default search action
Vijayalakshmi Atluri
Person information
- affiliation: Rutgers University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j76]H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Efficiently Supporting Attribute-Based Access Control in Linux. IEEE Trans. Dependable Secur. Comput. 21(4): 2012-2026 (2024) - [c157]Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. DBSec 2024: 3-23 - [c156]Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. DBSec 2024: 301-319 - [c155]Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems. SEC 2024: 323-337 - 2023
- [j75]Eeshan Gupta, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in NoSQL Databases. IEEE Trans. Emerg. Top. Comput. 11(1): 208-223 (2023) - [c154]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [e29]Vijayalakshmi Atluri, Anna Lisa Ferrara:
Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 13942, Springer 2023, ISBN 978-3-031-37585-9 [contents] - 2022
- [c153]H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in Linux Kernel. AsiaCCS 2022: 1237-1239 - [c152]Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
Contemporaneous Update and Enforcement of ABAC Policies. SACMAT 2022: 31-42 - [c151]Amshumaan Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. SEC 2022: 360-376 - [e28]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0 [contents] - [e27]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1 [contents] - [e26]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0 [contents] - 2021
- [j74]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling. Inf. Polity 26(4): 375-390 (2021) - [j73]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems. IEEE Trans. Emerg. Top. Comput. 9(4): 1901-1913 (2021) - [j72]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control. ACM Trans. Manag. Inf. Syst. 12(1): 6:1-6:24 (2021) - [c150]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Incremental Maintenance of ABAC Policies. CODASPY 2021: 185-196 - [c149]Eeshan Gupta, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Attribute-Based Access Control for NoSQL Databases. CODASPY 2021: 317-319 - 2020
- [j71]Ussama Yaqub, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Location-based Sentiment Analyses and Visualization of Twitter Election Data. Digit. Gov. Res. Pract. 1(2): 14:1-14:19 (2020) - [j70]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020) - [c148]Soon Ae Chun, Roshan Singh, Pamela Morgan, Nabil R. Adam, Vijay Atluri:
Visual Analytics for Global Migration Policy Discovery and NGO Collaboration. DG.O 2020: 109-115 - [c147]Roshan Singh, Soon Ae Chun, Vijay Atluri:
Developing Machine Learning Models to Automate News Classification. DG.O 2020: 354-355 - [c146]Vijay Atluri, Yuan Hong, Soon Ae Chun:
Security, Privacy and Trust for Responsible Innovations and Governance. DG.O 2020: 365-366
2010 – 2019
- 2019
- [j69]Mahendra Pratap Singh, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput. Secur. 86: 183-205 (2019) - [j68]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. IET Inf. Secur. 13(2): 96-103 (2019) - [j67]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Deploying ABAC policies using RBAC systems. J. Comput. Secur. 27(4): 483-506 (2019) - [j66]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Hierarchical Attribute-based Access Control Systems. ACM Trans. Internet Techn. 19(3): 40:1-40:24 (2019) - [c145]Augustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
ABACaaS: Attribute-Based Access Control as a Service. CODASPY 2019: 153-155 - [c144]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US. DG.O 2019: 248-253 - [c143]Soon Ae Chun, Venkata Avinash Paturu, Shengcheng Yuan, Rohit Pathak, Vijayalakshmi Atluri, Nabil R. Adam:
Crime Prediction Model using Deep Neural Networks. DG.O 2019: 512-514 - [c142]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. ICISS 2019: 79-98 - [c141]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Reconciliation and Migration in Attribute Based Access Control. ICISS 2019: 99-120 - [c140]Ronit Nath, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. SACMAT 2019: 25-35 - [c139]Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security Analysis of Unified Access Control Policies. SKM 2019: 126-146 - [c138]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. TPS-ISA 2019: 209-217 - 2018
- [j65]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. J. Comput. Secur. 26(2): 255-281 (2018) - [j64]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Towards designing robust CAPTCHAs. J. Comput. Secur. 26(6): 731-760 (2018) - [j63]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. IEEE Trans. Inf. Forensics Secur. 13(4): 897-911 (2018) - [c137]Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Engineering in RBAC and ABAC. From Database to Cyber Security 2018: 24-54 - [c136]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Enabling the Deployment of ABAC Policies in RBAC Systems. DBSec 2018: 51-68 - [c135]Ussama Yaqub, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis and visualization of subjectivity and polarity of Twitter location data. DG.O 2018: 67:1-67:10 - [c134]Nitesh Sharma, Rachit Pabreja, Ussama Yaqub, Vijayalakshmi Atluri, Soon Ae Chun, Jaideep Vaidya:
Web-based application for sentiment analysis of live tweets. DG.O 2018: 120:1-120:2 - [c133]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. SACMAT 2018: 213-215 - 2017
- [j62]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis of political discourse on twitter in the context of the 2016 US presidential elections. Gov. Inf. Q. 34(4): 613-626 (2017) - [j61]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5): 294-300 (2017) - [j60]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems. ACM Trans. Manag. Inf. Syst. 7(4): 10:1-10:24 (2017) - [c132]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. CIC 2017: 136-145 - [c131]Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri, Shamik Sural:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. CIC 2017: 339-348 - [c130]Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi:
Preventing Unauthorized Data Flows. DBSec 2017: 41-62 - [c129]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Sentiment based Analysis of Tweets during the US Presidential Elections. DG.O 2017: 1-10 - [c128]Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Poster: Constrained Policy Mining in Attribute Based Access Control. SACMAT 2017: 121-123 - [c127]David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. SEC 2017: 281-295 - [r6]Vijay Atluri, Heechang Shin:
Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2017: 730-738 - [r5]Soon Ae Chun, Vijay Atluri:
Security Models, Geospatial. Encyclopedia of GIS 2017: 1850-1860 - 2016
- [j59]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Mining temporal roles using many-valued concepts. Comput. Secur. 60: 79-94 (2016) - [j58]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
A Survey of Role Mining. ACM Comput. Surv. 48(4): 50:1-50:37 (2016) - [c126]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. CIC 2016: 64-73 - [c125]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. DBSec 2016: 3-18 - [c124]Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. SIN 2016: 16-23 - 2015
- [j57]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [j56]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
The generalized temporal role mining problem. J. Comput. Secur. 23(1): 31-58 (2015) - [j55]Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Meeting Cardinality Constraints in Role Mining. IEEE Trans. Dependable Secur. Comput. 12(1): 71-84 (2015) - [j54]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Minimizing Organizational User Requirement while Meeting Security Constraints. ACM Trans. Manag. Inf. Syst. 6(3): 12:1-12:25 (2015) - [c123]Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Migrating from DAC to RBAC. DBSec 2015: 69-84 - [c122]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. ICISS 2015: 61-78 - [c121]Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Role Mining in the Presence of Separation of Duty Constraints. ICISS 2015: 98-117 - [c120]Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi:
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. NSS 2015: 191-205 - [c119]Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub:
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. NSS 2015: 221-235 - [c118]David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Generating Secure Images for CAPTCHAs through Noise Addition. SACMAT 2015: 169-172 - [c117]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. SEC 2015: 354-368 - 2014
- [j53]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Security analysis of temporal RBAC under an administrative model. Comput. Secur. 46: 154-172 (2014) - [j52]David Lorenzi, Jaideep Vaidya, Soon Ae Chun, Basit Shafiq, Vijayalakshmi Atluri:
Enhancing the government service experience through QR codes on mobile platforms. Gov. Inf. Q. 31(1): 6-16 (2014) - [j51]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
An optimization framework for role mining. J. Comput. Secur. 22(1): 1-31 (2014) - [j50]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato, P. Madhusudan:
Security analysis for temporal role based access control. J. Comput. Secur. 22(6): 961-996 (2014) - [c116]David Lorenzi, Jaideep Vaidya, Basit Shafiq, Soon Ae Chun, Neelima Vegesna, Zamil S. Alzamil, Nabil R. Adam, Seth Wainer, Vijayalakshmi Atluri:
Utilizing social media to improve local government responsiveness. DG.O 2014: 236-244 - [c115]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. ICISS 2014: 129-148 - [c114]Nazia Badar, Jaideep Vaidya, Vijay Atluri:
More data, more security challenges: integrating analytics in to the information security curriculum. InfoSecCD 2014: 8:1 - [e25]Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 [contents] - 2013
- [j49]Manisha Sharma, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
AMTRAC: An administrative model for temporal role-based access control. Comput. Secur. 39: 201-218 (2013) - [c113]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Toward Mining of Temporal Roles. DBSec 2013: 65-80 - [c112]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. DBSec 2013: 297-304 - [c111]David Lorenzi, Jaideep Vaidya, Soon Ae Chun, Basit Shafiq, Varuna Naik, Vijayalakshmi Atluri, Nabil R. Adam:
Community based emergency response. DG.O 2013: 82-91 - [c110]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci:
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ICISS 2013: 133-147 - [c109]David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Web Services Based Attacks against Image CAPTCHAs. ICISS 2013: 214-229 - [c108]Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Spatio-Temporal Role Based Access Control. ICISS 2013: 375-389 - [c107]Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri:
Panel on granularity in access control. SACMAT 2013: 85-86 - 2012
- [j48]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. IEEE Trans. Dependable Secur. Comput. 9(5): 655-669 (2012) - [j47]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijayalakshmi Atluri:
Structure-aware graph anonymization. Web Intell. Agent Syst. 10(2): 193-208 (2012) - [c106]Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:
Role engineering: from theory to practice. CODASPY 2012: 181-192 - [c105]Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri:
Privacy-Preserving Subgraph Discovery. DBSec 2012: 161-176 - [c104]David Lorenzi, Basit Shafiq, Jaideep Vaidya, Ghulam Nabi, Soon Ae Chun, Vijayalakshmi Atluri:
Using QR codes for enhancing the scope of digital government services. DG.O 2012: 21-29 - [c103]David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. ICISS 2012: 327-342 - [c102]Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Parthasarathy Madhusudan:
Analyzing temporal role based access control models. SACMAT 2012: 177-186 - [c101]Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq:
Risk Based Access Control Using Classification. SafeConfig 2012: 79-95 - [c100]John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. SEC 2012: 150-161 - [e24]Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu:
17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012. ACM 2012, ISBN 978-1-4503-1295-0 [contents] - 2011
- [j46]Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri:
Security analysis of GTRBAC and its variants using model checking. Comput. Secur. 30(2-3): 128-147 (2011) - [j45]Vijay Atluri:
Preface. J. Comput. Secur. 19(3): 365 (2011) - [j44]Heechang Shin, Vijayalakshmi Atluri, June-Suh Cho:
Efficiently enforcing spatiotemporal access control under uncertain location information. J. Comput. Secur. 19(3): 607-637 (2011) - [j43]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
A profile anonymization model for location-based services. J. Comput. Secur. 19(5): 795-833 (2011) - [j42]David F. Ferraiolo, Vijayalakshmi Atluri, Serban I. Gavrila:
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57(4): 412-424 (2011) - [c99]Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya:
An Optimization Model for the Extended Role Mining Problem. DBSec 2011: 76-89 - [c98]Vijay Atluri, Basit Shafiq, Soon Ae Chun, Ghulam Nabi, Jaideep Vaidya:
UICDS-based information sharing among emergency response application systems. DG.O 2011: 331-332 - [c97]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Heechang Shin, Lili Jiang:
Weighted Rank-One Binary Matrix Factorization. SDM 2011: 283-294 - [e23]John Carlo Bertot, Karine Nahon, Soon Ae Chun, Luis F. Luna-Reyes, Vijay Atluri:
Proceedings of the 12th Annual International Conference on Digital Government Research, DG.O 2011, College Park, MD, USA, June 12 - 15, 2011. ACM International Conference Proceeding Series, Digital Government Research Center 2011, ISBN 978-1-4503-0762-8 [contents] - [e22]Vijay Atluri, Claudia Díaz:
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Lecture Notes in Computer Science 6879, Springer 2011, ISBN 978-3-642-23821-5 [contents] - [r4]Vijay Alturi:
HRU. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 562-564 - [r3]Vijay Alturi, David F. Ferraiolo:
Role-Based Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1053-1055 - 2010
- [j41]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
Anonymization models for directional location based service environments. Comput. Secur. 29(1): 59-73 (2010) - [j40]Vandana Pursnani Janeja, Nabil R. Adam, Vijayalakshmi Atluri, Jaideep Vaidya:
Spatial neighborhood based anomaly detection in sensor datasets. Data Min. Knowl. Discov. 20(2): 221-258 (2010) - [j39]Li Qin, Vijayalakshmi Atluri:
Semantics-aware security policy specification for the semantic web data. Int. J. Inf. Comput. Secur. 4(1): 52-75 (2010) - [j38]Vijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya:
A unified index structure for efficient enforcement of spatiotemporal authorisations. Int. J. Inf. Comput. Secur. 4(2): 118-151 (2010) - [j37]Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, Qi Guo:
Role Engineering via Prioritized Subset Enumeration. IEEE Trans. Dependable Secur. Comput. 7(3): 300-314 (2010) - [j36]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: A formal perspective. ACM Trans. Inf. Syst. Secur. 13(3): 27:1-27:31 (2010) - [c96]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. DBSec 2010: 97-112 - [c95]Basit Shafiq, Jaideep Vaidya, Vijay Atluri, Soon Ae Chun:
UICDS compliant resource management system for emergency response. DG.O 2010: 23-31 - [c94]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri, Sungyong Choi:
Ensuring Privacy and Security for LBS through Trajectory Partitioning. Mobile Data Management 2010: 224-226 - [c93]Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam:
Privacy-preserving trust verification. SACMAT 2010: 139-148 - [p6]Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam:
Preview. Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development 2010: 47-63
2000 – 2009
- 2009
- [j35]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Spatial outlier detection in heterogeneous neighborhoods. Intell. Data Anal. 13(1): 85-107 (2009) - [j34]Li Qin, Vijayalakshmi Atluri:
Evaluating the validity of data instances against ontology evolution over the Semantic Web. Inf. Softw. Technol. 51(1): 83-97 (2009) - [j33]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. J. Comput. Secur. 17(2): 211-235 (2009) - [j32]Dihua Guo, Hui Xiong, Vijayalakshmi Atluri, Nabil R. Adam:
Object discovery in high-resolution remote sensing images: a semantic perspective. Knowl. Inf. Syst. 19(2): 211-233 (2009) - [c92]Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri:
Effective anonymization of query logs. CIKM 2009: 1465-1468 - [c91]Heechang Shin, Vijayalakshmi Atluri:
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. DBSec 2009: 159-174 - [c90]Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 - [c89]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Extended Boolean Matrix Decomposition. ICDM 2009: 317-326 - [c88]Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri:
Towards formal security analysis of GTRBAC using timed automata. SACMAT 2009: 33-42 - [c87]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijay Atluri:
Preserving Privacy in Social Networks: A Structure-Aware Approach. Web Intelligence 2009: 647-654 - 2008
- [j31]Vijayalakshmi Atluri, Heechang Shin, Jaideep Vaidya:
Efficient security policy enforcement for the mobile environment. J. Comput. Secur. 16(4): 439-475 (2008) - [j30]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. IEEE Trans. Knowl. Data Eng. 20(10): 1378-1392 (2008) - [c86]Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri:
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ACSAC 2008: 237-246 - [c85]Nabil R. Adam, Vijay Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, Hui Xiong:
Secure information sharing and analysis for effective emergency management. DG.O 2008: 407-408 - [c84]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Boolean Matrix Decomposition: Application to Role Engineering. ICDE 2008: 297-306 - [c83]Heechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya:
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. MDM 2008: 73-80 - [c82]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam:
Migrating to optimal RBAC with minimal perturbation. SACMAT 2008: 11-20 - [c81]Vijay Atluri:
Panel on role engineering. SACMAT 2008: 61-62 - [c80]David F. Ferraiolo, Vijay Atluri:
A meta model for access control: why is it needed and is it even possible to achieve? SACMAT 2008: 153-154 - [p5]Nabil R. Adam, Vandana P. Janeja, Aabhas V. Paliwal, Vijay Atluri, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Joachim Schaper:
Semantics-Based Threat Structure Mining for Homeland Security. Digital Government 2008: 307-329 - [p4]Vijayalakshmi Atluri, Janice Warner:
Security for Workflow Systems. Handbook of Database Security 2008: 213-230 - [p3]Soon Ae Chun, Vijayalakshmi Atluri:
Geospatial Database Security. Handbook of Database Security 2008: 247-266 - [p2]Vijayalakshmi Atluri, Heechang Shin:
Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment. Handbook of Database Security 2008: 553-573 - [e21]Vijay Atluri:
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings. Lecture Notes in Computer Science 5094, Springer 2008, ISBN 978-3-540-70566-6 [contents] - [e20]Vijay Atluri, Marianne Winslett:
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008. ACM 2008, ISBN 978-1-60558-289-4 [contents] - [r2]Vijay Atluri, Heechang Shin:
Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2008: 379-385 - [r1]Soon Ae Chun, Vijay Atluri:
Security Models, Geospatial. Encyclopedia of GIS 2008: 1028-1036 - 2007
- [j29]Vijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni:
A decentralized execution model for inter-organizational workflows. Distributed Parallel Databases 22(1): 55-83 (2007) - [j28]Vijayalakshmi Atluri, Soon Ae Chun:
A geotemporal role-based authorisation system. Int. J. Inf. Comput. Secur. 1(1/2): 143-168 (2007) - [c79]Vijayalakshmi Atluri, Heechang Shin:
Efficient Security Policy Enforcement in a Location Based Service Environment. DBSec 2007: 61-76 - [c78]Soon Ae Chun, Nabil R. Adam, Vijay Atluri:
MENVIS: mobile environmental information system. DG.O 2007: 286-287 - [c77]Dihua Guo, Hui Xiong, Vijay Atluri, Nabil R. Adam:
Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery. PAKDD 2007: 71-83 - [c76]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: finding a minimal descriptive set of roles. SACMAT 2007: 175-184 - [c75]Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya:
Using semantics for automatic enforcement of access control policies among dynamic coalitions. SACMAT 2007: 235-244 - [e19]Peng Ning, Vijay Atluri:
Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-890-9 [contents] - [e18]Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel:
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-887-9 [contents] - [e17]Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung:
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007. ACM 2007, ISBN 978-1-59593-888-6 [contents] - 2006
- [j27]Li Qin, Vijayalakshmi Atluri:
SemDiff: An Approach to Detecting Semantic Changes to Ontologies. Int. J. Semantic Web Inf. Syst. 2(4): 1-32 (2006) - [j26]Li Qin, Vijayalakshmi Atluri:
An Ontology-Guided Approach to Change Detection of the Semantic Web Data. J. Data Semant.: 130-157 (2006) - [c74]Prasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri:
Privacy-preserving semantic interoperation and access control of heterogeneous databases. AsiaCCS 2006: 66-77 - [c73]Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner:
RoleMiner: mining roles using subset enumeration. CCS 2006: 144-153 - [c72]Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam:
Preview: Optimizing View Materialization Cost in Spatial Data Warehouses. DaWaK 2006: 45-54 - [c71]Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari:
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. DBSec 2006: 209-223 - [c70]Vijayalakshmi Atluri, Heechang Shin:
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. DBSec 2006: 237-251 - [c69]Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam:
Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse. DEXA 2006: 439-448 - [c68]Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner:
Secure interoperation for effective data mining in border control and homeland security applications. DG.O 2006: 124-125 - [c67]Soon Ae Chun, Yelena Yesha, Nabil R. Adam, Vijay Atluri:
Challenges in eGovernment technology transfer. DG.O 2006: 151-152 - [c66]Nabil R. Adam, Vijay Atluri, Soon Ae Chun, Francisco J. Artigas, Irfan Bora, Bob Ceberio:
Constituent-centric municipal government coalition portal. DG.O 2006: 365-366 - [c65]Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper:
Semantics-based threat structure mining. DG.O 2006: 367-368 - [c64]Mahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri:
Semantically enhanced enforcement of mobile consumer's privacy preferences. SAC 2006: 1172-1176 - [c63]Janice Warner, Vijayalakshmi Atluri:
Inter-instance authorization constraints for secure workflow management. SACMAT 2006: 190-199 - [e16]Aditya Bagchi, Vijayalakshmi Atluri:
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings. Lecture Notes in Computer Science 4332, Springer 2006, ISBN 3-540-68962-1 [contents] - 2005
- [j25]Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam:
Using Semantics for Policy-Based Web Service Composition. Distributed Parallel Databases 18(1): 37-64 (2005) - [j24]Vijay Atluri:
Preface. ACM Trans. Inf. Syst. Secur. 8(1): 2 (2005) - [c62]Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam:
Selective View Materialization in a Spatial Data Warehouse. DaWaK 2005: 157-167 - [c61]Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. DBSec 2005: 252-266 - [c60]Vandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin:
DM-AMS: employing data mining techniques for alert management. DG.O 2005: 103-111 - [c59]Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun, Patrizia Fariselli, Julia Culver-Hopper, Olana Bojic, Rick T. Stewart, Jim Fruscione, Nick Mannochio:
Technology transfer of inter-agency government services and their transnational feasibility studies. DG.O 2005: 225-226 - [c58]Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal:
Agency interoperation for effective data mining in border control and homeland security applications. DG.O 2005: 285-286 - [c57]Vijayalakshmi Atluri, Qi Guo:
Unified Index for Mobile Object Data and Authorizations. ESORICS 2005: 80-97 - [c56]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. ICDM 2005: 661-664 - [c55]Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala:
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ICISS 2005: 134-147 - [c54]Dihua Guo, Vijayalakshmi Atluri, Nabil R. Adam:
Texture-Based Remote-Sensing Image Segmentation. ICME 2005: 1472-1475 - [c53]Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri:
Adapting spatial constraints of composite multimedia objects to achieve universal access. IPCCC 2005: 519-525 - [c52]Vandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam:
Collusion Set Detection Through Outlier Discovery. ISI 2005: 1-13 - [c51]Mahmoud Youssef, Vijayalakshmi Atluri, Nabil R. Adam:
Preserving mobile customer privacy: an access control system for moving objects and customer profiles. Mobile Data Management 2005: 67-76 - [c50]Ahmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri:
Color Time Petri Net for Interactive Adaptive Multimedia Objects. MMM 2005: 147-157 - [c49]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. SAC 2005: 493-497 - [c48]Vijayalakshmi Atluri, Janice Warner:
Supporting conditional delegation in secure workflow management systems. SACMAT 2005: 49-58 - [c47]Dong-Ho Kim, Il Im, Vijayalakshmi Atluri:
A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. CEC 2005: 84-91 - [e15]Vijay Atluri, Catherine Meadows, Ari Juels:
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005. ACM 2005, ISBN 1-59593-226-7 [contents] - [e14]Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell:
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-231-3 [contents] - [e13]Vijay Atluri, Pierangela Samarati, Atsuhiro Goto:
Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-232-1 [contents] - [e12]Vijay Atluri, Peng Ning, Wenliang Du:
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-227-5 [contents] - [e11]Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-233-X [contents] - [e10]Vijay Atluri, Angelos D. Keromytis:
Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005. ACM Press 2005, ISBN 1-59593-229-1 [contents] - [e9]Vijay Atluri, Sabrina De Capitani di Vimercati, Roger Dingledine:
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005. ACM 2005, ISBN 1-59593-228-3 [contents] - 2004
- [j23]Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni:
Chinese wall security for decentralized workflow management systems. J. Comput. Secur. 12(6): 799-840 (2004) - [j22]Vijayalakshmi Atluri, Indrakshi Ray:
Editors' message for the special issue on security. Int. J. Digit. Libr. 4(3): 137-138 (2004) - [j21]Vijayalakshmi Atluri, Soon Ae Chun:
An Authorization Model for Geospatial Data. IEEE Trans. Dependable Secur. Comput. 1(4): 238-254 (2004) - [c46]Vijayalakshmi Atluri, Qi Guo:
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. DBSec 2004: 31-47 - [c45]Nabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun:
Human-Centered Systems for Business Services. DG.O 2004 - [c44]Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja:
Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications. DG.O 2004 - [c43]Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam:
Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations. DG.O 2004 - [c42]Li Qin, Vijayalakshmi Atluri:
Ontology-Guided Change Detection to the Semantic Web Data. ER 2004: 624-638 - [c41]Vijayalakshmi Atluri, Janice Warner:
Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. ICDCIT 2004: 369-378 - [c40]Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam:
Policy-Based Web Service Composition. RIDE 2004: 85-92 - [c39]Nabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. SAC 2004: 576-583 - [c38]Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner:
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions. IICIS 2004: 319-333 - [c37]Dong-Ho Kim, Il Im, Vijayalakshmi Atluri, Michael Bieber, Nabil R. Adam, Yelena Yesha:
A clickstream-based collaborative filtering personalization model: towards a better performance. WIDM 2004: 88-95 - [e8]Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner:
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004. ACM 2004, ISBN 1-58113-971-3 [contents] - [e7]Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick D. McDaniel:
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004. ACM 2004, ISBN 1-58113-961-6 [contents] - [e6]Vijay Atluri:
Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004. ACM 2004, ISBN 1-58113-973-X [contents] - [e5]Vijay Atluri, Paul F. Syverson, Sabrina De Capitani di Vimercati:
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004. ACM 2004, ISBN 1-58113-968-3 [contents] - 2003
- [j20]Vijay Atluri, Anupam Joshi, Yelena Yesha:
Guest editorial. VLDB J. 12(4): 285 (2003) - [c36]Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni:
Supporting Delegation in Secure Workflow Management Systems. DBSec 2003: 190-202 - [c35]Vijayalakshmi Atluri, Soon Ae Chun:
Handling Dynamic Changes in Decentralized Workflow Execution Environments. DEXA 2003: 813-825 - [c34]Soon Ae Chun, Vijayalakshmi Atluri:
Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery. DG.O 2003 - [c33]Aabhas V. Paliwal, Nabil R. Adam, Vijayalakshmi Atluri:
Electronic Negotiation of Government Contracts through Transducers. DG.O 2003 - [c32]Li Qin, Vijayalakshmi Atluri:
An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories. EC-Web 2003: 227-236 - [c31]Vijayalakshmi Atluri, Nabil R. Adam, Ahmed Gomaa, Igg Adiwijaya:
Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints. SAC 2003: 927-934 - [c30]Li Qin, Vijayalakshmi Atluri:
Concept-level access control for the Semantic Web. XML Security 2003: 94-103 - [e4]Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger:
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003. ACM 2003, ISBN 1-58113-738-9 [contents] - 2002
- [j19]Vijayalakshmi Atluri, Ravi Mukkamala:
Employing an extended transaction model in multilevel secure transaction processing. Informatica (Slovenia) 26(2) (2002) - [j18]Vijayalakshmi Atluri, Avigdor Gal:
An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur. 5(1): 62-94 (2002) - [j17]Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari:
A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14(2): 296-315 (2002) - [j16]Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo:
An authorization system for digital libraries. VLDB J. 11(1): 58-67 (2002) - [c29]Vijayalakshmi Atluri, Pietro Mazzoleni:
Uniform Indexing for Geospatial Data and Authorizations. DBSec 2002: 207-218 - [c28]Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam:
Domain Knowledge-Based Automatic Workflow Generation. DEXA 2002: 81-92 - [c27]Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam:
Dynamic Composition of Workflows for Customized eGovernment Service Delivery. DG.O 2002 - [c26]Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam:
OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. DG.O 2002 - [c25]Avigdor Gal, Vijayalakshmi Atluri, Gang Xu:
An Authorization System for Temporal Data. ICDE 2002: 339-340 - [p1]Vijayalakshmi Atluri, Soon Ae Chun, Richard D. Holowczak, Nabil R. Adam:
Automating the Delivery of Governmental Business Services Through Workflow Technology. Advances in Digital Government 2002: 69-84 - [e3]Vijayalakshmi Atluri:
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002. ACM 2002, ISBN 1-58113-612-9 [contents] - 2001
- [j15]Vijay Atluri:
Security for Workflow Systems. Inf. Secur. Tech. Rep. 6(2): 59-68 (2001) - [j14]Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Security Transaction Processing. J. Comput. Secur. 9(3): 165-195 (2001) - [j13]Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya, Sujata Banerjee, Richard D. Holowczak:
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects. IEEE Trans. Knowl. Data Eng. 13(4): 705-716 (2001) - [c24]Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni:
A Chinese wall security model for decentralized workflow systems. CCS 2001: 48-57 - [c23]Vijayalakshmi Atluri, Ravi Mukkamala:
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. DBSec 2001: 255-268 - [c22]Chiara Ghirardini, Soon Ae Chun, Vijayalakshmi Atluri, Ibrahim Kamel, Nabil R. Adam:
A Study on the Indexing of Satellite Images at NASA Regional Application Center. DEXA Workshop 2001: 859-864 - [c21]Richard D. Holowczak, Soon Ae Chun, Francisco J. Artigas, Vijayalakshmi Atluri:
Customized Geospatial Workflows for E-Government Services. ACM-GIS 2001: 64-69 - [c20]Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri:
Modeling and Evaluation of Distributed Workflow Algorithms. ISAS-SCI (1) 2001: 183-188 - 2000
- [j12]Nabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya:
SI in Digital Libraries. Commun. ACM 43(6): 64-72 (2000) - [j11]Vijayalakshmi Atluri, Pierangela Samarati:
Security of Data and Transaction Processing - Guest Editor's Introduction. Distributed Parallel Databases 8(1): 5-6 (2000) - [j10]Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
A Semantic-Based Execution Model for Multilevel Secure Workflows. J. Comput. Secur. 8(1): 3-41 (2000) - [j9]Vijayalakshmi Atluri, Wei-kuang Huang:
A Petri Net Based Safety Analysis of Workflow Authorization Models. J. Comput. Secur. 8(2/3): 209-240 (2000) - [c19]Avigdor Gal, Vijayalakshmi Atluri:
An authorization model for temporal data. CCS 2000: 144-153 - [c18]Soon Ae Chun, Vijayalakshmi Atluri:
Protecting Privacy from Continuous High-resolution Satellite Surveillance. DBSec 2000: 233-244 - [c17]Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel. DBSec 2000: 367-371 - [c16]Vijayalakshmi Atluri, Ravi Mukkamala:
Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. MASCOTS 2000: 248-255 - [e2]Vijayalakshmi Atluri, John Hale:
Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA. IFIP Conference Proceedings 171, Kluwer 2000, ISBN 0-7923-7848-2 [contents] - [e1]Klaus Rebensburg, Charles E. Youman, Vijay Atluri:
Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000. ACM 2000, ISBN 1-58113-259-X [contents]
1990 – 1999
- 1999
- [j8]Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104 (1999) - [c15]Wei-kuang Huang, Vijayalakshmi Atluri:
SecureFlow: A Secure Web-Enabled Workflow Management System. ACM Workshop on Role-Based Access Control 1999: 83-94 - 1998
- [j7]Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang:
Modeling and Analysis of Workflows Using Petri Nets. J. Intell. Inf. Syst. 10(2): 131-158 (1998) - [c14]Wei-kuang Huang, Vijayalakshmi Atluri:
Analysing the Safety of Workflow Authorization Models. DBSec 1998: 43-57 - [c13]Vijayalakshmi Atluri, David L. Spooner:
Workshop Summary. DBSec 1998: 287-293 - [c12]Nabil R. Adam, Igg Adiwijaya, Vijay Atluri, Yelena Yesha:
EDI Through A Distributed Information Systems Approach. HICSS (7) 1998: 354-365 - [c11]Vijayalakshmi Atluri:
Modification of Integrity Constraints Through Knowledge Discovery. IICIS 1998: 191-209 - 1997
- [j6]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
A theoretical formulation for degrees of isolation in databases. Inf. Softw. Technol. 39(1): 47-53 (1997) - [j5]Vijayalakshmi Atluri, Wei-kuang Huang:
Enforcing Mandatory and Discretionary Security in Workflow Management Systems. J. Comput. Secur. 5(4): 303-340 (1997) - [j4]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997) - [c10]Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino:
An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165 - [c9]Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri:
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ACM Workshop on Role-Based Access Control 1997: 1-12 - 1996
- [j3]Vijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino:
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996) - [c8]Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala:
Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 - [c7]Vijayalakshmi Atluri, Wei-kuang Huang:
An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. DBSec 1996: 240-258 - [c6]Vijayalakshmi Atluri, Wei-kuang Huang:
An Authorization Model for Workflows. ESORICS 1996: 44-64 - 1995
- [j2]Paul Ammann, Vijayalakshmi Atluri, Sushil Jajodia:
The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995) - [c5]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247 - 1994
- [c4]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274 - 1993
- [j1]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. J. Comput. Secur. 2(4): 311-352 (1993) - [c3]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158 - [c2]Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia:
Achieving stricter correctness requirements in multilevel secure databases. S&P 1993: 135-147 - 1992
- [c1]Sushil Jajodia, Vijayalakshmi Atluri:
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases. S&P 1992: 216-224
Coauthor Index
aka: Vandana P. Janeja
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-13 23:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint