dblp.uni-trier.dewww.uni-trier.de

Vijayalakshmi Atluri Vis

Vijay Atluri

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
139EEHeechang Shin, Vijayalakshmi Atluri: Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. DBSec 2009: 159-174
138EEHaibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya: An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647
137EESamrat Mondal, Shamik Sural, Vijayalakshmi Atluri: Towards formal security analysis of GTRBAC using timed automata. SACMAT 2009: 33-42
136EEVandana Pursnani Janeja, Vijayalakshmi Atluri: Spatial outlier detection in heterogeneous neighborhoods. Intell. Data Anal. 13(1): 85-107 (2009)
135EEJaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu: Edge-RMP: Minimizing administrative assignments for role-based access control. Journal of Computer Security 17(2): 211-235 (2009)
134EEDihua Guo, Hui Xiong, Vijayalakshmi Atluri, Nabil R. Adam: Object discovery in high-resolution remote sensing images: a semantic perspective. Knowl. Inf. Syst. 19(2): 211-233 (2009)
2008
133 Vijay Atluri, Marianne Winslett: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008 ACM 2008
132 Vijay Atluri: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings Springer 2008
131EEQi Guo, Jaideep Vaidya, Vijayalakshmi Atluri: The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ACSAC 2008: 237-246
130EENabil R. Adam, Vijay Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, Hui Xiong: Secure information sharing and analysis for effective emergency management. DG.O 2008: 407-408
129EEHaibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri: Optimal Boolean Matrix Decomposition: Application to Role Engineering. ICDE 2008: 297-306
128EEHeechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya: A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. MDM 2008: 73-80
127EEJaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam: Migrating to optimal RBAC with minimal perturbation. SACMAT 2008: 11-20
126EEDavid F. Ferraiolo, Vijay Atluri: A meta model for access control: why is it needed and is it even possible to achieve? SACMAT 2008: 153-154
125EEVijay Atluri: Panel on role engineering. SACMAT 2008: 61-62
124EESoon Ae Chun, Vijay Atluri: Security Models, Geospatial. Encyclopedia of GIS 2008: 1028-1036
123EEVijay Atluri, Heechang Shin: Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2008: 379-385
122EEVandana Pursnani Janeja, Vijayalakshmi Atluri: Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. IEEE Trans. Knowl. Data Eng. 20(10): 1378-1392 (2008)
121EEVijayalakshmi Atluri, Heechang Shin, Jaideep Vaidya: Efficient security policy enforcement for the mobile environment. Journal of Computer Security 16(4): 439-475 (2008)
2007
120 Peng Ning, Vijay Atluri: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
119 Peng Ning, Vijay Atluri, Virgil D. Gligor, Heiko Mantel: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007 ACM 2007
118 Peng Ning, Vijay Atluri, Shouhuai Xu, Moti Yung: Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007 ACM 2007
117EEVijayalakshmi Atluri, Heechang Shin: Efficient Security Policy Enforcement in a Location Based Service Environment. DBSec 2007: 61-76
116EESoon Ae Chun, Nabil R. Adam, Vijay Atluri: MENVIS: mobile environmental information system. DG.O 2007: 286-287
115EEDihua Guo, Hui Xiong, Vijay Atluri, Nabil R. Adam: Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery. PAKDD 2007: 71-83
114EEJaideep Vaidya, Vijayalakshmi Atluri, Qi Guo: The role mining problem: finding a minimal descriptive set of roles. SACMAT 2007: 175-184
113EEJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya: Using semantics for automatic enforcement of access control policies among dynamic coalitions. SACMAT 2007: 235-244
112EEVijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni: A decentralized execution model for inter-organizational workflows. Distributed and Parallel Databases 22(1): 55-83 (2007)
2006
111 Aditya Bagchi, Vijayalakshmi Atluri: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings Springer 2006
110EEJaideep Vaidya, Vijayalakshmi Atluri, Janice Warner: RoleMiner: mining roles using subset enumeration. ACM Conference on Computer and Communications Security 2006: 144-153
109EEPrasenjit Mitra, Chi-Chun Pan, Peng Liu, Vijayalakshmi Atluri: Privacy-preserving semantic interoperation and access control of heterogeneous databases. ASIACCS 2006: 66-77
108EERavi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari: A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. DBSec 2006: 209-223
107EEVijayalakshmi Atluri, Heechang Shin: Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. DBSec 2006: 237-251
106EESongmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse. DEXA 2006: 439-448
105EENabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner: Secure interoperation for effective data mining in border control and homeland security applications. DG.O 2006: 124-125
104EESoon Ae Chun, Yelena Yesha, Nabil R. Adam, Vijay Atluri: Challenges in eGovernment technology transfer. DG.O 2006: 151-152
103EENabil R. Adam, Vijay Atluri, Soon Ae Chun, Francisco J. Artigas, Irfan Bora, Bob Ceberio: Constituent-centric municipal government coalition portal. DG.O 2006: 365-366
102EENabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, J. Cooper, J. Paczkowski, Christof Bornhövd, I. Nassi, Joachim Schaper: Semantics-based threat structure mining. DG.O 2006: 367-368
101EESongmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Preview: Optimizing View Materialization Cost in Spatial Data Warehouses. DaWaK 2006: 45-54
100EEMahmoud Youssef, Nabil R. Adam, Vijayalakshmi Atluri: Semantically enhanced enforcement of mobile consumer's privacy preferences. SAC 2006: 1172-1176
99EEJanice Warner, Vijayalakshmi Atluri: Inter-instance authorization constraints for secure workflow management. SACMAT 2006: 190-199
98EELi Qin, Vijayalakshmi Atluri: SemDiff: An Approach to Detecting Semantic Changes to Ontologies. Int. J. Semantic Web Inf. Syst. 2(4): 1-32 (2006)
97EELi Qin, Vijayalakshmi Atluri: An Ontology-Guided Approach to Change Detection of the Semantic Web Data. J. Data Semantics V: 130-157 (2006)
2005
96 Vijay Atluri, Catherine Meadows, Ari Juels: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005 ACM 2005
95 Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
94 Vijay Atluri, Sabrina De Capitani di Vimercati, Roger Dingledine: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005
93 Vijay Atluri, Pierangela Samarati, Ralf Küsters, John C. Mitchell: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
92 Vijay Atluri, Pierangela Samarati, Atsuhiro Goto: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005 ACM 2005
91 Vijay Atluri, Peng Ning, Wenliang Du: Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005 ACM 2005
90 Vijay Atluri, Angelos D. Keromytis: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005 ACM Press 2005
89EEDong-Ho Kim, Il Im, Vijayalakshmi Atluri: A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce. CEC 2005: 84-91
88EEJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. DBSec 2005: 252-266
87EEVandana Pursnani Janeja, Vijayalakshmi Atluri, Ahmed Gomaa, Nabil R. Adam, Christof Bornhövd, Tao Lin: DM-AMS: employing data mining techniques for alert management. DG.O 2005: 103-111
86EENabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun, Patrizia Fariselli, Julia Culver-Hopper, Olana Bojic, Rick T. Stewart, Jim Fruscione, Nick Mannochio: Technology transfer of inter-agency government services and their transnational feasibility studies. DG.O 2005: 225-226
85EENabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal: Agency interoperation for effective data mining in border control and homeland security applications. DG.O 2005: 285-286
84EESongmei Yu, Vijayalakshmi Atluri, Nabil R. Adam: Selective View Materialization in a Spatial Data Warehouse. DaWaK 2005: 157-167
83EEVijayalakshmi Atluri, Qi Guo: Unified Index for Mobile Object Data and Authorizations. ESORICS 2005: 80-97
82EEVandana Pursnani Janeja, Vijayalakshmi Atluri: FS3: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection. ICDM 2005: 661-664
81EEJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ICISS 2005: 134-147
80EEDihua Guo, Vijayalakshmi Atluri, Nabil R. Adam: Texture-Based Remote-Sensing Image Segmentation. ICME 2005: 1472-1475
79EEAhmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri: Adapting spatial constraints of composite multimedia objects to achieve universal access. IPCCC 2005: 519-525
78EEVandana Pursnani Janeja, Vijayalakshmi Atluri, Jaideep Vaidya, Nabil R. Adam: Collusion Set Detection Through Outlier Discovery. ISI 2005: 1-13
77EEAhmed Gomaa, Nabil R. Adam, Vijayalakshmi Atluri: Color Time Petri Net for Interactive Adaptive Multimedia Objects. MMM 2005: 147-157
76EEMahmoud Youssef, Vijayalakshmi Atluri, Nabil R. Adam: Preserving mobile customer privacy: an access control system for moving objects and customer profiles. Mobile Data Management 2005: 67-76
75EEVandana Pursnani Janeja, Vijayalakshmi Atluri: LS3: a Linear Semantic Scan Statistic technique for detecting anomalous windows. SAC 2005: 493-497
74EEVijayalakshmi Atluri, Janice Warner: Supporting conditional delegation in secure workflow management systems. SACMAT 2005: 49-58
73EEVijay Atluri: Preface. ACM Trans. Inf. Syst. Secur. 8(1): 2 (2005)
72EESoon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Using Semantics for Policy-Based Web Service Composition. Distributed and Parallel Databases 18(1): 37-64 (2005)
2004
71 Vijayalakshmi Atluri, Birgit Pfitzmann, Patrick Drew McDaniel: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004 ACM 2004
70 Vijay Atluri: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004 ACM 2004
69 Vijayalakshmi Atluri, Michael Backes, David A. Basin, Michael Waidner: Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004 ACM 2004
68 Vijay Atluri, Paul F. Syverson, Sabrina De Capitani di Vimercati: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004 ACM 2004
67 Vijayalakshmi Atluri, Qi Guo: STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. DBSec 2004: 31-47
66EENabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja: Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications. DG.O 2004
65EEVandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam: Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations. DG.O 2004
64EENabil R. Adam, Vijayalakshmi Atluri, Soon Ae Chun: Human-Centered Systems for Business Services. DG.O 2004
63EELi Qin, Vijayalakshmi Atluri: Ontology-Guided Change Detection to the Semantic Web Data. ER 2004: 624-638
62EEVijayalakshmi Atluri, Janice Warner: Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. ICDCIT 2004: 369-378
61EESoon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Policy-Based Web Service Composition. RIDE 2004: 85-92
60EENabil R. Adam, Vandana Pursnani Janeja, Vijayalakshmi Atluri: Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets. SAC 2004: 576-583
59EEDong-Ho Kim, Il Im, Vijayalakshmi Atluri, Michael Bieber, Nabil R. Adam, Yelena Yesha: A clickstream-based collaborative filtering personalization model: towards a better performance. WIDM 2004: 88-95
58EEVijayalakshmi Atluri, Soon Ae Chun: An Authorization Model for Geospatial Data. IEEE Trans. Dependable Sec. Comput. 1(4): 238-254 (2004)
57EEVijayalakshmi Atluri, Indrakshi Ray: Editors' message for the special issue on security. Int. J. on Digital Libraries 4(3): 137-138 (2004)
56 Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni: Chinese wall security for decentralized workflow management systems. Journal of Computer Security 12(6): 799-840 (2004)
2003
55 Sushil Jajodia, Vijayalakshmi Atluri, Trent Jaeger: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003 ACM 2003
54 Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni: Supporting Delegation in Secure Workflow Management Systems. DBSec 2003: 190-202
53EEVijayalakshmi Atluri, Soon Ae Chun: Handling Dynamic Changes in Decentralized Workflow Execution Environments. DEXA 2003: 813-825
52EEAabhas V. Paliwal, Nabil R. Adam, Vijayalakshmi Atluri: Electronic Negotiation of Government Contracts through Transducers. DG.O 2003
51EESoon Ae Chun, Vijayalakshmi Atluri: Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery. DG.O 2003
50EELi Qin, Vijayalakshmi Atluri: An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories. EC-Web 2003: 227-236
49 Vijayalakshmi Atluri, Nabil R. Adam, Ahmed Gomaa, Igg Adiwijaya: Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints. SAC 2003: 927-934
48EELi Qin, Vijayalakshmi Atluri: Concept-level access control for the Semantic Web. XML Security 2003: 94-103
47EEVijay Atluri, Anupam Joshi, Yelena Yesha: Guest editorial. VLDB J. 12(4): 285 (2003)
2002
46 Vijayalakshmi Atluri: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18-22, 2002 ACM 2002
45 Vijayalakshmi Atluri, Pietro Mazzoleni: Uniform Indexing for Geospatial Data and Authorizations. DBSec 2002: 207-218
44EESoon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Domain Knowledge-Based Automatic Workflow Generation. DEXA 2002: 81-92
43EESoon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam: Dynamic Composition of Workflows for Customized eGovernment Service Delivery. DG.O 2002
42EEVandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam: OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. DG.O 2002
41EEAvigdor Gal, Vijayalakshmi Atluri, Gang Xu: An Authorization System for Temporal Data. ICDE 2002: 339-340
40EEVijayalakshmi Atluri, Avigdor Gal: An authorization model for temporal and derived data: securing information portals. ACM Trans. Inf. Syst. Secur. 5(1): 62-94 (2002)
39EENabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari: A Content-Based Authorization Model for Digital Libraries. IEEE Trans. Knowl. Data Eng. 14(2): 296-315 (2002)
38 Vijayalakshmi Atluri, Ravi Mukkamala: Employing an extended transaction model in multilevel secure transaction processing. Informatica (Slovenia) 26(2): (2002)
37EEElena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo: An authorization system for digital libraries. VLDB J. 11(1): 58-67 (2002)
2001
36EEVijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzoleni: A Chinese wall security model for decentralized workflow systems. ACM Conference on Computer and Communications Security 2001: 48-57
35 Richard D. Holowczak, Soon Ae Chun, Francisco J. Artigas, Vijayalakshmi Atluri: Customized Geospatial Workflows for E-Government Services. ACM-GIS 2001: 64-69
34 Vijayalakshmi Atluri, Ravi Mukkamala: An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. DBSec 2001: 255-268
33 Chiara Ghirardini, Soon Ae Chun, Vijayalakshmi Atluri, Ibrahim Kamel, Nabil R. Adam: A Study on the Indexing of Satellite Images at NASA Regional Application Center. DEXA Workshop 2001: 859-864
32 Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri: Modeling and Evaluation of Distributed Workflow Algorithms. ISAS-SCI (1) 2001: 183-188
31EENabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya, Sujata Banerjee, Richard D. Holowczak: A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects. IEEE Trans. Knowl. Data Eng. 13(4): 705-716 (2001)
30 Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001)
2000
29 Vijayalakshmi Atluri, John Hale: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA Kluwer 2000
28EEAvigdor Gal, Vijayalakshmi Atluri: An authorization model for temporal data. ACM Conference on Computer and Communications Security 2000: 144-153
27 Soon Ae Chun, Vijayalakshmi Atluri: Protecting Privacy from Continuous High-resolution Satellite Surveillance. DBSec 2000: 233-244
26 Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold: Panel. DBSec 2000: 373
25EEVijayalakshmi Atluri, Ravi Mukkamala: Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. MASCOTS 2000: 248-
24EENabil R. Adam, Vijayalakshmi Atluri, Igg Adiwijaya: SI in Digital Libraries. Commun. ACM 43(6): 64-72 (2000)
23EEVijayalakshmi Atluri, Pierangela Samarati: Security of Data and Transaction Processing - Guest Editor's Introduction. Distributed and Parallel Databases 8(1): 5-6 (2000)
22 Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino: A Semantic-Based Execution Model for Multilevel Secure Workflows. Journal of Computer Security 8(1): (2000)
21 Vijayalakshmi Atluri, Wei-kuang Huang: A Petri Net Based Safety Analysis of Workflow Authorization Models. Journal of Computer Security 8(2/3): (2000)
1999
20EEWei-kuang Huang, Vijayalakshmi Atluri: SecureFlow: A Secure Web-Enabled Workflow Management System. ACM Workshop on Role-Based Access Control 1999: 83-94
19EEElisa Bertino, Elena Ferrari, Vijayalakshmi Atluri: The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. ACM Trans. Inf. Syst. Secur. 2(1): 65-104 (1999)
1998
18 Vijayalakshmi Atluri, David L. Spooner: Workshop Summary. DBSec 1998: 287-293
17 Wei-kuang Huang, Vijayalakshmi Atluri: Analysing the Safety of Workflow Authorization Models. DBSec 1998: 43-57
16 Vijayalakshmi Atluri: Modification of Integrity Constraints Through Knowledge Discovery. IICIS 1998: 191-209
15 Nabil R. Adam, Vijayalakshmi Atluri, Wei-kuang Huang: Modeling and Analysis of Workflows Using Petri Nets. J. Intell. Inf. Syst. 10(2): 131-158 (1998)
1997
14EEElisa Bertino, Elena Ferrari, Vijayalakshmi Atluri: A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ACM Workshop on Role-Based Access Control 1997: 1-12
13 Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino: An Execution Model for Multilevel Seccure Workflows. DBSec 1997: 151-165
12EEVijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions. IEEE Trans. Knowl. Data Eng. 9(5): 697-708 (1997)
11EEVijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: A theoretical formulation for degrees of isolation in databases. Information & Software Technology 39(1): 47-53 (1997)
10 Vijayalakshmi Atluri, Wei-kuang Huang: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. Journal of Computer Security 5(4): 303-340 (1997)
1996
9 Vijayalakshmi Atluri, Wei-kuang Huang: An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment. DBSec 1996: 240-258
8 Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98
7EEVijayalakshmi Atluri, Wei-kuang Huang: An Authorization Model for Workflows. ESORICS 1996: 44-64
6EEVijayalakshmi Atluri, Sushil Jajodia, Elisa Bertino: Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases. IEEE Trans. Knowl. Data Eng. 8(5): 839-854 (1996)
1995
5 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. DBSec 1995: 231-247
4EEPaul Ammann, Vijayalakshmi Atluri, Sushil Jajodia: The Partitioned Synchronization Rule for Planar Extendible Partial Orders. IEEE Trans. Knowl. Data Eng. 7(5): 797-808 (1995)
1994
3 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. DBSec 1994: 259-274
1993
2 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case. DBSec 1993: 135-158
1 Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia: Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems. Journal of Computer Security 2(4): 311-352 (1993)

Coauthor Index

1Ranjit Abbadasari [108]
2Nabil R. Adam [15] [24] [31] [33] [37] [39] [42] [43] [44] [49] [52] [59] [60] [61] [64] [65] [66] [72] [76] [77] [78] [79] [80] [84] [85] [86] [87] [100] [101] [102] [103] [104] [105] [106] [115] [116] [127] [130] [134]
3Igg Adiwijaya [24] [31] [49]
4Paul Ammann [4]
5Francisco J. Artigas [35] [103]
6Michael Backes [69]
7Aditya Bagchi [111]
8Sujata Banerjee [31]
9David A. Basin [69]
10Elisa Bertino [1] [2] [3] [5] [6] [11] [12] [13] [14] [19] [22] [37] [39] [54]
11Michael Bieber (Michael P. Bieber) [59]
12Joachim Biskup [26]
13Olana Bojic [86]
14Irfan Bora [103]
15Christof Bornhövd [87] [102]
16Larry Brumbaugh [95]
17Ugo Capuozzo [37]
18Bob Ceberio [103]
19Soon Ae Chun [27] [33] [35] [36] [43] [44] [51] [53] [56] [58] [61] [64] [72] [86] [102] [103] [104] [112] [116] [124] [130]
20J. Cooper [102]
21Jonathan Cranford [32]
22Julia Culver-Hopper [86]
23Roger Dingledine [94]
24Wenliang Du [91]
25John Ellenberger [130]
26Patrizia Fariselli [86]
27David F. Ferraiolo [126]
28Elena Ferrari [14] [19] [37] [39] [54]
29Jim Fruscione [86]
30Avigdor Gal [28] [40] [41]
31Chiara Ghirardini [33]
32Virgil D. Gligor [119]
33Ahmed Gomaa [49] [77] [79] [87]
34Atsuhiro Goto [92]
35Robert Grossman [105]
36Dihua Guo [80] [115] [134]
37Qi Guo [67] [83] [114] [127] [131] [135]
38John Hale [29]
39Richard D. Holowczak [31] [35]
40Wei-kuang Huang [7] [9] [10] [13] [15] [17] [20] [21] [22]
41Il Im [59] [89]
42Trent Jaeger [55]
43Sushil Jajodia [1] [2] [3] [4] [5] [6] [8] [11] [12] [30] [55]
44Vandana Pursnani Janeja [42] [60] [65] [66] [75] [78] [82] [85] [87] [102] [105] [122] [136]
45Anupam Joshi [47]
46Ari Juels [96]
47Ibrahim Kamel [33]
48Thomas F. Keefe [8] [30]
49Angelos D. Keromytis [90]
50Dong-Ho Kim [59] [89]
51Rey Koslowski [85] [105]
52Ralf Küsters [93]
53Yingjiu Li [138]
54Tao Lin [87]
55Peng Liu [109]
56Haibing Lu [129] [135] [138]
57Nick Mannochio [86]
58Heiko Mantel [119]
59Pietro Mazzoleni [36] [45] [54] [56] [112]
60Catherine D. McCollum [8] [30]
61Patrick Drew McDaniel (Patrick McDaniel) [71]
62Catherine Meadows [96]
63John C. Mitchell [93]
64Prasenjit Mitra [109]
65Samrat Mondal [137]
66Ravi Mukkamala [8] [25] [30] [32] [34] [38] [81] [88] [108] [112] [113]
67I. Nassi [102]
68Peng Ning [91] [118] [119] [120]
69Sylvia L. Osborn [26]
70J. Paczkowski [102]
71Aabhas V. Paliwal [52] [85] [102]
72Chi-Chun Pan [109]
73Birgit Pfitzmann [71]
74Li Qin [48] [50] [63] [97] [98]
75Indrakshi Ray [57]
76Reind P. van de Riet [26]
77Arnon Rosenthal (Arnie Rosenthal) [26]
78Pierangela Samarati [23] [92] [93] [95]
79Joachim Schaper [102]
80Raban Serban [26]
81Basit Shafiq [130]
82Heechang Shin [107] [117] [121] [123] [128] [139]
83David L. Spooner [18]
84Rick T. Stewart [86]
85Shamik Sural [137]
86Paul F. Syverson [68]
87Jaideep Vaidya [78] [110] [113] [114] [121] [127] [128] [129] [130] [131] [135] [138]
88Sabrina De Capitani di Vimercati [68] [94]
89Michael Waidner [69]
90Janice Warner [62] [74] [81] [85] [88] [99] [105] [108] [110] [113]
91Gio Wiederhold [26]
92Marianne Winslett [133]
93Hui Xiong [115] [130] [134]
94Gang Xu [41]
95Shouhuai Xu [118]
96Yelena Yesha [47] [59] [104]
97Mahmoud Youssef [76] [100] [102]
98Songmei Yu [84] [101] [106]
99Moti Yung (Mordechai M. Yung) [118]
100William Yurcik [95]
101Yuanyuan Zhou [95]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)