Vijay Atluri - Publications

Affiliations: 
Rutgers The State University of New Jersey - Newark, United States 
Area:
Computer Science

81 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2022 Pericherla A, Paul P, Sural S, Vaidya J, Atluri V. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. Ifip Advances in Information and Communication Technology. 648: 360-376. PMID 36544863 DOI: 10.1007/978-3-031-06975-8_21  0.335
2019 Batra G, Atluri V, Vaidya J, Sural S. Deploying ABAC policies using RBAC Systems. Journal of Computer Security. 27: 483-506. PMID 31929684 DOI: 10.3233/Jcs-191315  0.304
2019 DAS S, Sural S, Vaidya J, Atluri V. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems. Acm Transactions On Internet Technology. 19. PMID 31885522 DOI: 10.1145/3323233  0.34
2019 Nath R, Das S, Sural S, Vaidya J, Atluri V. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. Proceedings of the ... Acm Symposium On Access Control Models and Technologies. Acm Symposium On Access Control Models and Technologies. 2019: 25-35. PMID 31346589 DOI: 10.1145/3322431.3325102  0.321
2019 Jha S, Sural S, Atluri V, Vaidysa J. Security Analysis of ABAC under an Administrative Model. Iet Information Security. 13: 96-103. PMID 31214270 DOI: 10.1049/Iet-Ifs.2018.5010  0.349
2019 Roy A, Sural S, Majumdar AK, Vaidya J, Atluri V. Enabling Workforce Optimization in Constrained Attribute Based Access Control Systems Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2019.2944787  0.309
2018 Jha S, Sural S, Atluri V, Vaidya J. Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control Ieee Transactions On Information Forensics and Security. 13: 897-911. DOI: 10.1109/Tifs.2017.2771492  0.326
2017 Talukdar T, Batra G, Vaidya J, Atluri V, Sural S. Efficient bottom-up Mining of Attribute Based Access Control Policies. ... Ieee Conference On Collaboration and Internet Computing. Ieee Conference On Collaboration and Internet Computing. 2017: 339-348. PMID 30506058 DOI: 10.1109/CIC.2017.00051  0.311
2017 Mitra B, Sural S, Vaidya J, Atluri V. Migrating from RBAC to temporal RBAC Iet Information Security. 11: 294-300. DOI: 10.1049/Iet-Ifs.2016.0258  0.316
2016 Badar N, Vaidya J, Atluri V, Verde NV, Warner J. Using classification for role-based access control management International Journal of Technology, Policy and Management. 16: 45-78. DOI: 10.1504/Ijtpm.2016.075940  0.599
2016 Mitra B, Sural S, Vaidya J, Atluri V. A Survey of Role Mining Acm Computing Surveys. 48. DOI: 10.1145/2871148  0.38
2016 Mitra B, Sural S, Vaidya J, Atluri V. Mining temporal roles using many-valued concepts Computers and Security. 60: 79-94. DOI: 10.1016/J.Cose.2016.04.002  0.354
2015 Mitra B, Sural S, Atluri V, Vaidya J. The generalized temporal role mining problem Journal of Computer Security. 23: 31-58. DOI: 10.3233/Jcs-140512  0.403
2015 Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607  0.561
2015 Roy A, Sural S, Majumdar AK, Vaidya J, Atluri V. Minimizing organizational user requirement while meeting security constraints Acm Transactions On Management Information Systems. 6. DOI: 10.1145/2811269  0.33
2015 Harika P, Nagajyothi M, John JC, Sural S, Vaidya J, Atluri V. Meeting cardinality constraints in role mining Ieee Transactions On Dependable and Secure Computing. 12: 71-84. DOI: 10.1109/Tdsc.2014.2309117  0.408
2015 Sarana P, Roy A, Sural S, Vaidya J, Atluri V. Role mining in the presence of separation of duty constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9478: 98-117. DOI: 10.1007/978-3-319-26961-0_7  0.421
2015 Jha S, Sural S, Atluri V, Vaidya J. Enforcing separation of duty in attribute based access control systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9478: 61-78. DOI: 10.1007/978-3-319-26961-0_5  0.386
2015 Singh MP, Sural S, Atluri V, Vaidya J, Yakub U. Managing multi-dimensional multi-granular security policies using data warehousing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 221-235. DOI: 10.1007/978-3-319-25645-0_15  0.322
2015 Uzun E, Lorenzi D, Atluri V, Vaidya J, Sural S. Migrating from DAC to RBAC Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9149: 69-84. DOI: 10.1007/978-3-319-20810-7_5  0.307
2014 Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P. Security analysis for temporal role based access control Journal of Computer Security. 22: 961-996. DOI: 10.3233/Jcs-140510  0.338
2014 Lu H, Vaidya J, Atluri V. An optimization framework for role mining Journal of Computer Security. 22: 1-31. DOI: 10.3233/Jcs-130484  0.577
2014 Jha S, Sural S, Vaidya J, Atluri V. Temporal RBAC security analysis using logic programming in the presence of administrative policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8880: 129-148.  0.307
2013 Sharma M, Sural S, Vaidya J, Atluri V. AMTRAC: An administrative model for temporal role-based access control Computers and Security. 39: 201-218. DOI: 10.1016/J.Cose.2013.07.005  0.321
2013 Sharma M, Sural S, Atluri V, Vaidya J. An administrative model for spatio-temporal role based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8303: 375-389. DOI: 10.1007/978-3-642-45204-8_28  0.334
2013 Mitra B, Sural S, Atluri V, Vaidya J. Toward mining of temporal roles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7964: 65-80. DOI: 10.1007/978-3-642-39256-6_5  0.397
2013 Badar N, Vaidya J, Atluri V, Shafiq B. Risk based access control using classification Automated Security Management. 79-95. DOI: 10.1007/978-3-319-01433-3_5  0.35
2012 Lu H, Vaidya J, Atluri V, Hong Y. Constraint-aware role mining via extended Boolean matrix decomposition Ieee Transactions On Dependable and Secure Computing. 9: 655-669. DOI: 10.1109/Tdsc.2012.21  0.616
2012 Mehmood D, Shafiq B, Vaidya J, Hong Y, Adam N, Atluri V. Privacy-preserving subgraph discovery Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 161-176. DOI: 10.1007/978-3-642-31540-4_13  0.3
2012 John JC, Sural S, Atluri V, Vaidya JS. Role mining under role-usage cardinality constraint Ifip Advances in Information and Communication Technology. 376: 150-161. DOI: 10.1007/978-3-642-30436-1_13  0.453
2011 Shin H, Atluri V, Cho JS. Efficiently enforcing spatiotemporal access control under uncertain location information Journal of Computer Security. 19: 607-637. DOI: 10.3233/Jcs-2011-0423  0.591
2011 Shin H, Vaidya J, Atluri V. A profile anonymization model for location-based services Journal of Computer Security. 19: 795-833. DOI: 10.3233/Jcs-2010-0416  0.602
2011 Uzun E, Atluri V, Lu H, Vaidya J. An optimization model for the extended role mining problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 76-89. DOI: 10.1007/978-3-642-22348-8_8  0.611
2011 Lu H, Vaidya J, Atluri V, Shin H, Jiang L. Weighted rank-one binary matrix factorization Proceedings of the 11th Siam International Conference On Data Mining, Sdm 2011. 283-294.  0.548
2010 Atluri V, Guo Q, Shin H, Vaidya J. A unified index structure for efficient enforcement of spatiotemporal authorisations International Journal of Information and Computer Security. 4: 118-151. DOI: 10.1504/Ijics.2010.034814  0.553
2010 Qin L, Atluri V. Semantics-aware security policy specification for the semantic web data International Journal of Information and Computer Security. 4: 52-75. DOI: 10.1504/Ijics.2010.031859  0.334
2010 Vaidya J, Atluri V, Shafiq B, Adam N. Privacy-preserving trust verification Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 139-148. DOI: 10.1145/1809842.1809865  0.304
2010 Vaidya J, Atluri V, Guo Q. The Role Mining Problem: A formal perspective Acm Transactions On Information and System Security. 13. DOI: 10.1145/1805974.1805983  0.347
2010 Vaidya J, Atluri V, Warner J, Guo Q. Role engineering via prioritized subset enumeration Ieee Transactions On Dependable and Secure Computing. 7: 300-314. DOI: 10.1109/Tdsc.2008.61  0.587
2010 Shin H, Vaidya J, Atluri V, Choi S. Ensuring privacy and security for LBS through trajectory partitioning Proceedings - Ieee International Conference On Mobile Data Management. 224-226. DOI: 10.1109/MDM.2010.29  0.401
2010 Shin H, Vaidya J, Atluri V. Anonymization models for directional location based service environments Computers and Security. 29: 59-73. DOI: 10.1016/J.Cose.2009.07.006  0.588
2010 Vaidya J, Atluri V, Guo Q, Lu H. Role mining in the presence of noise Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 97-112. DOI: 10.1007/978-3-642-13739-6_7  0.532
2009 Vaidya J, Atluri V, Guo Q, Lu H. Edge-RMP: Minimizing administrative assignments for role-based access control Journal of Computer Security. 17: 211-235. DOI: 10.3233/Jcs-2009-0341  0.595
2009 Hong Y, He X, Vaidya J, Adam N, Atluri V. Effective anonymization of query logs International Conference On Information and Knowledge Management, Proceedings. 1465-1468. DOI: 10.1145/1645953.1646146  0.351
2009 Mondal S, Sural S, Atluri V. Towards formal security analysis of GTRBAC using timed automata Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 33-42. DOI: 10.1145/1542207.1542214  0.354
2009 Lu H, Li Y, Atluri V, Vaidya J. An efficient online auditing approach to limit private data disclosure Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 636-647. DOI: 10.1145/1516360.1516434  0.592
2009 Lu H, Vaidya J, Atluri V, Hong Y. Extended Boolean matrix decomposition Proceedings - Ieee International Conference On Data Mining, Icdm. 317-326. DOI: 10.1109/ICDM.2009.61  0.54
2009 Shin H, Atluri V. Spatiotemporal access control enforcement under uncertain location estimates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5645: 159-174. DOI: 10.1007/978-3-642-03007-9_11  0.342
2008 Atluri V, Shin H, Vaidya J. Efficient security policy enforcement for the mobile environment Journal of Computer Security. 16: 439-475. DOI: 10.3233/Jcs-2008-0329  0.609
2008 Vaidya J, Atluri V, Adam N, Guo Q. Migrating to optimal RBAC with minimal perturbation Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 11-20. DOI: 10.1145/1377836.1377839  0.348
2008 Shin H, Atluri V, Vaidya J. A profile anonymization model for privacy in a personalized location based service environment Proceedings - Ieee International Conference On Mobile Data Management. 73-80. DOI: 10.1109/MDM.2008.33  0.373
2008 Lu H, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: Application to role engineering Proceedings - International Conference On Data Engineering. 297-306. DOI: 10.1109/ICDE.2008.4497438  0.571
2008 Guo Q, Vaidya J, Atluri V. The role hierarchy mining problem: Discovery of optimal role hierarchies Proceedings - Annual Computer Security Applications Conference, Acsac. 237-246. DOI: 10.1109/ACSAC.2008.38  0.338
2008 Atluri V, Shin H. Efficiently enforcing the security and privacy policies in a mobile environment Handbook of Database Security: Applications and Trends. 553-573. DOI: 10.1007/978-0-387-48533-1_23  0.408
2008 Chun SA, Atluri V. Geospatial database security Handbook of Database Security: Applications and Trends. 247-266. DOI: 10.1007/978-0-387-48533-1_11  0.353
2007 Warner J, Atluri V, Mukkamala R, Vaidya J. Using semantics for automatic enforcement of access control policies among dynamic coalitions Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 235-244. DOI: 10.1145/1266840.1266877  0.424
2007 Atluri V, Shin H. Efficient security policy enforcement in a location based service environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 61-76.  0.3
2006 Vaidya J, Atluri V, Warner J. RoleMiner: Mining roles using subset enumeration Proceedings of the Acm Conference On Computer and Communications Security. 144-153. DOI: 10.1145/1180405.1180424  0.353
2006 Mitra P, Pan CC, Liu P, Atluri V. Privacy-preserving semantic interoperation and access control of heterogeneous databases Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 66-77. DOI: 10.1145/1128817.1128831  0.378
2006 Atluri V, Shin H. Efficient enforcement of security policies based on tracking of mobile users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 237-251. DOI: 10.1007/11805588_17  0.614
2006 Mukkamala R, Atluri V, Warner J, Abbadasari R. A distributed coalition service registry for ad-hoc dynamic coalitions: A service-oriented approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 209-223. DOI: 10.1007/11805588_15  0.489
2006 Mukkamala R, Atluri V, Warner J. A distributed service registry for resource sharing among ad-hoc dynamic coalitions Ifip International Federation For Information Processing. 193.  0.32
2006 Mukkamala R, Atluri V, Warner J. A distributed service registry for resource sharing among ad-hoc dynamic coalitions Ifip International Federation For Information Processing. 193.  0.32
2006 Youssef M, Adam NR, Atluri V. Semantically enhanced enforcement of mobile consumer's privacy preferences Proceedings of the Acm Symposium On Applied Computing. 2: 1172-1176.  0.31
2006 Warner J, Atluri V. Inter-instance authorization constraints for secure workflow management Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 190-199.  0.318
2005 Youssef M, Atluri V, Adam NR. Preserving mobile customer privacy: An access control system for moving objects and customer profiles Proceedings - Sixth International Conference On Mobile Data Management, Mdm'05. 67-76. DOI: 10.1145/1071246.1071257  0.39
2005 Atluri V, Warner J. Supporting conditional delegation in secure workflow management systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 49-58. DOI: 10.1145/1063979.1063990  0.319
2005 Warner J, Atluri V, Mukkamala R. An attribute graph based approach to map local access control policies to credential based access control policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3803: 134-147. DOI: 10.1007/11593980_10  0.342
2005 Atluri V, Guo Q. Unified index for mobile object data and authorizations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3679: 80-97. DOI: 10.1007/11555827_6  0.379
2005 Warner J, Atluri V, Mukkamala R. A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions Lecture Notes in Computer Science. 3654: 252-266. DOI: 10.1007/11535706_19  0.597
2004 Atluri V, Chun SA. An authorization model for geospatial data Ieee Transactions On Dependable and Secure Computing. 1: 238-254. DOI: 10.1109/Tdsc.2004.32  0.369
2004 Atluri V, Warner J. Automatic enforcement of access control policies among dynamic coalitions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3347: 369-378.  0.324
2004 Atluri V, Bertino E, Ferrari E, Mazzoleni P. Supporting delegation in secure workflow management systems Ifip Advances in Information and Communication Technology. 142: 190-204.  0.345
2003 Atluri V, Adam N, Gomaa A, Adiwijaya I. Self-manifestation of composite multimedia objects to satisfy security constraints Proceedings of the Acm Symposium On Applied Computing. 927-934.  0.307
2003 Qin L, Atluri V. Concept-level access control for the Semantic Web Proceedings of the Acm Workshop On Xml Security 2003 (in Association With 10th Acm Conference On Computer and Communications Security). 94-103.  0.348
2002 Adam NR, Atluri V, Bertino E, Ferrari E. A content-based authorization model for digital libraries Ieee Transactions On Knowledge and Data Engineering. 14: 296-315. DOI: 10.1109/69.991718  0.375
2001 Adam NR, Atluri V, Adiwijaya I, Banerjee S, Holowczak R. A dynamic manifestation approach for providing universal access to digital library objects Ieee Transactions On Knowledge and Data Engineering. 13: 705-716. DOI: 10.1109/69.940742  0.301
1999 Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems Acm Transactions On Information and System Security. 2: 65-104. DOI: 10.1145/300830.300837  0.488
1997 Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749  0.367
1996 Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034  0.402
1993 Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404  0.302
Show low-probability matches.