IEEE Symposium on Security and Security and Privacy

1980-1999

SUSHIL JAJODIA

  1. P. Ammann, S. Jajodia, C. D. McCollum, and B. T. Blaustein, ``Surviving information warfare attacks on databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 164--174 (Acceptance ratio 20/110).
  2. S. Jajodia, P. Samarati, and V. S. Subrahmanian, ``A logical language for expressing authorizations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 31--42 (Acceptance ratio 20/110).
  3. E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, ``Providing flexibility in information flow control for object-oriented systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 130--140 (Acceptance ratio 20/110).
  4. P. Ammann, S. Jajodia, and I. Ray, ``Ensuring atomicity of multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 74--84 (Acceptance ratio 20/69).
  5. E. Bertino, S. Jajodia, and P. Samarati, ``Supporting multiple access control policies in database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 94--107 (Acceptance ratio 20/69).
  6. E. Bertino, L. V. Mancini, and S. Jajodia, ``Collecting garbage in multilevel secure object stores,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1994, pages 106--120 (Acceptance ratio 17/65).
  7. V. Atluri, E. Bertino, and S. Jajodia, ``Achieving stricter correctness requirements in multilevel secure databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 135--147 (Acceptance ratio 17/70).
  8. B. T. Blaustein, S. Jajodia, C. D. McCollum and L. Notargiacomo, ``A model of atomicity for multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 120--134 (Acceptance ratio 17/70).
  9. S. Jajodia and V. Atluri, ``Alternative correctness criteria for concurrent execution of transactions in multilevel secure database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 216--224 (Acceptance ratio 21/89).
  10. P. Ammann, F. Jaeckle, and S. Jajodia, ``A two snapshot algorithm for concurrency control algorithm in secure multi-level databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 204--215 (Acceptance ratio 21/89).
  11. S. Jajodia and R. Sandhu, ``A novel decomposition of multilevel relations into single-level relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 20-22, 1991, pages 300-313 (Acceptance ratio 28/92).
  12. S. Jajodia and B. Kogan, ``Integrating an object-oriented data model with multilevel security,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 76-85 (Acceptance ratio 33/99). Also appeared as Rome Air Development Center Technical Report No. RADC-TR-90-91, May, 1990.
  13. S. Jajodia and R. Sandhu, ``Polyinstantiation integrity in multilevel relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 104-115 (Acceptance ratio 33/99).
  14. S. Jajodia and B. Kogan, ``Transaction processing in multilevel-secure databases using replicated architecture,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 360-368 (Acceptance ratio 33/99).

Home Page | Biography | Publications | Patents | Projects | Professional Activities | Students | Academic Lineage | Favorites