Sushil Jajodia 
List of Publications 1999-2005


Authored Books  Edited Books  Edited Proceedings

Journal Articles  Conference and Workshop Articles

Book Chapters   Other Articles   


Click here for Free Access to all my ACM Publications


AUTHORED BOOKS

  1. Peng Ning, Sushil Jajodia, X. Sean Wang, Intrusion Detection in Distributed Systems: An Abstraction-based ApproachISBN 1-4020-7624-X, Kluwer Academic Publishers, Boston, 2003, 156 pages.
  2. Peng Liu, Sushil Jajodia Trusted Recovery and Defensive Information Warfare, ISBN 0-7923-7572-6, Kluwer Academic Publishers, Boston, 2002, 152 pages.
  3. Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, ISBN 0-7923-7204-2 Kluwer Academic Publishers, Boston, 2001, 137 pages.
  4. Claudio Bettini, Sushil Jajodia, X. Sean Wang, Time Granularities in Databases, Data Mining, and Temporal Reasoning, ISBN 3-540-66997-3, Springer-Verlag, Berlin, July 2000, 226 pages.
  5. Vijay Atluri, Sushil Jajodia, Binto George, Multilevel Secure Transaction Processing, ISBN 0-7923-7702-8, Kluwer Academic Publishers, Boston, November 1999, 144 pages.

EDITED BOOKS

  1. Stefano Spaccapietra, Elisa Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon Strous, eds., Journal on Data Semantics II, ISBN-3-540-24208-2, Springer Verlag, Berlin, 2005, 223 pages.
  2. Daniel Barbara, Sushil Jajodia, eds., Applications of Data Mining in Computer Security, ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, 252 pages.
  3. Paul Ammann, Bruce H. Barnes, Sushil Jajodia, Edgar H. Sibley, eds., Computer Security, Dependibility, and Assurance: From Needs to Solutions , ISBN 0-7695-0337-3, IEEE Computer Society Press, Los Alamitos, 1999, 224 pages.

Return to top of the page


EDITED PROCEEDINGS

  1. Sushil Jajodia, Chandan Mazumdar, Information Systems Security, ISBN: 3-540-30706-0, Springer Lecture Notes in Computer Science, Volume 3803, Springer, Berlin, 2005, 344 pages.
  2. Sushil Jajodia, Duminda Wijesekera, eds.  Data and Applications Security XIX, ISBN 3-540-28138-X, Springer Lecture Notes in Computer Science, Volume 3654, Springer, Berlin, 2005, 223 pages.
  3. Sushil Jajodia, Leon Strous, eds., Integrity and Internal Control in Information Systems VI, ISBN 1-4020-7900-1, Kluwer Academic Publishers, Boston,? 2004, 272 pages.
  4. Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, eds., Security and Protection in Information Processing Systems, ISBN 1-4020-8142-1, Kluwer Academic Publishers, Boston, 2004, 562 pages.
  5. Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, eds., Information Security Management, Education, and Privacy, ISBN 1-4020-8144-8, Kluwer Academic Publishers, Boston, 2004, 328 pages.
  6. Hideko S. Kunii, Sushil Jajodia, Arne Solvberg, eds., Conceptual Modeling - ER 2001, Springer Lecture Notes in Computer Science, Volume 2224, ISBN 3-540-42866-6, Springer, Berlin, 2001, 614 pages.
  7. Sushil Jajodia and Pierangela Samarati, eds., Proc. 7th ACM Conf. on Computer and Communications Security, ISBN 1-58113-203-4, ACM Press, New York, November 2000, 256 pages.
  8. Sushil Jajodia, ed., Database Security XII: Status and Prospects, Kluwer Academic Publishers, Boston, 1999, 320 pages.

Return to top of the page


JOURNAL ARTICLES

  1. Alberto Ceselli, Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Modeling and assessing inference exposure in encrypted databases," ACM Trans. on Information and System Security, Vol. 8, No. 1, February 2005, pages 119-152.
  2. Yingjiu Li, Vipin Swarup, Sushil Jajodia, "Fingerprinting relational databases: Schemes and specialties," IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, January-March 2005, pages 34-45.
  3. Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Information release control: A learning-based architecture," Springer LNCS Journal on Data Semantics II, Springer Lecture Notes in Computer Science, Volume 3360, 2005, pages 176-198.
  4. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Cardinality-based inference control in data cubes,” Journal of Computer Security, Vol. 12, No. 5, 2004, pages 655-692.
  5. Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Reasoning with advanced policy rules and its application to access control,” International Journal on Digital Libraries, Vol. 4, No. 3, November 2004, pages 156-170.
  6. Kenneth Smith, Sushil Jajodia, Vipin Swarup, Jeffery Hoyt, Gail Hamilton, Donald Faatz, Todd Cornett, “Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility,” NeuroImage, Vol. 22, No. 4, August 2004, pages 1646-1656.
  7. Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Asa Hagstrom, “Removing permissions in the Flexible Authorization Framework,” ACM Trans. on Database Systems, Vol. 28, No. 3, September 2003, pages 209-229.
  8. Alessandro Mei, Luigi V. Mancini, Sushil Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file systems,” IEEE Trans. on Parallel and Distributed Systems, Vol. 14, No. 9, September 2003, pages 885-896.
  9. Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Provisions and obligations in policy rule management,” Journal of Network and Systems Management, Vol. 11, No. 3, September 2003, pages 351-372.
  10. Daniel Barbara, Rajni Goel, Sushil Jajodia, “A checksum-based corruption detection techniques,” Journal of Computer Security, Vol. 11, No. 3, 2003, pages 315-329.
  11. Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325.
  12. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Data and Knowledge Engineering, Vol. 4, No. 2, 2003, pages 193-218.
  13. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, "Providing secrecy in key management protocols for large wireless sensor networks," Ad Hoc Networks, Vol. 1, No. 4, 2003, pages 455-468.
  14. Claudio Bettini, X. Sean Wang, and Sushil Jajodia, ``Solving multi-granularity temporal constraint networks,'' Artificial Intelligence, Vol. 140, No. 1/2, 2002, pages 107-152.
  15. Paul Ammann, Sushil Jajodia, Peng Liu, ``Recovering from malicious transactions,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 14, No. 5, September/October 2002, pages 1167-1185.
  16. Sanjeev Setia, Sencun Zhu, Sushil Jajodia, ``A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation, Vol. 49, No. 1-4, September 2002, pages 21-41.
  17. Claudio Bettini, Sushil Jajodia, X. Sean Wang, ``Temporal reasoning in workflow systems,'' Distributed and Parallel Databases, Vol. 11, No. 3, May 2002, pages 269-306.
  18. Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representation of calendars,'' Annals of Mathematics and Artificial Intelligence, Vol. 36, No. 1-2, September 2002, pages 5-38.
  19. Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Jour. of Computer Security, Vol. 10, No. 1/2, 2002, pages 137-157.
  20. Peng Ning, Sushil Jajodia, X. Sean Wang, ``Design and implementation of a decentralized prototype system for detecting distributed attacks,'' Computer Communications, Vol. 25, No. 15, September 2002, pages 1374-1391.
  21. Susan Chapin, Don Faatz, Sushil Jajodia, Amgad Fayad, ``Consistent policy enforcement in distributed systems using mobile policies,'' Data & Knowledge Engineering, Vol. 43, No. 3, December, 2002, pages 261-280.
  22. Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, ``Flexible support for multiple access control policies,'' ACM Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.
  23. Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, ``Abstraction-based intrusion detection in distributed environments,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 407-452.
  24. Pierangela Samarati, Michael K. Reiter, Sushil Jajodia, ``An authorization model for a public key management service,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 453-482.
  25. Peng Liu, Peng Ning, Sushil Jajodia, ``Avoiding loss of fairness owing to failures in fair data exchange systems,'' Decision Support Systems, Vol. 31, No. 3, 2001, pages 337-350.
  26. Sushil Jajodia, Vijaylakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala, ``Multilevel secure transaction processing,'' Jour. of Computer Security, Vol. 9, No. 3, 2001, pages 165-195.
  27. Alexander Brodsky, Csilla Farkas, Sushil Jajodia, ``Secure databases: Constraints, inference channels, and monitoring disclosures,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 900-919.
  28. I. Ray, L. V. Mancini, S. Jajodia, E. Bertino, ``ASEP: A secure and flexible commit protocols for MLS distributed database systems,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 880-899.
  29. Indrakshi Ray, Paul Ammann, Sushil Jajodia, ``Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity,'' Information Sciences, Vol. 129, No. 1-4, December 2000, pages 155-195.
  30. Peng Liu, Sushil Jajodia, Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Jour. of Computer Security, Vol. 8, No. 4, 2000, 243-279.
  31. Peng Ning, X. Sean Wang, Sushil Jajodia, ``Modeling requests among cooperating intrusion detection systems,'' Computer Communications, Vol. 23, No. 17, November 2000, pages 1702-1715.
  32. Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, and Elisa Bertino, ``Flexible transaction dependencies in database systems,'' Distributed and Parallel Databases, Vol. 8, No. 4, October 2000, pages 399-446.
  33. Peng Liu, Paul Ammann, and Sushil Jajodia, ``Rewriting histories: Recovering from malicious transactions,'' Distributed and Parallel Databases, Vol. 8, No. 1, January 2000, pages 7-40.
  34. Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia, ``Scalable threshold closure,'' Theoretical Computer Science, Vol. 226, 1999, pages 185-206.
  35. S. Jajodia, P. Ammann, C. D. McCollum, ``Surviving information warfare attacks,'' IEEE Computer, Vol. 32, No. 4, April 1999, pages 57-63.
  36. Sushil Jajodia, Catherine D. McCollum and Paul Ammann, ``Trusted recovery,'' Communications of the ACM, Vol. 42, No. 7, July 1999, pages 71-75.
  37. E. Bertino, S. Jajodia, and P. Samarati, ``A flexible authorization mechanism for relational data management systems,'' ACM Trans. on Information Systems, April 1999, Vol. 17, No. 2, April 1999, pages 101-140.

Return to top of the page


ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS

  1. Xinyuan Wang, Shiping Chen, Sushil Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the Internet," Proc. 12th ACM Conf. on Computer and Communications Security (CCS), Alexandria, Virginia, November 2005, pages 81-91 (Acceptance ratio 38/250). 
  2. Chao Yao, X. Sean Wang, Sushil Jajodia, "Checking for k-anonymity violation by views," Proc. Int'l. Conf. on Very Large Databases (VLDB), Trondheim, Norway, Aug 30-Sep 2, 2005, pages 910-921 (Acceptance ratio core database technology 53/322).
  3. Lingyu Wang, Anyi Liu, Sushil Jajodia, "An efficient and unified approach to correlating, hypothesizing, and predicting network intrusion alerts," Proc. 10th European Symposium on Research in Computer Security (ESORICS), Springer Lecture Notes in Computer Science, Vol. 3679, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann, eds., Milan, Italy, September 2005, pages 247-266 (Acceptance ratio 26/158).
  4. Steve Noel, Sushil Jajodia, "Understanding complex network attack graphs through clustered adjacency matrices," Proc. 21st Annual Computer Security Conference (ACSAC), Tucson, AZ, December 5-9, 2005, pages 160-169.
  5. Sankardas Roy, Venkata Gopala Addada, Sanjeev Setia, Sushil Jajodia, "Securing MAODV: Attacks and countermeasures,"  Proc. 2nd IEEE Int'l. Conf. on Sensor and Ad Hoc Communications and Networks, Santa Clara, Calif., September 26-29, 2005, pages 521-532 (Acceptance ratio 55/202).
  6. Ernesto Damiani, S.De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Key management for multi-user encrypted databases," Proc.  ACM  International Workshop on Storage Security and Survivability (StorageSS 2005), November 2005.
  7. Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera, "Maintaining privacy on derived objects," Proc. ACM Workshop on Privacy in the Electronic Society," Alexandria, VA, November 7, 2005, pages 10-19.
  8. Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Protecting privacy against location-based personal identification," Proc. 2nd VLDB Workshop on Secure Data Management (SDM'05), Springer Lecture Notes in Computer Science, Vol. 3674, Willem Jonker and  Milan Petkovic, eds., Trondheim, Norway, September 2-3, 2005, pages 185-189 (Acceptance ratio 16/38).
  9. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Forseti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Metadata management in outsourced encrypted databases," Proc. 2nd VLDB Workshop on Secure Data Management (SDM'05), Springer Lecture Notes in Computer Science, Vol. 3674, Willem Jonker and  Milan Petkovic, eds., Trondheim, Norway, September 2-3, 2005, pages 16-32 (Acceptance ratio 16/38).
  10. Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia, Sushil Jajodia, "Efficient security mechanisms for overlay multicast-based content distribution," Proc. 3rd Applied Cryptography and Network Security (ACNS) Conference, Springer Lecture Notes in Computer Science, Vol. 3531, John Ioannidis, Angelos Keromytis, Moti Yung, eds., New York, April 7-10, 2005, pages 40-55 (Acceptance ratio 35/156).
  11. Vipin Swarup, Sushil Jajodia, Joseph Pamula, "Rule-based topological vulnerability analysis," Proc. 3rd Int'l. Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2005), Springer Lecture Notes in Computer Science, Vol. 3685, Vladimir Gorodetsky, Igor Kotenko, Victor Skormin, eds., St. Petersburg, Russia, September 24-28, 2005, pages 23-37.
  12. Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia, Sushil Jajodia, "Securing topology maintenance protocols for sensor networks: attacks and counter-measures," Proc. IEEE Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm 2005), Athens, Greece, September 2005, pages 101-112 (Acceptance ratio 32/163).
  13. Chao Yao, William H. Winsborough, Sushil Jajodia, "A hierarchical release control policy framework," in Security Management, Integrity, and Internal Control in Information Systems, Paul Dowland, Steven Furnell, Bhavani Thuraisingham, X. Sean Wang, editors, Springer, 2005, pages 121-137.
  14. Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil Jajodia, "Multiple coordinated views for network attack graphs," IEEE Workshop on Visualization for Computer Security (VizSEC2005), Minneapolis, MN, October, 2005, pages 99-106.
  15. Donggang Liu, Peng Ning, Sencun Zhu, Sushil Jajodia, "Practical broadcast authentication in sensor networks," Proc. Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2005), San Diego, CA, July 17-21, 2005, pages 34-45.
  16. Sabrina De Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia, "Policies, models, and languages for access control,"  Proc. 4th International Workshop on Databases in Networked Information Systems (DNIS 2005)Springer Lecture Notes in Computer Science, Vol. 3433, Subhash Bhalla, ed., Aizu-Wakamatsu, Japan, March 28-30, 2005, pages 225-237.
  17. Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance ratio 19/186).
  18. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, “An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks,” Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
  19. Shiping Chen, Duminda Wijesekera, Sushil Jajodia, “Incorporating Dynamic Constraints in the Flexible Authorization Framework,” Proc. 9th European Symp. on Research in Computer Security (ESORICS 2004), Springer Lecture Notes in Computer Science, Vol. 3193, Sophia Antipolis, France, September 2004, pages 1-16 (Acceptance ratio 27/159).
  20. Steve Noel, Sushil Jajodia, Eric Robertson, "Correlating intrusion events and building attack scenarios through attack graph distances," Proc. 20th Annual Computer Security Applications Conference, Tucson, Arizona, December 6-10, 2004, pages 350-359. PDF
  21. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, "A logic-based framework for attribute based access control,"  Proc. 2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), October 2004, pages 45-55 (Acceptance ratio 9/25). PDF
  22. Steve Noel, Sushil Jajodia, "Managing attack graph complexity through visual hierarchical aggregation" Proc. ACM Workshop on Visualization and Data Mining for Computer Security, October 2004, pages109-118 (Acceptance ratio 13/36).  PDF
  23. Yingjiu Li, Huiping Guo, Sushil Jajodia, "Tamper detection and localization for categorical data using fragile watermarks," Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2004, pages 73-82 (Acceptance ratio 10/27). PDF
  24. Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Identifying Sensitive Associations in Databases for Release Control," Proc. International Workshop on Secure Data Management in a Connected World, Springer Lecture Notes in Computer Science, Vol. 3178, Willem Jonker and  Milan Petkovic, eds., Toronto, Canada, August 2004, pages 187-201.
  25. Yingjiu Li, Vipin Swarup, Sushil Jajodia, “Defending against additive attacks with maximal errors in watermarking relational databases,” Proc. 18th IFIP WG 11.3 Working Conference on Data and Application Security, Research Directions in Data and Applications Security XVIII, Csilla Farkas and Pierangela Samarati, editors, Kluwer Academic Publishers, Boston, 2004, pages 81-94 (Acceptance ratio 23/49).
  26. Shiping Chen, Duminda Wijesekera, Sushil Jajodia, "FlexFlow: A flexible flow control policy specification framework," in Data and Applications Security XVII: Status and Prospects, Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, eds., Kluwer Academic Publishers, Boston, 2004, pages 358-371 (Acceptance ratio 26/59).  
  27. Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia, “GKMPAN: An efficient group rkeying scheme for secure multicast in ad-hoc networks,” Proc. First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), Boston, MA, August 22-25, 2004, pages 42-51.
  28. Claudio Bettini, X. Sean Wang, Sushil Jajodia, “A learning-based approach to information release control,” in Integrity and Internal Control in Information Systems VI, Sushil Jajodia, Leon Strous, eds., Kluwer Academic Publishers, Boston,? 2004, pages 83-105.
  29. Sencun Zhu, Sushil Jajodia, “Scalable group rekeying for secure multicast: A survey,” Proc. 5th International Workshop on Distributed Computing, Springer Lecture Notes in Computer Science, Vol. 2918 (Samir R. Das and Sajal K. Das, editors), 2004, pages 1-10.
  30. Sushil Jajodia,Duminda Wijesekera, "A flexible authorization framework for E-commerce," Proc. First International Conference on Distributed Computing and Internet Technology, Springer Lecture Notes in Computer Science, Vol. 3347 (R. K. Ghosh and H. Mohanty, eds.), 2004, pages 336-345.
  31. Kaushal Sarda, Duminda Wijesekera, Sushil Jajodia "Implementing consistency checking in correlating attacks," Proc. First International Conference on Distributed Computing and Internet Technology, Springer Lecture Notes in Computer Science, Vol. 3347 (R. K. Ghosh and H. Mohanty, eds.), 2004, pages 379-384.
  32. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 62-72 (Acceptance ratio 36/252).
  33. Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, “Balancing confidentiality and efficiency in untrusted Relational DBMSs,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 93-102 (Acceptance ratio 36/252).
  34. Yingjiu Li, Vipin Swarup, Sushil Jajodia,Constructing a virtual primary key for fingerprinting relational data, Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2003, pages 133-141 (Acceptance ratio 13/30)
  35. Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia, “Precisely answering multidimensional range queries without privacy breach,” Proc. 8th European Symposium on Research in Computer Security (ESORICS 2003), Springer Lecture Notes in Computer Science, Volume 2808, October 2003, pages 100-115 (Acceptance ratio 19/114). 
  36. Steve Noel, Sushil Jajodia, Brian O’Berry, Mike Jacobs, “Efficient minimum-cost network hardening via exploit dependency graphs,” Proc. 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12, 2003, pages 86-95. 
  37. Yingjiu Li, Vipin Swarup, Sushil Jajodia, “A robust watermarking scheme for relational data,” Proc. 13th Workshop on Information Technology and Systems (WITS’03), Seattle, Washington, December 2003, pages 195-200.
  38. S. Zhu, S. Xu, S. Setia, S. Jajodia, “Establishing pair-wise keys for secure communication networks: a probabilistic approach,” Proc. 11th IEEE International Conference on Network Protocols, Atlanta, Georgia, November 4-7, 2003 (Acceptance ratio 30/230).
  39. E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, M. Finetti, S. Jajodia, “Implementation of a storage mechanism for untrusted DBMSs,” Proc. IEEE Second International IEEE Security in Storage Workshop (SISW 2003), Washington, DC, October 31, 2003, pages 38-46.
  40. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Performance optimizations for group key management schemes for secure multicast,” Proc. IEEE 23rd Int’l. Conf. On Distributed Computing Systems, Providence, Rhode Island, May 19-22, 2003 (Acceptance ratio 72/406).
  41. Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast,” Fifth International Workshop on Networked Group Communications (NGC'03), Munich, Germany, September 16-19, 2003 (Acceptance ratio 17/51).
  42. Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks,” Proc. International Workshop on Mobile and Wireless Networks (MWN 2003), May 2003 (Acceptance ratio 30/60). 
  43. Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle, “A user friendly guard with mobile post-release access control policy,” in Security and Privacy in the Age of Uncertainty, Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas, eds., Kluwer Academic Publishers, Boston, 2003, pages 265-276 (Acceptance ratio 33/121).
  44. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Towards secure XML federations,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 117-131 (Acceptance ratio 25/50).
  45. Daniel Barbara, Rajni Goel, Sushil Jajodia, ``Mining malicious data corruption with hidden markov models,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 175-189 (Acceptance ratio 25/50). 
  46. Daniel Barbar?, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto, “Bootstrapping a data mining intrusion detection system,” Proc. ACM Symp. on Applied Computing (SAC), Melbourne, FL, March 2003, pages 421-425.
  47. Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffery Hoyt, “Securely sharing neuroimagery,” Proc. ACM International Conference on Information and Knowledge Management, New Orleans, Louisiana, November 2-8, 2003, pages 375-377.
  48. Yingjiu Li, Lingyu Wang, Sushil Jajodia, ``Preventing interval-based inference by random data perturbation,'' Proc. Workshop on Privacy Enhancing Technologies (PET 2002), Springer Lecture Notes in Computer Science, Vol. 2482, R. Dingledine and P. Syverson, eds. 2003, pages 160–170 (Acceptance ratio 16/47).
  49. Claudio Bettini, Sushil Jajodia, Sean Wang, Duminda Wijesekera, ``Provisions and obligations in policy rule management and security applications,'' Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China, August 2002, pages 502-513 (Acceptance ratio 69/432).
  50. Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The predicate Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Washington, DC, November 17-22, 2002, pages 171-180 (Acceptance ratio 27/161).
  51. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Cardinality-based inference control in sum-only data cubes,'' Proc. 7th European Symposium on Research in Computer Security (ESORICS 2002), Lecture Notes in Computer Science, Vol. 2502, Zurich, Switzerland, October 14-16, 2002, pages 55-71 (Acceptance ratio 16/83).
  52. Peng Liu, Sushil Jajodia, Paul Ammann, Jie Li, ``Can-follow concurrency control,'' Proc. IASTED Int'l. Conf. on Networks, Parallel and Distributed Processing, and Applications, Tsukuba, Japan, October 1-4, 2002.
  53. Yingjiu Li, Senchun Zhu, Lingyu Wang, Sushil Jajodia, ``A privacy-enhanced microaggregation method,'' Proc. 2nd Int'l. Symp. on Foundations of Information and Knowledge Systems (FoIKS 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2284 (T. Eiter and K.-D. Schwe, eds), February 2002, pages 148-159. (Acceptance ratio 15/55).
  54. Yingjiu Li, Lingyu Wang, X. Sean Wang, Sushil Jajodia, ``Auditing interval-based inference,'' Proc. 14th Conf. on Advanced Information Systems Engineering (CAiSE'02), Springer-Verlag Lecture Notes in Computer Science, Vol. 2348 (A. Banks Pidduck, J. Mylopoulos, C. C. Woo, M. Tamer Ozsu, eds.), May 2002, pages 553-568 (Acceptance ratio 42/173).
  55. Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, ``Obligation monitoring in policy management,'' Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, IEEE Computer Society, June 2002, pages 2-12 (Acceptance ratio 17/67).
  56. Sushil Jajodia, Duminda Wijesekera, ``Recent advances in access control models,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 3-15.
  57. Jackie Yang, Duminda Wijesekera, Sushil Jajodia, ``Subject switching algorithms for access control in federated databases,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 61-74.
  58. Ravi Mukkamala, Sushil Jajodia, ``A novel approach to certificate revocation management,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 225-238.
  59. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Efficient and secure keys management for wireless mobile communications,’’ Proc. 2nd ACM Int’l. Workshop on Mobile Computing, Toulouse, France, October 2002, pages 66-73.
  60. Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Secure selective exclusion in ad hoc wireless network,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 423-434.
  61. Ken Smith, Don Faatz, Amgad Fayad, Sushil Jajodia, ``Propagating modifications to mobile policies,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 573-584.
  62. Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The Propositional Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, November 5-8, 2001, pages 38-47 (Acceptance ratio 27/153).
  63. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, "Generating market basket data with temporal information," KDD Workshop on Temporal Data Mining, August 2001.
  64. Daniel Barbara, Ningning Wu, Sushil Jajodia, ``Detecting novel network intrusions using bayes estimators,'' Proc. 1st SIAM International Conference on Data Mining (SDM 2001),, Chicago, IL, April 2001.
  65. Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera, ``Revocations - a classification,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 44-58.
  66. Peng Liu, Sushil Jajodia, ``Multi-phase damage confinement in database systems for intrusion tolerance,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 191-205.
  67. Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Proc. 8th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2001), Cividale del Fruily, Italy, June 2001, pages 111-118.
  68. Amgad Fayad, Sushil Jajodia, Don Faatz, Vinti Doshi, ``Going beyond MAC and DAC using mobile policies,'' in Trusted Information - The New Decade Challenge (Michel Dupuy and Pierre Pardinas, editors), Kluwer Academic Publishers, Boston, June 2001, pages 245-260.
  69. Yingjiu Li, X. Sean Wang, Sushil Jajodia, ``Discovering temporal patterns in multiple granularities,'' Proc. Int'l. Workshop on Temporal, Spatial, and Spatio-Temporal Data Mining, Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 2007 , 2001, pages 5-19.
  70. Daniel Barbara, Rajni Goel, and Sushil Jajodia, ``Protecting file systems against corruption using checksums,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 113-124.
  71. Susan Chapin, Don Faatz, Sushil Jajodia, ``Distributed policies for data management making policies mobile,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 63-75.
  72. Daniel Barbara, Julia Couto, Sushil Jajodia, Leonard Popyack, Ningning Wu, ``ADAM: Detecting intrusions by data mining,'' Proc. IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001, pages 11-16.
  73. Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder, ``Kronos: A scalable group re-keying approach for secure multicast,'' Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance ratio 18/137).
  74. Daniel Barbar?, Rajni Goel, and Sushil Jajodia, ``Using checksums to detect data corruption,'' Proc. Conf. on Extending Database Technology, Springer Lecture Notes in Computer Science, Vol. 1777 Konstanz, Germany, March 2000, pages 136-149 (Acceptance ratio 30/180).
  75. Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Proc. 1st Workshop on Intrusion Detection Systems, Athens, Greece, November 2000.
  76. Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean, ``Using attribute certificates with mobile policies in electronic commerce applications,'' Proc. 16th Annual Computer Security Applications Conf., New Orleans, LA, December 2000, pages 298-307.
  77. Paul Ammann and Sushil Jajodia, ``The integrity challenge,'' Integrity and Internal Controls in Information Systems: Strategic View on the Need for the Control, (Margaret E. van Biene-Hershey and Leon Strous, eds.), Kluwer, Boston, 2000, pages 59-69.
  78. Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia, ``CARDS: A distributed system for detecting coordinated attacks,'' in Information Security For Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security, (Sihan Qing and Jan H.P. Elof eds.), Kluwer, Boston, August 2000, pages 171-180 (Acceptance ratio 50/180).
  79. Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``Free schedules for free agents in workflow systems,'' Proc. 7th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2000), Nova Scotia, Canada, July 2000, pages 31-37.
  80. Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representations of calendars,'' Proc. AAAI Workshop on Spatial and Temporal Granularity, Austin, TX, June 2000, pages 1-8.
  81. Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' Proc. 1st Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000.
  82. Peng Liu, Peng Ning, Sushil Jajodia ``Avoiding loss of fairness owing to process crashes in fair data exchange protocols,'' IEEE Workshop on Dependability despite Malicious Faults, In Proc. IEEE Int'l. Conf. on Dependable Systems and Networks, New York, NY, June 2000, pages 631-640.
  83. Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``Recovery from watermarks on distorted images.'' Proc. 3rd Workshop on Information Hiding, Springer-Verlag Lecture Notes in Computer Science, Vol. 1768 , 2000, pages 318-332.
  84. Peng Ning, X. Sean Wang, Sushil Jajodia, ``A query facility for common intrusion detection framework,'' Proc. 23rd National Information Systems Security Conf., Baltimore, MD, October 2000.
  85. Peng Liu, Sushil Jajodia and Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 3-18.
  86. Ravi Mukkamala, Jason Gagnon, and Sushil Jajodia, ``Integrating data mining techniques with intrusion detection,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 33-46.
  87. Peng Liu, Paul Ammann, Sushil Jajodia, ``Incorporating transaction semantics to reduce reprocessing overhead in replicated mobile data applications,'' IEEE Int'l. Conf. on Distributed Computing Systems, 1999, pages 414-423 (Acceptance ratio 57/173).
  88. Amgad Fayad, Sushil Jajodia, Catherine D. McCollum, ``Application-level isolation using data inconsistency detection,'' Proc. 15th Annual Computer Security Applications Conf., Phoenix, AZ, December 1999, pages 119-126.
  89. Sushil Jajodia, Peng Liu, Paul Ammann, ``A fault tolerance approach to survivability,'' Symp. on Protecting NATO Information Systems in the 21st Century, Washington, DC, October 1999.
  90. Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``On ``fingerprinting'' images for recognition,'' Proc. 5th Int'l. Workshop on Multimedia Information Systems, Palm Springs Desert, CA, October 1999.

Return to top of the page


BOOK CHAPTERS

  1. Sushil Jajodia, Steve Noel, Brian O’Berry, “Topological analysis of network attack vulnerability,” in Managing Cyber Threats: Issues, Approaches and Challenges, Vipin Kumar, Jaideep Srivastava, and Aleksandar Lazarevic, eds., Springer, 2005, pages 248-266.
  2. Zoran Duric, Michael Jacobs, Sushil Jajodia, "Information Hiding: Steganography and Steganalysis," in  Handbook of Statistics, Volume 24: Data Mining and Data Visualization, C. R. Rao, E. J. Wegman, and J. L. Solka, eds., Elsevier, 2005, pages 171-187.
  3. Anoop Singhal, Sushil Jajodia, "Data mining for intrusion detection," in Data Mining and Knowledge Discovery Handbook, Oded Maimon and Lior Rokach, eds., Springer, 2005, pages 1225-1237.
  4. Sushil Jajodia, "Database security and privacy," in Computer Science Handbook, 2nd edition, Allen B. Tucker, Jr., ed., CRC Press, Boca Raton, FL, June 2004.
  5. Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala, "Secure multicast for mobile commerce applications: Issues and challenges," in Advances in Security and Payment Methods for Mobile Commerce, Wen Chen Hu, Chung-Wei Lee, and Weidong Kou, eds., Idea Group Publishing, Hershey, PA, 2004, pages 164-190.
  6. Duminda Wijesekera, Sushil Jajodia, “A flexible authorization framework,” in Information Security: Policies and Actions in Modern Integrated Systems, Marigrazia Fugini and Carlo Bellettini, eds. Idea Group Publishing, Hershey, PA, 2004, pages 149-176.
  7. Peng Ning, Sushil Jajodia, “Intrusion Detection Systems Basics,” in Handbook of Information Security, Hossein Bidgoli, ed., John Wiley, 2004.
  8. Peng Ning, Sushil Jajodia, “Intrusion Detection Techniques,” in The Internet Encyclopedia, Hossein Bidgoli, ed., John Wiley, ISBN 0-471-22201-1, December 2003.
  9. Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``An architecture for anomaly detection,'' in Applications of Data Mining in Computer Security, Daniel Barbara, Sushil Jajodia, eds., ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, pages 63-76.
  10. Yingjiu Li, Ninging Wu, X. Sean Wang, and Sushil Jajodia, ``Enhancing profiles for anomaly detection using time granularities,'' in Intrusion Detection, Deborah Frincke, ed., IOS Press, Amsterdam, 2002, pages 137-157.
  11. Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' in E-Commerce Security and Privacy, Anup Ghosh, ed., Kluwer Academic Publishers, Boston, 2001, pages 133-159.
  12. Sabrina Di Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia, ``Database Security,'' in Encyclopedia of Software Engineering, 2nd edition, John Marciniak, ed., John Wiley, New York, 2001.
  13. Paul Ammann, Sushil Jajodia, Peng Liu, ``A fault tolerance approach to survivability,'' in Computer Security, Dependibility, and Assurance: From Needs to Solutions , P.Ammann, B. H. Barnes, S. Jajodia, E. H. Sibley, eds., IEEE Computer Society Press, Los Alamitos (1999), pages 204-212.
  14. Pierangela Samarati and Sushil Jajodia, ``Data Security,'' in Wiley Encyclopedia of Electrical and Electronics Engineering, Volume 4, John G. Webster, ed., John Wiley, NY, (1999) pages 743-759.

Return to top of the page

 


OTHER ARTICLES

  1. Csilla Farkas and Sushil Jajodia, ``The Inference problem: A survey,’’ ACM SIGKDD Explorations, Vol. 4, No. 2, 2003, pages 6-11.
  2. Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``ADAM: A testbed for exploring the use of data mining in intrusion detection,'' ACM SIGMOD Record, Vol. 30, No. 4, December 2001, pages 15-24.
  3. Sushil Jajodia, Duminda Wijesekera, ``Security in Federated Database Systems,'' Information Security Technical Report, Vol. 6, No. 2, 2001, pages 69-79.
  4. Sushil Jajodia, "Turing award Winner Jim Gray on the new millenium," IEEE Concurrency, Vol. 7, No. 3, July-Sept.1999, pages 9-10.
  5. Sushil Jajodia, "Data replication gaining popularity," IEEE Concurrency, Vol. 7, No. 2, April-June 1999, pages 85-86.
  6. Paul Ammann and Sushil Jajodia , ``Computer security, fault Tolerance, and software assurance,'' IEEE Concurrency, Vol. 7, No. 1, January-March 1999, pages 4-6.

Return to top of the page


Return to home page