<?xml version="1.0"?>
<dblpperson name="Vijayalakshmi Atluri" pid="a/VAtluri" n="282">
<person key="homepages/a/VAtluri" mdate="2024-05-01">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="a/VAtluri">Vijay Alturi</author>
<note type="affiliation">Rutgers University, USA</note>
<url>https://sites.rutgers.edu/vijay-atluri/</url>
<url>https://scholar.google.com/citations?user=zm1GcjUAAAAJ</url>
<url>https://zbmath.org/authors/?q=ai:atluri.vijayalakshmi</url>
<url>https://mathgenealogy.org/id.php?id=67676</url>
<url>https://en.wikipedia.org/wiki/Vijay_Atluri</url>
<url>https://orcid.org/0000-0003-2068-780X</url>
<url>https://www.wikidata.org/entity/Q100223754</url>
<url>https://id.loc.gov/authorities/names/n99255750</url>
<url>https://d-nb.info/gnd/135821398</url>
<url>https://d-nb.info/gnd/1146265085</url>
</person>
<r><article key="journals/compsec/MadkaikarYSVA25" mdate="2025-05-09">
<author orcid="0009-0009-6346-0198" pid="387/0083">Gaurav Madkaikar</author>
<author orcid="0009-0000-1462-922X" pid="403/0833">Karthikeya S. M. Yelisetty</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Performance analysis of dynamic ABAC systems using a queuing theoretic framework.</title>
<pages>104432</pages>
<year>2025</year>
<volume>154</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2025.104432</ee>
<url>db/journals/compsec/compsec154.html#MadkaikarYSVA25</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><article key="journals/toit/BatraTAVS25" mdate="2025-12-24">
<author orcid="0000-0001-6954-6501" pid="211/1483">Gunjan Batra</author>
<author orcid="0000-0002-5700-7137" pid="260/2190">Samir Talegaon</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Semantically Correct Policy Mining and Enforcement for Attribute Based Access Control.</title>
<pages>22:1-22:20</pages>
<year>2025</year>
<month>November</month>
<volume>25</volume>
<journal>ACM Trans. Internet Techn.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/3736764</ee>
<url>db/journals/toit/toit25.html#BatraTAVS25</url>
<stream>streams/journals/toit</stream>
</article>
</r>
<r><inproceedings key="conf/dbsec/YangASK25" mdate="2025-07-02">
<author pid="126/6564">Mian Yang</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="65/4168">Ashish Kundu</author>
<title>Automated Privacy Policy Analysis Using Large Language Models.</title>
<pages>23-43</pages>
<year>2025</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-96590-6_2</ee>
<crossref>conf/dbsec/2025</crossref>
<url>db/conf/dbsec/dbsec2025.html#YangASK25</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ParikhSAV25" mdate="2025-07-02">
<author pid="409/6354">Anand Manojkumar Parikh</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains.</title>
<pages>156-175</pages>
<year>2025</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-96590-6_9</ee>
<crossref>conf/dbsec/2025</crossref>
<url>db/conf/dbsec/dbsec2025.html#ParikhSAV25</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/Atluri25" mdate="2025-08-05">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Policy Mining: Putting LLMs to Work [Keynote Abstract].</title>
<pages>1-2</pages>
<year>2025</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3734436.3734438</ee>
<crossref>conf/sacmat/2025</crossref>
<url>db/conf/sacmat/sacmat2025.html#Atluri25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/YangASK25" mdate="2025-08-05">
<author orcid="0000-0002-1987-7377" pid="126/6564">Mian Yang</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-1499-5558" pid="65/4168">Ashish Kundu</author>
<title>Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation.</title>
<pages>157-168</pages>
<year>2025</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3734436.3734447</ee>
<crossref>conf/sacmat/2025</crossref>
<url>db/conf/sacmat/sacmat2025.html#YangASK25</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2502-12460" mdate="2025-03-19">
<author pid="400/5087">Pratik Sonune</author>
<author pid="345/1912">Ritwik Rai</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="65/4168">Ashish Kundu</author>
<title>LMN: A Tool for Generating Machine Enforceable Policies from Natural Language Access Control Rules using LLMs.</title>
<year>2025</year>
<month>February</month>
<volume>abs/2502.12460</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2502.12460</ee>
<url>db/journals/corr/corr2502.html#abs-2502-12460</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/isf/SinghSVA24" mdate="2025-04-01">
<author orcid="0000-0002-6251-8097" pid="67/2271">Mahendra Pratap Singh</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis.</title>
<pages>2255-2272</pages>
<year>2024</year>
<month>December</month>
<volume>26</volume>
<journal>Inf. Syst. Frontiers</journal>
<number>6</number>
<ee>https://doi.org/10.1007/s10796-021-10167-z</ee>
<url>db/journals/isf/isf26.html#SinghSVA24</url>
<stream>streams/journals/isf</stream>
</article>
</r>
<r><article key="journals/tdsc/VarshithSVA24" mdate="2024-07-19">
<author orcid="0000-0003-4918-5512" pid="320/8628">H. O. Sai Varshith</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Efficiently Supporting Attribute-Based Access Control in Linux.</title>
<pages>2012-2026</pages>
<year>2024</year>
<month>July - August</month>
<volume>21</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2023.3299429</ee>
<url>db/journals/tdsc/tdsc21.html#VarshithSVA24</url>
<stream>streams/journals/tdsc</stream>
</article>
</r>
<r><inproceedings key="conf/dbsec/YangASV24" mdate="2025-03-03">
<author orcid="0000-0002-1987-7377" pid="126/6564">Mian Yang</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>A Graph-Based Framework for ABAC Policy Enforcement and Analysis.</title>
<pages>3-23</pages>
<year>2024</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65172-4_1</ee>
<crossref>conf/dbsec/2024</crossref>
<url>db/conf/dbsec/dbsec2024.html#YangASV24</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ChaudhuryRVSCSVA24" mdate="2026-03-24">
<author pid="381/8552">Saptarshi De Chaudhury</author>
<author pid="381/8060">Likhith Reddy</author>
<author pid="377/5308">Matta Varun</author>
<author orcid="0009-0007-6153-3870" pid="36/7898">Tirthankar Sengupta</author>
<author pid="28/9571">Sandip Chakraborty 0001</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.</title>
<pages>301-319</pages>
<year>2024</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65172-4_19</ee>
<crossref>conf/dbsec/2024</crossref>
<url>db/conf/dbsec/dbsec2024.html#ChaudhuryRVSCSVA24</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/MadkaikarSVA24" mdate="2024-10-09">
<author pid="387/0083">Gaurav Madkaikar</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.</title>
<pages>323-337</pages>
<year>2024</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65175-5_23</ee>
<crossref>conf/sec/2024</crossref>
<url>db/conf/sec/sec2024.html#MadkaikarSVA24</url>
</inproceedings>
</r>
<r><article key="journals/tetc/GuptaSVA23" mdate="2023-03-11">
<author pid="290/4067">Eeshan Gupta</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Enabling Attribute-Based Access Control in NoSQL Databases.</title>
<pages>208-223</pages>
<year>2023</year>
<month>January - March</month>
<volume>11</volume>
<journal>IEEE Trans. Emerg. Top. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TETC.2022.3193577</ee>
<url>db/journals/tetc/tetc11.html#GuptaSVA23</url>
</article>
</r>
<r><inproceedings key="conf/sacmat/RayTVMARKRSSV023" mdate="2025-01-19">
<author pid="r/IndrajitRay">Indrajit Ray</author>
<author pid="t/BMThuraisingham">Bhavani Thuraisingham</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-1667-5435" pid="m/SharadMehrotra">Sharad Mehrotra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<author orcid="0000-0001-9795-9063" pid="36/195">Murat Kantarcioglu</author>
<author pid="r/RameshRaskar">Ramesh Raskar</author>
<author pid="11/6446">Babak Salimi</author>
<author orcid="0000-0002-6937-1956" pid="41/5693">Steve Simske</author>
<author pid="66/1875">Nalini Venkatasubramanian</author>
<author pid="00/6451-7">Vivek K. Singh 0001</author>
<title>SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.</title>
<pages>145-155</pages>
<year>2023</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3589608.3593830</ee>
<ee>https://www.wikidata.org/entity/Q130912479</ee>
<crossref>conf/sacmat/2023</crossref>
<url>db/conf/sacmat/sacmat2023.html#RayTVMARKRSSV023</url>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/2023" mdate="2023-07-14">
<editor orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor orcid="0000-0002-1026-5729" pid="60/6199">Anna Lisa Ferrara</editor>
<title>Data and Applications Security and Privacy XXXVII - 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings</title>
<booktitle>DBSec</booktitle>
<publisher>Springer</publisher>
<year>2023</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13942</volume>
<isbn>978-3-031-37585-9</isbn>
<isbn>978-3-031-37586-6</isbn>
<ee>https://doi.org/10.1007/978-3-031-37586-6</ee>
<url>db/conf/dbsec/dbsec2023.html</url>
</proceedings>
</r>
<r><inproceedings key="conf/asiaccs/VarshithSVA22" mdate="2023-06-26">
<author pid="320/8628">H. O. Sai Varshith</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Enabling Attribute-Based Access Control in Linux Kernel.</title>
<pages>1237-1239</pages>
<year>2022</year>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/3488932.3527293</ee>
<crossref>conf/asiaccs/2022</crossref>
<url>db/conf/asiaccs/asiaccs2022.html#VarshithSVA22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/TalegaonBASV22" mdate="2023-06-26">
<author pid="260/2190">Samir Talegaon</author>
<author pid="211/1483">Gunjan Batra</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Contemporaneous Update and Enforcement of ABAC Policies.</title>
<pages>31-42</pages>
<year>2022</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3532105.3535021</ee>
<crossref>conf/sacmat/2022</crossref>
<url>db/conf/sacmat/sacmat2022.html#TalegaonBASV22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/PericherlaPSVA22" mdate="2023-06-26">
<author pid="322/3846">Amshumaan Pericherla</author>
<author pid="318/7315">Proteet Paul</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<title>Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain.</title>
<pages>360-376</pages>
<year>2022</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-031-06975-8_21</ee>
<crossref>conf/sec/2022</crossref>
<url>db/conf/sec/sec2022.html#PericherlaPSVA22</url>
</inproceedings>
</r>
<r><proceedings key="conf/esorics/2022-1" mdate="2022-09-27">
<editor orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor orcid="0000-0003-1909-0336" pid="73/6934">Roberto Di Pietro</editor>
<editor orcid="0000-0002-0921-7148" pid="j/ChristianDamsgaardJensen">Christian Damsgaard Jensen</editor>
<editor orcid="0000-0003-4384-5786" pid="146/1188">Weizhi Meng 0001</editor>
<title>Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I</title>
<booktitle>ESORICS (1)</booktitle>
<publisher>Springer</publisher>
<year>2022</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13554</volume>
<isbn>978-3-031-17139-0</isbn>
<isbn>978-3-031-17140-6</isbn>
<ee>https://doi.org/10.1007/978-3-031-17140-6</ee>
<url>db/conf/esorics/esorics2022-1.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2022-2" mdate="2022-09-27">
<editor orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor orcid="0000-0003-1909-0336" pid="73/6934">Roberto Di Pietro</editor>
<editor orcid="0000-0002-0921-7148" pid="j/ChristianDamsgaardJensen">Christian Damsgaard Jensen</editor>
<editor orcid="0000-0003-4384-5786" pid="146/1188">Weizhi Meng 0001</editor>
<title>Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part II</title>
<booktitle>ESORICS (2)</booktitle>
<publisher>Springer</publisher>
<year>2022</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13555</volume>
<isbn>978-3-031-17145-1</isbn>
<isbn>978-3-031-17146-8</isbn>
<ee>https://doi.org/10.1007/978-3-031-17146-8</ee>
<url>db/conf/esorics/esorics2022-2.html</url>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2022-3" mdate="2022-09-27">
<editor orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor orcid="0000-0003-1909-0336" pid="73/6934">Roberto Di Pietro</editor>
<editor orcid="0000-0002-0921-7148" pid="j/ChristianDamsgaardJensen">Christian Damsgaard Jensen</editor>
<editor orcid="0000-0003-4384-5786" pid="146/1188">Weizhi Meng 0001</editor>
<title>Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part III</title>
<booktitle>ESORICS (3)</booktitle>
<publisher>Springer</publisher>
<year>2022</year>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>13556</volume>
<isbn>978-3-031-17142-0</isbn>
<isbn>978-3-031-17143-7</isbn>
<ee>https://doi.org/10.1007/978-3-031-17143-7</ee>
<url>db/conf/esorics/esorics2022-3.html</url>
</proceedings>
</r>
<r><article key="journals/polity/YaqubCAV21" mdate="2022-10-02">
<author pid="171/4023">Ussama Yaqub</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling.</title>
<pages>375-390</pages>
<year>2021</year>
<volume>26</volume>
<journal>Inf. Polity</journal>
<number>4</number>
<ee>https://doi.org/10.3233/IP-210321</ee>
<url>db/journals/polity/polity26.html#YaqubCAV21</url>
</article>
</r>
<r><article key="journals/tetc/RoySMVA21" mdate="2023-06-26">
<author orcid="0000-0003-1224-7089" pid="55/8865">Arindam Roy</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-5907-7964" pid="59/487">Arun Kumar Majumdar</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.</title>
<pages>1901-1913</pages>
<year>2021</year>
<volume>9</volume>
<journal>IEEE Trans. Emerg. Top. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TETC.2019.2944787</ee>
<url>db/journals/tetc/tetc9.html#RoySMVA21</url>
</article>
</r>
<r><article key="journals/tmis/RoySMVA21" mdate="2023-06-26">
<author pid="55/8865">Arindam Roy</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="59/487">Arun Kumar Majumdar</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Optimal Employee Recruitment in Organizations under Attribute-Based Access Control.</title>
<pages>6:1-6:24</pages>
<year>2021</year>
<volume>12</volume>
<journal>ACM Trans. Manag. Inf. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/3403950</ee>
<url>db/journals/tmis/tmis12.html#RoySMVA21</url>
</article>
</r>
<r><inproceedings key="conf/codaspy/BatraAVS21" mdate="2023-06-26">
<author pid="211/1483">Gunjan Batra</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Incremental Maintenance of ABAC Policies.</title>
<pages>185-196</pages>
<year>2021</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/3422337.3447825</ee>
<crossref>conf/codaspy/2021</crossref>
<url>db/conf/codaspy/codaspy2021.html#BatraAVS21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/codaspy/GuptaSVA21" mdate="2025-01-19">
<author pid="290/4067">Eeshan Gupta</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Attribute-Based Access Control for NoSQL Databases.</title>
<pages>317-319</pages>
<year>2021</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/3422337.3450323</ee>
<ee>https://www.wikidata.org/entity/Q130870231</ee>
<crossref>conf/codaspy/2021</crossref>
<url>db/conf/codaspy/codaspy2021.html#GuptaSVA21</url>
</inproceedings>
</r>
<r><article key="journals/dgov/YaqubSPCAV20" mdate="2022-10-02">
<author pid="171/4023">Ussama Yaqub</author>
<author pid="81/9694">Nitesh Sharma</author>
<author pid="220/2483">Rachit Pabreja</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Location-based Sentiment Analyses and Visualization of Twitter Election Data.</title>
<pages>14:1-14:19</pages>
<year>2020</year>
<volume>1</volume>
<journal>Digit. Gov. Res. Pract.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3339909</ee>
<url>db/journals/dgov/dgov1.html#YaqubSPCAV20</url>
</article>
</r>
<r><article key="journals/tmis/LuCSVAHH20" mdate="2025-07-04">
<author orcid="0000-0003-0266-6191" pid="57/631">Haibing Lu</author>
<author orcid="0000-0002-3135-4114" pid="16/3283-14">Xi Chen 0014</author>
<author orcid="0000-0002-6407-8398" pid="52/5485">Junmin Shi</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<author pid="26/2178-1">Wei Huang 0031</author>
<title>Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization.</title>
<pages>7:1-7:33</pages>
<year>2020</year>
<volume>11</volume>
<journal>ACM Trans. Manag. Inf. Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1145/3386599</ee>
<ee>https://www.wikidata.org/entity/Q103728519</ee>
<url>db/journals/tmis/tmis11.html#LuCSVAHH20</url>
</article>
</r>
<r><inproceedings key="conf/dgo/ChunSMAA20" mdate="2021-07-25">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="242/6725">Roshan Singh</author>
<author pid="274/5856">Pamela Morgan</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Visual Analytics for Global Migration Policy Discovery and NGO Collaboration.</title>
<pages>109-115</pages>
<year>2020</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3396956.3398261</ee>
<crossref>conf/dgo/2020</crossref>
<url>db/conf/dgo/dgo2020.html#ChunSMAA20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/SinghCA20" mdate="2021-07-25">
<author pid="242/6725">Roshan Singh</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Developing Machine Learning Models to Automate News Classification.</title>
<pages>354-355</pages>
<year>2020</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3396956.3397001</ee>
<crossref>conf/dgo/2020</crossref>
<url>db/conf/dgo/dgo2020.html#SinghCA20</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AtluriHC20" mdate="2025-07-04">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<title>Security, Privacy and Trust for Responsible Innovations and Governance.</title>
<pages>365-366</pages>
<year>2020</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3396956.3396978</ee>
<crossref>conf/dgo/2020</crossref>
<url>db/conf/dgo/dgo2020.html#AtluriHC20</url>
</inproceedings>
</r>
<r><article key="journals/compsec/SinghSVA19" mdate="2023-06-26">
<author pid="67/2271">Mahendra Pratap Singh</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.</title>
<pages>183-205</pages>
<year>2019</year>
<volume>86</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2019.06.001</ee>
<ee>https://www.wikidata.org/entity/Q90991256</ee>
<url>db/journals/compsec/compsec86.html#SinghSVA19</url>
</article>
</r>
<r><article key="journals/iet-ifs/JhaSAV19" mdate="2023-06-26">
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Security analysis of ABAC under an administrative model.</title>
<pages>96-103</pages>
<year>2019</year>
<volume>13</volume>
<journal>IET Inf. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1049/iet-ifs.2018.5010</ee>
<ee>https://www.wikidata.org/entity/Q64970443</ee>
<url>db/journals/iet-ifs/iet-ifs13.html#JhaSAV19</url>
</article>
</r>
<r><article key="journals/jcs/BatraAVS19" mdate="2023-06-26">
<author pid="211/1483">Gunjan Batra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Deploying ABAC policies using RBAC systems.</title>
<pages>483-506</pages>
<year>2019</year>
<volume>27</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.3233/JCS-191315</ee>
<ee>https://www.wikidata.org/entity/Q92590844</ee>
<url>db/journals/jcs/jcs27.html#BatraAVS19</url>
</article>
</r>
<r><article key="journals/toit/DasSVA19" mdate="2022-10-02">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Policy Adaptation in Hierarchical Attribute-based Access Control Systems.</title>
<pages>40:1-40:24</pages>
<year>2019</year>
<volume>19</volume>
<journal>ACM Trans. Internet Techn.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/3323233</ee>
<ee>https://www.wikidata.org/entity/Q92307298</ee>
<url>db/journals/toit/toit19.html#DasSVA19</url>
</article>
</r>
<r><inproceedings key="conf/codaspy/MeshramDSVA19" mdate="2023-06-26">
<author pid="237/7603">Augustee Meshram</author>
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>ABACaaS: Attribute-Based Access Control as a Service.</title>
<pages>153-155</pages>
<year>2019</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/3292006.3302381</ee>
<crossref>conf/codaspy/2019</crossref>
<url>db/conf/codaspy/codaspy2019.html#MeshramDSVA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/YaqubCAV19" mdate="2021-04-09">
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yaqub</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.</title>
<pages>248-253</pages>
<year>2019</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3325112.3325253</ee>
<crossref>conf/dgo/2019</crossref>
<url>db/conf/dgo/dgo2019.html#YaqubCAV19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ChunPYPAA19" mdate="2021-04-09">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="243/0151">Venkata Avinash Paturu</author>
<author pid="152/2560">Shengcheng Yuan</author>
<author pid="99/7082">Rohit Pathak</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Crime Prediction Model using Deep Neural Networks.</title>
<pages>512-514</pages>
<year>2019</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3325112.3328221</ee>
<crossref>conf/dgo/2019</crossref>
<url>db/conf/dgo/dgo2019.html#ChunPYPAA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/DasSVAR19" mdate="2023-06-26">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="78/2835">Gerhard Rigoll</author>
<title>VisMAP: Visual Mining of Attribute-Based Access Control Policies.</title>
<pages>79-98</pages>
<year>2019</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-36945-3_5</ee>
<crossref>conf/iciss/2019</crossref>
<url>db/conf/iciss/iciss2019.html#DasSVAR19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/BatraAVS19" mdate="2023-06-26">
<author pid="211/1483">Gunjan Batra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Policy Reconciliation and Migration in Attribute Based Access Control.</title>
<pages>99-120</pages>
<year>2019</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-030-36945-3_6</ee>
<crossref>conf/iciss/2019</crossref>
<url>db/conf/iciss/iciss2019.html#BatraAVS19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/NathDSVA19" mdate="2023-06-26">
<author pid="241/8640">Ronit Nath</author>
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.</title>
<pages>25-35</pages>
<year>2019</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3322431.3325102</ee>
<ee>https://www.wikidata.org/entity/Q92189317</ee>
<crossref>conf/sacmat/2019</crossref>
<url>db/conf/sacmat/sacmat2019.html#NathDSVA19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/skm/SinghSAV19" mdate="2023-06-26">
<author pid="67/2271">Mahendra Pratap Singh</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Security Analysis of Unified Access Control Policies.</title>
<pages>126-146</pages>
<year>2019</year>
<booktitle>SKM</booktitle>
<ee>https://doi.org/10.1007/978-981-15-3817-9_8</ee>
<crossref>conf/skm/2019</crossref>
<url>db/conf/skm/skm2019.html#SinghSAV19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tpsisa/DasSVA19" mdate="2023-06-26">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.</title>
<pages>209-217</pages>
<year>2019</year>
<booktitle>TPS-ISA</booktitle>
<ee>https://doi.org/10.1109/TPS-ISA48467.2019.00034</ee>
<crossref>conf/tpsisa/2019</crossref>
<url>db/conf/tpsisa/tpsisa2019.html#DasSVA19</url>
</inproceedings>
</r>
<r><article key="journals/jcs/GuptaSAV18" mdate="2023-08-28">
<author pid="183/4426">Haritabh Gupta</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>A side-channel attack on smartphones: Deciphering key taps using built-in microphones.</title>
<pages>255-281</pages>
<year>2018</year>
<volume>26</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.3233/JCS-17975</ee>
<ee>https://www.wikidata.org/entity/Q114944735</ee>
<url>db/journals/jcs/jcs26.html#GuptaSAV18</url>
</article>
</r>
<r><article key="journals/jcs/LorenziUVSA18" mdate="2023-08-28">
<author pid="30/9692">David Lorenzi</author>
<author pid="58/9838">Emre Uzun</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Towards designing robust CAPTCHAs.</title>
<pages>731-760</pages>
<year>2018</year>
<volume>26</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.3233/JCS-17947</ee>
<ee>https://www.wikidata.org/entity/Q114944741</ee>
<url>db/journals/jcs/jcs26.html#LorenziUVSA18</url>
</article>
</r>
<r><article key="journals/tifs/JhaSAV18" mdate="2023-06-26">
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<title>Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.</title>
<pages>897-911</pages>
<year>2018</year>
<volume>13</volume>
<journal>IEEE Trans. Inf. Forensics Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TIFS.2017.2771492</ee>
<url>db/journals/tifs/tifs13.html#JhaSAV18</url>
</article>
</r>
<r><inproceedings key="conf/birthday/DasMAVS18" mdate="2023-06-26">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Policy Engineering in RBAC and ABAC.</title>
<pages>24-54</pages>
<year>2018</year>
<booktitle>From Database to Cyber Security</booktitle>
<ee>https://doi.org/10.1007/978-3-030-04834-1_2</ee>
<crossref>conf/birthday/2018jajodia</crossref>
<url>db/conf/birthday/jajodia2018.html#DasMAVS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/BatraAVS18" mdate="2023-06-26">
<author pid="211/1483">Gunjan Batra</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Enabling the Deployment of ABAC Policies in RBAC Systems.</title>
<pages>51-68</pages>
<year>2018</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-95729-6_4</ee>
<ee>https://www.wikidata.org/entity/Q91244866</ee>
<crossref>conf/dbsec/2018</crossref>
<url>db/conf/dbsec/dbsec2018.html#BatraAVS18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/YaqubSPCAV18" mdate="2021-04-09">
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yaqub</author>
<author pid="81/9694">Nitesh Sharma</author>
<author pid="220/2483">Rachit Pabreja</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Analysis and visualization of subjectivity and polarity of Twitter location data.</title>
<pages>67:1-67:10</pages>
<year>2018</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3209281.3209313</ee>
<crossref>conf/dgo/2018</crossref>
<url>db/conf/dgo/dgo2018.html#YaqubSPCAV18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/SharmaPYACV18" mdate="2021-04-09">
<author pid="81/9694">Nitesh Sharma</author>
<author pid="220/2483">Rachit Pabreja</author>
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yaqub</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Web-based application for sentiment analysis of live tweets.</title>
<pages>120:1-120:2</pages>
<year>2018</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3209281.3209402</ee>
<crossref>conf/dgo/2018</crossref>
<url>db/conf/dgo/dgo2018.html#SharmaPYACV18</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/DasSVA18" mdate="2023-06-26">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.</title>
<pages>213-215</pages>
<year>2018</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3205977.3208949</ee>
<ee>https://www.wikidata.org/entity/Q91244869</ee>
<crossref>conf/sacmat/2018</crossref>
<url>db/conf/sacmat/sacmat2018.html#DasSVA18</url>
</inproceedings>
</r>
<r><article key="journals/giq/YaqubCAV17" mdate="2022-10-02">
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yaqub</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<title>Analysis of political discourse on twitter in the context of the 2016 US presidential elections.</title>
<pages>613-626</pages>
<year>2017</year>
<volume>34</volume>
<journal>Gov. Inf. Q.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.giq.2017.11.001</ee>
<url>db/journals/giq/giq34.html#YaqubCAV17</url>
</article>
</r>
<r><article key="journals/iet-ifs/MitraSVA17" mdate="2023-06-26">
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Migrating from RBAC to temporal RBAC.</title>
<pages>294-300</pages>
<year>2017</year>
<volume>11</volume>
<journal>IET Inf. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.1049/iet-ifs.2016.0258</ee>
<url>db/journals/iet-ifs/iet-ifs11.html#MitraSVA17</url>
</article>
</r>
<r><article key="journals/tmis/RoySMVA17" mdate="2025-01-19">
<author pid="55/8865">Arindam Roy</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="59/487">Arun Kumar Majumdar</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>On Optimal Employee Assignment in Constrained Role-Based Access Control Systems.</title>
<pages>10:1-10:24</pages>
<year>2017</year>
<volume>7</volume>
<journal>ACM Trans. Manag. Inf. Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/2996470</ee>
<ee>https://www.wikidata.org/entity/Q130957090</ee>
<url>db/journals/tmis/tmis7.html#RoySMVA17</url>
</article>
</r>
<r><inproceedings key="conf/coinco/DasSVA17" mdate="2023-06-26">
<author orcid="0000-0002-9574-4365" pid="29/8859">Saptarshi Das</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.</title>
<pages>136-145</pages>
<year>2017</year>
<booktitle>CIC</booktitle>
<ee>https://doi.org/10.1109/CIC.2017.00028</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CIC.2017.00028</ee>
<crossref>conf/coinco/2017</crossref>
<url>db/conf/coinco/cic2017.html#DasSVA17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/coinco/TalukdarBVAS17" mdate="2023-06-26">
<author pid="193/1491">Tanay Talukdar</author>
<author pid="211/1483">Gunjan Batra</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Efficient Bottom-Up Mining of Attribute Based Access Control Policies.</title>
<pages>339-348</pages>
<year>2017</year>
<booktitle>CIC</booktitle>
<ee>https://doi.org/10.1109/CIC.2017.00051</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CIC.2017.00051</ee>
<ee>https://www.wikidata.org/entity/Q90089407</ee>
<crossref>conf/coinco/2017</crossref>
<url>db/conf/coinco/cic2017.html#TalukdarBVAS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/UzunPAFVSL17" mdate="2023-06-26">
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0002-8697-2980" pid="11/1029">Gennaro Parlato</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="60/6199">Anna Lisa Ferrara</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="30/9692">David Lorenzi</author>
<title>Preventing Unauthorized Data Flows.</title>
<pages>41-62</pages>
<year>2017</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-61176-1_3</ee>
<crossref>conf/dbsec/2017</crossref>
<url>db/conf/dbsec/dbsec2017.html#UzunPAFVSL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/YaqubCAV17" mdate="2021-04-09">
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yaqub</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Sentiment based Analysis of Tweets during the US Presidential Elections.</title>
<pages>1-10</pages>
<year>2017</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/3085228.3085285</ee>
<crossref>conf/dgo/2017</crossref>
<url>db/conf/dgo/dgo2017.html#YaqubCAV17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/GautamJSVA17" mdate="2023-06-26">
<author pid="204/3744">Mayank Gautam</author>
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Poster: Constrained Policy Mining in Attribute Based Access Control.</title>
<pages>121-123</pages>
<year>2017</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/3078861.3084163</ee>
<crossref>conf/sacmat/2017</crossref>
<url>db/conf/sacmat/sacmat2017.html#GautamJSVA17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/LorenziVASAC17" mdate="2023-06-26">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="199/8974">Achyuta Aich</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="199/8945">Joseph Calca</author>
<title>EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.</title>
<pages>281-295</pages>
<year>2017</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-58469-0_19</ee>
<crossref>conf/sec/2017</crossref>
<url>db/conf/sec/sec2017.html#LorenziVASAC17</url>
</inproceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/gis/AtluriS17" mdate="2017-07-12">
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<title>Geospatial Authorizations, Efficient Enforcement.</title>
<pages>730-738</pages>
<year>2017</year>
<booktitle>Encyclopedia of GIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-17885-1_503</ee>
<crossref>reference/gis/2017</crossref>
<url>db/reference/gis/gis2017.html#AtluriS17</url>
</incollection>
</r>
<r><incollection publtype="encyclopedia" key="reference/gis/ChunA17" mdate="2017-07-12">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<title>Security Models, Geospatial.</title>
<pages>1850-1860</pages>
<year>2017</year>
<booktitle>Encyclopedia of GIS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-17885-1_1178</ee>
<crossref>reference/gis/2017</crossref>
<url>db/reference/gis/gis2017.html#ChunA17</url>
</incollection>
</r>
<r><article key="journals/compsec/MitraSVA16" mdate="2023-08-28">
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0002-7420-6947" pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Mining temporal roles using many-valued concepts.</title>
<pages>79-94</pages>
<year>2016</year>
<volume>60</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2016.04.002</ee>
<ee>https://www.wikidata.org/entity/Q115060327</ee>
<url>db/journals/compsec/compsec60.html#MitraSVA16</url>
</article>
</r>
<r><article key="journals/csur/MitraSVA16" mdate="2023-06-26">
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>A Survey of Role Mining.</title>
<pages>50:1-50:37</pages>
<year>2016</year>
<volume>48</volume>
<journal>ACM Comput. Surv.</journal>
<number>4</number>
<ee>https://doi.org/10.1145/2871148</ee>
<url>db/journals/csur/csur48.html#MitraSVA16</url>
</article>
</r>
<r><inproceedings key="conf/coinco/JhaSAV16" mdate="2023-03-23">
<author pid="150/2276">Sadhana Jha</author>
<author pid="67/3314">Shamik Sural</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.</title>
<pages>64-73</pages>
<year>2016</year>
<booktitle>CIC</booktitle>
<ee>https://doi.org/10.1109/CIC.2016.022</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CIC.2016.022</ee>
<crossref>conf/coinco/2016</crossref>
<url>db/conf/coinco/cic2016.html#JhaSAV16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/GuptaSAV16" mdate="2023-06-26">
<author pid="183/4426">Haritabh Gupta</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Deciphering Text from Touchscreen Key Taps.</title>
<pages>3-18</pages>
<year>2016</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-319-41483-6_1</ee>
<crossref>conf/dbsec/2016</crossref>
<url>db/conf/dbsec/dbsec2016.html#GuptaSAV16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sin/YakubAV16" mdate="2021-04-09">
<author orcid="0000-0002-8452-2089" pid="171/4023">Ussama Yakub</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Efficient Evaluation of Authorizations for Video Data.</title>
<pages>16-23</pages>
<year>2016</year>
<booktitle>SIN</booktitle>
<ee>https://doi.org/10.1145/2947626.2947652</ee>
<crossref>conf/sin/2016</crossref>
<url>db/conf/sin/sin2016.html#YakubAV16</url>
</inproceedings>
</r>
<r><article key="journals/informs/LuVAL15" mdate="2021-04-09">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="15/2506">Yingjiu Li</author>
<title>Statistical Database Auditing Without Query Denial Threat.</title>
<pages>20-34</pages>
<year>2015</year>
<volume>27</volume>
<journal>INFORMS J. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1287/ijoc.2014.0607</ee>
<url>db/journals/informs/informs27.html#LuVAL15</url>
</article>
</r>
<r><article key="journals/jcs/MitraSAV15" mdate="2023-08-28">
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>The generalized temporal role mining problem.</title>
<pages>31-58</pages>
<year>2015</year>
<volume>23</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/JCS-140512</ee>
<ee>https://www.wikidata.org/entity/Q114944882</ee>
<url>db/journals/jcs/jcs23.html#MitraSAV15</url>
</article>
</r>
<r><article key="journals/tdsc/HarikaNJSVA15" mdate="2023-06-26">
<author pid="157/0236">Pullamsetty Harika</author>
<author pid="157/0249">Marreddy Nagajyothi</author>
<author pid="47/11487">John C. John</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Meeting Cardinality Constraints in Role Mining.</title>
<pages>71-84</pages>
<year>2015</year>
<volume>12</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TDSC.2014.2309117</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2014.2309117</ee>
<url>db/journals/tdsc/tdsc12.html#HarikaNJSVA15</url>
</article>
</r>
<r><article key="journals/tmis/RoySMVA15" mdate="2023-06-26">
<author pid="55/8865">Arindam Roy</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="59/487">Arun Kumar Majumdar</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Minimizing Organizational User Requirement while Meeting Security Constraints.</title>
<pages>12:1-12:25</pages>
<year>2015</year>
<volume>6</volume>
<journal>ACM Trans. Manag. Inf. Syst.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/2811269</ee>
<url>db/journals/tmis/tmis6.html#RoySMVA15</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/UzunLAVS15" mdate="2023-06-26">
<author pid="58/9838">Emre Uzun</author>
<author pid="30/9692">David Lorenzi</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Migrating from DAC to RBAC.</title>
<pages>69-84</pages>
<year>2015</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-20810-7_5</ee>
<crossref>conf/dbsec/2015</crossref>
<url>db/conf/dbsec/dbsec2015.html#UzunLAVS15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/JhaSAV15" mdate="2023-06-26">
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Enforcing Separation of Duty in Attribute Based Access Control Systems.</title>
<pages>61-78</pages>
<year>2015</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-26961-0_5</ee>
<crossref>conf/iciss/2015</crossref>
<url>db/conf/iciss/iciss2015.html#JhaSAV15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/SaranaRSVA15" mdate="2023-06-26">
<author pid="173/0081">Prasuna Sarana</author>
<author pid="55/8865">Arindam Roy</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Role Mining in the Presence of Separation of Duty Constraints.</title>
<pages>98-117</pages>
<year>2015</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-26961-0_7</ee>
<crossref>conf/iciss/2015</crossref>
<url>db/conf/iciss/iciss2015.html#SaranaRSVA15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nss/VaidyaSAL15" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="11/2433">Basit Shafiq</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="30/9692">David Lorenzi</author>
<title>A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.</title>
<pages>191-205</pages>
<year>2015</year>
<booktitle>NSS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-25645-0_13</ee>
<crossref>conf/nss/2015</crossref>
<url>db/conf/nss/nss2015.html#VaidyaSAL15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/nss/SinghSAVY15" mdate="2023-06-26">
<author orcid="0000-0002-6251-8097" pid="67/2271">Mahendra Pratap Singh</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="171/4023">Ussama Yakub</author>
<title>Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.</title>
<pages>221-235</pages>
<year>2015</year>
<booktitle>NSS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-25645-0_15</ee>
<crossref>conf/nss/2015</crossref>
<url>db/conf/nss/nss2015.html#SinghSAVY15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/LorenziCUVSA15" mdate="2023-06-26">
<author pid="30/9692">David Lorenzi</author>
<author pid="138/2475">Pratik Chattopadhyay</author>
<author pid="58/9838">Emre Uzun</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Generating Secure Images for CAPTCHAs through Noise Addition.</title>
<pages>169-172</pages>
<year>2015</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/2752952.2753065</ee>
<crossref>conf/sacmat/2015</crossref>
<url>db/conf/sacmat/sacmat2015.html#LorenziCUVSA15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/LorenziUVSA15" mdate="2023-06-26">
<author pid="30/9692">David Lorenzi</author>
<author pid="58/9838">Emre Uzun</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Enhancing the Security of Image CAPTCHAs Through Noise Addition.</title>
<pages>354-368</pages>
<year>2015</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-319-18467-8_24</ee>
<crossref>conf/sec/2015</crossref>
<url>db/conf/sec/sec2015.html#LorenziUVSA15</url>
</inproceedings>
</r>
<r><article key="journals/compsec/JhaSVA14" mdate="2023-08-28">
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Security analysis of temporal RBAC under an administrative model.</title>
<pages>154-172</pages>
<year>2014</year>
<volume>46</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2014.08.001</ee>
<ee>https://www.wikidata.org/entity/Q115060678</ee>
<url>db/journals/compsec/compsec46.html#JhaSVA14</url>
</article>
</r>
<r><article key="journals/giq/LorenziVCSA14" mdate="2021-04-09">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="11/2433">Basit Shafiq</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Enhancing the government service experience through QR codes on mobile platforms.</title>
<pages>6-16</pages>
<year>2014</year>
<volume>31</volume>
<journal>Gov. Inf. Q.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.giq.2013.05.025</ee>
<url>db/journals/giq/giq31.html#LorenziVCSA14</url>
</article>
</r>
<r><article key="journals/jcs/LuVA14" mdate="2023-08-28">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>An optimization framework for role mining.</title>
<pages>1-31</pages>
<year>2014</year>
<volume>22</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/JCS-130484</ee>
<ee>https://www.wikidata.org/entity/Q114944925</ee>
<url>db/journals/jcs/jcs22.html#LuVA14</url>
</article>
</r>
<r><article key="journals/jcs/UzunAVSFPM14" mdate="2023-08-28">
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="60/6199">Anna Lisa Ferrara</author>
<author orcid="0000-0002-8697-2980" pid="11/1029">Gennaro Parlato</author>
<author pid="m/PMadhusudan">P. Madhusudan</author>
<title>Security analysis for temporal role based access control.</title>
<pages>961-996</pages>
<year>2014</year>
<volume>22</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<ee>https://doi.org/10.3233/JCS-140510</ee>
<ee>https://www.wikidata.org/entity/Q114944885</ee>
<url>db/journals/jcs/jcs22.html#UzunAVSFPM14</url>
</article>
</r>
<r><inproceedings key="conf/dgo/LorenziVSCVAAWA14" mdate="2024-03-28">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="11/2433">Basit Shafiq</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="148/4286">Neelima Vegesna</author>
<author pid="332/8444">Zamil S. Alzamil</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="148/4237">Seth Wainer</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Utilizing social media to improve local government responsiveness.</title>
<pages>236-244</pages>
<year>2014</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/2612733.2612773</ee>
<crossref>conf/dgo/2014</crossref>
<url>db/conf/dgo/dgo2014.html#LorenziVSCVAAWA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/JhaSVA14" mdate="2023-06-26">
<author pid="150/2276">Sadhana Jha</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.</title>
<pages>129-148</pages>
<year>2014</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-13841-1_8</ee>
<crossref>conf/iciss/2014</crossref>
<url>db/conf/iciss/iciss2014.html#JhaSVA14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infoseccd/BadarVA14" mdate="2018-11-06">
<author pid="126/1601">Nazia Badar</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<title>More data, more security challenges: integrating analytics in to the information security curriculum.</title>
<pages>8:1</pages>
<year>2014</year>
<booktitle>InfoSecCD</booktitle>
<ee>https://doi.org/10.1145/2670739.2670743</ee>
<crossref>conf/infoseccd/2014</crossref>
<url>db/conf/infoseccd/infoseccd2014.html#BadarVA14</url>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/2014" mdate="2019-05-14">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="p/GPernul">G&#252;nther Pernul</editor>
<title>Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings</title>
<year>2014</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>8566</volume>
<ee>https://doi.org/10.1007/978-3-662-43936-4</ee>
<isbn>978-3-662-43935-7</isbn>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2014.html</url>
</proceedings>
</r>
<r><article key="journals/compsec/SharmaSVA13" mdate="2023-08-28">
<author pid="32/9046">Manisha Sharma</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>AMTRAC: An administrative model for temporal role-based access control.</title>
<pages>201-218</pages>
<year>2013</year>
<volume>39</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2013.07.005</ee>
<ee>https://www.wikidata.org/entity/Q115060915</ee>
<url>db/journals/compsec/compsec39.html#SharmaSVA13</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/MitraSAV13" mdate="2023-06-26">
<author pid="58/10753">Barsha Mitra</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Toward Mining of Temporal Roles.</title>
<pages>65-80</pages>
<year>2013</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-39256-6_5</ee>
<crossref>conf/dbsec/2013</crossref>
<url>db/conf/dbsec/dbsec2013.html#MitraSAV13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/UzunAVS13" mdate="2023-06-26">
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<title>Analysis of TRBAC with Dynamic Temporal Role Hierarchies.</title>
<pages>297-304</pages>
<year>2013</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-39256-6_22</ee>
<crossref>conf/dbsec/2013</crossref>
<url>db/conf/dbsec/dbsec2013.html#UzunAVS13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/LorenziVCSNAA13" mdate="2021-04-09">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="131/2431">Varuna Naik</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Community based emergency response.</title>
<pages>82-91</pages>
<year>2013</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/2479724.2479739</ee>
<crossref>conf/dgo/2013</crossref>
<url>db/conf/dgo/dgo2013.html#LorenziVCSNAA13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/HachanaCCAM13" mdate="2021-04-09">
<author pid="97/3341">Safa&#224; Hachana</author>
<author pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</author>
<author pid="c/NoraCuppens">Nora Cuppens-Boulahia</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author pid="56/8380">Stephane Morucci</author>
<title>Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.</title>
<pages>133-147</pages>
<year>2013</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-45204-8_10</ee>
<crossref>conf/iciss/2013</crossref>
<url>db/conf/iciss/iciss2013.html#HachanaCCAM13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/LorenziVSA13" mdate="2023-06-26">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Web Services Based Attacks against Image CAPTCHAs.</title>
<pages>214-229</pages>
<year>2013</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-45204-8_16</ee>
<crossref>conf/iciss/2013</crossref>
<url>db/conf/iciss/iciss2013.html#LorenziVSA13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/SharmaSAV13" mdate="2023-06-26">
<author pid="32/9046">Manisha Sharma</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>An Administrative Model for Spatio-Temporal Role Based Access Control.</title>
<pages>375-389</pages>
<year>2013</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-45204-8_28</ee>
<crossref>conf/iciss/2013</crossref>
<url>db/conf/iciss/iciss2013.html#SharmaSAV13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/MolloyTLKSA13" mdate="2021-06-02">
<author pid="17/2811">Ian M. Molloy</author>
<author pid="32/4329">Mahesh V. Tripunitara</author>
<author pid="32/383">Volkmar Lotz</author>
<author pid="87/6951">Martin Kuhlmann</author>
<author pid="22/2079">Casey Schaufler</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Panel on granularity in access control.</title>
<pages>85-86</pages>
<year>2013</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/2462410.2462889</ee>
<crossref>conf/sacmat/2013</crossref>
<url>db/conf/sacmat/sacmat2013.html#MolloyTLKSA13</url>
</inproceedings>
</r>
<r><article key="journals/tdsc/LuVAH12" mdate="2025-07-04">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<title>Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition.</title>
<pages>655-669</pages>
<year>2012</year>
<volume>9</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/TDSC.2012.21</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2012.21</ee>
<url>db/journals/tdsc/tdsc9.html#LuVAH12</url>
</article>
</r>
<r><article key="journals/wias/HeVSAA12" mdate="2021-04-09">
<author pid="80/3328">Xiaoyun He</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Structure-aware graph anonymization.</title>
<pages>193-208</pages>
<year>2012</year>
<volume>10</volume>
<journal>Web Intell. Agent Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.3233/WIA-2012-0241</ee>
<url>db/journals/wias/wias10.html#HeVSAA12</url>
</article>
</r>
<r><inproceedings key="conf/codaspy/VerdeVAC12" mdate="2018-11-06">
<author pid="51/3522">Nino Vincenzo Verde</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="68/4759">Alessandro Colantonio</author>
<title>Role engineering: from theory to practice.</title>
<pages>181-192</pages>
<year>2012</year>
<booktitle>CODASPY</booktitle>
<ee>https://doi.org/10.1145/2133601.2133624</ee>
<crossref>conf/codaspy/2012</crossref>
<url>db/conf/codaspy/codaspy2012.html#VerdeVAC12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MehmoodSVHAA12" mdate="2025-07-04">
<author pid="116/4739">Danish Mehmood</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Privacy-Preserving Subgraph Discovery.</title>
<pages>161-176</pages>
<year>2012</year>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-31540-4_13</ee>
<crossref>conf/dbsec/2012</crossref>
<url>db/conf/dbsec/dbsec2012.html#MehmoodSVHAA12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/LorenziSVNCA12" mdate="2021-04-09">
<author pid="30/9692">David Lorenzi</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="27/1121">Ghulam Nabi</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Using QR codes for enhancing the scope of digital government services.</title>
<pages>21-29</pages>
<year>2012</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/2307729.2307734</ee>
<crossref>conf/dgo/2012</crossref>
<url>db/conf/dgo/dgo2012.html#LorenziSVNCA12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/LorenziVUSA12" mdate="2023-06-26">
<author pid="30/9692">David Lorenzi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Attacking Image Based CAPTCHAs Using Image Recognition Techniques.</title>
<pages>327-342</pages>
<year>2012</year>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/978-3-642-35130-3_23</ee>
<crossref>conf/iciss/2012</crossref>
<url>db/conf/iciss/iciss2012.html#LorenziVUSA12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/UzunASVPFM12" mdate="2023-06-26">
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0002-8697-2980" pid="11/1029">Gennaro Parlato</author>
<author pid="60/6199">Anna Lisa Ferrara</author>
<author pid="m/PMadhusudan">Parthasarathy Madhusudan</author>
<title>Analyzing temporal role based access control models.</title>
<pages>177-186</pages>
<year>2012</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/2295136.2295169</ee>
<crossref>conf/sacmat/2012</crossref>
<url>db/conf/sacmat/sacmat2012.html#UzunASVPFM12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/safeconfig/BadarVAS12" mdate="2021-10-14">
<author pid="126/1601">Nazia Badar</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="11/2433">Basit Shafiq</author>
<title>Risk Based Access Control Using Classification.</title>
<pages>79-95</pages>
<year>2012</year>
<booktitle>SafeConfig</booktitle>
<ee>https://doi.org/10.1007/978-3-319-01433-3_5</ee>
<crossref>conf/safeconfig/2012</crossref>
<url>db/conf/safeconfig/safeconfig2012.html#BadarVAS12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sec/JohnSAV12" mdate="2023-06-26">
<author pid="47/11487">John C. John</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Role Mining under Role-Usage Cardinality Constraint.</title>
<pages>150-161</pages>
<year>2012</year>
<booktitle>SEC</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-642-30436-1_13</ee>
<crossref>conf/sec/2012</crossref>
<url>db/conf/sec/sec2012.html#JohnSAV12</url>
</inproceedings>
</r>
<r><proceedings key="conf/sacmat/2012" mdate="2018-11-06">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="61/3091">Jaideep Vaidya</editor>
<editor pid="66/2475">Axel Kern</editor>
<editor pid="36/195">Murat Kantarcioglu</editor>
<title>17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012</title>
<publisher>ACM</publisher>
<booktitle>SACMAT</booktitle>
<year>2012</year>
<isbn>978-1-4503-1295-0</isbn>
<ee>https://doi.org/10.1145/2295136</ee>
<url>db/conf/sacmat/sacmat2012.html</url>
</proceedings>
</r>
<r><article key="journals/compsec/MondalSA11" mdate="2023-08-28">
<author orcid="0000-0002-2159-3410" pid="99/3101">Samrat Mondal</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Security analysis of GTRBAC and its variants using model checking.</title>
<pages>128-147</pages>
<year>2011</year>
<volume>30</volume>
<journal>Comput. Secur.</journal>
<number>2-3</number>
<ee>https://doi.org/10.1016/j.cose.2010.09.002</ee>
<ee>https://www.wikidata.org/entity/Q115061581</ee>
<url>db/journals/compsec/compsec30.html#MondalSA11</url>
</article>
</r>
<r><article key="journals/jcs/Atluri11" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Preface.</title>
<pages>365</pages>
<year>2011</year>
<volume>19</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.3233/JCS-2011-0425</ee>
<url>db/journals/jcs/jcs19.html#Atluri11</url>
</article>
</r>
<r><article key="journals/jcs/ShinAC11" mdate="2021-04-09">
<author pid="75/3134">Heechang Shin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="64/3219">June-Suh Cho</author>
<title>Efficiently enforcing spatiotemporal access control under uncertain location information.</title>
<pages>607-637</pages>
<year>2011</year>
<volume>19</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.3233/JCS-2011-0423</ee>
<url>db/journals/jcs/jcs19.html#ShinAC11</url>
</article>
</r>
<r><article key="journals/jcs/ShinVA11" mdate="2021-04-09">
<author pid="75/3134">Heechang Shin</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>A profile anonymization model for location-based services.</title>
<pages>795-833</pages>
<year>2011</year>
<volume>19</volume>
<journal>J. Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.3233/JCS-2010-0416</ee>
<url>db/journals/jcs/jcs19.html#ShinVA11</url>
</article>
</r>
<r><article key="journals/jsa/FerraioloAG11" mdate="2021-04-09">
<author pid="38/4159">David F. Ferraiolo</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="85/2051">Serban I. Gavrila</author>
<title>The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.</title>
<pages>412-424</pages>
<year>2011</year>
<volume>57</volume>
<journal>J. Syst. Archit.</journal>
<number>4</number>
<ee>https://doi.org/10.1016/j.sysarc.2010.04.005</ee>
<url>db/journals/jsa/jsa57.html#FerraioloAG11</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/UzunALV11" mdate="2021-04-09">
<author pid="58/9838">Emre Uzun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>An Optimization Model for the Extended Role Mining Problem.</title>
<pages>76-89</pages>
<year>2011</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2011</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-22348-8_8</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2011/UzunALV11.pdf</ee>
<url>db/conf/dbsec/dbsec2011.html#UzunALV11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AtluriSCNV11" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author pid="11/2433">Basit Shafiq</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="27/1121">Ghulam Nabi</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>UICDS-based information sharing among emergency response application systems.</title>
<pages>331-332</pages>
<year>2011</year>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/2037556.2037611</ee>
<crossref>conf/dgo/2011</crossref>
<url>db/conf/dgo/dgo2011.html#AtluriSCNV11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sdm/LuVASJ11" mdate="2022-12-14">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<author pid="49/3022-1">Lili Jiang 0001</author>
<title>Weighted Rank-One Binary Matrix Factorization.</title>
<pages>283-294</pages>
<year>2011</year>
<booktitle>SDM</booktitle>
<ee>https://doi.org/10.1137/1.9781611972818.25</ee>
<crossref>conf/sdm/2011</crossref>
<url>db/conf/sdm/sdm2011.html#LuVASJ11</url>
</inproceedings>
</r>
<r><proceedings key="conf/dgo/2011" mdate="2018-11-06">
<editor pid="43/3994">John Carlo Bertot</editor>
<editor pid="16/5999">Karine Nahon</editor>
<editor pid="c/SoonAeChun">Soon Ae Chun</editor>
<editor pid="58/1990">Luis F. Luna-Reyes</editor>
<editor pid="a/VAtluri">Vijay Atluri</editor>
<title>Proceedings of the 12th Annual International Conference on Digital Government Research, DG.O 2011, College Park, MD, USA, June 12 - 15, 2011</title>
<booktitle>DG.O</booktitle>
<publisher>Digital Government Research Center</publisher>
<year>2011</year>
<ee>https://doi.org/10.1145/2037556</ee>
<url>db/conf/dgo/dgo2011.html</url>
<isbn>978-1-4503-0762-8</isbn>
<series href="db/series/aicps/index.html">ACM International Conference Proceeding Series</series>
</proceedings>
</r>
<r><proceedings key="conf/esorics/2011" mdate="2019-05-14">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="d/ClaudiaDiaz">Claudia D&#237;az</editor>
<title>Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings</title>
<volume>6879</volume>
<year>2011</year>
<publisher>Springer</publisher>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<ee>https://doi.org/10.1007/978-3-642-23822-2</ee>
<isbn>978-3-642-23821-5</isbn>
<booktitle>ESORICS</booktitle>
<url>db/conf/esorics/esorics2011.html</url>
</proceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/crypt/Alturi11" mdate="2017-07-12">
<author pid="a/VAtluri">Vijay Alturi</author>
<title>HRU.</title>
<pages>562-564</pages>
<year>2011</year>
<booktitle>Encyclopedia of Cryptography and Security (2nd Ed.)</booktitle>
<ee>https://doi.org/10.1007/978-1-4419-5906-5_819</ee>
<crossref>reference/crypt/2011</crossref>
<url>db/reference/crypt/crypt2011.html#Alturi11</url>
</incollection>
</r>
<r><incollection publtype="encyclopedia" key="reference/crypt/AlturiF11" mdate="2017-07-12">
<author pid="a/VAtluri">Vijay Alturi</author>
<author pid="38/4159">David F. Ferraiolo</author>
<title>Role-Based Access Control.</title>
<pages>1053-1055</pages>
<year>2011</year>
<booktitle>Encyclopedia of Cryptography and Security (2nd Ed.)</booktitle>
<ee>https://doi.org/10.1007/978-1-4419-5906-5_829</ee>
<crossref>reference/crypt/2011</crossref>
<url>db/reference/crypt/crypt2011.html#AlturiF11</url>
</incollection>
</r>
<r><article key="journals/compsec/ShinVA10" mdate="2023-08-28">
<author pid="75/3134">Heechang Shin</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Anonymization models for directional location based service environments.</title>
<pages>59-73</pages>
<year>2010</year>
<volume>29</volume>
<journal>Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.cose.2009.07.006</ee>
<ee>https://www.wikidata.org/entity/Q115061713</ee>
<url>db/journals/compsec/compsec29.html#ShinVA10</url>
</article>
</r>
<r><article key="journals/datamine/JanejaAAV10" mdate="2021-04-09">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Spatial neighborhood based anomaly detection in sensor datasets.</title>
<pages>221-258</pages>
<year>2010</year>
<volume>20</volume>
<journal>Data Min. Knowl. Discov.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10618-009-0147-0</ee>
<url>db/journals/datamine/datamine20.html#JanejaAAV10</url>
</article>
</r>
<r><article key="journals/ijics/QinA10" mdate="2023-08-28">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Semantics-aware security policy specification for the semantic web data.</title>
<pages>52-75</pages>
<year>2010</year>
<volume>4</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1504/IJICS.2010.031859</ee>
<ee>https://www.wikidata.org/entity/Q114964487</ee>
<url>db/journals/ijics/ijics4.html#QinA10</url>
</article>
</r>
<r><article key="journals/ijics/AtluriGSV10" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<author pid="75/3134">Heechang Shin</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>A unified index structure for efficient enforcement of spatiotemporal authorisations.</title>
<pages>118-151</pages>
<year>2010</year>
<volume>4</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.1504/IJICS.2010.034814</ee>
<url>db/journals/ijics/ijics4.html#AtluriGSV10</url>
</article>
</r>
<r><article key="journals/tdsc/VaidyaAWG10" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<author pid="67/398">Qi Guo</author>
<title>Role Engineering via Prioritized Subset Enumeration.</title>
<pages>300-314</pages>
<year>2010</year>
<volume>7</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TDSC.2008.61</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2008.61</ee>
<url>db/journals/tdsc/tdsc7.html#VaidyaAWG10</url>
</article>
</r>
<r><article key="journals/tissec/VaidyaAG10" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<title>The role mining problem: A formal perspective.</title>
<year>2010</year>
<volume>13</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>3</number>
<ee>https://doi.org/10.1145/1805974.1895983</ee>
<url>db/journals/tissec/tissec13.html#VaidyaAG10</url>
<pages>27:1-27:31</pages>
</article>
</r>
<r><inproceedings key="conf/dbsec/VaidyaAGL10" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<author pid="57/631">Haibing Lu</author>
<title>Role Mining in the Presence of Noise.</title>
<pages>97-112</pages>
<year>2010</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2010</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-13739-6_7</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2010/VaidyaAGL10.pdf</ee>
<url>db/conf/dbsec/dbsec2010.html#VaidyaAGL10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ShafiqVAC10" mdate="2015-11-20">
<author pid="11/2433">Basit Shafiq</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<title>UICDS compliant resource management system for emergency response.</title>
<pages>23-31</pages>
<year>2010</year>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1809882</ee>
<crossref>conf/dgo/2010</crossref>
<url>db/conf/dgo/dgo2010.html#ShafiqVAC10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/ShinVAC10" mdate="2023-03-23">
<author pid="75/3134">Heechang Shin</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="09/5535">Sungyong Choi</author>
<title>Ensuring Privacy and Security for LBS through Trajectory Partitioning.</title>
<pages>224-226</pages>
<year>2010</year>
<booktitle>Mobile Data Management</booktitle>
<ee>https://doi.org/10.1109/MDM.2010.29</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MDM.2010.29</ee>
<crossref>conf/mdm/2010</crossref>
<url>db/conf/mdm/mdm2010.html#ShinVAC10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/VaidyaASA10" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Privacy-preserving trust verification.</title>
<pages>139-148</pages>
<year>2010</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1809842.1809865</ee>
<crossref>conf/sacmat/2010</crossref>
<url>db/conf/sacmat/sacmat2010.html#VaidyaASA10</url>
</inproceedings>
</r>
<r><incollection key="books/igi/10/YuAA10" mdate="2021-10-14">
<author pid="33/5471">Songmei Yu</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Preview.</title>
<pages>47-63</pages>
<year>2010</year>
<booktitle>Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development</booktitle>
<ee>https://doi.org/10.4018/978-1-60566-748-5.ch003</ee>
<crossref>books/igi/10/N2010</crossref>
<url>db/books/collections/N2010.html#YuAA10</url>
</incollection>
</r>
<r><article key="journals/ida/JanejaA09" mdate="2025-01-19">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Spatial outlier detection in heterogeneous neighborhoods.</title>
<pages>85-107</pages>
<year>2009</year>
<volume>13</volume>
<journal>Intell. Data Anal.</journal>
<number>1</number>
<ee>https://doi.org/10.3233/IDA-2009-0357</ee>
<ee>https://www.wikidata.org/entity/Q129069586</ee>
<url>db/journals/ida/ida13.html#JanejaA09</url>
</article>
</r>
<r><article key="journals/infsof/QinA09" mdate="2021-04-09">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Evaluating the validity of data instances against ontology evolution over the Semantic Web.</title>
<pages>83-97</pages>
<year>2009</year>
<volume>51</volume>
<journal>Inf. Softw. Technol.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/j.infsof.2008.01.004</ee>
<url>db/journals/infsof/infsof51.html#QinA09</url>
</article>
</r>
<r><article key="journals/jcs/VaidyaAGL09" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<author pid="57/631">Haibing Lu</author>
<title>Edge-RMP: Minimizing administrative assignments for role-based access control.</title>
<pages>211-235</pages>
<year>2009</year>
<volume>17</volume>
<journal>J. Comput. Secur.</journal>
<number>2</number>
<ee>https://doi.org/10.3233/JCS-2009-0341</ee>
<url>db/journals/jcs/jcs17.html#VaidyaAGL09</url>
</article>
</r>
<r><article key="journals/kais/GuoXAA09" mdate="2021-04-09">
<author pid="14/3888">Dihua Guo</author>
<author pid="262/1686-1">Hui Xiong 0001</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Object discovery in high-resolution remote sensing images: a semantic perspective.</title>
<pages>211-233</pages>
<year>2009</year>
<volume>19</volume>
<journal>Knowl. Inf. Syst.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10115-008-0160-4</ee>
<url>db/journals/kais/kais19.html#GuoXAA09</url>
</article>
</r>
<r><inproceedings key="conf/cikm/HongHVAA09" mdate="2025-07-04">
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<author pid="80/3328">Xiaoyun He</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Effective anonymization of query logs.</title>
<pages>1465-1468</pages>
<year>2009</year>
<booktitle>CIKM</booktitle>
<ee>https://doi.org/10.1145/1645953.1646146</ee>
<crossref>conf/cikm/2009</crossref>
<url>db/conf/cikm/cikm2009.html#HongHVAA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ShinA09" mdate="2021-04-09">
<author pid="75/3134">Heechang Shin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Spatiotemporal Access Control Enforcement under Uncertain Location Estimates.</title>
<pages>159-174</pages>
<year>2009</year>
<booktitle>DBSec</booktitle>
<crossref>conf/dbsec/2009</crossref>
<ee type="oa">https://doi.org/10.1007/978-3-642-03007-9_11</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2009/ShinA09.pdf</ee>
<url>db/conf/dbsec/dbsec2009.html#ShinA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/edbt/LuLAV09" mdate="2021-04-09">
<author pid="57/631">Haibing Lu</author>
<author pid="15/2506">Yingjiu Li</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>An efficient online auditing approach to limit private data disclosure.</title>
<pages>636-647</pages>
<year>2009</year>
<booktitle>EDBT</booktitle>
<ee>https://doi.org/10.1145/1516360.1516434</ee>
<crossref>conf/edbt/2009</crossref>
<url>db/conf/edbt/edbt2009.html#LuLAV09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdm/LuVAH09" mdate="2025-07-04">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0003-4095-4506" pid="79/5433-1">Yuan Hong 0001</author>
<title>Extended Boolean Matrix Decomposition.</title>
<pages>317-326</pages>
<year>2009</year>
<booktitle>ICDM</booktitle>
<ee>https://doi.org/10.1109/ICDM.2009.61</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDM.2009.61</ee>
<crossref>conf/icdm/2009</crossref>
<url>db/conf/icdm/icdm2009.html#LuVAH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/MondalSA09" mdate="2023-06-26">
<author orcid="0000-0002-2159-3410" pid="99/3101">Samrat Mondal</author>
<author orcid="0000-0002-4315-7329" pid="67/3314">Shamik Sural</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Towards formal security analysis of GTRBAC using timed automata.</title>
<pages>33-42</pages>
<year>2009</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1542207.1542214</ee>
<crossref>conf/sacmat/2009</crossref>
<url>db/conf/sacmat/sacmat2009.html#MondalSA09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/webi/HeVSAA09" mdate="2024-04-25">
<author pid="80/3328">Xiaoyun He</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Preserving Privacy in Social Networks: A Structure-Aware Approach.</title>
<pages>647-654</pages>
<year>2009</year>
<booktitle>Web Intelligence</booktitle>
<ee>https://doi.org/10.1109/WI-IAT.2009.108</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/WI-IAT.2009.108</ee>
<ee>https://orkg.org/orkg/resource/R34506</ee>
<crossref>conf/webi/2009</crossref>
<url>db/conf/webi/webi2009.html#HeVSAA09</url>
</inproceedings>
</r>
<r><article key="journals/jcs/AtluriSV08" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Efficient security policy enforcement for the mobile environment.</title>
<pages>439-475</pages>
<year>2008</year>
<volume>16</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<ee>https://doi.org/10.3233/JCS-2008-0329</ee>
<url>db/journals/jcs/jcs16.html#AtluriSV08</url>
</article>
</r>
<r><article key="journals/tkde/JanejaA08" mdate="2021-04-09">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Random Walks to Identify Anomalous Free-Form Spatial Scan Windows.</title>
<pages>1378-1392</pages>
<year>2008</year>
<volume>20</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TKDE.2008.96</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TKDE.2008.96</ee>
<url>db/journals/tkde/tkde20.html#JanejaA08</url>
</article>
</r>
<r><inproceedings key="conf/acsac/GuoVA08" mdate="2023-03-23">
<author pid="67/398">Qi Guo</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.</title>
<pages>237-246</pages>
<year>2008</year>
<booktitle>ACSAC</booktitle>
<ee>https://doi.org/10.1109/ACSAC.2008.38</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ACSAC.2008.38</ee>
<crossref>conf/acsac/2008</crossref>
<url>db/conf/acsac/acsac2008.html#GuoVA08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamEASCVX08" mdate="2020-04-03">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="41/1704">John Ellenberger</author>
<author pid="11/2433">Basit Shafiq</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="262/1686-1">Hui Xiong 0001</author>
<title>Secure information sharing and analysis for effective emergency management.</title>
<pages>407-408</pages>
<year>2008</year>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1367916</ee>
<crossref>conf/dgo/2008</crossref>
<url>db/conf/dgo/dgo2008.html#AdamEASCVX08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/LuVA08" mdate="2023-03-24">
<author pid="57/631">Haibing Lu</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Optimal Boolean Matrix Decomposition: Application to Role Engineering.</title>
<pages>297-306</pages>
<year>2008</year>
<booktitle>ICDE</booktitle>
<ee>https://doi.org/10.1109/ICDE.2008.4497438</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.2008.4497438</ee>
<crossref>conf/icde/2008</crossref>
<url>db/conf/icde/icde2008.html#LuVA08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/ShinAV08" mdate="2023-03-23">
<author pid="75/3134">Heechang Shin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.</title>
<pages>73-80</pages>
<year>2008</year>
<booktitle>MDM</booktitle>
<ee>https://doi.org/10.1109/MDM.2008.33</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MDM.2008.33</ee>
<crossref>conf/mdm/2008</crossref>
<url>db/conf/mdm/mdm2008.html#ShinAV08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/VaidyaAGA08" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Migrating to optimal RBAC with minimal perturbation.</title>
<pages>11-20</pages>
<year>2008</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1377836.1377839</ee>
<crossref>conf/sacmat/2008</crossref>
<url>db/conf/sacmat/sacmat2008.html#VaidyaAGA08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/Atluri08" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Panel on role engineering.</title>
<pages>61-62</pages>
<year>2008</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1377836.1377846</ee>
<crossref>conf/sacmat/2008</crossref>
<url>db/conf/sacmat/sacmat2008.html#Atluri08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/FerraioloA08" mdate="2021-04-09">
<author pid="38/4159">David F. Ferraiolo</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>A meta model for access control: why is it needed and is it even possible to achieve?</title>
<pages>153-154</pages>
<year>2008</year>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1377836.1377860</ee>
<crossref>conf/sacmat/2008</crossref>
<url>db/conf/sacmat/sacmat2008.html#FerraioloA08</url>
</inproceedings>
</r>
<r><incollection key="books/sp/08/AdamJPACCPBS08" mdate="2019-07-12">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="44/111">Vandana P. Janeja</author>
<author pid="99/4224">Aabhas V. Paliwal</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="29/7329">Jim Cooper</author>
<author pid="57/6320">John Paczkowski</author>
<author pid="34/1731">Christof Bornh&#246;vd</author>
<author pid="00/6864">Joachim Schaper</author>
<title>Semantics-Based Threat Structure Mining for Homeland Security.</title>
<pages>307-329</pages>
<year>2008</year>
<booktitle>Digital Government</booktitle>
<ee>https://doi.org/10.1007/978-0-387-71611-4_16</ee>
<crossref>books/sp/08/CBGTDHM2008</crossref>
<url>db/books/collections/CBGTDHM2008.html#AdamJPACCPBS08</url>
</incollection>
</r>
<r><incollection key="reference/dbsec/AtluriW08" mdate="2021-10-14">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<title>Security for Workflow Systems.</title>
<pages>213-230</pages>
<year>2008</year>
<booktitle>Handbook of Database Security</booktitle>
<ee>https://doi.org/10.1007/978-0-387-48533-1_9</ee>
<crossref>reference/dbsec/2008</crossref>
<url>db/reference/dbsec/dbsec2008.html#AtluriW08</url>
</incollection>
</r>
<r><incollection key="reference/dbsec/ChunA08" mdate="2021-10-14">
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Geospatial Database Security.</title>
<pages>247-266</pages>
<year>2008</year>
<booktitle>Handbook of Database Security</booktitle>
<ee>https://doi.org/10.1007/978-0-387-48533-1_11</ee>
<crossref>reference/dbsec/2008</crossref>
<url>db/reference/dbsec/dbsec2008.html#ChunA08</url>
</incollection>
</r>
<r><incollection key="reference/dbsec/AtluriS08" mdate="2021-10-14">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<title>Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment.</title>
<pages>553-573</pages>
<year>2008</year>
<booktitle>Handbook of Database Security</booktitle>
<ee>https://doi.org/10.1007/978-0-387-48533-1_23</ee>
<crossref>reference/dbsec/2008</crossref>
<url>db/reference/dbsec/dbsec2008.html#AtluriS08</url>
</incollection>
</r>
<r><proceedings key="conf/dbsec/2008" mdate="2019-05-14">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<title>Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings</title>
<volume>5094</volume>
<year>2008</year>
<isbn>978-3-540-70566-6</isbn>
<booktitle>DBSec</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<publisher>Springer</publisher>
<ee>https://doi.org/10.1007/978-3-540-70567-3</ee>
<ee>http://dl.ifip.org/db/conf/dbsec/dbsec2008/</ee>
<url>db/conf/dbsec/dbsec2008.html</url>
</proceedings>
</r>
<r><proceedings key="conf/wpes/2008" mdate="2008-11-11">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="w/MarianneWinslett">Marianne Winslett</editor>
<title>Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008</title>
<booktitle>WPES</booktitle>
<publisher>ACM</publisher>
<year>2008</year>
<isbn>978-1-60558-289-4</isbn>
<url>db/conf/wpes/wpes2008.html</url>
</proceedings>
</r>
<r><incollection publtype="encyclopedia" key="reference/gis/AtluriS08" mdate="2017-07-12">
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<title>Geospatial Authorizations, Efficient Enforcement.</title>
<pages>379-385</pages>
<year>2008</year>
<booktitle>Encyclopedia of GIS</booktitle>
<ee>https://doi.org/10.1007/978-0-387-35973-1_503</ee>
<crossref>reference/gis/2008</crossref>
<url>db/reference/gis/gis2008.html#AtluriS08</url>
</incollection>
</r>
<r><incollection publtype="encyclopedia" key="reference/gis/ChunA08" mdate="2017-07-12">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<title>Security Models, Geospatial.</title>
<pages>1028-1036</pages>
<year>2008</year>
<booktitle>Encyclopedia of GIS</booktitle>
<ee>https://doi.org/10.1007/978-0-387-35973-1_1178</ee>
<crossref>reference/gis/2008</crossref>
<url>db/reference/gis/gis2008.html#ChunA08</url>
</incollection>
</r>
<r><article key="journals/dpd/AtluriCMM07" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author pid="98/4341">Pietro Mazzoleni</author>
<title>A decentralized execution model for inter-organizational workflows.</title>
<pages>55-83</pages>
<year>2007</year>
<volume>22</volume>
<journal>Distributed Parallel Databases</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10619-007-7012-1</ee>
<url>db/journals/dpd/dpd22.html#AtluriCMM07</url>
</article>
</r>
<r><article key="journals/ijics/AtluriC07" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<title>A geotemporal role-based authorisation system.</title>
<pages>143-168</pages>
<year>2007</year>
<volume>1</volume>
<journal>Int. J. Inf. Comput. Secur.</journal>
<number>1/2</number>
<ee>https://doi.org/10.1504/IJICS.2007.012247</ee>
<ee>https://www.wikidata.org/entity/Q114964545</ee>
<url>db/journals/ijics/ijics1.html#AtluriC07</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriS07" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<title>Efficient Security Policy Enforcement in a Location Based Service Environment.</title>
<pages>61-76</pages>
<year>2007</year>
<crossref>conf/dbsec/2007</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/978-3-540-73538-0_5</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2007/AtluriS07.pdf</ee>
<url>db/conf/dbsec/dbsec2007.html#AtluriS07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ChunAA07" mdate="2015-11-20">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<title>MENVIS: mobile environmental information system.</title>
<pages>286-287</pages>
<year>2007</year>
<crossref>conf/dgo/2007</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1248522</ee>
<url>db/conf/dgo/dgo2007.html#ChunAA07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pakdd/GuoXAA07" mdate="2021-04-09">
<author pid="14/3888">Dihua Guo</author>
<author pid="262/1686-1">Hui Xiong 0001</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery.</title>
<pages>71-83</pages>
<year>2007</year>
<crossref>conf/pakdd/2007</crossref>
<booktitle>PAKDD</booktitle>
<ee>https://doi.org/10.1007/978-3-540-71701-0_10</ee>
<url>db/conf/pakdd/pakdd2007.html#GuoXAA07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/VaidyaAG07" mdate="2025-01-19">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<title>The role mining problem: finding a minimal descriptive set of roles.</title>
<pages>175-184</pages>
<year>2007</year>
<crossref>conf/sacmat/2007</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1266840.1266870</ee>
<ee>https://www.wikidata.org/entity/Q130970220</ee>
<url>db/conf/sacmat/sacmat2007.html#VaidyaAG07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/WarnerAMV07" mdate="2021-04-09">
<author pid="98/927">Janice Warner</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author pid="61/3091">Jaideep Vaidya</author>
<title>Using semantics for automatic enforcement of access control policies among dynamic coalitions.</title>
<pages>235-244</pages>
<year>2007</year>
<crossref>conf/sacmat/2007</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1266840.1266877</ee>
<url>db/conf/sacmat/sacmat2007.html#WarnerAMV07</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2007csaw" mdate="2020-11-10">
<editor pid="76/1374">Peng Ning</editor>
<editor pid="a/VAtluri">Vijay Atluri</editor>
<title>Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007</title>
<booktitle>CSAW</booktitle>
<publisher>ACM</publisher>
<year>2007</year>
<isbn>978-1-59593-890-9</isbn>
<url>db/conf/ccs/ccs2007csaw.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2007fmse" mdate="2020-11-10">
<editor pid="76/1374">Peng Ning</editor>
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="20/2659">Virgil D. Gligor</editor>
<editor pid="m/HeikoMantel">Heiko Mantel</editor>
<title>Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007</title>
<booktitle>FMSE</booktitle>
<publisher>ACM</publisher>
<year>2007</year>
<isbn>978-1-59593-887-9</isbn>
<url>db/conf/ccs/ccs2007fmse.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2007stc" mdate="2020-11-10">
<editor pid="76/1374">Peng Ning</editor>
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="78/2715">Shouhuai Xu</editor>
<editor pid="y/MotiYung">Moti Yung</editor>
<title>Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007</title>
<booktitle>STC</booktitle>
<publisher>ACM</publisher>
<year>2007</year>
<isbn>978-1-59593-888-6</isbn>
<url>db/conf/ccs/stc2007.html</url>
</proceedings>
</r>
<r><article key="journals/ijswis/QinA06" mdate="2023-08-28">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>SemDiff: An Approach to Detecting Semantic Changes to Ontologies.</title>
<pages>1-32</pages>
<year>2006</year>
<volume>2</volume>
<journal>Int. J. Semantic Web Inf. Syst.</journal>
<number>4</number>
<ee>https://doi.org/10.4018/jswis.2006100101</ee>
<ee>https://www.wikidata.org/entity/Q114574510</ee>
<url>db/journals/ijswis/ijswis2.html#QinA06</url>
</article>
</r>
<r><article key="journals/jods/QinA06" mdate="2021-04-09">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>An Ontology-Guided Approach to Change Detection of the Semantic Web Data.</title>
<pages>130-157</pages>
<year>2006</year>
<crossref>journals/jods/2006-5</crossref>
<journal>J. Data Semant.</journal>
<ee>https://doi.org/10.1007/11617808_5</ee>
<url>db/journals/jods/jods5.html#QinA06</url>
</article>
</r>
<r><inproceedings key="conf/ccs/MitraPLA06" mdate="2026-03-24">
<author orcid="0000-0002-7530-9497" pid="19/3308">Prasenjit Mitra</author>
<author pid="81/2601">Chi-Chun Pan</author>
<author pid="21/6121-5">Peng Liu 0005</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Privacy-preserving semantic interoperation and access control of heterogeneous databases.</title>
<pages>66-77</pages>
<year>2006</year>
<crossref>conf/ccs/2006</crossref>
<booktitle>AsiaCCS</booktitle>
<ee>https://doi.org/10.1145/1128817.1128831</ee>
<url>db/conf/ccs/ccs2006.html#MitraPLA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ccs/VaidyaAW06" mdate="2021-04-09">
<author pid="61/3091">Jaideep Vaidya</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<title>RoleMiner: mining roles using subset enumeration.</title>
<pages>144-153</pages>
<year>2006</year>
<crossref>conf/ccs/2006usa</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/1180405.1180424</ee>
<url>db/conf/ccs/ccs2006usa.html#VaidyaAW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dawak/YuAA06" mdate="2021-04-09">
<author pid="33/5471">Songmei Yu</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Preview: Optimizing View Materialization Cost in Spatial Data Warehouses.</title>
<pages>45-54</pages>
<year>2006</year>
<crossref>conf/dawak/2006</crossref>
<booktitle>DaWaK</booktitle>
<ee>https://doi.org/10.1007/11823728_5</ee>
<url>db/conf/dawak/dawak2006.html#YuAA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/MukkamalaAWA06" mdate="2021-04-09">
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<author pid="59/535">Ranjit Abbadasari</author>
<title>A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.</title>
<pages>209-223</pages>
<year>2006</year>
<crossref>conf/dbsec/2006</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11805588_15</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2006/MukkamalaAWA06.pdf</ee>
<url>db/conf/dbsec/dbsec2006.html#MukkamalaAWA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AtluriS06" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="75/3134">Heechang Shin</author>
<title>Efficient Enforcement of Security Policies Based on Tracking of Mobile Users.</title>
<pages>237-251</pages>
<year>2006</year>
<crossref>conf/dbsec/2006</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11805588_17</ee>
<ee type="oa">http://dl.ifip.org/db/conf/dbsec/dbsec2006/AtluriS06.pdf</ee>
<url>db/conf/dbsec/dbsec2006.html#AtluriS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexa/YuAA06" mdate="2021-04-09">
<author pid="33/5471">Songmei Yu</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse.</title>
<pages>439-448</pages>
<year>2006</year>
<crossref>conf/dexa/2006</crossref>
<booktitle>DEXA</booktitle>
<ee>https://doi.org/10.1007/11827405_43</ee>
<url>db/conf/dexa/dexa2006.html#YuAA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamAKGJW06" mdate="2021-04-09">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="70/2586">Rey Koslowski</author>
<author pid="99/2304">Robert Grossman</author>
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="98/927">Janice Warner</author>
<title>Secure interoperation for effective data mining in border control and homeland security applications.</title>
<pages>124-125</pages>
<year>2006</year>
<crossref>conf/dgo/2006</crossref>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/1146598.1146636</ee>
<url>db/conf/dgo/dgo2006.html#AdamAKGJW06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ChunYAA06" mdate="2021-04-09">
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="y/YelenaYesha">Yelena Yesha</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Challenges in eGovernment technology transfer.</title>
<pages>151-152</pages>
<year>2006</year>
<crossref>conf/dgo/2006</crossref>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/1146598.1146646</ee>
<url>db/conf/dgo/dgo2006.html#ChunYAA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamACABC06" mdate="2021-04-09">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="48/2493">Francisco J. Artigas</author>
<author pid="26/1460">Irfan Bora</author>
<author pid="60/95">Bob Ceberio</author>
<title>Constituent-centric municipal government coalition portal.</title>
<pages>365-366</pages>
<year>2006</year>
<crossref>conf/dgo/2006</crossref>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/1146598.1146704</ee>
<url>db/conf/dgo/dgo2006.html#AdamACABC06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamAJPYCCPBNS06" mdate="2021-10-27">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="99/4224">Aabhas V. Paliwal</author>
<author orcid="0000-0001-9248-082X" pid="42/2815">Mahmoud Youssef</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="29/7329">Jim Cooper</author>
<author pid="57/6320">John Paczkowski</author>
<author pid="34/1731">Christof Bornh&#246;vd</author>
<author orcid="0000-0002-7193-8106" pid="57/3095">Ike Nassi</author>
<author pid="00/6864">Joachim Schaper</author>
<title>Semantics-based threat structure mining.</title>
<pages>367-368</pages>
<year>2006</year>
<crossref>conf/dgo/2006</crossref>
<booktitle>DG.O</booktitle>
<ee>https://doi.org/10.1145/1146598.1146705</ee>
<url>db/conf/dgo/dgo2006.html#AdamAJPYCCPBNS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/YoussefAA06" mdate="2021-04-09">
<author orcid="0000-0001-9248-082X" pid="42/2815">Mahmoud Youssef</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Semantically enhanced enforcement of mobile consumer's privacy preferences.</title>
<pages>1172-1176</pages>
<year>2006</year>
<crossref>conf/sac/2006</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/1141277.1141554</ee>
<url>db/conf/sac/sac2006.html#YoussefAA06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/WarnerA06" mdate="2021-04-09">
<author pid="98/927">Janice Warner</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Inter-instance authorization constraints for secure workflow management.</title>
<pages>190-199</pages>
<year>2006</year>
<crossref>conf/sacmat/2006</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1133058.1133085</ee>
<url>db/conf/sacmat/sacmat2006.html#WarnerA06</url>
</inproceedings>
</r>
<r><proceedings key="conf/iciss/2006" mdate="2019-05-14">
<editor pid="69/128">Aditya Bagchi</editor>
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<title>Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings</title>
<booktitle>ICISS</booktitle>
<series href="db/series/lncs/index.html">Lecture Notes in Computer Science</series>
<volume>4332</volume>
<publisher>Springer</publisher>
<year>2006</year>
<isbn>3-540-68962-1</isbn>
<ee>https://doi.org/10.1007/11961635</ee>
<url>db/conf/iciss/iciss2006.html</url>
</proceedings>
</r>
<r><article key="journals/dpd/ChunAA05" mdate="2021-04-09">
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Using Semantics for Policy-Based Web Service Composition.</title>
<pages>37-64</pages>
<year>2005</year>
<volume>18</volume>
<journal>Distributed Parallel Databases</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s10619-005-1073-9</ee>
<url>db/journals/dpd/dpd18.html#ChunAA05</url>
</article>
</r>
<r><article key="journals/tissec/Atluri05" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Preface.</title>
<pages>2</pages>
<year>2005</year>
<volume>8</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/1053283.1053285</ee>
<url>db/journals/tissec/tissec8.html#Atluri05</url>
</article>
</r>
<r><inproceedings key="conf/dawak/YuAA05" mdate="2021-04-09">
<author pid="33/5471">Songmei Yu</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Selective View Materialization in a Spatial Data Warehouse.</title>
<pages>157-167</pages>
<year>2005</year>
<crossref>conf/dawak/2005</crossref>
<booktitle>DaWaK</booktitle>
<ee>https://doi.org/10.1007/11546849_16</ee>
<url>db/conf/dawak/dawak2005.html#YuAA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/WarnerAM05" mdate="2021-04-09">
<author pid="98/927">Janice Warner</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.</title>
<pages>252-266</pages>
<year>2005</year>
<crossref>conf/dbsec/2005</crossref>
<booktitle>DBSec</booktitle>
<ee type="oa">https://doi.org/10.1007/11535706_19</ee>
<url>db/conf/dbsec/dbsec2005.html#WarnerAM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/JanejaAGABL05" mdate="2015-11-20">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="10/1146">Ahmed Gomaa</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="34/1731">Christof Bornh&#246;vd</author>
<author pid="64/4492">Tao Lin</author>
<title>DM-AMS: employing data mining techniques for alert management.</title>
<pages>103-111</pages>
<year>2005</year>
<crossref>conf/dgo/2005</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1065254</ee>
<url>db/conf/dgo/dgo2005.html#JanejaAGABL05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamACFCBSFM05" mdate="2015-11-20">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="31/212">Patrizia Fariselli</author>
<author pid="42/3612">Julia Culver-Hopper</author>
<author pid="37/313">Olana Bojic</author>
<author pid="36/3409">Rick T. Stewart</author>
<author pid="22/2670">Jim Fruscione</author>
<author pid="13/160">Nick Mannochio</author>
<title>Technology transfer of inter-agency government services and their transnational feasibility studies.</title>
<pages>225-226</pages>
<year>2005</year>
<crossref>conf/dgo/2005</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1065293</ee>
<url>db/conf/dgo/dgo2005.html#AdamACFCBSFM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamAKJWP05" mdate="2015-11-20">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="70/2586">Rey Koslowski</author>
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="98/927">Janice Warner</author>
<author pid="99/4224">Aabhas V. Paliwal</author>
<title>Agency interoperation for effective data mining in border control and homeland security applications.</title>
<pages>285-286</pages>
<year>2005</year>
<crossref>conf/dgo/2005</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1065323</ee>
<url>db/conf/dgo/dgo2005.html#AdamAKJWP05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/AtluriG05" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<title>Unified Index for Mobile Object Data and Authorizations.</title>
<pages>80-97</pages>
<year>2005</year>
<crossref>conf/esorics/2005</crossref>
<booktitle>ESORICS</booktitle>
<ee type="oa">https://doi.org/10.1007/11555827_6</ee>
<url>db/conf/esorics/esorics2005.html#AtluriG05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdm/JanejaA05" mdate="2023-03-24">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>FS<sup>3</sup>: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection.</title>
<pages>661-664</pages>
<year>2005</year>
<crossref>conf/icdm/2005</crossref>
<booktitle>ICDM</booktitle>
<ee>https://doi.org/10.1109/ICDM.2005.71</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDM.2005.71</ee>
<url>db/conf/icdm/icdm2005.html#JanejaA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iciss/WarnerAM05" mdate="2021-04-09">
<author pid="98/927">Janice Warner</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.</title>
<pages>134-147</pages>
<year>2005</year>
<crossref>conf/iciss/2005</crossref>
<booktitle>ICISS</booktitle>
<ee>https://doi.org/10.1007/11593980_10</ee>
<url>db/conf/iciss/iciss2005.html#WarnerAM05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icmcs/GuoAA05" mdate="2023-03-24">
<author pid="14/3888">Dihua Guo</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Texture-Based Remote-Sensing Image Segmentation.</title>
<pages>1472-1475</pages>
<year>2005</year>
<crossref>conf/icmcs/2005</crossref>
<booktitle>ICME</booktitle>
<ee>https://doi.org/10.1109/ICME.2005.1521710</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICME.2005.1521710</ee>
<url>db/conf/icmcs/icme2005.html#GuoAA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipccc/GomaaAA05" mdate="2023-03-24">
<author pid="10/1146">Ahmed Gomaa</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Adapting spatial constraints of composite multimedia objects to achieve universal access.</title>
<pages>519-525</pages>
<year>2005</year>
<crossref>conf/ipccc/2005</crossref>
<booktitle>IPCCC</booktitle>
<ee>https://doi.org/10.1109/PCCC.2005.1460624</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PCCC.2005.1460624</ee>
<url>db/conf/ipccc/ipccc2005.html#GomaaAA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isi/JanejaAVA05" mdate="2021-04-09">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="61/3091">Jaideep Vaidya</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Collusion Set Detection Through Outlier Discovery.</title>
<pages>1-13</pages>
<year>2005</year>
<crossref>conf/isi/2005</crossref>
<booktitle>ISI</booktitle>
<ee>https://doi.org/10.1007/11427995_1</ee>
<url>db/conf/isi/isi2005.html#JanejaAVA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mdm/YoussefAA05" mdate="2021-04-09">
<author orcid="0000-0001-9248-082X" pid="42/2815">Mahmoud Youssef</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Preserving mobile customer privacy: an access control system for moving objects and customer profiles.</title>
<pages>67-76</pages>
<year>2005</year>
<crossref>conf/mdm/2005</crossref>
<booktitle>Mobile Data Management</booktitle>
<ee>https://doi.org/10.1145/1071246.1071257</ee>
<url>db/conf/mdm/mdm2005.html#YoussefAA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mmm/GomaaAA05" mdate="2023-03-24">
<author orcid="0000-0003-0869-7888" pid="10/1146">Ahmed Gomaa</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Color Time Petri Net for Interactive Adaptive Multimedia Objects.</title>
<pages>147-157</pages>
<year>2005</year>
<crossref>conf/mmm/2005</crossref>
<booktitle>MMM</booktitle>
<ee>https://doi.org/10.1109/MMMC.2005.26</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MMMC.2005.26</ee>
<url>db/conf/mmm/mmm2005.html#GomaaAA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/JanejaA05" mdate="2021-04-09">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>LS<sup>3</sup>: a Linear Semantic Scan Statistic technique for detecting anomalous windows.</title>
<pages>493-497</pages>
<year>2005</year>
<crossref>conf/sac/2005</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/1066677.1066790</ee>
<url>db/conf/sac/sac2005.html#JanejaA05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sacmat/AtluriW05" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<title>Supporting conditional delegation in secure workflow management systems.</title>
<pages>49-58</pages>
<year>2005</year>
<crossref>conf/sacmat/2005</crossref>
<booktitle>SACMAT</booktitle>
<ee>https://doi.org/10.1145/1063979.1063990</ee>
<url>db/conf/sacmat/sacmat2005.html#AtluriW05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wecwis/KimIA05" mdate="2023-03-24">
<author pid="84/6399">Dong-Ho Kim</author>
<author pid="64/4122">Il Im</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>A Clickstream-Based Collaborative Filtering Recommendation Model for E-Commerce.</title>
<pages>84-91</pages>
<year>2005</year>
<crossref>conf/wecwis/2005</crossref>
<booktitle>CEC</booktitle>
<ee>https://doi.org/10.1109/ICECT.2005.1</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICECT.2005.1</ee>
<url>db/conf/wecwis/cec2005.html#KimIA05</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2005" mdate="2023-09-19">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="99/395">Catherine Meadows 0001</editor>
<editor pid="j/AriJuels">Ari Juels</editor>
<title>Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<isbn>1-59593-226-7</isbn>
<url>db/conf/ccs/ccs2005.html</url>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2005fmse" mdate="2020-11-10">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="s/PSamarati">Pierangela Samarati</editor>
<editor pid="k/RKusters">Ralf K&#252;sters</editor>
<editor pid="m/JohnCMitchell">John C. Mitchell</editor>
<title>Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005</title>
<booktitle>FMSE</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<isbn>1-59593-231-3</isbn>
<url>db/conf/ccs/ccs2005fmse.html</url>
</proceedings>
</r>
<r><proceedings key="conf/dim/2005" mdate="2006-09-27">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="s/PSamarati">Pierangela Samarati</editor>
<editor pid="85/3081">Atsuhiro Goto</editor>
<title>Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005</title>
<booktitle>Digital Identity Management</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<url>db/conf/dim/dim2005.html</url>
<isbn>1-59593-232-1</isbn>
</proceedings>
</r>
<r><proceedings key="conf/sasn/2005" mdate="2026-03-30">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="76/1374">Peng Ning</editor>
<editor pid="d/WenliangDu">Wenliang Du 0001</editor>
<title>Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, SASN 2005, Alexandria, VA, USA, November 7, 2005</title>
<booktitle>SASN</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<isbn>1-59593-227-5</isbn>
<url>db/conf/sasn/sasn2005.html</url>
</proceedings>
</r>
<r><proceedings key="conf/storagess/2005" mdate="2017-10-23">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="s/PSamarati">Pierangela Samarati</editor>
<editor pid="y/WilliamYurcik">William Yurcik</editor>
<editor pid="08/2956">Larry Brumbaugh</editor>
<editor pid="99/2747-1">Yuanyuan Zhou 0001</editor>
<title>Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005</title>
<booktitle>StorageSS</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<url>db/conf/storagess/storagess2005.html</url>
<isbn>1-59593-233-X</isbn>
</proceedings>
</r>
<r><proceedings key="conf/worm/2005" mdate="2007-02-23">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="k/AngelosDKeromytis">Angelos D. Keromytis</editor>
<title>Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005</title>
<booktitle>WORM</booktitle>
<isbn>1-59593-229-1</isbn>
<publisher>ACM Press</publisher>
<year>2005</year>
<url>db/conf/worm/worm2005.html</url>
</proceedings>
</r>
<r><proceedings key="conf/wpes/2005" mdate="2006-03-09">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="v/SabrinaDeCapitanidiVimercati">Sabrina De Capitani di Vimercati</editor>
<editor pid="31/479">Roger Dingledine</editor>
<title>Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005</title>
<booktitle>WPES</booktitle>
<publisher>ACM</publisher>
<year>2005</year>
<isbn>1-59593-228-3</isbn>
<url>db/conf/wpes/wpes2005.html</url>
</proceedings>
</r>
<r><article key="journals/jcs/AtluriCM04" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="98/4341">Pietro Mazzoleni</author>
<title>Chinese wall security for decentralized workflow management systems.</title>
<pages>799-840</pages>
<year>2004</year>
<volume>12</volume>
<journal>J. Comput. Secur.</journal>
<number>6</number>
<url>db/journals/jcs/jcs12.html#AtluriCM04</url>
<ee>https://doi.org/10.3233/jcs-2004-12601</ee>
<ee>https://www.wikidata.org/entity/Q114944112</ee>
</article>
</r>
<r><article key="journals/jodl/AtluriR04" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="r/IndrakshiRay">Indrakshi Ray</author>
<title>Editors' message for the special issue on security.</title>
<pages>137-138</pages>
<year>2004</year>
<volume>4</volume>
<journal>Int. J. Digit. Libr.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s00799-004-0087-7</ee>
<ee>https://www.wikidata.org/entity/Q115148430</ee>
<url>db/journals/jodl/jodl4.html#AtluriR04</url>
</article>
</r>
<r><article key="journals/tdsc/AtluriC04" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<title>An Authorization Model for Geospatial Data.</title>
<pages>238-254</pages>
<year>2004</year>
<volume>1</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2004.32</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TDSC.2004.32</ee>
<url>db/journals/tdsc/tdsc1.html#AtluriC04</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriG04" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="67/398">Qi Guo</author>
<title>STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations.</title>
<pages>31-47</pages>
<year>2004</year>
<crossref>conf/dbsec/2004</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2004.html#AtluriG04</url>
<ee>https://doi.org/10.1007/1-4020-8128-6_3</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamAC04" mdate="2015-11-20">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<title>Human-Centered Systems for Business Services.</title>
<year>2004</year>
<crossref>conf/dgo/2004</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1124249</ee>
<url>db/conf/dgo/dgo2004.html#AdamAC04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/AdamAJ04" mdate="2015-11-20">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="44/111">Vandana Pursnani Janeja</author>
<title>Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications.</title>
<year>2004</year>
<crossref>conf/dgo/2004</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1124194</ee>
<url>db/conf/dgo/dgo2004.html#AdamAJ04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/JanejaAA04" mdate="2015-11-20">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations.</title>
<year>2004</year>
<crossref>conf/dgo/2004</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1124213</ee>
<url>db/conf/dgo/dgo2004.html#JanejaAA04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/er/QinA04" mdate="2021-04-09">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Ontology-Guided Change Detection to the Semantic Web Data.</title>
<pages>624-638</pages>
<ee>https://doi.org/10.1007/978-3-540-30464-7_47</ee>
<year>2004</year>
<crossref>conf/er/2004</crossref>
<booktitle>ER</booktitle>
<url>db/conf/er/er2004.html#QinA04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcit/AtluriW04" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<title>Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.</title>
<pages>369-378</pages>
<ee>https://doi.org/10.1007/978-3-540-30555-2_43</ee>
<year>2004</year>
<crossref>conf/icdcit/2004</crossref>
<booktitle>ICDCIT</booktitle>
<url>db/conf/icdcit/icdcit2004.html#AtluriW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ride/ChunAA04" mdate="2023-03-23">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Policy-Based Web Service Composition.</title>
<pages>85-92</pages>
<year>2004</year>
<crossref>conf/ride/2004</crossref>
<booktitle>RIDE</booktitle>
<ee>https://doi.org/10.1109/RIDE.2004.1281707</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RIDE.2004.1281707</ee>
<url>db/conf/ride/ride2004.html#ChunAA04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/AdamJA04" mdate="2021-04-09">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="44/111">Vandana Pursnani Janeja</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets.</title>
<pages>576-583</pages>
<year>2004</year>
<crossref>conf/sac/2004</crossref>
<booktitle>SAC</booktitle>
<ee>https://doi.org/10.1145/967900.968020</ee>
<url>db/conf/sac/sac2004.html#AdamJA04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tc11-5/MukkamalaAW04" mdate="2021-04-09">
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/927">Janice Warner</author>
<title>A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.</title>
<pages>319-333</pages>
<year>2004</year>
<booktitle>IICIS</booktitle>
<ee type="oa">https://doi.org/10.1007/0-387-31167-X_21</ee>
<crossref>conf/tc11-5/2004</crossref>
<url>db/conf/tc11-5/iicis2004.html#MukkamalaAW04</url>
</inproceedings>
</r>
<r><inproceedings key="conf/widm/KimIABAY04" mdate="2018-11-06">
<author pid="84/6399">Dong-Ho Kim</author>
<author pid="64/4122">Il Im</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/MichaelBieber">Michael Bieber</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="y/YelenaYesha">Yelena Yesha</author>
<title>A clickstream-based collaborative filtering personalization model: towards a better performance.</title>
<pages>88-95</pages>
<year>2004</year>
<crossref>conf/widm/2004</crossref>
<booktitle>WIDM</booktitle>
<ee>https://doi.org/10.1145/1031453.1031470</ee>
<url>db/conf/widm/widm2004.html#KimIABAY04</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2004" mdate="2020-11-10">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="b/MichaelBackes1">Michael Backes 0001</editor>
<editor pid="b/DavidABasin">David A. Basin</editor>
<editor pid="90/308">Michael Waidner</editor>
<title>Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washington, DC, USA, October 29, 2004</title>
<booktitle>FMSE</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<isbn>1-58113-971-3</isbn>
<url>db/conf/ccs/ccs2004.html</url>
<ee>http://dl.acm.org/citation.cfm?id=1030083</ee>
</proceedings>
</r>
<r><proceedings key="conf/ccs/2004ccs" mdate="2020-11-13">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="p/BPfitzmann">Birgit Pfitzmann</editor>
<editor pid="m/PatrickDrewMcDaniel">Patrick D. McDaniel</editor>
<title>Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<isbn>1-58113-961-6</isbn>
<url>db/conf/ccs/ccs2004p.html</url>
</proceedings>
</r>
<r><proceedings key="conf/sws/2004" mdate="2008-04-22">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<title>Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004</title>
<booktitle>SWS</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<url>db/conf/sws/sws2004.html</url>
<isbn>1-58113-973-X</isbn>
</proceedings>
</r>
<r><proceedings key="conf/wpes/2004" mdate="2005-02-16">
<editor pid="a/VAtluri">Vijay Atluri</editor>
<editor pid="81/5221">Paul F. Syverson</editor>
<editor pid="v/SabrinaDeCapitanidiVimercati">Sabrina De Capitani di Vimercati</editor>
<title>Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, WPES 2004, Washington, DC, USA, October 28, 2004</title>
<booktitle>WPES</booktitle>
<publisher>ACM</publisher>
<year>2004</year>
<isbn>1-58113-968-3</isbn>
<url>db/conf/wpes/wpes2004.html</url>
</proceedings>
</r>
<r><article key="journals/vldb/AtluriJY03" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<author orcid="0000-0002-8641-3193" pid="j/AnupamJoshi">Anupam Joshi</author>
<author pid="y/YelenaYesha">Yelena Yesha</author>
<title>Guest editorial.</title>
<pages>285</pages>
<year>2003</year>
<volume>12</volume>
<journal>VLDB J.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s00778-003-0109-x</ee>
<url>db/journals/vldb/vldb12.html#AtluriJY03</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriBFM03" mdate="2024-11-12">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="389/7043-1">Elena Ferrari 0001</author>
<author pid="98/4341">Pietro Mazzoleni</author>
<title>Supporting Delegation in Secure Workflow Management Systems.</title>
<pages>190-202</pages>
<year>2003</year>
<crossref>conf/dbsec/2003</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2003.html#AtluriBFM03</url>
<ee>https://doi.org/10.1007/1-4020-8070-0_14</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dexa/AtluriC03" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<title>Handling Dynamic Changes in Decentralized Workflow Execution Environments.</title>
<pages>813-825</pages>
<ee>https://doi.org/10.1007/978-3-540-45227-0_79</ee>
<year>2003</year>
<crossref>conf/dexa/2003</crossref>
<booktitle>DEXA</booktitle>
<url>db/conf/dexa/dexa2003.html#AtluriC03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ChunA03" mdate="2015-11-20">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Ontology-based Workflow Change Management for Flexible eGovernment Service Delivery.</title>
<year>2003</year>
<crossref>conf/dgo/2003</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1123270</ee>
<url>db/conf/dgo/dgo2003.html#ChunA03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/PaliwalAA03" mdate="2015-11-20">
<author pid="99/4224">Aabhas V. Paliwal</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Electronic Negotiation of Government Contracts through Transducers.</title>
<year>2003</year>
<crossref>conf/dgo/2003</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1123243</ee>
<url>db/conf/dgo/dgo2003.html#PaliwalAA03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ecweb/QinA03" mdate="2017-05-23">
<author pid="87/5216">Li Qin</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>An Access Scheduling Tree to Achieve Optimal Freshness in Local Repositories.</title>
<pages>227-236</pages>
<ee>https://doi.org/10.1007/978-3-540-45229-4_23</ee>
<year>2003</year>
<crossref>conf/ecweb/2003</crossref>
<booktitle>EC-Web</booktitle>
<url>db/conf/ecweb/ecweb2003.html#QinA03</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sac/AtluriAGA03" mdate="2022-12-07">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-0869-7888" pid="10/1146">Ahmed Gomaa</author>
<author pid="81/1859">Igg Adiwijaya</author>
<title>Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints.</title>
<pages>927-934</pages>
<year>2003</year>
<crossref>conf/sac/2003</crossref>
<booktitle>SAC</booktitle>
<url>db/conf/sac/sac2003.html#AtluriAGA03</url>
<ee>https://doi.org/10.1145/952532.952715</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/xmlsec/QinA03" mdate="2021-04-09">
<author pid="87/5216">Li Qin</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Concept-level access control for the Semantic Web.</title>
<pages>94-103</pages>
<year>2003</year>
<crossref>conf/xmlsec/2003</crossref>
<booktitle>XML Security</booktitle>
<ee>https://doi.org/10.1145/968559.968575</ee>
<url>db/conf/xmlsec/xmlsec2003.html#QinA03</url>
</inproceedings>
</r>
<r><proceedings key="conf/ccs/2003" mdate="2020-11-10">
<editor pid="j/SushilJajodia">Sushil Jajodia</editor>
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="45/576">Trent Jaeger</editor>
<title>Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2003</year>
<isbn>1-58113-738-9</isbn>
<url>db/conf/ccs/ccs2003.html</url>
<ee>http://dl.acm.org/citation.cfm?id=948109</ee>
</proceedings>
</r>
<r><article key="journals/informaticaSI/AtluriM02" mdate="2016-02-15">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>Employing an extended transaction model in multilevel secure transaction processing.</title>
<year>2002</year>
<volume>26</volume>
<journal>Informatica (Slovenia)</journal>
<number>2</number>
<url>db/journals/informaticaSI/informaticaSI26.html#AtluriM02</url>
</article>
</r>
<r><article key="journals/tissec/AtluriG02" mdate="2022-08-16">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="g/AvigdorGal">Avigdor Gal</author>
<title>An authorization model for temporal and derived data: securing information portals.</title>
<pages>62-94</pages>
<year>2002</year>
<volume>5</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/504909.504912</ee>
<ee>https://www.wikidata.org/entity/Q113434060</ee>
<url>db/journals/tissec/tissec5.html#AtluriG02</url>
</article>
</r>
<r><article key="journals/tkde/AdamABF02" mdate="2024-11-12">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author orcid="0000-0002-7312-6769" pid="389/7043-1">Elena Ferrari 0001</author>
<title>A Content-Based Authorization Model for Digital Libraries.</title>
<pages>296-315</pages>
<year>2002</year>
<volume>14</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/69.991718</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.991718</ee>
<url>db/journals/tkde/tkde14.html#AdamABF02</url>
</article>
</r>
<r><article key="journals/vldb/FerrariAABC02" mdate="2024-11-12">
<author orcid="0000-0002-7312-6769" pid="389/7043-1">Elena Ferrari 0001</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="90/4451">Ugo Capuozzo</author>
<title>An authorization system for digital libraries.</title>
<pages>58-67</pages>
<year>2002</year>
<volume>11</volume>
<journal>VLDB J.</journal>
<number>1</number>
<ee>https://doi.org/10.1007/s007780200063</ee>
<url>db/journals/vldb/vldb11.html#FerrariAABC02</url>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriM02" mdate="2003-08-27">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="98/4341">Pietro Mazzoleni</author>
<title>Uniform Indexing for Geospatial Data and Authorizations.</title>
<pages>207-218</pages>
<year>2002</year>
<crossref>conf/dbsec/2002</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2002.html#AtluriM02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexa/ChunAA02" mdate="2021-04-09">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Domain Knowledge-Based Automatic Workflow Generation.</title>
<pages>81-92</pages>
<year>2002</year>
<crossref>conf/dexa/2002</crossref>
<booktitle>DEXA</booktitle>
<ee>https://doi.org/10.1007/3-540-46146-9_9</ee>
<url>db/conf/dexa/dexa2002.html#ChunAA02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/ChunAA02" mdate="2015-11-20">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Dynamic Composition of Workflows for Customized eGovernment Service Delivery.</title>
<year>2002</year>
<crossref>conf/dgo/2002</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1123127</ee>
<url>db/conf/dgo/dgo2002.html#ChunAA02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dgo/JanejaAA02" mdate="2015-11-20">
<author pid="44/111">Vandana Pursnani Janeja</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes.</title>
<year>2002</year>
<crossref>conf/dgo/2002</crossref>
<booktitle>DG.O</booktitle>
<ee>http://dl.acm.org/citation.cfm?id=1123160</ee>
<url>db/conf/dgo/dgo2002.html#JanejaAA02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icde/GalAX02" mdate="2023-03-24">
<author pid="g/AvigdorGal">Avigdor Gal</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="21/1244">Gang Xu</author>
<title>An Authorization System for Temporal Data.</title>
<pages>339-340</pages>
<year>2002</year>
<crossref>conf/icde/2002</crossref>
<booktitle>ICDE</booktitle>
<ee>https://doi.org/10.1109/ICDE.2002.994747</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDE.2002.994747</ee>
<url>db/conf/icde/icde2002.html#GalAX02</url>
</inproceedings>
</r>
<r><incollection key="series/ads/AtluriCHA02" mdate="2017-05-16">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="83/3302">Richard D. Holowczak</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>Automating the Delivery of Governmental Business Services Through Workflow Technology.</title>
<pages>69-84</pages>
<year>2002</year>
<booktitle>Advances in Digital Government</booktitle>
<ee>https://doi.org/10.1007/0-306-47374-7_4</ee>
<crossref>series/ads/2002-26</crossref>
<url>db/series/ads/ads26.html#AtluriCHA02</url>
</incollection>
</r>
<r><proceedings key="conf/ccs/2002" mdate="2020-11-10">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<title>Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002</title>
<booktitle>CCS</booktitle>
<publisher>ACM</publisher>
<year>2002</year>
<isbn>1-58113-612-9</isbn>
<url>db/conf/ccs/ccs2002.html</url>
<ee>http://dl.acm.org/citation.cfm?id=586110</ee>
</proceedings>
</r>
<r><article key="journals/istr/Atluri01" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijay Atluri</author>
<title>Security for Workflow Systems.</title>
<pages>59-68</pages>
<year>2001</year>
<volume>6</volume>
<journal>Inf. Secur. Tech. Rep.</journal>
<number>2</number>
<ee>https://doi.org/10.1016/S1363-4127(01)00207-2</ee>
<url>db/journals/istr/istr6.html#Atluri01</url>
</article>
</r>
<r><article key="journals/jcs/JajodiaAKMM01" mdate="2023-08-28">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="39/898">Thomas F. Keefe</author>
<author pid="76/2160">Catherine D. McCollum</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>Multilevel Security Transaction Processing.</title>
<pages>165-195</pages>
<year>2001</year>
<volume>9</volume>
<journal>J. Comput. Secur.</journal>
<number>3</number>
<url>db/journals/jcs/jcs9.html#JajodiaAKMM01</url>
<ee>https://doi.org/10.3233/jcs-2001-9301</ee>
<ee>https://www.wikidata.org/entity/Q114944284</ee>
</article>
</r>
<r><article key="journals/tkde/AdamAABH01" mdate="2021-10-14">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="81/1859">Igg Adiwijaya</author>
<author orcid="0000-0002-2423-7665" pid="b/SuBanerjee">Sujata Banerjee</author>
<author pid="83/3302">Richard D. Holowczak</author>
<title>A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects.</title>
<pages>705-716</pages>
<year>2001</year>
<volume>13</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/69.940742</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.940742</ee>
<url>db/journals/tkde/tkde13.html#AdamAABH01</url>
</article>
</r>
<r><inproceedings key="conf/ccs/AtluriCM01" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="98/4341">Pietro Mazzoleni</author>
<title>A Chinese wall security model for decentralized workflow systems.</title>
<pages>48-57</pages>
<year>2001</year>
<crossref>conf/ccs/2001</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/501983.501991</ee>
<url>db/conf/ccs/ccs2001.html#AtluriCM01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AtluriM01" mdate="2002-05-07">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.</title>
<pages>255-268</pages>
<year>2001</year>
<crossref>conf/dbsec/2001</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2001.html#AtluriM01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dexaw/GhirardiniCAKA01" mdate="2023-03-24">
<author pid="92/6009">Chiara Ghirardini</author>
<author orcid="0000-0001-9360-4679" pid="c/SoonAeChun">Soon Ae Chun</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="82/617">Ibrahim Kamel</author>
<author pid="a/NRAdam">Nabil R. Adam</author>
<title>A Study on the Indexing of Satellite Images at NASA Regional Application Center.</title>
<pages>859-864</pages>
<year>2001</year>
<crossref>conf/dexaw/2001</crossref>
<booktitle>DEXA Workshop</booktitle>
<url>db/conf/dexaw/dexaw2001.html#GhirardiniCAKA01</url>
<ee>https://doi.org/10.1109/DEXA.2001.953163</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DEXA.2001.953163</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/gis/HolowczakCAA01" mdate="2018-11-06">
<author pid="83/3302">Richard D. Holowczak</author>
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="48/2493">Francisco J. Artigas</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Customized Geospatial Workflows for E-Government Services.</title>
<pages>64-69</pages>
<year>2001</year>
<crossref>conf/gis/2001</crossref>
<booktitle>ACM-GIS</booktitle>
<url>db/conf/gis/gis2001.html#HolowczakCAA01</url>
<ee>https://doi.org/10.1145/512161.512176</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/isas-sci/CranfordMA01" mdate="2002-01-03">
<author pid="61/6407">Jonathan Cranford</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Modeling and Evaluation of Distributed Workflow Algorithms.</title>
<pages>183-188</pages>
<year>2001</year>
<crossref>conf/isas-sci/2001-1</crossref>
<booktitle>ISAS-SCI (1)</booktitle>
<url>db/conf/isas-sci/isas-sci2001-1.html#CranfordMA01</url>
</inproceedings>
</r>
<r><article key="journals/cacm/AdamAA00" mdate="2021-04-09">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="81/1859">Igg Adiwijaya</author>
<title>SI in Digital Libraries.</title>
<pages>64-72</pages>
<year>2000</year>
<volume>43</volume>
<journal>Commun. ACM</journal>
<number>6</number>
<ee>https://doi.org/10.1145/336460.336476</ee>
<url>db/journals/cacm/cacm43.html#AdamAA00</url>
</article>
</r>
<r><article key="journals/dpd/AtluriS00" mdate="2020-05-18">
<ee>https://doi.org/10.1023/A:1008727116035</ee>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="s/PSamarati">Pierangela Samarati</author>
<title>Security of Data and Transaction Processing - Guest Editor's Introduction.</title>
<pages>5-6</pages>
<year>2000</year>
<volume>8</volume>
<journal>Distributed Parallel Databases</journal>
<number>1</number>
<url>db/journals/dpd/dpd8.html#AtluriS00</url>
<cdrom>DPD/8/P005.pdf</cdrom>
</article>
</r>
<r><article key="journals/jcs/AtluriHB00" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>A Semantic-Based Execution Model for Multilevel Secure Workflows.</title>
<year>2000</year>
<volume>8</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<url>db/journals/jcs/jcs8.html#AtluriHB00</url>
<ee>https://doi.org/10.3233/jcs-2000-8102</ee>
<ee>https://www.wikidata.org/entity/Q114944356</ee>
<pages>3-41</pages>
</article>
</r>
<r><article key="journals/jcs/AtluriH00" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<title>A Petri Net Based Safety Analysis of Workflow Authorization Models.</title>
<year>2000</year>
<volume>8</volume>
<journal>J. Comput. Secur.</journal>
<number>2/3</number>
<url>db/journals/jcs/jcs8.html#AtluriH00</url>
<ee>https://doi.org/10.3233/jcs-2000-82-307</ee>
<ee>https://www.wikidata.org/entity/Q114944334</ee>
<pages>209-240</pages>
</article>
</r>
<r><inproceedings key="conf/ccs/GalA00" mdate="2021-04-09">
<author pid="g/AvigdorGal">Avigdor Gal</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>An authorization model for temporal data.</title>
<pages>144-153</pages>
<year>2000</year>
<crossref>conf/ccs/2000</crossref>
<booktitle>CCS</booktitle>
<ee>https://doi.org/10.1145/352600.352621</ee>
<url>db/conf/ccs/ccs2000.html#GalA00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/ChunA00" mdate="2017-05-26">
<author pid="c/SoonAeChun">Soon Ae Chun</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Protecting Privacy from Continuous High-resolution Satellite Surveillance.</title>
<pages>233-244</pages>
<year>2000</year>
<crossref>conf/dbsec/2000</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2000.html#ChunA00</url>
<ee>https://doi.org/10.1007/0-306-47008-X_21</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/RietSORABW00" mdate="2017-05-26">
<author pid="r/RPvandeRiet">Reind P. van de Riet</author>
<author pid="62/285">Raban Serban</author>
<author pid="o/SylviaLOsborn">Sylvia L. Osborn</author>
<author pid="r/ArnonRosenthal">Arnon Rosenthal</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/JBiskup">Joachim Biskup</author>
<author pid="w/GioWiederhold">Gio Wiederhold</author>
<title>Panel.</title>
<pages>367-371</pages>
<year>2000</year>
<crossref>conf/dbsec/2000</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec2000.html#RietSORABW00</url>
<ee>https://doi.org/10.1007/0-306-47008-X_34</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/mascots/AtluriM00" mdate="2023-03-23">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows.</title>
<pages>248-255</pages>
<year>2000</year>
<crossref>conf/mascots/2000</crossref>
<booktitle>MASCOTS</booktitle>
<ee>https://doi.org/10.1109/MASCOT.2000.876546</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MASCOT.2000.876546</ee>
<url>db/conf/mascots/mascots2000.html#AtluriM00</url>
</inproceedings>
</r>
<r><proceedings key="conf/dbsec/1999" mdate="2002-01-03">
<editor pid="a/VAtluri">Vijayalakshmi Atluri</editor>
<editor pid="76/2017">John Hale</editor>
<title>Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA</title>
<booktitle>DBSec</booktitle>
<series href="db/series/ifip/index.html">IFIP Conference Proceedings</series>
<volume>171</volume>
<publisher>Kluwer</publisher>
<year>2000</year>
<isbn>0-7923-7848-2</isbn>
<url>db/conf/dbsec/dbsec99.html</url>
</proceedings>
</r>
<r><proceedings key="conf/rbac/2000" mdate="2018-11-06">
<editor pid="95/793">Klaus Rebensburg</editor>
<editor pid="04/6927">Charles E. Youman</editor>
<editor pid="a/VAtluri">Vijay Atluri</editor>
<title>Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000</title>
<booktitle>RBAC</booktitle>
<publisher>ACM</publisher>
<year>2000</year>
<isbn>1-58113-259-X</isbn>
<ee>https://doi.org/10.1145/344287</ee>
<url>db/conf/rbac/rbac2000.html</url>
</proceedings>
</r>
<r><article key="journals/tissec/BertinoFA99" mdate="2024-11-12">
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="389/7043-1">Elena Ferrari 0001</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.</title>
<pages>65-104</pages>
<year>1999</year>
<volume>2</volume>
<journal>ACM Trans. Inf. Syst. Secur.</journal>
<number>1</number>
<ee>https://doi.org/10.1145/300830.300837</ee>
<url>db/journals/tissec/tissec2.html#BertinoFA99</url>
</article>
</r>
<r><inproceedings key="conf/rbac/HuangA99" mdate="2018-11-06">
<author pid="26/3911">Wei-kuang Huang</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>SecureFlow: A Secure Web-Enabled Workflow Management System.</title>
<pages>83-94</pages>
<year>1999</year>
<crossref>conf/rbac/1999</crossref>
<booktitle>ACM Workshop on Role-Based Access Control</booktitle>
<ee>https://doi.org/10.1145/319171.319179</ee>
<url>db/conf/rbac/rbac1999.html#HuangA99</url>
</inproceedings>
</r>
<r><article key="journals/jiis/AdamAH98" mdate="2021-04-09">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<title>Modeling and Analysis of Workflows Using Petri Nets.</title>
<pages>131-158</pages>
<year>1998</year>
<volume>10</volume>
<journal>J. Intell. Inf. Syst.</journal>
<number>2</number>
<url>db/journals/jiis/jiis10.html#AdamAH98</url>
<ee>https://doi.org/10.1023/A:1008656726700</ee>
</article>
</r>
<r><inproceedings key="conf/dbsec/HuangA98" mdate="2002-10-21">
<author pid="26/3911">Wei-kuang Huang</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Analysing the Safety of Workflow Authorization Models.</title>
<pages>43-57</pages>
<year>1998</year>
<crossref>conf/dbsec/1998</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec98.html#HuangA98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AtluriS98" mdate="2002-10-21">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="s/DavidLSpooner">David L. Spooner</author>
<title>Workshop Summary.</title>
<pages>287-293</pages>
<year>1998</year>
<crossref>conf/dbsec/1998</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec98.html#AtluriS98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/AdamAAY98" mdate="2023-03-24">
<author pid="a/NRAdam">Nabil R. Adam</author>
<author pid="81/1859">Igg Adiwijaya</author>
<author pid="a/VAtluri">Vijay Atluri</author>
<author pid="y/YelenaYesha">Yelena Yesha</author>
<title>EDI Through A Distributed Information Systems Approach.</title>
<pages>354-365</pages>
<year>1998</year>
<booktitle>HICSS (7)</booktitle>
<ee>https://doi.org/10.1109/HICSS.1998.649230</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.1998.649230</ee>
<crossref>conf/hicss/1998</crossref>
<url>db/conf/hicss/hicss1998.html#AdamAAY98</url>
</inproceedings>
</r>
<r><inproceedings key="conf/tc11-5/Atluri98" mdate="2002-01-03">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Modification of Integrity Constraints Through Knowledge Discovery.</title>
<pages>191-209</pages>
<year>1998</year>
<crossref>conf/tc11-5/1998</crossref>
<booktitle>IICIS</booktitle>
<url>db/conf/tc11-5/iic1998.html#Atluri98</url>
</inproceedings>
</r>
<r><article key="journals/infsof/AtluriBJ97" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>A theoretical formulation for degrees of isolation in databases.</title>
<pages>47-53</pages>
<year>1997</year>
<volume>39</volume>
<journal>Inf. Softw. Technol.</journal>
<number>1</number>
<ee>https://doi.org/10.1016/0950-5849(96)01109-3</ee>
<url>db/journals/infsof/infsof39.html#AtluriBJ97</url>
</article>
</r>
<r><article key="journals/jcs/AtluriH97" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<title>Enforcing Mandatory and Discretionary Security in Workflow Management Systems.</title>
<year>1997</year>
<volume>5</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<url>db/journals/jcs/jcs5.html#AtluriH97</url>
<pages>303-340</pages>
<ee>https://doi.org/10.3233/JCS-1997-5403</ee>
<ee>https://www.wikidata.org/entity/Q114944438</ee>
</article>
</r>
<r><article key="journals/tkde/AtluriJB97" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.</title>
<pages>697-708</pages>
<year>1997</year>
<volume>9</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<url>db/journals/tkde/tkde9.html#AtluriJB97</url>
<ee>https://doi.org/10.1109/69.634749</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.634749</ee>
<cite>...</cite>
<cite>conf/dbsec/AmmannJ91</cite>
<cite>conf/dbsec/AmmannJ93</cite>
<cite>...</cite>
<cite>conf/dbsec/AtluriBJ94</cite>
<cite>journals/tkde/AtluriJB96</cite>
<cite>...</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>journals/tkde/BertinoJMR98</cite>
<cite>...</cite>
<cite>conf/dbsec/Costich91</cite>
<cite>books/aw/Denning82</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>conf/ds/GrayLPT76</cite>
<cite>books/mk/GrayR93</cite>
<cite>...</cite>
<cite>conf/sp/JajodiaK90a</cite>
<cite>conf/dbsec/JajodiaMR96</cite>
<cite>...</cite>
<cite>conf/dbsec/JajodiaMB93</cite>
<cite>...</cite>
<cite>...</cite>
<cite>conf/sp/KeefeT90</cite>
<cite>journals/cacm/Lamport77</cite>
<cite>journals/cacm/Lamport78</cite>
<cite>journals/csur/Landwehr81</cite>
<cite>conf/podc/Liskov91</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/tse/McCullough90</cite>
<cite>conf/dbsec/McDermottJ92</cite>
<cite>conf/dbsec/MeadowsJ87</cite>
<cite>...</cite>
<cite>journals/tods/MohanLO86</cite>
<cite>conf/ccs/RayBJM96</cite>
<cite>journals/cacm/ReedK79</cite>
<cite>...</cite>
<cite>journals/dpd/StamosC93</cite>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriHB97" mdate="2002-10-24">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>An Execution Model for Multilevel Seccure Workflows.</title>
<pages>151-165</pages>
<year>1997</year>
<crossref>conf/dbsec/1997</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec97.html#AtluriHB97</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rbac/BertinoFA97" mdate="2024-11-12">
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="389/7043-1">Elena Ferrari 0001</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.</title>
<pages>1-12</pages>
<year>1997</year>
<crossref>conf/rbac/1997</crossref>
<booktitle>ACM Workshop on Role-Based Access Control</booktitle>
<ee>https://doi.org/10.1145/266741.266746</ee>
<url>db/conf/rbac/rbac1997.html#BertinoFA97</url>
</inproceedings>
</r>
<r><article key="journals/tkde/AtluriJB96" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<title>Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.</title>
<pages>839-854</pages>
<year>1996</year>
<volume>8</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<url>db/journals/tkde/tkde8.html#AtluriJB96</url>
<ee>https://doi.org/10.1109/69.542034</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.542034</ee>
<cdrom>TKDE8/k0839.pdf</cdrom>
<cite>conf/dbsec/AmmannJ91</cite>
<cite>...</cite>
<cite>...</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>journals/computer/BukhresCDEP93</cite>
<cite>...</cite>
<cite>books/aw/Denning82</cite>
<cite>books/mk/Elmagarmid92</cite>
<cite>conf/icde/ElmagarmidD90</cite>
<cite>journals/tse/Garcia-MolinaK88</cite>
<cite>conf/ds/GrayLPT76</cite>
<cite>...</cite>
<cite>...</cite>
<cite>...</cite>
<cite>journals/cacm/Lamport77</cite>
<cite>...</cite>
<cite>conf/dbsec/MeadowsJ87</cite>
<cite>conf/pdis/MehrotraRKS91</cite>
<cite>journals/cacm/ReedK79</cite>
<cite>...</cite>
<cite>...</cite>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriJKMM96" mdate="2002-10-24">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="39/898">Thomas F. Keefe</author>
<author pid="76/2160">Catherine D. McCollum</author>
<author pid="m/RaviMukkamala">Ravi Mukkamala</author>
<title>Multilevel Secure Transaction Processing: Status and Prospects.</title>
<pages>79-98</pages>
<year>1996</year>
<crossref>conf/dbsec/1996</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec96.html#AtluriJKMM96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AtluriH96" mdate="2002-10-24">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<title>An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment.</title>
<pages>240-258</pages>
<year>1996</year>
<crossref>conf/dbsec/1996</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec96.html#AtluriH96</url>
</inproceedings>
</r>
<r><inproceedings key="conf/esorics/AtluriH96" mdate="2021-04-09">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="26/3911">Wei-kuang Huang</author>
<title>An Authorization Model for Workflows.</title>
<pages>44-64</pages>
<year>1996</year>
<crossref>conf/esorics/1996</crossref>
<booktitle>ESORICS</booktitle>
<ee>https://doi.org/10.1007/3-540-61770-1_27</ee>
<url>db/conf/esorics/esorics1996.html#AtluriH96</url>
</inproceedings>
</r>
<r><article key="journals/tkde/AmmannAJ95" mdate="2021-04-09">
<author pid="a/PAmmann">Paul Ammann</author>
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>The Partitioned Synchronization Rule for Planar Extendible Partial Orders.</title>
<pages>797-808</pages>
<year>1995</year>
<volume>7</volume>
<journal>IEEE Trans. Knowl. Data Eng.</journal>
<number>5</number>
<url>db/journals/tkde/tkde7.html#AmmannAJ95</url>
<ee>https://doi.org/10.1109/69.469819</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/69.469819</ee>
<cdrom>TKDE7/k0797.pdf</cdrom>
<cite>...</cite>
<cite>journals/tocs/AmmannJ93</cite>
<cite>...</cite>
<cite>books/aw/BernsteinHG87</cite>
<cite>...</cite>
<cite>books/aw/Denning82</cite>
<cite>journals/cacm/EswarranGLT76</cite>
<cite>journals/tods/HsuC86</cite>
<cite>...</cite>
<cite>...</cite>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriBJ95" mdate="2002-10-24">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.</title>
<pages>231-247</pages>
<year>1995</year>
<crossref>conf/dbsec/1995</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec95.html#AtluriBJ95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/dbsec/AtluriBJ94" mdate="2002-01-03">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.</title>
<pages>259-274</pages>
<year>1994</year>
<crossref>conf/dbsec/1994</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec94.html#AtluriBJ94</url>
</inproceedings>
</r>
<r><article key="journals/jcs/AtluriBJ93" mdate="2023-08-28">
<author orcid="0000-0003-2068-780X" pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.</title>
<pages>311-352</pages>
<year>1993</year>
<volume>2</volume>
<journal>J. Comput. Secur.</journal>
<number>4</number>
<url>db/journals/jcs/jcs2.html#AtluriBJ93</url>
<ee>https://doi.org/10.3233/JCS-1993-2404</ee>
<ee>https://www.wikidata.org/entity/Q114944565</ee>
</article>
</r>
<r><inproceedings key="conf/dbsec/AtluriBJ93" mdate="2002-01-03">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.</title>
<pages>135-158</pages>
<year>1993</year>
<crossref>conf/dbsec/1993</crossref>
<booktitle>DBSec</booktitle>
<url>db/conf/dbsec/dbsec93.html#AtluriBJ93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/AtluriBJ93" mdate="2023-09-21">
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<author pid="b/ElisaBertino">Elisa Bertino</author>
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<title>Achieving stricter correctness requirements in multilevel secure databases.</title>
<pages>135-147</pages>
<year>1993</year>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/RISP.1993.287636</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RISP.1993.287636</ee>
<crossref>conf/sp/1993</crossref>
<url>db/conf/sp/sp1993.html#AtluriBJ93</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/JajodiaA92" mdate="2023-09-21">
<author pid="j/SushilJajodia">Sushil Jajodia</author>
<author pid="a/VAtluri">Vijayalakshmi Atluri</author>
<title>Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.</title>
<pages>216-224</pages>
<year>1992</year>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/RISP.1992.213259</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/RISP.1992.213259</ee>
<crossref>conf/sp/1992</crossref>
<url>db/conf/sp/sp1992.html#JajodiaA92</url>
</inproceedings>
</r>
<coauthors n="199" nc="2">
<co c="0"><na f="a/Abbadasari:Ranjit" pid="59/535">Ranjit Abbadasari</na></co>
<co c="0"><na f="a/Adam:Nabil_R=" pid="a/NRAdam">Nabil R. Adam</na></co>
<co c="0"><na f="a/Adiwijaya:Igg" pid="81/1859">Igg Adiwijaya</na></co>
<co c="0"><na f="a/Aich:Achyuta" pid="199/8974">Achyuta Aich</na></co>
<co c="0"><na f="a/Alzamil:Zamil_S=" pid="332/8444">Zamil S. Alzamil</na></co>
<co c="0"><na f="a/Ammann:Paul" pid="a/PAmmann">Paul Ammann</na></co>
<co c="0"><na f="a/Artigas:Francisco_J=" pid="48/2493">Francisco J. Artigas</na></co>
<co c="0"><na f="b/Backes_0001:Michael" pid="b/MichaelBackes1">Michael Backes 0001</na></co>
<co c="0"><na f="b/Badar:Nazia" pid="126/1601">Nazia Badar</na></co>
<co c="0"><na f="b/Bagchi:Aditya" pid="69/128">Aditya Bagchi</na></co>
<co c="0"><na f="b/Banerjee:Sujata" pid="b/SuBanerjee">Sujata Banerjee</na></co>
<co c="0"><na f="b/Basin:David_A=" pid="b/DavidABasin">David A. Basin</na></co>
<co c="0"><na f="b/Batra:Gunjan" pid="211/1483">Gunjan Batra</na></co>
<co c="0"><na f="b/Bertino:Elisa" pid="b/ElisaBertino">Elisa Bertino</na></co>
<co c="0"><na f="b/Bertot:John_Carlo" pid="43/3994">John Carlo Bertot</na></co>
<co c="0"><na f="b/Bieber:Michael" pid="b/MichaelBieber">Michael Bieber</na></co>
<co c="0"><na f="b/Biskup:Joachim" pid="b/JBiskup">Joachim Biskup</na></co>
<co c="0"><na f="b/Bojic:Olana" pid="37/313">Olana Bojic</na></co>
<co c="0"><na f="b/Bora:Irfan" pid="26/1460">Irfan Bora</na></co>
<co c="0"><na f="b/Bornh=ouml=vd:Christof" pid="34/1731">Christof Bornh&#246;vd</na></co>
<co c="0"><na f="b/Brumbaugh:Larry" pid="08/2956">Larry Brumbaugh</na></co>
<co c="0"><na f="c/Calca:Joseph" pid="199/8945">Joseph Calca</na></co>
<co c="0"><na f="c/Capuozzo:Ugo" pid="90/4451">Ugo Capuozzo</na></co>
<co c="0"><na f="c/Ceberio:Bob" pid="60/95">Bob Ceberio</na></co>
<co c="0"><na f="c/Chakraborty_0001:Sandip" pid="28/9571">Sandip Chakraborty 0001</na></co>
<co c="0"><na f="c/Chattopadhyay:Pratik" pid="138/2475">Pratik Chattopadhyay</na></co>
<co c="0"><na f="c/Chaudhury:Saptarshi_De" pid="381/8552">Saptarshi De Chaudhury</na></co>
<co c="0"><na f="c/Chen_0014:Xi" pid="16/3283-14">Xi Chen 0014</na></co>
<co c="0"><na f="c/Cho:June=Suh" pid="64/3219">June-Suh Cho</na></co>
<co c="0"><na f="c/Choi:Sungyong" pid="09/5535">Sungyong Choi</na></co>
<co c="0"><na f="c/Chun:Soon_Ae" pid="c/SoonAeChun">Soon Ae Chun</na></co>
<co c="0"><na f="c/Colantonio:Alessandro" pid="68/4759">Alessandro Colantonio</na></co>
<co c="0"><na f="c/Cooper:Jim" pid="29/7329">Jim Cooper</na></co>
<co c="0"><na f="c/Cranford:Jonathan" pid="61/6407">Jonathan Cranford</na></co>
<co c="0"><na f="c/Culver=Hopper:Julia" pid="42/3612">Julia Culver-Hopper</na></co>
<co c="0"><na f="c/Cuppens:Fr=eacute=d=eacute=ric" pid="c/FredericCuppens">Fr&#233;d&#233;ric Cuppens</na></co>
<co c="0" n="2"><na f="c/Cuppens:Nora" pid="c/NoraCuppens">Nora Cuppens</na><na>Nora Cuppens-Boulahia</na></co>
<co c="0"><na f="d/Das:Saptarshi" pid="29/8859">Saptarshi Das</na></co>
<co c="0"><na f="d/D=iacute=az:Claudia" pid="d/ClaudiaDiaz">Claudia D&#237;az</na></co>
<co c="0"><na f="d/Dingledine:Roger" pid="31/479">Roger Dingledine</na></co>
<co c="0"><na f="d/Du_0001:Wenliang" pid="d/WenliangDu">Wenliang Du 0001</na></co>
<co c="0"><na f="e/Ellenberger:John" pid="41/1704">John Ellenberger</na></co>
<co c="0"><na f="f/Fariselli:Patrizia" pid="31/212">Patrizia Fariselli</na></co>
<co c="0"><na f="f/Ferraiolo:David_F=" pid="38/4159">David F. Ferraiolo</na></co>
<co c="0"><na f="f/Ferrara:Anna_Lisa" pid="60/6199">Anna Lisa Ferrara</na></co>
<co c="0"><na f="f/Ferrari_0001:Elena" pid="389/7043-1">Elena Ferrari 0001</na></co>
<co c="0"><na f="f/Fruscione:Jim" pid="22/2670">Jim Fruscione</na></co>
<co c="1"><na f="g/Gal:Avigdor" pid="g/AvigdorGal">Avigdor Gal</na></co>
<co c="0"><na f="g/Gautam:Mayank" pid="204/3744">Mayank Gautam</na></co>
<co c="0"><na f="g/Gavrila:Serban_I=" pid="85/2051">Serban I. Gavrila</na></co>
<co c="0"><na f="g/Ghirardini:Chiara" pid="92/6009">Chiara Ghirardini</na></co>
<co c="0"><na f="g/Gligor:Virgil_D=" pid="20/2659">Virgil D. Gligor</na></co>
<co c="0"><na f="g/Gomaa:Ahmed" pid="10/1146">Ahmed Gomaa</na></co>
<co c="0"><na f="g/Goto:Atsuhiro" pid="85/3081">Atsuhiro Goto</na></co>
<co c="0"><na f="g/Grossman:Robert" pid="99/2304">Robert Grossman</na></co>
<co c="0"><na f="g/Guo:Dihua" pid="14/3888">Dihua Guo</na></co>
<co c="0"><na f="g/Guo:Qi" pid="67/398">Qi Guo</na></co>
<co c="0"><na f="g/Gupta:Eeshan" pid="290/4067">Eeshan Gupta</na></co>
<co c="0"><na f="g/Gupta:Haritabh" pid="183/4426">Haritabh Gupta</na></co>
<co c="0"><na f="h/Hachana:Safa=agrave=" pid="97/3341">Safa&#224; Hachana</na></co>
<co c="0"><na f="h/Hale:John" pid="76/2017">John Hale</na></co>
<co c="0"><na f="h/Harika:Pullamsetty" pid="157/0236">Pullamsetty Harika</na></co>
<co c="0"><na f="h/He:Xiaoyun" pid="80/3328">Xiaoyun He</na></co>
<co c="0"><na f="h/Holowczak:Richard_D=" pid="83/3302">Richard D. Holowczak</na></co>
<co c="0"><na f="h/Hong_0001:Yuan" pid="79/5433-1">Yuan Hong 0001</na></co>
<co c="0" n="2"><na f="h/Huang_0001:Wayne" pid="26/2178-1">Wayne Huang 0001</na><na>Wei Huang 0031</na></co>
<co c="0"><na f="h/Huang:Wei=kuang" pid="26/3911">Wei-kuang Huang</na></co>
<co c="0"><na f="i/Im:Il" pid="64/4122">Il Im</na></co>
<co c="0"><na f="j/Jaeger:Trent" pid="45/576">Trent Jaeger</na></co>
<co c="0"><na f="j/Jajodia:Sushil" pid="j/SushilJajodia">Sushil Jajodia</na></co>
<co c="0" n="2"><na f="j/Janeja:Vandana_Pursnani" pid="44/111">Vandana Pursnani Janeja</na><na>Vandana P. Janeja</na></co>
<co c="0"><na f="j/Jensen:Christian_Damsgaard" pid="j/ChristianDamsgaardJensen">Christian Damsgaard Jensen</na></co>
<co c="0"><na f="j/Jha:Sadhana" pid="150/2276">Sadhana Jha</na></co>
<co c="0"><na f="j/Jiang_0001:Lili" pid="49/3022-1">Lili Jiang 0001</na></co>
<co c="0"><na f="j/John:John_C=" pid="47/11487">John C. John</na></co>
<co c="0"><na f="j/Joshi:Anupam" pid="j/AnupamJoshi">Anupam Joshi</na></co>
<co c="0"><na f="j/Juels:Ari" pid="j/AriJuels">Ari Juels</na></co>
<co c="0"><na f="k/Kamel:Ibrahim" pid="82/617">Ibrahim Kamel</na></co>
<co c="0"><na f="k/Kantarcioglu:Murat" pid="36/195">Murat Kantarcioglu</na></co>
<co c="0"><na f="k/Keefe:Thomas_F=" pid="39/898">Thomas F. Keefe</na></co>
<co c="0"><na f="k/Kern:Axel" pid="66/2475">Axel Kern</na></co>
<co c="0"><na f="k/Keromytis:Angelos_D=" pid="k/AngelosDKeromytis">Angelos D. Keromytis</na></co>
<co c="0"><na f="k/Kim:Dong=Ho" pid="84/6399">Dong-Ho Kim</na></co>
<co c="0"><na f="k/Koslowski:Rey" pid="70/2586">Rey Koslowski</na></co>
<co c="0"><na f="k/Kuhlmann:Martin" pid="87/6951">Martin Kuhlmann</na></co>
<co c="0"><na f="k/Kundu:Ashish" pid="65/4168">Ashish Kundu</na></co>
<co c="0"><na f="k/K=uuml=sters:Ralf" pid="k/RKusters">Ralf K&#252;sters</na></co>
<co c="0"><na f="l/Li:Yingjiu" pid="15/2506">Yingjiu Li</na></co>
<co c="0"><na f="l/Lin:Tao" pid="64/4492">Tao Lin</na></co>
<co c="0"><na f="l/Liu_0005:Peng" pid="21/6121-5">Peng Liu 0005</na></co>
<co c="0"><na f="l/Lorenzi:David" pid="30/9692">David Lorenzi</na></co>
<co c="0"><na f="l/Lotz:Volkmar" pid="32/383">Volkmar Lotz</na></co>
<co c="0"><na f="l/Lu:Haibing" pid="57/631">Haibing Lu</na></co>
<co c="0"><na f="l/Luna=Reyes:Luis_F=" pid="58/1990">Luis F. Luna-Reyes</na></co>
<co c="0" n="2"><na f="m/Madhusudan:P=" pid="m/PMadhusudan">P. Madhusudan</na><na>Parthasarathy Madhusudan</na></co>
<co c="0"><na f="m/Madkaikar:Gaurav" pid="387/0083">Gaurav Madkaikar</na></co>
<co c="0" n="2"><na f="m/Majumdar:Arun_K=" pid="59/487">Arun K. Majumdar</na><na>Arun Kumar Majumdar</na></co>
<co c="0"><na f="m/Mannochio:Nick" pid="13/160">Nick Mannochio</na></co>
<co c="0"><na f="m/Mantel:Heiko" pid="m/HeikoMantel">Heiko Mantel</na></co>
<co c="0"><na f="m/Mazzoleni:Pietro" pid="98/4341">Pietro Mazzoleni</na></co>
<co c="0"><na f="m/McCollum:Catherine_D=" pid="76/2160">Catherine D. McCollum</na></co>
<co c="0"><na f="m/McDaniel:Patrick_D=" pid="m/PatrickDrewMcDaniel">Patrick D. McDaniel</na></co>
<co c="0"><na f="m/Meadows_0001:Catherine" pid="99/395">Catherine Meadows 0001</na></co>
<co c="0"><na f="m/Mehmood:Danish" pid="116/4739">Danish Mehmood</na></co>
<co c="0"><na f="m/Mehrotra:Sharad" pid="m/SharadMehrotra">Sharad Mehrotra</na></co>
<co c="0"><na f="m/Meng_0001:Weizhi" pid="146/1188">Weizhi Meng 0001</na></co>
<co c="0"><na f="m/Meshram:Augustee" pid="237/7603">Augustee Meshram</na></co>
<co c="0"><na f="m/Mitchell:John_C=" pid="m/JohnCMitchell">John C. Mitchell</na></co>
<co c="0"><na f="m/Mitra:Barsha" pid="58/10753">Barsha Mitra</na></co>
<co c="0"><na f="m/Mitra:Prasenjit" pid="19/3308">Prasenjit Mitra</na></co>
<co c="0"><na f="m/Molloy:Ian_M=" pid="17/2811">Ian M. Molloy</na></co>
<co c="0"><na f="m/Mondal:Samrat" pid="99/3101">Samrat Mondal</na></co>
<co c="0"><na f="m/Morgan:Pamela" pid="274/5856">Pamela Morgan</na></co>
<co c="0" n="2"><na f="m/Morucci:St=eacute=phane" pid="56/8380">St&#233;phane Morucci</na><na>Stephane Morucci</na></co>
<co c="0"><na f="m/Mukkamala:Ravi" pid="m/RaviMukkamala">Ravi Mukkamala</na></co>
<co c="0"><na f="n/Nabi:Ghulam" pid="27/1121">Ghulam Nabi</na></co>
<co c="0"><na f="n/Nagajyothi:Marreddy" pid="157/0249">Marreddy Nagajyothi</na></co>
<co c="0"><na f="n/Nahon:Karine" pid="16/5999">Karine Nahon</na></co>
<co c="0"><na f="n/Naik:Varuna" pid="131/2431">Varuna Naik</na></co>
<co c="0"><na f="n/Nassi:Ike" pid="57/3095">Ike Nassi</na></co>
<co c="0"><na f="n/Nath:Ronit" pid="241/8640">Ronit Nath</na></co>
<co c="0"><na f="n/Ning:Peng" pid="76/1374">Peng Ning</na></co>
<co c="0"><na f="o/Osborn:Sylvia_L=" pid="o/SylviaLOsborn">Sylvia L. Osborn</na></co>
<co c="0"><na f="p/Pabreja:Rachit" pid="220/2483">Rachit Pabreja</na></co>
<co c="0"><na f="p/Paczkowski:John" pid="57/6320">John Paczkowski</na></co>
<co c="0"><na f="p/Paliwal:Aabhas_V=" pid="99/4224">Aabhas V. Paliwal</na></co>
<co c="0"><na f="p/Pan:Chi=Chun" pid="81/2601">Chi-Chun Pan</na></co>
<co c="0"><na f="p/Parikh:Anand_Manojkumar" pid="409/6354">Anand Manojkumar Parikh</na></co>
<co c="0"><na f="p/Parlato:Gennaro" pid="11/1029">Gennaro Parlato</na></co>
<co c="0"><na f="p/Pathak:Rohit" pid="99/7082">Rohit Pathak</na></co>
<co c="0"><na f="p/Paturu:Venkata_Avinash" pid="243/0151">Venkata Avinash Paturu</na></co>
<co c="0"><na f="p/Paul:Proteet" pid="318/7315">Proteet Paul</na></co>
<co c="0"><na f="p/Pericherla:Amshumaan" pid="322/3846">Amshumaan Pericherla</na></co>
<co c="-1"><na f="p/Pernul:G=uuml=nther" pid="p/GPernul">G&#252;nther Pernul</na></co>
<co c="0"><na f="p/Pfitzmann:Birgit" pid="p/BPfitzmann">Birgit Pfitzmann</na></co>
<co c="0"><na f="p/Pietro:Roberto_Di" pid="73/6934">Roberto Di Pietro</na></co>
<co c="0"><na f="q/Qin:Li" pid="87/5216">Li Qin</na></co>
<co c="0"><na f="r/Rai:Ritwik" pid="345/1912">Ritwik Rai</na></co>
<co c="0"><na f="r/Raskar:Ramesh" pid="r/RameshRaskar">Ramesh Raskar</na></co>
<co c="0"><na f="r/Ray:Indrajit" pid="r/IndrajitRay">Indrajit Ray</na></co>
<co c="0"><na f="r/Ray:Indrakshi" pid="r/IndrakshiRay">Indrakshi Ray</na></co>
<co c="0"><na f="r/Rebensburg:Klaus" pid="95/793">Klaus Rebensburg</na></co>
<co c="0"><na f="r/Reddy:Likhith" pid="381/8060">Likhith Reddy</na></co>
<co c="0"><na f="r/Riet:Reind_P=_van_de" pid="r/RPvandeRiet">Reind P. van de Riet</na></co>
<co c="0"><na f="r/Rigoll:Gerhard" pid="78/2835">Gerhard Rigoll</na></co>
<co c="0"><na f="r/Rosenthal:Arnon" pid="r/ArnonRosenthal">Arnon Rosenthal</na></co>
<co c="0"><na f="r/Roy:Arindam" pid="55/8865">Arindam Roy</na></co>
<co c="0"><na f="s/Salimi:Babak" pid="11/6446">Babak Salimi</na></co>
<co c="0"><na f="s/Samarati:Pierangela" pid="s/PSamarati">Pierangela Samarati</na></co>
<co c="0"><na f="s/Sarana:Prasuna" pid="173/0081">Prasuna Sarana</na></co>
<co c="0"><na f="s/Schaper:Joachim" pid="00/6864">Joachim Schaper</na></co>
<co c="0"><na f="s/Schaufler:Casey" pid="22/2079">Casey Schaufler</na></co>
<co c="0"><na f="s/Sengupta:Tirthankar" pid="36/7898">Tirthankar Sengupta</na></co>
<co c="0"><na f="s/Serban:Raban" pid="62/285">Raban Serban</na></co>
<co c="0"><na f="s/Shafiq:Basit" pid="11/2433">Basit Shafiq</na></co>
<co c="0"><na f="s/Sharma:Manisha" pid="32/9046">Manisha Sharma</na></co>
<co c="0"><na f="s/Sharma:Nitesh" pid="81/9694">Nitesh Sharma</na></co>
<co c="0"><na f="s/Shi:Junmin" pid="52/5485">Junmin Shi</na></co>
<co c="0"><na f="s/Shin:Heechang" pid="75/3134">Heechang Shin</na></co>
<co c="0" n="2"><na f="s/Simske:Steven_J=" pid="41/5693">Steven J. Simske</na><na>Steve Simske</na></co>
<co c="0"><na f="s/Singh:Mahendra_Pratap" pid="67/2271">Mahendra Pratap Singh</na></co>
<co c="0"><na f="s/Singh:Roshan" pid="242/6725">Roshan Singh</na></co>
<co c="0"><na f="s/Singh_0001:Vivek_K=" pid="00/6451-7">Vivek K. Singh 0001</na></co>
<co c="0"><na f="s/Sonune:Pratik" pid="400/5087">Pratik Sonune</na></co>
<co c="0"><na f="s/Spooner:David_L=" pid="s/DavidLSpooner">David L. Spooner</na></co>
<co c="0"><na f="s/Stewart:Rick_T=" pid="36/3409">Rick T. Stewart</na></co>
<co c="0"><na f="s/Sural:Shamik" pid="67/3314">Shamik Sural</na></co>
<co c="0"><na f="s/Syverson:Paul_F=" pid="81/5221">Paul F. Syverson</na></co>
<co c="0"><na f="t/Talegaon:Samir" pid="260/2190">Samir Talegaon</na></co>
<co c="0"><na f="t/Talukdar:Tanay" pid="193/1491">Tanay Talukdar</na></co>
<co c="0"><na f="t/Thuraisingham:Bhavani" pid="t/BMThuraisingham">Bhavani Thuraisingham</na></co>
<co c="0" n="2"><na f="t/Tripunitara:Mahesh" pid="32/4329">Mahesh Tripunitara</na><na>Mahesh V. Tripunitara</na></co>
<co c="0"><na f="u/Uzun:Emre" pid="58/9838">Emre Uzun</na></co>
<co c="0"><na f="v/Vaidya:Jaideep" pid="61/3091">Jaideep Vaidya</na></co>
<co c="0"><na f="v/Varshith:H=_O=_Sai" pid="320/8628">H. O. Sai Varshith</na></co>
<co c="0"><na f="v/Varun:Matta" pid="377/5308">Matta Varun</na></co>
<co c="0"><na f="v/Vegesna:Neelima" pid="148/4286">Neelima Vegesna</na></co>
<co c="0"><na f="v/Venkatasubramanian:Nalini" pid="66/1875">Nalini Venkatasubramanian</na></co>
<co c="0"><na f="v/Verde:Nino_Vincenzo" pid="51/3522">Nino Vincenzo Verde</na></co>
<co c="0"><na f="v/Vimercati:Sabrina_De_Capitani_di" pid="v/SabrinaDeCapitanidiVimercati">Sabrina De Capitani di Vimercati</na></co>
<co c="0"><na f="w/Waidner:Michael" pid="90/308">Michael Waidner</na></co>
<co c="0"><na f="w/Wainer:Seth" pid="148/4237">Seth Wainer</na></co>
<co c="0"><na f="w/Warner:Janice" pid="98/927">Janice Warner</na></co>
<co c="0"><na f="w/Wiederhold:Gio" pid="w/GioWiederhold">Gio Wiederhold</na></co>
<co c="0"><na f="w/Winslett:Marianne" pid="w/MarianneWinslett">Marianne Winslett</na></co>
<co c="0"><na f="x/Xiong_0001:Hui" pid="262/1686-1">Hui Xiong 0001</na></co>
<co c="1"><na f="x/Xu:Gang" pid="21/1244">Gang Xu</na></co>
<co c="0"><na f="x/Xu:Shouhuai" pid="78/2715">Shouhuai Xu</na></co>
<co c="0"><na f="y/Yang:Mian" pid="126/6564">Mian Yang</na></co>
<co c="0" n="2"><na f="y/Yaqub:Ussama" pid="171/4023">Ussama Yaqub</na><na>Ussama Yakub</na></co>
<co c="0"><na f="y/Yelisetty:Karthikeya_S=_M=" pid="403/0833">Karthikeya S. M. Yelisetty</na></co>
<co c="0"><na f="y/Yesha:Yelena" pid="y/YelenaYesha">Yelena Yesha</na></co>
<co c="0"><na f="y/Youman:Charles_E=" pid="04/6927">Charles E. Youman</na></co>
<co c="0"><na f="y/Youssef:Mahmoud" pid="42/2815">Mahmoud Youssef</na></co>
<co c="0"><na f="y/Yu:Songmei" pid="33/5471">Songmei Yu</na></co>
<co c="0"><na f="y/Yuan:Shengcheng" pid="152/2560">Shengcheng Yuan</na></co>
<co c="0"><na f="y/Yung:Moti" pid="y/MotiYung">Moti Yung</na></co>
<co c="0"><na f="y/Yurcik:William" pid="y/WilliamYurcik">William Yurcik</na></co>
<co c="0"><na f="z/Zhou_0001:Yuanyuan" pid="99/2747-1">Yuanyuan Zhou 0001</na></co>
</coauthors>
</dblpperson>

