BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
EDIT!
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Travelled to:
1 × Austria
1 × China
1 × France
1 × Spain
1 × Switzerland
2 × Canada
2 × Norway
6 × USA
Collaborated with:
X.S.Wang D.Mutchler C.Bettini I.Ray P.Ammann P.Samarati V.S.Subrahmanian E.Bertino O.Wolfson R.S.Sandhu B.Kogan S.D.C.d.Vimercati S.Foresti S.Paraboschi C.Yao G.Wiederhold W.Litwin M.Calagna H.Guo L.V.Mancini Y.Li L.Wang D.Wijesekera D.Barbará Y.Li J.Lin J.Couto K.P.Smith V.Swarup D.B.Faatz T.Cornett J.Hoyt
Talks about:
data (6) tempor (5) base (5) databas (4) secur (4) control (3) semant (3) multilevel (2) decomposit (2) algorithm (2)

Person: Sushil Jajodia

DBLP DBLP: Jajodia:Sushil

Facilitated 1 volumes:

SIGMOD 1993Ed

Contributed to:

VLDB 20102010
VLDB 20072007
SAC 20062006
VLDB 20052005
CIKM 20032003
SAC 20032003
CAiSE 20022002
VLDB 20022002
CAiSE 19971997
SIGMOD 19971997
PODS 19961996
SIGMOD 19951995
VLDB 19951995
SIGMOD 19931993
PODS 19921992
CAiSE 19911991
SIGMOD 19911991
SIGMOD 19901990
SIGMOD 19871987
VLDB 19871987

Wrote 20 papers:

VLDB-2010-VimercatiFJPS #privacy
Fragments and Loose Associations: Respecting Privacy in Data Publishing (SDCdV, SF, SJ, SP, PS), pp. 1370–1381.
VLDB-2007-VimercatiFJPS #data access #evolution #named #outsourcing
Over-encryption: Management of Access Control Evolution on Outsourced Data (SDCdV, SF, SJ, SP, PS), pp. 123–134.
SAC-2006-CalagnaGMJ #robust
A robust watermarking system based on SVD compression (MC, HG, LVM, SJ), pp. 1341–1347.
VLDB-2005-YaoWJ
Checking for k-Anonymity Violation by Views (CY, XSW, SJ), pp. 910–921.
CIKM-2003-SmithSJFCH
Securely sharing neuroimagery (KPS, VS, SJ, DBF, TC, JH), pp. 375–377.
SAC-2003-BarbaraLLJC #data mining #detection #mining
Bootstrapping a Data Mining Intrusion Detection System (DB, YL, JLL, SJ, JC), pp. 421–425.
CAiSE-2002-LiWWJ
Auditing Interval-Based Inference (YL, LW, XSW, SJ), pp. 553–567.
VLDB-2002-BettiniJWW #policy #security
Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
CAiSE-1997-JajodiaRA #composition #implementation #semantics #transaction
Implementing Semantic-Based Decomposition of Transactions (SJ, IR, PA), pp. 75–88.
SIGMOD-1997-JajodiaSSB #data access #framework #multi #policy
A Unified Framework for Enforcing Multiple Access Control Policies (SJ, PS, VSS, EB), pp. 474–485.
PODS-1996-BettiniWJ #data mining #mining #multi #testing
Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining (CB, XSW, SJ), pp. 68–78.
SIGMOD-1995-BettiniWBJ #database #evaluation #query #semantics
Semantic Assumptions and Query Evaluation in Temporal Databases (CB, XSW, EB, SJ), pp. 257–268.
VLDB-1995-AmmannJR #formal method #semantics #transaction #using
Using Formal Methods to Reason about Semantics-Based Decompositions of Transactions (PA, SJ, IR), pp. 218–227.
SIGMOD-1993-WangJS #approach #database #towards
Temporal Modules: An Approach Toward Federated Temporal Databases (XSW, SJ, VSS), pp. 227–236.
PODS-1992-WolfsonJ #algorithm #distributed #replication
Distributed Algorithms for Dynamic Replication of Data (OW, SJ), pp. 149–163.
CAiSE-1991-WiederholdJL #database
Dealing with Granularity of Time in Temporal Databases (GW, SJ, WL), pp. 124–140.
SIGMOD-1991-JajodiaS #multi #relational #towards
Towards a Multilevel Secure Relational Data Model (SJ, RSS), pp. 50–59.
SIGMOD-1990-KoganJ #architecture #concurrent #database #multi
Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture (BK, SJ), pp. 153–162.
SIGMOD-1987-JajodiaM
Dynamic Voting (SJ, DM), pp. 227–238.
VLDB-1987-JajodiaM #algorithm
Enhancements to the Voting Algorithm (SJ, DM), pp. 399–406.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.