default search action
Vijayalakshmi Atluri
Vijay Atluri – Vijay Alturi
Person information
- affiliation: Rutgers University, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j76]H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Efficiently Supporting Attribute-Based Access Control in Linux. IEEE Trans. Dependable Secur. Comput. 21(4): 2012-2026 (2024) - [c157]Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. DBSec 2024: 3-23 - [c156]Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. DBSec 2024: 301-319 - [c155]Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems. SEC 2024: 323-337 - 2023
- [j75]Eeshan Gupta, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in NoSQL Databases. IEEE Trans. Emerg. Top. Comput. 11(1): 208-223 (2023) - [c154]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [e29]Vijayalakshmi Atluri, Anna Lisa Ferrara:
Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings. Lecture Notes in Computer Science 13942, Springer 2023, ISBN 978-3-031-37585-9 [contents] - 2022
- [c153]H. O. Sai Varshith, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in Linux Kernel. AsiaCCS 2022: 1237-1239 - [c152]Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
Contemporaneous Update and Enforcement of ABAC Policies. SACMAT 2022: 31-42 - [c151]Amshumaan Pericherla, Proteet Paul, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. SEC 2022: 360-376 - [e28]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13554, Springer 2022, ISBN 978-3-031-17139-0 [contents] - [e27]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13555, Springer 2022, ISBN 978-3-031-17145-1 [contents] - [e26]Vijayalakshmi Atluri, Roberto Di Pietro, Christian Damsgaard Jensen, Weizhi Meng:
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III. Lecture Notes in Computer Science 13556, Springer 2022, ISBN 978-3-031-17142-0 [contents] - 2021
- [j74]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling. Inf. Polity 26(4): 375-390 (2021) - [j73]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems. IEEE Trans. Emerg. Top. Comput. 9(4): 1901-1913 (2021) - [j72]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control. ACM Trans. Manag. Inf. Syst. 12(1): 6:1-6:24 (2021) - [c150]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Incremental Maintenance of ABAC Policies. CODASPY 2021: 185-196 - [c149]Eeshan Gupta, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Attribute-Based Access Control for NoSQL Databases. CODASPY 2021: 317-319 - 2020
- [j71]Ussama Yaqub, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Location-based Sentiment Analyses and Visualization of Twitter Election Data. Digit. Gov. Res. Pract. 1(2): 14:1-14:19 (2020) - [j70]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020) - [c148]Soon Ae Chun, Roshan Singh, Pamela Morgan, Nabil R. Adam, Vijay Atluri:
Visual Analytics for Global Migration Policy Discovery and NGO Collaboration. DG.O 2020: 109-115 - [c147]Roshan Singh, Soon Ae Chun, Vijay Atluri:
Developing Machine Learning Models to Automate News Classification. DG.O 2020: 354-355 - [c146]Vijay Atluri, Yuan Hong, Soon Ae Chun:
Security, Privacy and Trust for Responsible Innovations and Governance. DG.O 2020: 365-366
2010 – 2019
- 2019
- [j69]Mahendra Pratap Singh, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput. Secur. 86: 183-205 (2019) - [j68]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. IET Inf. Secur. 13(2): 96-103 (2019) - [j67]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Deploying ABAC policies using RBAC systems. J. Comput. Secur. 27(4): 483-506 (2019) - [j66]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Hierarchical Attribute-based Access Control Systems. ACM Trans. Internet Techn. 19(3): 40:1-40:24 (2019) - [c145]Augustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
ABACaaS: Attribute-Based Access Control as a Service. CODASPY 2019: 153-155 - [c144]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US. DG.O 2019: 248-253 - [c143]Soon Ae Chun, Venkata Avinash Paturu, Shengcheng Yuan, Rohit Pathak, Vijayalakshmi Atluri, Nabil R. Adam:
Crime Prediction Model using Deep Neural Networks. DG.O 2019: 512-514 - [c142]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. ICISS 2019: 79-98 - [c141]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Reconciliation and Migration in Attribute Based Access Control. ICISS 2019: 99-120 - [c140]Ronit Nath, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. SACMAT 2019: 25-35 - [c139]Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security Analysis of Unified Access Control Policies. SKM 2019: 126-146 - [c138]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. TPS-ISA 2019: 209-217 - 2018
- [j65]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. J. Comput. Secur. 26(2): 255-281 (2018) - [j64]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Towards designing robust CAPTCHAs. J. Comput. Secur. 26(6): 731-760 (2018) - [j63]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. IEEE Trans. Inf. Forensics Secur. 13(4): 897-911 (2018) - [c137]Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Engineering in RBAC and ABAC. From Database to Cyber Security 2018: 24-54 - [c136]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Enabling the Deployment of ABAC Policies in RBAC Systems. DBSec 2018: 51-68 - [c135]Ussama Yaqub, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis and visualization of subjectivity and polarity of Twitter location data. DG.O 2018: 67:1-67:10 - [c134]Nitesh Sharma, Rachit Pabreja, Ussama Yaqub, Vijayalakshmi Atluri, Soon Ae Chun, Jaideep Vaidya:
Web-based application for sentiment analysis of live tweets. DG.O 2018: 120:1-120:2 - [c133]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. SACMAT 2018: 213-215 - 2017
- [j62]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis of political discourse on twitter in the context of the 2016 US presidential elections. Gov. Inf. Q. 34(4): 613-626 (2017) - [j61]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5): 294-300 (2017) - [j60]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems. ACM Trans. Manag. Inf. Syst. 7(4): 10:1-10:24 (2017) - [c132]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. CIC 2017: 136-145 - [c131]Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri, Shamik Sural:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. CIC 2017: 339-348 - [c130]Emre Uzun, Gennaro Parlato, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi:
Preventing Unauthorized Data Flows. DBSec 2017: 41-62 - [c129]Ussama Yaqub, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Sentiment based Analysis of Tweets during the US Presidential Elections. DG.O 2017: 1-10 - [c128]Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Poster: Constrained Policy Mining in Attribute Based Access Control. SACMAT 2017: 121-123 - [c127]David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. SEC 2017: 281-295 - [r6]Vijay Atluri, Heechang Shin:
Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2017: 730-738 - [r5]Soon Ae Chun, Vijay Atluri:
Security Models, Geospatial. Encyclopedia of GIS 2017: 1850-1860 - 2016
- [j59]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Mining temporal roles using many-valued concepts. Comput. Secur. 60: 79-94 (2016) - [j58]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
A Survey of Role Mining. ACM Comput. Surv. 48(4): 50:1-50:37 (2016) - [c126]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. CIC 2016: 64-73 - [c125]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. DBSec 2016: 3-18 - [c124]Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. SIN 2016: 16-23 - 2015
- [j57]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [j56]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
The generalized temporal role mining problem. J. Comput. Secur. 23(1): 31-58 (2015) - [j55]Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Meeting Cardinality Constraints in Role Mining. IEEE Trans. Dependable Secur. Comput. 12(1): 71-84 (2015) - [j54]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Minimizing Organizational User Requirement while Meeting Security Constraints. ACM Trans. Manag. Inf. Syst. 6(3): 12:1-12:25 (2015) - [c123]Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Migrating from DAC to RBAC. DBSec 2015: 69-84 - [c122]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. ICISS 2015: 61-78 - [c121]Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Role Mining in the Presence of Separation of Duty Constraints. ICISS 2015: 98-117 - [c120]Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi:
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. NSS 2015: 191-205 - [c119]Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub:
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. NSS 2015: 221-235 - [c118]David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Generating Secure Images for CAPTCHAs through Noise Addition. SACMAT 2015: 169-172 - [c117]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. SEC 2015: 354-368 - 2014
- [j53]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Security analysis of temporal RBAC under an administrative model. Comput. Secur. 46: 154-172 (2014) - [j52]David Lorenzi, Jaideep Vaidya, Soon Ae Chun, Basit Shafiq, Vijayalakshmi Atluri:
Enhancing the government service experience through QR codes on mobile platforms. Gov. Inf. Q. 31(1): 6-16 (2014) - [j51]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
An optimization framework for role mining. J. Comput. Secur. 22(1): 1-31 (2014) - [j50]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato, P. Madhusudan:
Security analysis for temporal role based access control. J. Comput. Secur. 22(6): 961-996 (2014) - [c116]David Lorenzi, Jaideep Vaidya, Basit Shafiq, Soon Ae Chun, Neelima Vegesna, Zamil S. Alzamil, Nabil R. Adam, Seth Wainer, Vijayalakshmi Atluri:
Utilizing social media to improve local government responsiveness. DG.O 2014: 236-244 - [c115]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. ICISS 2014: 129-148 - [c114]Nazia Badar, Jaideep Vaidya, Vijay Atluri:
More data, more security challenges: integrating analytics in to the information security curriculum. InfoSecCD 2014: 8:1 - [e25]Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 [contents] - 2013
- [j49]Manisha Sharma, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
AMTRAC: An administrative model for temporal role-based access control. Comput. Secur. 39: 201-218 (2013) - [c113]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Toward Mining of Temporal Roles. DBSec 2013: 65-80 - [c112]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. DBSec 2013: 297-304 - [c111]David Lorenzi, Jaideep Vaidya, Soon Ae Chun, Basit Shafiq, Varuna Naik, Vijayalakshmi Atluri, Nabil R. Adam:
Community based emergency response. DG.O 2013: 82-91 - [c110]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci:
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ICISS 2013: 133-147 - [c109]David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Web Services Based Attacks against Image CAPTCHAs. ICISS 2013: 214-229 - [c108]Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Spatio-Temporal Role Based Access Control. ICISS 2013: 375-389 - [c107]Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri:
Panel on granularity in access control. SACMAT 2013: 85-86 - 2012
- [j48]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. IEEE Trans. Dependable Secur. Comput. 9(5): 655-669 (2012) - [j47]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijayalakshmi Atluri:
Structure-aware graph anonymization. Web Intell. Agent Syst. 10(2): 193-208 (2012) - [c106]Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:
Role engineering: from theory to practice. CODASPY 2012: 181-192 - [c105]Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri:
Privacy-Preserving Subgraph Discovery. DBSec 2012: 161-176 - [c104]David Lorenzi, Basit Shafiq, Jaideep Vaidya, Ghulam Nabi, Soon Ae Chun, Vijayalakshmi Atluri:
Using QR codes for enhancing the scope of digital government services. DG.O 2012: 21-29 - [c103]David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. ICISS 2012: 327-342 - [c102]Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Parthasarathy Madhusudan:
Analyzing temporal role based access control models. SACMAT 2012: 177-186 - [c101]Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq:
Risk Based Access Control Using Classification. SafeConfig 2012: 79-95 - [c100]John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. SEC 2012: 150-161 - [e24]Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu:
17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012. ACM 2012, ISBN 978-1-4503-1295-0 [contents] - 2011
- [j46]Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri:
Security analysis of GTRBAC and its variants using model checking. Comput. Secur. 30(2-3): 128-147 (2011) - [j45]Vijay Atluri:
Preface. J. Comput. Secur. 19(3): 365 (2011) - [j44]Heechang Shin, Vijayalakshmi Atluri, June-Suh Cho:
Efficiently enforcing spatiotemporal access control under uncertain location information. J. Comput. Secur. 19(3): 607-637 (2011) - [j43]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
A profile anonymization model for location-based services. J. Comput. Secur. 19(5): 795-833 (2011) - [j42]David F. Ferraiolo, Vijayalakshmi Atluri, Serban I. Gavrila:
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57(4): 412-424 (2011) - [c99]Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya:
An Optimization Model for the Extended Role Mining Problem. DBSec 2011: 76-89 - [c98]Vijay Atluri, Basit Shafiq, Soon Ae Chun, Ghulam Nabi, Jaideep Vaidya:
UICDS-based information sharing among emergency response application systems. DG.O 2011: 331-332 - [c97]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Heechang Shin, Lili Jiang:
Weighted Rank-One Binary Matrix Factorization. SDM 2011: 283-294 - [e23]John Carlo Bertot, Karine Nahon, Soon Ae Chun, Luis F. Luna-Reyes, Vijay Atluri:
Proceedings of the 12th Annual International Conference on Digital Government Research, DG.O 2011, College Park, MD, USA, June 12 - 15, 2011. ACM International Conference Proceeding Series, Digital Government Research Center 2011, ISBN 978-1-4503-0762-8 [contents] - [e22]Vijay Atluri, Claudia Díaz:
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Lecture Notes in Computer Science 6879, Springer 2011, ISBN 978-3-642-23821-5 [contents] - [r4]Vijay Alturi:
HRU. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 562-564 - [r3]Vijay Alturi, David F. Ferraiolo:
Role-Based Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1053-1055 - 2010
- [j41]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
Anonymization models for directional location based service environments. Comput. Secur. 29(1): 59-73 (2010) - [j40]Vandana Pursnani Janeja, Nabil R. Adam, Vijayalakshmi Atluri, Jaideep Vaidya:
Spatial neighborhood based anomaly detection in sensor datasets. Data Min. Knowl. Discov. 20(2): 221-258 (2010) - [j39]Li Qin, Vijayalakshmi Atluri:
Semantics-aware security policy specification for the semantic web data. Int. J. Inf. Comput. Secur. 4(1): 52-75 (2010) - [j38]Vijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya:
A unified index structure for efficient enforcement of spatiotemporal authorisations. Int. J. Inf. Comput. Secur. 4(2): 118-151 (2010) - [j37]Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, Qi Guo:
Role Engineering via Prioritized Subset Enumeration. IEEE Trans. Dependable Secur. Comput. 7(3): 300-314 (2010) - [j36]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: A formal perspective. ACM Trans. Inf. Syst. Secur. 13(3): 27:1-27:31 (2010) - [c96]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. DBSec 2010: 97-112 - [c95]