Sushil Jajodia
List of Publications 1988-1998
Click here for
Free Access to
all my ACM Publications
EDITED BOOKS
-
O. Etzion, S. Jajodia, and S. Sripada, eds., Temporal Databases:
Research and Practice, Lecture Notes in Computer Science, Vol. 1399,
Springer-Verlag, Berlin (1998), 429 pages.
-
S. Jajodia and L. Kerschberg, eds.,
Advanced Transaction Models and Architectures, Kluwer Academic
Publishers, Boston (1997), 400 pages.
-
V. S. Subrahmanian and S. Jajodia, eds.,
Multimedia Database Systems: Issues and
Research Directions, Artificial Intelligence Series, Springer-Verlag,
Berlin (1996), 323 pages.
Reprinted by Beijing World Publishing Corp., 1998.
-
M. Abrams, S. Jajodia, and H. Podell, eds.,
Information Security: An Integrated
Collection of Essays, IEEE Computer Society Press, Los
Alamitos (1995), 768 pages.
-
A. U. Tansel, J. Clifford, S. Gadia, S. Jajodia,
A. Segev, and R. Snodgrass, eds.
Temporal Databases: Theory, Design, and
Implementation,center-evaluation-97
Benjamin/Cummings, Redwood City(1993), 633 pages.
-
Won Kim, Sushil Jajodia, Ami Motro, Machael J. Carey, Roger King, eds., Database Engineering, Volume 8,
IEEE Computer Society Press (1989).
EDITED PROCEEDINGS
-
S. Jajodia, W. List, G. McGregor, and L. Strous, eds.,
Integrity and Internal Control
in Information Systems,
Kluwer Academic
Publishers, Boston, (1998), 304 pages.
-
S. Jajodia, M. T. Ozsu, and A. Dogac, eds.,
Advances in Multimedia Information Systems,
Lecture Notes in Computer Science, Vol. 1508,
Springer-Verlag, Berlin (1998), 207 pages.
-
S. Jajodia, W. List, G. McGregor, and L. Strous, eds.,
Integrity and Internal Control
in Information Systems, Volume 1,
Chapman & Hall, London, (1997), 370 pages.
-
P. Buneman and S. Jajodia, eds.,
Proc. ACM SIGMOD Int'l.\
Conf. on Management of Data, ACM Press (1993).
-
C. E. Landwehr and S. Jajodia, eds.,
Database Security V: Status and Prospects,
North-Holland (1992).
-
S. Jajodia and C. E. Landwehr, eds.,
Database Security IV: Status and Prospects,
North-Holland (1991).
-
Sushil Jajodia, Won Kim, Abraham Silberschatz, eds., Proc. ACM-IEEE Int'l. Symp. on Databases in Parallel
and Distributed Systems, IEEE Computer Soc. Press (1988).
JOURNAL ARTICLES
-
Neil F. Johnson and Sushil Jajodia,
``Exploring Steganography: Seeing the unseen,''
IEEE Computer, Vol. 31, No. 2, February 1998, pages 26--34.
-
I. Ray, P. Ammann, S. Jajodia,
``A semantic-based transaction processing model for multilevel
transactions,'' Jour. of Computer Security, Vol. 6,
No. 3, 1998, pages 181--217.
-
C. Bettini, X. S. Wang, and S. Jajodia,
``Temporal semantic assumptions and their use in database query evaluation,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 10, No. 2, March/April 1998, pages 257--268.
-
C. Bettini, X. S. Wang, S. Jajodia, J. Lin,
``Discovering temporal relationships with multiple
granularities in time sequences,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 10, No. 2, March/April 1998, pages 222--237.
-
E. Bertino, S. Jajodia, L. Mancini, and I. Ray,
``Advanced transaction processing in multilevel secure file
stores,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 10, No. 1, January/February 1998, pages 120-135.
-
C. Bettini, X. Wang, S. Jajodia,
``A general framework for time granularity and its application to temporal
reasoning, Annals of Mathematics
and Artificial Intelligenceg, Vol. 22, No. 1,2, 1998, pages 29--58.
-
X. Sean Wang, Sushil Jajodia, and Sona Mohavni,
``Temporal mediators: Supporting uniform accesses to heterogeneous
temporal information,'' Int'l. Jour. on Artificial
Intelligence, Tools, Vol. 7, No. 3, 1998, pages 319--339.
-
P. Ammann, S. Jajodia, and I. Ray,
``Applying formal methods to semantic-based decomposition
of transactions,''
ACM Trans. on Database Systems,
Vol. 22, No. 2, June 1997,
pages 215--254.
-
X. S. Wang, C. Bettini, A. Brodsky, and S. Jajodia,
``Logical design for temporal databases with multiple
granularities,''
ACM Trans. on Database Systems,
Vol. 22, No. 2, June 1997,
pages 115--170.
-
O. Wolfson, S. Jajodia, and Y. Huang,
``An adaptive data replication algorithm,''
ACM Trans. on Database Systems,
Vol. 22, No. 2, June 1997,
pages 255--314.
-
V. Atluri, S. Jajodia, and E. Bertino,
``Transaction processing in multilevel secure databases with
kernelized architecture: Challenges
and solutions,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 9, No. 5, September/October 1997, pages 697--708.
-
P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia,
``Information flow control in object-oriented systems,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 9, No. 4, July/August 1997, pages 524--538.
-
E. Bertino, P. Samarati, and S. Jajodia,
``An extended authorization model for relational
databases,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 9, No. 1, 1997, pages 85--101.
-
V. Atluri, E. Bertino, and S. Jajodia,
``A theoretical formulation for degrees of isolation in databases,''
Information and Software Technology, Vol. 39, No. 1,
1997, pages 47--53.
-
V. Atluri, S. Jajodia, and E. Bertino,
``Alternative correctness criteria for concurrent
execution of transactions in multilevel secure databases,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 8, No. 5, October 1996, pages 839--854.
-
P. Samarati, E. Bertino, and S. Jajodia,
``An authorization model for a distributed hypertext system,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 8, No. 4, August 1996, pages 555--562.
-
P. Ammann, S. Jajodia, and P. Frankl,
``Globally consistent event ordering in one-directional distributed
environments,''
IEEE Trans. on Parallel and Distributed Systems,
Vol. 7, No. 6, June 1996, pages 665--670.
-
K. P. Smith, B. T. Blaustein, S. Jajodia, and L. Notargiacomo,
``Correctness criteria for multilevel transactions,''
IEEE Trans, on Knowledge and Data Engineering,
Vol. 8, No. 1, February 1996, pages 32--45.
-
P. Samarati, P. Ammann, and S. Jajodia,
``Maintaining replicated authorizations in distributed database systems,''
Data & Knowledge Engineering, Vol. 18,
No. 1, February 1996, pages 55--84.
-
P. Ammann, S. Jajodia, and P. Mavuluri,
``On-the-fly reading of entire databases,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 7, No. 5, 1995, pages 834--838.
-
P. Ammann, V. Atluri, and S. Jajodia,
``The partitioned synchronization rule for planer partial orders,''
IEEE Trans. on Knowledge and Data Engineering,
Vol. 7, No. 5, 1995, pages 797--809.
-
E. Bertino, S. Jajodia, and P. Samarati,
``Database security: Research and practice,''
Information Systems, Vol. 20, No. 7, 1995, pages 537--556.
-
X. S. Wang, S. Jajodia, and V. S. Subrahmanian,
``Temporal modules: An approach toward federated temporal databases,''
Information Sciences,
Vol. 82, 1995, pages 103--128.
-
P. Ammann, F. Jaeckle, and S. Jajodia,
``Concurrency control
in a secure multi-level database via a two-snapshot algorithm,''
Jour. of Computer Security,
Vol. 3, No. 2,3, 1995, pages 87--113.
-
O. Wolfson and S. Jajodia,
``An algorithm for dynamic data allocation in distributed systems,''
Information Processing Letters, Vol. 53, No. 2,
1995, pages 113--119.
-
S. Jajodia, R. Mukkamala, and K. V. S. Ramarao,
``A view-based dynamic replication control algorithm,''
Nordic Journal of Computing, Vol. 1, No. 2, 1994,
pages 214--230.
-
P. Ammann and S. Jajodia,
``Distributed timestamp generation in planar lattice networks,''
ACM Trans. on Computer Systems, Vol. 11, No. 3,
August 1993, pages 205--225.
-
V. Atluri, E. Bertino, and S. Jajodia,
``Achieving stricter correctness requirements in multilevel
secure databases,'' Jour. of Computer Security,
Vol. 2, No. 4, 1993, pages 311--351.
-
S. Jajodia and R. Mukkamala, ``Measuring the effect of commutative
transactions on distributed database performance,''
Information Sciences, Vol. 68, Nos.\
1/2, February 1993, pages 91-111.
-
R. Sandhu and S. Jajodia,
``Eliminating polyinstantiation securely,''
Computers & Security, Vol. 11, 1992, pages 547-562.
-
R. Mukkamala and S. Jajodia, ``A note on estimating the cardinality
of the projection of a database relation,''
ACM Trans. on Database Systems, Vol. 16, No. 3,
September 1991, pages 564-566.
-
S. Jajodia and D. Mutchler, ``Determining whether a vote assignment
is dominated,''
Information Sciences,
Vol. 56, Nos. 1-3, 1991, pages 279-282.
-
R. Sandhu and S. Jajodia,
``Integrity principles and mechanisms in database management systems,''
Computers & Security, Vol. 10, 1991, pages 413-427.
-
S. Jajodia
and D. Mutchler, ``Dynamic voting algorithms for maintaining
the consistency of a replicated database,''
ACM Trans. on Database Systems, Vol. 15, No. 2, June 1990,
pages 230-280.
-
S. Jajodia and F. N. Springsteel,
``Lossless outer join with incomplete information,''
BIT Numerical Mathematics, vol. 30, 1990, pages 34-41. DOI: https://doi.org/10.1007/BF01932129
-
S. Jajodia and D. Mutchler,
``A hybrid replica control algorithm combining static and dynamic voting,''
IEEE Trans. on Knowledge and Data Engineering,
vol. 1, no. 4, December 1989, pages 459-469.
-
S. Jajodia and D. Mutchler,
``A pessimistic consistency control algorithm for
replicated files which achieves high availability,''
IEEE Trans. on Software Engineering,
vol. 15, no. 1, January 1989, pages 39-46.
ARTICLES IN REFEREED CONFERENCE PROCEEDINGS
-
G. Rumolo and S. Jajodia,
``Algebra for databases with explicit markings of
damaged data,''
in Integrity and Internal Control in
Information Systems, S. Jajodia, et al., eds.,
Kluwer, Boston, 1998, pages 103--129.
-
Sushil Jajodia, Peng Liu, Catherine D. McCollum,
``Application-level isolation to cope with malicious database
users,''
Proc. 14th Annual Computer Security Applications Conf.,
Phoenix, AZ, December 1998.
-
Neil F. Johnson and Sushil Jajodia,
``Steganalysis: The investigation of hidden information,''
Proc. IEEE Information Technology Conf.,
Syracuse, NY, September 1998, pages 113--116.
-
Neil F. Johnson and Sushil Jajodia,
``Steganalysis of images
created using current steganography software,'' Proc.\
Workshop on Information Hiding,
Springer Lecture Notes in Computer Science, Vol. 1525,
1998, pages 273--289.
-
Sushil Jajodia, Luigi Mancini, Sanjeev Setia.
``A fair locking protocol for multilevel secure databases,''
Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA,
June 1998, pages 168--178.
-
Jia-Ling Lin, X. Sean Wang, Sushil Jajodia,
``Abstraction-based misuse detection: High-level
specifications and adaptable strategies,''
Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA,
June 1998, pages 190--201.
-
Sushil Jajodia, Ravi Mukkamala, and Indrajit Ray,
``A two-tier coarse indexing scheme for MLS database systems,''
in Database Security XI: Status and Prospects,
T. Y. Lin and S. Qian, eds., Chapman and Hall, London,
1998, pages 199--218.
-
S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino,
``A unified framework for enforcing multiple access control policies,''
Proc. ACM SIGMOD Int'l. Conf.\
on Management of Data, May 1997, pages 474--485
(Acceptance ratio 42/202).
-
Claudio Bettini, X. Sean Wang, Sushil Jajodia,
``Satisfiability of quantitative temporal constraints
with multiple granularities,''
Proc. 3rd I'ntl. Conf. on
Principles and Practice of
Constraint Programming,
Springer-Verlag Lecture Notes in Computer Science, Vol.\
1330, 1997, pages 435-449.
-
P. Ammann, S. Jajodia,
C. D. McCollum, and B. T.
Blaustein,
``Surviving information warfare attacks on databases,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1997, pages 164--174
(Acceptance ratio 20/110).
-
S. Jajodia, P. Samarati, and
V. S. Subrahmanian,
``A logical language for expressing authorizations,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1997, pages 31--42
(Acceptance ratio 20/110).
-
E. Ferrari, P. Samarati,
E. Bertino, and S. Jajodia,
``Providing flexibility in information flow control for
object-oriented systems,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1997, pages 130--140
(Acceptance ratio 20/110).
-
S. Jajodia, I. Ray, and P. Ammann,
``Implementing semantic-based decomposition of transactions,''
Proc. 9th Conf. on Advanced Information Systems
Engineering (CAiSE*97), Springer-Verlag Notes
in Computer Science, Vol. 1250, 1997, pages 75--88
(Acceptance ratio 30/112).
-
S. Jajodia, L. Mancini, and I. Ray, ``Secure locking protocols
for multilevel database management systems,''
in Database Security X: Status and Prospects,
P. Samarati and R. Sandhu, eds., Chapman and Hall, London,
1997, pages 177--194.
-
V. Atluri, S. Jajodia, T. F. Keefe, C. McCollum, and
R. Mukkamala,
``Multilevel secure transaction processing: Status and prospects,''
in Database Security X: Status and Prospects,
P. Samarati and R. Sandhu, eds., Chapman and Hall, London,
1997, pages 79--98.
-
C. Bettini, X. S. Wang, and S. Jajodia,
``Testing complex temporal relationships involving multiple granularities
and its application to data mining,''
Proc. 15th ACM SIGACT-SIGMOD-SIGART
Symp. on Principles of Database Systems (PODS),
Montreal, Canada, June 1996, pages 68--78 (Acceptance ratio 22/84).
-
C. Bettini, X. S. Wang, and S. Jajodia,
``A general model and reasoning models for time granularity,''
Proc. 3rd Int'l. Workshop on Temporal Representation and
Reasoning (Time'96),
Key West, FL, May 1996, pages 104--111.
-
P. Ammann, S. Jajodia, and I. Ray,
``Ensuring atomicity of multilevel transactions,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1996, pages 74--84 (Acceptance ratio 20/69).
-
E. Bertino, S. Jajodia, and P. Samarati,
``Supporting multiple access control policies in database systems,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1996, pages 94--107 (Acceptance ratio 20/69).
-
I. Ray, E. Bertino, S. Jajodia, and L. Mancini,
``An advanced commit protocol for MLS distributed database systems,''
Proc. 3rd ACM Conf. on Computer and Communications
Security, New Delhi, India, March 1996, pages 119--128
(Acceptance ratio 19/59).
-
E. Bertino, S. Jajodia, and P. Samarati,
``A non-timestamped authorization model for relational databases,''
Proc. 3rd ACM Conf. on Computer and Communications
Security, New Delhi, India, March 1996, pages 169--178
(Acceptance ratio 19/59).
-
K. S. Candan, Sushil Jajodia and V.S. Subrahmanian,
``Secure mediated databases,'' Proc. 12th Int'l. Conf. on Data
Engineering, 1996, pages 28--37 (Acceptance ratio 60/264).
-
D. G. Marks, A. Motro, S. Jajodia,
``Enhancing the controlled disclosure of sensitive
information,''
Proc. European Symp. on Research in Computer Security,
Springer-Verlag Lecture Notes in Computer
Science, Vol. 1146, 1996, pages 290--303
(Acceptance ratio 21/58).
-
V. Atluri, E. Bertino, and S. Jajodia,
``Providing different degrees of recency options
to transactions in
multilevel secure databases,''
Database Security IX: Status and Prospects,
(D. Spooner et al., eds.),
Chapman & Hall, 1996, pages 231--247.
-
S. Jajodia, K. P. Smith, B. T. Blaustein, and L. Notargiacomo,
``Securely executing multilevel transactions,''
in Information Systems Security, S. K. Katsikas and D. Gritzalis, eds.,
Chapman & Hall, London, 1996, pages 259--270.
-
C. Bettini, X. S. Wang, E. Bertino, and S. Jajodia,
``Semantic assumptions and query evaluation in temporal databases,''
Proc. ACM SIGMOD Int'l. Conf. on Management of Data,
San Jose, CA, May 1995, pages 257--268 (Acceptance ratio 36/208).
-
P. Ammann, S. Jajodia, and I. Ray,
``Using formal methods to reason about semantics-based
decompositions of transactions,''
Proc. 21st Int'l. Conf. on Very Large Data Bases,
Zurich, Switzerland, September 1995, pages 218--227
(Acceptance ratio 52/297).
-
S. Jajodia, D. Marks, and E. Bertino,
``Maintaining secrecy and integrity in multilevel databases:
A practical approach,''
Proc. 18th National Information Systems Security Conf.,
Baltimore, MD, October 1995, pages 37--49.
-
V. Atluri, E. Bertino, and S. Jajodia,
``Degrees of isolation, concurrency control protocols,
and commit protocols,''
in
Database Security VIII: Status and Prospects,
(J. Biskup et al., eds.),
North-Holland, 1994, pages 259--274.
-
P. Ammann and S. Jajodia,
``An efficient multiversion algorithm for secure
servicing of transaction reads,''
Proc. 2nd ACM Conf. on Computer and Communications
Security, Fairfax, VA, November 1994, pages 118--125
(Acceptance ratio 31/70).
-
P. Samarati, P. Ammann, and S. Jajodia,
``Propagation of authorizations in distributed
database systems,''
Proc. 2nd ACM Conf. on Computer and Communications
Security, Fairfax, VA, November 1994, pages 136--147
(Acceptance ratio 31/70).
-
V. M. Doshi, W. R. Herndon, S. Jajodia, and C. D. McCollum,
``Benchmarking multilevel secure database systems using the MITRE
Benchmark,''
Proc. 10th Annual Computer Security Applications Conf.,
Orlando, FL, December 1994, pages 86--95.
-
A. Motro, D. Marks, and S. Jajodia,
``Aggregation in relational databases:
Controlled disclosure of sensitive information,''
Proc. European Symp. on Research in Computer Security,
Springer-Verlag Lecture Notes in Computer
Science, Vol. 875, 1994, pages 431--445.
-
E. Bertino, S. Jajodia,
and P. Samarati,
``Enforcing mandatory access control in object bases,''
in Security for Object-Oriented Systems,
(B. Thuraisingham, R. Sandhu, and T. C. Ting, eds.),
Springer-Verlag Workshops in Computing Series, 1994,
pages 96--116.
-
E. Bertino, L. V. Mancini, and S. Jajodia,
``Collecting garbage in multilevel secure object stores,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1994, pages 106--120 (Acceptance ratio 17/65).
-
P. Ammann and S. Jajodia,
``Planer lattice security structures for
multilevel replicated databases,''
in
Database Security VII: Status and Prospects,
(T. F. Keefe and C. E. Landwehr, eds.),
North-Holland, 1994, pages 125--134.
-
R. Mukkamala and S. Jajodia,
``A performance comparison of two decomposition techniques
for multilevel secure database management systems,''
in
Database Security VII: Status and Prospects,
(T. F. Keefe and C. E. Landwehr, eds.),
North-Holland, 1994, 199--214.
-
V. Atluri, E. Bertino, and S. Jajodia,
``Achieving stricter correctness requirements
in multilevel secure
databases: The dynamic case,''
in
Database Security VII: Status and Prospects,
(T. F. Keefe and C. E. Landwehr, eds.),
North-Holland, 1994, 135--158.
-
S. Jajodia, C. D. McCollum, and B. T. Blaustein,
``Integrating concurrency control and commit algorithms
in distributed multilevel secure databases,''
in
Database Security VII: Status and Prospects,
(T. F. Keefe and C. E. Landwehr, eds.),
North-Holland, 1994, 109--121.
-
S. Jajodia and X. S. Wang,
``Temporal mediators: Supporting uniform access
to heterogeneous temporal databases,''
Workshop on Interoperability of Database Systems and
Database Applications, Fribourg, Switzerland,
October 1993, pages 223--234.
-
E. Bertino, P. Samarati, and S. Jajodia,
``Authorizations in relational database management systems,''
Proc. 1st ACM Conf. on Computer and Communications
Security, Fairfax, VA, November 1993, pages 130--139
(Acceptance ratio 22/60).
-
E. Bertino, P. Samarati, and S. Jajodia,
``High assurance discretionary access control for
object bases,''
Proc. 1st ACM Conf. on Computer and Communications
Security, Fairfax, VA, November 1993, pages 140--150
(Acceptance ratio 22/60).
-
E. Bertino, S. Jajodia,
and P. Samarati,
``Enforcing mandatory access control in object-oriented databases,''
Proc. OOPSLA Conf. Workshop on Security in Object-Oriented
Systems, Washington, DC, September 1993,
pages 53--58 (Acceptance ratio 26/70).
-
E. Bertino and S. Jajodia,
``Modeling multilevel entities using single level objects,''
Proc. 3rd Int'l. Conf. on Deductive and Object-Oriented
Databases, Springer-Verlag Lecture Notes in Computer Science,
Volume 760, December 1993, pages 415--428.
-
X. S. Wang and S. Jajodia,
``Temporal mediators as a way to support multiple temporal
representations,''
Proc. Int'l. Workshop on an Infrastructure for
Temporal Databases,
Arlington, TX, June 1993.
-
X. S. Wang, S. Jajodia, and V. S. Subrahmanian,
``Temporal modules: An approach toward federated temporal databases,''
Proc. ACM SIGMOD Int'l. Conf. on Management of Data,
Washington, DC, May 1993, pages 227--236 (Acceptance ratio 42/235).
-
V. Atluri, E. Bertino, and S. Jajodia,
``Achieving stricter correctness requirements in multilevel
secure databases,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1993, pages 135--147 (Acceptance ratio 17/70).
-
B. T. Blaustein, S. Jajodia, C. D. McCollum and
L. Notargiacomo,
``A model of atomicity for multilevel transactions,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1993, pages 120--134 (Acceptance ratio 17/70).
-
V. Atluri and S. Jajodia,
``1SR consistency: A new notion of correctness for multilevel
secure, multiversion databases,''
Proc. XIX Latin American Informatics Conf.,
Buenos Aires, Argentina, August 1993, pages 2.97--2.116.
-
R. S. Sandhu and S. Jajodia,
``Referential integrity in multilevel secure databases,''
Proc. 16th National Computer Security Conf.,
Baltimore, Maryland,
September 1993, pages 39--52.
-
S. Jajodia and C. D. McCollum,
``Using two-phase commit for crash recovery in federated multilevel
secure database management systems,''
Proc. 3rd IFIP Working Conf. on Dependable Computing
for Critical Applications,
Springer-Verlag Dependable Computing and Fault Tolerant Systems, Vol. 8,
1993, pages 365--381 (Acceptance ratio 18/74).
-
J. Mcdermott and S. Jajodia,
``Orange locking: Channel-free database control via locking,''
in
Database Security VI: Status and Prospects,
(B. M. Thuraisingham and C. E. Landwehr, eds.),
North-Holland, 1993, pages 267--284.
-
O. Costich and S. Jajodia,
``Maintaining multilevel transaction atomicity in multilevel secure
database systems with kernelized architecture,''
in
Database Security VI: Status and Prospects,
(B. M. Thuraisingham and C. E. Landwehr, eds.),
North-Holland, 1993, pages 249--265.
-
V. M. Doshi and S. Jajodia,
``Enforcing entity and referential integrity in multilevel secure
databases,'' Proc. 15th National Computer Security Conf.,
Baltimore, Maryland,
October 1992, pages 134--143.
-
L. Notargiacomo, V. Ashby, V. Doshi, S. Jajodia,
J. Filsinger, and R. Ross,
``Companion Document Series of the Trusted Database Management
System Interpretation,''
Proc. 15th National Computer Security Conf.,
Baltimore, Maryland,
October 1992, pages 57--65.
-
O. Wolfson and S. Jajodia,
``An algorithm for dynamic data distribution,''
Proc. 2nd IEEE Workshop on Management of Replicated data,
Monterey, Calif, November 1992, pages 62--65.
-
R. S. Sandhu and S. Jajodia,
``Polyinstantiation for cover stories,''
Proc. European Symp. on Research in Computer Security,
Toulouse, France, Springer-Verlag Lecture Notes in
Computer Science, Vol. 648, 1992, pages 307--328.
-
S. Jajodia and V. Atluri,
``Alternative correctness criteria for concurrent
execution of transactions in multilevel
secure database systems,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1992, pages 216--224 (Acceptance ratio 21/89).
-
P. Ammann, F. Jaeckle, and S. Jajodia,
``A two snapshot algorithm for concurrency control
algorithm in secure multi-level databases,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 1992, pages 204--215 (Acceptance ratio 21/89).
-
O. Wolfson and S. Jajodia,
``Distributed algorithms for dynamic replication of
data,''
Proc. 11th ACM SIGACT-SIGMOD-SIGART
Symp. on Principles of Database Systems,
San Diego, Calif., June 1992, pages 149--163 (Acceptance ratio 32/105).
-
V. Doshi and S. Jajodia,
``Referential integrity in multilevel secure database
management systems,''
in
IT Security: The Need for International Cooperation,
(G. G. Gable and W. J. Caelli, eds.),
North-Holland, 1992, pages 359--371.
-
S. Jajodia and R. Mukkamala, ``Effects of SeaView decomposition
of multilevel relations on database performance,''
in
Database Security V: Status and Prospects,
(C. E. Landwehr and S. Jajodia, eds.),
North-Holland, 1992, pages 203--225.
-
P. Ammann and S. Jajodia, ``A timestamp ordering algorithm
for secure, single-version, multi-level databases,''
in
Database Security V: Status and Prospects,
(C. E. Landwehr and S. Jajodia, eds.),
North-Holland, 1992, pages 191--202.
-
R. S. Sandhu, R. Thomas, and S. Jajodia,
``Supporting timing channel free computations in multilevel secure
object-oriented databases,''
in
Database Security V: Status and Prospects,
(C. E. Landwehr and S. Jajodia, eds.),
North-Holland, 1992, pages 297--314.
-
J. McDermott, S. Jajodia, and R. Sandhu,
``A single-level scheduler for the replicated architecture
for multilevel secure databases,''
Proc. 7th Annual Computer Security Applications Conf.,
San Antonio, Texas, December 1991, pages 2--11.
-
B. Kogan and S. Jajodia,
``An audit model for object-oriented databases,''
Proc. 7th Annual Computer Security Applications Conf.,
San Antonio, Texas, December 1991, pages 90--99.
-
R. Sandhu and S. Jajodia,
``Honest databases that can keep secrets,''
Proc. 14th National Computer Security Conf.,
Washington, D.C., October 1991,
pages 267--282.
-
S. Jajodia
and R. Sandhu,
``Toward a multilevel secure relational data model,''
Proc. ACM SIGMOD Int'l. Conf. on Management of Data,
Denver, Colorado, May 29-31, 1991, pages 50-59 (Acceptance ratio 45/201).
-
S. Jajodia
and R. Sandhu,
``A novel decomposition of multilevel relations into
single-level relations,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 20-22, 1991, pages 300-313 (Acceptance ratio 28/92).
-
R. S. Sandhu, R. Thomas, and S. Jajodia,
``A secure kernelized architecture for multilevel object-oriented
databases, ''
Proc. Computer Security Foundations Workshop IV,
Franconia, NH, June 1991, pages 139-152.
-
G. Wiederhold, S. Jajodia, and W. Litwin,
``Dealing with granularity of time in temporal databases,''
Proc. 3rd Int'l. Conf. on Advanced Information Systems
Engineering,
Lecture Notes in Computer Science, Vol. 498,
(R. Anderson et al. eds.), Springer-Verlag, 1991, pages 124-140.
-
S. Jajodia and R. Sandhu,
``Polyinstantiation integrity in multilevel relations revisited,''
in
Database Security IV: Status and Prospects,
(S. Jajodia and C. E. Landwehr, eds.),
North-Holland, 1991, pages 297-307.
-
S. Jajodia, R. Sandhu, and E. Sibley,
``Update semantics for multilevel relations,''
Proc. 6th Annual Computer Security Applications Conf.,
Tucson, Arizona, December 1990, pages 103-112.
-
R. Sandhu and S. Jajodia,
``Integrity mechanisms in database management systems,''
Proc. 13th National Computer Security Conf.,
Washington, D.C., October 1-4, 1990, pages 526--540.
-
B. Kogan, S. Jajodia, and R. Sandhu,
``Implementation issues in multilevel security for object-oriented
databases,''
Proc. Workshop on Security for Object-Oriented Systems,
Karlsruhe, West Germany, April 23-26, 1990.
(Proceedings will be published by Springer-Verlag.)
-
S. Jajodia, R. Sandhu, and T. Rosenau,
``Implementing basic relational database operations on shared-memory
MIMD computers,'' PARCOM90 Conference on Parallel Computing,
Pune, India, December 1990.
-
B. Kogan and S. Jajodia, ``Concurrency control in multilevel-secure
databases using replicated architecture,''
Proc.
ACM SIGMOD Int'l. Conf. on Management of Data,
Atlantic City, NJ, May 23-25, 1990, pages 153-162 (Acceptance ratio 37/206).
-
S. Jajodia and B. Kogan,
``Integrating an object-oriented data model with multilevel
security,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 7-9, 1990, pages 76-85 (Acceptance ratio 33/99).
Also appeared as
Rome Air Development Center Technical Report No. RADC-TR-90-91,
May, 1990.
-
S. Jajodia and R. Sandhu,
``Polyinstantiation integrity in multilevel relations,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 7-9, 1990, pages 104-115 (Acceptance ratio 33/99).
-
S. Jajodia and B. Kogan, ``Transaction processing in multilevel-secure
databases using replicated architecture,''
Proc. IEEE Symp. on Research in Security and Privacy,
Oakland, Calif., May 7-9, 1990, pages 360-368 (Acceptance ratio 33/99).
-
S. Jajodia and R. Sandhu, ``A formal framework for single level
decomposition of multilevel relations,''
Proc. Computer Security Foundations Workshop III,
Franconia, NH, June 12-14, 1990, pages 152-158.
-
R. Sandhu, S. Jajodia and T. Lunt, ``A new polyinstantiation
integrity
constraint for multilevel relations,''
Proc. Computer Security Foundations Workshop III,
Franconia, NH, June 12-14, 1990, pages159-165.
-
S. Jajodia, S. K. Gadia, G. Bhargava, and E. H. Sibley,
``Audit trail organization in relational databases,''
in
Database Security III: Status and Prospects,
(D. Spooner and C. E. Landwehr, eds.),
North-Holland, 1990, pages 269-281.
-
C. Meadows and S. Jajodia, ``Maintaining
correctness, availability, and unambiguity in trusted database management
systems,'' Proc. 4th Aerospace Computer Security
Applications Conference, Orlando, FL, December 1988, pages 106-110.
-
S. Jajodia and D. Mutchler, ``Dynamic voting algorithms
for managing replicated data,'' Proc. 4th National
Convention of Computer Engineers, Calcutta, India, December 1988,
pages 236-240.
-
S. Jajodia and D. Mutchler, ``Integrating static and dynamic
voting protocols to enhance file availability,''
Proc 4th IEEE Int'l. Conf. on Data Engineering, Los
Angeles, CA, February 1988,
pages 144-153 (Acceptance ratio 66/210).
-
C. Meadows and S. Jajodia,
``Integrity versus security in multi-level secure databases,''
in
Database Security: Status and Prospects, (C. E. Landwehr,
ed.), North-Holland, 1988, pages 89-101.
BOOK CHAPTERS
- Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``An architecture
for supporting interoperability among temporal databases,'' in
Temporal Databases: Research and Practice, Opher Etzion and
Sushil Jajodia and Sury Sripada, eds., Springer-Verlag Lecture Notes
in Computer Science, Vol. 1399 (1998), pages 36--55.
- Yu Wu, Sushil Jajodia and X. Sean Wang, ``Temporal database
bibliography update,'' in Temporal Databases: Research and
Practice, Opher Etzion, Sushil Jajodia and Sury Sripada, eds.,
Springer-Verlag Lecture Notes in Computer Science, Vol. 1399
(1998), pages 338--366.
-
P. Ammann, S. Jajodia, and I. Ray,
``Semantics-based decomposition of transactions,''
in Advanced Transaction Models and Architectures,
S. Jajodia and L. Kerschberg, eds.,
Kluwer (1997), pages 153--180.
-
L. Mancini, I. Ray, S. Jajodia, and E. Bertino,
``Flexible commit protocols for advanced transaction processing,''
in Advanced Transaction Models and Architectures,
S. Jajodia and L. Kerschberg, eds.,
Kluwer (1997), pages 91--124.
-
S. Jajodia,
``Database security and privacy,''
in The Computer Science and Engineering Handbook,
Allen B, Tucker, Jr., ed.,
CRC Press (1997), pages 1112--1124.
-
S. Jajodia, B. Kogan, and R. Sandhu,
``A multilevel-secure object-oriented data model,''
in Readings in Object-Oriented Systems and Applications,
D. Rine, ed.,
IEEE Computer Society Press (1995), pages 206--215.
-
S. Jajodia, R. Mukkamala,
``Reduction in transaction conflicts using semantics-based
concurrency control,''
in Performance of Concurrency Control Mechanisms in
Centralized Database Systems,
V. Kumar, ed., Prentice-Hall (1995), pages 387--405.
-
S. Jajodia and R. Sandhu,
``Toward a multilevel secure relational data model,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 460--492.
-
S. Jajodia, R. Sandhu, and B. T. Blaustein,
``Solutions to the polyinstantiation problem,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
493--529.
-
C. Meadows and S. Jajodia,
``Integrity in multilevel secure database management systems,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
530--541.
-
S. Jajodia and C. Meadows,
``Inference problems in multilevel secure database management
systems,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
570--584.
-
S. Jajodia, S. Gadia, and G. Bhargava,
``Logical design of audit information in relational databases,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
585--595.
-
S. Jajodia, B. Kogan, and R. Sandhu,
``A multilevel-secure object-oriented data model,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
596--616.
-
R. Sandhu and S. Jajodia,
``Integrity mechanisms in database management systems,''
in Information Security: An Integrated Collection of Essays,
M. Abrams et al., eds., IEEE Computer Society Press (1995), pages
617--634.
-
E. Bertino, S. Jajodia, and P. Samarati,
``Access Controls in Object-Oriented Database
Systems -- Some Approaches and Issues,''
in Advanced Database Systems,
N. R. Adam and B. Bhargava, eds., Springer-Verlag Lecture Notes
in Computer Science, Vol. 759 (1993), pages 17--44.
-
G. Wiederhold, S. Jajodia, and W. Litwin,
``Integrating temporal data in a heterogeneous environment,''
in Temporal Databases,
A. Tansel et al., eds., Benjamin/Cummings (1993), pages
563--579.
-
Sandhu, R. S. and Jajodia, S. ``Data base security
controls.'' Handbook of Information Security
Management, (Tipton, H.F. and Ruthberg, Z.A., editors),
Auerbach Publishers (1993), pages 481--499.
UNREFEREED ARTICLES
-
Claudio Bettini, X. Sean Wang, Sushil Jajodia,
``Mining temporal relationships with multiple granularities in
time sequences,'' IEEE Bulletin of the Technical Committee
on Data Engineering, Vol. 21, No. 1, March 1998, pages 32--38.
-
Sushil Jajodia, Daniel Barbara, Alex Brodsky, Larry Kerschberg,
Ami Motro, Edgar Sibley, and X.
Sean Wang. ``Information Systems Research at George Mason University,''
ACM SGMOD Record, December 1997, pages 69--74.
-
Yvo Desmedt and Sushil Jajodia, "Redistributing secret shares to new access
structures and its applications," George Mason University, July 1997. PDF
-
S. Jajodia,
``Database security and privacy,''
ACM Computing Surveys,, 50th anniversary
commemorative issue, Vol. 28, No. 1,
March 1996, pages 129--131.
-
Paul Ammann and Sushil Jajodia,
``Rethinking integrity,''
IEEE Concurrency, October-December 1997, pages 5--6.
-
Paul Ammann and Sushil Jajodia,
``Semantics-based transaction processing: Satisfying conflicting
objectives,'' IEEE Concurrency, April--June 1997, pages 8--10.
-
C. S. Jensen, S. Jajodia et al. (eds.),
``A consensus glossary of temporal database concepts,''
ACM SIGMOD Record, vol. 23,
No. 1, March 1994, pages 52--63.
-
S. Jajodia,
``Computer Security,''
McGraw-Hill Yearbook of Science and Technology,
1994, pages 103--104.
-
S. Jajodia and Ravi S. Sandhu,
``Enforcing primary key requirements in multilevel relations,''
Proc. 4th RADC Workshop on Multilevel Database
Security, Little Compton, Rhode Island, April 1991.
Published as MITRE Techical Report M92B0000118
(R. K. Burns, ed.), September 1992, 11--16.
-
S. Jajodia,
``Aggregation and inference problems in multilevel secure systems,''
Proc. 4th RADC Workshop on Multilevel Database
Security, Little Compton, Rhode Island, April 1991.
Published as MITRE Techical Report M92B0000118
(R. K. Burns, ed.), September 1992, 67--73.
-
S. Jajodia, ``Panel discussion on the polyinstantiation
problem: A position paper,''
Proc. Computer Security Foundations Workshop IV,
Franconia, NH, June 1991, p. 235.
-
R. Sandhu and S. Jajodia,
``Restricted polyinstantiation, or How
to close signaling channels without duplicity,''
Proc. 3rd RADC Workshop on Multilevel Database
Security, Castille, New York, June 1990.
Published as MITRE Techical Report MTP 385
(B. Thuraisingham, ed.), May 1991, pp. 13-25.
-
S. Jajodia and R. Sandhu, ``Database security: Current
status and key issues,''
ACM SIGMOD Record, vol. 19, no. 4, December 1990, pp.
123-126.
-
S. Jajodia,
``Distributed and heterogeneous database management systems,''
in MacMillan Encyclopedia of Computers, 1990.
-
S. Jajodia, ``Tough issues: Integrity and auditing in multilevel
secure databases,''
Proc. 13th National Computer Security Conf.,
Washington, D.C., October 1-4, 1990, pp. 577--580.
-
S. Jajodia, ``Multilevel secure object-oriented database
model,''
Proc. 13th National Computer Security Conf.,
Washington, D.C., October 1-4, 1990, pp. 600--601.
-
S. Jajodia and R. Sandhu, ``Key problems in multilevel-secure
database management systems,''
Proc. 3rd RADC Workshop in Multilevel Database Security,
Castille, NY, June 4-7, 1990.
Published as MITRE Techical Report MTP 385
(B. Thuraisingham, ed.), May 1991, pp. 7-12.
-
B. Kogan and S. Jajodia, ``Secure concurrency control,''
Proc. 3rd RADC Workshop in Multilevel Database Security,
Castille, NY, June 4-7, 1990.
Published as MITRE Techical Report MTP 385
(B. Thuraisingham, ed.), May 1991, pp. 165-166.
-
S. Jajodia, S. K. Gadia, G. Bhargava, and E. H. Sibley,
``Auditing in secure Database Management System,''
Proc.
2nd RADC Workshop on Database Security.
Published
as Reseach Directions in Database Security, II,
(T. F. Lunt, ed), Rome Air Development Center
Technical Report # RADC-TR-90-268,
December 1989, pp. 120-129.
OTHER ARTICLES
- Sushil Jajodia, "Interview: Amit Sheth On Workflow Technology," IEEE Concurrency, Vol. 6, No. 2, April-June 1998, pages 21-23.
- Paul Ammann, Sushil Jajodia, "Rethinking integrity," IEEE Concurrency, Vol. 5, No. 4, Oct.-Dec.1997, pages 5-6.
- Paul Ammann, Sushil Jajodia, "Semantics-based transaction processing: satisfying conflicting objectives," IEEE Concurrency, Vol. 5, No. 2, April-June 1997, pages 8-10.