Sushil Jajodia
Researcher
Sushil Jajodia's AcademicInfluence.com Rankings
Download Badge
Computer Science Communications
Why Is Sushil Jajodia Influential?
(Suggest an Edit or Addition)According to Wikipedia, Sushil Jajodia is an American computer scientist known for his work on cyber security and privacy, databases, and distributed systems. Career Sushil Jajodia is University Professor, BDM International Professor, and the founding director of Center for Secure Information Systems in the Volgenau School of Engineering at the George Mason University, Fairfax, Virginia. He is also the director of the NSF I/UCRC Center for Cybersecurity Analytics and Automation . He joined Mason after serving as the director of the Database and Expert Systems Program within the Division of Information, Robotics, and Intelligent Systems at the National Science Foundation. Before that he was the head of the Database and Distributed Systems Section in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Professor of Computer Science and Director of Graduate Studies at the University of Missouri, Columbia. He has also been a visiting professor at the University of Milan, Italy; Sapienza University of Rome, Italy; Isaac Newton Institute for Mathematical Sciences, Cambridge University, England; King's College, London, England; Paris Dauphine University, France; and Imperial College, London, England. He received his PhD from the University of Oregon, Eugene.
Sushil Jajodia's Published Works
Published Works
- Exploring steganography: Seeing the unseen (1998) (1770)
- LEAP: efficient security mechanisms for large-scale distributed sensor networks (2003) (1484)
- Temporal Databases: Theory, Design, and Implementation (1993) (787)
- LEAP+: Efficient security mechanisms for large-scale distributed sensor networks (2006) (760)
- Flexible support for multiple access control policies (2001) (736)
- An interleaved hop-by-hop authentication scheme for filtering of injected false data in sensor networks (2004) (706)
- Detecting Automation of Twitter Accounts: Are You a Human, Bot, or Cyborg? (2012) (579)
- Who is tweeting on Twitter: human, bot, or cyborg? (2010) (561)
- A logical language for expressing authorizations (1997) (517)
- Over-encryption: Management of Access Control Evolution on Outsourced Data (2007) (488)
- Steganalysis of Images Created Using Current Steganography Software (1998) (474)
- Topological analysis of network attack vulnerability (2006) (424)
- Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats (2011) (420)
- An adaptive data replication algorithm (1997) (417)
- A consensus glossary of temporal database concepts (1994) (416)
- Balancing confidentiality and efficiency in untrusted relational DBMSs (2003) (410)
- Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach (2003) (396)
- Information Hiding: Steganography and Watermarking-Attacks and Countermeasures (2000) (395)
- An Attack Graph-Based Probabilistic Security Metric (2008) (385)
- Protecting Privacy Against Location-Based Personal Identification (2005) (379)
- Detecting Novel Network Intrusions Using Bayes Estimators (2001) (376)
- A unified framework for enforcing multiple access control policies (1997) (330)
- The Consensus Glossary of Temporal Database Concepts - February 1998 Version (1997) (325)
- ADAM: a testbed for exploring the use of data mining in intrusion detection (2001) (318)
- The inference problem: a survey (2002) (314)
- A logic-based framework for attribute based access control (2004) (301)
- Kronos: a scalable group re-keying approach for secure multicast (2000) (300)
- Time Granularities in Databases, Data Mining, and Temporal Reasoning (2000) (291)
- Efficient minimum-cost network hardening via exploit dependency graphs (2003) (285)
- Applications of Data Mining in Computer Security (2002) (274)
- Managing attack graph complexity through visual hierarchical aggregation (2004) (272)
- Tracking anonymous peer-to-peer VoIP calls on the internet (2005) (271)
- Discovering calendar-based temporal association rules (2001) (271)
- Measuring network security using dynamic bayesian network (2008) (268)
- Information Security: An Integrated Collection of Essays (1994) (260)
- Dynamic voting algorithms for maintaining the consistency of a replicated database (1990) (256)
- Minimum-cost network hardening using attack graphs (2006) (250)
- Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems (2007) (248)
- Information Hiding: Steganography and Watermarking-Attacks and Countermeasures: Steganography and Watermarking - Attacks and Countermeasures (2000) (231)
- Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts (2006) (227)
- Combining fragmentation and encryption to protect privacy in data storage (2010) (227)
- Temporal Databases: Research and Practice (1998) (214)
- Secure Data Aggregation in Wireless Sensor Networks (2012) (213)
- Data Synthesis based on Generative Adversarial Networks (2018) (212)
- Secure Data Management in Decentralized Systems (2014) (192)
- Toward a multilevel secure relational data model (1991) (192)
- Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies (2010) (187)
- Fingerprinting relational databases: schemes and specialties (2005) (182)
- A weakest-adversary security metric for network configuration security analysis (2006) (175)
- Practical broadcast authentication in sensor networks (2005) (172)
- ADAM: Detecting Intrusions by Data Mining (2001) (171)
- Secure Databases: Constraints, Inference Channels, and Monitoring Disclosures (2000) (168)
- Measuring the Overall Security of Network Configurations Using Attack Graphs (2007) (167)
- Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences (1998) (167)
- Correlating intrusion events and building attack scenarios through attack graph distances (2004) (166)
- Redistributing Secret Shares to New Access Structures and Its Applications (1997) (165)
- Encryption policies for regulating access to outsourced data (2010) (164)
- Efficient Distributed Detection of Node Replication Attacks in Sensor Networks (2007) (160)
- Detecting VoIP Floods Using the Hellinger Distance (2008) (158)
- Recovery from Malicious Transactions (2002) (157)
- Advanced Transaction Models and Architectures (2012) (156)
- Proceedings of the 1993 ACM SIGMOD international conference on Management of data (1993) (152)
- A data outsourcing architecture combining cryptography and access control (2007) (151)
- k-Zero Day Safety: A Network Security Metric for Measuring the Risk of Unknown Vulnerabilities (2014) (151)
- Dynamic voting (1987) (151)
- A flexible authorization mechanism for relational data management systems (1999) (150)
- Modeling and assessing inference exposure in encrypted databases (2005) (150)
- LHAP: a lightweight hop-by-hop authentication protocol for ad-hoc networks (2003) (148)
- Model-Based Covert Timing Channels: Automated Modeling and Evasion (2008) (146)
- Logical design for temporal databases with multiple granularities (1997) (140)
- Toward measuring network security using attack graphs (2007) (140)
- Measuring Security Risk of Networks Using Attack Graphs (2010) (138)
- Cyber SA: Situational Awareness for Cyber Defense (2010) (138)
- Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks (2010) (135)
- GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks (2004) (135)
- Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact (2014) (135)
- Integrating an object-oriented data model with multilevel security (1990) (132)
- Dealing with Granularity of Time in Temporal Databases (1991) (130)
- Cyber Situational Awareness - Issues and Research (2009) (130)
- VoIP Intrusion Detection Through Interacting Protocol State Machines (2006) (129)
- Temporal Reasoning in Workflow Systems (2002) (129)
- Understanding complex network attack graphs through clustered adjacency matrices (2005) (129)
- A fragile watermarking scheme for detecting malicious modifications of database relations (2006) (127)
- An Extended Authorization Model for Relational Databases (1997) (127)
- Supporting multiple access control policies in database systems (1996) (127)
- Cauldron mission-centric cyber situational awareness with defense in depth (2011) (125)
- Conceptual Modeling — ER 2001 (2001) (125)
- A propositional policy algebra for access control (2003) (123)
- Provisions and Obligations in Policy Management and Security Applications (2002) (120)
- Mining Temporal Relationships with Multiple Granularities in Time Sequences (1998) (119)
- Checking for k-Anonymity Violation by Views (2005) (117)
- Temporal Database Bibliography Update (1997) (114)
- Polyinstantiation integrity in multilevel relations (1990) (111)
- Abstraction-based intrusion detection in distributed environments (2001) (111)
- Multiple coordinated views for network attack graphs (2005) (108)
- Keep a Few: Outsourcing Data While Maintaining Confidentiality (2009) (108)
- Time-efficient and cost-effective network hardening using attack graphs (2012) (107)
- Fragmentation and Encryption to Enforce Privacy in Data Storage (2007) (105)
- k-Zero Day Safety: Measuring the Security Risk of Networks against Unknown Attacks (2010) (104)
- Obligation monitoring in policy management (2002) (104)
- Privacy-Aware Proximity Based Services (2009) (103)
- Distributed algorithms for dynamic replication of data (1992) (103)
- Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs (2008) (102)
- Anonymity in Location-Based Services: Towards a General Framework (2007) (100)
- Profiling Online Social Behaviors for Compromised Account Detection (2016) (98)
- Surviving information warfare attacks on databases (1997) (97)
- Key management for multi-user encrypted databases (2005) (97)
- Rewriting Histories: Recovering from Malicious Transactions (2004) (94)
- Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks (2016) (93)
- Chaining watermarks for detecting malicious modifications to streaming data (2007) (90)
- Testing complex temporal relationships involving multiple granularities and its application to data mining (extended abstract) (1996) (89)
- A general framework for time granularity and its application to temporal reasoning (1998) (88)
- Securing OLAP data cubes against privacy breaches (2004) (87)
- Temporal modules: an approach toward federated temporal databases (1993) (87)
- Policies, Models, and Languages for Access Control (2005) (85)
- An Algebraic Representation of Calendars (2002) (85)
- Information Flow Control in Object-Oriented Systems (1997) (85)
- An Authorization Model for a Distributed Hypertext System (1996) (84)
- Topological Vulnerability Analysis (2010) (82)
- Secure Dynamic Fragment and Replica Allocation in Large-Scale Distributed File Systems (2003) (81)
- Intrusion Detection Techniques (2004) (81)
- Moving Target Defense II (2013) (80)
- Attack-resilient hierarchical data aggregation in sensor networks (2006) (79)
- Access control policies and languages (2007) (79)
- Advances in Topological Vulnerability Analysis (2009) (79)
- Interleaved hop-by-hop authentication against false data injection attacks in sensor networks (2007) (79)
- Moving Target Defense II: Application of Game Theory and Adversarial Modeling (2012) (78)
- Providing flexibility in information flow control for object oriented systems (1997) (78)
- Information disclosure under realistic assumptions: privacy versus optimality (2007) (78)
- Abstraction-based misuse detection: high-level specifications and adaptable strategies (1998) (77)
- Providing secrecy in key management protocols for large wireless sensors networks (2003) (76)
- Efficient and secure keys management for wireless mobile communications (2002) (73)
- Access control for smarter healthcare using policy spaces (2010) (72)
- LEAP - efficient security mechanisms for large-scale distributed sensor networks (2003) (72)
- Provisions and Obligations in Policy Rule Management (2003) (71)
- Temporal Structure (2009) (71)
- Securing MAODV: attacks and countermeasures (2005) (71)
- Handbook of Database Security - Applications and Trends (2007) (70)
- Fast Detection of Denial-of-Service Attacks on IP Telephony (2006) (70)
- Revocations - A classification (2001) (70)
- Topological analysis of network attack vulnerability (2007) (69)
- Constructing a virtual primary key for fingerprinting relational data (2003) (68)
- Database Security: Research and Practice (1995) (67)
- Transaction processing in multilevel-secure databases using replicated architecture (1990) (65)
- Multimedia database systems: issues and research directions (1996) (65)
- Topological Vulnerability Analysis: A Powerful New Approach For Network Attack Prevention, Detection, and Response (2008) (64)
- TrustDump: Reliable Memory Acquisition on Smartphones (2014) (63)
- Inference Problems in Multilevel Secure Database Management Systems (2006) (63)
- Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics (2012) (62)
- Metrics suite for network attack graph analytics (2014) (62)
- Blog or block: Detecting blog bots through behavioral biometrics (2013) (62)
- Privacy-preserving robust data aggregation in wireless sensor networks (2009) (60)
- Fragmentation Design for Efficient Query Execution over Sensitive Distributed Databases (2009) (60)
- Recovery of Watermarks from Distorted Images (1999) (60)
- Authorizations in relational database management systems (1993) (59)
- NSDMiner: Automated discovery of Network Service Dependencies (2012) (58)
- Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases (1992) (58)
- Encryption-Based Policy Enforcement for Cloud Storage (2010) (57)
- Solving multi-granularity temporal constraint networks (2002) (57)
- Integrating Temporal Data in a Heterogeneous Environment (1993) (56)
- Toward information sharing: benefit and risk access control (BARAC) (2006) (56)
- Anonymity and Historical-Anonymity in Location-Based Services (2009) (56)
- Fragmentation in Presence of Data Dependencies (2014) (56)
- Multi-phase damage confinement in database systems for intrusion tolerance (2001) (55)
- Preserving confidentiality of security policies in data outsourcing (2008) (54)
- The Problem of Equivalence for Entity-Relationship Diagrams (1983) (54)
- Scalable Analysis of Attack Scenarios (2011) (54)
- Advanced Cyber Attack Modeling Analysis and Visualization (2010) (52)
- A moving target defense approach to mitigate DDoS attacks against proxy-based architectures (2016) (52)
- Intrusion Confinement by Isolation in Information Systems (1999) (51)
- Enhancements to the Voting Algorithm (1987) (50)
- Trusted recovery (1999) (50)
- Polyinstantation for Cover Stories (1992) (50)
- Modeling Network Diversity for Evaluating the Robustness of Networks against Zero-Day Attacks (2014) (50)
- Selective Data Encryption in Outsourced Dynamic Environments (2007) (49)
- Model-Driven Development for secure information systems (2009) (49)
- Distributed timestamp generation in planar lattice networks (1993) (49)
- A comparative performance analysis of reliable group rekey transport protocols for secure multicast (2002) (48)
- Cyber Warfare (2015) (48)
- Implementation of a Storage Mechanism for Untrusted DBMSs (2003) (47)
- Bootstrapping a data mining intrusion detection system (2003) (47)
- Provisional Authorizations (2001) (46)
- Metadata Management in Outsourced Encrypted Databases (2005) (46)
- Access Control Policies and Languages in Open Environments (2007) (45)
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts (2005) (45)
- CARDS: A Distributed System for Detecting Coordinated Attacks (2000) (45)
- Pareto-Optimal Adversarial Defense of Enterprise Systems (2015) (44)
- Managing replicated files in partitioned distributed database systems (1987) (44)
- A moving target defense mechanism for MANETs based on identity virtualization (2013) (44)
- LHAP: A lightweight network access control protocol for ad hoc networks (2006) (44)
- Optimal Scheduling of Cybersecurity Analysts for Minimizing Risk (2017) (44)
- Using Checksums to Detect Data Corruption (2000) (43)
- Applying formal methods to semantic-based decomposition of transactions (1997) (43)
- Orange Locking: Channel-Free Database Concurrency Control Via Locking (1993) (43)
- Policy algebras for access control the predicate case (2002) (42)
- Dynamic Scheduling of Cybersecurity Analysts for Minimizing Risk Using Reinforcement Learning (2016) (42)
- A Unified Framework for Measuring a Network's Mean Time-to-Compromise (2013) (42)
- Cardinality-based inference control in data cubes (2004) (42)
- Preserving Anonymity in Location-based Services When Requests from the Same Issuer May Be Correlated (2007) (41)
- Multilevel Secure Transaction Processing (1999) (41)
- Temporal Semantic Assumptions and Their Use in Databases (1998) (41)
- High assurance discretionary access control for object bases (1993) (41)
- On the anonymity and traceability of peer-to-peer VoIP calls (2006) (41)
- Database security and privacy (1996) (40)
- Preserving Anonymity of Recurrent Location-Based Queries (2009) (40)
- A general framework and reasoning models for time granularity (1996) (40)
- Surviving Information Warfare Attacks (1999) (40)
- Efficiently tracking application interactions using lightweight virtualization (2008) (39)
- Building trust in peer-to-peer systems: a review (2006) (39)
- ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS (2009) (39)
- A Probabilistic Logic of Cyber Deception (2017) (39)
- An algorithm for dynamic data distribution (1992) (38)
- VULCON: A System for Vulnerability Prioritization, Mitigation, and Management (2018) (38)
- Integrating Data Mining Techniques with Intrusion Detection Methods (1999) (38)
- Enhancing Profiles for Anomaly Detection Using Time Granularities (2002) (37)
- Enforcing dynamic write privileges in data outsourcing (2013) (37)
- Secure mediated databases (1996) (37)
- A Moving Target Defense Approach to Disrupting Stealthy Botnets (2016) (37)
- Integrity for join queries in the cloud (2013) (37)
- Auditing Interval-Based Inference (2002) (36)
- Encryption and Fragmentation for Data Confidentiality in the Cloud (2013) (36)
- A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases (1991) (36)
- Integrity and Internal Control in Information Systems VI (2013) (36)
- A robust watermarking system based on SVD compression (2006) (35)
- A Fake Online Repository Generation Engine for Cyber Deception (2019) (35)
- Fragments and loose associations (2010) (35)
- Selective data outsourcing for enforcing privacy (2011) (34)
- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches (2003) (34)
- Integrating static and dynamic voting protocols to enhance file availability (1988) (34)
- Discovering Temporal Patterns in Multiple Granularities (2000) (34)
- An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing (2007) (34)
- Preserving privacy against external and internal threats in WSN data aggregation (2013) (34)
- Privacy in Location-Based Applications: Research Issues and Emerging Trends (2009) (34)
- Performance optimizations for group key management schemes (2003) (34)
- Integrity Versus Security in Multi-Level Secure Databases (1988) (33)
- Private data indexes for selective access to outsourced data (2011) (33)
- Interactive Analysis of Attack Graphs Using Relational Queries (2006) (32)
- Access Control in Object-Oriented Database Systems - Some Approaches and Issues (1993) (32)
- Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation (2014) (32)
- Alternative methods for the reconstruction of trees from their traversals (1987) (32)
- Authorization enforcement in distributed query evaluation (2011) (32)
- A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability (1989) (31)
- Policy algebras for access control: the propositional case (2001) (31)
- Threat Modeling for Cloud Data Center Infrastructures (2016) (31)
- Information Hiding: Steganography and Steganalysis (2005) (31)
- A novel decomposition of multilevel relations into single-level relations (1991) (30)
- Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients (2009) (30)
- Integrating trust management and access control in data-intensive Web applications (2012) (30)
- Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings (2005) (30)
- Online detection of network traffic anomalies using behavioral distance (2009) (30)
- A Privacy-Enhanced Microaggregation Method (2002) (29)
- Data warehousing and data mining techniques for intrusion detection systems (2006) (28)
- Semantic assumptions and query evaluation in temporal databases (1995) (28)
- Multilevel Secure Transaction Processing: Status and Prospects (1996) (28)
- AHEAD: A New Architecture for Active Defense (2016) (28)
- Solutions to the Polyinstantiation Problem (1994) (28)
- Maintaining Replicated Authorizations in Distributed Database Systems (1996) (27)
- A two snapshot algorithm for concurrency control in multi-level secure databases (1992) (27)
- Securely computing an approximate median in wireless sensor networks (2008) (27)
- Advanced Transaction Processing in Multilevel Secure File Stores (1998) (27)
- Data and Applications Security and Privacy XXIV (2010) (27)
- Controlled Information Sharing in Collaborative Distributed Query Processing (2008) (27)
- Looking into the seeds of time: Discovering temporal patterns in large transaction sets (2006) (27)
- A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting (1989) (27)
- Manipulating the attacker's view of a system's attack surface (2014) (27)
- Scalable Group Key Management for Secure Multicast: A Taxonomy and New Directions (2010) (26)
- On-The-Fly Reading of Entire Databases (1995) (26)
- Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS (2019) (26)
- Securing Topology Maintenance Protocols for Sensor Networks (2005) (26)
- Computer Security – ESORICS 2013 (2013) (26)
- A Graphical Model to Assess the Impact of Multi-Step Attacks (2018) (26)
- Cardinality-Based Inference Control in Sum-Only Data Cubes (2002) (26)
- On the Accurate Identification of Network Service Dependencies in Distributed Systems (2012) (26)
- Measuring the Overall Network Security by Combining CVSS Scores Based on Attack Graphs and Bayesian Networks (2017) (26)
- Recognizing Unexplained Behavior in Network Traffic (2014) (26)
- Regulating Exceptions in Healthcare Using Policy Spaces (2008) (25)
- A methodology to measure and monitor level of operational effectiveness of a CSOC (2018) (25)
- Protecting Enterprise Networks through Attack Surface Expansion (2014) (25)
- A new polyinstantiation integrity constraint for multilevel relations (1990) (25)
- Avoiding loss of fairness owing to process crashes in fair data exchange protocols (2000) (24)
- Cyber Deception (2016) (24)
- FakeTables: Using GANs to Generate Functional Dependency Preserving Tables with Bounded Real Data (2019) (24)
- Privacy Preservation over Untrusted Mobile Networks (2009) (24)
- Assessing query privileges via safe and efficient permission composition (2008) (24)
- Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation (2009) (24)
- Detecting Stealthy Botnets in a Resource-Constrained Environment using Reinforcement Learning (2017) (24)
- Enhancing the Controlled Disclosure of Sensitive Information (1996) (23)
- An efficient approach to assessing the risk of zero-day vulnerabilities (2013) (23)
- SHARE (2018) (23)
- Honest Databases That Can Keep Secrets (1991) (23)
- Attack Graphs for Sensor Placement , Alert Prioritization , and Attack Response (2008) (23)
- Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions (1997) (23)
- Deceiving Attackers by Creating a Virtual Attack Surface (2016) (23)
- Defending from Stealthy Botnets Using Moving Target Defenses (2018) (23)
- A single-level scheduler for the replicated architecture for multilevel-secure databases (1991) (23)
- Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information (1994) (22)
- A Scalable and Reliable Key Distribution Protocol for Multicast Group Rekeying (2002) (21)
- Update semantics for multilevel relations (1990) (21)
- The ephemeral legion (2011) (21)
- On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques (2008) (21)
- Modeling Multilevel Entities Using Single Level Objects (1993) (21)
- A model of atomicity for multilevel transactions (1993) (21)
- Secure Cloud Computing (2014) (21)
- Towards a Multilevel Secure Relational Data Model (1991) (20)
- Enforcing Subscription-Based Authorization Policies in Cloud Scenarios (2012) (20)
- Unauthorized inferences in semistructured databases (2006) (20)
- Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture (1993) (20)
- A deception based approach for defeating OS and service fingerprinting (2015) (20)
- Advanced Vulnerability Analysis and Intrusion Detection through Predictive Attack Graphs (2009) (20)
- Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast (2003) (20)
- Network Hardening: An Automated Approach to Improving Network Security (2014) (20)
- Design and implementation of a decentralized prototype system for detecting distributed attacks (2002) (20)
- Application-level isolation to cope with malicious database users (1998) (20)
- Mining Malicious Corruption of Data with Hidden Markov Models (2002) (19)
- Privacy of data outsourced to a cloud for selected readers through client-side encryption (2011) (19)
- Modeling requests among cooperating intrusion detection systems (2000) (19)
- Correctness Criteria for Multilevel Secure Transactions (1996) (19)
- Extending Loose Associations to Multiple Fragments (2013) (19)
- An authorization model for a public key management service (2001) (18)
- Performance Optimizations for Group Key Management Schemes for Secure Multicast (2002) (18)
- Security and Protection in Information Processing Systems (2004) (18)
- Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC (2019) (18)
- A Suite of Metrics for Network Attack Graph Analytics (2017) (18)
- Providing Mobile Users' Anonymity in Hybrid Networks (2010) (18)
- Preventing Interval-Based Inference by Random Data Perturbation (2002) (18)
- Integrity Mechanisms in Database Management Systems (2006) (18)
- Providing Users’ Anonymity in Mobile Hybrid Networks (2013) (17)
- Implementing interactive analysis of attack graphs using relational databases (2008) (17)
- Loose associations to increase utility in data publishing (2015) (17)
- A theoretical formulation for degrees of isolation in databases (1997) (17)
- Memory Forensic Challenges Under Misused Architectural Features (2018) (17)
- Polyinstantiation Integrity in Multilevel Relations Revisited (1990) (17)
- Automatic security analysis using security metrics (2011) (17)
- Recovering Watermarks from Images (1999) (17)
- Using Two-Phase Commit for Crash Recovery in Federated Multilevel Secure Database Management Systems (1993) (17)
- On information leakage by indexes over data fragments (2013) (16)
- Indistinguishability: The Other Aspect of Privacy (2006) (16)
- A Role for Digital Watermarking in Electronic Commerce (1999) (16)
- Diversifying Network Services Under Cost Constraints for Better Resilience Against Unknown Attacks (2016) (16)
- Referential Integrity In Multilevel Secure Databases (1993) (16)
- Efficient integrity checks for join queries in the cloud (2016) (15)
- Secure Selective Exclusion in Ad Hoc Wireless Network (2002) (15)
- Incorporating transaction semantics to reduce reprocessing overhead in replicated mobile data applications (1999) (15)
- An Architecture for Anomaly Detection (2002) (15)
- An advanced commit protocol for MLS distributed database systems (1996) (15)
- Trust management services in relational databases (2007) (15)
- Translation of entity-relationship diagrams into relational structures (1984) (15)
- Intrusion Detection in Distributed Systems: An Abstraction-Based Approach (2003) (15)
- Collecting garbage in multilevel secure object stores (1994) (15)
- Securing Networks Against Unpatchable and Unknown Vulnerabilities Using Heterogeneous Hardening Options (2017) (15)
- Avoiding loss of fairness owing to failures in fair data exchange systems (2001) (15)
- PatchDB: A Large-Scale Security Patch Dataset (2021) (14)
- Integrity for distributed queries (2014) (14)
- Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (1995) (14)
- Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception (2018) (14)
- Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks’ Resilience Against Zero-Day Attacks (2021) (14)
- Efficient security mechanisms for overlay multicast based content delivery (2007) (14)
- An efficient multiversion algorithm for secure servicing of transaction reads (1994) (14)
- Reliable mission deployment in vulnerable distributed systems (2013) (14)
- Cyber Deception: Building the Scientific Foundation (2016) (13)
- A Uniied Framework for Enforcing Multiple Access Control Policies (1997) (13)
- Concurrency control in multilevel-secure databases based on replicated architecture (1990) (13)
- The Role of Quasi-identifiers in k-Anonymity Revisited (2006) (13)
- Integrity principles and mechanisms in database management systems (1991) (13)
- SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine (2018) (13)
- Securing Topology Maintenance Protocols for Sensor Networks: Attacks and Countermeasures (2005) (13)
- Cyber Warfare: Building the Scientific Foundation (2015) (13)
- Database Security: Current Status and Key Issues (1990) (13)
- ASEP: A Secure and Flexible Commit Protocol for MLS Distributed Database Systems (2000) (13)
- Verification of data redundancy in cloud storage (2013) (13)
- Ensuring atomicity of multilevel transactions (1996) (13)
- Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions (2018) (13)
- An Algorithm for Dynamic Data Allocation in Distributed Systems (1995) (13)
- Support for Write Privileges on Outsourced Data (2012) (13)
- An Authorization Model for Multi-Provider Queries (2017) (13)
- Network Security Metrics (2017) (13)
- Secure Locking Protocols for Multilevel Database Management Systems (1996) (13)
- Information Security Management, Education and Privacy (2004) (13)
- Providing witness anonymity in peer-to-peer systems (2006) (12)
- Over-Encryption: Management of Access Control Evolution on Encrypted Data (2007) (12)
- Integrity and Internal Control in Information Systems (1997) (12)
- Theory and Models for Cyber Situation Awareness (2017) (12)
- Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols (1994) (12)
- Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases (1991) (12)
- k-Anonymity in Databases with Timestamped Data (2006) (12)
- Satisfiability of Quantitative Temporal Constraints with Multiple Granularities (1997) (12)
- SS7 over IP: signaling interworking vulnerabilities (2006) (12)
- Computer-Aided Human Centric Cyber Situation Awareness (2017) (12)
- Planar Lattice Security Structures for Multilevel Replicated Databases (1993) (12)
- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution (2005) (12)
- Disk storage isolation and verification in cloud (2012) (12)
- Preserving Privacy in On-Line Analytical Processing (OLAP) (2006) (12)
- Now You See Me: Hide and Seek in Physical Address Space (2015) (12)
- Globally Consistent Event Ordering in One-Directional Distributed Environments (1996) (12)
- Scalable Detection of Cyber Attacks (2011) (12)
- Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003 (2003) (12)
- Anonymity and Diversity in LBS: A Preliminary Investigation (2007) (12)
- Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility (2004) (11)
- On Fingerprinting Images for Recognition (1999) (11)
- LH*RE: A Scalable Distributed Data Structure with Recoverable Encryption (2010) (11)
- Optimizing the network diversity to improve the resilience of networks against unknown attacks (2019) (11)
- BIOMETRIC USER AUTHENTICATION FOR IT SECURITY From Fundamentals to Handwriting by Claus Vielhauer Universitdt (2006) (11)
- A non-timestamped authorization model for data management systems (1996) (11)
- A methodology for ensuring fair allocation of CSOC effort for alert investigation (2019) (11)
- Tracking Skype VoIP Calls Over The Internet (2010) (11)
- Scalable Group Rekeying for Secure Multicast: A Survey (2003) (11)
- Using attribute certificates with mobile policies in electronic commerce applications (2000) (11)
- Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance (2014) (11)
- A Query Facility for Common Intrusion Detection Framework (2000) (11)
- ICT Systems Security and Privacy Protection (2014) (10)
- Consistency and enforcement of access rules in cooperative data sharing environment (2014) (10)
- A probabilistic framework for jammer identification in MANETs (2014) (10)
- Going Beyond MAC and DAC Using Mobile Policies (2001) (10)
- Refining CVSS-Based Network Security Metrics by Examining the Base Scores (2017) (10)
- Free schedules for free agents in workflow systems (2000) (10)
- Rule-Based Topological Vulnerability Analysis (2005) (10)
- Security and Privacy Issues for the World Wide Web: Panel Discussion (1998) (10)
- Surjective stability of units and simple homotopy type (1980) (10)
- An Architecture for Supporting Interoperability among Temporal Databases (1997) (10)
- Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases (2004) (10)
- FlexFlow: A Flexible Flow Control Policy Specification Framework (2003) (10)
- An Integrated Framework for Cyber Situation Awareness (2017) (10)
- Discovering Temporal Relationships with Multiple Granularities in Time Sequences Technical Report: ISSE-TR-96-06 (1998) (10)
- Interview: Amit Sheth On Workflow Technology (1998) (10)
- A formal framework for single level decomposition of multilevel relations (1990) (10)
- Cyber Maneuver Against External Adversaries and Compromised Nodes (2013) (9)
- Combinatorial analysis of network security (2002) (9)
- Access rule consistency in cooperative data access environment (2012) (9)
- Secure median computation in wireless sensor networks (2009) (9)
- On the Representation of Relational Structures by Entity-Relationship Diagrams (1983) (9)
- Eliminating polyinstantiation securely (1992) (9)
- VULCON (2018) (9)
- Providing Witness Anonymity Under Peer-to-Peer Settings (2010) (9)
- Managing security and privacy of information (1996) (9)
- Self-healing wireless networks under insider jamming attacks (2014) (9)
- Optimizing Integrity Checks for Join Queries in the Cloud (2014) (9)
- Computer Security, Fault Tolerance, And Software Assurance (1999) (9)
- Achieving stricter correctness requirements in multilevel secure databases (1993) (9)
- Integrating Concurrency Control and Commit Algorithms in Distributed Multilevel Secure Databases (1993) (9)
- Implementing Semantic-Based Decomposition of Transactions (1997) (9)
- Referential Integrity in Multilevel Secure Database Management Systems (1992) (9)
- Chapter 5 TOPOLOGICAL ANALYSIS OF NETWORK ATTACK VULNERABILITY (2003) (9)
- Proc. of the third international conference on Entity-relationship approach to software engineering (1983) (9)
- Fake Document Generation for Cyber Deception by Manipulating Text Comprehensibility (2020) (9)
- Lossless outer joins with incomplete information (1990) (9)
- Capture the Bot: Using Adversarial Examples to Improve CAPTCHA Robustness to Bot Attacks (2020) (9)
- Enhancing Cohesion and Coherence of Fake Text to Improve Believability for Deceiving Cyber Attackers (2018) (9)
- Formation of Awareness (2014) (8)
- Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors (2018) (8)
- How Anonymous Is k-Anonymous? Look at Your Quasi-ID (2008) (8)
- Recognizing Multivalued Dependencies in Relation Schemas (1986) (8)
- Removing permissions in the flexible authorization framework (2003) (8)
- Subject Switching Algorithms for Access Control in Federated Databases (2001) (8)
- Logical Design of Audit Information in Relational Databases (2006) (8)
- Keeping intruders at large: A graph-theoretic approach to reducing the probability of successful network intrusions (2014) (8)
- Numerical SQL Value Expressions Over Encrypted Cloud Databases (2015) (8)
- Scalable Threshold Closure (1999) (8)
- Trusted Recovery and Defensive Information Warfare (2002) (8)
- MTPSec: customizable secure MTP3 tunnels in the SS7 network (2005) (8)
- A Multilevel Secure Object- Oriented Data Model (2006) (8)
- A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks (2008) (8)
- Information hiding: steganography, attacks, and countermeasures (2000) (7)
- Maintaining privacy on derived objects (2005) (7)
- Local Area Networks: Software and Related Issues (1987) (7)
- Audit Trail Organization in Relational Databases (1989) (7)
- Consistent Query Plan Generation in Secure Cooperative Data Access (2014) (7)
- PatchRNN: A Deep Learning-Based System for Security Patch Identification (2021) (7)
- Data replication gaining popularity (1999) (7)
- Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity (2000) (7)
- Minimum cost rule enforcement for cooperative database access (2016) (7)
- Intrusion Detection in Distributed Systems (2004) (7)
- Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure (2008) (7)
- A fault tolerance approach to survivability (1998) (7)
- Optimal Assignment of Sensors to Analysts in a Cybersecurity Operations Center (2019) (7)
- Modeling and Mitigating Security Threats in Network Functions Virtualization (NFV) (2020) (7)
- Towards Secure XML Federations (2002) (7)
- Securing Mission-Centric Operations in the Cloud (2014) (7)
- Surviving unpatchable vulnerabilities through heterogeneous network hardening options (2018) (7)
- Simulatable Binding: Beyond Simulatable Auditing (2008) (7)
- A framework for establishing, assessing, and managing trust in inter-organizational relationships (2006) (7)
- Rule Enforcement with Third Parties in Secure Cooperative Data Access (2013) (7)
- Incorporating Dynamic Constraints in the Flexible Authorization Framework (2004) (7)
- Flexible Commit Protocols for Advanced Transaction Processing (1997) (7)
- Vulnerability Selection for Remediation: An Empirical Analysis (2019) (6)
- Data Mining for Intrusion Detection (2005) (6)
- Limitations of Relational Data Base Access Controls (1993) (6)
- Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 (1992) (6)
- Redirection policies for mission-based information sharing (2006) (6)
- Quantitative survivability evaluation of three virtual machine-based server architectures (2013) (6)
- Recoverable Encryption through a Noised Secret over a Large Cloud (2013) (6)
- An audit model for object-oriented databases (1991) (6)
- L-Cover: Preserving Diversity by Anonymity (2009) (6)
- Recent Advances in Access Control Models (2001) (6)
- Effects of SeaView Decomposition of Multilevel Relations on Database Performance (1991) (6)
- A secure kernelized architecture for multilevel object-oriented databases (1991) (6)
- Integrity and internal control on information systems VI : IFIP TC11/WG11.5 Sixth Working Conference on Integrity and Internal Control in Information Systems (IICIS), 13-14 November 2003, Lausanne, Switzerland (2004) (6)
- Disrupting stealthy botnets through strategic placement of detectors (2015) (6)
- Flexible Transaction Dependencies in Database Systems (2000) (6)
- A Machine Learning Approach to Classify Security Patches into Vulnerability Types (2020) (6)
- Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases (1995) (6)
- Security Issues in Data Warehousing and Data Mining: Panel Discussion (1997) (6)
- Olap Means On-line Anti-privacy * (2003) (6)
- Efficient Proxy-Based Internet Media Distribution Control and Privacy Protection Infrastructure (2006) (5)
- An Application-Level Data Transparent Authentication Scheme without Communication Overhead (2010) (5)
- A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems (1993) (5)
- Mutual consistency in decentralized distributed systems (1987) (5)
- Adaptive Cyber Defenses for Botnet Detection and Mitigation (2019) (5)
- Preserving Privacy in On-line Analytical Processing Data Cubes (2006) (5)
- Secure Multicast for Mobile Commerce Applications: Issues and Challenges (2008) (5)
- Propagation of authorizations in distributed database systems (1994) (5)
- Dependable and Resilient Cloud Computing (2016) (5)
- Initial Comparison of Monotonic Logical Grid and Alternative Data Base Structures. (1986) (5)
- Entity-relationship diagrams which are in BCNF (1984) (5)
- Proceedings of the first ACM workshop on Information security governance (2009) (5)
- Transactional Business Processes (2005) (5)
- Consistent policy enforcement in distributed systems using mobile policies (2002) (5)
- Security in Federated Database Systems (2001) (5)
- Understanding the Manipulation on Recommender Systems through Web Injection (2020) (5)
- Scalable Distributed Virtual Data Structures (2014) (5)
- Generating Market Basket Data with Temporal Information (2001) (5)
- Attack Graph and Network Hardening (2014) (5)
- Creating Objects in the Flexible Authorization Framework (2006) (5)
- Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare (2020) (5)
- Application-level isolation using data inconsistency detection (1999) (5)
- A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC (2019) (5)
- Using temporal probabilistic logic for optimal monitoring of security events with limited resources (2016) (5)
- Security in Data Warehouses and OLAP Systems (2008) (5)
- A Semantic-Based Transaction Processing Model for Multilevel Transactions (1998) (5)
- A Probabilistic Framework for Localization of Attackers in MANETs (2012) (5)
- Distributed Policies for Data Management - Making Policies Mobile (2000) (5)
- On 2-dimensional CW-complexes with a single 2-cell (1979) (5)
- Optimizing Alert Data Management Processes at a Cyber Security Operations Center (2019) (4)
- Logical Design for Temporal Databases with Multiple Temporal Types (2007) (4)
- Basic Security Concepts (2007) (4)
- Intrusion‐Detection Systems (2012) (4)
- Secure databases: constraints and inference channels (2000) (4)
- Achieving simultaneous distribution control and privacy protection for Internet media delivery (2008) (4)
- A Flexible Authorization Framework for E-Commerce (2004) (4)
- On Equivalence of Relational and Network Database Models (1985) (4)
- A Logic Framework for Flexible and Security-Aware Service Composition (2013) (4)
- A Checksum-based Corruption Detection Technique (2003) (4)
- Transaction Processing in Multilevel Secure Databases (2000) (4)
- Text Retrieval (2009) (4)
- A Robust Watering Scheme for Relational Data (2003) (4)
- A note on estimating the cardinality of the projection of a database relation (1991) (4)
- Distributed Query Evaluation over Encrypted Data (2021) (4)
- Time-Constrained Transaction Management (2009) (4)
- Database Security: Status and Prospects: Proceedings of the IFIP Tc11 4th Working Conference, Halifax, U. K., 18-21 Sept., 1990 (1991) (4)
- Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings (2008) (4)
- Rule Configuration Checking in Secure Cooperative Data Access (2012) (4)
- On-the fly AES Decryption/Encryption for Cloud SQL Databases (2015) (4)
- An Anonymous Routing Protocol with The Local-repair Mechanism for Mobile Ad Hoc Networks (2006) (4)
- A Scheme of Parallel Processing for MIMD Systems (1983) (4)
- Enforcing Mandatory Access Control in Object Bases (1993) (4)
- Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy (2008) (4)
- A Mission-centric Framework for Cyber Situational Awareness (2012) (3)
- A Survey of Object-Oriented Database Technology (1990) (3)
- Privacy and Anonymity in Location Data Management (2010) (3)
- Semantics-based transaction processing: satisfying conflicting objectives (1997) (3)
- Conceptual modeling - ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 27-30, 2001 : proceedings (2001) (3)
- Benchmarking multilevel secure database systems using the MITRE benchmark (1994) (3)
- A Tree-Based μ TESLA Broadcast Authentication for Sensor Networks (2005) (3)
- Implementing Consistency Checking in Correlating Attacks (2004) (3)
- Semantic-Based Decomposition of Transactions (1997) (3)
- Authentication and integrity in telecommunication signaling network (2005) (3)
- Proposed Temporal Database Concepts|May 1993 (1993) (3)
- LH*RE with Cached Encryption Keys: A Scalable Distributed Data Structure with Recoverable Encryption (2008) (3)
- MTD 2014: First ACM Workshop on Moving Target Defense (2014) (3)
- ICT Systems Security and Privacy Protection: 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014, Proceedings (2014) (3)
- Network Hardening (2014) (3)
- Evaluating the Network Diversity of Networks Against Zero-Day Attacks (2017) (3)
- HARDWARE AND SOFTWARE DATA SECURITY (3)
- Linear-Time Network Hardening (2014) (3)
- An authorization model for query execution in the cloud (2021) (3)
- Rethinking integrity (1997) (3)
- Increasing the confidence in information systems (1997) (3)
- Proactive Defense Through Deception (2019) (3)
- Economics of Information Security (2004) (3)
- Concurrency Control in a Secure Database via a Two-Snapshot Algorithm (1995) (3)
- Gemini: An Emergency Line of Defense against Phishing Attacks (2014) (3)
- Database Security XII (1999) (3)
- Translingual Information Retrieval (2009) (3)
- Cooperative Data Access in Multi-cloud Environments (2011) (3)
- Representative instances and γ-acyclic relational schemes (1984) (2)
- Hybrid adversarial defense: Merging honeypots and traditional security methods (2018) (2)
- A Novel Metric for Measuring Operational Effectiveness of a Cybersecurity Operations Center (2017) (2)
- Maintaining correctness, availability, and unambiguity in trusted database management systems (1988) (2)
- Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003 (2003) (2)
- Mitigating the insider threat of remote administrators in clouds through maintenance task assignments (2019) (2)
- Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks (2010) (2)
- QoP and QoS Policy Cognizant Module Composition (2010) (2)
- A Novel Approach to Certificate Revocation Management (2001) (2)
- Smart Micro-Grid Systems Security and Privacy (2018) (2)
- IFIP TC-11 (1997) (2)
- Multilevel Security Transaction Processing (2001) (2)
- Topological Data Structure (2009) (2)
- Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), Anaheim, California, USA (1983) (2)
- Evaluating privacy threats in released database views by symmetric indistinguishability (2009) (2)
- Multimedia Database System: Issues and Research Direction (1996) (2)
- V-COPS: A Vulnerability-Based Cooperative Alert Distribution System (2006) (2)
- Proceedings of the international symposium on databases in parallel and distributed systems (1988) (2)
- Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results, Warrenton, Virginia, USA, November 19-20, 1998 (1998) (2)
- A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling (2008) (2)
- Secure File Allocation and Caching in Large-scale Distributed Systems (2012) (2)
- A fair locking protocol for multilevel secure databases (1998) (2)
- On-the-Fly AES256 Decryption/Encryption for Trusted Cloud SQL DBS: Position Statement (2016) (2)
- k -Zero Day Safety: Evaluating the Resilience of Networks Against Unknown Attacks (2017) (2)
- Mapping Attack Paths in Black-Box Networks Through Passive Vulnerability Inference (2011) (2)
- Basic Database Operations on the Butterfly Parallel Processor: Experiment Results. (1988) (2)
- Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control (1995) (2)
- Countermeasures to Attacks (2001) (2)
- Proof of Isolation for Cloud Storage (2014) (2)
- Security and Privacy of Data in a Cloud (2013) (2)
- Can-Follow Concurrency Control (2007) (2)
- Adaptive Autonomous Secure Cyber Systems (2020) (2)
- Reasoning with advanced policy rules and its application to access control (2004) (2)
- Integration of Audit Data Analysis and Mining Techniques into Aide (2006) (1)
- Recoverable Encryption through Noised Secret over a Large Cloud (2012) (1)
- Information security theory and practice : 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015 : proceedings (2015) (1)
- Extending Common Intrusion Detection Framework (CIDF) to Support Queries (2004) (1)
- Security considerations in data center configuration management (2011) (1)
- A Learning-based Approach to Information Release Control (2003) (1)
- Distributed Database Security (2005) (1)
- PCAM: A Data-driven Probabilistic Cyber-alert Management Framework (2022) (1)
- An Extension of "Representative Instances and γ-Acyclic Relational Schemes" (1987) (1)
- The Partitioned Synchronization Rule for Planar Extendible Partial Orders (1995) (1)
- Addendum to “ Proposed Temporal Database Concepts — May 1993 ” ∗ (2004) (1)
- Construction of Universal Instances for Loop-Free Network Databases Using a Join-Like Operation (1987) (1)
- Proceedings of the 20th International Conference on Conceptual Modeling: Conceptual Modeling (2001) (1)
- Steganography Of Images Using Hilbert Curve (2015) (1)
- Information systems research at George Mason University (1997) (1)
- Privacy Protection with Uncertainty and Indistinguishability (2007) (1)
- Measuring the effect of commutative transactions on distributed database performance (1993) (1)
- Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece (1999) (1)
- Temporal Association Mining (2009) (1)
- Essay 22 Integrity in Multilevel Secure Database Management Systems (2006) (1)
- DaTA -- Data-Transparent Authentication Without Communication Overhead (2006) (1)
- An Algebrai Representation of CalendarsPeng Ning (2001) (1)
- Rethinking integrity [distributed databases] (1997) (1)
- Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security (2005) (1)
- Database Security, IV: Status and Prospects : Results of the Ifip Wg 11.3 Workshop on Database Security Halifax, U.K., 18-21 September, 1990 (1991) (1)
- Restoring compromised privacy in micro-data disclosure (2010) (1)
- Panel Discussion on the Polyinstantiation Problem: A Position Paper (1991) (1)
- Homotopy classification of lens spaces for one-relator groups with torsion (1980) (1)
- Identifying Sensitive Associations in Databases for Release Control (2004) (1)
- Key Recovery Using Noised Secret Sharing with Discounts over Large Clouds (2013) (1)
- Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008 (2008) (1)
- Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems (1993) (1)
- Rewriting Histories : Re overing from Mali iousTransa tions (1999) (1)
- Integrity for Approximate Joins on Untrusted Computational Servers (2015) (1)
- Keeping Intruders at Large (2014) (1)
- TerraCheck: Verification of Dedicated Cloud Storage (2013) (1)
- Polyinstantiation for Cover Stories (2013) (1)
- A Two-tier Coarse Indexing Scheme for MLS Database Systems (1997) (1)
- On Universal and Representative Instances for Inconsistent Databases (1983) (1)
- Universal and Representative Instances Using Unmarked Nulls (1984) (1)
- Proc. of the 13th NIST-NCSC National Computer Security Conference, Washington D.C., October 1990, pages 526-540 INTEGRITY MECHANISMS IN DATABASE MANAGEMENT SYSTEMS (1990) (1)
- Geographic-Region Monitoring by Drones in Adversarial Environments (2021) (1)
- How to Close Signaling Channels Without Duplicity (1990) (1)
- Computer Security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings (2013) (1)
- Restricted Polyinstantiation or How to Close Signaling Channels Without Duplicity (1990) (1)
- Implementation Issues in Multilevel Security for Object-Oriented Databases (1990) (1)
- Two-Sorted First-Order Logic (2009) (1)
- An Empirical Study on the Membership Inference Attack against Tabular Data Synthesis Models (2022) (1)
- Information Release Control: A Learning-Based Architecture (2005) (1)
- Adaptive Alert Management for Balancing Optimal Performance among Distributed CSOCs using Reinforcement Learning (2020) (1)
- MTD Techniques for Memory Protection Against Zero-Day Attacks (2019) (1)
- Secure Workflow Transaction Processing (2000) (1)
- Two Can Play That Game: An Adversarial Evaluation of a Cyber-alert Inspection System. (2018) (1)
- Security in information systems : Advances and new challenges (2014) (1)
- Modeling and Mitigating the Insider Threat of Remote Administrators in Clouds (2018) (1)
- An Empirical Study of Secret Security Patch in Open Source Software (2020) (1)
- Propagating Modifications to Mobile Policies (2002) (1)
- Two Can Play That Game (2018) (1)
- Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security (2008) (1)
- An Outsourcing Model for Alert Analysis in a Cybersecurity Operations Center (2020) (1)
- Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases (2007) (1)
- Design of Temporal Databases with Multiple Granularities (2000) (1)
- Reducing Attack Surface with VM-Based Phantom Server (2013) (1)
- Understanding Account Recovery in the Wild and its Security Implications (2022) (1)
- Switchwall: Automated Topology Fingerprinting and Behavior Deviation Identification (2012) (1)
- Basic data-base operations on the Butterfly Parallel Processor: experiment results. Memorandum report, January-December 1987 (1988) (0)
- Chapter VIII Secure Multicast for Mobile Commerce Applications : Issues and Challenges (2018) (0)
- JoDS volume 2 - Guest editorial (2005) (0)
- On the two-realizability of chain complexes (1981) (0)
- Essay 21 Solutions to the Polyinstantiation Problem (2006) (0)
- Sentinels and Twins: Effective Integrity Assessment for Distributed Computation (2023) (0)
- A Survey on Audio Steganography Approaches (2016) (0)
- GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics (2022) (0)
- Applications and System Development Security (2000) (0)
- Information systems security : First International conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : Proceedings /Sushil Jajodia, Chandan Mazumdar (eds.) (2005) (0)
- CARDS: An Experimental System for Detecting Distributed Attacks (2004) (0)
- Querying Temporal Databases with Multiple Views (2000) (0)
- Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, WPES 2003, Washington, DC, USA, October 30, 2003 (2003) (0)
- Integrity and Internal Control in Information Systems: IFIP TC11 Working Group 11.5 Second Working Conference on Integrity and Internal Control in ... in Information and Communication Technology) (2013) (0)
- Foreword LOCAL Area Networks (0)
- Allocation of data-base files across parallel stores for efficient processing of partial-match queries. Formal report, January-May 1987 (1987) (0)
- Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy (2010) (0)
- Message from the general chair and TPC chairs (2013) (0)
- Scalable key management for secure group communications (2004) (0)
- Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information (1998) (0)
- System View and Event History (2004) (0)
- Distributed query execution under access restrictions (2022) (0)
- Proceedings of the IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security XII: Status and Prospects (1998) (0)
- Transparent identification of network flow and its security applications (2007) (0)
- Proceedings of the 2002 ACM Workshop on XML Security, Fairfax, VA, USA, November 22, 2002 (2002) (0)
- Trusted Recovery by Rewriting Histories (2002) (0)
- Securing public and ip telephone networks (2007) (0)
- Spaces dominated by two-complexes (1981) (0)
- Adaptive reallocation of cybersecurity analysts to sensors for balancing risk between sensors (2018) (0)
- Secure Buffer Management (2000) (0)
- Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings (2010) (0)
- Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints (2001) (0)
- Trusted Cloud SQL DBS with Onthe-fly AES Decryption / Encryption Sushil Jajodia (2017) (0)
- Damage Quarantine and Recovery in Data Processing Systems (2008) (0)
- Techniques for detecting malicious or improper data modifications (2003) (0)
- Metadata management in encrypted outsourced databases (2005) (0)
- Enabling Collaborative Data Authorization Between Enterprise Clouds (2014) (0)
- 23 Securely executing multileyel transactions (2015) (0)
- PASSAT 2009 Organizing and Program Committee (2009) (0)
- An Application to Knowledge Discovery (2000) (0)
- Decentralized Detection of Distributed Attacks (2004) (0)
- A Hierarchical Model for Distributed Attacks (2004) (0)
- Protecting File systems Against Corruption Using Checksums (2000) (0)
- An Overview of Related Research (2004) (0)
- Security and Protection in Information Processing Systems: IFIP 18th World Computer Congress TC11 19th International Information Security Conference (2013) (0)
- Letter from the TC Chairman (1987) (0)
- From the Issue Editors (1989) (0)
- Acting Chief, Partnerships and Processes ACKNOWLEDGMENTS (1996) (0)
- Network Attack Surface: Lifting the Attack Surface Concept to Network Level for Evaluating the Resilience against Zero-Day Attacks (2016) (0)
- Multiphase Damage Containment in Self-Healing Database Systems � (2003) (0)
- Preface The Motivation for This Book (2010) (0)
- Time-Based Access Control (2009) (0)
- A Secure , Structured , Distributed Caching System for Providing Availability of Mission-Critical Reference Data (2009) (0)
- An Algorithm for Dynamic Data Distribution Preliminary Version (1992) (0)
- Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings (2011) (0)
- SUSHIL JAJODIA AND (2003) (0)
- Distributed Databases: Turing Award Winner Jim Gray on the new millennium (1999) (0)
- A Hierarchical Release Control Policy Framework (2004) (0)
- Information Security Theory and Practice (2015) (0)
- Trusted Recovery in Distributed Systems (2002) (0)
- Identity switching for federated access control (2006) (0)
- Information systems security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011 : proceedings (2011) (0)
- Computational Complexity The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters (2011) (0)
- Proceedings of the First ACM Workshop on Moving Target Defense, MTD '14, Scottsdale, Arizona, USA, November 7, 2014 (2014) (0)
- Local Arrangements Committee (2010) (0)
- Proceedings of the First international conference on Information Systems Security (2005) (0)
- List of Figures Figure Page (1996) (0)
- A Fault Tolerance Approach to SurvivabilityPaul (1999) (0)
- The Integrity Challenge (2000) (0)
- A View-Based Dynamic Replication Control Algorithm (1994) (0)
- Using constraints to control access to sensitive aggregates and to enforce multilevel integrity (1997) (0)
- Conversion of a Medical Literature Database from Mainframe to LSI-11 Microprocessor-Based System (1984) (0)
- Generating Realistic Fake Equations in Order to Reduce Intellectual Property Theft (2020) (0)
- From Database to Cyber Security (2018) (0)
- Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006 (2006) (0)
- Trusted Recovery by Syntactic Approaches (2002) (0)
- Time Sequence (2009) (0)
- Proceedings of the 11th International Conference on Information Systems Security - Volume 9478 (2015) (0)
- Block : Detecting Blog Bots through Behavioral Biometrics (2012) (0)
- Open Issues and Research Directions (2000) (0)
- Private Minutia-Based Fingerprint Matching (2018) (0)
- Translation Lookaside Buffer (TLB) (2009) (0)
- Temporal Granularity (2009) (0)
- A Relational Approach to the Interactive Analysis of Attack Graphs (2008) (0)
- Algebra for Databases with Explicit Markings of Damaged Data (1998) (0)
- Integrity and Internal Control in Information Systems, IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems, Zurich, Switzerland, December 4-5, 1997 (1997) (0)
- Information Systems Security (2015) (0)
- A Novel Team Formation Framework based on Performance in a Cybersecurity Operations Center (2023) (0)
- 6th IFIP TC-11 WG 11.5 conference on integrity and internal control in information systems (2003) (0)
- Free Schedules for Free Agents in Work ow Systems Areas: time in multiple agents, communication, and synchronization; temporal constraint reasoning (2000) (0)
- Advances in Information Security (2005) (0)
- Allocation of Database Files Across Parallel Stores for Efficient Processing of Partial-Match Queries. (1987) (0)
- Introduction to the special issue on the use of entity-relationship concepts in databases and related software (1984) (0)
- In today's heavily networked environment, you must guard against both obvious and subtle intrusions that can delete or corrupt vital data. Ideally, your security measures will allow critical system operation even when you're under attack. (1999) (0)
- Forthcoming Contributions (2004) (0)
- Final Report: Computer-aided Human Centric Cyber Situation Awareness (2016) (0)
- Construction ofUniversalInstances forLoop-Free NetworkDatabases Usinga Join-LikeOperation SUSHILJAJODIAAND FREDERICKNEILSPRINGSTEEL (1987) (0)
- A methodology for ensuring fair allocation of CSOC effort for alert investigation (2018) (0)
- Temporal Domain (2009) (0)
- State of the Journal (2016) (0)
- 2 Security Issues in the Data Outsourcing Scenario (2018) (0)
- A methodology to measure and monitor level of operational effectiveness of a CSOC (2017) (0)
- Trading Elephants for Ants: Efficient Post-attack Reconstitution (2011) (0)
- Relational Database Security: Availability, Integrity, & Confidentiality (2000) (0)
- Tug-of-War Sketch (2009) (0)
- Techniques for protecting data from piracy, illegal inference, and malicious intrusions (2003) (0)
- Guest Editorial (2007) (0)
- Trusted Recovery from Information Attacks (2001) (0)
- SQL Numerical Value Expressions Over Encrypted Cloud Databases (2014) (0)
- Proceedings of the 9th IFIP WG 11.2 International Conference on Information Security Theory and Practice - Volume 9311 (2015) (0)
- A User Friendly Guard with Mobile Post-Release Access Control Policy (2003) (0)
- Securing password recovery through dispersion (2012) (0)
- Temporal Databases (Dagstuhl Seminar 9726) (2021) (0)
- Tracking Anonymous Peer-to-Peer Calls on the Internet (2007) (0)
- Temporal Type (2009) (0)
- Versatile Cybersecurity (2018) (0)
- Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings (2005) (0)
- Background and Traditional System Recovery (2002) (0)
- Data Security (2008) (0)
- Session 1: Routing I (2006) (0)
- Surviving Unpatchable Vulnerabilities through Multi-Option Network Hardening (2018) (0)
- Replica Control Algorithms in Distributed Databases (1993) (0)
- Scalable Graph Synthesis with Adj and 1 - Adj (2021) (0)
- Protecting Critical Information Systems (Abstract) (1999) (0)
- Securely sharing neuroimagery (2003) (0)
- Table of Contents. (2016) (0)
- Protecting privacy in released database views (2006) (0)
- Trusted cloud SQL DBS with on-the-fly AES decryption/encryption (2016) (0)
- Information Security Management, Education and Privacy: IFIP 18th World Computer Congress TC11 19th International Information Security Workshops 22-27, 2004 (2013) (0)
- Security and Protection in Information Processing Systems (IFIP International Federation for Information Processing) (2004) (0)
- Database use and technology in Japan: JTEC panel report. Final report (1992) (0)
- A short technical paper: Determining whether a vote assignment is dominated (1991) (0)
- CASFinder: Detecting Common Attack Surface (2019) (0)
- A View of Database Management Systems as Abstract Data Types (1983) (0)
- Applications to Hierarchical and Replicated Databases (2000) (0)
- Recoverable Encryption through Noised Secret Res. Rep. 2012-2-18) (2011) (0)
- Proposed Glossary Entries|March 1993 1 (1993) (0)
- Term Processing (2009) (0)
- Intrusion Detection Basics (2009) (0)
- Attack graphs: scalable construction and analysis (2007) (0)
- Database Security (0)
- Combinatorial equivalence between group presentations (1982) (0)
- Integrity and Internal Control in Information Systems (1998) (0)
- Institutional Knowledge at Singapore Management University Fingerprinting relational databases: Schemes and specialities (2019) (0)
- Message from the conference chair (2001) (0)
- Secure Transaction Processing in Real-Time Databases (2000) (0)
- Parity-based inference control for multi-dimensional range sum queries (2007) (0)
- Proceedings of the IFIP TC11 Working Group 11.5, Second Working Conference on Integrity and Internal Control in Information Systems: Bridging Business Requirements and Research Results (1998) (0)
- Traditional Transaction Processing (2000) (0)
- A Flexible Authorization Framework (2008) (0)
- TR : MU-COSC-SCHW-1601 Onthe-fly AES 256 Encryption / Decryption for Trusted Cloud SQL DBS Position Statement (2017) (0)
- Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002 (2002) (0)
- IFIP AICT 428-ICT Systems Security and Privacy Protection (2014) (0)
- Trusted Recovery Models (2002) (0)
- Proceedings of the 4th International Workshop on Advances in Multimedia Information Systems (1998) (0)
- Editorial (2010) (0)
- Proceedings of the IFIP TC11 Working Group 11.5, First Working Conference on Integrity and Internal Control in Information Systems: Increasing the confidence in Information Systems (1997) (0)
- Maintaining the level of operational effectiveness of a CSOC under adverse conditions (2021) (0)
- Intrusion Con nement by Isolation in Information (2000) (0)
- In the Virtual Extension (2011) (0)
- Cloud Security: Issues and Research Directions (2014) (0)
- An authorization model for query execution in the cloud (2021) (0)
- Advances in multimedia information systems : 4th International Workshop, MIS'98, Istanbul, Turkey, September 24-26, 1998 : proceedings (1998) (0)
- Welcome message (2009) (0)
- Results of the IFIP WG 11.3 Workshop on Database Security V: Status and Prospects (1991) (0)
- Message from the Guest Editors (2011) (0)
- Facility for Common Intrusion Detection Framework (2000) (0)
- Session details: Keynote (2003) (0)
- Proceedings : International Symposium on Databases in Parallel and Distributed Systems, December 5-7, 1988, Austin, Texas, USA (1988) (0)
This paper list is powered by the following services:
Other Resources About Sushil Jajodia
What Schools Are Affiliated With Sushil Jajodia?
Sushil Jajodia is affiliated with the following schools: