WorldCat Identities

Jajodia, Sushil

Overview
Works: 189 works in 744 publications in 1 language and 15,452 library holdings
Genres: Conference papers and proceedings  Encyclopedias 
Roles: Editor, Author, Other, Creator, Contributor
Publication Timeline
.
Most widely held works by Sushil Jajodia
Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings by Sushil Jajodia( )

36 editions published between 2005 and 2015 in English and Undetermined and held by 1,245 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security
Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings by Sushil Jajodia( )

27 editions published in 2005 in English and Undetermined and held by 629 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, CT, USA, in August 2005. The 24 revised full papers presented together with an invited lecture were thoroughly reviewed and selected from 54 submissions. The papers present theory, technique, applications, and practical experience of data and application security with topics like cryptography, privacy, security planning and administration, secure information integration, secure semantic Web technologies and applications, access control, integrity maintenance, knowledge discovery and privacy, concurrency control, fault-tolerance and recovery methods
Secure data management in decentralized systems by Ting Yu( )

12 editions published between 2006 and 2007 in English and held by 550 WorldCat member libraries worldwide

The research scope of database security has expanded greatly, due to the rapid development of the global inter-networked infrastructure. Databases are no longer stand-alone systems that are only accessible to internal users of organizations. Instead, allowing selective access from different security domains has become a must for many business practices. New data services are emerging every day, which also brings new challenges to protect data security. The internet and the web offer means for collecting and sharing data with unprecedented flexibility and convenience. Secure Data Management in Decentralized Systems identifies and addresses these new challenges. This volume presents a wide range of active areas, closely related to database security by distinguished leaders within this field. Solutions are included. Secure Data Management in Decentralized Systems is designed for a professional audience composed of practitioners and researchers in industry. This book is suitable for graduate-level students in computer science as well
Handbook of database security : applications and trends by Michael Gertz( )

18 editions published between 2007 and 2010 in English and Undetermined and held by 543 WorldCat member libraries worldwide

Provides an overview of data security models, techniques and architectures in a variety of data management applications and settings
Preserving privacy in On-Line Analytical Processing (OLAP) by Lingyu Wang( )

11 editions published in 2007 in English and held by 505 WorldCat member libraries worldwide

This volume addresses the privacy issue of on-line analytic processing (OLAP) systems. It reviews a series of methods that can precisely answer daga cube-style OLAP, regarding sensitive data while provably preventing adversaries from inferring data
Secure cloud computing by Sushil Jajodia( )

12 editions published between 2014 and 2016 in English and held by 494 WorldCat member libraries worldwide

"This book presents a range of cloud computing security challenges and promising solution paths."--Publisher
Computer Security : ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008 : proceedings by David Hutchison( )

17 editions published in 2008 in English and Undetermined and held by 481 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, held in Torremolinos, Spain, in October 2008. The 37 revised full papers presented were carefully reviewed and selected from 168 submissions. The papers are organized in topical sections on Intrusion Detection and Network Vulnerability Analysis; Network Security; Smart Cards and Identity management; Data and Applications Security; Privacy Enhancing Technologies; Anonymity and RFID Privacy; Access Control and Trust Negotiation; Information Flow and Non-transferability; Secure Electronic Voting and Web Applications Security; VoIP Security, Malware, and DRM; Formal Models and Cryptographic Protocols; Language-based and Hardware Security
Data and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings by Sara Foresti( )

11 editions published in 2010 in English and held by 456 WorldCat member libraries worldwide

Annotation
Cyber situational awareness : issues and research by Sushil Jajodia( )

8 editions published in 2010 in English and held by 455 WorldCat member libraries worldwide

"Cyber Situational Awareness: Issues and Research is an edited volume contributed by worldwide cyber security experts. This book seeks to establish state of the art in cyber situational awareness and to set course for future research as a multidisciplinary group of leading researchers from cyber security, cognitive system, and decision science areas elaborate on the fundamental challenges facing the research community and identify promising solutions. Case studies based on real world examples are provided throughout this book, as well." "Cyber Situational Awareness: Issues and Research is designed for a professional audience composed of government workers and practitioners working in the field of cyber security. Advanced-level students and researchers studying computer science will also find this book useful as a secondary text or a reference book"--Jacket
Moving target defense : creating asymmetric uncertainty for cyber threats by Sushil Jajodia( )

18 editions published between 2011 and 2014 in English and held by 432 WorldCat member libraries worldwide

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr
Moving target defense II : application of game theory and adversarial modeling by Sushil Jajodia( )

8 editions published in 2013 in English and held by 427 WorldCat member libraries worldwide

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment.  Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment.  We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations.  One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field.  In the first volume of MTD, we presented MTD approaches based on software transformations, and MTD approaches based on network and software stack configurations. In this second volume of MTD, a group of leading researchers describe game theoretic, cyber maneuver, and software transformation approaches for constructing and analyzing MTD systems. Designed as a professional book for practitioners and researchers working in the cyber security field, advanced -level students and researchers focused on computer science will also find this book valuable as a secondary text book or reference
Temporal databases : research and practice by Opher Etzion( Book )

17 editions published in 1998 in English and held by 423 WorldCat member libraries worldwide

This book grew out of a Dagstuhl seminar organized by the volume editors in June 1997. After the seminar, submissions for this book were solicited both from and beyond the group of participants. A peer review process followed, from which only original papers of the highest quality on the state of the art in the field were accepted for presentation in the book. The volume is divided into parts on temporal database infrastructure, temporal query languages, and advanced applications. A comprehensive bibliography, glossaries for both temporal database and time granularity concepts, and summaries of current work are also provided. The book is the ultimate reference for anyone actively involved in temporal database research and design or who is interested in their applications
Encyclopedia of cryptography and security by Henk C. A. van Tilborg( )

4 editions published in 2011 in English and held by 419 WorldCat member libraries worldwide

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. The work is intended for students, researchers and practitioners who need a quick and authoritative reference to areas like data protection, network security, operating systems security, and more
Security and privacy in communication networks : 6th Iternational [sic] ICST conference, SecureComm 2010, Singapore, September 7-9, 2010, proceedings by Sushil Jajodia( )

12 editions published in 2010 in English and held by 399 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed proceedings of the 6th International ICST Conference, SecureComm 2010, held in Singapore in September 2010. The 28 revised full papers were carefully reviewed and selected from 112 submissions. They are organized in topical sections on malware and email security, anonymity and privacy, wireless security, systems security, network security, and security protocols
Proceedings of the IFIP TC 11 23rd International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC'08, September 7-10, 2008, Milano, Italy by Sushil Jajodia( )

14 editions published between 2008 and 2011 in English and held by 393 WorldCat member libraries worldwide

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org
Computer security - ESORICS 2013 : 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013 : proceedings by Jason Crampton( )

8 editions published in 2013 in English and held by 387 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013. The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks
Proceedings, International Symposium on Databases in Parallel and Distributed Systems : December 5-7, 1988, Austin, Texas, USA by 1988, Austin, Tex.> International Symposium on Databases in Parallel and Distributed Systems. <1( )

10 editions published between 1988 and 1989 in English and held by 373 WorldCat member libraries worldwide

Network hardening : an automated approach to improving network security by Lingyu Wang( )

9 editions published in 2014 in English and held by 369 WorldCat member libraries worldwide

This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though no current tool provides a direct solution to remove the threats, they are a more efficient means of network defense than relying solely on the experience and skills of a human analyst. Key background information on attack graphs and network hardening helps readers understand the complexities of these tools and techniques. A common network hardening technique generates hardening solutions comprised of initially satisfied conditions, thereby making the solution more enforceable. Following a discussion of the complexity issues in this technique, the authors provide an improved technique that considers the dependencies between hardening options and employs a near-optimal approximation algorithm to scale linearly with the size of the inputs. Also included are automated solutions for hardening a network against sophisticated multi-step intrusions. Network Hardening: An Automated Approach to Improving Network Security is a valuable resource for researchers and professionals working in network security. It is also a useful tool for advanced-level students focused on security in computer science and electrical engineering
Conceptual modeling-ER 2001 : 20th International Conference on Conceptual Modeling, Yokohama, Japan, November 2001 : proceedings by Hideko S Kunii( )

18 editions published in 2001 in English and held by 362 WorldCat member libraries worldwide

This book constitutes the refereed proceedings of the 20th International Conference on Conceptual Modeling, ER 2001, held in Tokohama, Japan, in November 2001. The 45 revised full papers presented together with three keynote presentations were carefully reviewed and selected from a total of 197 submissions. The papers are organized in topical sections on spatial databases, spatio-temporal databases, XML, information modeling, database design, data integration, data warehouse, UML, conceptual models, systems design, method reengineering and video databases, workflows, web information systems, applications, and software engineering
Cyber warfare : building the scientific foundation( )

8 editions published between 2015 and 2016 in English and held by 339 WorldCat member libraries worldwide

This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.51 (from 0.41 for Encycloped ... to 0.71 for Temporal d ...)

WorldCat IdentitiesRelated Identities
Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings
Covers
Data and Applications Security XIX 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, ProceedingsSecure data management in decentralized systemsHandbook of database security : applications and trendsPreserving privacy in On-Line Analytical Processing (OLAP)Computer Security : ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008 : proceedingsData and Applications Security and Privacy XXIV 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. ProceedingsCyber situational awareness : issues and researchMoving target defense : creating asymmetric uncertainty for cyber threats
Alternative Names
Jajodia, S. 1947-

Sushil Jajodia

Sushil Jajodia 1947-

Languages
English (273)