Selected Reviews

Ting Yu, Sushil Jajodia, eds., Secure Data Management in Decentralized Systems, Springer, Berlin, 2007, 462 pages.  review

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks," ACM Transactions on Sensor Networks, Vol. 3, No. 3, 2007.  review

Sencun Zhu, Sanjeev Setia, Sushil Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed sensor networks," ACM Transactions on Sensor Networks, Vol. 2, No. 4, November 2006, pages 500-528. review

Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325.  review

Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, ``Abstraction-based intrusion detection in distributed environments,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 407-452. review
 

Pierangela Samarati, Michael K. Reiter, Sushil Jajodia, ``An authorization model for a public key management service,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 453-482. review

Peng Liu, Peng Ning, Sushil Jajodia, ``Avoiding loss of fairness owing to failures in fair data exchange systems,'' Decision Support Systems, Vol. 31, No. 3, 2001, pages 337-350. review

Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures,  ISBN 0-7923-7204-2, Kluwer Academic Publishers, Boston, 2001, 137 pages. review

P. Ammann, S. Jajodia, and I. Ray, ``Applying formal methods to semantic-based decomposition of transactions,'' ACM Trans. on Database Systems, Vol. 22, No. 2, June 1997, pages 215-254. review

A. U. Tansel, J. Clifford, S. Gadia, S. Jajodia, A. Segev, and R. Snodgrass, eds. Temporal Databases: Theory, Design, and Implementation,center-evaluation-97 Benjamin/Cummings, Redwood City (1993), 633 pages. review

Return to home page.