
Managing attack graph complexity through visual hierarchical aggregation
Steven Noel
,
Sushil Jajodia
VizSEC/DMSEC '04 Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security, 2004
frames are not supported
A logic-based framework for attribute based access control
Lingyu Wang
,
Duminda Wijesekera
,
Sushil Jajodia
FMSE '04 Proceedings of the 2004 ACM workshop on Formal methods in security engineering, 2004
frames are not supported
Tamper detection and localization for categorical data using fragile watermarks
Yingjiu Li
,
Huiping Guo
,
Sushil Jajodia
DRM '04 Proceedings of the 4th ACM workshop on Digital rights management, 2004
frames are not supported
Poster abstract: LEAP—efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu
,
Sanjeev Setia
,
Sushil Jajodia
SenSys '03 Proceedings of the 1st international conference on Embedded networked sensor systems, 2003
frames are not supported
Securely sharing neuroimagery
Kenneth Smith
,
Vipin Swarup
,
Sushil Jajodia
,
Donald Faatz
,
Todd Cornett
,
Jeff Hoyt
CIKM '03 Proceedings of the twelfth international conference on Information and knowledge management, 2003
frames are not supported
Constructing a virtual primary key for fingerprinting relational data
Yingjiu Li
,
Vipin Swarup
,
Sushil Jajodia
DRM '03 Proceedings of the 3rd ACM workshop on Digital rights management, 2003
frames are not supported
Balancing confidentiality and efficiency in untrusted relational DBMSs
Ernesto Damiani
,
S. De Capitani Vimercati
,
Sushil Jajodia
,
Stefano Paraboschi
,
Pierangela Samarati
CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, 2003
frames are not supported
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Sencun Zhu
,
Sanjeev Setia
,
Sushil Jajodia
CCS '03 Proceedings of the 10th ACM conference on Computer and communications security, 2003
frames are not supported
Removing permissions in the flexible authorization framework
Duminda Wijesekera
,
Sushil Jajodia
,
Francesco Parisi-Presicce
,
Åsa Hagström
ACM Transactions on Database Systems (TODS), 2003
frames are not supported
A propositional policy algebra for access control
Duminda Wijesekera
,
Sushil Jajodia
ACM Transactions on Information and System Security (TISSEC), 2003
frames are not supported
Bootstrapping a data mining intrusion detection system
Daniel Barbará
,
Yi Li
,
Julia Couto
,
Jia-Ling Lin
,
Sushil Jajodia
SAC '03 Proceedings of the 2003 ACM symposium on Applied computing, 2003
frames are not supported
The inference problem: a survey
Csilla Farkas
,
Sushil Jajodia
ACM SIGKDD Explorations Newsletter, 2002
frames are not supported
Policy algebras for access control the predicate case
Duminda Wijesekera
,
Sushil Jajodia
CCS '02 Proceedings of the 9th ACM conference on Computer and communications security, 2002
frames are not supported
Efficient and secure keys management for wireless mobile communications
Roberto Di Pietro
,
Luigi V. Mancini
,
Sushil Jajodia
POMC '02 Proceedings of the second ACM international workshop on Principles of mobile computing, 2002
frames are not supported
ADAM: a testbed for exploring the use of data mining in intrusion detection
Daniel Barbará
,
Julia Couto
,
Sushil Jajodia
,
Ningning Wu
ACM SIGMOD Record, 2001
frames are not supported
Policy algebras for access control: the propositional case
Duminda Wijesekera
,
Sushil Jajodia
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security, 2001
frames are not supported
Abstraction-based intrusion detection in distributed environments
Peng Ning
,
Sushil Jajodia
,
Xiaoyang Sean Wang
ACM Transactions on Information and System Security (TISSEC), 2001
frames are not supported
An authorization model for a public key management service
Pierangela Samarati
,
Michael K. Reiter
,
Sushil Jajodia
ACM Transactions on Information and System Security (TISSEC), 2001
frames are not supported
Flexible support for multiple access control policies
Sushil Jajodia
,
Pierangela Samarati
,
Maria Luisa Sapino
,
V. S. Subrahmanian
ACM Transactions on Database Systems (TODS), 2001
frames are not supported
Trusted recovery
Sushil Jajodia
,
Catherine D. McCollum
,
Paul Ammann
Communications of the ACM, 1999
frames are not supported
A flexible authorization mechanism for relational data management systems
Elisa Bertino
,
Sushil Jajodia
,
Pierangela Samarati
ACM Transactions on Information Systems (TOIS), 1999
frames are not supported
Information systems research at George Mason University
Sushil Jajodia
,
Daniel Barbará
,
Alex Brodsky
,
Larry Kerschberg
,
Ami Motro
,
Edgar Sibley
,
X. Sean Wang
ACM SIGMOD Record, 1997
frames are not supported
A unified framework for enforcing multiple access control policies
Sushil Jajodia
,
Pierangela Samarati
,
V. S. Subrahmanian
,
Eliza Bertino
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data, 1997
frames are not supported
An adaptive data replication algorithm
Ouri Wolfson
,
Sushil Jajodia
,
Yixiu Huang
ACM Transactions on Database Systems (TODS), 1997
frames are not supported
Applying formal methods to semantic-based decomposition of transactions
Paul Ammann
,
Sushil Jajodia
,
Indrakshi Ray
ACM Transactions on Database Systems (TODS), 1997
frames are not supported
Logical design for temporal databases with multiple granularities
X. Sean Wang
,
Claudio Bettini
,
Alexander Brodsky
,
Sushil Jajodia
ACM Transactions on Database Systems (TODS), 1997
frames are not supported
Managing security and privacy of information
Sushil Jajodia
ACM Computing Surveys (CSUR) - Special issue: position statements on strategic directions in computing research, 1996
frames are not supported
Testing complex temporal relationships involving multiple granularities and its application to data mining (extended abstract)
Claudio Bettini
,
X. Sean Wang
,
Sushil Jajodia
PODS '96 Proceedings of the fifteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, 1996
frames are not supported
Database security and privacy
Sushil Jajodia
ACM Computing Surveys (CSUR), 1996
frames are not supported
An advanced commit protocol for MLS distributed database systems
Indrajit Ray
,
Elisa Bertino
,
Sushil Jajodia
,
Luigi Mancini
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security, 1996
frames are not supported
A non-timestamped authorization model for data management systems
Elisa Bertino
,
Sushil Jajodia
,
Pierangela Samarati
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security, 1996
frames are not supported
Semantic assumptions and query evaluation in temporal databases
Claudio Bettini
,
X. Sean Wang
,
Elisa Bertino
,
Sushil Jajodia
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data, 1995
frames are not supported
An efficient multiversion algorithm for secure servicing of transaction reads
Paul Ammann
,
Sushil Jajodia
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security, 1994
frames are not supported
Propagation of authorizations in distributed database systems
Pierangela Samarati
,
Paul Ammann
,
Sushil Jajodia
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security, 1994
frames are not supported
High assurance discretionary access control for object bases
Elisa Bertino
,
Pierangela Samarati
,
Sushil Jajodia
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security, 1993
frames are not supported
Authorizations in relational database management systems
Elisa Bertino
,
Pierangela Samarati
,
Sushil Jajodia
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security, 1993
frames are not supported
Distributed timestamp generation in planar lattice networks
Paul Ammann
,
Sushil Jajodia
ACM Transactions on Computer Systems (TOCS), 1993
frames are not supported
Temporal modules: an approach toward federated temporal databases
X. Sean Wang
,
Sushil Jajodia
,
V. S. Subrahmanian
SIGMOD '93 Proceedings of the 1993 ACM SIGMOD international conference on Management of data, 1993
frames are not supported
Distributed algorithms for dynamic replication of data
Ouri Wolfson
,
Sushil Jajodia
PODS '92 Proceedings of the eleventh ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems, 1992
frames are not supported
A note on estimating the cardinality of the projection of a database relation
Ravi Mukkamala
,
Sushil Jajodia
ACM Transactions on Database Systems (TODS), 1991
frames are not supported
Toward a multilevel secure relational data model
Sushil Jajodia
,
Ravi Sandhu
SIGMOD '91 Proceedings of the 1991 ACM SIGMOD international conference on Management of data, 1991
frames are not supported
Dynamic voting algorithms for maintaining the consistency of a replicated database
S. Jajodia
,
David Mutchler
ACM Transactions on Database Systems (TODS), 1990
frames are not supported
Concurrency control in multilevel-secure databases based on replicated architecture
Boris Kogan
,
S. Jajodia
SIGMOD '90 Proceedings of the 1990 ACM SIGMOD international conference on Management of data, 1990
frames are not supported
Dynamic voting
Sushil Jajodia
,
David Mutchler
SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data, 1987
frames are not supported