Vijayalakshmi Atluri
Orcid: 0000-0003-2068-780XAffiliations:
- Rutgers University, USA
According to our database1,
Vijayalakshmi Atluri
authored at least 244 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
Proceedings of the ICT Systems Security and Privacy Protection, 2024
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024
2023
IEEE Trans. Emerg. Top. Comput., 2023
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
2022
Proceedings of the ICT Systems Security and Privacy Protection, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
ACM Trans. Manag. Inf. Syst., 2021
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems.
IEEE Trans. Emerg. Top. Comput., 2021
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling.
Inf. Polity, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
ACM Trans. Manag. Inf. Syst., 2020
Digit. Gov. Res. Pract., 2020
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020
2019
ACM Trans. Internet Techn., 2019
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Comput. Secur., 2019
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources.
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Proceedings of the Information Systems Security - 15th International Conference, 2019
Social Media Communication of Public Sector Organizations: A Case Study of Northeast US.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
IEEE Trans. Inf. Forensics Secur., 2018
A side-channel attack on smartphones: Deciphering key taps using built-in microphones.
J. Comput. Secur., 2018
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018
Proceedings of the Data and Applications Security and Privacy XXXII, 2018
Proceedings of the From Database to Cyber Security, 2018
2017
Proceedings of the Encyclopedia of GIS., 2017
ACM Trans. Manag. Inf. Syst., 2017
Analysis of political discourse on twitter in the context of the 2016 US presidential elections.
Gov. Inf. Q., 2017
Proceedings of the ICT Systems Security and Privacy Protection, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017
2016
Proceedings of the 9th International Conference on Security of Information and Networks, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
2015
ACM Trans. Manag. Inf. Syst., 2015
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the ICT Systems Security and Privacy Protection, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
A Framework for Policy Similarity Evaluation and Migration Based on Change Detection.
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Information Systems Security - 11th International Conference, 2015
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
2014
Gov. Inf. Q., 2014
Comput. Secur., 2014
More data, more security challenges: integrating analytics in to the information security curriculum.
Proceedings of the 2014 Information Security Curriculum Development Conference, 2014
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014
2013
Comput. Secur., 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the Information Systems Security - 9th International Conference, 2013
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Information Systems Security, 8th International Conference, 2012
Proceedings of the 13th Annual International Conference on Digital Government Research, 2012
Proceedings of the Data and Applications Security and Privacy XXVI, 2012
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.
J. Syst. Archit., 2011
Efficiently enforcing spatiotemporal access control under uncertain location information.
J. Comput. Secur., 2011
Comput. Secur., 2011
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
2010
IEEE Trans. Dependable Secur. Comput., 2010
Int. J. Inf. Comput. Secur., 2010
A unified index structure for efficient enforcement of spatiotemporal authorisations.
Int. J. Inf. Comput. Secur., 2010
Data Min. Knowl. Discov., 2010
Comput. Secur., 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Proceedings of the 11th Annual International Conference on Digital Government Research, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development, 2010
2009
Knowl. Inf. Syst., 2009
J. Comput. Secur., 2009
Evaluating the validity of data instances against ontology evolution over the Semantic Web.
Inf. Softw. Technol., 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the EDBT 2009, 2009
Proceedings of the Data and Applications Security XXIII, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Proceedings of the Encyclopedia of GIS., 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
Proceedings of the Handbook of Database Security - Applications and Trends, 2008
IEEE Trans. Knowl. Data Eng., 2008
J. Comput. Secur., 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
A meta model for access control: why is it needed and is it even possible to achieve?
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment.
Proceedings of the 9th International Conference on Mobile Data Management (MDM 2008), 2008
Proceedings of the 24th International Conference on Data Engineering, 2008
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Digital Government: E-Government Research, 2008
2007
Distributed Parallel Databases, 2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007
Proceedings of the Data and Applications Security XXI, 2007
2006
J. Data Semant., 2006
Int. J. Semantic Web Inf. Syst., 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
Secure interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the Data Warehousing and Knowledge Discovery, 8th International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Distributed Parallel Databases, 2005
Proceedings of the 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
LS<sup>3</sup>: a Linear Semantic Scan Statistic technique for detecting anomalous windows.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005
Preserving mobile customer privacy: an access control system for moving objects and customer profiles.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005
Proceedings of the Intelligence and Security Informatics, 2005
Adapting spatial constraints of composite multimedia objects to achieve universal access.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005
FS<sup>3</sup>: A Random Walk Based Free-Form Spatial Scan Statistic for Anomalous Window Detection.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005
Proceedings of the Computer Security, 2005
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Agency interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 2005 National Conference on Digital Government Research, 2005
Technology transfer of inter-agency government services and their transnational feasibility studies.
Proceedings of the 2005 National Conference on Digital Government Research, 2005
A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Data and Applications Security XIX, 2005
Proceedings of the Data Warehousing and Knowledge Discovery, 2005
2004
IEEE Trans. Dependable Secur. Comput., 2004
J. Comput. Secur., 2004
A clickstream-based collaborative filtering personalization model: towards a better performance.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
Proceedings of the Conceptual Modeling, 2004
Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004
2003
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003
Proceedings of the E-Commerce and Web Technologies, 4th International Conference, 2003
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003
2002
Automating the Delivery of Governmental Business Services Through Workflow Technology.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002
IEEE Trans. Knowl. Data Eng., 2002
ACM Trans. Inf. Syst. Secur., 2002
Employing an extended transaction model in multilevel secure transaction processing.
Informatica (Slovenia), 2002
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002
OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002
Uniform Indexing for Geospatial Data and Authorizations.
Proceedings of the Research Directions in Data and Applications Security, 2002
2001
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects.
IEEE Trans. Knowl. Data Eng., 2001
Modeling and Evaluation of Distributed Workflow Algorithms.
Proceedings of the World Multiconference on Systemics, Cybernetics and Informatics, 2001
Proceedings of the ACM-GIS 2001, 2001
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001
An Extended Transaction Model Approach for Multilevel Secure Transaction Processing.
Proceedings of the Database and Application Security XV, 2001
Proceedings of the CCS 2001, 2001
2000
J. Comput. Secur., 2000
J. Comput. Secur., 2000
Distributed Parallel Databases, 2000
Proceedings of the MASCOTS 2000, Proceedings of the 8th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 29 August, 2000
Proceedings of the Data and Application Security, 2000
1999
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems.
ACM Trans. Inf. Syst. Secur., 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
1998
Modification of Integrity Constraints Through Knowledge Discovery.
Proceedings of the Integrity and Internal Control in Information Systems, 1998
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998
Analysing the Safety of Workflow Authorization Models.
Proceedings of the Database Security XII: Status and Prospects, 1998
Workshop Summary.
Proceedings of the Database Security XII: Status and Prospects, 1998
1997
Transaction Processing in Multilevel Secure Databases with Kernelized Architectures: Challenges and Solutions.
IEEE Trans. Knowl. Data Eng., 1997
J. Comput. Secur., 1997
Inf. Softw. Technol., 1997
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems.
Proceedings of the Second Workshop on Role-Based Access Control, 1997
An Execution Model for Multilevel Seccure Workflows.
Proceedings of the Database Securty XI: Status and Prospects, 1997
1996
Alternative Correctness Criteria for Concurrent Execution of Transactions in Multilevel Secure Databases.
IEEE Trans. Knowl. Data Eng., 1996
Multilevel Secure Transaction Processing: Status and Prospects.
Proceedings of the Database Security Volume X, 1996
An Extended Petri Net Model for Supporting Workflows in a Multilevel Secure Environment.
Proceedings of the Database Security Volume X, 1996
1995
IEEE Trans. Knowl. Data Eng., 1995
Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases.
Proceedings of the Database Security IX: Status and Prospects, 1995
1994
Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols.
Proceedings of the Database Security, 1994
1993
Achieving Stricter Correctness Requirements in Multilevel Secure Database Management Systems.
J. Comput. Secur., 1993
Proceedings of the 1993 IEEE Computer Society Symposium on Research in Security and Privacy, 1993
Achieving Stricter Correctness Requirements in Multilevel Secure Databases: The Dynamic Case.
Proceedings of the Database Security, 1993
1992
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Proceedings of the 1992 IEEE Computer Society Symposium on Research in Security and Privacy, 1992