Sushil Jajodia
List of Publications 1988-1998


Click here for Free Access to all my ACM Publications


EDITED BOOKS

  1. O. Etzion, S. Jajodia, and S. Sripada, eds., Temporal Databases: Research and Practice, Lecture Notes in Computer Science, Vol. 1399, Springer-Verlag, Berlin (1998), 429 pages.
  2. S. Jajodia and L. Kerschberg, eds., Advanced Transaction Models and Architectures, Kluwer Academic Publishers, Boston (1997), 400 pages.
  3. V. S. Subrahmanian and S. Jajodia, eds., Multimedia Database Systems: Issues and Research Directions, Artificial Intelligence Series, Springer-Verlag, Berlin (1996), 323 pages. Reprinted by Beijing World Publishing Corp., 1998.
  4. M. Abrams, S. Jajodia, and H. Podell, eds., Information Security: An Integrated Collection of Essays, IEEE Computer Society Press, Los Alamitos (1995), 768 pages.
  5. A. U. Tansel, J. Clifford, S. Gadia, S. Jajodia, A. Segev, and R. Snodgrass, eds. Temporal Databases: Theory, Design, and Implementation,center-evaluation-97 Benjamin/Cummings, Redwood City(1993), 633 pages.
  6. Won Kim, Sushil Jajodia, Ami Motro, Machael J. Carey, Roger King, eds., Database Engineering, Volume 8, IEEE Computer Society Press (1989).

EDITED PROCEEDINGS

  1. S. Jajodia, W. List, G. McGregor, and L. Strous, eds., Integrity and Internal Control in Information Systems, Kluwer Academic Publishers, Boston, (1998), 304 pages.
  2. S. Jajodia, M. T. Ozsu, and A. Dogac, eds., Advances in Multimedia Information Systems, Lecture Notes in Computer Science, Vol. 1508, Springer-Verlag, Berlin (1998), 207 pages.
  3. S. Jajodia, W. List, G. McGregor, and L. Strous, eds., Integrity and Internal Control in Information Systems, Volume 1, Chapman & Hall, London, (1997), 370 pages.
  4. P. Buneman and S. Jajodia, eds., Proc. ACM SIGMOD Int'l.\ Conf. on Management of Data, ACM Press (1993).
  5. C. E. Landwehr and S. Jajodia, eds., Database Security V: Status and Prospects, North-Holland (1992).
  6. S. Jajodia and C. E. Landwehr, eds., Database Security IV: Status and Prospects, North-Holland (1991).
  7. Sushil Jajodia, Won Kim, Abraham Silberschatz, eds., Proc. ACM-IEEE Int'l. Symp. on Databases in Parallel and Distributed Systems, IEEE Computer Soc. Press (1988).

JOURNAL ARTICLES

  1. Neil F. Johnson and Sushil Jajodia, ``Exploring Steganography: Seeing the unseen,'' IEEE Computer, Vol. 31, No. 2, February 1998, pages 26--34.
  2. I. Ray, P. Ammann, S. Jajodia, ``A semantic-based transaction processing model for multilevel transactions,'' Jour. of Computer Security, Vol. 6, No. 3, 1998, pages 181--217.
  3. C. Bettini, X. S. Wang, and S. Jajodia, ``Temporal semantic assumptions and their use in database query evaluation,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 10, No. 2, March/April 1998, pages 257--268.
  4. C. Bettini, X. S. Wang, S. Jajodia, J. Lin, ``Discovering temporal relationships with multiple granularities in time sequences,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 10, No. 2, March/April 1998, pages 222--237.
  5. E. Bertino, S. Jajodia, L. Mancini, and I. Ray, ``Advanced transaction processing in multilevel secure file stores,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 10, No. 1, January/February 1998, pages 120-135.
  6. C. Bettini, X. Wang, S. Jajodia, ``A general framework for time granularity and its application to temporal reasoning, Annals of Mathematics and Artificial Intelligenceg, Vol. 22, No. 1,2, 1998, pages 29--58.
  7. X. Sean Wang, Sushil Jajodia, and Sona Mohavni, ``Temporal mediators: Supporting uniform accesses to heterogeneous temporal information,'' Int'l. Jour. on Artificial Intelligence, Tools, Vol. 7, No. 3, 1998, pages 319--339.
  8. P. Ammann, S. Jajodia, and I. Ray, ``Applying formal methods to semantic-based decomposition of transactions,'' ACM Trans. on Database Systems, Vol. 22, No. 2, June 1997, pages 215--254.
  9. X. S. Wang, C. Bettini, A. Brodsky, and S. Jajodia, ``Logical design for temporal databases with multiple granularities,'' ACM Trans. on Database Systems, Vol. 22, No. 2, June 1997, pages 115--170.
  10. O. Wolfson, S. Jajodia, and Y. Huang, ``An adaptive data replication algorithm,'' ACM Trans. on Database Systems, Vol. 22, No. 2, June 1997, pages 255--314.
  11. V. Atluri, S. Jajodia, and E. Bertino, ``Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 9, No. 5, September/October 1997, pages 697--708.
  12. P. Samarati, E. Bertino, A. Ciampichetti, and S. Jajodia, ``Information flow control in object-oriented systems,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 9, No. 4, July/August 1997, pages 524--538.
  13. E. Bertino, P. Samarati, and S. Jajodia, ``An extended authorization model for relational databases,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 9, No. 1, 1997, pages 85--101.
  14. V. Atluri, E. Bertino, and S. Jajodia, ``A theoretical formulation for degrees of isolation in databases,'' Information and Software Technology, Vol. 39, No. 1, 1997, pages 47--53.
  15. V. Atluri, S. Jajodia, and E. Bertino, ``Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 8, No. 5, October 1996, pages 839--854.
  16. P. Samarati, E. Bertino, and S. Jajodia, ``An authorization model for a distributed hypertext system,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 8, No. 4, August 1996, pages 555--562.
  17. P. Ammann, S. Jajodia, and P. Frankl, ``Globally consistent event ordering in one-directional distributed environments,'' IEEE Trans. on Parallel and Distributed Systems, Vol. 7, No. 6, June 1996, pages 665--670.
  18. K. P. Smith, B. T. Blaustein, S. Jajodia, and L. Notargiacomo, ``Correctness criteria for multilevel transactions,'' IEEE Trans, on Knowledge and Data Engineering, Vol. 8, No. 1, February 1996, pages 32--45.
  19. P. Samarati, P. Ammann, and S. Jajodia, ``Maintaining replicated authorizations in distributed database systems,'' Data & Knowledge Engineering, Vol. 18, No. 1, February 1996, pages 55--84.
  20. P. Ammann, S. Jajodia, and P. Mavuluri, ``On-the-fly reading of entire databases,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 7, No. 5, 1995, pages 834--838.
  21. P. Ammann, V. Atluri, and S. Jajodia, ``The partitioned synchronization rule for planer partial orders,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 7, No. 5, 1995, pages 797--809.
  22. E. Bertino, S. Jajodia, and P. Samarati, ``Database security: Research and practice,'' Information Systems, Vol. 20, No. 7, 1995, pages 537--556.
  23. X. S. Wang, S. Jajodia, and V. S. Subrahmanian, ``Temporal modules: An approach toward federated temporal databases,'' Information Sciences, Vol. 82, 1995, pages 103--128.
  24. P. Ammann, F. Jaeckle, and S. Jajodia, ``Concurrency control in a secure multi-level database via a two-snapshot algorithm,'' Jour. of Computer Security, Vol. 3, No. 2,3, 1995, pages 87--113.
  25. O. Wolfson and S. Jajodia, ``An algorithm for dynamic data allocation in distributed systems,'' Information Processing Letters, Vol. 53, No. 2, 1995, pages 113--119.
  26. S. Jajodia, R. Mukkamala, and K. V. S. Ramarao, ``A view-based dynamic replication control algorithm,'' Nordic Journal of Computing, Vol. 1, No. 2, 1994, pages 214--230.
  27. P. Ammann and S. Jajodia, ``Distributed timestamp generation in planar lattice networks,'' ACM Trans. on Computer Systems, Vol. 11, No. 3, August 1993, pages 205--225.
  28. V. Atluri, E. Bertino, and S. Jajodia, ``Achieving stricter correctness requirements in multilevel secure databases,'' Jour. of Computer Security, Vol. 2, No. 4, 1993, pages 311--351.
  29. S. Jajodia and R. Mukkamala, ``Measuring the effect of commutative transactions on distributed database performance,'' Information Sciences, Vol. 68, Nos.\ 1/2, February 1993, pages 91-111.
  30. R. Sandhu and S. Jajodia, ``Eliminating polyinstantiation securely,'' Computers & Security, Vol. 11, 1992, pages 547-562.
  31. R. Mukkamala and S. Jajodia, ``A note on estimating the cardinality of the projection of a database relation,'' ACM Trans. on Database Systems, Vol. 16, No. 3, September 1991, pages 564-566.
  32. S. Jajodia and D. Mutchler, ``Determining whether a vote assignment is dominated,'' Information Sciences, Vol. 56, Nos. 1-3, 1991, pages 279-282.
  33. R. Sandhu and S. Jajodia, ``Integrity principles and mechanisms in database management systems,'' Computers & Security, Vol. 10, 1991, pages 413-427.
  34. S. Jajodia and D. Mutchler, ``Dynamic voting algorithms for maintaining the consistency of a replicated database,'' ACM Trans. on Database Systems, Vol. 15, No. 2, June 1990, pages 230-280.
  35. S. Jajodia and F. N. Springsteel, ``Lossless outer join with incomplete information,'' BIT Numerical Mathematics, vol. 30, 1990, pages 34-41.  DOI: https://doi.org/10.1007/BF01932129
  36. S. Jajodia and D. Mutchler, ``A hybrid replica control algorithm combining static and dynamic voting,'' IEEE Trans. on Knowledge and Data Engineering, vol. 1, no. 4, December 1989, pages 459-469.
  37. S. Jajodia and D. Mutchler, ``A pessimistic consistency control algorithm for replicated files which achieves high availability,'' IEEE Trans. on Software Engineering, vol. 15, no. 1, January 1989, pages 39-46.

ARTICLES IN REFEREED CONFERENCE PROCEEDINGS

  1. G. Rumolo and S. Jajodia, ``Algebra for databases with explicit markings of damaged data,'' in Integrity and Internal Control in Information Systems, S. Jajodia, et al., eds., Kluwer, Boston, 1998, pages 103--129.
  2. Sushil Jajodia, Peng Liu, Catherine D. McCollum, ``Application-level isolation to cope with malicious database users,'' Proc. 14th Annual Computer Security Applications Conf., Phoenix, AZ, December 1998.
  3. Neil F. Johnson and Sushil Jajodia, ``Steganalysis: The investigation of hidden information,'' Proc. IEEE Information Technology Conf., Syracuse, NY, September 1998, pages 113--116.
  4. Neil F. Johnson and Sushil Jajodia, ``Steganalysis of images created using current steganography software,'' Proc.\ Workshop on Information Hiding, Springer Lecture Notes in Computer Science, Vol. 1525, 1998, pages 273--289.
  5. Sushil Jajodia, Luigi Mancini, Sanjeev Setia. ``A fair locking protocol for multilevel secure databases,'' Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1998, pages 168--178.
  6. Jia-Ling Lin, X. Sean Wang, Sushil Jajodia, ``Abstraction-based misuse detection: High-level specifications and adaptable strategies,'' Proc. 11th IEEE Computer Security Foundations Workshop, Rockport, MA, June 1998, pages 190--201.
  7. Sushil Jajodia, Ravi Mukkamala, and Indrajit Ray, ``A two-tier coarse indexing scheme for MLS database systems,'' in Database Security XI: Status and Prospects, T. Y. Lin and S. Qian, eds., Chapman and Hall, London, 1998, pages 199--218.
  8. S. Jajodia, P. Samarati, V. S. Subrahmanian, and E. Bertino, ``A unified framework for enforcing multiple access control policies,'' Proc. ACM SIGMOD Int'l. Conf.\ on Management of Data, May 1997, pages 474--485 (Acceptance ratio 42/202).
  9. Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``Satisfiability of quantitative temporal constraints with multiple granularities,'' Proc. 3rd I'ntl. Conf. on Principles and Practice of Constraint Programming, Springer-Verlag Lecture Notes in Computer Science, Vol.\ 1330, 1997, pages 435-449.
  10. P. Ammann, S. Jajodia, C. D. McCollum, and B. T. Blaustein, ``Surviving information warfare attacks on databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 164--174 (Acceptance ratio 20/110).
  11. S. Jajodia, P. Samarati, and V. S. Subrahmanian, ``A logical language for expressing authorizations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 31--42 (Acceptance ratio 20/110).
  12. E. Ferrari, P. Samarati, E. Bertino, and S. Jajodia, ``Providing flexibility in information flow control for object-oriented systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1997, pages 130--140 (Acceptance ratio 20/110).
  13. S. Jajodia, I. Ray, and P. Ammann, ``Implementing semantic-based decomposition of transactions,'' Proc. 9th Conf. on Advanced Information Systems Engineering (CAiSE*97), Springer-Verlag Notes in Computer Science, Vol. 1250, 1997, pages 75--88 (Acceptance ratio 30/112).
  14. S. Jajodia, L. Mancini, and I. Ray, ``Secure locking protocols for multilevel database management systems,'' in Database Security X: Status and Prospects, P. Samarati and R. Sandhu, eds., Chapman and Hall, London, 1997, pages 177--194.
  15. V. Atluri, S. Jajodia, T. F. Keefe, C. McCollum, and R. Mukkamala, ``Multilevel secure transaction processing: Status and prospects,'' in Database Security X: Status and Prospects, P. Samarati and R. Sandhu, eds., Chapman and Hall, London, 1997, pages 79--98.
  16. C. Bettini, X. S. Wang, and S. Jajodia, ``Testing complex temporal relationships involving multiple granularities and its application to data mining,'' Proc. 15th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems (PODS), Montreal, Canada, June 1996, pages 68--78 (Acceptance ratio 22/84).
  17. C. Bettini, X. S. Wang, and S. Jajodia, ``A general model and reasoning models for time granularity,'' Proc. 3rd Int'l. Workshop on Temporal Representation and Reasoning (Time'96), Key West, FL, May 1996, pages 104--111.
  18. P. Ammann, S. Jajodia, and I. Ray, ``Ensuring atomicity of multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 74--84 (Acceptance ratio 20/69).
  19. E. Bertino, S. Jajodia, and P. Samarati, ``Supporting multiple access control policies in database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1996, pages 94--107 (Acceptance ratio 20/69).
  20. I. Ray, E. Bertino, S. Jajodia, and L. Mancini, ``An advanced commit protocol for MLS distributed database systems,'' Proc. 3rd ACM Conf. on Computer and Communications Security, New Delhi, India, March 1996, pages 119--128 (Acceptance ratio 19/59).
  21. E. Bertino, S. Jajodia, and P. Samarati, ``A non-timestamped authorization model for relational databases,'' Proc. 3rd ACM Conf. on Computer and Communications Security, New Delhi, India, March 1996, pages 169--178 (Acceptance ratio 19/59).
  22. K. S. Candan, Sushil Jajodia and V.S. Subrahmanian, ``Secure mediated databases,'' Proc. 12th Int'l. Conf. on Data Engineering, 1996, pages 28--37 (Acceptance ratio 60/264).
  23. D. G. Marks, A. Motro, S. Jajodia, ``Enhancing the controlled disclosure of sensitive information,'' Proc. European Symp. on Research in Computer Security, Springer-Verlag Lecture Notes in Computer Science, Vol. 1146, 1996, pages 290--303 (Acceptance ratio 21/58).
  24. V. Atluri, E. Bertino, and S. Jajodia, ``Providing different degrees of recency options to transactions in multilevel secure databases,'' Database Security IX: Status and Prospects, (D. Spooner et al., eds.), Chapman & Hall, 1996, pages 231--247.
  25. S. Jajodia, K. P. Smith, B. T. Blaustein, and L. Notargiacomo, ``Securely executing multilevel transactions,'' in Information Systems Security, S. K. Katsikas and D. Gritzalis, eds., Chapman & Hall, London, 1996, pages 259--270.
  26. C. Bettini, X. S. Wang, E. Bertino, and S. Jajodia, ``Semantic assumptions and query evaluation in temporal databases,'' Proc. ACM SIGMOD Int'l. Conf. on Management of Data, San Jose, CA, May 1995, pages 257--268 (Acceptance ratio 36/208).
  27. P. Ammann, S. Jajodia, and I. Ray, ``Using formal methods to reason about semantics-based decompositions of transactions,'' Proc. 21st Int'l. Conf. on Very Large Data Bases, Zurich, Switzerland, September 1995, pages 218--227 (Acceptance ratio 52/297).
  28. S. Jajodia, D. Marks, and E. Bertino, ``Maintaining secrecy and integrity in multilevel databases: A practical approach,'' Proc. 18th National Information Systems Security Conf., Baltimore, MD, October 1995, pages 37--49.
  29. V. Atluri, E. Bertino, and S. Jajodia, ``Degrees of isolation, concurrency control protocols, and commit protocols,'' in Database Security VIII: Status and Prospects, (J. Biskup et al., eds.), North-Holland, 1994, pages 259--274.
  30. P. Ammann and S. Jajodia, ``An efficient multiversion algorithm for secure servicing of transaction reads,'' Proc. 2nd ACM Conf. on Computer and Communications Security, Fairfax, VA, November 1994, pages 118--125 (Acceptance ratio 31/70).
  31. P. Samarati, P. Ammann, and S. Jajodia, ``Propagation of authorizations in distributed database systems,'' Proc. 2nd ACM Conf. on Computer and Communications Security, Fairfax, VA, November 1994, pages 136--147 (Acceptance ratio 31/70).
  32. V. M. Doshi, W. R. Herndon, S. Jajodia, and C. D. McCollum, ``Benchmarking multilevel secure database systems using the MITRE Benchmark,'' Proc. 10th Annual Computer Security Applications Conf., Orlando, FL, December 1994, pages 86--95.
  33. A. Motro, D. Marks, and S. Jajodia, ``Aggregation in relational databases: Controlled disclosure of sensitive information,'' Proc. European Symp. on Research in Computer Security, Springer-Verlag Lecture Notes in Computer Science, Vol. 875, 1994, pages 431--445.
  34. E. Bertino, S. Jajodia, and P. Samarati, ``Enforcing mandatory access control in object bases,'' in Security for Object-Oriented Systems, (B. Thuraisingham, R. Sandhu, and T. C. Ting, eds.), Springer-Verlag Workshops in Computing Series, 1994, pages 96--116.
  35. E. Bertino, L. V. Mancini, and S. Jajodia, ``Collecting garbage in multilevel secure object stores,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1994, pages 106--120 (Acceptance ratio 17/65).
  36. P. Ammann and S. Jajodia, ``Planer lattice security structures for multilevel replicated databases,'' in Database Security VII: Status and Prospects, (T. F. Keefe and C. E. Landwehr, eds.), North-Holland, 1994, pages 125--134.
  37. R. Mukkamala and S. Jajodia, ``A performance comparison of two decomposition techniques for multilevel secure database management systems,'' in Database Security VII: Status and Prospects, (T. F. Keefe and C. E. Landwehr, eds.), North-Holland, 1994, 199--214.
  38. V. Atluri, E. Bertino, and S. Jajodia, ``Achieving stricter correctness requirements in multilevel secure databases: The dynamic case,'' in Database Security VII: Status and Prospects, (T. F. Keefe and C. E. Landwehr, eds.), North-Holland, 1994, 135--158.
  39. S. Jajodia, C. D. McCollum, and B. T. Blaustein, ``Integrating concurrency control and commit algorithms in distributed multilevel secure databases,'' in Database Security VII: Status and Prospects, (T. F. Keefe and C. E. Landwehr, eds.), North-Holland, 1994, 109--121.
  40. S. Jajodia and X. S. Wang, ``Temporal mediators: Supporting uniform access to heterogeneous temporal databases,'' Workshop on Interoperability of Database Systems and Database Applications, Fribourg, Switzerland, October 1993, pages 223--234.
  41. E. Bertino, P. Samarati, and S. Jajodia, ``Authorizations in relational database management systems,'' Proc. 1st ACM Conf. on Computer and Communications Security, Fairfax, VA, November 1993, pages 130--139 (Acceptance ratio 22/60).
  42. E. Bertino, P. Samarati, and S. Jajodia, ``High assurance discretionary access control for object bases,'' Proc. 1st ACM Conf. on Computer and Communications Security, Fairfax, VA, November 1993, pages 140--150 (Acceptance ratio 22/60).
  43. E. Bertino, S. Jajodia, and P. Samarati, ``Enforcing mandatory access control in object-oriented databases,'' Proc. OOPSLA Conf. Workshop on Security in Object-Oriented Systems, Washington, DC, September 1993, pages 53--58 (Acceptance ratio 26/70).
  44. E. Bertino and S. Jajodia, ``Modeling multilevel entities using single level objects,'' Proc. 3rd Int'l. Conf. on Deductive and Object-Oriented Databases, Springer-Verlag Lecture Notes in Computer Science, Volume 760, December 1993, pages 415--428.
  45. X. S. Wang and S. Jajodia, ``Temporal mediators as a way to support multiple temporal representations,'' Proc. Int'l. Workshop on an Infrastructure for Temporal Databases, Arlington, TX, June 1993.
  46. X. S. Wang, S. Jajodia, and V. S. Subrahmanian, ``Temporal modules: An approach toward federated temporal databases,'' Proc. ACM SIGMOD Int'l. Conf. on Management of Data, Washington, DC, May 1993, pages 227--236 (Acceptance ratio 42/235).
  47. V. Atluri, E. Bertino, and S. Jajodia, ``Achieving stricter correctness requirements in multilevel secure databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 135--147 (Acceptance ratio 17/70).
  48. B. T. Blaustein, S. Jajodia, C. D. McCollum and L. Notargiacomo, ``A model of atomicity for multilevel transactions,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1993, pages 120--134 (Acceptance ratio 17/70).
  49. V. Atluri and S. Jajodia, ``1SR consistency: A new notion of correctness for multilevel secure, multiversion databases,'' Proc. XIX Latin American Informatics Conf., Buenos Aires, Argentina, August 1993, pages 2.97--2.116.
  50. R. S. Sandhu and S. Jajodia, ``Referential integrity in multilevel secure databases,'' Proc. 16th National Computer Security Conf., Baltimore, Maryland, September 1993, pages 39--52.
  51. S. Jajodia and C. D. McCollum, ``Using two-phase commit for crash recovery in federated multilevel secure database management systems,'' Proc. 3rd IFIP Working Conf. on Dependable Computing for Critical Applications, Springer-Verlag Dependable Computing and Fault Tolerant Systems, Vol. 8, 1993, pages 365--381 (Acceptance ratio 18/74).
  52. J. Mcdermott and S. Jajodia, ``Orange locking: Channel-free database control via locking,'' in Database Security VI: Status and Prospects, (B. M. Thuraisingham and C. E. Landwehr, eds.), North-Holland, 1993, pages 267--284.
  53. O. Costich and S. Jajodia, ``Maintaining multilevel transaction atomicity in multilevel secure database systems with kernelized architecture,'' in Database Security VI: Status and Prospects, (B. M. Thuraisingham and C. E. Landwehr, eds.), North-Holland, 1993, pages 249--265.
  54. V. M. Doshi and S. Jajodia, ``Enforcing entity and referential integrity in multilevel secure databases,'' Proc. 15th National Computer Security Conf., Baltimore, Maryland, October 1992, pages 134--143.
  55. L. Notargiacomo, V. Ashby, V. Doshi, S. Jajodia, J. Filsinger, and R. Ross, ``Companion Document Series of the Trusted Database Management System Interpretation,'' Proc. 15th National Computer Security Conf., Baltimore, Maryland, October 1992, pages 57--65.
  56. O. Wolfson and S. Jajodia, ``An algorithm for dynamic data distribution,'' Proc. 2nd IEEE Workshop on Management of Replicated data, Monterey, Calif, November 1992, pages 62--65.
  57. R. S. Sandhu and S. Jajodia, ``Polyinstantiation for cover stories,'' Proc. European Symp. on Research in Computer Security, Toulouse, France, Springer-Verlag Lecture Notes in Computer Science, Vol. 648, 1992, pages 307--328.
  58. S. Jajodia and V. Atluri, ``Alternative correctness criteria for concurrent execution of transactions in multilevel secure database systems,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 216--224 (Acceptance ratio 21/89).
  59. P. Ammann, F. Jaeckle, and S. Jajodia, ``A two snapshot algorithm for concurrency control algorithm in secure multi-level databases,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 1992, pages 204--215 (Acceptance ratio 21/89).
  60. O. Wolfson and S. Jajodia, ``Distributed algorithms for dynamic replication of data,'' Proc. 11th ACM SIGACT-SIGMOD-SIGART Symp. on Principles of Database Systems, San Diego, Calif., June 1992, pages 149--163 (Acceptance ratio 32/105).
  61. V. Doshi and S. Jajodia, ``Referential integrity in multilevel secure database management systems,'' in IT Security: The Need for International Cooperation, (G. G. Gable and W. J. Caelli, eds.), North-Holland, 1992, pages 359--371.
  62. S. Jajodia and R. Mukkamala, ``Effects of SeaView decomposition of multilevel relations on database performance,'' in Database Security V: Status and Prospects, (C. E. Landwehr and S. Jajodia, eds.), North-Holland, 1992, pages 203--225.
  63. P. Ammann and S. Jajodia, ``A timestamp ordering algorithm for secure, single-version, multi-level databases,'' in Database Security V: Status and Prospects, (C. E. Landwehr and S. Jajodia, eds.), North-Holland, 1992, pages 191--202.
  64. R. S. Sandhu, R. Thomas, and S. Jajodia, ``Supporting timing channel free computations in multilevel secure object-oriented databases,'' in Database Security V: Status and Prospects, (C. E. Landwehr and S. Jajodia, eds.), North-Holland, 1992, pages 297--314.
  65. J. McDermott, S. Jajodia, and R. Sandhu, ``A single-level scheduler for the replicated architecture for multilevel secure databases,'' Proc. 7th Annual Computer Security Applications Conf., San Antonio, Texas, December 1991, pages 2--11.
  66. B. Kogan and S. Jajodia, ``An audit model for object-oriented databases,'' Proc. 7th Annual Computer Security Applications Conf., San Antonio, Texas, December 1991, pages 90--99.
  67. R. Sandhu and S. Jajodia, ``Honest databases that can keep secrets,'' Proc. 14th National Computer Security Conf., Washington, D.C., October 1991, pages 267--282.
  68. S. Jajodia and R. Sandhu, ``Toward a multilevel secure relational data model,'' Proc. ACM SIGMOD Int'l. Conf. on Management of Data, Denver, Colorado, May 29-31, 1991, pages 50-59 (Acceptance ratio 45/201).
  69. S. Jajodia and R. Sandhu, ``A novel decomposition of multilevel relations into single-level relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 20-22, 1991, pages 300-313 (Acceptance ratio 28/92).
  70. R. S. Sandhu, R. Thomas, and S. Jajodia, ``A secure kernelized architecture for multilevel object-oriented databases, '' Proc. Computer Security Foundations Workshop IV, Franconia, NH, June 1991, pages 139-152.
  71. G. Wiederhold, S. Jajodia, and W. Litwin, ``Dealing with granularity of time in temporal databases,'' Proc. 3rd Int'l. Conf. on Advanced Information Systems Engineering, Lecture Notes in Computer Science, Vol. 498, (R. Anderson et al. eds.), Springer-Verlag, 1991, pages 124-140.
  72. S. Jajodia and R. Sandhu, ``Polyinstantiation integrity in multilevel relations revisited,'' in Database Security IV: Status and Prospects, (S. Jajodia and C. E. Landwehr, eds.), North-Holland, 1991, pages 297-307.
  73. S. Jajodia, R. Sandhu, and E. Sibley, ``Update semantics for multilevel relations,'' Proc. 6th Annual Computer Security Applications Conf., Tucson, Arizona, December 1990, pages 103-112.
  74. R. Sandhu and S. Jajodia, ``Integrity mechanisms in database management systems,'' Proc. 13th National Computer Security Conf., Washington, D.C., October 1-4, 1990, pages 526--540.
  75. B. Kogan, S. Jajodia, and R. Sandhu, ``Implementation issues in multilevel security for object-oriented databases,'' Proc. Workshop on Security for Object-Oriented Systems, Karlsruhe, West Germany, April 23-26, 1990. (Proceedings will be published by Springer-Verlag.)
  76. S. Jajodia, R. Sandhu, and T. Rosenau, ``Implementing basic relational database operations on shared-memory MIMD computers,'' PARCOM90 Conference on Parallel Computing, Pune, India, December 1990.
  77. B. Kogan and S. Jajodia, ``Concurrency control in multilevel-secure databases using replicated architecture,'' Proc. ACM SIGMOD Int'l. Conf. on Management of Data, Atlantic City, NJ, May 23-25, 1990, pages 153-162 (Acceptance ratio 37/206).
  78. S. Jajodia and B. Kogan, ``Integrating an object-oriented data model with multilevel security,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 76-85 (Acceptance ratio 33/99). Also appeared as Rome Air Development Center Technical Report No. RADC-TR-90-91, May, 1990.
  79. S. Jajodia and R. Sandhu, ``Polyinstantiation integrity in multilevel relations,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 104-115 (Acceptance ratio 33/99).
  80. S. Jajodia and B. Kogan, ``Transaction processing in multilevel-secure databases using replicated architecture,'' Proc. IEEE Symp. on Research in Security and Privacy, Oakland, Calif., May 7-9, 1990, pages 360-368 (Acceptance ratio 33/99).
  81. S. Jajodia and R. Sandhu, ``A formal framework for single level decomposition of multilevel relations,'' Proc. Computer Security Foundations Workshop III, Franconia, NH, June 12-14, 1990, pages 152-158.
  82. R. Sandhu, S. Jajodia and T. Lunt, ``A new polyinstantiation integrity constraint for multilevel relations,'' Proc. Computer Security Foundations Workshop III, Franconia, NH, June 12-14, 1990, pages159-165.
  83. S. Jajodia, S. K. Gadia, G. Bhargava, and E. H. Sibley, ``Audit trail organization in relational databases,'' in Database Security III: Status and Prospects, (D. Spooner and C. E. Landwehr, eds.), North-Holland, 1990, pages 269-281.
  84. C. Meadows and S. Jajodia, ``Maintaining correctness, availability, and unambiguity in trusted database management systems,'' Proc. 4th Aerospace Computer Security Applications Conference, Orlando, FL, December 1988, pages 106-110.
  85. S. Jajodia and D. Mutchler, ``Dynamic voting algorithms for managing replicated data,'' Proc. 4th National Convention of Computer Engineers, Calcutta, India, December 1988, pages 236-240.
  86. S. Jajodia and D. Mutchler, ``Integrating static and dynamic voting protocols to enhance file availability,'' Proc 4th IEEE Int'l. Conf. on Data Engineering, Los Angeles, CA, February 1988, pages 144-153 (Acceptance ratio 66/210).
  87. C. Meadows and S. Jajodia, ``Integrity versus security in multi-level secure databases,'' in Database Security: Status and Prospects, (C. E. Landwehr, ed.), North-Holland, 1988, pages 89-101.

BOOK CHAPTERS

  1. Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``An architecture for supporting interoperability among temporal databases,'' in Temporal Databases: Research and Practice, Opher Etzion and Sushil Jajodia and Sury Sripada, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 1399 (1998), pages 36--55.
  2. Yu Wu, Sushil Jajodia and X. Sean Wang, ``Temporal database bibliography update,'' in Temporal Databases: Research and Practice, Opher Etzion, Sushil Jajodia and Sury Sripada, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 1399 (1998), pages 338--366.
  3. P. Ammann, S. Jajodia, and I. Ray, ``Semantics-based decomposition of transactions,'' in Advanced Transaction Models and Architectures, S. Jajodia and L. Kerschberg, eds., Kluwer (1997), pages 153--180.
  4. L. Mancini, I. Ray, S. Jajodia, and E. Bertino, ``Flexible commit protocols for advanced transaction processing,'' in Advanced Transaction Models and Architectures, S. Jajodia and L. Kerschberg, eds., Kluwer (1997), pages 91--124.
  5. S. Jajodia, ``Database security and privacy,'' in The Computer Science and Engineering Handbook, Allen B, Tucker, Jr., ed., CRC Press (1997), pages 1112--1124.
  6. S. Jajodia, B. Kogan, and R. Sandhu, ``A multilevel-secure object-oriented data model,'' in Readings in Object-Oriented Systems and Applications, D. Rine, ed., IEEE Computer Society Press (1995), pages 206--215.
  7. S. Jajodia, R. Mukkamala, ``Reduction in transaction conflicts using semantics-based concurrency control,'' in Performance of Concurrency Control Mechanisms in Centralized Database Systems, V. Kumar, ed., Prentice-Hall (1995), pages 387--405.
  8. S. Jajodia and R. Sandhu, ``Toward a multilevel secure relational data model,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 460--492.
  9. S. Jajodia, R. Sandhu, and B. T. Blaustein, ``Solutions to the polyinstantiation problem,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 493--529.
  10. C. Meadows and S. Jajodia, ``Integrity in multilevel secure database management systems,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 530--541.
  11. S. Jajodia and C. Meadows, ``Inference problems in multilevel secure database management systems,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 570--584.
  12. S. Jajodia, S. Gadia, and G. Bhargava, ``Logical design of audit information in relational databases,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 585--595.
  13. S. Jajodia, B. Kogan, and R. Sandhu, ``A multilevel-secure object-oriented data model,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 596--616.
  14. R. Sandhu and S. Jajodia, ``Integrity mechanisms in database management systems,'' in Information Security: An Integrated Collection of Essays, M. Abrams et al., eds., IEEE Computer Society Press (1995), pages 617--634.
  15. E. Bertino, S. Jajodia, and P. Samarati, ``Access Controls in Object-Oriented Database Systems -- Some Approaches and Issues,'' in Advanced Database Systems, N. R. Adam and B. Bhargava, eds., Springer-Verlag Lecture Notes in Computer Science, Vol. 759 (1993), pages 17--44.
  16. G. Wiederhold, S. Jajodia, and W. Litwin, ``Integrating temporal data in a heterogeneous environment,'' in Temporal Databases, A. Tansel et al., eds., Benjamin/Cummings (1993), pages 563--579.
  17. Sandhu, R. S. and Jajodia, S. ``Data base security controls.'' Handbook of Information Security Management, (Tipton, H.F. and Ruthberg, Z.A., editors), Auerbach Publishers (1993), pages 481--499.

UNREFEREED ARTICLES

  1. Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``Mining temporal relationships with multiple granularities in time sequences,'' IEEE Bulletin of the Technical Committee on Data Engineering, Vol. 21, No. 1, March 1998, pages 32--38.
  2. Sushil Jajodia, Daniel Barbara, Alex Brodsky, Larry Kerschberg, Ami Motro, Edgar Sibley, and X. Sean Wang. ``Information Systems Research at George Mason University,'' ACM SGMOD Record, December 1997, pages 69--74.
  3. Yvo Desmedt and Sushil Jajodia, "Redistributing secret shares to new access structures and its applications," George Mason University, July 1997.  PDF
  4. S. Jajodia, ``Database security and privacy,'' ACM Computing Surveys,, 50th anniversary commemorative issue, Vol. 28, No. 1, March 1996, pages 129--131.
  5. Paul Ammann and Sushil Jajodia, ``Rethinking integrity,'' IEEE Concurrency, October-December 1997, pages 5--6.
  6. Paul Ammann and Sushil Jajodia, ``Semantics-based transaction processing: Satisfying conflicting objectives,'' IEEE Concurrency, April--June 1997, pages 8--10.
  7. C. S. Jensen, S. Jajodia et al. (eds.), ``A consensus glossary of temporal database concepts,'' ACM SIGMOD Record, vol. 23, No. 1, March 1994, pages 52--63.
  8. S. Jajodia, ``Computer Security,'' McGraw-Hill Yearbook of Science and Technology, 1994, pages 103--104.
  9. S. Jajodia and Ravi S. Sandhu, ``Enforcing primary key requirements in multilevel relations,'' Proc. 4th RADC Workshop on Multilevel Database Security, Little Compton, Rhode Island, April 1991. Published as MITRE Techical Report M92B0000118 (R. K. Burns, ed.), September 1992, 11--16.
  10. S. Jajodia, ``Aggregation and inference problems in multilevel secure systems,'' Proc. 4th RADC Workshop on Multilevel Database Security, Little Compton, Rhode Island, April 1991. Published as MITRE Techical Report M92B0000118 (R. K. Burns, ed.), September 1992, 67--73.
  11. S. Jajodia, ``Panel discussion on the polyinstantiation problem: A position paper,'' Proc. Computer Security Foundations Workshop IV, Franconia, NH, June 1991, p. 235.
  12. R. Sandhu and S. Jajodia, ``Restricted polyinstantiation, or How to close signaling channels without duplicity,'' Proc. 3rd RADC Workshop on Multilevel Database Security, Castille, New York, June 1990. Published as MITRE Techical Report MTP 385 (B. Thuraisingham, ed.), May 1991, pp. 13-25.
  13. S. Jajodia and R. Sandhu, ``Database security: Current status and key issues,'' ACM SIGMOD Record, vol. 19, no. 4, December 1990, pp. 123-126.
  14. S. Jajodia, ``Distributed and heterogeneous database management systems,'' in MacMillan Encyclopedia of Computers, 1990.
  15. S. Jajodia, ``Tough issues: Integrity and auditing in multilevel secure databases,'' Proc. 13th National Computer Security Conf., Washington, D.C., October 1-4, 1990, pp. 577--580.
  16. S. Jajodia, ``Multilevel secure object-oriented database model,'' Proc. 13th National Computer Security Conf., Washington, D.C., October 1-4, 1990, pp. 600--601.
  17. S. Jajodia and R. Sandhu, ``Key problems in multilevel-secure database management systems,'' Proc. 3rd RADC Workshop in Multilevel Database Security, Castille, NY, June 4-7, 1990. Published as MITRE Techical Report MTP 385 (B. Thuraisingham, ed.), May 1991, pp. 7-12.
  18. B. Kogan and S. Jajodia, ``Secure concurrency control,'' Proc. 3rd RADC Workshop in Multilevel Database Security, Castille, NY, June 4-7, 1990. Published as MITRE Techical Report MTP 385 (B. Thuraisingham, ed.), May 1991, pp. 165-166.
  19. S. Jajodia, S. K. Gadia, G. Bhargava, and E. H. Sibley, ``Auditing in secure Database Management System,'' Proc. 2nd RADC Workshop on Database Security. Published as Reseach Directions in Database Security, II, (T. F. Lunt, ed), Rome Air Development Center Technical Report # RADC-TR-90-268, December 1989, pp. 120-129.

OTHER ARTICLES

  1. Sushil Jajodia, "Interview: Amit Sheth On Workflow Technology," IEEE Concurrency, Vol. 6,  No. 2,  April-June 1998, pages 21-23.
  2. Paul Ammann, Sushil Jajodia, "Rethinking integrity," IEEE Concurrency, Vol. 5,  No. 4,  Oct.-Dec.1997, pages 5-6.
  3. Paul Ammann, Sushil Jajodia, "Semantics-based transaction processing: satisfying conflicting objectives," IEEE Concurrency, Vol. 5,  No. 2,  April-June 1997, pages 8-10.


Home Page | Biography | Publications | Patents | Projects | Professional Activities | Students | Academic Lineage | Favorites