Jaideep Vaidya
Orcid: 0000-0002-7420-6947
According to our database1,
Jaideep Vaidya
authored at least 245 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2021, "for contributions to privacy protection in data analytics and access control management".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., February, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Blockchain Based Auditable Access Control for Business Processes With Event Driven Policies.
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the 44th IEEE International Conference on Distributed Computing Systems, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
IEEE Trans. Knowl. Data Eng., December, 2023
Bioinform., October, 2023
IEEE Trans. Serv. Comput., 2023
IEEE Trans. Knowl. Data Eng., 2023
IEEE Trans. Emerg. Top. Comput., 2023
CoRR, 2023
Privacy preserving identification of population stratification for collaborative genomic research.
Bioinform., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
Proceedings of the 5th IEEE International Conference on Trust, 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
2022
IEEE Trans. Serv. Comput., 2022
Privacy-Preserving and Efficient Verification of the Outcome in Genome-Wide Association Studies.
Proc. Priv. Enhancing Technol., 2022
IEEE Intell. Syst., 2022
A Study of Users' Privacy Preferences for Data Sharing on Symptoms-Tracking/Health App.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
PRIVEE: A Visual Analytic Workflow for Proactive Privacy Risk Inspection of Open Data.
Proceedings of the IEEE Symposium on Visualization for Cyber Security, 2022
Proceedings of the 4th IEEE International Conference on Trust, 2022
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the IEEE International Conference on Web Services, 2022
Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users.
Proceedings of the Information for a Better World: Shaping the Global Future - 17th International Conference, iConference 2022, Virtual Event, February 28, 2022
A Generalized Framework for Preserving Both Privacy and Utility in Data Outsourcing (Extended Abstract).
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Facilitating Federated Genomic Data Analysis by Identifying Record Correlations while Ensuring Privacy.
Proceedings of the AMIA 2022, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
ASSEMBLE: Attribute, Structure and Semantics Based Service Mapping Approach for Collaborative Business Process Development.
IEEE Trans. Serv. Comput., 2021
ACM Trans. Manag. Inf. Syst., 2021
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling.
Inf. Polity, 2021
J. Biomed. Informatics, 2021
Privacy-Preserving Analytics in the Big Data Environment.
Proceedings of the 18th International Conference on Security and Cryptography, 2021
A Service-oriented Framework for Developing Personalized Patient Care Plans for COVID-19.
Proceedings of the DG.O'21: The 22nd Annual International Conference on Digital Government Research, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
Proceedings of the AMIA 2021, American Medical Informatics Association Annual Symposium, San Diego, CA, USA, October 30, 2021, 2021
2020
ACM Trans. Manag. Inf. Syst., 2020
Digit. Gov. Res. Pract., 2020
Proceedings of the Information Systems Security - 16th International Conference, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020
Proceedings of the 23rd International Conference on Extending Database Technology, 2020
2019
ACM Trans. Internet Techn., 2019
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018
IEEE Internet Comput., 2018
Int. J. Cooperative Inf. Syst., 2018
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
ACM Trans. Manag. Inf. Syst., 2017
Int. J. Bus. Inf. Syst., 2017
Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Gov. Inf. Q., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Friends are forever? Evolution of active friendship clusters in online social networks.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the AMIA 2017, 2017
2016
Web Intell., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
ACM Trans. Manag. Inf. Syst., 2015
Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility.
IEEE Trans. Dependable Secur. Comput., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the SECRYPT 2015, 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
IEEE Trans. Dependable Secur. Comput., 2014
An inference-proof approach to privacy-preserving horizontally partitioned linear programs.
Optim. Lett., 2014
Detecting inappropriate access to electronic health records using collaborative filtering.
Mach. Learn., 2014
J. Inf. Syst., 2014
Gov. Inf. Q., 2014
Comput. Secur., 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
2013
Comput. Secur., 2013
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013
Proceedings of the 2013 Information Security Curriculum Development Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Privacy-Preserving Collaborative Filtering on the Cloud and Practical Implementation Experiences.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
J. Cloud Comput., 2012
Proceedings of the 2012 International Conference on Privacy, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine: a performance case study.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012
Perturbation Based Privacy Preserving Slope One Predictors for Collaborative Filtering.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Boolean Matrix Decomposition Problem: Theory, Variations and Applications to Data Engineering.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012
Proceedings of the 15th International Conference on Extending Database Technology, 2012
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor.
J. Internet Serv. Inf. Secur., 2011
J. Comput. Secur., 2011
Proceedings of the 2011 IEEE/WIC/ACM International Conference on Web Intelligence, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
A unified index structure for efficient enforcement of spatiotemporal authorisations.
Int. J. Inf. Comput. Secur., 2010
Int. J. Comput. Model. Algorithms Medicine, 2010
Data Min. Knowl. Discov., 2010
Comput. Secur., 2010
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
Proceedings of the Encyclopedia of Database Systems, 2009
IEEE Trans. Knowl. Data Eng., 2009
J. Comput. Secur., 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Proceedings of the EDBT 2009, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
2008
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008
ACM Trans. Knowl. Discov. Data, 2008
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems.
Manuf. Serv. Oper. Manag., 2008
J. Comput. Secur., 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the International Conference on Image Processing, 2007
2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Advances in Information Security 19, Springer, ISBN: 978-0-387-25886-7, 2006
2005
J. Comput. Secur., 2005
Proceedings of the Intelligence and Security Informatics, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the 21st International Conference on Data Engineering, 2005
Proceedings of the Data and Applications Security XIX, 2005
2004
Proceedings of the Fourth SIAM International Conference on Data Mining, 2004
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004
Proceedings of the 9th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2004
2003
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003
2002
Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2002