Friday, September 24, 2004

Unix security

http://www.deter.com/unix/

Friday, September 10, 2004

senchun

http://www.cse.psu.edu/~szhu/


S. Zhu, S. Setia, S. Xu, S. Jajodia. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks. Proceedings of the 1st International Conference on Mobile and Ubiquitous Systems (Mobiquitous'04), Boston, Massachusetts, August 22-25, 2004.
S. Zhu, S. Setia, S. Jajodia, P. Ning. An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks. Proceedings of IEEE Symposium on Security and Privacy (S&P'04), Oakland, California, May 2004.
S. Zhu, S. Setia, S. Jajodia. LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks. Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS '03), Washington D.C. October, 2003.
S. Zhu, S. Xu, S. Setia, S. Jajodia. Establishing Pair-wise Keys For Secure Communication in Ad Hoc Networks: A Probabilistic Approach. Proceedings of the IEEE International Conference on Network Protocols (ICNP'03). Atlanta, GA, November 2003.
S. Zhu, S. Setia, S. Jajodia. Performance Optimizations for Group Key Management Schemes for Secure Multicast. Proceedings of the 23rd IEEE International Conference on Distributed Computing Systems (ICDCS'03), Providence, RI, May 2003.
S. Zhu, S. Setia, S. Jajodia. Adding Reliable and Self-Healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast. Proceedings of Networked Group Communications (NGC'03), Germany, September 2003.
S. Setia, S. Zhu, S. Jajodia. A Comparative Performance Analysis of Reliable Group Rekey Transport Protocols for Secure Multicast. In Performance Evaluation, special issue Proceedings of Performance 2002, Rome, Italy, September 2002.
Useful Links

http://www.isse.gmu.edu/~csis/faculty/pub-99.html


Sushil Jajodia List of Publications 1999 and beyond
Authored Books Edited Books Edited Proceedings
Journal Articles Conference and Workshop Articles
Book Chapters Other Articles
AUTHORED BOOKS
Peng Ning, Sushil Jajodia, X. Sean Wang, Intrusion Detection in Distributed Systems: An Abstraction-based Approach, ISBN 1-4020-7624-X, Kluwer Academic Publishers, Boston, 2003, 156 pages.
Peng Liu, Sushil Jajodia Trusted Recovery and Defensive Information Warfare, ISBN 0-7923-7572-6, Kluwer Academic Publishers, Boston, 2002, 152 pages.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, ISBN 0-7923-7204-2 Kluwer Academic Publishers, Boston, 2001, 137 pages.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Time Granularities in Databases, Data Mining, and Temporal Reasoning, ISBN 3-540-66997-3, Springer-Verlag, Berlin, July 2000, 226 pages.
Vijay Atluri, Sushil Jajodia, Binto George, Multilevel Secure Transaction Processing, ISBN 0-7923-7702-8, Kluwer Academic Publishers, Boston, November 1999, 144 pages.
EDITED BOOKS
Daniel Barbara, Sushil Jajodia, Applications of Data Mining in Computer Security, ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, 252 pages.
Paul Ammann, Bruce H. Barnes, Sushil Jajodia, Edgar H. Sibley, eds., Computer Security, Dependibility, and Assurance: From Needs to Solutions , ISBN 0-7695-0337-3, IEEE Computer Society Press, Los Alamitos (1999), 224 pages.
Return to top of the page
EDITED PROCEEDINGS
Sushil Jajodia, Leon Strous, eds., Integrity and Internal Control in Information Systems VI, ISBN 1-4020-7900-1, Kluwer Academic Publishers, Boston, 2004, 272 pages.
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, Security and Protection in Information Processing Systems, ISBN 1-4020-8142-1, Kluwer Academic Publishers, Boston, 2004, 562 pages.
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, Information Security Management, Education, and Privacy, ISBN 1-4020-8144-8, Kluwer Academic Publishers, Boston, 2004, 328 pages.
Hideko S. Kunii, Sushil Jajodia, Arne Solvberg, eds., Conceptual Modeling - ER 2001, Springer Lecture Notes in Computer Science, Volume 2224, ISBN 3-540-42866-6, Springer, Berlin (2001), 614 pages. 2001.
Sushil Jajodia and Pierangela Samarati, eds., Proc. 7th ACM Conf. on Computer and Communications Security, ISBN 1-58113-203-4, ACM Press, New York, November 2000, 256 pages.
Sushil Jajodia, ed., Database Security XII: Status and Prospects, Kluwer Academic Publishers, Boston, 1999, 320 pages.
Return to top of the page
JOURNAL ARTICLES
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Reasoning with advanced policy rules and its application to access control,” Journal of Digital Libraries, To appear.
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Cardinality-based inference control in data cubes,” Journal of Computer Security, To appear.
Kenneth Smith, Sushil Jajodia, Vipin Swarup, Jeffery Hoyt, Gail Hamilton, Donald Faatz, Todd Cornett, “Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility,” NeuroImage, Vol. 22, No. 4, August 2004, pages 1646-1656.
Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Asa Hagstrom, “Removing permissions in the Flexible Authorization Framework,” ACM Trans. on Database Systems, Vol. 28, No. 3, September 2003, pages 209-229.
Alessandro Mei, Luigi V. Mancini, Sushil Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file systems,” IEEE Trans. on Parallel and Distributed Systems, Vol. 14, No. 9, September 2003, pages 885-896.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Provisions and obligations in policy rule management,” Journal of Network and Systems Management, Vol. 11, No. 3, September 2003, pages 351-372.
Daniel Barbara, Rajni Goel, Sushil Jajodia, “A checksum-based corruption detection techniques,” Journal of Computer Security, Vol. 11, No. 3, 2003, pages 315-329.
Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325.
Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Data and Knowledge Engineering, Vol. 4, No. 2, 2003, pages 193-218.
Claudio Bettini, X. Sean Wang, and Sushil Jajodia, ``Solving multi-granularity temporal constraint networks,'' Artificial Intelligence, Vol. 140, No. 1/2, 2002, pages 107-152.
Paul Ammann, Sushil Jajodia, Peng Liu, ``Recovering from malicious transactions,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 14, No. 5, September/October 2002, pages 1167-1185.
Sanjeev Setia, Sencun Zhu, Sushil Jajodia, ``A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation, Vol. 49, No. 1-4, September 2002, pages 21-41.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, ``Temporal reasoning in workflow systems,'' Distributed and Parallel Databases, Vol. 11, No. 3, May 2002, pages 269-306.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representation of calendars,'' Annals of Mathematics and Artificial Intelligence, Vol. 36, No. 1-2, September 2002, pages 5-38.
Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Jour. of Computer Security, Vol. 10, No. 1/2, 2002, pages 137-157.
Peng Ning, Sushil Jajodia, X. Sean Wang, ``Design and implementation of a decentralized prototype system for detecting distributed attacks,'' Computer Communications, Vol. 25, No. 15, September 2002, pages 1374-1391.
Susan Chapin, Don Faatz, Sushil Jajodia, Amgad Fayad, ``Consistent policy enforcement in distributed systems using mobile policies,'' Data & Knowledge Engineering, Vol. 43, No. 3, December, 2002, pages 261-280.
Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, ``Flexible support for multiple access control policies,'' ACM Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, ``Abstraction-based intrusion detection in distributed environments,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 407-452.
Pierangela Samarati, Michael K. Reiter, Sushil Jajodia, ``An authorization model for a public key management service,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 453-482.
Peng Liu, Peng Ning, Sushil Jajodia, ``Avoiding loss of fairness owing to failures in fair data exchange systems,'' Decision Support Systems, Vol. 31, No. 3, 2001, pages 337-350.
Sushil Jajodia, Vijaylakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala, ``Multilevel secure transaction processing,'' Jour. of Computer Security, Vol. 9, No. 3, 2001, pages 165-195.
Alexander Brodsky, Csilla Farkas, Sushil Jajodia, ``Secure databases: Constraints, inference channels, and monitoring disclosures,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 900-919.
I. Ray, L. V. Mancini, S. Jajodia, E. Bertino, ``ASEP: A secure and flexible commit protocols for MLS distributed database systems,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 880-899.
Indrakshi Ray, Paul Ammann, Sushil Jajodia, ``Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity,'' Information Sciences, Vol. 129, No. 1-4, December 2000, pages 155-195.
Peng Liu, Sushil Jajodia, Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Jour. of Computer Security, Vol. 8, No. 4, 2000, 243-279.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``Modeling requests among cooperating intrusion detection systems,'' Computer Communications, Vol. 23, No. 17, November 2000, pages 1702-1715.
Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, and Elisa Bertino, ``Flexible transaction dependencies in database systems,'' Distributed and Parallel Databases, Vol. 8, No. 4, October 2000, pages 399-446.
Peng Liu, Paul Ammann, and Sushil Jajodia, ``Rewriting histories: Recovering from malicious transactions,'' Distributed and Parallel Databases, Vol. 8, No. 1, January 2000, pages 7-40.
Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia, ``Scalable threshold closure,'' Theoretical Computer Science, Vol. 226, 1999, pages 185-206.
S. Jajodia, P. Ammann, C. D. McCollum, ``Surviving information warfare attacks,'' IEEE Computer, Vol. 32, No. 4, April 1999, pages 57-63.
Sushil Jajodia, Catherine D. McCollum and Paul Ammann, ``Trusted recovery,'' Communications of the ACM, Vol. 42, No. 7, July 1999, pages 71-75.
E. Bertino, S. Jajodia, and P. Samarati, ``A flexible authorization mechanism for relational data management systems,'' ACM Trans. on Information Systems, April 1999, Vol. 17, No. 2, April 1999, pages 101-140.
Return to top of the page
ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance ratio 19/186).
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, “An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks,” Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
Shiping Chen, Duminda Wijesekera, Sushil Jajodia, “Incorporating Dynamic Constraints in the Flexible Authorization Framework,” Proc. 9th European Symp. on Research in Computer Security (ESORICS 2004), Sophia Antipolis, France, September 2004 (Acceptance ratio 27/159).
Steve Noel, Sushil Jajodia, Eric Robertson, "Correlating intrusion events and building attack scenarios through attack graph distances," Proc. 20th Annual Computer Security Applications Conference, Tucson, Arizona, December 6-10, 2004.
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, "Attribute based access control," Proc. 2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), October 2004.
Steve Noel, Sushil Jajodia, "Managing attack graph complexity through visual hierarchical aggregation" Proc. ACM Workshop on Visualization and Data Mining for Computer Security, October 2004.
Yingjiu Li, Huiping Guo, Sushil Jajodia, "Tamper detection and localization for categorical data using fragile watermarks," Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2004.
Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Identifying Sensitive Associations in Databases for Release Control," Proc. International Workshop on Secure Data Management in a Connected World, Toronto, Canada, August 2004.
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “Defending against additive attacks with maximal errors in watermarking relational databases,” Proc. 18th IFIP WG 11.3 Working Conference on Data and Application Security, Research Directions in Data and Applications Security XVIII, Csilla Farkas and Pierangela Samarati, editors, Kluwer Academic Publishers, Boston, 2004, pages 81-94 (Acceptance ratio 23/49).
Shiping Chen, Duminda Wijesekera, Sushil Jajodia, "FlexFlow: A flexible flow control policy specification framework," in Data and Applications Security XVII: Status and Prospects, Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, eds., Kluwer Academic Publishers, Boston, 2004, pages 358-371 (Acceptance ration 26/59).
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia, “GKMPAN: An efficient group rkeying scheme for secure multicast in ad-hoc networks,” Proc. First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), Boston, MA, August 22-25, 2004.
Claudio Bettini, X. Sean Wang, Sushil Jajodia, “A learning-based approach to information release control,” in Integrity and Internal Control in Information Systems VI, Sushil Jajodia, Leon Strous, eds., Kluwer Academic Publishers, Boston, 2004, pages 83-105.
Sencun Zhu, Sushil Jajodia, “Scalable group rekeying for secure multicast: A survey,” Proc. 5th International Workshop on Distributed Computing, Springer Lecture Notes in Computer Science, Vol. 2918 (Samir R. Das and Sajal K. Das, editors), 2004, pages 1-10.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 62-72 (Acceptance ratio 36/252).
Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, “Balancing confidentiality and efficiency in untrusted Relational DBMSs,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 93-102 (Acceptance ratio 36/252).
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “Constructing a virtual primary key for fingerprinting relational data, Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2003, pages 133-141 (Acceptance ratio 13/30).
Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia, “Precisely answering multidimensional range queries without privacy breach,” Proc. 8th European Symposium on Research in Computer Security (ESORICS 2003), Springer Lecture Notes in Computer Science, Volume 2808, October 2003, pages 100-115 (Acceptance ratio 19/114).
Steve Noel, Sushil Jajodia, Brian O’Berry, Mike Jacobs, “Efficient minimum-cost network hardening via exploit dependency graphs,” Proc. 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12, 2003, pages 86-95.
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “A robust watermarking scheme for relational data,” Proc. 13th Workshop on Information Technology and Systems (WITS’03), Seattle, Washington, December 2003, pages 195-200.
S. Zhu, S. Xu, S. Setia, S. Jajodia, “Establishing pair-wise keys for secure communication networks: a probabilistic approach,” Proc. 11th IEEE International Conference on Network Protocols, Atlanta, Georgia, November 4-7, 2003 (Acceptance ratio 30/230).
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, M. Finetti, S. Jajodia, “Implementation of a Storage Mechanism for Untrusted DBMSs,” Proc.IEEE Second International IEEE Security in Storage Workshop, Washington, DC, October 31, 2003.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Performance optimizations for group key management schemes for secure multicast,” Proc. IEEE 23rd Int’l. Conf. On Distributed Computing Systems, Providence, Rhode Island, May 19-22, 2003 (Acceptance ratio 72/406).
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast,” Fifth International Workshop on Networked Group Communications (NGC'03), Munich, Germany, September 16-19, 2003 (Acceptance ratio 17/51).
Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks,” Proc. International Workshop on Mobile and Wireless Networks (MWN 2003), May 2003 (Acceptance ratio 30/60).
Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle, “A user friendly guard with mobile post-release access control policy,” in Security and Privacy in the Age of Uncertainty, Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas, eds., Kluwer Academic Publishers, Boston, 2003, pages 265-276 (Acceptance ratio 33/121).
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Towards secure XML federations,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 117-131 (Acceptance ratio 25/50).
Daniel Barbara, Rajni Goel, Sushil Jajodia, ``Mining malicious data corruption with hidden markov models,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 175-189 (Acceptance ratio 25/50).
Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto, “Bootstrapping a data mining intrusion detection system,” Proc. ACM Symp. on Applied Computing (SAC), Melbourne, FL, March 2003, pages 421-425.
Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffery Hoyt, “Securely sharing neuroimagery,” Proc. ACM International Conference on Information and Knowledge Management, New Orleans, Louisiana, November 2-8, 2003, pages 375-377.
Claudio Bettini, Sushil Jajodia, Sean Wang, Duminda Wijesekera, ``Provisions and obligations in policy rule management and security applications,'' Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China, August 2002, pages 502-513 (Acceptance ratio 69/432).
Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The predicate Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Washington, DC, November 17-22, 2002, pages 171-180 (Acceptance ratio 27/161).
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Cardinality-based inference control in sum-only data cubes,'' Proc. 7th European Symposium on Research in Computer Security (ESORICS 2002), Lecture Notes in Computer Science, Vol. 2502, Zurich, Switzerland, October 14-16, 2002, pages 55-71 (Acceptance ratio 16/83).
Peng Liu, Sushil Jajodia, Paul Ammann, Jie Li, ``Can-follow concurrency control,'' Proc. IASTED Int'l. Conf. on Networks, Parallel and Distributed Processing, and Applications, Tsukuba, Japan, October 1-4, 2002.
Yingjiu Li, Senchun Zhu, Lingyu Wang, Sushil Jajodia, ``A privacy-enhanced microaggregation method,'' Proc. 2nd Int'l. Symp. on Foundations of Information and Knowledge Systems (FoIKS 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2284 (T. Eiter and K.-D. Schwe, eds), February 2002, pages 148-159. (Acceptance ratio 15/55).
Yingjiu Li, Lingyu Wang, X. Sean Wang, Sushil Jajodia, ``Auditing interval-based inference,'' Proc. 14th Conf. on Advanced Information Systems Engineering (CAiSE'02), Springer-Verlag Lecture Notes in Computer Science, Vol. 2348 (A. Banks Pidduck, J. Mylopoulos, C. C. Woo, M. Tamer Ozsu, eds.), May 2002, pages 553-568 (Acceptance ratio 42/173).
Yingjiu Li, Lingyu Wang, Sushil Jajodia, ``Preventing interval-based inference by random data perturbation,'' Proc. Workshop on Privacy Enhancing Technologies, San Francisco, CA, April 2002 (Acceptance ratio 16/47).
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, ``Obligation monitoring in policy management,'' Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, IEEE Computer Society, June 2002, pages 2-12 (Acceptance ratio 17/67).
Sushil Jajodia, Duminda Wijesekera, ``Recent advances in access control models,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 3-15.
Jackie Yang, Duminda Wijesekera, Sushil Jajodia, ``Subject switching algorithms for access control in federated databases,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 61-74.
Ravi Mukkamala, Sushil Jajodia, ``A novel approach to certificate revocation management,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 225-238.
Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Efficient and secure keys management for wireless mobile communications,’’ Proc. 2nd ACM Int’l. Workshop on Mobile Computing, Toulouse, France, October 2002, pages 66-73.
Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Secure selective exclusion in ad hoc wireless network,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 423-434.
Ken Smith, Don Faatz, Amgad Fayad, Sushil Jajodia, ``Propagating modifications to mobile policies,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 573-584.
Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The Propositional Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, November 5-8, 2001, pages 38-47 (Acceptance ratio 27/153).
Daniel Barbara, Ningning Wu, Sushil Jajodia, ``Detecting novel network intrusions using bayes estimators,'' Proc. 1st SIAM International Conference on Data Mining (SDM 2001),, Chicago, IL, April 2001.
Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera, ``Revocations - a classification,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 44-58.
Peng Liu, Sushil Jajodia, ``Multi-phase damage confinement in database systems for intrusion tolerance,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 191-205.
Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Proc. 8th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2001), Cividale del Fruily, Italy, June 2001, pages 111-118.
Amgad Fayad, Sushil Jajodia, Don Faatz, Vinti Doshi, ``Going beyond MAC and DAC using mobile policies,'' in Trusted Information - The New Decade Challenge (Michel Dupuy and Pierre Pardinas, editors), Kluwer Academic Publishers, Boston, June 2001, pages 245-260.
Yingjiu Li, X. Sean Wang, Sushil Jajodia, ``Discovering temporal patterns in multiple granularities,'' Proc. Int'l. Workshop on Temporal, Spatial, and Spatio-Temporal Data Mining, Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 2007 , 2001, pages 5-19.
Daniel Barbara, Rajni Goel, and Sushil Jajodia, ``Protecting file systems against corruption using checksums,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 113-124.
Susan Chapin, Don Faatz, Sushil Jajodia, ``Distributed policies for data management making policies mobile,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 63-75.
Daniel Barbara, Julia Couto, Sushil Jajodia, Leonard Popyack, Ningning Wu, ``ADAM: Detecting intrusions by data mining,'' Proc. IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001, pages 11-16.
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder, ``Kronos: A scalable group re-keying approach for secure multicast,'' Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance ratio 18/137).
Daniel Barbará, Rajni Goel, and Sushil Jajodia, ``Using checksums to detect data corruption,'' Proc. Conf. on Extending Database Technology, Springer Lecture Notes in Computer Science, Vol. 1777 Konstanz, Germany, March 2000, pages 136-149 (Acceptance ratio 30/180).
Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Proc. 1st Workshop on Intrusion Detection Systems, Athens, Greece, November 2000.
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean, ``Using attribute certificates with mobile policies in electronic commerce applications,'' Proc. 16th Annual Computer Security Applications Conf., New Orleans, LA, December 2000, pages 298-307.
Paul Ammann and Sushil Jajodia, ``The integrity challenge,'' Integrity and Internal Controls in Information Systems: Strategic View on the Need for the Control, (Margaret E. van Biene-Hershey and Leon Strous, eds.), Kluwer, Boston, 2000, pages 59-69.
Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia, ``CARDS: A distributed system for detecting coordinated attacks,'' in Information Security For Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security, (Sihan Qing and Jan H.P. Elof eds.), Kluwer, Boston, August 2000, pages 171-180 (Acceptance ratio 50/180).
Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``Free schedules for free agents in workflow systems,'' Proc. 7th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2000), Nova Scotia, Canada, July 2000, pages 31-37.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representations of calendars,'' Proc. AAAI Workshop on Spatial and Temporal Granularity, Austin, TX, June 2000, pages 1-8.
Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' Proc. 1st Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000.
Peng Liu, Peng Ning, Sushil Jajodia ``Avoiding loss of fairness owing to process crashes in fair data exchange protocols,'' IEEE Workshop on Dependability despite Malicious Faults, In Proc. IEEE Int'l. Conf. on Dependable Systems and Networks, New York, NY, June 2000, pages 631-640.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``Recovery from watermarks on distorted images.'' Proc. 3rd Workshop on Information Hiding, Springer-Verlag Lecture Notes in Computer Science, Vol. 1768 , 2000, pages 318-332.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``A query facility for common intrusion detection framework,'' Proc. 23rd National Information Systems Security Conf., Baltimore, MD, October 2000.
Peng Liu, Sushil Jajodia and Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 3-18.
Ravi Mukkamala, Jason Gagnon, and Sushil Jajodia, ``Integrating data mining techniques with intrusion detection,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 33-46.
Peng Liu, Paul Ammann, Sushil Jajodia, ``Incorporating transaction semantics to reduce reprocessing overhead in replicated mobile data applications,'' IEEE Int'l. Conf. on Distributed Computing Systems, 1999, pages 414-423 (Acceptance ratio 57/173).
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum, ``Application-level isolation using data inconsistency detection,'' Proc. 15th Annual Computer Security Applications Conf., Phoenix, AZ, December 1999, pages 119-126.
Sushil Jajodia, Peng Liu, Paul Ammann, ``A fault tolerance approach to survivability,'' Symp. on Protecting NATO Information Systems in the 21st Century, Washington, DC, October 1999.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``On ``fingerprinting'' images for recognition,'' Proc. 5th Int'l. Workshop on Multimedia Information Systems, Palm Springs Desert, CA, October 1999.
Return to top of the page
BOOK CHAPTERS
Sushil Jajodia, Steve Noel, Brian O’Berry, “Topological analysis of network attack vulnerability,” in Managing Cyber Threats: Issues, Approaches and Challenges, Vipin Kumar, Jaideep Srivastava and Aleksandar Lazarevic, eds., Kluwer Academic Publishers, Boston, 2004, To appear.
Sushil Jajodia, "Database security and privacy," in Computer Science Handbook, 2nd edition, Allen B. Tucker, Jr., ed., CRC Press, Boca Raton, FL, June 2004.
Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala, "Secure multicast for mobile commerce applications: Issues and challenges," in Advances in Security and Payment Methods for Mobile Commerce, Wen Chen Hu, Chung-Wei Lee, and Weidong Kou, eds., Idea Group Publishing, Hershey, PA, 2004, To appear.
Duminda Wijesekera, Sushil Jajodia, “A flexible authorization framework,” in Information Security: Policies and Actions in Modern Integrated Systems, Marigrazia Fugini and Carlo Bellettini, eds. Idea Group Publishing, Hershey, PA, 2004, pages 149-176.
Peng Ning, Sushil Jajodia, “Intrusion Detection Systems Basics,” in Handbook of Information Security, Hossein Bidgoli, ed., John Wiley, 2004.
Peng Ning, Sushil Jajodia, “Intrusion Detection Techniques,” in The Internet Encyclopedia, Hossein Bidgoli, ed., John Wiley, ISBN 0-471-22201-1, December 2003.
Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``An architecture for anomaly detection,'' in Applications of Data Mining in Computer Security, Daniel Barbara, Sushil Jajodia, eds., ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, pages 63-76.
Yingjiu Li, Ninging Wu, X. Sean Wang, and Sushil Jajodia, ``Enhancing profiles for anomaly detection using time granularities,'' in Intrusion Detection, Deborah Frincke, ed., IOS Press, Amsterdam, 2002, pages 137-157.
Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' in E-Commerce Security and Privacy, Anup Ghosh, ed., Kluwer Academic Publishers, Boston, 2001, pages 133-159.
Sabrina Di Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia, ``Database Security,'' in Encyclopedia of Software Engineering, 2nd edition, John Marciniak, ed., John Wiley, New York, 2001.
Paul Ammann, Sushil Jajodia, Peng Liu, ``A fault tolerance approach to survivability,'' in Computer Security, Dependibility, and Assurance: From Needs to Solutions , P.Ammann, B. H. Barnes, S. Jajodia, E. H. Sibley, eds., IEEE Computer Society Press, Los Alamitos (1999), pages 204-212.
Pierangela Samarati and Sushil Jajodia, ``Data Security,'' in Wiley Encyclopedia of Electrical and Electronics Engineering, Volume 4, John G. Webster, ed., John Wiley, NY, (1999) pages 743-759.
Return to top of the page

OTHER ARTICLES
Csilla Farkas and Sushil Jajodia, ``The Inference problem: A survey,’’ ACM SIGKDD Explorations, Vol. 4, No. 2, 2003, pages 6-11.
Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``ADAM: A testbed for exploring the use of data mining in intrusion detection,'' ACM SIGMOD Record, Vol. 30, No. 4, December 2001, pages 15-24.
Sushil Jajodia, Duminda Wijesekera, ``Security in Federated Database Systems,'' Information Security Technical Report, Vol. 6, No. 2, 2001, pages 69-79.
Paul Ammann and Sushil Jajodia, ``Computer security, fault Tolerance, and software assurance,'' IEEE Concurrency, Vol. 7, No. 1, January-March 1999, pages 4-6.
Return to top of the page
Return to home page

sasn04

October 25, 2004 Wyndham City Hotel, Washington DC
http://cs.gmu.edu/sasn/



TECHNICAL PROGRAM (Preliminary)

8:30-8:45 am: Opening Remarks
Sanjeev Setia and Vipin Swarup (Workshop Co-Chairs)

8:45-10:00 am: Session 1: Ad Hoc Networks (Session Chair: Vipin Swarup)

Cryptanalyzing the Proactive RSA Signature Scheme in the URSA Ad-hoc Network Access Control Protocol
Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi (University of California, Irvine)
An Advanced Signature System for OLSR (short presentation)
Cedric Adjih, Thomas Clausen, Paul Muhlethaler, Daniele Raffo (INRIA Rocquencourt)

Detection and Prevention of MAC Layer Misbehavior for Ad Hoc Networks (short presentation)
Alvaro Cardenas, Svetlana Radosavac, John S. Baras (University of Maryland, College Park)

DoS Resistant QoS Signaling for MANETs (short presentation)
Marek Hejmo, Brian Mark, Charikleia Zouridaki (George Mason University), Roshan Thomas (McAfee Research)

10:00-10:30 am: Break

10:30-12:00 pm: Session 2: Key Establishment in Sensor Networks (Session Chair: Kevin Du)

Location-aware Key Management Scheme for Wireless Sensor Networks Dijiang Huang, Manish Mehta, Deep Medhi, Lien Harn (University of Missouri, Kansas City)

Revisiting Random Key Pre-distribution for Sensor Networks Joengmin Hwang, Yongdae Kim (University of Minnesota, Minneapolis)

Connectivity Properties of Secure Wireless Sensor Networks (short presentation) Roberto Di Pietro, Luigi Mancini, Alessandro Mei, Alessandro Panconesi (University of Rome “La Sapienza”) Jaikumar Radhakrishnan (Tata Institute of Fundamental Research, Mumbai)

TinyPK: Securing Sensor Networks with Public Key Technology (short presentation) Ronald Watro, Derrick Kong, Sue-fen Cuti, Charles Gardiner, Charles Lynn, Peter Kruus (BBN Technologies)

12:00-1 pm: Lunch

1:00-2:00 pm: Invited Keynote Talk: Jack Stankovic, University of Virginia

2:00-2:15 pm: Break

2:15-3:00 pm: Invited Panel Discussion (Session Chairs: Peng Ning & Radha Poovendran)

3:00-3:15 pm: Break
3:15 - 4:30 pm: Session 3: Sensor Networks (Session Chair: Peng Ning)

Reputation-based Framework for High Integrity Sensor Networks Saurabh Ganeriwal, Mani B. Srivastava (University of California, Los Angeles)

Resilient Aggregation in Sensor Networks David Wagner (University of California, Berkeley)

Source-Location Privacy in Energy-Constrained Sensor Network Routing (short presentation) Celal Ozturk, Yanyong Zhang, Wade Trappe (Rutgers University)

4:30-4:45 pm: Break

4:45-5:45 pm: Session 4: Secure Routing in Ad hoc Networks (Session Chair: Jonathan Katz)

Towards Provable Security for Ad Hoc Routing Protocols Levente Buttyan, Istavan Vajda (Budapest University of Technology and Economics)Securing Quality-of-Service Route Discovery in On-Demand Routing for Ad Hoc Networks Yih-Chun Hu (University of California, Berkeley), David B. Johnson (Rice University)

TinyOS

Thursday, September 02, 2004

zz李开复通讯:关于一个计算机研究生人生规划的迷惑

【八阕】 http://www.popyard.org 【八阕】开复博士您好: 】看了您写给中国学生的几封信以及关于人才观的论述,我深深地被您对民族振兴、国家兴亡强烈的责任心所感动。看到您能在百忙之中抽出时间来与中国年轻学生交流,来为我们的求学、创业、人生规划指点迷津,这一切使我感悟到了您作为一位IT业的大师个人魅力的升华。毫无疑问,您为我们树立了一个真实的榜样,做学问的榜样,更是做人的老师。向您致敬! 我现在是一名二年级硕士研究生,计算机应用技术专业,教育经历是初中毕业读4年中专,然后自学专科,自学本科,其中工作4年,考研,就读于国内一所普通大学。我一直认为读书当有所成就,时间不容浪费,专业的选择以及未来人生的规划应该与自己的兴趣密切联系。借用您提供的方法,我时常静静地思考自己的人生,得出的结论是自己想成为一个在专业内有所造诣,而后在行业内从事管理和经营工作的人。但我现在的问题是: 1:估计是自己的教育经历的缘故吧,内心中充满了到名校中接受熏陶的愿望,现在的大学远远没有这种氛围。所以我想通过读博士来实现我的这个梦想,您认为这个读博士的理由可取吗? 2:鉴于对自己未来人生的定位,我想读博士仍然读计算机应用技术方向的,但我的硕导分析我说我的强项是与人交流,博士不太该读,即使读也应该读偏管理或系统工程方向的,但我认为管理的这些东西*自己平时学习和积累就可以,没必要去改一个管理的博士方向,您的意见呢? 3:读研已经一年了,虽然说方向是网络与数据库,但我感觉到这个方向太大,太泛泛,应该选种一个小的方向,做深入研究,在这个前提下拓展自己的专业和基础,但自己对专业具体方向的选择上很无助,真搞不请究竟应该选哪个?导师和实验室是做工程的,在方向上提供不了什么帮助,想听听您的建议!! 其实,这些问题我一直希望通过自己的思考能够得出答案,但半年了,反复思考也没有结果,故只有求助于您以及各位前辈为我指点迷津!如能得到您的指导,我将万分感激!

李开复的回答 首先,你为什么想读博士? 如果你是为了做研究,想成为一个优秀的研究员或教授,你可以问问自己下列的问题:
(1) Do you get more excited about inventing rather than completing?
(2) Have you ever solved programming problems with a higher degree of innovation that surprised your teachers and fellow students?
(3) Are you willing to devote your life to lonely pursuit of knowledge?
(4) Are you willing to work extremely hard on problems that may not be solvable?
(5) There is a good chance your professor will not know much in your thesis area. Are you willing to learn on your own?
如果你确定你要走研究的路,那么首选是出国读博士,其次是在国内较好的大学读博士,然后到国外做博士后。在研究方面,中国的大学和国外的大学还是有很大的距离,在国外你会接触到更优秀的教师,而且扩展你的视野(当然,不能到太差的外国学校)。看看我的“第一封信”的最后一段“你要一定什么样的博士帽?”    如果你是为了拿了博士之后,能有有更好的出路。这种想法虽然违反了博士学位的原始目标,但是在今天的中国,也无可厚非。在这种情况下,我会建议你报考较好的学校,做应用的课题,找有商业头脑的教授,尽量三年内毕业。      至于你导师对你的评语,我建议你直接去问他是在直接夸奖你的人际交往能力,还是在间接否定你的研究、技术能力。如果是后者,那你应该三思你是否真的要读博士。     
 网络和数据库是很好的结合。今天的网上都是无结构的数据。未来当网上数据库是有结构时,网络的功能会大幅度地提高。建议你做Web services方面的题目,既有研究内涵,也有商业价值。      开复