Sushil Jajodia 
List of Publications 2006 - 2010


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles      



Click here for Free Access to all my ACM Publications


AUTHORED BOOKS

  1. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, Preserving Privacy in On-line Analytical Processing (OLAP), ISBN: 978-0-387-46273-8, Springer International Series on Advances in Information Security, Berlin, 2007, 180 pages. review

EDITED BOOKS

  1. Claudio Bettini, Sushil Jajodia, Pierangela Samarati, X. Sean Wang, eds, Privacy in Location-Based Applications: Research Issues and Emerging Trends, ISBN: 978-3-642-03510-4, Springer Lecture Notes in Computer Science, Volume 5599, 2009, 217 pages. online version review
  2. Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., Cyber Situational Awareness: Issues and Research, ISBN: 98-1-4419-0139-2, Springer International Series on Advances in Information Security, 2009, 252 pages. online version Translated in Chinese in 2014
  3. Michael Gertz, Sushil Jajodia, eds., Handbook of Database Security: Applications and Trends, ISBN: 978-0-387-48532-4, Springer, Berlin, 2008, 579 pages. online version review
  4. Ting Yu, Sushil Jajodia, eds., Secure Data Management in Decentralized Systems, ISBN: 978-0-387-27694-6, Springer, Berlin, 2007, 462 pages. online version review

EDITED PROCEEDINGS

  1. Sushil Jajodia, Jianying Zhou, eds., Security and Privacy in Communication Networks (SecureComm), Springer Lecture Notes of ICST, Vol. 50, 2010.
  2. Sara Foresti, Sushil Jajodia, eds.,  Data and Applications Security and Privacy XXIV, Springer Lecture Notes in Computer Science, Volume 6166, ISBN: 978-3-642-13738-9, Springer, Berlin, 2010, 376 pages.
  3. Sushil Jajodia, Javier Lopez, eds., Proceedings of the 13th European Symposium on Research in Computer security (ESORICS 2008), Springer Lecture Notes in Computer Science, ISBN: 978-3-540-88312-8, Springer, Berlin, 2008, 602 pages. online version
  4. Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang, eds, Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, CEUR Workshop Proceedings, Vol. 397, Malaga, Spain, October 9, 2008.
  5. Sushil Jajodia, Pierangela Samarati, Stevio Cimato, eds., Proc.of the IFIP TC 11 23rd International Information Security Conference, ISBN: 978-0-387-09698-8, Springer, New York, 2008, 738 pages.
  6. Shiuhpyng Shieh, Sushil Jajodia, eds., Proc. ACM Symp. on Information, Computer, and Communications Security (ASIACCS'06), ISBN: 1-59593-272-0, ACM Press, New York, March 2006.

JOURNAL ARTICLES

  1. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Encryption policies for regulating access to outsourced data," ACM Transactions on Database Systems, Vol. 35, No. 2, April 2010. PDF
  2. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Combining fragmentation and encryption to protect data privacy," ACM Transactions on Information and System Security, Vol. 13, No. 3, July 2010. PDF
  3. Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Tyrone W. Grandison, Sushil Jajodia, Pierangela Samarati, "Access control for smarter Healthcare using policy spaces," Computers & Security, Vol. 29, No. 8, November 2010, pages 848-858.
  4. Bo Zhu, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, Lingyu Wang, "Localized multicast: Efficient and distributed replica detection in large-scale sensor networks," IEEE Transactions on Mobile Computing, Vol. 7, No. 7, July 2010, pages 913-926.
  5. Songqing Chen, Shiping Chen, Xinyuan Wang, Zhao Zhang, Sushil Jajodia, "An application-level data transparent authentication scheme without communication overhead," IEEE Transactions on Computers, Vol. 59, No. 7, July 2010, pages 943-954.
  6. Steven Noel, Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring security risks of networks using attack graphs," International Journal of Next-Generation Computing, Vol. 1, No. 1, July 2010, pages 113-123..
  7. Bo Zhu, Sanjeev Setia, Sushil Jajodia, Lingyu Wang, "Providing witness anonymity under peer-to-peer settings," IEEE Transactions on Information Forensics and Security, Vol. 5, No. 2, June 2010, pages 324-336.
  8. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Secure median computation in wireless sensor networks," Ad Hoc Networks, Vol. 7, No. 8, November 2009, pages 1448-1462.
  9. Chao Yao, Lingyu Wang, X. Sean Wang, Claudio Bettini, Sushil Jajodia, "Evaluating privacy threats in released database views by symmetric indistinguishability," Journal of Computer Security, Vol. 17, No. 1, 2009, pages 5-42.
  10. Mauro Conti, Lei Zhang, Sankardas Roy, Roberto Di Pietro, Sushil Jajodia, Luigi Vincenzo Mancini, "Privacy-preserving robust data aggregation in wireless sensor networks," Security and Communication Networks, Vol. 2, No. 2, 2009, pages 195-213.
  11. Kui Ren, Wenjing Lou, Bo Zhu, Sushil Jajodia, "Secure and efficient multicast in wireless and sensor networks allowing ad-hoc group formation," IEEE Trans. on Vehicular Technology, Vol. 58, No. 4, May 2009, pages 2018-2029.
  12. Hemant Sengar, Haining Wang. Duminda Wijesekera, Sushil Jajodia, "Detecting VoIP floods using the Hellinger distance," IEEE Trans. on Parallel and Distributed Systems, Vol. 19, No. 6, June 2008, pages 794-805.
  13. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia, "Implementing interactive analysis of attack graphs using relational databases," Journal of Computer Security, Vol. 16, No. 4, 2008, pages 419-436.
  14. Steven Noel, Sushil Jajodia, "Optimal IDS sensor placement and alert prioritization using attack graphs," Journal of Network and Systems Management, Vol. 16, No. 3, September 2008, pages 259-275..
  15. Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia, "Achieving simultaneous distribution control and privacy protection for Internet multimedia delivery," ACM Trans. on Multimedia Computing, Communications, and Applications (TOMCCAP), Vol. 4. No. 2, May 2008.
  16. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks," ACM Transactions on Sensor Networks, Vol. 3, No. 3, 2007. PDF review
  17. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati, Sushil Jajodia, "Access control policies and languages," International Journal of Computational Science and Engineering, Vol. 3, No. 2, 2007, pages 94-102.
  18. Peng Liu, Jie Li, Sushil Jajodia, Paul Ammann, "Can-follow concurrency control," IEEE Trans. on Computers, Vol. 56, No. 10, October 2007, pages 1425-1430.
  19. Lingyu Wang, Yingjiu Li, Sushil  Jajodia, Duminda Wijesekera, "Parity-based inference control for multi-dimensional range sum queries," Journal of Computer Security, Vol. 15, No. 4, 2007, pages 417-445.
  20. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia and Sushil Jajodia, "Efficient security mechanisms for overlay multicast based content delivery, " Computer Communications, Vol. 30, No. 4, February 2007, pages 793-806.
  21. Huiping Guo, Yingjiu Li, Sushil Jajodia, "Chaining watermarks for detecting malicious modifications to streaming data," Information Sciences, Vol. 177, No. 1, January 2007, pages 281-298.
  22. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks, Vol. 2, No. 4, November 2006, pages 500-528. PDF review
  23. Hemant Sengar, Ram Dantu, Duminda Wijesekera, Sushil Jajodia, "SS7 over IP:  Signaling internetworking vulnerabilities," IEEE Network, Vol. 20, No. 6, November 2006, pages 32-41.
  24. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia, "GKMPAN: An efficient group rekeying scheme for secure multicast in ad-hoc networks," Journal of Computer Security, Vol. 14, No. 4, 2006, pages 301-325.
  25. Shiping Chen, Xinyuan Wang, Sushil Jajodia, "On anonymity and traceability of peer-to-peer VoIP calls," IEEE Network, Vol. 20, No. 5, September/October 2006, pages 32-37.
  26. Lingyu Wang, Steven Noel, Sushil Jajodia, "Minimum-cost network hardening using attack graphs,"  Computer Communications, Vol. 29, No. 18, November 2006, pages 3812-3824.
  27. Csilla Farkas, Alexander Brodsky, Sushil Jajodia, "Unauthorized inferences in semi-structured databases,"  Information Sciences, Volume 176, No. 22, November 2006, pages 3269-3299.
  28. Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, "Building trust in peer-to-peer systems: A review," International Journal of Security and Networks, Vol. 1, No. 1/2, 2006, pages 103-112.
  29. Lingyu Wang, Anyi Liu, Sushil Jajodia, "Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts," Computer Communications, Vol. 29, N0. 15, September 2006, pages 2917-2933.
  30. Anoop Singhal, Sushil Jajodia, "Data warehousing and data mining techniques for intrusion detection systems," Distributed and Parallel Databases, Vol. 20, No. 2, September 2006, pages 149-166.
  31. Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, "LHAP: A lightweight network access control protocol for ad hoc networks," Ad Hoc Networks, Vol. 4, No. 5, September 2006,  pages 567-585.
  32. Huiping Guo, Yingjiu Li, Anyi Liu, Sushil Jajodia, "A fragile watermarking scheme for detecting malicious modifications of database relations," Information Sciences, Vol. 176, No. 10, 2006, pages 1350-1378.
  33. Yingjiu Li, Sencun Zhu, X. Sean Wang, Sushil Jajodia, "Looking into the seeds of time: Discovering temporal patterns in large transaction sets," Information Sciences, Vol. 176, No. 8, 2006, pages 1003-1031. PDF

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Fragments and loose associations: Respecting privacy in data publishing,'' Proc. 36th International Conference on Very Large Data Bases, Singapore, September 13-17, 2010, pages 1370-1381.
  2. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou, "Providing mobile users' anonymity in hybrid networks," Proc. 15th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 6345, Dimitris Gritzalis, Bart Preneel, Miranthi Theoharidou, eds., Athens, Greece, September 20-22, 2010, pages 84-105 (Acceptance ratio 42/210).
  3. Lingyu Wang, Sushil Jajodia, Anoop Singhal, Steven Noel, "k-Zero day safety: Measuring the security risk of networks against unknown attacks," Proc. 15th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 6345, Dimitris Gritzalis, Bart Preneel, Miranthi Theoharidou, eds., Athens, Greece, September 20-22, 2010, pages 540-557 (Acceptance ratio 42/210).
  4. Lei Zhang, Alexander Brodsky, Sushil Jajodia, "Restoring compromised privacy in micro-data disclosure," Proc. 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS), Beijing, China, April 13-16, 2010, pages 36-47(Acceptance ratio 25/166).
  5. Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia, "Who is tweeting on the twitter: Human, Bot, or Cyborg?," Proc. 26th Annual Computer Security Conference (ACSAC), Austin, TX, December 6-10, 2010, pages 21-30.
  6. Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia, "QoP and QoS policy cognizant policy composition," Proc. IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY), Fairfax, VA, July 21-23, 2010, pages 77-86.
  7. Sushil Jajodia, Witold Litwin, Thomas Schwartz, "LH*RE: A Scalable distributed data structure with recoverable encryption," Proc. 3rd  IEEE International Conference on Cloud Computing (Application and Industry Track), Miami, Florida, July 5-10, 2010. 
  8. Lei Zhang, Honggang Zhang,Mauro Conti,Roberto Di Pietro,Sushil Jajodia,Luigi Vincenzo Mancini, "Reverse tree-based key routing: Robust data aggregation in wireless sensor networks," Proc. 10th IEEE International Conf. on Computer and Information Technology (CIT), Bradford, UK, June 29 - July 1, 2010, pages 910-915.
  9. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, G. Pelosi, Pierangela Samarati, "Encryption-based policy enforcement for cloud storage," Proc. 1st ICDCS Workshop on Security and Privacy in Cloud Computing (ICDCS-SPCC),Genoa, Italy, June 21-25, 2010.
  10. Hemant Sengar, Zhen Ren, Haining Wang, Duminda Wijesekera, Sushil Jajodia, "Tracking Skype VoIP calls over the internet," Proceedings IEEE INFOCOM Mini-conference, March 14-19, 2010 (Acceptance ratio 276/1575).
  11. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Keep a few: Outsourcing data while maintaining confidentiality," Proc. 14th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 5789, Saint Malo, France, September 21-23, 2009, pages 440-455 (Acceptance ratio 42/220).
  12. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Fragmentation design for efficient query execution over sensitive distributed databases," Proc. 29th International Conf. on Distributed Computing Systems (ICDCS), Montreal, Canada, June 22-26, 2009, pages 32-39 (Acceptance ratio 74/455).
  13. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky, "L-cover: Preserving diversity by anonymity," Proc. 6th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 5776, Willem Jonker and  Milan Petkovic, eds., Lyon, France, August 28, 2009, pages 158-171 (Acceptance ratio 10/24).
  14. Sergio Mascetti, Claudio Bettini, X. Sean Wang, Dario Freni, Sushil Jajodia, "ProvidentHider: an algorithm to preserve historical k-anonymity in LBS," Proc. 10th International Conference on Mobile Data Management (MDM 2009), Taipei, Taiwan, May 18-20, 2009, pages 31-40 (Acceptance ratio for full papers 23/88).
  15. Sergio Mascetti, Claudio Bettini, Dario Freni, X. Sean Wang, Sushil Jajodia, "Privacy-aware proximity based services," Proc. 10th International Conference on Mobile Data Management (MDM 2009), Taipei, Taiwan, May 18-20, 2009, pages 172-181 (Acceptance ratio for full papers 23/88).
  16. Hemant Sengar, Xinyuan Wang, Haining Wang, Duminda Wijesekera, Sushil Jajodia, "Online detection of network traffic anomalies using behavioral distance," Proc. 17th IEEE International Workshop on Quality of Service, Charleston, South Carolina, July 13-15, 2009.
  17. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Enforcing confidentiality constraints on sensitive databases with lightweight trusted clients," Proc.23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), Springer Lecture Notes in Computer Science, Vol. 5645, Ehud Gudes and Jaideep Vaidya, eds., Montreal, Canada, July 12-15, 2009, pages 225-239.
  18. Daniele Riboni, Linda Pareschi, Claudio Bettini and Sushil Jajodia, "Preserving anonymity of recurrent location-based queries," Proc. 16th International Symposium on Temporal Representation and Reasoning (TIME-2009), Brixen, Italy, July 23-25, 2009, pages 62-69 (Acceptance ratio 17/43)..
  19. Steven Noel, Matthew Elder, Sushil Jajodia, Pramod Kalapa, Scott O'Hare, Kenneth Prole, "Advances in topological vulnerability analysis," Proc. Cybersecurity Applications and Technology Conference for Homeland Security (CATCH), Washington, DC, March 3-4, 2009, pages 124-129.
  20. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Assessing query privileges via safe and efficient permission composition," Proc. 15th ACM Conf. on Computer and Communications Security (CCS), Alexandria, VA, October 27-31, 2008, pages 311-322 (Acceptance ratio 51/281).
  21. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Controlled information sharing in collaborative distributed query processing," Proc. 28th International Conf. on Distributed Computing Systems (ICDCS), Beijing, China, June 17-20, 2008, pages 303-310 (Acceptance ratio 102/638).
  22. Yih Huang, Angelos Stavrou, Anup Ghosh, Sushil Jajodia, "Efficiently tracking application interactions using lightweight virtualization," Proc. 1st ACM Workshop on Virtual Machine Security (VMSec), Fairfax, VA, October 31,2008, pages 19-27 (Acceptance ratio for full papers 6/20).
  23. Marcel Frigault, Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring network security using Dynamic Bayesian network," Proc. 4th ACM Workshop on Quality of Protection (QoP), Alexandria, VA, October 27, 2008, pages 23-29 (Acceptance ratio for full papers 5/19).
  24. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi,Pierangela Samarati, "Preserving confidentiality of security policies in data outsourcing," Proc. ACM Workshop on Privacy in Electronic Society, Alexandria, VA, October 27, 2008, pages 75-84 (Acceptance ratio for full papers 9/42).
  25. Sergio Mascetti, Dario Freni, Claudio Bettini, Sean Wang, Sushil Jajodia, "On the impact of user movement simulations in the evaluation of LBS privacy-preserving techniques," Proc. International Workshop on Privacy in Location-Based Applications ( PiLBA '08), Malaga, Spain, October 9, 2008.
  26. Claudio Agostino Ardagna, Angelos Stavrou, Sushil Jajodia, Pierangela Samarati, Rhandi Martin, "A multi-path approach for k-anonymity in mobile hybrid networks," Proc. International Workshop on Privacy in Location-Based Applications ( PiLBA '08), Malaga, Spain, October 9, 2008.
  27. Sankardas Roy, Mauro Conti, Sanjeev Setia, Sushil Jajodia, "Securely computing an approximate median in wireless sensor networks," Proc. 4th Int'l. Conf. on Security and Privacy in Communication Networks (SecureComm), Istanbul, Turkey, September 22-25,2008 (Acceptance ratio ??/??).
  28. Lei Zhang, Sushil Jajodia, Alexander Brodsky, "Simulatable binding: Beyond simulatable auditing," Proc. 5th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 5159, Willem Jonker and  Milan Petkovic, eds., Auckland, New Zealand, August 24, 2008, pages 16-31 (Acceptance ratio 11/32).
  29. Claudio Bettini, X. Sean Wang, Sushil Jajodia, "How anonymous is k-anonymous? Look at your quasi-ID," Proc. 5th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 5159, Willem Jonker and  Milan Petkovic, eds., Auckland, New Zealand, August 24, 2008, pages 1-15 (Invited Paper).
  30. Steven Gianvecchio, Haining Wang, Duminda Wijesekera, Sushil Jajodia, "Model-based covert timing channels: Automated modeling and evasion," Proc. 11th International Symp. on Recent Advances in Intrusion Detection (RAID), Springer Verlag Lecture Notes in Computer Science, Vol. 5230, Richard Lippmann, Engin Kirda, Ari Trachtenberg, eds., Boston, MA, September 15-17, 2008, pages 211-230 (Acceptance ratio 20/80).
  31. Lei Zhang, Alexander Brodsky, Vipin Swarup, Sushil Jajodia, "A framework for maximizing utility of sanitized documents based on meta-labeling," Proc. IEEE Workshop on Policies for Distributed Systems and Networks (POLICY), Palisades, NY, June 2-4, 2008, pages 181-188 (Acceptance ratio long papers 17/74).
  32. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Graddison, Sushil Jajodia, Pierangela Samarati, "Regulating exceptions in healthcare using policy spaces," Proc.22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 5094, Vijay Atluri, ed., London, UK, July 13-16, 2008, pages 254-267 (Acceptance ratio 22/56).
  33. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky, "Exclusive strategy for generalization algorithms in micro-data disclosure," Proc.22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 5094, Vijay Atluri, ed., London, UK, July 13-16, 2008, pages 190-204 (Acceptance ratio 22/56).
  34. Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia, "An attack graph-based probabilistic security metric," Proc.22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 5094, Vijay Atluri, ed., London, UK, July 13-16, 2008, pages 283-296 (Acceptance ratio 22/56).
  35. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Over-encryption: Management of access control evolution on outsourced data," Proc. 33rd International Conf. on Very Large Data Bases (VLDB), Vienna, Austria, September 23-28,2007, pages 123-134 (Acceptance ratio 91/538).
  36. Lei Zhang, Sushil Jajodia, Alexander Brodsky, "Information disclosure under realistic assumptions: Privacy versus optimality," Proc. 14th ACM Conf. on Computer and Communications Security (CCS), Alexandria, VA, October 29-November 2, 2007, pages 573-583 (Acceptance ratio 55/303).
  37. Xinyuan Wang, Shiping Chen, Sushil Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 20-23, 2007, pages 116-130 (Acceptance ratio 29/246).
  38. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Fragmentation and encryption to enforce privacy in data storage," Proc. 12th European Symp. on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 4734, Joachim Biskup and Javier Lopez, eds., Dresden, Germany, September 24-26, 2007, pages 171-186 (Acceptance ratio 39/164 ).
  39. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati, "Trust management services in relational databases," Proc. 2nd ACM Symp. on Information, Computer, and Communications Security (ASIACCS), Singapore, March 20-22, 2007, pages 149-160 (Acceptance ratio full papers 33/180).
  40. Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring the overall security of network configurations using attack graphs," Proc.21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 4602, Steve Barker and Gail-Joon Ahn, eds., Redondo Beach, CA, July 8-11, 2007, pages 98-112 (Acceptance ratio 18/44).
  41. Alexander Brodsky, Lei Zhang, Sushil Jajodia, "Answering queries based on imprecision and uncertainty trade-offs in numeric databases," Proc. 4th VLDB Workshop on Secure Data Management (SDM), Springer Lecture Notes in Computer Science, Vol. 4721, Willem Jonker and  Milan Petkovic, eds., Vienna, Austria, September 23-24, 2007, pages 81-95 (Acceptance ratio 11/29).
  42. Lingyu Wang, Anoop Singhal, Sushil Jajodia, "Measuring network security using attack graphs," Proc. 3rd ACM Workshop on Quality of Protection, Alexandria, VA, October 29, 2007, pages 49-54 (Acceptance ratio 7/20).
  43. Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "A data outsourcing architecture combining cryptography and access control," Proc. ACM Computer Security Architecture Workshop (CSAW '07), Fairfax, VA, November 2, 2007, pages 63-76 (Acceptance ratio 9/30).
  44. Bo Zhu, V. Gopala Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy, "Efficient distributed detection of node replication attacks in sensor networks," Proc. 23rd Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 10-14, 2007, pages 257-266 (Acceptance ratio 42/191).
  45. Claudio Bettini Sergio Mascetti, X. Sean Wang, Sushil Jajodia, "Anonymity in location-based services: Towards a general framework," Proc. 8th Int'l. Conf. on Mobile Data Management, Mannheim, Germany, May 7-11, 2007, pages 69-76 (Acceptance ratio full paper 20/70).
  46. Claudio Bettini, Linda Pareschi, Sushil Jajodia, "Anonymity and diversity in LBS: A preliminary investigation,"Proc. Fifth Annual IEEE International Conference on Pervasive Computing and Communication, 2007, pages 577-580.
  47. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi and Pierangela Samarati, "An experimental evaluation of multi-key strategies for data outsourcing," Proc. 22nd IFIP TC 11 Information Security Conference, Sandton, South Africa, May 14-16, 2007,pages 385-396 (Acceptance ratio 36/104).
  48. E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Foresti, S. Paraboschi, P. Samarati, "Selective data encryption in outsourced dynamic environments," Electronics Notes in Theoretical Computer Science, Vol. 168, February 2007, pages 127-142.  PDF
  49. Bo Zhu, Sanjeev Setia, Sushil Jajodia, "Providing witness anonymity in peer-to-peer systems," Proc. 13th ACM Conf. on Computer and Communications Security (CCS), Alexandria, VA, October 30-November 3, 2006, pages 6-16 (Acceptance ratio 38/256).
  50. Joseph Pamula, Paul Ammann, Sushil Jajodia, Vipin Swarup, "A weakest-adversary security metric for network configuration security analysis," Proc. 2nd ACM Workshop on Quality of Protection, Alexandria, VA, October 30, 2006, pages 31-37.
  51. Joseph Pamula, Paul Ammann, Sushil Jajodia, Ronald Ritchey, "A framework for establishing, assessing, and managing trust in inter-organizational relationships," Proc. ACM Workshop on Secure Web Services (SWS), Fairfax, VA, November 3, 2006, pages 23-32.
  52. Sankardas Roy, Sanjeev Setia and Sushil Jajodia, "Attack-resilient hierarchical data aggregation in sensor networks," Proc. 4th ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN 2006), Alexandria, VA, October 30, 2006, pages 71-82. 
  53. Chao Yao, Lingyu Wang, X. Sean Wang, Sushil Jajodia, "Indistinguishability: the other aspect of privacy," Proc. 3rd VLDB Workshop on Secure Data Management (SDM'06), Springer Lecture Notes in Computer Science, Vol. 4165, Willem Jonker and  Milan Petkovic, eds., Seoul, Korea, September 10-11, 2006, pages 1-17 (Acceptance ratio 13/33).
  54. Lei Zhang, Alexander Brodsky, Sushil Jajodia, "Toward information sharing:  Benefit and risk access control (BARAC),"  Proc. 7th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2006), London, Ontario, June 2006, pages 45-53 (Acceptance ratio full papers 18/59).
  55. Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia, "V- COPS: A distributed vulnerability-based cooperative alert system,"  Proc. Annual Computer Security Applications Conference (ACSAC), Miami Beach, FL, December 11-15, 2006, pages 43-56.
  56. David Keppler, Vipin Swarup, Sushil Jajodia, "Redirection policies for mission-based information sharing," Proc. 11th ACM Symp. on Access Control Models and Technologies (SACMAT 2006), Lake Tahoe, CA, June 2006, pages 210-218 (Acceptance ratio 25/82).
  57. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia, "Interactive analysis of attack graphs using relational queries,"  Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 4127, Ernesto Damiani and Peng Liu, editors, Sophia Antipolis, France, July 31 - August 2, 2006, pages 119-132 (Acceptance ratio 22/55).
  58. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera, "Creating objects in the flexible authorization framework," Proc. 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Springer Lecture Notes in Computer Science, Vol. 4127, Ernesto Damiani and Peng Liu, editors, Sophia Antipolis, France, July 31 - August 2, 2006, pages 1-14 (Acceptance ratio 22/55).
  59. Bo Zhu, Sushil Jajodia, Mohan S. Kankanhalli, Feng Bao, Robert H. Dang, "An anonymous routing protocol with the local-repair mechanism for mobile ad hoc networks," Proc. 3rd Annual IEEE Communications Society Conf. on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), Reston, VA, September 25-28, 2006 (Acceptance ratio 63/243).
  60. Songqing Chen, Shiping Chen, Xinyuan Wang, Sushil Jajodia, "DaTA -- Data Transparent Authentication without Communication Overhead," Proc. 2nd IEEE Communications Society/CreateNet Int'l. Conf. on Security and Privacy in Communications Networks, Baltimore, MD, August 28-September 1, 2006.
  61. Sergio Mascetti, Claudio Bettini, X. Sean Wang, Sushil Jajodia, K-anonymity in databases with timestamped data," Proc. International Symposium on Temporal Representation and Reasoning (Time 2006), Budapast, Hungary, June 15-17, 2006, pages 177-186 (Acceptance ratio 25/46).
  62. Hemant Sengar, Duminda Wijesekera, Haining Wang, and Sushil Jajodia, ""VoIP intrusion detection through interacting protocol state machines," Proceedings International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, June 2006, pages 393-402 (Acceptance ratio 34/187).
  63. Maria Calagna, Huiping Guo, Luigi V. Mancini, Sushil Jajodia, "A robust watermarking system based on SVD compression," Proc. ACM Symp. on Applied Computing (SAC), Dijon, France, April 23-27, 2006, pages 1341-1347.
  64. Songqing Chen, Shiping Chen, Huiping Guo, Bo Shen, Sushil Jajodia, "Efficient proxy-based Internet media distribution control and privacy protection infrastructure," Proc. 14th IEEE Communications Society International Workshop on Quality of Service (IWQoS 2006), New Haven, CT,  June 19-21, 2006, pages 209-218 (Acceptance ratio regular papers 27/157).
  65. Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia, "Fast detection of denial-of-service attacks on IP telephony," Proc. 14th IEEE Communications Society  International Workshop on Quality of Service (IWQoS 2006), New Haven, CT,  June 19-21, 2006, pages 199-208 (Acceptance ratio regular papers 27/157).

Return to top of the page


BOOK CHAPTERS

  1. Steven Noel, Sushil Jajodia, "Proactive intrusion prevention and response via attack graphs," in Practical Intrusion Analysis - Prevention and Detection for the Twenty-First Century, Ryan Trost, ed., Pearson Education, Boston, 2010, pages 119-149.
  2. Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Temporal granularity," in Encyclopedia of Database Systems, Ling Liu and Tamer M. Ozsu, editors-in-chief, Springer, ISBN: 978-0-387-49616-0, 2009, pages 2968-2973.
  3. Sushil Jajodia, Steve Noel, "Topological vulnerability analysis," in Cyber Situational Awareness: Issues and Research, Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., Springer, 2009, pages 139-154.
  4. P. Barford, M. Dacier, T. G. Dietterich, M. Fredrikson, J. Giffin, S. Jajodia, S. Jha, J. Li, P. Liu, P. Ning, X. Ou, D. Song, L. Strater, V. Swarup, G. Tadda, C. Wang, and J. Yen, "Cyber SA: Situational awareness for cyber defense," in Cyber Situational Awareness: Issues and Research, Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang, eds., Springer, 2009, pages 3-14.
  5. Claudio Bettini, Sergio Mascetti, X. Sean Wang, Dario Freni, Sushil Jajodia, "Anonymity and historical-anonymity in location-based services," in Privacy in Location-Based Applications: Research Issues and Emerging Trends, Claudio Bettini, Sushil Jajodia, Pierangela Samarati, X. Sean Wang, eds, Springer Lecture Notes in Computer Science, Volume 5599, 2009, pages 1-30.
  6. Claudio A. Ardagna, Sushil Jajodia, Pierangela Samarati, Angelos Stavrou, "Privacy preservation over untrusted mobile networks," in Privacy in Location-Based Applications: Research Issues and Emerging Trends, Claudio Bettini, Sushil Jajodia, Pierangela Samarati, X. Sean Wang, eds, Springer Lecture Notes in Computer Science, Volume 5599, 2009, pages 84-105.
  7. Sushil Jajodia, Steven Noel, "Topological vulnerability analysis: A powerful new approach for network attack prevention, detection, and response," in Algorithms, Architectures and Information Systems Security (Indian Statistical Institute Platinum Jubilee Series), Bhargab B. Bhattacharya, Susmita Sur-Kolay, Subhas C. Nandy, Aditya Bagchi, eds., World Scientific, New Jersey, 2009, pages 285-305.
  8. Lingyu Wang, Sushil Jajodia, "An approach to preventing, correlating, and predicting multistep network attacks," in Intrusion Detection Systems, Roberto Di Pietro and Luigi V. Mancini, eds., Springer, New York, 2008, pages 93-128.
  9. Sanjeev Setia, Sankardas Roy, Sushil Jajodia, "Secure data aggregation in wireless sensor networks," in Wireless Sensor Network Security, Javier Lopez and Jianying Zhou, eds., IOS Press, Amsterdam, 2008, pages 204-222.
  10. Lingyu Wang, Sushil Jajodia, "Security in data warehouses and OLAP systems," in Handbook of Database Security: Applications and Trends, Michael Gertz and Sushil Jajodia, editors, Springer, New York, 2008, pages 191-212.
  11. Peng Liu, Sushil Jajodia, Meng Yu, "Damage quarantine and recovery in data processing systems," in Handbook of Database Security: Applications and Trends, Michael Gertz and Sushil Jajodia, editors, Springer, New York, 2008, pages 383-407.
  12. Lingyu Wang, Sushil Jajodia, "Vulnerability-centric alert correlation," in Information Assurance: Dependability and Security in Networked Systems, Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy, editors, Morgan Kaufmann, Amsterdam, 2008, pages 279-304.
  13. X. Sean Wang, Sushil Jajodia, "Privacy protection with uncertainty and indistinguishability," in Digital Privacy: Theory, Technologies, and Practices, Alessandro Acquisti, Stefanos Gritzalis, Costos Lambrinoudakis, Sabrina De Capitani di Vimercati, editors, Auerbach Publications, 2007, pages 173-186.
  14. Sushil Jajodia, Duminda Wijesekera, "A flexible authorization framework," in Information Security and Ethics:  Concepts, Methodologies, Tools, and Applications, Hamid Nemati, editor, IGI Global, Hershey, NY, 2008, pages 1236-1256.
  15. Sushil Jajodia, Ting Yu, "Basic security concepts," in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia, editors, Springer, Berlin, 2007, pages 3-20.
  16. S. De Capitani di Vimercati, S. Foresti, S. Jajodia, P. Samarati, "Access control policies and languages in open environments," in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia, editors, Springer, Berlin, 2007, pages 21-57.
  17. Meng Yu, Peng Liu, Wanyu Zang, Sushil Jajodia, "Trusted recovery,"  in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia, editors, Springer, Berlin, 2007, pages 59-93.
  18. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, "Preserving privacy in on-line analytical processing data cubes," in Secure Data Management in Decentralized Systems, Ting Yu and Sushil Jajodia, editors, Springer, Berlin, 2007, pages 357-382.
  19. Peng Ning, Sushil Jajodia, "Intrusion Detection Systems Basics," in Handbook of Information Security, Vol. 3, Hussein Bidgoli, Editor-in-Chief, John Wiley & Sons, Hoboken, 2006, pages 685-700.

 

Return to top of the page

 


OTHER ARTICLES

  1. Sergio Mascetti, Dario Freni, Claudio Bettini, X. Sean Wang, Sushil Jajodia, Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies, ACM Corr arXiv:1007.0408v1, 2010.
  2. Eduardo Fernandez-Medina, Jan Jurjens, Juan Trujillo, Sushil Jajodia, "Model-driven development for secure information systems (Special Issue Guest Editorial)," Information and Software Technology, Vol. 51, No. 5, May 2009, pages 809-814.
  3. C. Bettini, X. S. Wang, S. Jajodia, "The role of quasi-identifiers in k-anonymity revisited," Technical Report. TR 11-06, DICo, University of Milan, Italy. July 2006. PDF eprintweb.org Computing Research Repository (CoRR)

Return to top of the page


Return to home page