James B. D. Joshi
Orcid: 0000-0003-4519-9802Affiliations:
- University of Pittsburgh, Pennsylvania, USA
According to our database1,
James B. D. Joshi
authored at least 159 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on d-nb.info
-
on sis.pitt.edu
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities.
Proceedings of the 5th IEEE International Conference on Trust, 2023
2022
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
2021
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication.
IEEE Trans. Dependable Secur. Comput., 2021
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021
2020
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems.
Comput. Secur., 2020
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020
2019
Introduction to the Special Section on Advances in Internet-based Collaborative Technologies.
ACM Trans. Internet Techn., 2019
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
<i>k-Trustee</i>: Location injection attack-resilient anonymization for location privacy.
Comput. Secur., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018
An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Proceedings of the 2017 IEEE International Congress on Big Data, 2017
2016
Characterizing users' check-in activities using their scores in a location-based social network.
Multim. Syst., 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
Comput. Secur., 2015
2014
Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012).
Mob. Networks Appl., 2014
Inf. Syst. Frontiers, 2014
CPBAC: Property-based access control model for secure cooperation in online social networks.
Comput. Secur., 2014
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014
Proceedings of the Network and System Security - 8th International Conference, 2014
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks.
IEEE Commun. Surv. Tutorials, 2013
An adaptive risk management and access control framework to mitigate insider threats.
Comput. Secur., 2013
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013
2012
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks.
IEEE Trans. Dependable Secur. Comput., 2012
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing".
Mob. Networks Appl., 2012
Int. J. Cloud Comput., 2012
Comput. Secur., 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems.
Proceedings of the IEEE 13th International Conference on Information Reuse & Integration, 2012
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Towards understanding residential privacy by analyzing users' activities in foursquare.
Proceedings of the 2012 ACM Workshop on Building analysis datasets and gathering experience returns for security, 2012
2011
Proceedings of the 2nd International Conference on Ambient Systems, 2011
J. Inf. Knowl. Manag., 2011
Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration.
J. Inf. Knowl. Manag., 2011
Int. J. Inf. Priv. Secur. Integr., 2011
Int. J. Inf. Priv. Secur. Integr., 2011
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey.
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2011
Proceedings of the 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, 2011
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
IEEE Secur. Priv., 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010
Panel title: Critical need for funding of basic and applied research in large-scale computing.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments.
Proceedings of the ICEIS 2010 - Proceedings of the 12th International Conference on Enterprise Information Systems, Volume 3, ISAS, Funchal, Madeira, Portugal, June 8, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the HT'10, 2010
Proceedings of the 2010 International Symposium on Collaborative Technologies and Systems, 2010
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010
A collaborative approach to facilitate intrusion detection and response against DDoS attacks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010
2009
Proceedings of the Encyclopedia of Database Systems, 2009
An architecture for specification and enforcement of temporal access control constraints using OWL.
Proceedings of the 6th ACM Workshop On Secure Web Services, 2009
RRNA: reliable soft real-time network aware grid scheduling algorithm using round trip time.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009
A collaborative k-anonymity approach for location privacy in location-based services.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009
2008
ACM Trans. Inf. Syst. Secur., 2008
Proceedings of the IEEE International Conference on Sensor Networks, 2008
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the Collaborative Computing: Networking, 2008
Proceedings of the Collaborative Computing: Networking, 2008
2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007
Proceedings of the Third International Symposium on Information Assurance and Security, 2007
2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.
Proceedings of the Trust Management, 4th International Conference, 2006
A similarity based technique for detecting malicious executable files for computer forensics.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006
Proceedings of the 2nd International ICST Conference on Collaborative Computing: Networking, 2006
2005
IEEE Trans. Knowl. Data Eng., 2005
IEEE Trans. Knowl. Data Eng., 2005
X-gtrbac admin: A decentralized administration model for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control.
ACM Trans. Inf. Syst. Secur., 2005
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model.
IEEE Trans. Dependable Secur. Comput., 2005
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005
Proceedings of the Web Information Systems Engineering, 2005
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005
2004
X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
2003
PhD thesis, 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003
2002
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002
IEEE Trans. Multim., 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002
2001
2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998