IEEE Symposium on Security and Security and Privacy

1980-2010

SUSHIL JAJODIA

    1. Xinyuan Wang, Shiping Chen, Sushil Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 20-23, 2007, pages 116-130 (Acceptance ratio 29/246).
    2. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance ratio 19/186).
    3. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, “An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
    4. Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder, ``Kronos: A scalable group re-keying approach for secure multicast,'' Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance ratio 18/137).
    5. P. Ammann, S. Jajodia, C. D. McCollum, and B. T. Blaustein, ``Surviving information warfare attacks on databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 164--174 (Acceptance ratio 20/110).
    6. S. Jajodia, P. Samarati, and V. S. Subrahmanian, ``A logical language for expressing authorizations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 31--42 (Acceptance ratio 20/110).
    7. E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, ``Providing flexibility in information flow control for object-oriented systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 130--140 (Acceptance ratio 20/110).
    8. P. Ammann, S. Jajodia, and I. Ray, ``Ensuring atomicity of multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 74--84 (Acceptance ratio 20/69).
    9. E. Bertino, S. Jajodia, and P. Samarati, ``Supporting multiple access control policies in database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 94--107 (Acceptance ratio 20/69).
    10. E. Bertino, L. V. Mancini, and S. Jajodia, ``Collecting garbage in multilevel secure object stores,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1994, pages 106--120 (Acceptance ratio 17/65).
    11. V. Atluri, E. Bertino, and S. Jajodia, ``Achieving stricter correctness requirements in multilevel secure databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 135--147 (Acceptance ratio 17/70).
    12. B. T. Blaustein, S. Jajodia, C. D. McCollum and L. Notargiacomo, ``A model of atomicity for multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 120--134 (Acceptance ratio 17/70).
    13. S. Jajodia and V. Atluri, ``Alternative correctness criteria for concurrent execution of transactions in multilevel secure database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 216--224 (Acceptance ratio 21/89).
    14. P. Ammann, F. Jaeckle, and S. Jajodia, ``A two snapshot algorithm for concurrency control algorithm in secure multi-level databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 204--215 (Acceptance ratio 21/89).
    15. S. Jajodia and R. Sandhu, ``A novel decomposition of multilevel relations into single-level relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 20-22, 1991, pages 300-313 (Acceptance ratio 28/92).
    16. S. Jajodia and B. Kogan, ``Integrating an object-oriented data model with multilevel security,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 76-85 (Acceptance ratio 33/99). Also appeared as Rome Air Development Center Technical Report No. RADC-TR-90-91, May, 1990.
    17. S. Jajodia and R. Sandhu, ``Polyinstantiation integrity in multilevel relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 104-115 (Acceptance ratio 33/99).
    18. S. Jajodia and B. Kogan, ``Transaction processing in multilevel-secure databases using replicated architecture,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 360-368 (Acceptance ratio 33/99).

      Line

      Return to home page.