Vijay Atluri
#75,084
Most Influential Person Now
Indian computer scientist
Vijay Atluri's AcademicInfluence.com Rankings
Vijay Atluricomputer-science Degrees
Computer Science
#2896
World Rank
#3032
Historical Rank
Information Security
#25
World Rank
#25
Historical Rank
Database
#3827
World Rank
#3982
Historical Rank
Download Badge
Computer Science
Why Is Vijay Atluri Influential?
(Suggest an Edit or Addition)According to Wikipedia, Vijayalakshmi Atluri is an Indian computer scientist specialized in information systems security and database management. She is a professor of management science and information systems at Rutgers Business School – Newark. Atluri is an advisory board member of the computer science department at the University of the People.
Vijay Atluri's Published Works
Published Works
- Role-Based Access Control (2011) (1521)
- The specification and enforcement of authorization constraints in workflow management systems (1999) (593)
- The role mining problem: finding a minimal descriptive set of roles (2007) (305)
- Modeling and Analysis of Workflows Using Petri Nets (1998) (296)
- Workshop Summary (1998) (258)
- An Authorization Model for Workflows (1996) (238)
- RoleMiner: mining roles using subset enumeration (2006) (200)
- Optimal Boolean Matrix Decomposition: Application to Role Engineering (2008) (168)
- A Content-Based Authorization Model for Digital Libraries (2002) (133)
- Analysis of political discourse on twitter in the context of the 2016 US presidential elections (2017) (127)
- Concept-level access control for the Semantic Web (2003) (121)
- A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems (1997) (117)
- SecureFlow: a secure Web-enabled workflow management system (1999) (110)
- A Chinese wall security model for decentralized workflow systems (2001) (102)
- Supporting conditional delegation in secure workflow management systems (2005) (95)
- Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets (2004) (87)
- Security for Workflow Systems (2001) (85)
- Migrating to optimal RBAC with minimal perturbation (2008) (81)
- A Survey of Role Mining (2016) (80)
- A clickstream-based collaborative filtering personalization model: towards a better performance (2004) (80)
- The Policy Machine: A novel architecture and framework for access control policy specification and enforcement (2011) (78)
- An authorization model for geospatial data (2004) (75)
- A Petri Net Based Safety Analysis of Workflow Authorization Models (2000) (70)
- The role mining problem: A formal perspective (2010) (69)
- An authorization model for temporal and derived data: securing information portals (2002) (68)
- Computer Security – ESORICS 2011 (2011) (65)
- Inter-instance authorization constraints for secure workflow management (2006) (63)
- Preserving mobile customer privacy: an access control system for moving objects and customer profiles (2005) (59)
- The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies (2008) (58)
- Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases (1992) (58)
- Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition (2012) (57)
- Effective anonymization of query logs (2009) (57)
- An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment (1996) (57)
- Domain Knowledge-Based Automatic Workflow Generation (2002) (54)
- An authorization model for temporal data (2000) (51)
- Enhancing the government service experience through QR codes on mobile platforms (2014) (51)
- Role Engineering via Prioritized Subset Enumeration (2010) (49)
- Privacy-preserving semantic interoperation and access control of heterogeneous databases (2006) (47)
- A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment (2008) (45)
- A geotemporal role-based authorisation system (2007) (45)
- Proceedings of the 12th Annual International Digital Government Research Conference: Digital Government Innovation in Challenging Times (2011) (44)
- SI in digital libraries (2000) (41)
- Evaluating the validity of data instances against ontology evolution over the Semantic Web (2009) (41)
- Multilevel Secure Transaction Processing (1999) (41)
- Sentiment based Analysis of Tweets during the US Presidential Elections (2017) (40)
- Preserving Privacy in Social Networks: A Structure-Aware Approach (2009) (40)
- Analyzing temporal role based access control models (2012) (35)
- A Semantic-Based Execution Model for Multilevel Secure Workflows (2000) (35)
- An Execution Model for Multilevel Seccure Workflows (1997) (34)
- Using Semantics for Policy-Based Web Service Composition (2005) (34)
- Using semantics for automatic enforcement of access control policies among dynamic coalitions (2007) (32)
- Protecting Privacy from Continuous High-resolution Satellite Surveillance (2000) (31)
- Random Walks to Identify Anomalous Free-Form Spatial Scan Windows (2008) (30)
- Edge-RMP: Minimizing administrative assignments for role-based access control (2009) (30)
- Location-based Sentiment Analyses and Visualization of Twitter Election Data (2020) (29)
- Multilevel Secure Transaction Processing: Status and Prospects (1996) (28)
- A decentralized execution model for inter-organizational workflows (2007) (28)
- Dynamic Composition of Workflows for Customized eGovernment Service Delivery (2002) (28)
- Automatic Enforcement of Access Control Policies Among Dynamic Coalitions (2004) (28)
- Meeting Cardinality Constraints in Role Mining (2015) (27)
- Policy-based Web service composition (2004) (27)
- Ensuring Privacy and Security for LBS through Trajectory Partitioning (2010) (27)
- An optimization framework for role mining (2014) (27)
- Role Mining under Role-Usage Cardinality Constraint (2012) (27)
- Object discovery in high-resolution remote sensing images: a semantic perspective (2009) (26)
- Towards formal security analysis of GTRBAC using timed automata (2009) (26)
- Analysis and visualization of subjectivity and polarity of Twitter location data (2018) (25)
- Web-based application for sentiment analysis of live tweets (2018) (25)
- A Uniform Indexing Scheme for Geo-spatial Data and Authorizations (2002) (25)
- Texture-Based Remote-Sensing Image Segmentation (2005) (24)
- An authorization system for digital libraries (2002) (23)
- Secure information sharing and analysis for effective emergency management (2008) (23)
- Efficient Security Policy Enforcement in a Location Based Service Environment (2007) (23)
- Chinese wall security for decentralized workflow management systems (2004) (23)
- Enforcing Mandatory and Discretionary Security in Workflow Management Systems (1997) (23)
- Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions (1997) (23)
- Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control (2018) (23)
- Migrating from RBAC to temporal RBAC (2017) (22)
- Crime Prediction Model using Deep Neural Networks (2019) (22)
- Efficient Bottom-Up Mining of Attribute Based Access Control Policies (2017) (22)
- A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions (2005) (21)
- A meta model for access control: why is it needed and is it even possible to achieve? (2008) (21)
- Utilizing social media to improve local government responsiveness (2014) (21)
- Efficient Enforcement of Security Policies Based on Tracking of Mobile Users (2006) (21)
- A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects (2001) (21)
- Spatial neighborhood based anomaly detection in sensor datasets (2010) (20)
- Weighted Rank-One Binary Matrix Factorization (2011) (20)
- Security analysis of temporal RBAC under an administrative model (2014) (20)
- Mining temporal roles using many-valued concepts (2016) (20)
- Toward Mining of Temporal Roles (2013) (20)
- Role engineering: from theory to practice (2012) (20)
- DM-AMS: employing data mining techniques for alert management (2005) (19)
- Handling Dynamic Changes in Decentralized Workflow Execution Environments (2003) (19)
- A profile anonymization model for location-based services (2011) (18)
- Unified Index for Mobile Object Data and Authorizations (2005) (18)
- AMTRAC: An administrative model for temporal role-based access control (2013) (18)
- Security analysis for temporal role based access control (2014) (18)
- The generalized temporal role mining problem (2015) (18)
- E-Government: Human-Centered Systems for Business Services (2001) (18)
- Customized geospatial workflows for e-government services (2001) (18)
- Poster: Constrained Policy Mining in Attribute Based Access Control (2017) (17)
- Analysing the Safety of Workflow Authorization Models (1998) (17)
- Extended Boolean Matrix Decomposition (2009) (17)
- A theoretical formulation for degrees of isolation in databases (1997) (17)
- Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database (2019) (17)
- LS3: a <u>L</u>inear <u>S</u>emantic <u>S</u>can <u>S</u>tatistic technique for detecting anomalous windows (2005) (17)
- Security analysis of GTRBAC and its variants using model checking (2011) (16)
- Enforcing Separation of Duty in Attribute Based Access Control Systems (2015) (16)
- An Optimization Model for the Extended Role Mining Problem (2011) (15)
- Policy Engineering in RBAC and ABAC (2018) (15)
- Role Mining in the Presence of Noise (2010) (15)
- Resource sharing using UICDS™ framework for incident management (2012) (15)
- Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery (2003) (14)
- Supporting Delegation in Secure Workflow Management Systems (2003) (14)
- Spatial outlier detection in heterogeneous neighborhoods (2009) (14)
- Anonymization models for directional location based service environments (2010) (14)
- Using QR codes for enhancing the scope of digital government services (2012) (13)
- SemDiff: An Approach to Detecting Semantic Changes to Ontologies (2006) (13)
- Data and Applications Security XXII (2008) (13)
- Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations (2004) (13)
- Ontology-Guided Change Detection to the Semantic Web Data (2004) (13)
- Efficient security policy enforcement for the mobile environment (2008) (13)
- Spatiotemporal Access Control Enforcement under Uncertain Location Estimates (2009) (13)
- FS/sup 3/: a random walk based free-form spatial scan statistic for anomalous window detection (2005) (13)
- A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions (2004) (12)
- UICDS compliant resource management system for emergency response (2010) (12)
- Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols (1994) (12)
- Efficient Storage and Management of Environmental Information (2002) (12)
- Role Mining in the Presence of Separation of Duty Constraints (2015) (11)
- Deploying ABAC policies using RBAC systems (2019) (11)
- Minimizing Organizational User Requirement while Meeting Security Constraints (2015) (11)
- An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis (2016) (11)
- EDI through a distributed information systems approach (1998) (11)
- Uniform Indexing for Geospatial Data and Authorizations (2002) (11)
- An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies (2005) (11)
- STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations (2004) (11)
- Collusion Set Detection Through Outlier Discovery (2005) (11)
- Color Time Petri Net for Interactive Adaptive Multimedia Objects (2005) (10)
- Community based emergency response (2013) (10)
- Security analysis of ABAC under an administrative model (2019) (10)
- PolTree: A Data Structure for Making Efficient Access Decisions in ABAC (2019) (10)
- Deciphering Text from Touchscreen Key Taps (2016) (10)
- Research Advances in Database and Information Systems Security (2000) (10)
- Attacking Image Based CAPTCHAs Using Image Recognition Techniques (2012) (10)
- A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach (2006) (9)
- An Administrative Model for Spatio-Temporal Role Based Access Control (2013) (9)
- A side-channel attack on smartphones: Deciphering key taps using built-in microphones (2018) (9)
- Self-manifestation of composite multimedia objects to satisfy security constraints (2003) (9)
- Adapting spatial constraints of composite multimedia objects to achieve universal access (2005) (9)
- Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery (2007) (9)
- Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004 (2004) (9)
- Achieving stricter correctness requirements in multilevel secure databases (1993) (9)
- Selective View Materialization in a Spatial Data Warehouse (2005) (8)
- Analysis of TRBAC with Dynamic Temporal Role Hierarchies (2013) (8)
- PEER (2019) (8)
- Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes (2018) (8)
- A Framework for Policy Similarity Evaluation and Migration Based on Change Detection (2015) (8)
- Semantics-aware security policy specification for the semantic web data (2010) (8)
- Towards a Unified Index Scheme for Mobile Data and Customer Profiles in a Location-Based Service Environment (2003) (8)
- HyPE: A Hybrid Approach toward Policy Engineering in Attribute-Based Access Control (2018) (7)
- Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing (2015) (7)
- Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse (2006) (7)
- Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration (2017) (7)
- A study on the indexing of satellite images at NASA regional application center (2001) (7)
- Geospatial Database Security (2008) (7)
- Enabling the Deployment of ABAC Policies in RBAC Systems (2018) (7)
- Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization (2020) (7)
- Proceedings of the 7th ACM workshop on Privacy in the electronic society (2008) (6)
- PEER: A Framework for Public Engagement in Emergency Response (2015) (6)
- Privacy-Preserving Subgraph Discovery (2012) (6)
- OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes (2002) (6)
- Migrating from DAC to RBAC (2015) (6)
- Policy Adaptation in Hierarchical Attribute-based Access Control Systems (2019) (6)
- An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories (2003) (6)
- On Optimal Employee Assignment in Constrained Role-Based Access Control Systems (2016) (6)
- An efficient online auditing approach to limit private data disclosure (2009) (6)
- Panel on role engineering (2008) (6)
- Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases (1995) (6)
- Security Analysis of Unified Access Control Policies (2019) (6)
- VisMAP: Visual Mining of Attribute-Based Access Control Policies (2019) (5)
- UICDS-based information sharing among emergency response application systems (2011) (5)
- Modeling and evaluation of redesigning methodologies for distributed workflows (2000) (5)
- Attribute-Based Access Control for NoSQL Databases (2021) (5)
- Secure interoperation for effective data mining in border control and homeland security applications (2004) (5)
- Human-Centered Systems for Business Services (2004) (5)
- Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications (2004) (5)
- An Ontology-Guided Approach to Change Detection of the Semantic Web Data (2006) (5)
- Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems (2021) (5)
- Statistical Database Auditing Without Query Denial Threat (2015) (5)
- Electronic Negotiation of Government Contracts through Transducers (2003) (5)
- Developing Machine Learning Models to Automate News Classification (2020) (5)
- Transaction Processing in Multilevel Secure Databases (2000) (4)
- Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 (2005) (4)
- A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis (2021) (4)
- A clickstream-based collaborative filtering recommendation model for e-commerce (2005) (4)
- Risk Based Access Control Using Classification (2012) (4)
- Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies (2014) (4)
- Technology transfer of inter-agency government services and their transnational feasibility studies (2005) (4)
- A Semantic Based Redesigning of Distributed Workflows (1998) (4)
- ACM Transactions on Information and System Security: Preface (2005) (4)
- Computer Security - ESORICS 2011: 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings ... Computer Science / Security and Cryptology) (2011) (4)
- Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management (2013) (4)
- Preview: Optimizing View Materialization Cost in Spatial Data Warehouses (2006) (4)
- Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment (2008) (4)
- Web Services Based Attacks against Image CAPTCHAs (2013) (4)
- An authorization system for temporal data (2002) (4)
- ABACaaS: Attribute-Based Access Control as a Service (2019) (3)
- Incremental Maintenance of ABAC Policies (2021) (3)
- MENVIS: mobile environmental information system (2007) (3)
- Modeling and Evaluation of Distributed Workflow Algorithms (2001) (3)
- Automating the Delivery of Governmental Business Services Through Workflow Technology (2002) (3)
- Proceedings of the 2007 ACM workshop on Scalable trusted computing (2007) (3)
- Generating Secure Images for CAPTCHAs through Noise Addition (2015) (3)
- Risk-Based Access Control for Personal Data Services (2008) (3)
- Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies (2012) (3)
- A unified index structure for efficient enforcement of spatiotemporal authorisations (2010) (2)
- Using classification for role-based access control management (2016) (2)
- Policy Reconciliation and Migration in Attribute Based Access Control (2019) (2)
- Towards designing robust CAPTCHAs (2017) (2)
- Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings (2014) (2)
- Security of Data and Transaction Processing (2000) (2)
- Privacy, profiling, targeted marketing, and data mining (2007) (2)
- Enhancing the Security of Image CAPTCHAs Through Noise Addition (2015) (2)
- Security, Privacy and Trust for Responsible Innovations and Governance (2020) (2)
- Semantically enhanced enforcement of mobile consumer's privacy preferences (2006) (2)
- Citizen-to-Citizen Resource Sharing in Emergency Response (2018) (2)
- Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 (2005) (2)
- Privacy-preserving trust verification (2010) (2)
- Anomaly detection in heterogeneous datasets (2007) (2)
- Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 (2007) (2)
- Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003 (2003) (2)
- Semantically enhanced and efficient location services for preserving mobile consumer's privacy (2005) (2)
- Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources (2019) (2)
- Incorporating security into workflow management systems (1998) (2)
- Multilevel Security Transaction Processing (2001) (2)
- Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004 (2004) (2)
- Regulatory Ontology-Based Interagency Informatin and Service Customization (2007) (2)
- Preventing Unauthorized Data Flows (2017) (2)
- Proceedings of the 2004 workshop on Secure web service (2004) (2)
- dg.o 2011 : the proceedings of the 12th annual International Digital Government Research Conference : Digital Government Innovation in Challenging Times : University of Maryland, College Park, Maryland, USA, June 12-15, 2011 (2011) (2)
- Efficiently enforcing spatiotemporal access control under uncertain location information (2011) (2)
- Editors’ message for the special issue on security (2004) (2)
- Symposium on Access Control Models and Technologies - SACMAT 2012 (2012) (1)
- Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems (1993) (1)
- ABACaaS (2019) (1)
- An Extended Transaction Model Approach for Multilevel Secure Transaction Processing (2001) (1)
- Optimal Employee Recruitment in Organizations under Attribute-Based Access Control (2021) (1)
- The Partitioned Synchronization Rule for Planar Extendible Partial Orders (1995) (1)
- Contemporaneous Update and Enforcement of ABAC Policies (2022) (1)
- Secure Workflow Transaction Processing (2000) (1)
- Structure-aware graph anonymization (2012) (1)
- Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 (2007) (1)
- Panel on granularity in access control (2013) (1)
- Employing an extended transaction model in multilevel secure transaction processing (2002) (1)
- Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling (2021) (1)
- Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 (2005) (1)
- Data and Applications Security and Privacy XXVIII (2014) (1)
- Information sharing infrastructure for pharmaceutical supply chain management in emergency response (2010) (1)
- Semantics-Based Threat Structure Mining for Homeland Security (2008) (1)
- Semantics-based threat structure mining (2006) (1)
- Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks (2005) (1)
- Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security (2008) (1)
- Efficient data management in spatial data warehouses (2006) (0)
- Geospatial Authorizations, Efficient Enforcement (2017) (0)
- Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 (2004) (0)
- Enabling Attribute-Based Access Control in Linux Kernel (2022) (0)
- Welcome to CCS 2004 (2004) (0)
- Proceedings of the IFIP WG 11.3 Thirteenth International Conference on Database Security: Research Advances in Database and Information Systems Security (1999) (0)
- Secure Resource Sharing Among Dynamic Ad-hoc Coalitions (2009) (0)
- Chapter 14 Government Agency Interoperation in Security Applications (2007) (0)
- Constituent-centric municipal government coalition portal (2006) (0)
- Secure Transaction Processing in Real-Time Databases (2000) (0)
- Session details: Mobile and Cooperative Systems (2002) (0)
- Optimal Trajectory Partitioning for Enhanced Privacy and Utility in Continuous Location Based Services (2009) (0)
- Modification of Integrity Constraints Through Knowledge Discovery (1998) (0)
- A I t e r n at i ve C o r re c t n e s s C; r i t e r i a for Concurrent Execution of Transactions in Multilevel Secure Databases (1996) (0)
- Session details: Keynote address (2012) (0)
- Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005 (2005) (0)
- Proceedings of the 16th European conference on Research in computer security (2011) (0)
- Chapter 16 UNIFORM INDEXING FOR GEOSPATIAL DATA AND AUTHORIZATIONS (2013) (0)
- Table of contents. (1982) (0)
- Integrated Resource and Logistics Management through Secure Information Sharing for Effective Emergency Response (2009) (0)
- Development of a Consortium for Water Security and Safety: Planning for an Early Warning System (2004) (0)
- Security and privacy challenges in location based service environments (2008) (0)
- Traditional Transaction Processing (2000) (0)
- Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 (2005) (0)
- Applications to Hierarchical and Replicated Databases (2000) (0)
- Mining Attribute-Based Access Control Policies from Logs (2018) (0)
- Challenges in eGovernment technology transfer (2006) (0)
- Erratum to: Research Advances in Database and Information Systems Security (2017) (0)
- Guest Editor's Introduction (2004) (0)
- Visual Analytics for Global Migration Policy Discovery and NGO Collaboration (2020) (0)
- Proceedings of the 9th ACM Conference on Computer and Communications Security 2002, Washington, DC, USA, November 18-22, 2002 (2002) (0)
- Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings (2007) (0)
- Social Media Communication of Public Sector Organizations: A Case Study of Northeast US (2019) (0)
- PASSAT 2009 Organizing and Program Committee (2009) (0)
- Preview (2010) (0)
- Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks : November 7, 2005, Alexandria, Virginia, USA (co-located with CCS 2005) (2005) (0)
- Efficient Evaluation of Authorizations for Video Data (2016) (0)
- Preface (2011) (0)
- Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain (2022) (0)
- Secure resource sharing in dynamic ad-hoc collaborations (2007) (0)
- Preface (2005) (0)
- Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004 (2004) (0)
- Enabling Attribute-Based Access Control in NoSQL Databases (2023) (0)
- Welcome to CCS 2005 (2005) (0)
- Security of Data and Transaction Processing - Guest Editor's Introduction. (2000) (0)
- Security Models, Geospatial (2008) (0)
- Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings (2008) (0)
- Session details: Privacy & compliance (2013) (0)
- 2 Role Mining with Role-Usage Cardinality Constraints (2012) (0)
- Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 (2005) (0)
- Chairs welcome letter (2011) (0)
- Recognition of partially occluded objects in content-based image retrieval (2002) (0)
- Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005 (2005) (0)
- Manifestation of Composite Multimedia Objects to Satisfy Access Control Requirements (2002) (0)
- Proceedings of the Second international conference on Information Systems Security (2006) (0)
- Detection changes to data and schema in semi-structured documents (2000) (0)
- Session details: Secure operating systems (2007) (0)
- More data, more security challenges: integrating analytics in to the information security curriculum (2014) (0)
- Session details: Role engineering (2009) (0)
- Secure Buffer Management (2000) (0)
- Dynamic manifestation of composite multimedia objects to achieve universal access (2006) (0)
- EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart (2017) (0)
- CCS 2003 : Proceedings of the 10th ACM Conference on Computer and Communications Security ; Washington, DC, USA October 27-31, 2003 (2003) (0)
- Proceedings of the 28th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy XXVIII - Volume 8566 (2014) (0)
This paper list is powered by the following services:
Other Resources About Vijay Atluri
What Schools Are Affiliated With Vijay Atluri?
Vijay Atluri is affiliated with the following schools: