Ting
Yu, Sushil Jajodia, eds., Secure Data Management in Decentralized Systems,
Springer, Berlin, 2007, 462 pages. review
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, "Interleaved hop-by-hop authentication against false data injection attacks in sensor networks," ACM Transactions on Sensor Networks, Vol. 3, No. 3, 2007. review Sencun Zhu, Sanjeev Setia,
Sushil Jajodia, "LEAP+: Efficient security mechanisms for large-scale distributed
sensor networks," ACM Transactions on Sensor Networks, Vol. 2,
No. 4, November 2006, pages 500-528. review
Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325. review Peng
Ning, Sushil Jajodia, Xiaoyang Sean Wang, ``Abstraction-based intrusion
detection in distributed environments,'' ACM Trans. on Information and
System Security, Vol. 4, No. 4, November 2001, pages 407-452. review Pierangela
Samarati, Michael K. Reiter, Sushil Jajodia, ``An authorization model for a
public key management service,'' ACM Trans. on Information and System
Security, Vol. 4, No. 4, November 2001, pages 453-482. review Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding:
Steganography and Watermarking - Attacks and Countermeasures, ISBN
0-7923-7204-2, Kluwer Academic Publishers, Boston, 2001, 137 pages. review A. U. Tansel, J. Clifford, S. Gadia, S. Jajodia, A. Segev, and R. Snodgrass, eds. Temporal Databases: Theory, Design, and Implementation,center-evaluation-97 Benjamin/Cummings, Redwood City (1993), 633 pages. review |