Friday, September 10, 2004

http://www.isse.gmu.edu/~csis/faculty/pub-99.html


Sushil Jajodia List of Publications 1999 and beyond
Authored Books Edited Books Edited Proceedings
Journal Articles Conference and Workshop Articles
Book Chapters Other Articles
AUTHORED BOOKS
Peng Ning, Sushil Jajodia, X. Sean Wang, Intrusion Detection in Distributed Systems: An Abstraction-based Approach, ISBN 1-4020-7624-X, Kluwer Academic Publishers, Boston, 2003, 156 pages.
Peng Liu, Sushil Jajodia Trusted Recovery and Defensive Information Warfare, ISBN 0-7923-7572-6, Kluwer Academic Publishers, Boston, 2002, 152 pages.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, Information Hiding: Steganography and Watermarking - Attacks and Countermeasures, ISBN 0-7923-7204-2 Kluwer Academic Publishers, Boston, 2001, 137 pages.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Time Granularities in Databases, Data Mining, and Temporal Reasoning, ISBN 3-540-66997-3, Springer-Verlag, Berlin, July 2000, 226 pages.
Vijay Atluri, Sushil Jajodia, Binto George, Multilevel Secure Transaction Processing, ISBN 0-7923-7702-8, Kluwer Academic Publishers, Boston, November 1999, 144 pages.
EDITED BOOKS
Daniel Barbara, Sushil Jajodia, Applications of Data Mining in Computer Security, ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, 252 pages.
Paul Ammann, Bruce H. Barnes, Sushil Jajodia, Edgar H. Sibley, eds., Computer Security, Dependibility, and Assurance: From Needs to Solutions , ISBN 0-7695-0337-3, IEEE Computer Society Press, Los Alamitos (1999), 224 pages.
Return to top of the page
EDITED PROCEEDINGS
Sushil Jajodia, Leon Strous, eds., Integrity and Internal Control in Information Systems VI, ISBN 1-4020-7900-1, Kluwer Academic Publishers, Boston, 2004, 272 pages.
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, Security and Protection in Information Processing Systems, ISBN 1-4020-8142-1, Kluwer Academic Publishers, Boston, 2004, 562 pages.
Yves Deswarte, Frederic Cuppens, Sushil Jajodia, Lingyu Wang, Information Security Management, Education, and Privacy, ISBN 1-4020-8144-8, Kluwer Academic Publishers, Boston, 2004, 328 pages.
Hideko S. Kunii, Sushil Jajodia, Arne Solvberg, eds., Conceptual Modeling - ER 2001, Springer Lecture Notes in Computer Science, Volume 2224, ISBN 3-540-42866-6, Springer, Berlin (2001), 614 pages. 2001.
Sushil Jajodia and Pierangela Samarati, eds., Proc. 7th ACM Conf. on Computer and Communications Security, ISBN 1-58113-203-4, ACM Press, New York, November 2000, 256 pages.
Sushil Jajodia, ed., Database Security XII: Status and Prospects, Kluwer Academic Publishers, Boston, 1999, 320 pages.
Return to top of the page
JOURNAL ARTICLES
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Reasoning with advanced policy rules and its application to access control,” Journal of Digital Libraries, To appear.
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, “Cardinality-based inference control in data cubes,” Journal of Computer Security, To appear.
Kenneth Smith, Sushil Jajodia, Vipin Swarup, Jeffery Hoyt, Gail Hamilton, Donald Faatz, Todd Cornett, “Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility,” NeuroImage, Vol. 22, No. 4, August 2004, pages 1646-1656.
Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Asa Hagstrom, “Removing permissions in the Flexible Authorization Framework,” ACM Trans. on Database Systems, Vol. 28, No. 3, September 2003, pages 209-229.
Alessandro Mei, Luigi V. Mancini, Sushil Jajodia, “Secure dynamic fragment and replica allocation in large-scale distributed file systems,” IEEE Trans. on Parallel and Distributed Systems, Vol. 14, No. 9, September 2003, pages 885-896.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, “Provisions and obligations in policy rule management,” Journal of Network and Systems Management, Vol. 11, No. 3, September 2003, pages 351-372.
Daniel Barbara, Rajni Goel, Sushil Jajodia, “A checksum-based corruption detection techniques,” Journal of Computer Security, Vol. 11, No. 3, 2003, pages 315-329.
Duminda Wijesekera, Sushil Jajodia, ``A propositional policy algebra for access control,'' ACM Trans. on Information and System Security, Vol. 6, No. 2, May 2003, pages 286-325.
Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Data and Knowledge Engineering, Vol. 4, No. 2, 2003, pages 193-218.
Claudio Bettini, X. Sean Wang, and Sushil Jajodia, ``Solving multi-granularity temporal constraint networks,'' Artificial Intelligence, Vol. 140, No. 1/2, 2002, pages 107-152.
Paul Ammann, Sushil Jajodia, Peng Liu, ``Recovering from malicious transactions,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 14, No. 5, September/October 2002, pages 1167-1185.
Sanjeev Setia, Sencun Zhu, Sushil Jajodia, ``A comparative performance analysis of reliable group rekey transport protocols for secure multicast, Performance Evaluation, Vol. 49, No. 1-4, September 2002, pages 21-41.
Claudio Bettini, Sushil Jajodia, X. Sean Wang, ``Temporal reasoning in workflow systems,'' Distributed and Parallel Databases, Vol. 11, No. 3, May 2002, pages 269-306.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representation of calendars,'' Annals of Mathematics and Artificial Intelligence, Vol. 36, No. 1-2, September 2002, pages 5-38.
Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Jour. of Computer Security, Vol. 10, No. 1/2, 2002, pages 137-157.
Peng Ning, Sushil Jajodia, X. Sean Wang, ``Design and implementation of a decentralized prototype system for detecting distributed attacks,'' Computer Communications, Vol. 25, No. 15, September 2002, pages 1374-1391.
Susan Chapin, Don Faatz, Sushil Jajodia, Amgad Fayad, ``Consistent policy enforcement in distributed systems using mobile policies,'' Data & Knowledge Engineering, Vol. 43, No. 3, December, 2002, pages 261-280.
Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian, ``Flexible support for multiple access control policies,'' ACM Trans. on Database Systems, Vol. 26, No. 2, June 2001, pages 214-260.
Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang, ``Abstraction-based intrusion detection in distributed environments,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 407-452.
Pierangela Samarati, Michael K. Reiter, Sushil Jajodia, ``An authorization model for a public key management service,'' ACM Trans. on Information and System Security, Vol. 4, No. 4, November 2001, pages 453-482.
Peng Liu, Peng Ning, Sushil Jajodia, ``Avoiding loss of fairness owing to failures in fair data exchange systems,'' Decision Support Systems, Vol. 31, No. 3, 2001, pages 337-350.
Sushil Jajodia, Vijaylakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala, ``Multilevel secure transaction processing,'' Jour. of Computer Security, Vol. 9, No. 3, 2001, pages 165-195.
Alexander Brodsky, Csilla Farkas, Sushil Jajodia, ``Secure databases: Constraints, inference channels, and monitoring disclosures,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 900-919.
I. Ray, L. V. Mancini, S. Jajodia, E. Bertino, ``ASEP: A secure and flexible commit protocols for MLS distributed database systems,'' IEEE Trans. on Knowledge and Data Engineering, Vol. 12, No. 6, November/December 2000, pages 880-899.
Indrakshi Ray, Paul Ammann, Sushil Jajodia, ``Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity,'' Information Sciences, Vol. 129, No. 1-4, December 2000, pages 155-195.
Peng Liu, Sushil Jajodia, Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Jour. of Computer Security, Vol. 8, No. 4, 2000, 243-279.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``Modeling requests among cooperating intrusion detection systems,'' Computer Communications, Vol. 23, No. 17, November 2000, pages 1702-1715.
Luigi V. Mancini, Indrajit Ray, Sushil Jajodia, and Elisa Bertino, ``Flexible transaction dependencies in database systems,'' Distributed and Parallel Databases, Vol. 8, No. 4, October 2000, pages 399-446.
Peng Liu, Paul Ammann, and Sushil Jajodia, ``Rewriting histories: Recovering from malicious transactions,'' Distributed and Parallel Databases, Vol. 8, No. 1, January 2000, pages 7-40.
Chunru Zhang, Kwok-Yan Lam, Sushil Jajodia, ``Scalable threshold closure,'' Theoretical Computer Science, Vol. 226, 1999, pages 185-206.
S. Jajodia, P. Ammann, C. D. McCollum, ``Surviving information warfare attacks,'' IEEE Computer, Vol. 32, No. 4, April 1999, pages 57-63.
Sushil Jajodia, Catherine D. McCollum and Paul Ammann, ``Trusted recovery,'' Communications of the ACM, Vol. 42, No. 7, July 1999, pages 71-75.
E. Bertino, S. Jajodia, and P. Samarati, ``A flexible authorization mechanism for relational data management systems,'' ACM Trans. on Information Systems, April 1999, Vol. 17, No. 2, April 1999, pages 101-140.
Return to top of the page
ARTICLES IN REFEREED CONFERENCE AND WORKSHOP PROCEEDINGS
Lingyu Wang, Sushil Jajodia, Duminda Wijesekera, “Securing OLAP data cubes against privacy breaches,” Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 2004, pages 161-175 (Acceptance ratio 19/186).
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning, “An interleaved hop-by-hop authentication scheme for filtering false data injection in sensor networks,” Proc. IEEE Symp. On Security and Privacy, Oakland, CA, May 2004, pages 259-271 (Acceptance ratio 19/186).
Shiping Chen, Duminda Wijesekera, Sushil Jajodia, “Incorporating Dynamic Constraints in the Flexible Authorization Framework,” Proc. 9th European Symp. on Research in Computer Security (ESORICS 2004), Sophia Antipolis, France, September 2004 (Acceptance ratio 27/159).
Steve Noel, Sushil Jajodia, Eric Robertson, "Correlating intrusion events and building attack scenarios through attack graph distances," Proc. 20th Annual Computer Security Applications Conference, Tucson, Arizona, December 6-10, 2004.
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, "Attribute based access control," Proc. 2nd ACM Workshop on Formal Methods in Security Engineering (FMSE 2004), October 2004.
Steve Noel, Sushil Jajodia, "Managing attack graph complexity through visual hierarchical aggregation" Proc. ACM Workshop on Visualization and Data Mining for Computer Security, October 2004.
Yingjiu Li, Huiping Guo, Sushil Jajodia, "Tamper detection and localization for categorical data using fragile watermarks," Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2004.
Claudio Bettini, X. Sean Wang, Sushil Jajodia, "Identifying Sensitive Associations in Databases for Release Control," Proc. International Workshop on Secure Data Management in a Connected World, Toronto, Canada, August 2004.
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “Defending against additive attacks with maximal errors in watermarking relational databases,” Proc. 18th IFIP WG 11.3 Working Conference on Data and Application Security, Research Directions in Data and Applications Security XVIII, Csilla Farkas and Pierangela Samarati, editors, Kluwer Academic Publishers, Boston, 2004, pages 81-94 (Acceptance ratio 23/49).
Shiping Chen, Duminda Wijesekera, Sushil Jajodia, "FlexFlow: A flexible flow control policy specification framework," in Data and Applications Security XVII: Status and Prospects, Sabrina De Capitani di Vimercati, Indrakshi Ray, and Indrajit Ray, eds., Kluwer Academic Publishers, Boston, 2004, pages 358-371 (Acceptance ration 26/59).
Sencun Zhu, Sanjeev Setia, Shouhuai Xu, Sushil Jajodia, “GKMPAN: An efficient group rkeying scheme for secure multicast in ad-hoc networks,” Proc. First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous 2004), Boston, MA, August 22-25, 2004.
Claudio Bettini, X. Sean Wang, Sushil Jajodia, “A learning-based approach to information release control,” in Integrity and Internal Control in Information Systems VI, Sushil Jajodia, Leon Strous, eds., Kluwer Academic Publishers, Boston, 2004, pages 83-105.
Sencun Zhu, Sushil Jajodia, “Scalable group rekeying for secure multicast: A survey,” Proc. 5th International Workshop on Distributed Computing, Springer Lecture Notes in Computer Science, Vol. 2918 (Samir R. Das and Sajal K. Das, editors), 2004, pages 1-10.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “LEAP: Efficient security mechanisms for large-scale distributed sensor networks,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 62-72 (Acceptance ratio 36/252).
Ernesto Damiani, Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati, “Balancing confidentiality and efficiency in untrusted Relational DBMSs,” Proc. 10th ACM Conf. On Computer and Communications Security, Washington, DC, October 27-31, 2003, pages 93-102 (Acceptance ratio 36/252).
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “Constructing a virtual primary key for fingerprinting relational data, Proc. ACM Workshop on Digital Rights Management, Washington, DC, October 2003, pages 133-141 (Acceptance ratio 13/30).
Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia, “Precisely answering multidimensional range queries without privacy breach,” Proc. 8th European Symposium on Research in Computer Security (ESORICS 2003), Springer Lecture Notes in Computer Science, Volume 2808, October 2003, pages 100-115 (Acceptance ratio 19/114).
Steve Noel, Sushil Jajodia, Brian O’Berry, Mike Jacobs, “Efficient minimum-cost network hardening via exploit dependency graphs,” Proc. 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 8-12, 2003, pages 86-95.
Yingjiu Li, Vipin Swarup, Sushil Jajodia, “A robust watermarking scheme for relational data,” Proc. 13th Workshop on Information Technology and Systems (WITS’03), Seattle, Washington, December 2003, pages 195-200.
S. Zhu, S. Xu, S. Setia, S. Jajodia, “Establishing pair-wise keys for secure communication networks: a probabilistic approach,” Proc. 11th IEEE International Conference on Network Protocols, Atlanta, Georgia, November 4-7, 2003 (Acceptance ratio 30/230).
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, M. Finetti, S. Jajodia, “Implementation of a Storage Mechanism for Untrusted DBMSs,” Proc.IEEE Second International IEEE Security in Storage Workshop, Washington, DC, October 31, 2003.
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Performance optimizations for group key management schemes for secure multicast,” Proc. IEEE 23rd Int’l. Conf. On Distributed Computing Systems, Providence, Rhode Island, May 19-22, 2003 (Acceptance ratio 72/406).
Sencun Zhu, Sanjeev Setia, Sushil Jajodia, “Adding reliable and self-healing key distribution to the subset difference group rekeying method for secure multicast,” Fifth International Workshop on Networked Group Communications (NGC'03), Munich, Germany, September 16-19, 2003 (Acceptance ratio 17/51).
Sencun Zhu, Shouhuai Xu, Sanjeev Setia and Sushil Jajodia, “LHAP: A lightweight hop-by-hop authentication protocol for ad-hoc networks,” Proc. International Workshop on Mobile and Wireless Networks (MWN 2003), May 2003 (Acceptance ratio 30/60).
Douglas E. Williams, Amgad Fayad, Sushil Jajodia, Daniel Calle, “A user friendly guard with mobile post-release access control policy,” in Security and Privacy in the Age of Uncertainty, Dimitris Gritzalis, Sabrina De Capitani di Vimercati, Pierangela Samarati, Sokratis Katsikas, eds., Kluwer Academic Publishers, Boston, 2003, pages 265-276 (Acceptance ratio 33/121).
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Towards secure XML federations,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 117-131 (Acceptance ratio 25/50).
Daniel Barbara, Rajni Goel, Sushil Jajodia, ``Mining malicious data corruption with hidden markov models,'' in Research Directions in Data and Applications Security, Ehud Gudes, Sujeet Shenoi, eds., Kluwer Academic Publishers, Boston, 2003, pages 175-189 (Acceptance ratio 25/50).
Daniel Barbará, Yi Li, Jia-Ling Lin, Sushil Jajodia, Julia Couto, “Bootstrapping a data mining intrusion detection system,” Proc. ACM Symp. on Applied Computing (SAC), Melbourne, FL, March 2003, pages 421-425.
Kenneth Smith, Vipin Swarup, Sushil Jajodia, Donald B. Faatz, Todd Cornett, Jeffery Hoyt, “Securely sharing neuroimagery,” Proc. ACM International Conference on Information and Knowledge Management, New Orleans, Louisiana, November 2-8, 2003, pages 375-377.
Claudio Bettini, Sushil Jajodia, Sean Wang, Duminda Wijesekera, ``Provisions and obligations in policy rule management and security applications,'' Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China, August 2002, pages 502-513 (Acceptance ratio 69/432).
Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The predicate Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Washington, DC, November 17-22, 2002, pages 171-180 (Acceptance ratio 27/161).
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia, ``Cardinality-based inference control in sum-only data cubes,'' Proc. 7th European Symposium on Research in Computer Security (ESORICS 2002), Lecture Notes in Computer Science, Vol. 2502, Zurich, Switzerland, October 14-16, 2002, pages 55-71 (Acceptance ratio 16/83).
Peng Liu, Sushil Jajodia, Paul Ammann, Jie Li, ``Can-follow concurrency control,'' Proc. IASTED Int'l. Conf. on Networks, Parallel and Distributed Processing, and Applications, Tsukuba, Japan, October 1-4, 2002.
Yingjiu Li, Senchun Zhu, Lingyu Wang, Sushil Jajodia, ``A privacy-enhanced microaggregation method,'' Proc. 2nd Int'l. Symp. on Foundations of Information and Knowledge Systems (FoIKS 2002), Springer-Verlag Lecture Notes in Computer Science, Vol. 2284 (T. Eiter and K.-D. Schwe, eds), February 2002, pages 148-159. (Acceptance ratio 15/55).
Yingjiu Li, Lingyu Wang, X. Sean Wang, Sushil Jajodia, ``Auditing interval-based inference,'' Proc. 14th Conf. on Advanced Information Systems Engineering (CAiSE'02), Springer-Verlag Lecture Notes in Computer Science, Vol. 2348 (A. Banks Pidduck, J. Mylopoulos, C. C. Woo, M. Tamer Ozsu, eds.), May 2002, pages 553-568 (Acceptance ratio 42/173).
Yingjiu Li, Lingyu Wang, Sushil Jajodia, ``Preventing interval-based inference by random data perturbation,'' Proc. Workshop on Privacy Enhancing Technologies, San Francisco, CA, April 2002 (Acceptance ratio 16/47).
Claudio Bettini, Sushil Jajodia, X. Sean Wang, Duminda Wijesekera, ``Obligation monitoring in policy management,'' Proc. 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, IEEE Computer Society, June 2002, pages 2-12 (Acceptance ratio 17/67).
Sushil Jajodia, Duminda Wijesekera, ``Recent advances in access control models,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 3-15.
Jackie Yang, Duminda Wijesekera, Sushil Jajodia, ``Subject switching algorithms for access control in federated databases,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 61-74.
Ravi Mukkamala, Sushil Jajodia, ``A novel approach to certificate revocation management,'' in Database and Application Security XV, Martin S. Olivier and David L. Spooner, eds., Kluwer Academic Publishers, Boston, 2002, pages 225-238.
Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Efficient and secure keys management for wireless mobile communications,’’ Proc. 2nd ACM Int’l. Workshop on Mobile Computing, Toulouse, France, October 2002, pages 66-73.
Roberto Di Pietro, Luigi V. Mancini, Sushil Jajodia, ``Secure selective exclusion in ad hoc wireless network,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 423-434.
Ken Smith, Don Faatz, Amgad Fayad, Sushil Jajodia, ``Propagating modifications to mobile policies,'' in Security in the information Society: Visions and Perspectives, M. Adeeb Ghonaimy, Mahmoud T. El-Hadidi, Heba K. Aslan, eds., Kluwer Academic Publishers, Boston, 2002, pages 573-584.
Duminda Wijesekera, Sushil Jajodia, ``Policy Algebras for Access Control - The Propositional Case,'' Proc. 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, November 5-8, 2001, pages 38-47 (Acceptance ratio 27/153).
Daniel Barbara, Ningning Wu, Sushil Jajodia, ``Detecting novel network intrusions using bayes estimators,'' Proc. 1st SIAM International Conference on Data Mining (SDM 2001),, Chicago, IL, April 2001.
Asa Hagstrom, Sushil Jajodia, Francesco Parisi-Presicce, Duminda Wijesekera, ``Revocations - a classification,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 44-58.
Peng Liu, Sushil Jajodia, ``Multi-phase damage confinement in database systems for intrusion tolerance,'' Proc. 14th IEEE Computer Security Foundations Workshop, Nova Scotia, Canada, June 2001, pages 191-205.
Yingjiu Li, Peng Ning, X. Sean Wang, Sushil Jajodia, ``Discovering calendar-based temporal association rules,'' Proc. 8th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2001), Cividale del Fruily, Italy, June 2001, pages 111-118.
Amgad Fayad, Sushil Jajodia, Don Faatz, Vinti Doshi, ``Going beyond MAC and DAC using mobile policies,'' in Trusted Information - The New Decade Challenge (Michel Dupuy and Pierre Pardinas, editors), Kluwer Academic Publishers, Boston, June 2001, pages 245-260.
Yingjiu Li, X. Sean Wang, Sushil Jajodia, ``Discovering temporal patterns in multiple granularities,'' Proc. Int'l. Workshop on Temporal, Spatial, and Spatio-Temporal Data Mining, Springer-Verlag Lecture Notes in Artificial Intelligence, Vol. 2007 , 2001, pages 5-19.
Daniel Barbara, Rajni Goel, and Sushil Jajodia, ``Protecting file systems against corruption using checksums,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 113-124.
Susan Chapin, Don Faatz, Sushil Jajodia, ``Distributed policies for data management making policies mobile,'' in Data and Applications Security: Developments and Directions, Bhavani Thuraisingham, Reind van de Riet, Klaus R. Dittrich, Jahir Tari, eds. Kluwer Academic Publishers, Boston, 2001, pages 63-75.
Daniel Barbara, Julia Couto, Sushil Jajodia, Leonard Popyack, Ningning Wu, ``ADAM: Detecting intrusions by data mining,'' Proc. IEEE Workshop on Information Assurance and Security, West Point, NY, June 2001, pages 11-16.
Sanjeev Setia, Samir Koussih, Sushil Jajodia, Eric Harder, ``Kronos: A scalable group re-keying approach for secure multicast,'' Proc. IEEE Symp. on Security and Privacy, Oakland, CA, May 2000 (Acceptance ratio 18/137).
Daniel Barbará, Rajni Goel, and Sushil Jajodia, ``Using checksums to detect data corruption,'' Proc. Conf. on Extending Database Technology, Springer Lecture Notes in Computer Science, Vol. 1777 Konstanz, Germany, March 2000, pages 136-149 (Acceptance ratio 30/180).
Yingjiu Li, Ningning Wu, Sushil Jajodia, X. Sean Wang, ``Enhancing profiles for anomaly detection using time granularities,'' Proc. 1st Workshop on Intrusion Detection Systems, Athens, Greece, November 2000.
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean, ``Using attribute certificates with mobile policies in electronic commerce applications,'' Proc. 16th Annual Computer Security Applications Conf., New Orleans, LA, December 2000, pages 298-307.
Paul Ammann and Sushil Jajodia, ``The integrity challenge,'' Integrity and Internal Controls in Information Systems: Strategic View on the Need for the Control, (Margaret E. van Biene-Hershey and Leon Strous, eds.), Kluwer, Boston, 2000, pages 59-69.
Jiahai Yang, Peng Ning, X. Sean Wang, Sushil Jajodia, ``CARDS: A distributed system for detecting coordinated attacks,'' in Information Security For Global Information Infrastructures: IFIP TC11 Sixteenth Annual Working Conference on Information Security, (Sihan Qing and Jan H.P. Elof eds.), Kluwer, Boston, August 2000, pages 171-180 (Acceptance ratio 50/180).
Claudio Bettini, X. Sean Wang, Sushil Jajodia, ``Free schedules for free agents in workflow systems,'' Proc. 7th Int'l. Symp. on Temporal Representation and Reasoning (TIME 2000), Nova Scotia, Canada, July 2000, pages 31-37.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``An algebraic representations of calendars,'' Proc. AAAI Workshop on Spatial and Temporal Granularity, Austin, TX, June 2000, pages 1-8.
Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' Proc. 1st Workshop on Security and Privacy in E-Commerce, Athens, Greece, November 2000.
Peng Liu, Peng Ning, Sushil Jajodia ``Avoiding loss of fairness owing to process crashes in fair data exchange protocols,'' IEEE Workshop on Dependability despite Malicious Faults, In Proc. IEEE Int'l. Conf. on Dependable Systems and Networks, New York, NY, June 2000, pages 631-640.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``Recovery from watermarks on distorted images.'' Proc. 3rd Workshop on Information Hiding, Springer-Verlag Lecture Notes in Computer Science, Vol. 1768 , 2000, pages 318-332.
Peng Ning, X. Sean Wang, Sushil Jajodia, ``A query facility for common intrusion detection framework,'' Proc. 23rd National Information Systems Security Conf., Baltimore, MD, October 2000.
Peng Liu, Sushil Jajodia and Catherine D. McCollum, ``Intrusion confinement by isolation in information systems,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 3-18.
Ravi Mukkamala, Jason Gagnon, and Sushil Jajodia, ``Integrating data mining techniques with intrusion detection,'' Research Advances in Database and Information Systems Security, Vijay Atluri and John Hale, editors, Kluwer Publishers, Boston, 2000, pages 33-46.
Peng Liu, Paul Ammann, Sushil Jajodia, ``Incorporating transaction semantics to reduce reprocessing overhead in replicated mobile data applications,'' IEEE Int'l. Conf. on Distributed Computing Systems, 1999, pages 414-423 (Acceptance ratio 57/173).
Amgad Fayad, Sushil Jajodia, Catherine D. McCollum, ``Application-level isolation using data inconsistency detection,'' Proc. 15th Annual Computer Security Applications Conf., Phoenix, AZ, December 1999, pages 119-126.
Sushil Jajodia, Peng Liu, Paul Ammann, ``A fault tolerance approach to survivability,'' Symp. on Protecting NATO Information Systems in the 21st Century, Washington, DC, October 1999.
Neil F. Johnson, Zoran Duric, Sushil Jajodia, ``On ``fingerprinting'' images for recognition,'' Proc. 5th Int'l. Workshop on Multimedia Information Systems, Palm Springs Desert, CA, October 1999.
Return to top of the page
BOOK CHAPTERS
Sushil Jajodia, Steve Noel, Brian O’Berry, “Topological analysis of network attack vulnerability,” in Managing Cyber Threats: Issues, Approaches and Challenges, Vipin Kumar, Jaideep Srivastava and Aleksandar Lazarevic, eds., Kluwer Academic Publishers, Boston, 2004, To appear.
Sushil Jajodia, "Database security and privacy," in Computer Science Handbook, 2nd edition, Allen B. Tucker, Jr., ed., CRC Press, Boca Raton, FL, June 2004.
Mohamed Eltoweissy, Sushil Jajodia, Ravi Mukkamala, "Secure multicast for mobile commerce applications: Issues and challenges," in Advances in Security and Payment Methods for Mobile Commerce, Wen Chen Hu, Chung-Wei Lee, and Weidong Kou, eds., Idea Group Publishing, Hershey, PA, 2004, To appear.
Duminda Wijesekera, Sushil Jajodia, “A flexible authorization framework,” in Information Security: Policies and Actions in Modern Integrated Systems, Marigrazia Fugini and Carlo Bellettini, eds. Idea Group Publishing, Hershey, PA, 2004, pages 149-176.
Peng Ning, Sushil Jajodia, “Intrusion Detection Systems Basics,” in Handbook of Information Security, Hossein Bidgoli, ed., John Wiley, 2004.
Peng Ning, Sushil Jajodia, “Intrusion Detection Techniques,” in The Internet Encyclopedia, Hossein Bidgoli, ed., John Wiley, ISBN 0-471-22201-1, December 2003.
Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``An architecture for anomaly detection,'' in Applications of Data Mining in Computer Security, Daniel Barbara, Sushil Jajodia, eds., ISBN 1-4020-7054-3, Kluwer Academic Publishers, Boston, 2002, pages 63-76.
Yingjiu Li, Ninging Wu, X. Sean Wang, and Sushil Jajodia, ``Enhancing profiles for anomaly detection using time granularities,'' in Intrusion Detection, Deborah Frincke, ed., IOS Press, Amsterdam, 2002, pages 137-157.
Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian, ``Provisional authorizations,'' in E-Commerce Security and Privacy, Anup Ghosh, ed., Kluwer Academic Publishers, Boston, 2001, pages 133-159.
Sabrina Di Capitani di Vimercati, Pierangela Samarati, Sushil Jajodia, ``Database Security,'' in Encyclopedia of Software Engineering, 2nd edition, John Marciniak, ed., John Wiley, New York, 2001.
Paul Ammann, Sushil Jajodia, Peng Liu, ``A fault tolerance approach to survivability,'' in Computer Security, Dependibility, and Assurance: From Needs to Solutions , P.Ammann, B. H. Barnes, S. Jajodia, E. H. Sibley, eds., IEEE Computer Society Press, Los Alamitos (1999), pages 204-212.
Pierangela Samarati and Sushil Jajodia, ``Data Security,'' in Wiley Encyclopedia of Electrical and Electronics Engineering, Volume 4, John G. Webster, ed., John Wiley, NY, (1999) pages 743-759.
Return to top of the page

OTHER ARTICLES
Csilla Farkas and Sushil Jajodia, ``The Inference problem: A survey,’’ ACM SIGKDD Explorations, Vol. 4, No. 2, 2003, pages 6-11.
Daniel Barbara, Julia Couto, Sushil Jajodia, Ningning Wu, ``ADAM: A testbed for exploring the use of data mining in intrusion detection,'' ACM SIGMOD Record, Vol. 30, No. 4, December 2001, pages 15-24.
Sushil Jajodia, Duminda Wijesekera, ``Security in Federated Database Systems,'' Information Security Technical Report, Vol. 6, No. 2, 2001, pages 69-79.
Paul Ammann and Sushil Jajodia, ``Computer security, fault Tolerance, and software assurance,'' IEEE Concurrency, Vol. 7, No. 1, January-March 1999, pages 4-6.
Return to top of the page
Return to home page

0 Comments:

Post a Comment

<< Home