James Joshi

According to our database1, James Joshi authored at least 40 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities.
Proceedings of the 5th IEEE International Conference on Trust, 2023

2021
Cybersecurity Education in the Age of Artificial Intelligence.
Proceedings of the SIGCSE '21: The 52nd ACM Technical Symposium on Computer Science Education, 2021

FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data.
Proceedings of the AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, 2021

2020
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions.
Proceedings of the Second IEEE International Conference on Trust, 2020

2019
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

2018
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Modernizing the Future of American Voting.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Mining Historical Data towards Interference Management in Wireless SDNs.
Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, 2017

Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

A Risk-Aware Access Control Framework for Cyber-Physical Systems.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Differentially Private Trajectory Analysis for Points-of-Interest Recommendation.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2016
SocialMix: Supporting Privacy-Aware Trusted Social Networking Services.
Proceedings of the IEEE International Conference on Web Services, 2016

Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

A Dynamic Privacy Aware Access Control Model for Location Based Services.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2013
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Towards understanding traveler behavior in Location-based Social Networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Understanding venue popularity in Foursquare.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Privacy settings in social networking systems: what you cannot control.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

A HITS-based POI recommendation algorithm for location-based social networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
A trust-and-risk aware RBAC framework: tackling insider threat.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Exploring trajectory-driven local geographic topics in foursquare.
Proceedings of the 2012 ACM Conference on Ubiquitous Computing, 2012

Preface.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
A secure, constraint-aware role-based access control interoperation framework.
Proceedings of the 5th International Conference on Network and System Security, 2011

2010
BaRMS: A Bayesian Reputation Management approach for P2P systems.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2010

Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS.
Proceedings of IEEE International Conference on Communications, 2010

Preserving structural properties in anonymization of social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Message from the general chairs.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users.
Proceedings of the 17th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2009

2008
IWSSE 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the IWSSE 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

2005
A Role-Based Access Control Policy Verification Framework for Real-Time Systems.
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2005

2004
X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Security for grid-based computing systems issues and challenges.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

2003
Dependencies and separation of duty constraints in GTRBAC.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Access Control in Dynamic XML-Based Web-Services with X-RBAC.
Proceedings of the International Conference on Web Services, ICWS '03, June 23, 2003

2002
Temporal hierarchies and inheritance semantics for GTRBAC.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model.
Proceedings of the 26th International Computer Software and Applications Conference (COMPSAC 2002), 2002

2000
A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

1998
Evaluation of Filtering Mechanisms for MPEG Video Communications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998


  Loading...