IEEE Symposium on Security and Security and Privacy
1980-2010
SUSHIL JAJODIA
- Xinyuan Wang, Shiping Chen, Sushil Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 20-23, 2007, pages 116-130 (Acceptance ratio 29/246).
- Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance ratio 19/186).
- Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, “An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
- Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder, ``Kronos: A scalable group re-keying approach for secure multicast,'' Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance ratio 18/137).
- P. Ammann, S. Jajodia,
C. D. McCollum, and B. T.
Blaustein,
``Surviving information warfare attacks on databases,''
Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 164--174
(Acceptance ratio 20/110).
- S. Jajodia, P. Samarati, and
V. S. Subrahmanian,
``A logical language for expressing authorizations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 31--42
(Acceptance ratio 20/110).
- E. Ferrari, P. Samarati,
E. Bertino, and S. Jajodia,
``Providing flexibility in information flow control for
object-oriented systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 130--140
(Acceptance ratio 20/110).
- P. Ammann, S. Jajodia, and I. Ray,
``Ensuring atomicity of multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 74--84 (Acceptance ratio 20/69).
- E. Bertino, S. Jajodia, and P. Samarati,
``Supporting multiple access control policies in database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 94--107 (Acceptance ratio 20/69).
- E. Bertino, L. V. Mancini, and S. Jajodia,
``Collecting garbage in multilevel secure object stores,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1994, pages 106--120 (Acceptance ratio 17/65).
- V. Atluri, E. Bertino, and S. Jajodia,
``Achieving stricter correctness requirements in multilevel
secure databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 135--147 (Acceptance ratio 17/70).
- B. T. Blaustein, S. Jajodia, C. D. McCollum and
L. Notargiacomo,
``A model of atomicity for multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 120--134 (Acceptance ratio 17/70).
- S. Jajodia and V. Atluri,
``Alternative correctness criteria for concurrent
execution of transactions in multilevel
secure database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 216--224 (Acceptance ratio 21/89).
- P. Ammann, F. Jaeckle, and S. Jajodia,
``A two snapshot algorithm for concurrency control
algorithm in secure multi-level databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 204--215 (Acceptance ratio 21/89).
- S. Jajodia
and R. Sandhu,
``A novel decomposition of multilevel relations into
single-level relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 20-22, 1991, pages 300-313 (Acceptance ratio 28/92).
- S. Jajodia and B. Kogan,
``Integrating an object-oriented data model with multilevel
security,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 76-85 (Acceptance ratio 33/99).
Also appeared as
Rome Air Development Center Technical Report No. RADC-TR-90-91,
May, 1990.
- S. Jajodia and R. Sandhu,
``Polyinstantiation integrity in multilevel relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 104-115 (Acceptance ratio 33/99).
- S. Jajodia and B. Kogan, ``Transaction processing in multilevel-secure
databases using replicated architecture,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 360-368 (Acceptance ratio 33/99).