
Vijayalakshmi Atluri
Vijay Atluri – Vijay Alturi
Person information
- affiliation: Rutgers University, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j71]Ussama Yaqub, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Location-based Sentiment Analyses and Visualization of Twitter Election Data. Digit. Gov. Res. Pract. 1(2): 14:1-14:19 (2020) - [j70]Haibing Lu, Xi Chen, Junmin Shi, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong, Wei Huang:
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization. ACM Trans. Manag. Inf. Syst. 11(2): 7:1-7:33 (2020) - [c148]Soon Ae Chun, Roshan Singh, Pamela Morgan, Nabil R. Adam, Vijay Atluri:
Visual Analytics for Global Migration Policy Discovery and NGO Collaboration. DG.O 2020: 109-115 - [c147]Roshan Singh, Soon Ae Chun, Vijay Atluri:
Developing Machine Learning Models to Automate News Classification. DG.O 2020: 354-355 - [c146]Vijay Atluri, Yuan Hong, Soon Ae Chun:
Security, Privacy and Trust for Responsible Innovations and Governance. DG.O 2020: 365-366
2010 – 2019
- 2019
- [j69]Mahendra Pratap Singh, Shamik Sural, Jaideep Vaidya
, Vijayalakshmi Atluri:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput. Secur. 86: 183-205 (2019) - [j68]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. IET Inf. Secur. 13(2): 96-103 (2019) - [j67]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Deploying ABAC policies using RBAC systems. J. Comput. Secur. 27(4): 483-506 (2019) - [j66]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Hierarchical Attribute-based Access Control Systems. ACM Trans. Internet Techn. 19(3): 40:1-40:24 (2019) - [c145]Augustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
ABACaaS: Attribute-Based Access Control as a Service. CODASPY 2019: 153-155 - [c144]Ussama Yaqub
, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US. DG.O 2019: 248-253 - [c143]Soon Ae Chun, Venkata Avinash Paturu, Shengcheng Yuan, Rohit Pathak, Vijayalakshmi Atluri, Nabil R. Adam:
Crime Prediction Model using Deep Neural Networks. DG.O 2019: 512-514 - [c142]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. ICISS 2019: 79-98 - [c141]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Reconciliation and Migration in Attribute Based Access Control. ICISS 2019: 99-120 - [c140]Ronit Nath, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. SACMAT 2019: 25-35 - [c139]Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Security Analysis of Unified Access Control Policies. SKM 2019: 126-146 - [c138]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. TPS-ISA 2019: 209-217 - 2018
- [j65]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. J. Comput. Secur. 26(2): 255-281 (2018) - [j64]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Towards designing robust CAPTCHAs. J. Comput. Secur. 26(6): 731-760 (2018) - [j63]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. IEEE Trans. Inf. Forensics Secur. 13(4): 897-911 (2018) - [c137]Saptarshi Das, Barsha Mitra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Policy Engineering in RBAC and ABAC. From Database to Cyber Security 2018: 24-54 - [c136]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Enabling the Deployment of ABAC Policies in RBAC Systems. DBSec 2018: 51-68 - [c135]Ussama Yaqub
, Nitesh Sharma, Rachit Pabreja, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis and visualization of subjectivity and polarity of Twitter location data. DG.O 2018: 67:1-67:10 - [c134]Nitesh Sharma, Rachit Pabreja, Ussama Yaqub
, Vijayalakshmi Atluri, Soon Ae Chun, Jaideep Vaidya:
Web-based application for sentiment analysis of live tweets. DG.O 2018: 120:1-120:2 - [c133]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. SACMAT 2018: 213-215 - 2017
- [j62]Ussama Yaqub
, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Analysis of political discourse on twitter in the context of the 2016 US presidential elections. Gov. Inf. Q. 34(4): 613-626 (2017) - [j61]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5): 294-300 (2017) - [j60]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems. ACM Trans. Manag. Inf. Syst. 7(4): 10:1-10:24 (2017) - [c132]Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. CIC 2017: 136-145 - [c131]Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri, Shamik Sural:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. CIC 2017: 339-348 - [c130]Emre Uzun, Gennaro Parlato
, Vijayalakshmi Atluri, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural, David Lorenzi:
Preventing Unauthorized Data Flows. DBSec 2017: 41-62 - [c129]Ussama Yaqub
, Soon Ae Chun, Vijayalakshmi Atluri, Jaideep Vaidya:
Sentiment based Analysis of Tweets during the US Presidential Elections. DG.O 2017: 1-10 - [c128]Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Poster: Constrained Policy Mining in Attribute Based Access Control. SACMAT 2017: 121-123 - [c127]David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. SEC 2017: 281-295 - [r6]Vijay Atluri, Heechang Shin:
Geospatial Authorizations, Efficient Enforcement. Encyclopedia of GIS 2017: 730-738 - [r5]Soon Ae Chun, Vijay Atluri:
Security Models, Geospatial. Encyclopedia of GIS 2017: 1850-1860 - 2016
- [j59]Barsha Mitra, Shamik Sural, Jaideep Vaidya
, Vijayalakshmi Atluri:
Mining temporal roles using many-valued concepts. Comput. Secur. 60: 79-94 (2016) - [j58]Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
A Survey of Role Mining. ACM Comput. Surv. 48(4): 50:1-50:37 (2016) - [c126]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. CIC 2016: 64-73 - [c125]Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. DBSec 2016: 3-18 - [c124]Ussama Yakub
, Vijayalakshmi Atluri, Jaideep Vaidya:
Efficient Evaluation of Authorizations for Video Data. SIN 2016: 16-23 - 2015
- [j57]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li:
Statistical Database Auditing Without Query Denial Threat. INFORMS J. Comput. 27(1): 20-34 (2015) - [j56]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
The generalized temporal role mining problem. J. Comput. Secur. 23(1): 31-58 (2015) - [j55]Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Meeting Cardinality Constraints in Role Mining. IEEE Trans. Dependable Secur. Comput. 12(1): 71-84 (2015) - [j54]Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri:
Minimizing Organizational User Requirement while Meeting Security Constraints. ACM Trans. Manag. Inf. Syst. 6(3): 12:1-12:25 (2015) - [c123]Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Migrating from DAC to RBAC. DBSec 2015: 69-84 - [c122]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. ICISS 2015: 61-78 - [c121]Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Role Mining in the Presence of Separation of Duty Constraints. ICISS 2015: 98-117 - [c120]Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi:
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection. NSS 2015: 191-205 - [c119]Mahendra Pratap Singh
, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub:
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. NSS 2015: 221-235 - [c118]David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Generating Secure Images for CAPTCHAs through Noise Addition. SACMAT 2015: 169-172 - [c117]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. SEC 2015: 354-368 - 2014
- [j53]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
:
Security analysis of temporal RBAC under an administrative model. Comput. Secur. 46: 154-172 (2014) - [j52]David Lorenzi, Jaideep Vaidya, Soon Ae Chun
, Basit Shafiq, Vijayalakshmi Atluri:
Enhancing the government service experience through QR codes on mobile platforms. Gov. Inf. Q. 31(1): 6-16 (2014) - [j51]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
An optimization framework for role mining. J. Comput. Secur. 22(1): 1-31 (2014) - [j50]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato
, P. Madhusudan:
Security analysis for temporal role based access control. J. Comput. Secur. 22(6): 961-996 (2014) - [c116]David Lorenzi, Jaideep Vaidya, Basit Shafiq, Soon Ae Chun
, Neelima Vegesna, Zamil Alzamil, Nabil R. Adam, Seth Wainer, Vijayalakshmi Atluri:
Utilizing social media to improve local government responsiveness. DG.O 2014: 236-244 - [c115]Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. ICISS 2014: 129-148 - [c114]Nazia Badar, Jaideep Vaidya, Vijay Atluri:
More data, more security challenges: integrating analytics in to the information security curriculum. InfoSecCD 2014: 8:1 - [e25]Vijay Atluri, Günther Pernul:
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings. Lecture Notes in Computer Science 8566, Springer 2014, ISBN 978-3-662-43935-7 [contents] - 2013
- [j49]Manisha Sharma, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
AMTRAC: An administrative model for temporal role-based access control. Comput. Secur. 39: 201-218 (2013) - [c113]Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Toward Mining of Temporal Roles. DBSec 2013: 65-80 - [c112]Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. DBSec 2013: 297-304 - [c111]David Lorenzi, Jaideep Vaidya, Soon Ae Chun
, Basit Shafiq, Varuna Naik, Vijayalakshmi Atluri, Nabil R. Adam:
Community based emergency response. DG.O 2013: 82-91 - [c110]Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia, Vijay Atluri, Stephane Morucci:
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management. ICISS 2013: 133-147 - [c109]David Lorenzi, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri:
Web Services Based Attacks against Image CAPTCHAs. ICISS 2013: 214-229 - [c108]Manisha Sharma, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Spatio-Temporal Role Based Access Control. ICISS 2013: 375-389 - [c107]Ian Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri:
Panel on granularity in access control. SACMAT 2013: 85-86 - 2012
- [j48]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition. IEEE Trans. Dependable Secur. Comput. 9(5): 655-669 (2012) - [j47]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijayalakshmi Atluri:
Structure-aware graph anonymization. Web Intell. Agent Syst. 10(2): 193-208 (2012) - [c106]Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio:
Role engineering: from theory to practice. CODASPY 2012: 181-192 - [c105]Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil R. Adam, Vijayalakshmi Atluri:
Privacy-Preserving Subgraph Discovery. DBSec 2012: 161-176 - [c104]David Lorenzi, Basit Shafiq, Jaideep Vaidya, Ghulam Nabi, Soon Ae Chun
, Vijayalakshmi Atluri:
Using QR codes for enhancing the scope of digital government services. DG.O 2012: 21-29 - [c103]David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural, Vijayalakshmi Atluri:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. ICISS 2012: 327-342 - [c102]Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato
, Anna Lisa Ferrara, Parthasarathy Madhusudan:
Analyzing temporal role based access control models. SACMAT 2012: 177-186 - [c101]Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq:
Risk Based Access Control Using Classification. SafeConfig 2012: 79-95 - [c100]John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. SEC 2012: 150-161 - [e24]Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu:
17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012. ACM 2012, ISBN 978-1-4503-1295-0 [contents] - 2011
- [j46]Samrat Mondal
, Shamik Sural, Vijayalakshmi Atluri:
Security analysis of GTRBAC and its variants using model checking. Comput. Secur. 30(2-3): 128-147 (2011) - [j45]Vijay Atluri:
Preface. J. Comput. Secur. 19(3): 365 (2011) - [j44]Heechang Shin, Vijayalakshmi Atluri, June-Suh Cho:
Efficiently enforcing spatiotemporal access control under uncertain location information. J. Comput. Secur. 19(3): 607-637 (2011) - [j43]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
A profile anonymization model for location-based services. J. Comput. Secur. 19(5): 795-833 (2011) - [j42]David F. Ferraiolo, Vijayalakshmi Atluri, Serban I. Gavrila:
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement. J. Syst. Archit. 57(4): 412-424 (2011) - [c99]Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya:
An Optimization Model for the Extended Role Mining Problem. DBSec 2011: 76-89 - [c98]Vijay Atluri, Basit Shafiq, Soon Ae Chun
, Ghulam Nabi, Jaideep Vaidya:
UICDS-based information sharing among emergency response application systems. DG.O 2011: 331-332 - [c97]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Heechang Shin, Lili Jiang:
Weighted Rank-One Binary Matrix Factorization. SDM 2011: 283-294 - [e23]John Carlo Bertot, Karine Nahon, Soon Ae Chun, Luis F. Luna-Reyes, Vijay Atluri:
Proceedings of the 12th Annual International Conference on Digital Government Research, DG.O 2011, College Park, MD, USA, June 12 - 15, 2011. ACM International Conference Proceeding Series, Digital Government Research Center 2011, ISBN 978-1-4503-0762-8 [contents] - [e22]Vijay Atluri, Claudia Díaz:
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings. Lecture Notes in Computer Science 6879, Springer 2011, ISBN 978-3-642-23821-5 [contents] - [r4]Vijay Alturi:
HRU. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 562-564 - [r3]Vijay Alturi, David F. Ferraiolo:
Role-Based Access Control. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1053-1055 - 2010
- [j41]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri:
Anonymization models for directional location based service environments. Comput. Secur. 29(1): 59-73 (2010) - [j40]Vandana Pursnani Janeja, Nabil R. Adam, Vijayalakshmi Atluri, Jaideep Vaidya:
Spatial neighborhood based anomaly detection in sensor datasets. Data Min. Knowl. Discov. 20(2): 221-258 (2010) - [j39]Li Qin, Vijayalakshmi Atluri:
Semantics-aware security policy specification for the semantic web data. Int. J. Inf. Comput. Secur. 4(1): 52-75 (2010) - [j38]Vijayalakshmi Atluri, Qi Guo, Heechang Shin, Jaideep Vaidya:
A unified index structure for efficient enforcement of spatiotemporal authorisations. Int. J. Inf. Comput. Secur. 4(2): 118-151 (2010) - [j37]Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, Qi Guo:
Role Engineering via Prioritized Subset Enumeration. IEEE Trans. Dependable Secur. Comput. 7(3): 300-314 (2010) - [j36]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: A formal perspective. ACM Trans. Inf. Syst. Secur. 13(3): 27:1-27:31 (2010) - [c96]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Role Mining in the Presence of Noise. DBSec 2010: 97-112 - [c95]Basit Shafiq, Jaideep Vaidya, Vijay Atluri, Soon Ae Chun:
UICDS compliant resource management system for emergency response. DG.O 2010: 23-31 - [c94]Heechang Shin, Jaideep Vaidya, Vijayalakshmi Atluri, Sungyong Choi:
Ensuring Privacy and Security for LBS through Trajectory Partitioning. Mobile Data Management 2010: 224-226 - [c93]Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam:
Privacy-preserving trust verification. SACMAT 2010: 139-148 - [p6]Songmei Yu, Vijayalakshmi Atluri, Nabil R. Adam:
Preview. Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development 2010: 47-63
2000 – 2009
- 2009
- [j35]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Spatial outlier detection in heterogeneous neighborhoods. Intell. Data Anal. 13(1): 85-107 (2009) - [j34]Li Qin, Vijayalakshmi Atluri:
Evaluating the validity of data instances against ontology evolution over the Semantic Web. Inf. Softw. Technol. 51(1): 83-97 (2009) - [j33]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu:
Edge-RMP: Minimizing administrative assignments for role-based access control. J. Comput. Secur. 17(2): 211-235 (2009) - [j32]Dihua Guo, Hui Xiong, Vijayalakshmi Atluri, Nabil R. Adam:
Object discovery in high-resolution remote sensing images: a semantic perspective. Knowl. Inf. Syst. 19(2): 211-233 (2009) - [c92]Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam, Vijayalakshmi Atluri:
Effective anonymization of query logs. CIKM 2009: 1465-1468 - [c91]Heechang Shin, Vijayalakshmi Atluri:
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. DBSec 2009: 159-174 - [c90]Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya:
An efficient online auditing approach to limit private data disclosure. EDBT 2009: 636-647 - [c89]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yuan Hong:
Extended Boolean Matrix Decomposition. ICDM 2009: 317-326 - [c88]Samrat Mondal
, Shamik Sural, Vijayalakshmi Atluri:
Towards formal security analysis of GTRBAC using timed automata. SACMAT 2009: 33-42 - [c87]Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil R. Adam, Vijay Atluri:
Preserving Privacy in Social Networks: A Structure-Aware Approach. Web Intelligence 2009: 647-654 - 2008
- [j31]Vijayalakshmi Atluri, Heechang Shin, Jaideep Vaidya:
Efficient security policy enforcement for the mobile environment. J. Comput. Secur. 16(4): 439-475 (2008) - [j30]Vandana Pursnani Janeja, Vijayalakshmi Atluri:
Random Walks to Identify Anomalous Free-Form Spatial Scan Windows. IEEE Trans. Knowl. Data Eng. 20(10): 1378-1392 (2008) - [c86]Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri:
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ACSAC 2008: 237-246 - [c85]Nabil R. Adam, Vijay Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, Hui Xiong:
Secure information sharing and analysis for effective emergency management. DG.O 2008: 407-408 - [c84]Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri:
Optimal Boolean Matrix Decomposition: Application to Role Engineering. ICDE 2008: 297-306 - [c83]Heechang Shin, Vijayalakshmi Atluri, Jaideep Vaidya:
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment. MDM 2008: 73-80 - [c82]Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam:
Migrating to optimal RBAC with minimal perturbation. SACMAT 2008: 11-20 - [c81]Vijay Atluri:
Panel on role engineering. SACMAT 2008: 61-62 - [c80]David F. Ferraiolo, Vijay Atluri:
A meta model for access control: why is it needed and is it even possible to achieve? SACMAT 2008: 153-154 - [p5]Nabil R. Adam, Vandana P. Janeja, Aabhas V. Paliwal, Vijay Atluri, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Joachim Schaper:
Semantics-Based Threat Structure Mining for Homeland Security. Digital Government 2008: 307-329 - [p4]Vijayalakshmi Atluri, Janice Warner:
Security for Workflow Systems. Handbook of Database Security 2008: 213-230 - [p3]Soon Ae Chun
, Vijayalakshmi Atluri:
Geospatial Database Security. Handbook of Database Security 2008: 247-266 - [p2]Vijayalakshmi Atluri, Heechang Shin:
Efficiently Enforcing the Security and Privacy Policies in a Mobile Environment. Handbook of Database Security 2008: 553-573 - [e21]Vijay Atluri:
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings. Lecture Notes in Computer Science 5094, Springer 2008, ISBN 978-3-540-70566-6 [contents] - [e20]