Brajendra Panda

Orcid: 0000-0003-1117-9328

According to our database1, Brajendra Panda authored at least 92 papers between 1994 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Damage Assessment in Fog Computing Systems: A Blind Write Lineage Approach.
Proceedings of the 24th IEEE International Symposium on Cluster, 2024

2022
Optimized Damage Assessment in Large Datasets in Cloud.
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022

2021
An Efficient Secure System for Fetching Data From the Outsourced Encrypted Databases.
IEEE Access, 2021

2020
Maintaining Data Integrity in Fog Computing Based Critical Infrastructure Systems.
CoRR, 2020

Designing a Bit-Based Model to Accelerate Query Processing Over Encrypted Databases in Cloud.
CoRR, 2020

Minimizing Data Breach by a Malicious Fog Node within a Fog Federation.
Proceedings of the 7th IEEE International Conference on Cyber Security and Cloud Computing, 2020

2019
An Encryption-Based Approach to Protect Fog Federations from Rogue Nodes.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

Ensuring Data Integrity in Fog Computing Based Health-Care Systems.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2019

A Secure Model to Execute Queries Over Encrypted Databases in the Cloud.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Secure and Efficient Query Processing Technique for Encrypted Databases in Cloud.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

A Blockchain-Encryption-Based Approach to Protect Fog Federations from Rogue Nodes.
Proceedings of the 3rd Cyber Security in Networking Conference, 2019

A proposal for a reduced client workload model for querying encrypted databases in cloud.
Proceedings of the XLV Latin American Computing Conference, 2019

2017
An insider threat aware access control for cloud relational databases.
Clust. Comput., 2017

2016
Mitigating insider threat in cloud relational databases.
Secur. Commun. Networks, 2016

Facilitating Secure Query Processing on Encrypted Databases on the Cloud.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Policy Language for Access Control in Social Network Cloud.
Proceedings of the 2016 IEEE International Conference on Smart Cloud, 2016

Request Evaluation for Policy-Based Attribute Access Control in Social Network Cloud.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
An Agent Based Approach to Perform Damage Assessment and Recovery Efficiently after a Cyber Attack to Ensure E-government Database Security.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Efficiently Managing Encrypted Data in Cloud Databases.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2014
A new technique to partition and manage data security in cloud databases.
Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, 2014

2013
Mitigating Malicious Updates: Prevention of Insider Threat to Databases.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
Insider threat mitigation: preventing unauthorized knowledge acquisition.
Int. J. Inf. Sec., 2012

Tackling Insider Threat in Cloud Relational Databases.
Proceedings of the IEEE Fifth International Conference on Utility and Cloud Computing, 2012

Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Detecting collaborative insider attacks in information systems.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2012

Malicious Users' Transactions: Tackling Insider Threat.
Proceedings of the Information Security and Privacy Research, 2012

Mitigating Insider Threat on Database Integrity.
Proceedings of the Information Systems Security, 8th International Conference, 2012

2011
Mitigation of Malicious Modifications by Insiders in Databases.
Proceedings of the Information Systems Security - 7th International Conference, 2011

Enhanced Insider Threat Detection Model that Increases Data Availability.
Proceedings of the Distributed Computing and Internet Technology, 2011

2010
Special Issue Guest Editorial: Computer Forensics Track of Symposium on Applied Computing.
J. Digit. Forensic Pract., 2010

Predicting and Preventing Insider Threat in Relational Database Systems.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Malicious Modification Attacks by Insiders in Relational Databases: Prediction and Prevention.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Two-Dimensional Traceability Link Rule Mining for Detection of Insider Attacks.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

Insider threat discovery using automatic detection of mission critical data based on content.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation.
Proceedings of the Security in Information Systems, 2009

Insider Threat in Database Systems: Preventing Malicious Users' Activities in Databases.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Unifying strategies and tactics: A survivability framework for countering cyber attacks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Implementing PII honeytokens to mitigate against the threat of malicous insiders.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Analysis of Data Dependency Based Intrusion Detection System.
Proceedings of the Data and Applications Security XXIII, 2009

A traceability link mining approach for identifying insider threats.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Knowledge Acquisition and Insider Threat Prediction in Relational Database Systems.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Two-level trust-based decision model for information assurance in a virtual organization.
Decis. Support Syst., 2008

Knowledge Extraction and Management for Insider Threat Mitigation.
Proceedings of the Security in Information Systems, 2008

A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Performance analysis of an insider threat mitigation model.
Proceedings of the Third IEEE International Conference on Digital Information Management (ICDIM), 2008

Mining Inter-transaction Data Dependencies for Database Intrusion Detection.
Proceedings of the Innovations and Advances in Computer Sciences and Engineering, 2008

Provenance Tracking with Bit Vectors.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Modeling deceptive information dissemination using a holistic approach.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Data authentication and provenance management.
Proceedings of the Second IEEE International Conference on Digital Information Management (ICDIM), 2007

Monitoring Information Leakage During Query Aggregation.
Proceedings of the Distributed Computing and Internet Technology, 2007

A Trust Based Information Dissemination Model for Evaluating the Effect of Deceptive Data.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Distributed database damage assessment paradigm.
Inf. Manag. Comput. Secur., 2006

Introduction.
Commun. ACM, 2006

Modeling Deceptive Action in Virtual Communities.
Proceedings of the Security in Information Systems, 2006

Information trustworthiness evaluation based on trust combination.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems.
J. Netw. Syst. Manag., 2005

External Object Trust Zone Mapping for Information Clustering.
Proceedings of the Security in Information Systems, 2005

Component based trust management in the context of a virtual organization.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

2004
Transaction Fusion: A Model for Data Recovery from Information Attacks.
J. Intell. Inf. Syst., 2004

A Trust-Based Model for Information Integrity in Open Systems.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

A data mining approach for database intrusion detection.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Succinct and Fast Accessible Data Structures for Database Damage Assessment.
Proceedings of the Distributed Computing and Internet Technology, 2004

Damage Discovery in Distributed Database Systems.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
Transaction-Relationship Oriented Log Division for Data Recovery from Information Attacks.
J. Database Manag., 2003

A Service Oriented System Based Information Flow Model for Damage Assessment.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Hybrid Log Segmentation for Assured Damage Assessment.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Database Damage Assessment Using A Matrix Based Approach: An Intrusion Response System.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Identification of Malicious Transactions in Database Systems.
Proceedings of the 7th International Database Engineering and Applications Symposium (IDEAS 2003), 2003

Network Viruses: Their 306 Working Principles and Marriages with Hacking Programs.
Proceedings of the IEEE Systems, 2003

An Architecture for Making Data Available Ceaselessly During Recovery.
Proceedings of the IEEE Systems, 2003

Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Extended data dependency approach: a robust way of rebuilding database.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Analyzing Transaction Logs for Effective Damage Assessment.
Proceedings of the Research Directions in Data and Applications Security, 2002

Dividing Database Login to Equal Size Segments for Efficiency.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2001
Evaluating damage from cyber attacks: a model and analysis.
IEEE Trans. Syst. Man Cybern. Part A, 2001

Transaction fusion in the wake of information warfare.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

Design and analysis of data structures for querying image databases.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

Alternate Methods of Storing Committed Transactions in the Log for Their Future Re-execution.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001

Reorganization of Database Log for Information Warfare Data Recovery.
Proceedings of the Database and Application Security XV, 2001

A model to detect multi-source information attacks.
Proceedings of the ISCA 16th International Conference Computers and Their Applications, 2001

2000
Data Dependency Based Logging for Defensive Information Warfare.
Proceedings of the Applied Computing 2000, 2000

Storing transaction dependency graphs for damage appraisal following an information attack.
Proceedings of the ISCA 15th International Conference Computers and Their Applications, 2000

1999
Defensive Information Warfare - Introduction.
Commun. ACM, 1999

Improving the Performance of Lineage Tracing in Data Warehouse.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

1998
An overview of post information warfare data recovery.
Proceedings of the 1998 ACM symposium on Applied Computing, 1998

Reconstructing the Database after Electronic Attacks.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
An alternative approach to serialization of multilevel secure Transactions.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

1995
Query execution in prism and seaview: a cost analysis.
Proceedings of the 1995 ACM symposium on applied computing, 1995

Maintaining Surrogate Data for Query Acceleration in Multilevel Secure Database Systems.
Proceedings of the Information Systems and Data Management, 1995

1994
Secure transaction management and query processing in multilevel secure database systems.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994


  Loading...