Year |
Citation |
Score |
2016 |
She W, Zhu W, Yen I, Bastani F, Thuraisingham B. Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems Ieee Transactions On Services Computing. 9: 940-953. DOI: 10.1109/Tsc.2015.2432795 |
0.411 |
|
2016 |
Thuraisingham B. Keynote speech: Cloud-centric assured information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9650: IX-X. |
0.395 |
|
2015 |
Thuraisingham B. Big data security and privacy Codaspy 2015 - Proceedings of the 5th Acm Conference On Data and Application Security and Privacy. 279-280. DOI: 10.1145/2699026.2699136 |
0.377 |
|
2015 |
Moser L, Thuraisingham B, Zhang J. Services in the Cloud Ieee Transactions On Services Computing. 8: 172-174. DOI: 10.1109/Tsc.2015.2410351 |
0.318 |
|
2015 |
Thuraisingham B, Cadenhead T, Kantarcioglu M, Khadilkar V. Design and Implementation of a Semantic Web-Based Inference Controller: A Summary Proceedings - 2015 Ieee 16th International Conference On Information Reuse and Integration, Iri 2015. 451-456. DOI: 10.1109/IRI.2015.75 |
0.31 |
|
2015 |
Thuraisingham B. Database Security: Past, Present, and Future Proceedings - 2015 Ieee International Congress On Big Data, Bigdata Congress 2015. 772-774. DOI: 10.1109/BigDataCongress.2015.128 |
0.415 |
|
2014 |
Fan L, Lu Z, Wu W, Bi Y, Wang A, Thuraisingham B. An individual-based model of information diffusion combining friends' influence Journal of Combinatorial Optimization. 28: 529-539. DOI: 10.1007/S10878-013-9677-X |
0.311 |
|
2014 |
Zhang C, Bertino E, Thuraisingham B, Joshi J. Guest editorial: Information reuse, integration, and reusable systems Information Systems Frontiers. 16: 749-752. DOI: 10.1007/S10796-014-9534-1 |
0.309 |
|
2013 |
She W, Yen I, Thuraisingham B, Bertino E. Security-Aware Service Composition with Fine-Grained Information Flow Control Ieee Transactions On Services Computing. 6: 330-343. DOI: 10.1109/Tsc.2012.3 |
0.355 |
|
2013 |
Heatherly R, Kantarcioglu M, Thuraisingham B. Preventing private information inference attacks on social networks Ieee Transactions On Knowledge and Data Engineering. 25: 1849-1862. DOI: 10.1109/Tkde.2012.120 |
0.348 |
|
2013 |
Kallberg J, Thuraisingham B. State actors' offensive cyberoperations: The disruptive power of systematic cyberattacks It Professional. 15: 32-35. DOI: 10.1109/Mitp.2013.20 |
0.346 |
|
2013 |
Hamlen KW, Thuraisingham B. Data security services, solutions and standards for outsourcing Computer Standards and Interfaces. 35: 1-5. DOI: 10.1016/J.Csi.2012.02.001 |
0.463 |
|
2013 |
Tozal ME, Wang Y, Al-Shaer E, Sarac K, Thuraisingham B, Chu BT. Adaptive information coding for secure and reliable wireless telesurgery communications Mobile Networks and Applications. 18: 697-711. DOI: 10.1007/S11036-011-0333-3 |
0.423 |
|
2012 |
Ferrari E, Thuraisingham B. Guest editors' introduction: Special section on data and applications security and privacy Ieee Transactions On Dependable and Secure Computing. 9: 625-626. DOI: 10.1109/Tdsc.2012.58 |
0.449 |
|
2012 |
Parikh P, Kantarcioglu M, Khadilkar V, Thuraisingham B, Khan L. Secure information integration with a semantic web-based framework Proceedings of the 2012 Ieee 13th International Conference On Information Reuse and Integration, Iri 2012. 659-663. DOI: 10.1109/IRI.2012.6303072 |
0.346 |
|
2012 |
Hand S, Lin Z, Gu G, Thuraisingham B. Bin-Carver: Automatic recovery of binary executable files Digital Investigation. 9. DOI: 10.1016/J.Diin.2012.05.014 |
0.33 |
|
2012 |
Lee GS, Thuraisingham B. Cyberphysical systems security applied to telesurgical robotics Computer Standards and Interfaces. 34: 225-229. DOI: 10.1016/J.Csi.2011.09.001 |
0.388 |
|
2012 |
Cadenhead T, Kantarcioglu M, Khadilkar V, Thuraisingham B. Design and implementation of a cloud-based assured information sharing system Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7531: 36-50. DOI: 10.1007/978-3-642-33704-8-4 |
0.33 |
|
2011 |
Carminati B, Thuraisingham B. Introduction to secure semantic web Computer Standards and Interfaces. 33: 1. DOI: 10.1016/J.Csi.2010.07.003 |
0.439 |
|
2011 |
Alam A, Khan L, Thuraisingham B. Geospatial Resource Description Framework (GRDF) and security constructs Computer Standards & Interfaces. 33: 35-41. DOI: 10.1016/J.Csi.2010.01.002 |
0.422 |
|
2011 |
Carminati B, Ferrari E, Heatherly R, Kantarcioglu M, Thuraisingham B. Semantic web-based social network access control Computers and Security. 30: 108-115. DOI: 10.1016/J.Cose.2010.08.003 |
0.358 |
|
2010 |
She W, Yen IL, Thuraisingham B. Enhancing security modeling for web services using delegation and pass-on International Journal of Web Services Research. 7: 1-21. DOI: 10.4018/Jwsr.2010010101 |
0.424 |
|
2010 |
Awad M, Khan L, Thuraisingham B. Policy enforcement system for inter-organizational data sharing International Journal of Information Security and Privacy. 4: 22-39. DOI: 10.4018/Jisp.2010070102 |
0.35 |
|
2010 |
Hamlen K, Kantarcioglu M, Khan L, Thuraisingham B. Security issues for cloud computing International Journal of Information Security and Privacy. 4: 36-48. DOI: 10.4018/Jisp.2010040103 |
0.42 |
|
2010 |
Thuraisingham B, Hamlen KW. Challenges and future directions of software technology: Secure software development Proceedings - International Computer Software and Applications Conference. 17-20. DOI: 10.1109/COMPSAC.2010.88 |
0.357 |
|
2010 |
Thuraisingham B, Gritzalis S. Information and communications security, privacy and trust: Standards and regulations Computer Standards and Interfaces. 32: 229. DOI: 10.1016/J.Csi.2010.04.001 |
0.39 |
|
2010 |
Ramanujam S, Gupta A, Khan L, Seida S, Thuraisingham B. Relationalization of provenance data in complex RDF reification nodes Electronic Commerce Research. 10: 389-421. DOI: 10.1007/S10660-010-9061-1 |
0.408 |
|
2010 |
Cadenhead T, Kantarcioglu M, Thuraisingham B. Scalable and efficient reasoning for enforcing role-based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 209-224. DOI: 10.1007/978-3-642-13739-6_14 |
0.328 |
|
2010 |
Thuraisingham B, Khan L, Kantarcioglu M. Semantic Web, data mining, and security Ieee Intelligent Systems. 25: 86-88. |
0.35 |
|
2009 |
Thuraisingham B, Tsybulnik N, Alam A. Administering the semantic web: Confidentiality, privacy and trust management Techniques and Applications For Advanced Information Privacy and Security: Emerging Organizational, Ethical, and Human Issues. 262-277. DOI: 10.4018/978-1-60566-210-7.ch017 |
0.33 |
|
2009 |
Thuraisingham B, Khan L, Kantarcioglu M, Hamlen K. Assured information sharing for security and intelligence applications Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558617 |
0.356 |
|
2009 |
Wu J, Manivannan D, Thuraisingham B. Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system Information Sciences. 179: 3659-3672. DOI: 10.1016/J.Ins.2009.06.016 |
0.35 |
|
2009 |
Hamlen KW, Mohan V, Masud MM, Khan L, Thuraisingham B. Exploiting an antivirus interface Computer Standards and Interfaces. 31: 1182-1189. DOI: 10.1016/J.Csi.2009.04.004 |
0.333 |
|
2009 |
Thuraisingham B. Data mining for security applications and its privacy implications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5456: 1-6. DOI: 10.1007/978-3-642-01718-6_1 |
0.334 |
|
2008 |
Yurcik W, Woolam C, Hellings G, Khan L, Thuraisingham B. The SCRUB* Security data sharing infrastructure Noms 2008 - Ieee/Ifip Network Operations and Management Symposium: Pervasive Management For Ubiquitous Networks and Services. 630-644. DOI: 10.1109/NOMS.2008.4575183 |
0.336 |
|
2008 |
Thuraisingham B. Dependable computing for national security: A position paper Proceedings - Isads 2003: 6th International Symposium On Autonomous Decentralized Systems. 333-334. DOI: 10.1109/ISADS.2003.1193967 |
0.332 |
|
2008 |
Alam A, Khan L, Thuraisingham B. Geospatial Resource Description Framework (GRDF) and security constructs Proceedings - International Conference On Data Engineering. 475-481. DOI: 10.1109/ICDEW.2008.4498363 |
0.327 |
|
2008 |
Thuraisingham B, Parikh P. Trustworthy semantic web technologies for secure knowledge management Proceedings of the 5th International Conference On Embedded and Ubiquitous Computing, Euc 2008. 2: 186-193. DOI: 10.1109/EUC.2008.174 |
0.325 |
|
2008 |
Thuraisingham B. Assured information sharing: Technologies, challenges and directions Studies in Computational Intelligence. 135: 1-15. DOI: 10.1007/978-3-540-69209-6_1 |
0.397 |
|
2007 |
Thuraisingham B, Kantarcioglu M, Iyer S. Extended RBAC-based design and implementation for a secure data warehouse International Journal of Business Intelligence and Data Mining. 2: 367-382. DOI: 10.1504/Ijbidm.2007.016379 |
0.457 |
|
2007 |
Thuraisingham B. Multimedia systems security Mm and Sec'07 - Proceedings of the Multimedia and Security Workshop 2007. 1-2. DOI: 10.1145/1288869.1288870 |
0.408 |
|
2007 |
Squicciarini A, Bertino E, Ferrari E, Paci F, Thuraisingham B. PP-trust-X: A system for privacy preserving trust negotiations Acm Transactions On Information and System Security. 10: 12. DOI: 10.1145/1266977.1266981 |
0.442 |
|
2007 |
Thuraisingham B. Confidentiality, privacy and trust policy enforcement for the semantic web Proceedings - Eighth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2007. 8-11. DOI: 10.1109/POLICY.2007.12 |
0.384 |
|
2007 |
Kim J, Thuraisingham B. Design of secure CAMIN application system based on dependable and secure TMO and RT-UCON Proceedings - 10th Ieee International Symposium On Object and Component-Oriented Real-Time Distributed Computing, Isorc 2007. 146-154. DOI: 10.1109/ISORC.2007.28 |
0.373 |
|
2007 |
Hamlen KW, Thuraisingham B. Secure peer-to-peer networks for trusted collaboration Proceedings of the 3rd International Conference On Collaborative Computing: Networking, Applications and Worksharing, Collaboratecom 2007. 58-63. DOI: 10.1109/COLCOM.2007.4553810 |
0.398 |
|
2007 |
Thuraisingham B, Iyer S. Extended RBAC - Based design and implementation for a secure data warehouse Proceedings - Second International Conference On Availability, Reliability and Security, Ares 2007. 821-828. DOI: 10.1109/ARES.2007.86 |
0.368 |
|
2007 |
She W, Thuraisingham B. Security for Enterprise Resource Planning Systems Information Systems Security. 16: 152-163. DOI: 10.1080/10658980701401959 |
0.438 |
|
2007 |
Harris D, Khan L, Paul R, Thuraisingham B. Standards for secure data sharing across organizations Computer Standards and Interfaces. 29: 86-96. DOI: 10.1016/J.Csi.2006.01.004 |
0.408 |
|
2007 |
Lavee G, Khan L, Thuraisingham B. A framework for a video analysis tool for suspicious event detection Multimedia Tools and Applications. 35: 109-123. DOI: 10.1007/S11042-007-0117-8 |
0.305 |
|
2007 |
Thuraisingham B. Security and privacy for multimedia database management systems Multimedia Tools and Applications. 33: 13-29. DOI: 10.1007/S11042-006-0096-1 |
0.471 |
|
2006 |
Abedin M, Nessa S, Khan L, Thuraisingham B. Detection and resolution of anomalies in firewall policy rules Lecture Notes in Computer Science. 15-29. DOI: 10.1007/11805588_2 |
0.34 |
|
2006 |
Agarwal P, Prabhakaran B, Thuraisingham B. Uncertainty: An extra layer of security for unauthorized traffic based web services Proceedings: Dms 2006 - 12th International Conference On Distributed Multimedia Systems. 53-58. |
0.326 |
|
2005 |
Thuraisingham B, Khan L. Secure semantic grids Web and Information Security. 91-110. DOI: 10.4018/978-1-59140-588-7.ch005 |
0.31 |
|
2005 |
Thuraisingham B. Directions for security and privacy for Semantic e-business applications Communications of the Acm. 48: 71-73. DOI: 10.1145/1101779.1101812 |
0.482 |
|
2005 |
Yau SS, Bonatti PA, Feng D, Thuraisingham B. Plenary panel session security and privacy in collaborative distributed systems Proceedings - International Computer Software and Applications Conference. 1: 267. DOI: 10.1109/COMPSAC.2005.137 |
0.376 |
|
2005 |
Thuraisingham B. Security standards for the semantic web Computer Standards and Interfaces. 27: 257-268. DOI: 10.1016/J.Csi.2004.07.002 |
0.472 |
|
2005 |
Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 99-113. DOI: 10.1007/11535706_8 |
0.431 |
|
2005 |
Song G, Zhang K, Thuraisingham B, Kong J. Secure model management operations for the web Lecture Notes in Computer Science. 237-251. DOI: 10.1007/11535706_18 |
0.45 |
|
2005 |
Thuraisingham B. Privacy-preserving data mining: Developments and directions Journal of Database Management. 16: 75-87. |
0.304 |
|
2005 |
Youn I, Farkas C, Thuraisingham B. Multilevel secure teleconferencing over public switched telephone network Lecture Notes in Computer Science. 3654: 99-113. |
0.349 |
|
2004 |
Thuraisingham B. Security and privacy issues for sensor databases Sensor Letters. 2: 37-47. DOI: 10.1166/Sl.2004.022 |
0.362 |
|
2004 |
Bertino E, Carminati B, Ferrari E, Thuraisingham B, Gupta A. Selective and authentic third-party distribution of XML documents Ieee Transactions On Knowledge and Data Engineering. 16: 1263-1278. DOI: 10.1109/Tkde.2004.63 |
0.477 |
|
2004 |
Thuraisingham B. Journal of Intelligent Information Systems: Editorial Journal of Intelligent Information Systems. 23: 207-208. DOI: 10.1023/B:Jiis.0000047391.45782.5A |
0.318 |
|
2004 |
Thuraisingham B. Data and applications security: Past, present and the future Ifip Advances in Information and Communication Technology. 142: 375-390. DOI: 10.1016/S0169-023X(02)00125-8 |
0.425 |
|
2004 |
Thuraisingham B. Data mining for security applications Proceedings of the 2004 International Conference On Machine Learning and Applications, Icmla '04. 3-4. DOI: 10.1007/11734628_1 |
0.359 |
|
2004 |
Carminati B, Ferrari E, Thuraisingham B. Using RDF for policy specification and enforcement International Conference On Database and Expert Systems Applications - Dexa. 15: 163-167. |
0.317 |
|
2004 |
Thuraisingham B. Data mining for security applications Proceedings of the 2004 International Conference On Machine Learning and Applications, Icmla '04. 3-4. |
0.359 |
|
2004 |
Ferrari E, Thuraisingham B. Security and privacy for web databases and services Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2992: 17-28. |
0.36 |
|
2003 |
Thuraisingham B. Security Issues for the Semantic Web Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 633-638. |
0.382 |
|
2002 |
Thuraisingham B. Data mining, national security, privacy and civil liberties Sigkdd Explorations. 4: 1-5. DOI: 10.1145/772862.772863 |
0.395 |
|
2002 |
Thuraisingham B. Data and applications security: Developments and directions Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 963-965. DOI: 10.1109/CMPSAC.2002.1045130 |
0.404 |
|
2002 |
Thuraisingham B, Ferrari E. Web and information security: Workshop summary Proceedings - Ieee Computer Society's International Computer Software and Applications Conference. 933. DOI: 10.1109/CMPSAC.2002.1045124 |
0.391 |
|
2002 |
Thuraisingham B. Building secure survivable semantic webs Proceedings of the International Conference On Tools With Artificial Intelligence. 395-398. |
0.306 |
|
2001 |
Dipippo LC, Wolfe VF, Esibov L, Cooper G, Bethmangalkar R, Johnston R, Thuraisingham B, Mauer J. Scheduling and priority mapping for static real-time middleware Real-Time Systems. 20: 155-182. DOI: 10.1023/A:1008189804392 |
0.325 |
|
2001 |
Thuraisingham B. Security for Distributed Databases Information Security Technical Report. 6: 95-102. DOI: 10.1016/S1363-4127(01)00210-2 |
0.301 |
|
2001 |
Clifton C, Thuraisingham B. Emerging standards for data mining Computer Standards and Interfaces. 23: 187-193. DOI: 10.1016/S0920-5489(01)00072-1 |
0.325 |
|
2001 |
Thuraisingham B. Web security and privacy Ifip Advances in Information and Communication Technology. 73: 125-126. |
0.383 |
|
2000 |
Fay-Wolfe V, DiPippo LC, Cooper G, Johnston R, Kortmann P, Thuraisingham B. Real-time CORBA Ieee Transactions On Parallel and Distributed Systems. 11: 1073-1089. DOI: 10.1109/71.888646 |
0.303 |
|
1999 |
Thuraisingham B. Towards developing a standard multilevel relational data model for representing a multilevel universe Computer Standards and Interfaces. 20: 307-321. DOI: 10.1016/S0920-5489(98)00067-1 |
0.378 |
|
1996 |
Thuraisingham B, Ting TC. Guest Editors' Introduction to the Special Issue on Secure Database Systems Technology Ieee Transactions On Knowledge and Data Engineering. 8: 1-2. DOI: 10.1109/Tkde.1996.485624 |
0.501 |
|
1996 |
Son SH, David R, Thuraisingham B. Improving Timeliness in Real-Time Secure Database Systems Sigmod Record (Acm Special Interest Group On Management of Data). 25: 29-33. |
0.364 |
|
1995 |
Thuraisingham B, Ford W. Security Constraint Processing in a Multilevel Secure Distributed Database Management System Ieee Transactions On Knowledge and Data Engineering. 7: 274-293. DOI: 10.1109/69.382297 |
0.492 |
|
1995 |
Thuraisingham B, Williams J. Introduction to the special issue on Computer security and standards: Overview of security-standards activities Computer Standards and Interfaces. 17: 313. DOI: 10.1016/0920-5489(95)00010-R |
0.421 |
|
1995 |
Thuraisingham B. Multilevel security for information retrieval systems - II Information and Management. 28: 49-61. DOI: 10.1016/0378-7206(94)00028-H |
0.469 |
|
1994 |
Thuraisingham B. Security issues for federated database systems Computers and Security. 13: 509-525. DOI: 10.1016/0167-4048(91)90139-5 |
0.475 |
|
1993 |
Thuraisingham B, Rubinovitz H. Object-oriented approach to interconnecting trusted database management systems Acm Sigsac Review. 11: 2-10. DOI: 10.1145/153949.153951 |
0.303 |
|
1993 |
Thuraisingham B, Ford W, Collins M, O'Keeffe J. Design and implementation of a database inference controller Data and Knowledge Engineering. 11: 271-297. DOI: 10.1016/0169-023X(93)90025-K |
0.36 |
|
1993 |
Rubinovitz H, Thuraisingham B. Design and implementation of a query processor for a trusted distributed data base management system The Journal of Systems and Software. 21: 49-69. DOI: 10.1016/0164-1212(93)90017-R |
0.478 |
|
1992 |
Thuraisingham B. Secure interoperability of trusted database management systems Acm Sigsac Review. 10: 8-11. DOI: 10.1145/147092.147094 |
0.411 |
|
1992 |
Thuraisingham B, Rubinovitz HH. Multilevel security issues in distributed database management systems-III Computers and Security. 11: 661-674. DOI: 10.1016/0167-4048(92)90146-I |
0.336 |
|
1991 |
Thuraisingham B. Multilevel security issues in distributed database management systems II Computers and Security. 10: 727-747. DOI: 10.1016/0167-4048(91)90093-S |
0.491 |
|
1990 |
Thuraisingham B. Computing Transitive Closures of Multilevel Relations Acm Sigmod Record. 19: 17-23. DOI: 10.1145/101077.101081 |
0.337 |
|
1990 |
Stachour PD, Thuraisingham B. Design of LDV: A Multilevel Secure Relational Database Management System Ieee Transactions On Knowledge and Data Engineering. 2: 190-209. DOI: 10.1109/69.54719 |
0.482 |
|
1990 |
Stachour P, Thuraisingham B. SQL extensions for security assertions Computer Standards and Interfaces. 11: 5-14. DOI: 10.1016/0920-5489(90)90067-P |
0.44 |
|
Show low-probability matches. |