Sushil Jajodia
List of Publications 1999-2005
Click here
for Free Access
to all my ACM Publications
- Peng Ning, Sushil
Jajodia, X. Sean Wang,
Intrusion Detection in
Distributed Systems: An Abstraction-based Approach, ISBN 1-4020-7624-X, Kluwer
Academic Publishers, Boston,
2003, 156 pages.
- Peng Liu, Sushil
Jajodia
Trusted Recovery and
Defensive Information Warfare, ISBN 0-7923-7572-6, Kluwer Academic
Publishers, Boston, 2002, 152
pages.
- Neil F. Johnson, Zoran Duric,
Sushil Jajodia,
Information Hiding:
Steganography and Watermarking - Attacks and Countermeasures, ISBN
0-7923-7204-2 Kluwer Academic Publishers, Boston,
2001, 137 pages.
- Claudio Bettini, Sushil
Jajodia, X. Sean Wang, Time
Granularities in Databases, Data Mining, and Temporal Reasoning, ISBN
3-540-66997-3, Springer-Verlag, Berlin, July 2000, 226 pages.
- Vijay Atluri, Sushil
Jajodia, Binto George, Multilevel Secure
Transaction Processing, ISBN 0-7923-7702-8, Kluwer Academic
Publishers, Boston, November 1999, 144 pages.
- Stefano Spaccapietra, Elisa
Bertino, Sushil Jajodia, Roger King, Dennis McLeod, Maria E. Orlowska, Leon
Strous, eds.,
Journal on Data Semantics II, ISBN-3-540-24208-2, Springer Verlag,
Berlin, 2005, 223 pages.
- Daniel Barbara, Sushil
Jajodia, eds., Applications of Data Mining
in Computer Security, ISBN 1-4020-7054-3, Kluwer Academic Publishers,
Boston, 2002, 252 pages.
- Paul Ammann, Bruce H. Barnes,
Sushil Jajodia, Edgar H. Sibley, eds., Computer
Security, Dependibility, and Assurance: From Needs to Solutions , ISBN
0-7695-0337-3, IEEE Computer Society Press, Los Alamitos, 1999, 224
pages.
Return to top of the page
-
Sushil
Jajodia, Chandan Mazumdar,
Information Systems Security,
ISBN: 3-540-30706-0,
Springer Lecture Notes in Computer Science, Volume
3803, Springer, Berlin, 2005, 344 pages.
-
Sushil
Jajodia, Duminda Wijesekera, eds.
Data and Applications Security XIX,
ISBN 3-540-28138-X,
Springer Lecture Notes in Computer Science, Volume
3654, Springer, Berlin, 2005, 223 pages.
-
Sushil
Jajodia, Leon Strous, eds., Integrity and Internal
Control in Information Systems VI, ISBN 1-4020-7900-1, Kluwer Academic
Publishers, Boston,? 2004, 272
pages.
- Yves Deswarte,
Frederic Cuppens, Sushil Jajodia,
Lingyu Wang, eds.,
Security
and Protection in Information Processing Systems,
ISBN 1-4020-8142-1, Kluwer
Academic Publishers, Boston, 2004, 562 pages.
- Yves Deswarte,
Frederic Cuppens, Sushil Jajodia,
Lingyu Wang, eds.,
Information
Security Management, Education, and Privacy,
ISBN 1-4020-8144-8, Kluwer
Academic Publishers, Boston, 2004, 328 pages.
- Hideko S. Kunii, Sushil
Jajodia, Arne Solvberg, eds., Conceptual
Modeling - ER 2001, Springer Lecture Notes in Computer Science, Volume
2224, ISBN 3-540-42866-6, Springer, Berlin, 2001, 614 pages.
- Sushil
Jajodia and Pierangela Samarati, eds., Proc.
7th ACM Conf. on Computer and Communications Security, ISBN
1-58113-203-4, ACM Press, New York, November 2000, 256 pages.
- Sushil
Jajodia, ed., Database Security XII:
Status and Prospects, Kluwer Academic Publishers, Boston,
1999, 320 pages.
Return to top of the page
- Alberto Ceselli, Ernesto
Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano
Paraboschi, Pierangela Samarati, "Modeling and assessing inference exposure
in encrypted databases," ACM Trans. on Information and System Security,
Vol. 8, No. 1, February 2005, pages 119-152.
- Yingjiu Li, Vipin Swarup,
Sushil Jajodia, "Fingerprinting relational databases: Schemes and
specialties," IEEE Transactions on Dependable and Secure Computing,
Vol. 2, No. 1, January-March 2005, pages 34-45.
- Claudio Bettini, X. Sean
Wang, Sushil Jajodia, "Information release control: A learning-based
architecture," Springer LNCS Journal on Data Semantics II, Springer Lecture
Notes in Computer Science, Volume 3360, 2005, pages 176-198.
-
Lingyu
Wang, Duminda Wijesekera,
Sushil Jajodia,
“Cardinality-based inference control in data cubes,” Journal
of Computer Security, Vol. 12, No. 5, 2004, pages 655-692.
- Claudio Bettini,
Sushil Jajodia,
X. Sean Wang, Duminda Wijesekera,
“Reasoning with advanced policy rules and its application to access
control,” International Journal on Digital
Libraries, Vol. 4, No. 3,
November 2004, pages 156-170.
- Kenneth Smith,
Sushil
Jajodia, Vipin
Swarup, Jeffery Hoyt, Gail Hamilton, Donald
Faatz, Todd Cornett, “Enabling the sharing of
neuroimaging data through well-defined intermediate
levels of visibility,”
NeuroImage,
Vol. 22, No. 4, August 2004, pages
1646-1656.
-
Duminda Wijesekera,
Sushil Jajodia,
Francesco Parisi-Presicce, Asa Hagstrom, “Removing permissions in
the Flexible Authorization Framework,” ACM Trans. on Database
Systems, Vol. 28, No. 3, September 2003, pages 209-229.
- Alessandro Mei, Luigi V.
Mancini,
Sushil Jajodia, “Secure
dynamic fragment and replica allocation in large-scale distributed file
systems,” IEEE Trans. on Parallel and Distributed Systems, Vol.
14, No. 9, September 2003, pages 885-896.
-
Claudio Bettini,
Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Provisions and
obligations in policy rule management,” Journal of Network and
Systems Management, Vol. 11, No. 3, September 2003, pages 351-372.
- Daniel Barbara, Rajni Goel,
Sushil
Jajodia, “A checksum-based corruption detection
techniques,” Journal of Computer Security, Vol. 11, No. 3,
2003, pages 315-329.
- Duminda Wijesekera,
Sushil
Jajodia, ``A propositional policy algebra for access
control,'' ACM Trans. on Information and System Security, Vol. 6,
No. 2, May 2003, pages 286-325.
- Yingjiu Li, Peng Ning, X.
Sean Wang,
Sushil Jajodia, ``Discovering
calendar-based temporal association rules,'' Data and Knowledge
Engineering, Vol. 4, No. 2, 2003, pages 193-218.
- Roberto Di Pietro, Luigi V.
Mancini, Sushil Jajodia, "Providing secrecy in key management protocols for
large wireless sensor networks," Ad Hoc Networks, Vol. 1, No. 4,
2003, pages 455-468.
- Claudio Bettini, X. Sean
Wang, and
Sushil Jajodia, ``Solving
multi-granularity temporal constraint networks,'' Artificial
Intelligence, Vol. 140, No. 1/2, 2002, pages 107-152.
- Paul Ammann,
Sushil
Jajodia, Peng Liu, ``Recovering from malicious
transactions,'' IEEE Trans. on Knowledge and Data Engineering, Vol.
14, No. 5, September/October 2002, pages 1167-1185.
- Sanjeev Setia, Sencun Zhu,
Sushil
Jajodia, ``A comparative performance analysis of
reliable group rekey transport protocols for secure multicast, Performance
Evaluation, Vol. 49, No. 1-4, September 2002, pages 21-41.
- Claudio Bettini,
Sushil
Jajodia, X. Sean Wang, ``Temporal reasoning in workflow
systems,'' Distributed and Parallel Databases, Vol. 11, No. 3, May
2002, pages 269-306.
- Peng Ning, X. Sean Wang,
Sushil
Jajodia, ``An algebraic representation of calendars,'' Annals
of Mathematics and Artificial Intelligence, Vol. 36, No. 1-2,
September 2002, pages 5-38.
- Yingjiu Li, Ningning Wu,
Sushil
Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly
detection using time granularities,'' Jour. of Computer Security,
Vol. 10, No. 1/2, 2002, pages 137-157.
- Peng Ning,
Sushil
Jajodia, X. Sean Wang, ``Design and implementation of a
decentralized prototype system for detecting distributed attacks,'' Computer
Communications, Vol. 25, No. 15, September 2002, pages 1374-1391.
- Susan Chapin, Don Faatz,
Sushil
Jajodia, Amgad Fayad, ``Consistent policy enforcement in
distributed systems using mobile policies,'' Data & Knowledge
Engineering, Vol. 43, No. 3, December, 2002, pages 261-280.
-
Sushil
Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S.
Subrahmanian, ``Flexible support for multiple access control policies,'' ACM
Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.
- Peng Ning,
Sushil
Jajodia, Xiaoyang Sean Wang, ``Abstraction-based
intrusion detection in distributed environments,'' ACM Trans. on
Information and System Security, Vol. 4, No. 4, November 2001, pages
407-452.
- Pierangela Samarati, Michael
K. Reiter,
Sushil Jajodia, ``An
authorization model for a public key management service,'' ACM Trans.
on Information and System Security, Vol. 4, No. 4, November 2001,
pages 453-482.
- Peng Liu, Peng Ning,
Sushil
Jajodia, ``Avoiding loss of fairness owing to failures
in fair data exchange systems,'' Decision Support Systems, Vol. 31,
No. 3, 2001, pages 337-350.
-
Sushil
Jajodia, Vijaylakshmi Atluri, Thomas F. Keefe, Catherine
D. McCollum, Ravi Mukkamala, ``Multilevel secure transaction processing,''
Jour. of Computer Security, Vol. 9, No. 3, 2001, pages 165-195.
- Alexander Brodsky, Csilla
Farkas,
Sushil Jajodia, ``Secure
databases: Constraints, inference channels, and monitoring disclosures,''
IEEE
Trans. on Knowledge and Data Engineering, Vol. 12, No. 6,
November/December 2000, pages 900-919.
- I. Ray, L. V. Mancini, S.
Jajodia, E. Bertino, ``ASEP: A secure and flexible commit protocols for
MLS distributed database systems,'' IEEE Trans. on Knowledge and Data
Engineering, Vol. 12, No. 6, November/December 2000, pages 880-899.
- Indrakshi Ray, Paul Ammann,
Sushil
Jajodia, ``Using semantic correctness in multidatabases
to achieve local autonomy, distribute coordination, and maintain global
integrity,'' Information Sciences, Vol. 129, No. 1-4, December
2000, pages 155-195.
- Peng Liu,
Sushil
Jajodia, Catherine D. McCollum, ``Intrusion confinement
by isolation in information systems,'' Jour. of Computer Security,
Vol. 8, No. 4, 2000, 243-279.
- Peng Ning, X. Sean Wang,
Sushil
Jajodia, ``Modeling requests among cooperating intrusion
detection systems,'' Computer Communications, Vol. 23, No. 17,
November 2000, pages 1702-1715.
- Luigi V. Mancini, Indrajit
Ray,
Sushil Jajodia, and Elisa Bertino,
``Flexible transaction dependencies in database systems,'' Distributed
and Parallel Databases, Vol. 8, No. 4, October 2000, pages 399-446.
- Peng Liu, Paul Ammann, and
Sushil
Jajodia, ``Rewriting histories: Recovering from
malicious transactions,'' Distributed and Parallel Databases, Vol.
8, No. 1, January 2000, pages 7-40.
- Chunru Zhang, Kwok-Yan Lam,
Sushil
Jajodia, ``Scalable threshold closure,'' Theoretical
Computer Science, Vol. 226, 1999, pages 185-206.
- S. Jajodia, P. Ammann, C. D.
McCollum, ``Surviving information warfare attacks,'' IEEE Computer,
Vol. 32, No. 4, April 1999, pages 57-63.
-
Sushil
Jajodia, Catherine D. McCollum and Paul Ammann,
``Trusted recovery,'' Communications of the ACM, Vol. 42, No. 7,
July 1999, pages 71-75.
- E. Bertino, S. Jajodia, and
P. Samarati, ``A flexible authorization mechanism for relational data
management systems,'' ACM Trans. on Information Systems, April
1999, Vol. 17, No. 2, April 1999, pages 101-140.
Return to top of the page
- Xinyuan Wang, Shiping Chen,
Sushil Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the
Internet," Proc. 12th
ACM Conf. on Computer
and Communications Security (CCS), Alexandria, Virginia, November 2005, pages 81-91
(Acceptance ratio 38/250).
- Chao Yao, X. Sean Wang,
Sushil Jajodia, "Checking for k-anonymity violation by views," Proc.
Int'l. Conf. on Very Large Databases (VLDB), Trondheim, Norway, Aug
30-Sep 2, 2005, pages 910-921 (Acceptance ratio core database technology 53/322).
- Lingyu Wang, Anyi Liu, Sushil
Jajodia, "An efficient and unified approach to correlating, hypothesizing,
and predicting network intrusion alerts," Proc. 10th European Symposium
on Research in Computer Security (ESORICS), Springer Lecture Notes in
Computer Science, Vol. 3679, Sabrina De Capitani di Vimercati, Paul
Syverson, Dieter Gollmann,
eds., Milan, Italy, September 2005, pages 247-266 (Acceptance ratio 26/158).
- Steve Noel, Sushil Jajodia,
"Understanding complex network attack graphs through clustered adjacency
matrices," Proc. 21st Annual Computer Security Conference (ACSAC),
Tucson, AZ, December 5-9, 2005, pages 160-169.
- Sankardas Roy, Venkata Gopala Addada, Sanjeev Setia,
Sushil Jajodia, "Securing MAODV: Attacks and
countermeasures," Proc. 2nd IEEE Int'l. Conf. on Sensor and Ad Hoc
Communications and Networks, Santa Clara, Calif., September 26-29, 2005,
pages 521-532 (Acceptance ratio 55/202).
- Ernesto Damiani, S.De Capitani di Vimercati,
Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, "Key
management for multi-user encrypted databases," Proc.
ACM International Workshop on Storage Security and Survivability (StorageSS
2005), November 2005.
- Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera,
"Maintaining privacy on derived objects," Proc. ACM Workshop on Privacy
in the Electronic Society," Alexandria, VA, November 7, 2005, pages
10-19.
- Claudio Bettini,
X. Sean Wang,
Sushil Jajodia,
"Protecting privacy against location-based personal identification,"
Proc. 2nd VLDB Workshop on Secure Data Management (SDM'05), Springer
Lecture Notes in Computer Science, Vol. 3674, Willem Jonker and Milan Petkovic,
eds., Trondheim, Norway, September 2-3, 2005, pages 185-189 (Acceptance
ratio 16/38).
- Ernesto Damiani, Sabrina De Capitani di
Vimercati, Sara Forseti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati,
"Metadata management in outsourced encrypted
databases," Proc. 2nd VLDB Workshop on Secure Data Management (SDM'05), Springer
Lecture Notes in Computer Science, Vol. 3674, Willem Jonker and Milan Petkovic,
eds., Trondheim, Norway, September 2-3, 2005, pages 16-32 (Acceptance ratio 16/38).
- Sencun Zhu, Chao Yao, Donggang Liu, Sanjeev Setia,
Sushil Jajodia, "Efficient security mechanisms for
overlay multicast-based content distribution," Proc. 3rd Applied
Cryptography and Network Security (ACNS) Conference, Springer Lecture
Notes in Computer Science, Vol. 3531, John Ioannidis, Angelos Keromytis,
Moti Yung, eds., New York, April
7-10, 2005, pages 40-55 (Acceptance ratio 35/156).
- Vipin Swarup, Sushil Jajodia,
Joseph Pamula, "Rule-based topological vulnerability analysis," Proc. 3rd
Int'l. Workshop on Mathematical Methods, Models, and Architectures for
Computer Network Security (MMM-ACNS 2005), Springer Lecture Notes in
Computer Science, Vol. 3685, Vladimir Gorodetsky, Igor Kotenko, Victor
Skormin, eds., St. Petersburg, Russia, September 24-28, 2005, pages 23-37.
- Andrea Gabrielli, Luigi V. Mancini, Sanjeev Setia,
Sushil Jajodia, "Securing topology maintenance
protocols for sensor networks: attacks and counter-measures," Proc. IEEE
Conference on Security and Privacy for Emerging Areas in Communication
Networks (SecureComm 2005), Athens, Greece, September 2005, pages
101-112 (Acceptance ratio 32/163).
- Chao Yao, William H.
Winsborough, Sushil Jajodia, "A hierarchical release control policy
framework," in Security Management, Integrity, and Internal
Control in Information Systems, Paul Dowland, Steven Furnell, Bhavani
Thuraisingham, X. Sean Wang, editors, Springer, 2005, pages 121-137.
- Steven Noel, Michael Jacobs,
Pramod Kalapa, Sushil Jajodia, "Multiple coordinated views for network
attack graphs," IEEE Workshop on Visualization for Computer Security
(VizSEC2005), Minneapolis, MN, October, 2005, pages 99-106.
- Donggang Liu, Peng Ning,
Sencun Zhu, Sushil Jajodia, "Practical broadcast authentication in sensor
networks," Proc. Second Annual
International Conference on Mobile and Ubiquitous Systems: Networking and
Services (MobiQuitous 2005), San Diego, CA, July 17-21, 2005, pages
34-45.
- Sabrina De Capitani di
Vimercati, Pierangela Samarati, Sushil Jajodia, "Policies, models, and
languages for access control," Proc. 4th International
Workshop on Databases in Networked Information Systems (DNIS 2005),
Springer Lecture Notes in Computer Science, Vol. 3433,
Subhash Bhalla, ed., Aizu-Wakamatsu, Japan, March 28-30, 2005,
pages 225-237.
- Lingyu Wang,
Sushil
Jajodia, Duminda Wijesekera, “Securing OLAP data
cubes against privacy breaches,” Proc. IEEE Symp. on Security
and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance
ratio 19/186).
- Sencun Zhu, Sanjeev Setia,
Sushil
Jajodia, Peng Ning, “An interleaved hop-by-hop
authentication scheme for filtering false data injection in sensor
networks,” Proc. IEEE Symp. on Security and Privacy, Oakland,
CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
- Shiping
Chen, Duminda Wijesekera,
Sushil Jajodia, “Incorporating
Dynamic Constraints in the Flexible Authorization Framework,”
Proc. 9th European
Symp. on Research in Computer
Security (ESORICS 2004), Springer Lecture Notes in Computer Science, Vol.
3193, Sophia Antipolis,
France,
September 2004, pages 1-16 (Acceptance ratio 27/159).
- Steve Noel, Sushil Jajodia,
Eric Robertson, "Correlating intrusion events and building attack scenarios
through attack graph distances,"
Proc.
20th Annual Computer Security Applications Conference, Tucson, Arizona, December
6-10, 2004, pages 350-359. PDF
- Lingyu Wang, Duminda
Wijesekera, Sushil Jajodia, "A logic-based framework for attribute based access control,"
Proc.
2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), October 2004, pages 45-55 (Acceptance ratio 9/25).
PDF
- Steve Noel, Sushil Jajodia,
"Managing attack graph complexity through visual hierarchical aggregation"
Proc. ACM Workshop on Visualization and Data Mining for Computer Security,
October 2004, pages109-118 (Acceptance ratio 13/36).
PDF
- Yingjiu Li, Huiping Guo,
Sushil Jajodia, "Tamper detection and localization for categorical data
using fragile watermarks," Proc. ACM
Workshop on Digital Rights Management, Washington, DC, October 2004,
pages 73-82 (Acceptance ratio 10/27).
PDF
- Claudio Bettini,
X. Sean Wang,
Sushil Jajodia,
"Identifying Sensitive Associations in Databases for Release
Control," Proc. International Workshop on Secure Data Management
in a Connected World, Springer Lecture Notes in Computer Science, Vol.
3178, Willem Jonker and Milan Petkovic,
eds., Toronto, Canada, August 2004, pages 187-201.
- Yingjiu
Li, Vipin Swarup,
Sushil Jajodia,
“Defending against additive attacks with maximal errors in
watermarking relational databases,”
Proc. 18th IFIP WG 11.3 Working Conference on Data and
Application Security, Research Directions in Data and Applications Security
XVIII, Csilla Farkas and Pierangela Samarati, editors, Kluwer Academic Publishers, Boston,
2004, pages 81-94 (Acceptance ratio 23/49).
- Shiping Chen, Duminda
Wijesekera, Sushil Jajodia, "FlexFlow: A flexible flow control policy
specification framework," in Data and Applications Security XVII: Status
and Prospects, Sabrina De Capitani di Vimercati, Indrakshi Ray, and
Indrajit Ray, eds., Kluwer Academic Publishers, Boston, 2004, pages 358-371
(Acceptance ratio 26/59).
- Sencun Zhu, Sanjeev Setia,
Shouhuai Xu,
Sushil Jajodia,
“GKMPAN: An efficient group rkeying scheme for secure multicast in
ad-hoc networks,” Proc.
First Annual International Conference on
Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), Boston, MA, August 22-25, 2004, pages
42-51.
- Claudio Bettini, X. Sean
Wang,
Sushil Jajodia, “A
learning-based approach to information release control,” in
Integrity and Internal Control in
Information Systems VI,
Sushil Jajodia,
Leon Strous, eds., Kluwer Academic Publishers, Boston,? 2004, pages 83-105.
- Sencun Zhu,
Sushil
Jajodia, “Scalable group rekeying for secure
multicast: A survey,” Proc. 5th International Workshop on
Distributed Computing, Springer Lecture Notes in Computer Science, Vol.
2918 (Samir R. Das and Sajal K. Das, editors), 2004, pages 1-10.
- Sushil Jajodia,Duminda
Wijesekera, "A flexible authorization framework for E-commerce,"
Proc.
First International Conference on Distributed Computing and Internet
Technology, Springer Lecture Notes in Computer Science, Vol. 3347 (R. K.
Ghosh and H. Mohanty, eds.), 2004, pages 336-345.
- Kaushal Sarda, Duminda
Wijesekera, Sushil Jajodia "Implementing consistency checking in correlating
attacks," Proc. First International Conference on Distributed Computing
and Internet Technology, Springer Lecture Notes in Computer Science, Vol.
3347 (R. K. Ghosh and H. Mohanty, eds.), 2004, pages 379-384.
- Sencun Zhu, Sanjeev Setia,
Sushil
Jajodia, “LEAP: Efficient security mechanisms for
large-scale distributed sensor networks,” Proc. 10th
ACM Conf. On Computer
and Communications Security, Washington, DC, October 27-31, 2003, pages 62-72 (Acceptance
ratio 36/252).
- Ernesto Damiani, Sabrina De
Capitani di Vimercati,
Sushil Jajodia,
Stefano Paraboschi, Pierangela Samarati, “Balancing confidentiality
and efficiency in untrusted Relational DBMSs,” Proc. 10th
ACM Conf. On Computer
and Communications Security, Washington, DC, October 27-31, 2003, pages 93-102 (Acceptance
ratio 36/252).
- Yingjiu Li, Vipin Swarup,
Sushil Jajodia, “Constructing
a virtual primary key for fingerprinting relational data, Proc. ACM
Workshop on Digital Rights Management, Washington, DC, October 2003,
pages 133-141 (Acceptance
ratio 13/30).
- Lingyu Wang, Yingjiu Li,
Duminda Wijesekera,
Sushil Jajodia,
“Precisely answering multidimensional range queries without privacy
breach,” Proc. 8th European Symposium on Research in Computer
Security (ESORICS 2003), Springer Lecture Notes in Computer Science,
Volume 2808, October 2003, pages 100-115 (Acceptance ratio
19/114).
-
Steve Noel,
Sushil Jajodia, Brian O’Berry, Mike Jacobs, “Efficient
minimum-cost network hardening via exploit dependency graphs,” Proc.
19th Annual Computer Security Applications Conference, Las Vegas,
Nevada, December 8-12, 2003, pages 86-95.
- Yingjiu Li, Vipin Swarup,
Sushil Jajodia, “A
robust watermarking scheme for relational data,” Proc. 13th
Workshop on Information Technology and Systems (WITS’03),
Seattle, Washington, December 2003, pages 195-200.
- S. Zhu, S. Xu, S. Setia, S.
Jajodia, “Establishing pair-wise keys for secure communication
networks: a probabilistic approach,” Proc. 11th IEEE
International Conference on Network Protocols, Atlanta,
Georgia, November 4-7, 2003 (Acceptance ratio 30/230).
- E. Damiani, S. De Capitani
di Vimercati, S. Paraboschi, P. Samarati, M. Finetti, S. Jajodia,
“Implementation of a storage mechanism for untrusted DBMSs,” Proc. IEEE
Second International IEEE Security in Storage Workshop (SISW 2003), Washington,
DC, October 31, 2003, pages 38-46.
- Sencun Zhu, Sanjeev Setia,
Sushil
Jajodia, “Performance optimizations for group key
management schemes for secure multicast,” Proc. IEEE 23rd
Int’l. Conf. On Distributed Computing Systems, Providence, Rhode
Island, May 19-22, 2003 (Acceptance ratio 72/406).
- Sencun Zhu, Sanjeev Setia,
Sushil
Jajodia, “Adding reliable and self-healing key
distribution to the subset difference group rekeying method for secure
multicast,” Fifth
International Workshop on Networked Group Communications (NGC'03), Munich,
Germany, September 16-19, 2003 (Acceptance ratio 17/51).
- Sencun Zhu, Shouhuai Xu,
Sanjeev Setia and
Sushil Jajodia,
“LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc
networks,” Proc. International Workshop on Mobile and Wireless
Networks (MWN 2003), May 2003 (Acceptance ratio
30/60).
-
Douglas E.
Williams, Amgad Fayad,
Sushil Jajodia,
Daniel Calle, “A user friendly guard with mobile post-release access
control policy,” in Security and Privacy in the Age of
Uncertainty, Dimitris Gritzalis, Sabrina De Capitani di Vimercati,
Pierangela Samarati, Sokratis Katsikas, eds., Kluwer Academic Publishers,
Boston, 2003, pages 265-276 (Acceptance ratio 33/121).
- Lingyu Wang, Duminda
Wijesekera,
Sushil Jajodia, ``Towards
secure XML federations,'' in Research Directions in Data and
Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer
Academic Publishers, Boston, 2003, pages 117-131 (Acceptance ratio 25/50).
- Daniel Barbara, Rajni Goel,
Sushil
Jajodia, ``Mining malicious data corruption with hidden
markov models,'' in Research Directions in Data and Applications
Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic
Publishers, Boston, 2003, pages 175-189 (Acceptance ratio 25/50).
- Daniel Barbar?, Yi Li,
Jia-Ling Lin,
Sushil Jajodia, Julia
Couto, “Bootstrapping a data mining intrusion detection
system,” Proc. ACM Symp.
on Applied Computing (SAC),
Melbourne,
FL, March 2003, pages 421-425.
- Kenneth Smith, Vipin Swarup,
Sushil Jajodia, Donald B. Faatz, Todd
Cornett, Jeffery Hoyt, “Securely sharing neuroimagery,”
Proc. ACM International Conference on
Information and Knowledge Management, New Orleans, Louisiana, November
2-8, 2003, pages 375-377.
- Yingjiu Li, Lingyu Wang,
Sushil
Jajodia, ``Preventing interval-based inference by random
data perturbation,'' Proc. Workshop on Privacy Enhancing Technologies
(PET 2002),
Springer Lecture Notes in Computer Science, Vol. 2482,
R. Dingledine and P. Syverson, eds. 2003, pages 160–170 (Acceptance ratio 16/47).
- Claudio Bettini,
Sushil
Jajodia, Sean Wang, Duminda Wijesekera, ``Provisions and
obligations in policy rule management and security applications,'' Proc.
28th International Conference on Very Large Data Bases, Hong Kong,
China, August 2002, pages 502-513 (Acceptance ratio 69/432).
- Duminda Wijesekera,
Sushil
Jajodia, ``Policy Algebras for Access Control - The
predicate Case,'' Proc. 8th ACM Conference on Computer and
Communications Security, Washington, DC, November 17-22, 2002, pages
171-180 (Acceptance ratio 27/161).
- Lingyu Wang, Duminda
Wijesekera,
Sushil Jajodia,
``Cardinality-based inference control in sum-only data cubes,'' Proc.
7th European Symposium on Research in Computer Security (ESORICS 2002),
Lecture Notes in Computer Science, Vol. 2502, Zurich, Switzerland,
October 14-16, 2002, pages 55-71 (Acceptance ratio 16/83).
- Peng Liu,
Sushil
Jajodia, Paul Ammann, Jie Li, ``Can-follow concurrency
control,'' Proc. IASTED Int'l. Conf. on Networks, Parallel and
Distributed Processing, and Applications, Tsukuba, Japan, October 1-4,
2002.
- Yingjiu Li, Senchun Zhu,
Lingyu Wang,
Sushil Jajodia, ``A
privacy-enhanced microaggregation method,'' Proc. 2nd Int'l. Symp. on
Foundations of Information and Knowledge Systems (FoIKS 2002),
Springer-Verlag Lecture Notes in Computer Science, Vol. 2284 (T. Eiter and
K.-D. Schwe, eds), February 2002, pages 148-159. (Acceptance ratio
15/55).
- Yingjiu Li, Lingyu Wang, X.
Sean Wang,
Sushil Jajodia, ``Auditing
interval-based inference,'' Proc. 14th Conf. on Advanced Information
Systems Engineering (CAiSE'02), Springer-Verlag Lecture Notes in
Computer Science, Vol. 2348 (A. Banks Pidduck, J. Mylopoulos, C. C. Woo,
M. Tamer Ozsu, eds.), May 2002, pages 553-568 (Acceptance ratio
42/173).
- Claudio Bettini,
Sushil
Jajodia, X. Sean Wang, Duminda Wijesekera, ``Obligation
monitoring in policy management,'' Proc. 3rd International Workshop on
Policies for Distributed Systems and Networks (POLICY 2002), Monterey,
CA, IEEE Computer Society, June 2002, pages 2-12 (Acceptance ratio 17/67).
-
Sushil
Jajodia, Duminda Wijesekera, ``Recent advances in access
control models,'' in Database and Application Security XV, Martin
S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston,
2002, pages 3-15.
- Jackie Yang, Duminda
Wijesekera,
Sushil Jajodia, ``Subject
switching algorithms for access control in federated databases,'' in Database
and Application Security XV, Martin S. Olivier and David L. Spooner,
eds., Kluwer Academic Publishers, Boston, 2002, pages 61-74.
- Ravi Mukkamala,
Sushil
Jajodia, ``A novel approach to certificate revocation
management,'' in Database and Application Security XV, Martin S.
Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston,
2002, pages 225-238.
- Roberto Di Pietro, Luigi V.
Mancini,
Sushil Jajodia, ``Efficient and
secure keys management for wireless mobile communications,’’ Proc.
2nd ACM Int’l. Workshop on Mobile Computing, Toulouse, France,
October 2002, pages 66-73.
- Roberto Di Pietro, Luigi V.
Mancini,
Sushil Jajodia, ``Secure
selective exclusion in ad hoc wireless network,'' in Security in the
information Society: Visions and Perspectives, M. Adeeb Ghonaimy,
Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers,
Boston, 2002, pages 423-434.
- Ken Smith, Don Faatz, Amgad
Fayad,
Sushil Jajodia, ``Propagating
modifications to mobile policies,'' in Security in the information
Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T.
El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002,
pages 573-584.
- Duminda Wijesekera,
Sushil
Jajodia, ``Policy Algebras for Access Control - The
Propositional Case,'' Proc. 8th ACM Conference on Computer and
Communications Security, Philadelphia, PA, November 5-8, 2001, pages
38-47 (Acceptance ratio 27/153).
- Yingjiu Li, Peng Ning, X. Sean Wang, Sushil
Jajodia, "Generating market
basket data with temporal information," KDD Workshop on Temporal Data
Mining, August 2001.
- Daniel Barbara, Ningning Wu,
Sushil Jajodia, ``Detecting novel network
intrusions using bayes estimators,'' Proc. 1st SIAM International
Conference on Data Mining (SDM 2001),, Chicago, IL, April 2001.
- Asa Hagstrom,
Sushil
Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera,
``Revocations - a classification,'' Proc. 14th IEEE Computer Security
Foundations Workshop, Nova Scotia, Canada, June 2001, pages 44-58.
- Peng Liu,
Sushil
Jajodia, ``Multi-phase damage confinement in database
systems for intrusion tolerance,'' Proc. 14th IEEE Computer Security
Foundations Workshop, Nova Scotia, Canada, June 2001, pages 191-205.
- Yingjiu Li, Peng Ning, X.
Sean Wang,
Sushil Jajodia, ``Discovering
calendar-based temporal association rules,'' Proc. 8th Int'l. Symp. on
Temporal Representation and Reasoning (TIME 2001), Cividale del
Fruily, Italy, June 2001, pages 111-118.
- Amgad Fayad,
Sushil
Jajodia, Don Faatz, Vinti Doshi, ``Going beyond MAC and
DAC using mobile policies,'' in Trusted Information - The New Decade
Challenge (Michel Dupuy and Pierre Pardinas, editors), Kluwer Academic
Publishers, Boston, June 2001, pages 245-260.
- Yingjiu Li, X. Sean Wang,
Sushil
Jajodia, ``Discovering temporal patterns in multiple
granularities,'' Proc. Int'l. Workshop on Temporal, Spatial, and Spatio-Temporal
Data Mining, Springer-Verlag Lecture Notes in Artificial Intelligence,
Vol. 2007 , 2001, pages 5-19.
- Daniel Barbara, Rajni Goel,
and
Sushil Jajodia, ``Protecting file
systems against corruption using checksums,'' in Data and Applications
Security: Developments and Directions, Bhavani Thuraisingham, Reind
van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic
Publishers, Boston, 2001, pages 113-124.
- Susan Chapin, Don Faatz,
Sushil
Jajodia, ``Distributed policies for data management making
policies mobile,'' in Data and Applications Security: Developments and
Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R.
Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages
63-75.
- Daniel Barbara, Julia Couto,
Sushil Jajodia, Leonard Popyack, Ningning
Wu, ``ADAM: Detecting intrusions by data mining,'' Proc. IEEE Workshop
on Information Assurance and Security, West Point, NY, June 2001,
pages 11-16.
- Sanjeev Setia, Samir
Koussih,
Sushil Jajodia, Eric Harder,
``Kronos: A scalable group re-keying approach for secure multicast,'' Proc.
IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance
ratio 18/137).
- Daniel Barbar?, Rajni Goel,
and
Sushil Jajodia, ``Using checksums to
detect data corruption,'' Proc. Conf. on Extending Database Technology,
Springer Lecture Notes in Computer Science, Vol. 1777 Konstanz,
Germany, March 2000, pages 136-149 (Acceptance ratio 30/180).
- Yingjiu Li, Ningning Wu,
Sushil
Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly
detection using time granularities,'' Proc. 1st Workshop on Intrusion
Detection Systems, Athens, Greece, November 2000.
- Vinti Doshi, Amgad Fayad,
Sushil
Jajodia, Roswitha MacLean, ``Using attribute
certificates with mobile policies in electronic commerce applications,'' Proc.
16th Annual Computer Security Applications Conf., New Orleans, LA,
December 2000, pages 298-307.
- Paul Ammann and
Sushil
Jajodia, ``The integrity challenge,'' Integrity and
Internal Controls in Information Systems: Strategic View on the Need for
the Control, (Margaret E. van Biene-Hershey and Leon Strous, eds.),
Kluwer, Boston, 2000, pages 59-69.
- Jiahai Yang, Peng Ning, X.
Sean Wang,
Sushil Jajodia, ``CARDS: A
distributed system for detecting coordinated attacks,'' in Information
Security For Global Information Infrastructures: IFIP TC11 Sixteenth
Annual Working Conference on Information Security, (Sihan Qing and Jan
H.P. Elof eds.), Kluwer, Boston, August 2000, pages 171-180 (Acceptance
ratio 50/180).
- Claudio Bettini, X. Sean
Wang,
Sushil Jajodia, ``Free schedules
for free agents in workflow systems,'' Proc. 7th Int'l. Symp. on
Temporal Representation and Reasoning (TIME 2000), Nova Scotia,
Canada, July 2000, pages 31-37.
- Peng Ning, X. Sean Wang,
Sushil
Jajodia, ``An algebraic representations of calendars,''
Proc.
AAAI Workshop on Spatial and Temporal Granularity, Austin, TX, June
2000, pages 1-8.
-
Sushil
Jajodia, Michiharu Kudo, V. S. Subrahmanian,
``Provisional authorizations,'' Proc. 1st Workshop on Security and
Privacy in E-Commerce, Athens, Greece, November 2000.
- Peng Liu, Peng Ning,
Sushil
Jajodia ``Avoiding loss of fairness owing to process
crashes in fair data exchange protocols,'' IEEE Workshop on
Dependability despite Malicious Faults, In Proc. IEEE Int'l. Conf.
on Dependable Systems and Networks, New York, NY, June 2000, pages
631-640.
- Neil F. Johnson, Zoran
Duric,
Sushil Jajodia, ``Recovery from
watermarks on distorted images.'' Proc. 3rd Workshop on Information
Hiding, Springer-Verlag Lecture Notes in Computer Science, Vol. 1768 ,
2000, pages 318-332.
- Peng Ning, X. Sean Wang,
Sushil
Jajodia, ``A query facility for common intrusion
detection framework,'' Proc. 23rd National Information Systems Security
Conf., Baltimore, MD, October 2000.
- Peng Liu,
Sushil
Jajodia and Catherine D. McCollum, ``Intrusion
confinement by isolation in information systems,'' Research Advances in
Database and Information Systems Security, Vijay Atluri and John Hale,
editors, Kluwer Publishers, Boston, 2000, pages 3-18.
- Ravi Mukkamala, Jason
Gagnon, and
Sushil Jajodia, ``Integrating
data mining techniques with intrusion detection,'' Research Advances in
Database and Information Systems Security, Vijay Atluri and John Hale,
editors, Kluwer Publishers, Boston, 2000, pages 33-46.
- Peng Liu, Paul Ammann,
Sushil
Jajodia, ``Incorporating transaction semantics to reduce
reprocessing overhead in replicated mobile data applications,'' IEEE
Int'l. Conf. on Distributed Computing Systems, 1999, pages 414-423
(Acceptance ratio 57/173).
- Amgad Fayad,
Sushil
Jajodia, Catherine D. McCollum, ``Application-level
isolation using data inconsistency detection,'' Proc. 15th Annual
Computer Security Applications Conf., Phoenix, AZ, December 1999,
pages 119-126.
-
Sushil
Jajodia, Peng Liu, Paul Ammann, ``A fault tolerance
approach to survivability,'' Symp. on Protecting NATO Information
Systems in the 21st Century, Washington, DC, October 1999.
- Neil F. Johnson, Zoran
Duric,
Sushil Jajodia, ``On
``fingerprinting'' images for recognition,'' Proc. 5th Int'l. Workshop
on Multimedia Information Systems, Palm Springs Desert, CA, October
1999.
Return to top of the page
- Sushil
Jajodia, Steve Noel, Brian O’Berry,
“Topological analysis of network attack vulnerability,”
in Managing Cyber Threats: Issues, Approaches and Challenges, Vipin Kumar, Jaideep Srivastava, and Aleksandar Lazarevic, eds., Springer, 2005, pages
248-266.
- Zoran
Duric, Michael Jacobs, Sushil Jajodia, "Information Hiding:
Steganography and Steganalysis," in Handbook of Statistics, Volume
24: Data Mining and Data Visualization, C. R. Rao, E. J. Wegman, and J.
L. Solka, eds., Elsevier, 2005, pages 171-187.
- Anoop
Singhal, Sushil Jajodia, "Data mining for intrusion detection," in
Data Mining and Knowledge Discovery Handbook, Oded Maimon and Lior Rokach, eds., Springer, 2005,
pages 1225-1237.
- Sushil
Jajodia, "Database security and privacy," in Computer Science Handbook,
2nd edition, Allen B. Tucker, Jr., ed., CRC Press, Boca Raton, FL, June
2004.
- Mohamed
Eltoweissy, Sushil Jajodia, Ravi Mukkamala, "Secure multicast for mobile
commerce applications: Issues and challenges," in Advances in Security
and Payment Methods for Mobile Commerce, Wen Chen Hu, Chung-Wei Lee, and
Weidong Kou, eds., Idea Group Publishing, Hershey, PA,
2004, pages 164-190.
- Duminda
Wijesekera,
Sushil Jajodia, “A
flexible authorization framework,” in
Information Security: Policies and Actions in Modern Integrated
Systems, Marigrazia Fugini and Carlo Bellettini, eds. Idea Group
Publishing,
Hershey,
PA,
2004, pages 149-176.
- Peng
Ning,
Sushil Jajodia,
“Intrusion Detection Systems Basics,” in Handbook of
Information Security,
Hossein
Bidgoli, ed., John Wiley, 2004.
- Peng
Ning,
Sushil Jajodia,
“Intrusion Detection Techniques,” in
The Internet Encyclopedia,
Hossein Bidgoli, ed.,
John
Wiley, ISBN 0-471-22201-1, December 2003.
- Daniel Barbara, Julia
Couto,
Sushil Jajodia, Ningning Wu, ``An
architecture for anomaly detection,'' in Applications of Data Mining
in Computer Security, Daniel Barbara,
Sushil Jajodia,
eds., ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, pages
63-76.
- Yingjiu Li, Ninging Wu, X.
Sean Wang, and
Sushil Jajodia,
``Enhancing profiles for anomaly detection using time granularities,'' in
Intrusion
Detection, Deborah Frincke, ed., IOS Press, Amsterdam, 2002, pages
137-157.
-
Sushil
Jajodia, Michiharu Kudo, V. S. Subrahmanian,
``Provisional authorizations,'' in E-Commerce Security and Privacy,
Anup Ghosh, ed., Kluwer Academic Publishers, Boston, 2001, pages 133-159.
- Sabrina Di
Capitani di
Vimercati, Pierangela
Samarati,
Sushil Jajodia,
``Database Security,'' in Encyclopedia of Software Engineering, 2nd
edition, John Marciniak, ed., John Wiley,
New
York, 2001.
- Paul Ammann,
Sushil
Jajodia, Peng Liu, ``A fault tolerance approach to
survivability,'' in Computer Security, Dependibility, and Assurance:
From Needs to Solutions , P.Ammann, B. H. Barnes, S. Jajodia, E. H.
Sibley, eds., IEEE Computer Society Press, Los Alamitos (1999), pages
204-212.
- Pierangela Samarati and
Sushil
Jajodia, ``Data Security,'' in Wiley Encyclopedia of
Electrical and Electronics Engineering, Volume 4, John G. Webster,
ed., John Wiley, NY, (1999) pages 743-759.
Return to top of the page
- Csilla
Farkas and Sushil Jajodia,
``The Inference problem: A survey,’’ ACM SIGKDD
Explorations, Vol. 4,
No. 2, 2003, pages 6-11.
- Daniel Barbara, Julia Couto,
Sushil Jajodia, Ningning Wu, ``ADAM: A
testbed for exploring the use of data mining in intrusion detection,'' ACM
SIGMOD Record, Vol. 30, No. 4, December 2001, pages 15-24.
- Sushil
Jajodia, Duminda Wijesekera, ``Security in Federated
Database Systems,'' Information Security Technical Report, Vol. 6,
No. 2, 2001, pages 69-79.
- Sushil Jajodia, "Turing award Winner Jim Gray on the new millenium," IEEE Concurrency, Vol. 7, No. 3,
July-Sept.1999, pages 9-10.
- Sushil Jajodia, "Data replication gaining popularity," IEEE Concurrency, Vol. 7, No. 2,
April-June 1999, pages 85-86.
- Paul Ammann and
Sushil
Jajodia
, ``Computer security, fault Tolerance, and
software assurance,'' IEEE Concurrency, Vol. 7, No. 1,
January-March 1999, pages 4-6.
Return to top of the page