Sushil Jajodia - Publications

Affiliations: 
George Mason University, Washington, DC 
Area:
Computer Science

154 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Zhang Y, Xiao J, Hao S, Wang H, Zhu S, Jajodia S. Understanding the Manipulation on Recommender Systems through Web Injection Ieee Transactions On Information Forensics and Security. 15: 3807-3818. DOI: 10.1109/Tifs.2019.2954737  0.342
2020 Li Y, Chen Z, Wang H, Sun K, Jajodia S. Understanding Account Recovery in the Wild and Its Security Implications Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2020.2975789  0.35
2020 Chen H, Han Q, Jajodia S, Lindelauf R, Subrahmanian VS, Xiong Y. Disclose or Exploit? A Game-Theoretic Approach to Strategic Decision Making in Cyber-Warfare Ieee Systems Journal. 14: 3779-3790. DOI: 10.1109/Jsyst.2020.2964985  0.33
2019 Shah A, Farris KA, Ganesan R, Jajodia S. Vulnerability Selection for Remediation: An Empirical Analysis: The Journal of Defense Modeling and Simulation. 154851291987412. DOI: 10.1177/1548512919874129  0.388
2019 Shah A, Ganesan R, Jajodia S, Cam H. A Two-Step Approach to Optimal Selection of Alerts for Investigation in a CSOC Ieee Transactions On Information Forensics and Security. 14: 1857-1870. DOI: 10.1109/Tifs.2018.2886465  0.336
2019 Shah A, Ganesan R, Jajodia S, Cam H. Understanding Tradeoffs Between Throughput, Quality, and Cost of Alert Analysis in a CSOC Ieee Transactions On Information Forensics and Security. 14: 1155-1170. DOI: 10.1109/Tifs.2018.2871744  0.345
2019 Chakraborty T, Jajodia S, Katz J, Picariello A, Sperli G, Subrahmanian VS. FORGE: A Fake Online Repository Generation Engine for Cyber Deception Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2898661  0.325
2019 Zhang M, Wang L, Jajodia S, Singhal A. Network Attack Surface: Lifting the Concept of Attack Surface to the Network Level for Evaluating Networks' Resilience against Zero-Day Attacks Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2018.2889086  0.371
2019 Borbor D, Wang L, Jajodia S, Singhal A. Optimizing the Network Diversity to Improve the Resilience of Networks Against Unknown Attacks Computer Communications. 145: 96-112. DOI: 10.1016/J.Comcom.2019.06.004  0.353
2019 Shah A, Ganesan R, Jajodia S. A methodology for ensuring fair allocation of CSOC effort for alert investigation International Journal of Information Security. 18: 199-218. DOI: 10.1007/S10207-018-0407-3  0.313
2018 Chakraborty T, Jajodia S, Park N, Pugliese A, Serra E, Subrahmanian V. Hybrid adversarial defense: Merging honeypots and traditional security methods1 Journal of Computer Security. 26: 615-645. DOI: 10.3233/Jcs-171094  0.356
2018 Albanese M, Jajodia S. A Graphical Model to Assess the Impact of Multi-Step Attacks: The Journal of Defense Modeling and Simulation. 15: 79-93. DOI: 10.1177/1548512917706043  0.304
2018 Shah A, Ganesan R, Jajodia S, Cam H. Dynamic Optimization of the Level of Operational Effectiveness of a CSOC Under Adverse Conditions Acm Transactions On Intelligent Systems and Technology. 9: 1-20. DOI: 10.1145/3173457  0.308
2018 Jajodia S, Park N, Serra E, Subrahmanian VS. SHARE Acm Transactions On Internet Technology. 18: 1-41. DOI: 10.1145/3137571  0.372
2018 Karuna P, Purohit H, Ganesan R, Jajodia S. Generating Hard to Comprehend Fake Documents for Defensive Cyber Deception Ieee Intelligent Systems. 33: 16-25. DOI: 10.1109/Mis.2018.2877277  0.366
2017 Jajodia S, Park N, Pierazzi F, Pugliese A, Serra E, Simari GI, Subrahmanian VS. A Probabilistic Logic of Cyber Deception Ieee Transactions On Information Forensics and Security. 12: 2532-2544. DOI: 10.1109/Tifs.2017.2710945  0.379
2017 Shah A, Ganesan R, Jajodia S, Cam H. A methodology to measure and monitor level of operational effectiveness of a CSOC International Journal of Information Security. 17: 121-134. DOI: 10.1007/S10207-017-0365-1  0.308
2016 Jajodia S, Park N, Serra E, Subrahmanian V. Using temporal probabilistic logic for optimal monitoring of security events with limited resources Journal of Computer Security. 24: 735-791. DOI: 10.3233/Jcs-160555  0.35
2016 Le M, Kant K, Athamnah M, Jajodia S. Minimum cost rule enforcement for cooperative database access Journal of Computer Security. 24: 379-403. DOI: 10.3233/Jcs-160548  0.405
2016 Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Efficient integrity checks for join queries in the cloud Journal of Computer Security. 24: 347-378. DOI: 10.3233/Jcs-160545  0.393
2016 Zhang M, Wang L, Jajodia S, Singhal A, Albanese M. Network Diversity: A Security Metric for Evaluating the Resilience of Networks Against Zero-Day Attacks Ieee Transactions On Information Forensics and Security. 11: 1071-1086. DOI: 10.1109/Tifs.2016.2516916  0.415
2015 Vimercati SDCd, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Loose associations to increase utility in data publishing Journal of Computer Security. 23: 59-88. DOI: 10.3233/Jcs-140513  0.351
2015 Serra E, Jajodia S, Pugliese A, Rullo A, Subrahmanian VS. Pareto-optimal adversarial defense of enterprise systems Acm Transactions On Information and System Security. 17. DOI: 10.1145/2699907  0.396
2014 Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks: Filtering out the Attacker's Impact Ieee Transactions On Information Forensics and Security. 9: 681-694. DOI: 10.1109/Tifs.2014.2307197  0.383
2014 Wang L, Jajodia S, Singhal A, Cheng P, Noel S. K-zero day safety: A network security metric for measuring the risk of unknown vulnerabilities Ieee Transactions On Dependable and Secure Computing. 11: 30-44. DOI: 10.1109/Tdsc.2013.24  0.424
2014 Vimercati SDCd, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Fragmentation in Presence of Data Dependencies Ieee Transactions On Dependable and Secure Computing. 11: 510-523. DOI: 10.1109/Tdsc.2013.2295798  0.382
2014 Le M, Kant K, Jajodia S. Consistency and Enforcement of Access Rules in Cooperative Data Sharing Environment Computers & Security. 41: 3-18. DOI: 10.1016/J.Cose.2013.08.011  0.65
2013 Ardagna CA, Jajodia S, Samarati P, Stavrou A. Providing users' anonymity in mobile hybrid networks Acm Transactions On Internet Technology. 12. DOI: 10.1145/2461321.2461322  0.386
2013 Yang Y, Zhang Y, Wang AH, Yu M, Zang W, Liu P, Jajodia S. Quantitative survivability evaluation of three virtual machine-based server architectures Journal of Network and Computer Applications. 36: 781-790. DOI: 10.1016/J.Jnca.2012.12.006  0.306
2013 Vimercati SDCD, Foresti S, Jajodia S, Livraga G, Paraboschi S, Samarati P. Enforcing dynamic write privileges in data outsourcing Computers & Security. 39: 47-63. DOI: 10.1016/J.Cose.2013.01.008  0.408
2013 Chu Z, Gianvecchio S, Koehl A, Wang H, Jajodia S. Blog or block: Detecting blog bots through behavioral biometrics Computer Networks. 57: 634-646. DOI: 10.1016/J.Comnet.2012.10.005  0.359
2013 Zhang L, Zhang H, Conti M, Pietro R, Jajodia S, Mancini LV. Preserving privacy against external and internal threats in WSN data aggregation Telecommunication Systems. 52: 2163-2176. DOI: 10.1007/S11235-011-9539-8  0.366
2012 Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Psaila G, Samarati P. Integrating trust management and access control in data-intensive Web applications Acm Transactions On the Web. 6: 6. DOI: 10.1145/2180861.2180863  0.406
2012 Roy S, Conti M, Setia S, Jajodia S. Secure Data Aggregation in Wireless Sensor Networks Ieee Transactions On Information Forensics and Security. 7: 1040-1052. DOI: 10.1109/Tifs.2012.2189568  0.356
2012 Chu Z, Gianvecchio S, Wang H, Jajodia S. Detecting automation of Twitter accounts: Are you a human, bot, or cyborg? Ieee Transactions On Dependable and Secure Computing. 9: 811-824. DOI: 10.1109/Tdsc.2012.75  0.335
2012 Le M, Wang Z, Jia Q, Stavrou A, Ghosh AK, Jajodia S. Trading elephants for ants: Efficient post-attack reconstitution Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 96: 460-469. DOI: 10.1007/978-3-642-31909-9_27  0.302
2012 Di Mauro A, Mei A, Jajodia S. Secure file allocation and caching in large-scale distributed systems Secrypt 2012 - Proceedings of the International Conference On Security and Cryptography. 182-191.  0.321
2011 Ciriani V, Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective data outsourcing for enforcing privacy Journal of Computer Security. 19: 531-566. DOI: 10.3233/Jcs-2011-0422  0.388
2011 Vimercati SDCd, Foresti S, Jajodia S, Paraboschi S, Samarati P. Authorization enforcement in distributed query evaluation Journal of Computer Security. 19: 751-794. DOI: 10.3233/Jcs-2010-0413  0.403
2011 Locasto ME, Ghosh AK, Jajodia S, Stavrou A. Virtual extension the ephemeral legion: Producing an expert cyber-security work force from thin air Communications of the Acm. 54: 129-131. DOI: 10.1145/1866739.1866764  0.331
2011 Gabrielli A, Mancini LV, Setia S, Jajodia S. Securing Topology Maintenance Protocols for Sensor Networks Ieee Transactions On Dependable and Secure Computing. 8: 450-465. DOI: 10.1109/Tdsc.2009.46  0.335
2011 Albanese M, Jajodia S, Pugliese A, Subrahmanian VS. Scalable detection of cyber attacks Communications in Computer and Information Science. 245: 9-18. DOI: 10.1007/978-3-642-27245-5_4  0.335
2010 Ciriani V, Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Combining fragmentation and encryption to protect privacy in data storage Acm Transactions On Information and System Security. 13: 22. DOI: 10.1145/1805974.1805978  0.415
2010 Vimercati SDCD, Foresti S, Jajodia S, Paraboschi S, Samarati P. Encryption policies for regulating access to outsourced data Acm Transactions On Database Systems. 35: 12. DOI: 10.1145/1735886.1735891  0.408
2010 Zhu B, Setia S, Jajodia S, Roy S, Wang L. Localized Multicast: Efficient and Distributed Replica Detection in Large-Scale Sensor Networks Ieee Transactions On Mobile Computing. 9: 913-926. DOI: 10.1109/Tmc.2010.40  0.335
2010 Zhu B, Setia S, Jajodia S, Wang L. Providing Witness Anonymity Under Peer-to-Peer Settings Ieee Transactions On Information Forensics and Security. 5: 324-336. DOI: 10.1109/Tifs.2010.2041821  0.386
2010 Chen S, Chen S, Wang X, Zhang Z, Jajodia S. An Application-Level Data Transparent Authentication Scheme without Communication Overhead Ieee Transactions On Computers. 59: 943-954. DOI: 10.1109/Tc.2010.80  0.58
2010 Ardagna CA, Vimercati SDCD, Foresti S, Grandison TW, Jajodia S, Samarati P. Access control for smarter healthcare using policy spaces Computers & Security. 29: 848-858. DOI: 10.1016/J.Cose.2010.07.001  0.362
2010 Jajodia S, Noel S. Topological vulnerability analysis Advances in Information Security. 46: 139-154. DOI: 10.1007/978-1-4419-0140-8_7  0.353
2009 Yao C, Wang L, Wang XS, Bettini C, Jajodia S. Evaluating privacy threats in released database views by symmetric indistinguishability Journal of Computer Security. 17: 5-42. DOI: 10.3233/Jcs-2009-0317  0.387
2009 Ren K, Lou W, Zhu B, Jajodia S. Secure and Efficient Multicast in Wireless Sensor Networks Allowing Ad hoc Group Formation Ieee Transactions On Vehicular Technology. 58: 2018-2029. DOI: 10.1109/Tvt.2008.2003961  0.389
2009 Fernández-Medina E, Jurjens J, Trujillo J, Jajodia S. Editorial: Model-Driven Development for secure information systems Information & Software Technology. 51: 809-814. DOI: 10.1016/J.Infsof.2008.05.010  0.342
2009 Ardagna CA, Jajodia S, Samarati P, Stavrou A. Privacy preservation over untrusted mobile networks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5599: 84-105. DOI: 10.1007/978-3-642-03511-1_4  0.39
2009 Bettini C, Mascetti S, Wang XS, Freni D, Jajodia S. Anonymity and Historical-Anonymity in Location-Based Services Lecture Notes in Computer Science. 5599: 1-30. DOI: 10.1007/978-3-642-03511-1_1  0.363
2009 Bettini C, Jajodia S, Samarati P, Wang XS. Privacy in Location-Based Applications Lecture Notes in Computer Science. 5599. DOI: 10.1007/978-3-642-03511-1  0.323
2009 Conti M, Zhang L, Roy S, Pietro RD, Jajodia S, Mancini LV. Privacy-preserving Robust Data Aggregation in Wireless Sensor Networks Security and Communication Networks. 2: 195-213. DOI: 10.1002/Sec.95  0.343
2008 Wang L, Yao C, Singhal A, Jajodia S. Implementing interactive analysis of attack graphs using relational databases Journal of Computer Security. 16: 419-437. DOI: 10.3233/Jcs-2008-0327  0.567
2008 Chen S, Chen S, Guo H, Shen B, Jajodia S. Achieving simultaneous distribution control and privacy protection for Internet media delivery Acm Transactions On Multimedia Computing, Communications, and Applications. 4: 9. DOI: 10.1145/1352012.1352013  0.585
2008 Sengar H, Wang H, Wijesekera D, Jajodia S. Detecting voIP floods using the hellinger distance Ieee Transactions On Parallel and Distributed Systems. 19: 794-805. DOI: 10.1109/Tpds.2007.70786  0.362
2008 Noel S, Jajodia S. Optimal IDS sensor placement and alert prioritization using attack graphs Journal of Network and Systems Management. 16: 259-275. DOI: 10.1007/S10922-008-9109-X  0.307
2007 Wang L, Li Y, Jajodia S, Wijesekera D. Parity-based inference control for multi-dimensional range sum queries Journal of Computer Security. 15: 417-445. DOI: 10.3233/Jcs-2007-15401  0.528
2007 Zhu S, Setia S, Jajodia S, Ning P. Interleaved hop-by-hop authentication against false data injection attacks in sensor networks Acm Transactions On Sensor Networks. 3: 14. DOI: 10.1145/1267060.1267062  0.383
2007 Guo H, Li Y, Jajodia S. Chaining watermarks for detecting malicious modifications to streaming data Information Sciences. 177: 281-298. DOI: 10.1016/J.Ins.2006.03.014  0.572
2007 Damiani E, De Capitani di Vimercati S, Foresti S, Jajodia S, Paraboschi S, Samarati P. Selective Data Encryption in Outsourced Dynamic Environments Electronic Notes in Theoretical Computer Science. 168: 127-142. DOI: 10.1016/J.Entcs.2006.11.003  0.415
2007 Zhu S, Yao C, Liu D, Setia S, Jajodia S. Efficient security mechanisms for overlay multicast based content delivery Computer Communications. 30: 793-806. DOI: 10.1016/J.Comcom.2006.10.003  0.608
2007 Wang L, Singhal A, Jajodia S. Measuring the overall security of network configurations using attack graphs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 98-112.  0.324
2006 Zhu S, Setia S, Xu S, Jajodia S. GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks Journal of Computer Security. 14: 301-325. DOI: 10.3233/Jcs-2006-14401  0.387
2006 Zhu B, Jajodia S, Kankanhalli MS. Building trust in peer-to-peer systems: a review International Journal of Security and Networks. 1: 103-112. DOI: 10.1504/Ijsn.2006.010827  0.333
2006 Zhu S, Setia S, Jajodia S. LEAP+: Efficient security mechanisms for large-scale distributed sensor networks Acm Transactions On Sensor Networks. 2: 500-528. DOI: 10.1145/1218556.1218559  0.366
2006 Pamula J, Jajodia S, Ammann P, Swarup V. A weakest-adversary security metric for network configuration security analysis Proceedings of the 2nd Acm Workshop On Quality of Protection, Qop'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 31-38. DOI: 10.1145/1179494.1179502  0.3
2006 Chen S, Wang X, Jajodia S. On the anonymity and traceability of peer-to-peer VoIP calls Ieee Network. 20: 32-37. DOI: 10.1109/Mnet.2006.1705881  0.57
2006 Farkas C, Brodsky A, Jajodia S. Unauthorized inferences in semistructured databases Information Sciences. 176: 3269-3299. DOI: 10.1016/J.Ins.2006.01.004  0.404
2006 Guo H, Li Y, Liu A, Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations Information Sciences. 176: 1350-1378. DOI: 10.1016/J.Ins.2005.06.003  0.571
2006 Li Y, Zhu S, Wang XS, Jajodia S. Looking into the seeds of time: Discovering temporal patterns in large transaction sets Information Sciences. 176: 1003-1031. DOI: 10.1016/J.Ins.2005.01.019  0.516
2006 Wang L, Noel S, Jajodia S. Minimum-cost network hardening using attack graphs Computer Communications. 29: 3812-3824. DOI: 10.1016/J.Comcom.2006.06.018  0.36
2006 Wang L, Liu A, Jajodia S. Using attack graphs for correlating, hypothesizing, and predicting intrusion alerts Computer Communications. 29: 2917-2933. DOI: 10.1016/J.Comcom.2006.04.001  0.34
2006 Singhal A, Jajodia S. Data warehousing and data mining techniques for intrusion detection systems Distributed and Parallel Databases. 20: 149-166. DOI: 10.1007/S10619-006-9496-5  0.4
2006 Zannone N, Jajodia S, Wijesekera D. Creating objects in the flexible authorization framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 1-14. DOI: 10.1007/11805588_1  0.383
2005 Ceselli A, Damiani E, Vimercati SDCD, Jajodia S, Paraboschi S, Samarati P. Modeling and assessing inference exposure in encrypted databases Acm Transactions On Information and System Security. 8: 119-152. DOI: 10.1145/1053283.1053289  0.458
2005 Li Y, Swarup V, Jajodia S. Fingerprinting relational databases: schemes and specialties Ieee Transactions On Dependable and Secure Computing. 2: 34-45. DOI: 10.1109/Tdsc.2005.12  0.54
2005 Bettini C, Wang XS, Jajodia S. Information release control: A learning-based architecture Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3360: 176-198. DOI: 10.1007/978-3-540-30567-5_7  0.321
2004 Smith K, Jajodia S, Swarup V, Hoyt J, Hamilton G, Faatz D, Cornett T. Enabling the sharing of neuroimaging data through well-defined intermediate levels of visibility. Neuroimage. 22: 1646-56. PMID 15275921 DOI: 10.1016/J.Neuroimage.2004.03.048  0.392
2004 Wang L, Wijesekera D, Jajodia S. Cardinality-based inference control in data cubes Journal of Computer Security. 12: 655-692. DOI: 10.3233/Jcs-2004-12501  0.391
2004 Bettini C, Jajodia S, Wang XS, Wijesekera D. Reasoning with advanced policy rules and its application to access control International Journal On Digital Libraries. 4: 156-170. DOI: 10.1007/S00799-004-0078-8  0.344
2004 Zhu S, Jajodia S. Scalable Group Rekeying for Secure Multicast: A Survey Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2918: 1-10. DOI: 10.1007/978-3-540-24604-6_1  0.349
2004 Wang L, Jajodia S, Wijesekera D. Securing OLAP data cubes against privacy breaches Proceedings - Ieee Symposium On Security and Privacy. 2004: 161-175.  0.347
2003 Barbará D, Goel R, Jajodia S. A checksum-based corruption detection technique Journal of Computer Security. 11: 315-329. DOI: 10.3233/Jcs-2003-11303  0.759
2003 Wijesekera D, Jajodia S, Parisi-Presicce F, Hagström A. Removing permissions in the flexible authorization framework Acm Transactions On Database Systems. 28: 209-229. DOI: 10.1145/937598.937599  0.332
2003 Wijesekera D, Jajodia S. A propositional policy algebra for access control Acm Transactions On Information and System Security. 6: 286-325. DOI: 10.1145/762476.762481  0.335
2003 Mei A, Mancini LV, Jajodia S. Secure dynamic fragment and replica allocation in large-scale distributed file systems Ieee Transactions On Parallel and Distributed Systems. 14: 885-896. DOI: 10.1109/Tpds.2003.1233711  0.384
2003 Zhu S, Setia S, Jajodia S. Adding Reliable and Self-healing Key Distribution to the Subset Difference Group Rekeying Method for Secure Multicast Lecture Notes in Computer Science. 107-118. DOI: 10.1007/978-3-540-39405-1_10  0.378
2002 Li Y, Wu N, Sean Wang X, Jajodia S. Enhancing profiles for anomaly detection using time granularities Journal of Computer Security. 10: 137-157. DOI: 10.3233/Jcs-2002-101-206  0.636
2002 Farkas C, Jajodia S. The inference problem: a survey Sigkdd Explorations. 4: 6-11. DOI: 10.1145/772862.772864  0.371
2002 Ammann P, Jajodia S, Liu P. Recovery from malicious transactions Ieee Transactions On Knowledge and Data Engineering. 14: 1167-1185. DOI: 10.1109/Tkde.2002.1033782  0.377
2002 Ning P, Wang XS, Jajodia S. An algebraic representation of calendars Annals of Mathematics and Artificial Intelligence. 36: 5-38. DOI: 10.1023/A:1015835418881  0.303
2002 Bettini C, Wang XS, Jajodia S. Temporal reasoning in workflow systems Distributed and Parallel Databases. 11: 269-306. DOI: 10.1023/A:1014048800604  0.302
2002 Setia S, Zhu S, Jajodia S. A comparative performance analysis of reliable group rekey transport protocols for secure multicast Performance Evaluation. 49: 21-41. DOI: 10.1016/S0166-5316(02)00130-X  0.377
2002 Ning P, Jajodia S, Wang XS. Design and implementation of a decentralized prototype system for detecting distributed attacks Computer Communications. 25: 1374-1391. DOI: 10.1016/S0140-3664(02)00039-7  0.358
2002 Bettini C, Wang XS, Jajodia S. Solving multi-granularity temporal constraint networks Artificial Intelligence. 140: 107-152. DOI: 10.1016/S0004-3702(02)00223-0  0.361
2001 Samarati P, Reiter MK, Jajodia S. An authorization model for a public key management service Acm Transactions On Information and System Security. 4: 453-482. DOI: 10.1145/503339.503343  0.387
2001 Ning P, Jajodia S, Wang XS. Abstraction-based intrusion detection in distributed environments Acm Transactions On Information and System Security. 4: 407-452. DOI: 10.1145/503339.503342  0.399
2001 Jajodia S, Samarati P, Sapino ML, Subrahmanian VS. Flexible support for multiple access control policies Acm Transactions On Database Systems. 26: 214-260. DOI: 10.1145/383891.383894  0.354
2001 Jajodia S, Wijesekera D. Security in Federated Database Systems Information Security Technical Report. 6: 69-79. DOI: 10.1016/S1363-4127(01)00208-4  0.363
2001 Barbará D, Goel R, Jajodia S. Protecting file systems against corruption using checksums Ifip Advances in Information and Communication Technology. 73: 113-124.  0.352
2000 Brodsky A, Farkas C, Jajodia S. Secure databases: constraints, inference channels, and monitoring disclosures Ieee Transactions On Knowledge and Data Engineering. 12: 900-919. DOI: 10.1109/69.895801  0.39
2000 Ray I, Mancini LV, Jajodia S, Bertino E. ASEP: a secure and flexible commit protocol for MLS distributed database systems Ieee Transactions On Knowledge and Data Engineering. 12: 880-899. DOI: 10.1109/69.895800  0.4
2000 Mancini LV, Ray I, Jajodia S, Bertino E. Flexible Transaction Dependencies in Database Systems Distributed and Parallel Databases. 8: 399-446. DOI: 10.1023/A:1008738705440  0.398
2000 Liu P, Ammann P, Jajodia S. Rewriting histories: Recovering from malicious transactions Distributed and Parallel Databases. 8: 7-40. DOI: 10.1023/A:1008731200105  0.367
2000 Ning P, Wang XS, Jajodia S. Modeling requests among cooperating intrusion detection systems Computer Communications. 23: 1702-1715. DOI: 10.1016/S0140-3664(00)00256-5  0.43
2000 Ray I, Ammann P, Jajodia S. Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity Information Sciences. 129: 155-195. DOI: 10.1016/S0020-0255(00)00062-1  0.361
2000 Liu P, Jajodia S, McCollum CD. Intrusion confinement by isolation in information systems Journal of Computer Security. 8: 243-279. DOI: 10.1007/978-0-387-35508-5_1  0.366
2000 Barbara D, Goel R, Jajodia S. Using checksums to detect data corruption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1777: 136-149.  0.31
1999 Bertino E, Jajodia S, Samarati P. A flexible authorization mechanism for relational data management systems Acm Transactions On Information Systems. 17: 101-140. DOI: 10.1145/306686.306687  0.325
1999 Jajodia S, Ammann P, McCollum CD. Surviving information warfare attacks Computer. 32. DOI: 10.1109/2.755006  0.345
1999 Zhang C, Lam KY, Jajodia S. Scalable threshold closure Theoretical Computer Science. 226: 185-206. DOI: 10.1016/S0304-3975(99)00072-9  0.374
1998 Ray I, Ammann P, Jajodia S. A semantic-based transaction processing model for multilevel transactions[1]An earlier version of this paper appeared in IEEE Symposium on Security and Privacy, Oakland, CA, May 1996, pp. 74-84. Journal of Computer Security. 6: 181-217. DOI: 10.3233/Jcs-980108  0.419
1998 Wang XS, Jajodia S, Mohavni S. Temporal Mediators: Supporting Uniform Accesses To Heterogeneous Temporal Information International Journal On Artificial Intelligence Tools. 7: 319-339. DOI: 10.1142/S0218213098000159  0.335
1998 Johnson NF, Jajodia S. Steganalysis: the investigation of hidden information Information Technology. 113-116. DOI: 10.1109/It.1998.713394  0.325
1998 Ammann P, Jajodia S, Liu P. A fault tolerance approach to survivability Computational Statistics & Data Analysis. 204-212. DOI: 10.1109/Csda.1998.798367  0.329
1998 Bettini C, Wang XS, Jajodia S. Temporal semantic assumptions and their use in databases Ieee Transactions On Knowledge and Data Engineering. 10: 277-296. DOI: 10.1109/69.683757  0.408
1998 Bettini C, Wang XS, Jajodia S, Lin J-. Discovering frequent event patterns with multiple granularities in time sequences Ieee Transactions On Knowledge and Data Engineering. 10: 222-237. DOI: 10.1109/69.683754  0.311
1998 Bertino E, Jajodia S, Mancini L, Ray I. Advanced transaction processing in multilevel secure file stores Ieee Transactions On Knowledge and Data Engineering. 10: 120-135. DOI: 10.1109/69.667095  0.402
1998 Bettini C, Wang XS, Jajodia S. A general framework for time granularity and its application to temporal reasoning Annals of Mathematics and Artificial Intelligence. 22: 29-58. DOI: 10.1023/A:1018938007511  0.348
1998 Jensen CS, Dyreson CE, Bohlen M, Clifford J, Elmasri R, Gadia SK, Grandi F, Hayes P, Jajodia S, Käfer W, Kline N, Lorentzos N, Mitsopoulos Y, Montanari A, Nonen D, et al. The consensus glossary of temporal database concepts - february 1998 version Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1399: 367-405. DOI: 10.1007/Bfb0053710  0.341
1998 Wu Y, Jajodia S, Wang XS. Temporal database bibliography update Lecture Notes in Computer Science. 338-366. DOI: 10.1007/Bfb0053709  0.311
1997 Wolfson O, Jajodia S, Huang Y. An Adaptive Data Replication Algorithm Acm Transactions On Database Systems. 22: 255-314. DOI: 10.1145/249978.249982  0.328
1997 Ammann P, Jajodia S, Ray I. Applying formal methods to semantic-based decomposition of transactions Acm Transactions On Database Systems. 22: 215-254. DOI: 10.1145/249978.249981  0.397
1997 Wang XS, Bettini C, Brodsky A, Jajodia S. Logical design for temporal databases with multiple granularities Acm Transactions On Database Systems. 22: 115-170. DOI: 10.1145/249978.249979  0.324
1997 Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749  0.407
1997 Bertino E, Samarati P, Jajodia S. An extended authorization model for relational databases Ieee Transactions On Knowledge and Data Engineering. 9: 85-101. DOI: 10.1109/69.567051  0.354
1997 Ammann P, Jajodia S. Semantics-based transaction processing: Satisfying conflicting objectives Ieee Concurrency. 5: 8-10. DOI: 10.1109/4434.588269  0.344
1996 Jajodia S. Managing security and privacy of information Acm Computing Surveys. 28: 79. DOI: 10.1145/242224.242327  0.34
1996 Jajodia S. Database security and privacy Acm Computing Surveys. 28: 129-131. DOI: 10.1145/234313.234370  0.394
1996 Ammann P, Jajodia S, Frankl PG. Globally consistent event ordering in one-directional distributed environments Ieee Transactions On Parallel and Distributed Systems. 7: 665-670. DOI: 10.1109/71.506704  0.339
1996 Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034  0.452
1996 Samarati P, Bertino E, Jajodia S. An authorization model for a distributed hypertext system Ieee Transactions On Knowledge and Data Engineering. 8: 555-562. DOI: 10.1109/69.536249  0.364
1996 Smith KP, Blaustein BT, Jajodia S, Notargiacomo L. Correctness criteria for multilevel secure transactions Ieee Transactions On Knowledge and Data Engineering. 8: 32-45. DOI: 10.1109/69.485627  0.455
1995 Ammann P, Jaeckle F, Jajodia S. Concurrency control in a secure multilevel database via a two-snapshot algorithm Journal of Computer Security. 3. DOI: 10.3233/Jcs-1994/1995-32-302  0.383
1995 Ammann P, Jajodia S, Mavuluri P. On-The-FIy Reading of Entire Databases Ieee Transactions On Knowledge and Data Engineering. 7: 834-838. DOI: 10.1109/69.469836  0.362
1995 Ammann P, Jajodia S, Atluri V. The Partitioned Synchronization Rule for Planar Extendible Partial Orders Ieee Transactions On Knowledge and Data Engineering. 7: 797-808. DOI: 10.1109/69.469819  0.386
1995 Bertino E, Jajodia S, Samarati P. Database security: Research and practice Information Systems. 20: 537-556. DOI: 10.1016/0306-4379(95)00029-4  0.41
1995 Sean Wang X, Jajodia S, Subrahmanian VS. Temporal modules: An approach toward federated temporal databases Information Sciences. 82: 103-128. DOI: 10.1016/0020-0255(94)00062-G  0.32
1995 Wolfson O, Jajodia S. An algorithm for dynamic data allocation in distributed systems Information Processing Letters. 53: 113-119. DOI: 10.1016/0020-0190(94)00182-X  0.329
1993 Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404  0.439
1993 Ammann P, Jajodia S. Distributed Timestamp Generation in Planar Lattice Networks Acm Transactions On Computer Systems (Tocs). 11: 205-225. DOI: 10.1145/152864.152865  0.35
1993 Sandhu RS, Jajodia S. Limitations of relational data base access controls Information Systems Security. 2: 57-72. DOI: 10.1080/19393559308551345  0.383
1993 Jajodia S, Mukkamala R. Measuring the effect of commutative transactions on distributed database performance Information Sciences. 68: 91-111. DOI: 10.1016/0020-0255(93)90023-F  0.35
1992 Sandhu RS, Jajodia S. Eliminating polyinstantiation securely Computers and Security. 11: 547-562. DOI: 10.1016/0167-4048(92)90191-S  0.365
1991 Sandhu R, Jajodia S. Integrity principles and mechanisms in database management systems Computers and Security. 10: 413-427. DOI: 10.1016/0167-4048(91)90068-O  0.345
1991 Jajodia S, Mutchler D. A short technical paper: Determining whether a vote assignment is dominated Information Sciences. 56: 279-282. DOI: 10.1016/0020-0255(91)90034-R  0.302
1990 Jajodia S, Mutchler D. Dynamic Voting Algorithms for Maintaining the Consistency of a Replicated Database Acm Transactions On Database Systems (Tods). 15: 230-280. DOI: 10.1145/78922.78926  0.314
1989 Jajodia S, Mutchler D. A Hybrid Replica Control Algorithm Combining Static and Dynamic Voting Ieee Transactions On Knowledge and Data Engineering. 1: 459-469. DOI: 10.1109/69.43421  0.368
1989 Jajodia S, Mutchler D. A Pessimistic Consistency Control Algorithm for Replicated Files which Achieves High Availability Ieee Transactions On Software Engineering. 15: 39-46. DOI: 10.1109/32.21724  0.333
1986 Jajodia S. RECOGNIZING MULTIVALUED DEPENDENCIES IN RELATION SCHEMAS Computer Journal. 29: 458-459. DOI: 10.1093/Comjnl/29.5.458  0.316
Show low-probability matches.