Sushil Jajodia

From MaRDI portal
(Redirected from Person:209314)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Cardinality-based inference control in sum-only data cubes
Computer Security — ESORICS 2002
2022-02-16Paper
Can-Follow Concurrency Control
IEEE Transactions on Computers
2018-06-12Paper
An Application-Level Data Transparent Authentication Scheme without Communication Overhead
IEEE Transactions on Computers
2017-07-27Paper
Encryption and Fragmentation for Data Confidentiality in the Cloud
Foundations of Security Analysis and Design VII
2015-05-27Paper
Enforcing subscription-based authorization policies in cloud scenarios
Data and Applications Security and Privacy XXVI
2012-11-13Paper
Distributed Computing - IWDC 2003
Lecture Notes in Computer Science
2009-08-06Paper
Flexible support for multiple access control policies
ACM Transactions on Database Systems
2008-06-18Paper
Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution
Applied Cryptography and Network Security
2007-09-24Paper
Unauthorized inferences in semistructured databases
Information Sciences
2006-10-19Paper
Looking into the seeds of time: Discovering temporal patterns in large transaction sets
Information Sciences
2006-05-16Paper
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences
2006-05-16Paper
Journal on Data Semantics II
Lecture Notes in Computer Science
2005-08-17Paper
scientific article; zbMATH DE number 2100560 (Why is no real title available?)2004-09-14Paper
scientific article; zbMATH DE number 2100564 (Why is no real title available?)2004-09-14Paper
scientific article; zbMATH DE number 2090937 (Why is no real title available?)2004-08-13Paper
scientific article; zbMATH DE number 2088770 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2080028 (Why is no real title available?)2004-08-04Paper
Intrusion detection in distributed systems. An abstraction-based approach.
Advances in Information Security
2004-01-11Paper
scientific article; zbMATH DE number 1869805 (Why is no real title available?)
Distributed and Parallel Databases
2003-02-17Paper
scientific article; zbMATH DE number 1836553 (Why is no real title available?)2003-02-04Paper
Consistent policy enforcement in distributed systems using mobile policies
Data & Knowledge Engineering
2003-01-21Paper
A comparative performance analysis of reliable group rekey transport protocols for secure multicast
Performance Evaluation
2003-01-21Paper
Distributed policies for data management -- making policies mobile2002-12-04Paper
scientific article; zbMATH DE number 1836538 (Why is no real title available?)2002-11-27Paper
scientific article; zbMATH DE number 1836542 (Why is no real title available?)2002-11-27Paper
Protecting file systems against corruption using checksums2002-11-14Paper
Solving multi-granularity temporal constraint networks
Artificial Intelligence
2002-09-09Paper
An algebraic representation of calendars
Annals of Mathematics and Artificial Intelligence
2002-07-09Paper
scientific article; zbMATH DE number 1747796 (Why is no real title available?)
Distributed and Parallel Databases
2002-05-30Paper
scientific article; zbMATH DE number 1718513 (Why is no real title available?)2002-03-12Paper
Using semantic correctness in multidatabases to achieve local autonomy, distribute coordination, and maintain global integrity
Information Sciences
2001-10-14Paper
A general framework for time granularity and its application to temporal reasoning.
Annals of Mathematics and Artificial Intelligence
2000-09-10Paper
Scalable threshold closure
Theoretical Computer Science
2000-08-23Paper
scientific article; zbMATH DE number 1458810 (Why is no real title available?)2000-06-14Paper
An algorithm for dynamic data allocation in distributed systems
Information Processing Letters
1997-02-28Paper
Maintaining replicated authorizations in distributed database systems
Data & Knowledge Engineering
1997-02-27Paper
A short technical paper: Determining whether a vote assignment is dominated
Information Sciences
1991-01-01Paper
Lossless outer joins with incomplete information
BIT
1990-01-01Paper
An Extension of "Representative Instances and γ-Acyclic Relational Schemes"
IEEE Transactions on Software Engineering
1987-01-01Paper
On equivalence of relational and network database models
Information Processing Letters
1985-01-01Paper
scientific article; zbMATH DE number 3881905 (Why is no real title available?)1984-01-01Paper
Representative instances and γ-acyclic relational schemes
IEEE Transactions on Software Engineering
1984-01-01Paper
Realizing units as Whitehead torsions in low dimension
Contemporary Mathematics
1983-01-01Paper
Entity-relationship diagrams which are in BCNF
International Journal of Computer & Information Sciences
1983-01-01Paper
The Problem of Equivalence for Entity-Relationship Diagrams
IEEE Transactions on Software Engineering
1983-01-01Paper
A Scheme of Parallel Processing for MIMD Systems
IEEE Transactions on Software Engineering
1983-01-01Paper
Combinatorial Equivalence between Group Presentations1982-01-01Paper
On the Two-Realizability of Chain Complexes1981-01-01Paper
Spaces Dominated by Two-complexes1981-01-01Paper
Surjective stability of units and simple homotopy type
Journal of Pure and Applied Algebra
1980-01-01Paper
Homotopy classification of lens spaces for one-relator groups with torsion
Pacific Journal of Mathematics
1980-01-01Paper
On 2-dimensional CW-complexes with a single 2-cell
Pacific Journal of Mathematics
1979-01-01Paper


Research outcomes over time


This page was built for person: Sushil Jajodia