


default search action
James B. D. Joshi
James Joshi
Person information
- affiliation: University of Pittsburgh, Pennsylvania, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j55]Runhua Xu
, Bo Li
, Chao Li
, James B. D. Joshi
, Shuai Ma
, Jianxin Li
:
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(5): 4309-4323 (2024) - 2023
- [j54]Runhua Xu
, Chao Li
, James Joshi
:
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services. IEEE Trans. Dependable Secur. Comput. 20(3): 2302-2313 (2023) - [c92]Galen Harrison, Przemyslaw J. Porebski, Jiangzhuo Chen, Mandy L. Wilson, Henning S. Mortveit, Parantapa Bhattacharya, Dawen Xie, Stefan Hoops, Anil Vullikanti
, Li Xiong, James Joshi, Madhav V. Marathe:
Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities. TPS-ISA 2023: 23-33 - 2022
- [j53]Leila Karimi
, Maryam Aldairi
, James Joshi
, Mai Abdelhakim
:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. IEEE Trans. Dependable Secur. Comput. 19(4): 2304-2317 (2022) - [j52]Runhua Xu
, James Joshi
, Chao Li
:
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. IEEE Trans. Dependable Secur. Comput. 19(4): 2807-2820 (2022) - [j51]Mei-Ling Shyu
, Surya Nepal
, Valérie Issarny
, James Joshi
:
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics. IEEE Trans. Serv. Comput. 15(3): 1175-1177 (2022) - 2021
- [j50]Runhua Xu
, James Joshi
, Prashant Krishnamurthy:
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. IEEE Trans. Dependable Secur. Comput. 18(2): 706-721 (2021) - [c91]Runhua Xu
, Nathalie Baracaldo, Yi Zhou, Ali Anwar
, James Joshi, Heiko Ludwig:
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data. AISec@CCS 2021: 181-192 - [c90]Nigamanth Sridhar, Li Yang, James Joshi, Victor Piotrowski:
Cybersecurity Education in the Age of Artificial Intelligence. SIGCSE 2021: 1365 - [i8]Runhua Xu, Chao Li, James Joshi:
T3AB: Transparent and Trustworthy Third-party Authority using Blockchain. CoRR abs/2102.01249 (2021) - [i7]Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig:
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data. CoRR abs/2103.03918 (2021) - [i6]Leila Karimi, Mai Abdelhakim, James Joshi:
Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. CoRR abs/2105.08587 (2021) - [i5]Runhua Xu, Nathalie Baracaldo, James Joshi:
Privacy-Preserving Machine Learning: Methods, Challenges and Directions. CoRR abs/2108.04417 (2021) - 2020
- [j49]Nuray Baltaci Akhuseyinoglu
, James Joshi:
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Comput. Secur. 96: 101802 (2020) - [j48]Runhua Xu
, James Joshi:
Trustworthy and Transparent Third-party Authority. ACM Trans. Internet Techn. 20(4): 31:1-31:23 (2020) - [j47]James Joshi:
Editorial. IEEE Trans. Serv. Comput. 13(1): 1-2 (2020) - [c89]Runhua Xu, James Joshi:
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. TPS-ISA 2020: 226-235 - [i4]Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute Based Access Control Policy Extraction from Access Logs. CoRR abs/2003.07270 (2020) - [i3]Runhua Xu, James Joshi:
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. CoRR abs/2011.06191 (2020) - [i2]Runhua Xu, James Joshi, Chao Li:
NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets. CoRR abs/2012.10547 (2020)
2010 – 2019
- 2019
- [j46]Nathalie Baracaldo
, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. IEEE Trans. Dependable Secur. Comput. 16(1): 84-98 (2019) - [j45]Schahram Dustdar, Surya Nepal
, James Joshi:
Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Trans. Internet Techn. 19(3) (2019) - [j44]James Joshi
:
Editorial. IEEE Trans. Serv. Comput. 12(1): 1-3 (2019) - [c88]Runhua Xu, James B. D. Joshi, Chao Li
:
CryptoNN: Training Neural Networks over Encrypted Data. ICDCS 2019: 1199-1209 - [c87]Maryam Aldairi, Leila Karimi, James Joshi:
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection. IRI 2019: 89-98 - [e11]James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang:
Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings. Lecture Notes in Computer Science 11521, Springer 2019, ISBN 978-3-030-23403-4 [contents] - [i1]Runhua Xu, James B. D. Joshi, Chao Li:
CryptoNN: Training Neural Networks over Encrypted Data. CoRR abs/1904.07303 (2019) - 2018
- [j43]Lei Jin, Chao Li
, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. Comput. Secur. 78: 212-230 (2018) - [j42]James Joshi:
Front Cover. Computer 51(11): 1- (2018) - [c86]Leila Karimi, James Joshi:
An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies. IEEE BigData 2018: 1427-1436 - [c85]LeRoy Carr III, Anthony Newtson, James Joshi:
Towards Modernizing the Future of American Voting. CIC 2018: 130-135 - [c84]Runhua Xu, Balaji Palanisamy, James Joshi:
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. TrustCom/BigDataSE 2018: 1097-1106 - [r10]Yue Zhang, James B. D. Joshi:
Administration Model for RBAC. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]Yue Zhang, James B. D. Joshi:
ANSI/INCITS RBAC Standard. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Yue Zhang, James B. D. Joshi:
GEO-RBAC Model. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Yue Zhang, James B. D. Joshi:
Role-Based Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - [r6]Yue Zhang, James B. D. Joshi:
Temporal Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - 2017
- [j41]James Joshi:
Editorial: A Message from the New Editor-in-Chief. IEEE Trans. Serv. Comput. 10(1): 3-4 (2017) - [c83]Chao Li
, Balaji Palanisamy, James Joshi:
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. BigData Congress 2017: 49-56 - [c82]Nuray Baltaci Akhuseyinoglu
, James Joshi:
A Risk-Aware Access Control Framework for Cyber-Physical Systems. CIC 2017: 349-358 - [c81]Leila Karimi, James Joshi:
Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment. CIC 2017: 359-368 - [c80]Maryam Karimi, Prashant Krishnamurthy, James Joshi, David Tipper
:
Mining Historical Data towards Interference Management in Wireless SDNs. Q2SWinet@MSWiM 2017: 81-88 - 2016
- [j40]Lei Jin, Xuelian Long, Ke Zhang
, Yu-Ru Lin, James B. D. Joshi:
Characterizing users' check-in activities using their scores in a location-based social network. Multim. Syst. 22(1): 87-98 (2016) - [c79]Runhua Xu, James B. D. Joshi:
An Integrated Privacy Preserving Attribute Based Access Control Framework. CLOUD 2016: 68-76 - [c78]Runhua Xu, James B. D. Joshi:
Enabling Attribute Based Encryption as an Internet Service. CIC 2016: 417-425 - [c77]Yue Su, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, James Joshi:
Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake. CIC 2016: 495-499 - [c76]Leila Karimi, Balaji Palanisamy, James Joshi:
A Dynamic Privacy Aware Access Control Model for Location Based Services. CIC 2016: 554-557 - [c75]Chao Li
, Balaji Palanisamy, James Joshi:
SocialMix: Supporting Privacy-Aware Trusted Social Networking Services. ICWS 2016: 115-122 - [e10]James Joshi, George Karypis, Ling Liu, Xiaohua Hu, Ronay Ak, Yinglong Xia, Weijia Xu, Aki-Hiro Sato, Sudarsan Rachuri, Lyle H. Ungar, Philip S. Yu, Rama Govindaraju, Toyotaro Suzumura:
2016 IEEE International Conference on Big Data (IEEE BigData 2016), Washington DC, USA, December 5-8, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9005-7 [contents] - 2015
- [j39]Jianfeng Lu
, James B. D. Joshi
, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. Comput. Secur. 48: 116-130 (2015) - [j38]Mei-Ling Shyu, James Joshi, Qiong Liu:
Guest Editors' Introduction. Int. J. Semantic Comput. 9(2): 139-142 (2015) - 2014
- [j37]Lakshmish Ramaswamy, Barbara Carminati
, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [j36]Youna Jung, James B. D. Joshi:
CPBAC: Property-based access control model for secure cooperation in online social networks. Comput. Secur. 41: 19-39 (2014) - [j35]James Joshi, Calton Pu:
Welcome Message from the Editors-in-Chief. EAI Endorsed Trans. Collab. Comput. 1(1): e1 (2014) - [j34]Barbara Carminati
, Lakshmish Ramaswamy, Anna Cinzia Squicciarini
, James Joshi, Calton Pu:
Preface. Int. J. Cooperative Inf. Syst. 23(2) (2014) - [j33]Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. Inf. Syst. Frontiers 16(5): 749-752 (2014) - [j32]Lakshmish Ramaswamy, Barbara Carminati
, James B. D. Joshi, Calton Pu:
Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012). Mob. Networks Appl. 19(5): 634 (2014) - [c74]Lei Jin, Balaji Palanisamy, James B. D. Joshi:
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. CCS 2014: 1439-1441 - [c73]Saman Taghavi Zargar, James B. D. Joshi, David Tipper
:
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring. IRI 2014: 120-129 - [c72]Balaji Palanisamy, Sheldon Sensenig, James B. D. Joshi, Rose Constantino:
LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. IRI 2014: 138-146 - [c71]Nathalie Baracaldo
, Balaji Palanisamy, James B. D. Joshi:
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. NSS 2014: 501-509 - [c70]Lei Jin, Hassan Takabi, Xuelian Long, James B. D. Joshi:
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links. WPES 2014: 59-68 - [e9]James Joshi, Elisa Bertino, Bhavani Thuraisingham, Ling Liu:
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5880-1 [contents] - 2013
- [j31]Lei Jin, James B. D. Joshi, Mohd Anwar:
Mutual-friend based attacks in social network systems. Comput. Secur. 37: 15-30 (2013) - [j30]Nathalie Baracaldo
, James Joshi:
An adaptive risk management and access control framework to mitigate insider threats. Comput. Secur. 39: 237-254 (2013) - [j29]Saman Taghavi Zargar, James Joshi, David Tipper
:
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Commun. Surv. Tutorials 15(4): 2046-2069 (2013) - [j28]James Caverlee, Calton Pu, Dimitrios Georgakopoulos
, James Joshi:
Editorial for CollaborateCom 2011 Special Issue. Mob. Networks Appl. 18(2): 235-236 (2013) - [j27]Amirreza Masoumzadeh, James Joshi:
Top Location Anonymization for Geosocial Network Datasets. Trans. Data Priv. 6(1): 107-126 (2013) - [c69]Xuelian Long, James Joshi:
A HITS-based POI recommendation algorithm for location-based social networks. ASONAM 2013: 642-647 - [c68]Amirreza Masoumzadeh, James Joshi:
Privacy settings in social networking systems: what you cannot control. AsiaCCS 2013: 149-154 - [c67]Xuelian Long, Lei Jin, James Joshi:
Understanding venue popularity in Foursquare. CollaborateCom 2013: 409-418 - [c66]Xuelian Long, Lei Jin, James Joshi:
Towards understanding traveler behavior in Location-based Social Networks. GLOBECOM 2013: 3182-3187 - [c65]Nathalie Baracaldo
, James Joshi:
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. SACMAT 2013: 213-224 - 2012
- [j26]Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B. D. Joshi:
A survey of security issue in multi-agent systems. Artif. Intell. Rev. 37(3): 239-260 (2012) - [j25]Youna Jung, James B. D. Joshi:
CRiBAC: Community-centric role interaction based access control model. Comput. Secur. 31(4): 497-523 (2012) - [j24]Hassan Takabi, James B. D. Joshi:
Semantic-based policy management for cloud computing environments. Int. J. Cloud Comput. 1(2/3): 119-144 (2012) - [j23]James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 325-326 (2012) - [j22]Weisong Shi, James Joshi, Tao Zhang, Eun K. Park, Juan Quemada
:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 376-377 (2012) - [j21]Songqing Chen, Le Gruenwald, James Joshi, Karl Aberer:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(4): 506-507 (2012) - [j20]Amirreza Masoumzadeh, James Joshi:
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 877-889 (2012) - [c64]Lei Jin, Xuelian Long, James B. D. Joshi:
Towards understanding residential privacy by analyzing users' activities in foursquare. BADGERS@CCS 2012: 25-32 - [c63]Barbara Carminati, Lakshmish Ramaswamy, Calton Pu, James Joshi:
Preface. CollaborateCom 2012 - [c62]Youna Jung, Minsoo Kim, James B. D. Joshi:
Towards secure cooperation in online social networks. CollaborateCom 2012: 80-88 - [c61]Hassan Takabi, James B. D. Joshi:
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. HICSS 2012: 5500-5508 - [c60]Xuelian Long, Lei Jin, James Joshi:
Exploring trajectory-driven local geographic topics in foursquare. UbiComp 2012: 927-934 - [c59]Lei Jin, Xuelian Long, James B. D. Joshi, Mohd Anwar:
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems. IRI 2012: 712-717 - [c58]Nathalie Baracaldo
, James Joshi:
A trust-and-risk aware RBAC framework: tackling insider threat. SACMAT 2012: 167-176 - [e8]Calton Pu, James Joshi, Surya Nepal:
8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012. ICST / IEEE 2012, ISBN 978-1-4673-2740-4 [contents] - [e7]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani Thuraisingham:
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9 [contents] - 2011
- [j19]Dimitris Gritzalis, James Joshi:
Editorial. Comput. Secur. 30(2-3): 89-90 (2011) - [j18]Lei Jin, Hassan Takabi, James B. D. Joshi:
Analysing security and privacy issues of using e-mail address as identity. Int. J. Inf. Priv. Secur. Integr. 1(1): 34-58 (2011) - [j17]Amirreza Masoumzadeh, James Joshi:
Ontology-based access control for social network systems. Int. J. Inf. Priv. Secur. Integr. 1(1): 59-78 (2011) - [j16]Mehmet Kaya
, James B. D. Joshi, Mei-Ling Shyu:
Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration. J. Inf. Knowl. Manag. 10(3) (2011) - [j15]Xuelian Long, James Joshi:
BaRMS: A Bayesian Reputation Management Approach for P2P Systems. J. Inf. Knowl. Manag. 10(3): 273-283 (2011) - [j14]James Joshi, Barbara Carminati
:
Guest Editorial SACMAT 2009 and 2010. ACM Trans. Inf. Syst. Secur. 14(3): 22:1-22:2 (2011) - [c57]Lei Jin, Hassan Takabi, James B. D. Joshi:
Towards active detection of identity clone attacks on online social networks. CODASPY 2011: 27-38 - [c56]Saman Taghavi Zargar, Hassan Takabi, James B. D. Joshi:
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. CollaborateCom 2011: 332-341 - [c55]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach to mitigate rerouting attacks. CollaborateCom 2011: 520-523 - [c54]Amirreza Masoumzadeh, James B. D. Joshi:
Anonymizing geo-social network datasets. SPRINGL 2011: 25-32 - [c53]Reda Alhajj, James B. D. Joshi, Mei-Ling Shyu:
Message from program co-chairs. IRI 2011 - [c52]Youna Jung, Minsoo Kim, James B. D. Joshi:
DRiBAC: Fine-grained dynamic role interaction access control using ontology. IRI 2011: 88-93 - [c51]Nathalie Baracaldo
, Amirreza Masoumzadeh, James Joshi:
A secure, constraint-aware role-based access control interoperation framework. NSS 2011: 200-207 - [c50]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach against IP-spoofing attacks. PST 2011: 63-70 - [c49]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. TrustCom 2011: 556-563 - [c48]Amirreza Masoumzadeh, James Joshi:
An Alternative Approach to k-Anonymity for Location-Based Services. ANT/MobiWIS 2011: 522-530 - [e6]Dimitrios Georgakopoulos, James B. D. Joshi:
7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011. ICST / IEEE 2011, ISBN 978-1-4673-0683-6 [contents] - 2010
- [j13]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
:
Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 8(6): 24-31 (2010) - [c47]Karl Aberer, James Joshi:
Message from the general chairs. CollaborateCom 2010: 1-2 - [c46]Amirreza Masoumzadeh, James Joshi:
Preserving structural properties in anonymization of social networks. CollaborateCom 2010: 1-10 - [c45]Saman Taghavi Zargar, James B. D. Joshi:
A collaborative approach to facilitate intrusion detection and response against DDoS attacks. CollaborateCom 2010: 1-8 - [c44]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn
:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. COMPSAC Workshops 2010: 393-398 - [c43]Yue Zhang, James B. D. Joshi:
Role-based domain discovery in decentralized secure interoperations. CTS 2010: 84-93 - [c42]Yanhui Guo, James B. D. Joshi:
Topic-based personalized recommendation for collaborative tagging system. HT 2010: 61-66 - [c41]Xuelian Long, James Joshi:
Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS. ICC 2010: 1-6 - [c40]Yue Zhang, James B. D. Joshi:
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments. ICEIS (3) 2010: 356-361 - [c39]Reda Alhajj, Shu-Ching Chen, Gongzhu Hu, James B. D. Joshi, Gordon K. Lee, Stuart Harvey Rubin, Mei-Ling Shyu, Lotfi A. Zadeh:
Panel title: Critical need for funding of basic and applied research in large-scale computing. IRI 2010: 1 - [c38]Reda Alhajj, James B. D. Joshi, Mei-Ling Shyu:
Message from Program Co-Chairs. IRI 2010: 1 - [c37]Xuelian Long, James Joshi:
BaRMS: A Bayesian Reputation Management approach for P2P systems. IRI 2010: 147-152 - [c36]Hassan Takabi, James B. D. Joshi:
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. SACMAT 2010: 55-64 - [c35]Amirreza Masoumzadeh, James B. D. Joshi:
OSNAC: An Ontology-based Access Control Model for Social Networking Systems. SocialCom/PASSAT 2010: 751-759 - [c34]Lei Jin, Hassan Takabi, James B. D. Joshi:
Security and Privacy Risks of Using E-mail Address as an Identity. SocialCom/PASSAT 2010: 906-913 - [e5]