default search action
James B. D. Joshi
Person information
- affiliation: University of Pittsburgh, Pennsylvania, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2003
- [b1]James B. D. Joshi:
A generalized temporal role based access control model for developing secure systems. Purdue University, USA, 2003
Journal Articles
- 2024
- [j55]Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li:
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(5): 4309-4323 (2024) - 2023
- [j54]Runhua Xu, Chao Li, James Joshi:
Blockchain-Based Transparency Framework for Privacy Preserving Third-Party Services. IEEE Trans. Dependable Secur. Comput. 20(3): 2302-2313 (2023) - 2022
- [j53]Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute-Based Access Control Policy Extraction From Access Logs. IEEE Trans. Dependable Secur. Comput. 19(4): 2304-2317 (2022) - [j52]Runhua Xu, James Joshi, Chao Li:
NN-EMD: Efficiently Training Neural Networks Using Encrypted Multi-Sourced Datasets. IEEE Trans. Dependable Secur. Comput. 19(4): 2807-2820 (2022) - [j51]Mei-Ling Shyu, Surya Nepal, Valérie Issarny, James Joshi:
Guest Editorial: Special Issue on Services Computing for COVID-19 and Future Pandemics. IEEE Trans. Serv. Comput. 15(3): 1175-1177 (2022) - 2021
- [j50]Runhua Xu, James Joshi, Prashant Krishnamurthy:
An Integrated Privacy Preserving Attribute-Based Access Control Framework Supporting Secure Deduplication. IEEE Trans. Dependable Secur. Comput. 18(2): 706-721 (2021) - 2020
- [j49]Nuray Baltaci Akhuseyinoglu, James Joshi:
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. Comput. Secur. 96: 101802 (2020) - [j48]Runhua Xu, James Joshi:
Trustworthy and Transparent Third-party Authority. ACM Trans. Internet Techn. 20(4): 31:1-31:23 (2020) - [j47]James Joshi:
Editorial. IEEE Trans. Serv. Comput. 13(1): 1-2 (2020) - 2019
- [j46]Nathalie Baracaldo, Balaji Palanisamy, James Joshi:
G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework. IEEE Trans. Dependable Secur. Comput. 16(1): 84-98 (2019) - [j45]Schahram Dustdar, Surya Nepal, James Joshi:
Introduction to the Special Section on Advances in Internet-based Collaborative Technologies. ACM Trans. Internet Techn. 19(3) (2019) - [j44]James Joshi:
Editorial. IEEE Trans. Serv. Comput. 12(1): 1-3 (2019) - 2018
- [j43]Lei Jin, Chao Li, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. Comput. Secur. 78: 212-230 (2018) - [j42]James Joshi:
Front Cover. Computer 51(11): 1- (2018) - 2017
- [j41]James Joshi:
Editorial: A Message from the New Editor-in-Chief. IEEE Trans. Serv. Comput. 10(1): 3-4 (2017) - 2016
- [j40]Lei Jin, Xuelian Long, Ke Zhang, Yu-Ru Lin, James B. D. Joshi:
Characterizing users' check-in activities using their scores in a location-based social network. Multim. Syst. 22(1): 87-98 (2016) - 2015
- [j39]Jianfeng Lu, James B. D. Joshi, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. Comput. Secur. 48: 116-130 (2015) - [j38]Mei-Ling Shyu, James Joshi, Qiong Liu:
Guest Editors' Introduction. Int. J. Semantic Comput. 9(2): 139-142 (2015) - 2014
- [j37]Lakshmish Ramaswamy, Barbara Carminati, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis:
Editorial. Comput. Secur. 41: 1-2 (2014) - [j36]Youna Jung, James B. D. Joshi:
CPBAC: Property-based access control model for secure cooperation in online social networks. Comput. Secur. 41: 19-39 (2014) - [j35]James Joshi, Calton Pu:
Welcome Message from the Editors-in-Chief. EAI Endorsed Trans. Collab. Comput. 1(1): e1 (2014) - [j34]Barbara Carminati, Lakshmish Ramaswamy, Anna Cinzia Squicciarini, James Joshi, Calton Pu:
Preface. Int. J. Cooperative Inf. Syst. 23(2) (2014) - [j33]Chengcui Zhang, Elisa Bertino, Bhavani Thuraisingham, James B. D. Joshi:
Guest editorial: Information reuse, integration, and reusable systems. Inf. Syst. Frontiers 16(5): 749-752 (2014) - [j32]Lakshmish Ramaswamy, Barbara Carminati, James B. D. Joshi, Calton Pu:
Editorial: Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2012). Mob. Networks Appl. 19(5): 634 (2014) - 2013
- [j31]Lei Jin, James B. D. Joshi, Mohd Anwar:
Mutual-friend based attacks in social network systems. Comput. Secur. 37: 15-30 (2013) - [j30]Nathalie Baracaldo, James Joshi:
An adaptive risk management and access control framework to mitigate insider threats. Comput. Secur. 39: 237-254 (2013) - [j29]Saman Taghavi Zargar, James Joshi, David Tipper:
A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks. IEEE Commun. Surv. Tutorials 15(4): 2046-2069 (2013) - [j28]James Caverlee, Calton Pu, Dimitrios Georgakopoulos, James Joshi:
Editorial for CollaborateCom 2011 Special Issue. Mob. Networks Appl. 18(2): 235-236 (2013) - [j27]Amirreza Masoumzadeh, James Joshi:
Top Location Anonymization for Geosocial Network Datasets. Trans. Data Priv. 6(1): 107-126 (2013) - 2012
- [j26]Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B. D. Joshi:
A survey of security issue in multi-agent systems. Artif. Intell. Rev. 37(3): 239-260 (2012) - [j25]Youna Jung, James B. D. Joshi:
CRiBAC: Community-centric role interaction based access control model. Comput. Secur. 31(4): 497-523 (2012) - [j24]Hassan Takabi, James B. D. Joshi:
Semantic-based policy management for cloud computing environments. Int. J. Cloud Comput. 1(2/3): 119-144 (2012) - [j23]James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 325-326 (2012) - [j22]Weisong Shi, James Joshi, Tao Zhang, Eun K. Park, Juan Quemada:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(3): 376-377 (2012) - [j21]Songqing Chen, Le Gruenwald, James Joshi, Karl Aberer:
ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mob. Networks Appl. 17(4): 506-507 (2012) - [j20]Amirreza Masoumzadeh, James Joshi:
Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks. IEEE Trans. Dependable Secur. Comput. 9(6): 877-889 (2012) - 2011
- [j19]Dimitris Gritzalis, James Joshi:
Editorial. Comput. Secur. 30(2-3): 89-90 (2011) - [j18]Lei Jin, Hassan Takabi, James B. D. Joshi:
Analysing security and privacy issues of using e-mail address as identity. Int. J. Inf. Priv. Secur. Integr. 1(1): 34-58 (2011) - [j17]Amirreza Masoumzadeh, James Joshi:
Ontology-based access control for social network systems. Int. J. Inf. Priv. Secur. Integr. 1(1): 59-78 (2011) - [j16]Mehmet Kaya, James B. D. Joshi, Mei-Ling Shyu:
Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration. J. Inf. Knowl. Manag. 10(3) (2011) - [j15]Xuelian Long, James Joshi:
BaRMS: A Bayesian Reputation Management Approach for P2P Systems. J. Inf. Knowl. Manag. 10(3): 273-283 (2011) - [j14]James Joshi, Barbara Carminati:
Guest Editorial SACMAT 2009 and 2010. ACM Trans. Inf. Syst. Secur. 14(3): 22:1-22:2 (2011) - 2010
- [j13]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
Security and Privacy Challenges in Cloud Computing Environments. IEEE Secur. Priv. 8(6): 24-31 (2010) - 2009
- [j12]Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar:
IPv6 Security Challenges. Computer 42(2): 36-42 (2009) - 2008
- [j11]James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang:
Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): 2:1-2:39 (2008) - 2005
- [j10]James Joshi, Elisa Bertino, Arif Ghafoor:
An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. IEEE Trans. Dependable Secur. Comput. 2(2): 157-175 (2005) - [j9]Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi:
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(2): 187-227 (2005) - [j8]Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi:
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(4): 388-423 (2005) - [j7]James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor:
A Generalized Temporal Role-Based Access Control Model. IEEE Trans. Knowl. Data Eng. 17(1): 4-23 (2005) - [j6]Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor:
Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Trans. Knowl. Data Eng. 17(11): 1557-1577 (2005) - 2004
- [j5]Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi:
XML-Based Specification for Web Services Document Security. Computer 37(4): 41-49 (2004) - [j4]James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor:
Access-Control Language for Multidomain Environments. IEEE Internet Comput. 8(6): 40-50 (2004) - 2002
- [j3]James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor:
A model for secure multimedia document database system in a distributed environment. IEEE Trans. Multim. 4(2): 215-234 (2002) - 2001
- [j2]James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford:
Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001) - [j1]James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford:
Digital Government Security Infrastructure Design Challenges. Computer 34(2): 66-72 (2001)
Conference and Workshop Papers
- 2023
- [c92]Galen Harrison, Przemyslaw J. Porebski, Jiangzhuo Chen, Mandy L. Wilson, Henning S. Mortveit, Parantapa Bhattacharya, Dawen Xie, Stefan Hoops, Anil Vullikanti, Li Xiong, James Joshi, Madhav V. Marathe:
Synthetic Information and Digital Twins for Pandemic Science: Challenges and Opportunities. TPS-ISA 2023: 23-33 - 2021
- [c91]Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig:
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data. AISec@CCS 2021: 181-192 - [c90]Nigamanth Sridhar, Li Yang, James Joshi, Victor Piotrowski:
Cybersecurity Education in the Age of Artificial Intelligence. SIGCSE 2021: 1365 - 2020
- [c89]Runhua Xu, James Joshi:
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. TPS-ISA 2020: 226-235 - 2019
- [c88]Runhua Xu, James B. D. Joshi, Chao Li:
CryptoNN: Training Neural Networks over Encrypted Data. ICDCS 2019: 1199-1209 - [c87]Maryam Aldairi, Leila Karimi, James Joshi:
A Trust Aware Unsupervised Learning Approach for Insider Threat Detection. IRI 2019: 89-98 - 2018
- [c86]Leila Karimi, James Joshi:
An Unsupervised Learning Based Approach for Mining Attribute Based Access Control Policies. IEEE BigData 2018: 1427-1436 - [c85]LeRoy Carr III, Anthony Newtson, James Joshi:
Towards Modernizing the Future of American Voting. CIC 2018: 130-135 - [c84]Runhua Xu, Balaji Palanisamy, James Joshi:
QueryGuard: Privacy-Preserving Latency-Aware Query Optimization for Edge Computing. TrustCom/BigDataSE 2018: 1097-1106 - 2017
- [c83]Chao Li, Balaji Palanisamy, James Joshi:
Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. BigData Congress 2017: 49-56 - [c82]Nuray Baltaci Akhuseyinoglu, James Joshi:
A Risk-Aware Access Control Framework for Cyber-Physical Systems. CIC 2017: 349-358 - [c81]Leila Karimi, James Joshi:
Multi-Owner Multi-Stakeholder Access Control Model for a Healthcare Environment. CIC 2017: 359-368 - [c80]Maryam Karimi, Prashant Krishnamurthy, James Joshi, David Tipper:
Mining Historical Data towards Interference Management in Wireless SDNs. Q2SWinet@MSWiM 2017: 81-88 - 2016
- [c79]Runhua Xu, James B. D. Joshi:
An Integrated Privacy Preserving Attribute Based Access Control Framework. CLOUD 2016: 68-76 - [c78]Runhua Xu, James B. D. Joshi:
Enabling Attribute Based Encryption as an Internet Service. CIC 2016: 417-425 - [c77]Yue Su, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, James Joshi:
Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake. CIC 2016: 495-499 - [c76]Leila Karimi, Balaji Palanisamy, James Joshi:
A Dynamic Privacy Aware Access Control Model for Location Based Services. CIC 2016: 554-557 - [c75]Chao Li, Balaji Palanisamy, James Joshi:
SocialMix: Supporting Privacy-Aware Trusted Social Networking Services. ICWS 2016: 115-122 - 2014
- [c74]Lei Jin, Balaji Palanisamy, James B. D. Joshi:
POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks. CCS 2014: 1439-1441 - [c73]Saman Taghavi Zargar, James B. D. Joshi, David Tipper:
DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring. IRI 2014: 120-129 - [c72]Balaji Palanisamy, Sheldon Sensenig, James B. D. Joshi, Rose Constantino:
LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. IRI 2014: 138-146 - [c71]Nathalie Baracaldo, Balaji Palanisamy, James B. D. Joshi:
Geo-Social-RBAC: A Location-Based Socially Aware Access Control Framework. NSS 2014: 501-509 - [c70]Lei Jin, Hassan Takabi, Xuelian Long, James B. D. Joshi:
Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links. WPES 2014: 59-68 - 2013
- [c69]Xuelian Long, James Joshi:
A HITS-based POI recommendation algorithm for location-based social networks. ASONAM 2013: 642-647 - [c68]Amirreza Masoumzadeh, James Joshi:
Privacy settings in social networking systems: what you cannot control. AsiaCCS 2013: 149-154 - [c67]Xuelian Long, Lei Jin, James Joshi:
Understanding venue popularity in Foursquare. CollaborateCom 2013: 409-418 - [c66]Xuelian Long, Lei Jin, James Joshi:
Towards understanding traveler behavior in Location-based Social Networks. GLOBECOM 2013: 3182-3187 - [c65]Nathalie Baracaldo, James Joshi:
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. SACMAT 2013: 213-224 - 2012
- [c64]Lei Jin, Xuelian Long, James B. D. Joshi:
Towards understanding residential privacy by analyzing users' activities in foursquare. BADGERS@CCS 2012: 25-32 - [c63]Barbara Carminati, Lakshmish Ramaswamy, Calton Pu, James Joshi:
Preface. CollaborateCom 2012 - [c62]Youna Jung, Minsoo Kim, James B. D. Joshi:
Towards secure cooperation in online social networks. CollaborateCom 2012: 80-88 - [c61]Hassan Takabi, James B. D. Joshi:
Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. HICSS 2012: 5500-5508 - [c60]Xuelian Long, Lei Jin, James Joshi:
Exploring trajectory-driven local geographic topics in foursquare. UbiComp 2012: 927-934 - [c59]Lei Jin, Xuelian Long, James B. D. Joshi, Mohd Anwar:
Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems. IRI 2012: 712-717 - [c58]Nathalie Baracaldo, James Joshi:
A trust-and-risk aware RBAC framework: tackling insider threat. SACMAT 2012: 167-176 - 2011
- [c57]Lei Jin, Hassan Takabi, James B. D. Joshi:
Towards active detection of identity clone attacks on online social networks. CODASPY 2011: 27-38 - [c56]Saman Taghavi Zargar, Hassan Takabi, James B. D. Joshi:
DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. CollaborateCom 2011: 332-341 - [c55]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach to mitigate rerouting attacks. CollaborateCom 2011: 520-523 - [c54]Amirreza Masoumzadeh, James B. D. Joshi:
Anonymizing geo-social network datasets. SPRINGL 2011: 25-32 - [c53]Reda Alhajj, James B. D. Joshi, Mei-Ling Shyu:
Message from program co-chairs. IRI 2011 - [c52]Youna Jung, Minsoo Kim, James B. D. Joshi:
DRiBAC: Fine-grained dynamic role interaction access control using ontology. IRI 2011: 88-93 - [c51]Nathalie Baracaldo, Amirreza Masoumzadeh, James Joshi:
A secure, constraint-aware role-based access control interoperation framework. NSS 2011: 200-207 - [c50]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
A trust-based approach against IP-spoofing attacks. PST 2011: 63-70 - [c49]Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi:
Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey. TrustCom 2011: 556-563 - [c48]Amirreza Masoumzadeh, James Joshi:
An Alternative Approach to k-Anonymity for Location-Based Services. ANT/MobiWIS 2011: 522-530 - 2010
- [c47]Karl Aberer, James Joshi:
Message from the general chairs. CollaborateCom 2010: 1-2 - [c46]Amirreza Masoumzadeh, James Joshi:
Preserving structural properties in anonymization of social networks. CollaborateCom 2010: 1-10 - [c45]Saman Taghavi Zargar, James B. D. Joshi:
A collaborative approach to facilitate intrusion detection and response against DDoS attacks. CollaborateCom 2010: 1-8 - [c44]Hassan Takabi, James B. D. Joshi, Gail-Joon Ahn:
SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments. COMPSAC Workshops 2010: 393-398 - [c43]Yue Zhang, James B. D. Joshi:
Role-based domain discovery in decentralized secure interoperations. CTS 2010: 84-93 - [c42]Yanhui Guo, James B. D. Joshi:
Topic-based personalized recommendation for collaborative tagging system. HT 2010: 61-66 - [c41]Xuelian Long, James Joshi:
Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS. ICC 2010: 1-6 - [c40]Yue Zhang, James B. D. Joshi:
Understanding Access Control Challenges in Loosely-Coupled Multidomain Environments. ICEIS (3) 2010: 356-361 - [c39]Reda Alhajj, Shu-Ching Chen, Gongzhu Hu, James B. D. Joshi, Gordon K. Lee, Stuart Harvey Rubin, Mei-Ling Shyu, Lotfi A. Zadeh:
Panel title: Critical need for funding of basic and applied research in large-scale computing. IRI 2010: 1 - [c38]Reda Alhajj, James B. D. Joshi, Mei-Ling Shyu:
Message from Program Co-Chairs. IRI 2010: 1 - [c37]Xuelian Long, James Joshi:
BaRMS: A Bayesian Reputation Management approach for P2P systems. IRI 2010: 147-152 - [c36]Hassan Takabi, James B. D. Joshi:
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. SACMAT 2010: 55-64 - [c35]Amirreza Masoumzadeh, James B. D. Joshi:
OSNAC: An Ontology-based Access Control Model for Social Networking Systems. SocialCom/PASSAT 2010: 751-759 - [c34]Lei Jin, Hassan Takabi, James B. D. Joshi:
Security and Privacy Risks of Using E-mail Address as an Identity. SocialCom/PASSAT 2010: 906-913 - 2009
- [c33]Hassan Takabi, James B. D. Joshi, Hassan A. Karimi:
A collaborative k-anonymity approach for location privacy in location-based services. CollaborateCom 2009: 1-9 - [c32]Amirreza Masoumzadeh, James Joshi, Hassan A. Karimi:
LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. GIS 2009: 464-467 - [c31]Saman Taghavi Zargar, M. Amir Moulavi, Rajkumar Buyya, Mahmoud Naghibzadeh, James B. D. Joshi:
RRNA: reliable soft real-time network aware grid scheduling algorithm using round trip time. SpringSim 2009 - [c30]Hassan Takabi, Minsoo Kim, James B. D. Joshi, Michael B. Spring:
An architecture for specification and enforcement of temporal access control constraints using OWL. SWS 2009: 21-28 - 2008
- [c29]Minsoo Kim, James B. D. Joshi, Minkoo Kim:
Access Control for Cooperation Systems Based on Group Situation. CollaborateCom 2008: 11-23 - [c28]Youna Jung, Amirreza Masoumzadeh, James B. D. Joshi, Minkoo Kim:
RiBAC: Role Interaction Based Access Control Model for Community Computing. CollaborateCom 2008: 304-321 - [c27]Michael Jiang, James Joshi:
Message from the IWSSE 2008 Workshop Organizers. COMPSAC 2008: 935 - [c26]Michael Jiang, James Joshi:
IWSSE 2008 Workshop Organization. COMPSAC 2008: 936 - [c25]Yue Zhang, James B. D. Joshi:
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. EUC (2) 2008: 264-271 - [c24]Amirreza Masoumzadeh, James B. D. Joshi:
PuRBAC: Purpose-Aware Role-Based Access Control. OTM Conferences (2) 2008: 1104-1121 - [c23]Yue Zhang, James B. D. Joshi:
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. SACMAT 2008: 83-92 - [c22]Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi:
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. SUTC 2008: 249-255 - 2007
- [c21]Yue Zhang, James B. D. Joshi:
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. IAS 2007: 149-154 - [c20]Yue Zhang, James B. D. Joshi:
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. CollaborateCom 2007: 25-32 - [c19]Kai Ouyang, James B. D. Joshi:
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. IPCCC 2007: 467-474 - [c18]Yue Zhang, James B. D. Joshi:
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. IRI 2007: 196-202 - 2006
- [c17]Michael Chuang, Suronapee Phoomvuthisarn, James B. D. Joshi:
An Integrated Framework for Trust-Based Access Control for Open Systems. CollaborateCom 2006 - [c16]Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi:
A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193 - [c15]Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. iTrust 2006: 33-47 - [c14]James B. D. Joshi, Elisa Bertino:
Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90 - [c13]Siqing Du, James B. D. Joshi:
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. SACMAT 2006: 228-236 - 2005
- [c12]Suroop Mohan Chandran, James B. D. Joshi:
Towards administration of a hybrid role hierarchy. IRI 2005: 500-505 - [c11]Suroop Mohan Chandran, James B. D. Joshi:
LoT-RBAC: A Location and Time-Based RBAC Model. WISE 2005: 361-375 - [c10]Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor:
A Role-Based Access Control Policy Verification Framework for Real-Time Systems. WORDS 2005: 13-20 - [c9]Smithi Piromruen, James B. D. Joshi:
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments. WORDS 2005: 36-48 - 2004
- [c8]Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor:
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. SACMAT 2004: 78-86 - [c7]Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 - 2003
- [c6]Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor:
Access Control in Dynamic XML-Based Web-Services with X-RBAC. ICWS 2003: 243-249 - [c5]James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino:
Dependencies and separation of duty constraints in GTRBAC. SACMAT 2003: 51-64 - 2002
- [c4]James Joshi, Elisa Bertino, Arif Ghafoor:
Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. COMPSAC 2002: 951-956 - [c3]James Joshi, Elisa Bertino, Arif Ghafoor:
Temporal hierarchies and inheritance semantics for GTRBAC. SACMAT 2002: 74-83 - 2000
- [c2]James Joshi, Arif Ghafoor:
A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents. IEEE International Conference on Multimedia and Expo (I) 2000: 533-536 - 1998
- [c1]Sahra Sedigh, James Joshi, Ahmed R. Bashandy, Arif Ghafoor:
Evaluation of Filtering Mechanisms for MPEG Video Communications. SRDS 1998: 449-454
Parts in Books or Collections
- 2002
- [p1]James B. D. Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford:
Security and Privacy Challenges of a Digital Government. Advances in Digital Government 2002: 121-136
Editorship
- 2019
- [e11]James Joshi, Surya Nepal, Qi Zhang, Liang-Jie Zhang:
Blockchain - ICBC 2019 - Second International Conference, Held as Part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019, Proceedings. Lecture Notes in Computer Science 11521, Springer 2019, ISBN 978-3-030-23403-4 [contents] - 2016
- [e10]James Joshi, George Karypis, Ling Liu, Xiaohua Hu, Ronay Ak, Yinglong Xia, Weijia Xu, Aki-Hiro Sato, Sudarsan Rachuri, Lyle H. Ungar, Philip S. Yu, Rama Govindaraju, Toyotaro Suzumura:
2016 IEEE International Conference on Big Data (IEEE BigData 2016), Washington DC, USA, December 5-8, 2016. IEEE Computer Society 2016, ISBN 978-1-4673-9005-7 [contents] - 2014
- [e9]James Joshi, Elisa Bertino, Bhavani Thuraisingham, Ling Liu:
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, IRI 2014, Redwood City, CA, USA, August 13-15, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5880-1 [contents] - 2012
- [e8]Calton Pu, James Joshi, Surya Nepal:
8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012. ICST / IEEE 2012, ISBN 978-1-4673-2740-4 [contents] - [e7]Chengcui Zhang, James Joshi, Elisa Bertino, Bhavani Thuraisingham:
IEEE 13th International Conference on Information Reuse & Integration, IRI 2012, Las Vegas, NV, USA, August 8-10, 2012. IEEE 2012, ISBN 978-1-4673-2282-9 [contents] - 2011
- [e6]Dimitrios Georgakopoulos, James B. D. Joshi:
7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011. ICST / IEEE 2011, ISBN 978-1-4673-0683-6 [contents] - 2010
- [e5]Karl Aberer, James Joshi:
The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010. ICST / IEEE 2010, ISBN 978-963-9995-24-6 [contents] - [e4]James B. D. Joshi, Barbara Carminati:
15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings. ACM 2010, ISBN 978-1-4503-0049-0 [contents] - 2009
- [e3]Elisa Bertino, James B. D. Joshi:
Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 10, Springer / ICST 2009, ISBN 978-3-642-03353-7 [contents] - [e2]James B. D. Joshi, Tao Zhang:
The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009. ICST / IEEE 2009, ISBN 978-963-9799-76-9 [contents] - [e1]Barbara Carminati, James Joshi:
14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings. ACM 2009, ISBN 978-1-60558-537-6 [contents]
Reference Works
- 2018
- [r10]Yue Zhang, James B. D. Joshi:
Administration Model for RBAC. Encyclopedia of Database Systems (2nd ed.) 2018 - [r9]Yue Zhang, James B. D. Joshi:
ANSI/INCITS RBAC Standard. Encyclopedia of Database Systems (2nd ed.) 2018 - [r8]Yue Zhang, James B. D. Joshi:
GEO-RBAC Model. Encyclopedia of Database Systems (2nd ed.) 2018 - [r7]Yue Zhang, James B. D. Joshi:
Role-Based Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - [r6]Yue Zhang, James B. D. Joshi:
Temporal Access Control. Encyclopedia of Database Systems (2nd ed.) 2018 - 2009
- [r5]Yue Zhang, James B. D. Joshi:
Administration Model for RBAC. Encyclopedia of Database Systems 2009: 58 - [r4]Yue Zhang, James B. D. Joshi:
ANSI/INCITS RBAC Standard. Encyclopedia of Database Systems 2009: 91-92 - [r3]Yue Zhang, James B. D. Joshi:
GEO-RBAC Model. Encyclopedia of Database Systems 2009: 1244-1245 - [r2]Yue Zhang, James B. D. Joshi:
Role Based Access Control. Encyclopedia of Database Systems 2009: 2447-2452 - [r1]Yue Zhang, James B. D. Joshi:
Temporal Access Control. Encyclopedia of Database Systems 2009: 2920-2924
Informal and Other Publications
- 2021
- [i8]Runhua Xu, Chao Li, James Joshi:
T3AB: Transparent and Trustworthy Third-party Authority using Blockchain. CoRR abs/2102.01249 (2021) - [i7]Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig:
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data. CoRR abs/2103.03918 (2021) - [i6]Leila Karimi, Mai Abdelhakim, James Joshi:
Adaptive ABAC Policy Learning: A Reinforcement Learning Approach. CoRR abs/2105.08587 (2021) - [i5]Runhua Xu, Nathalie Baracaldo, James Joshi:
Privacy-Preserving Machine Learning: Methods, Challenges and Directions. CoRR abs/2108.04417 (2021) - 2020
- [i4]Leila Karimi, Maryam Aldairi, James Joshi, Mai Abdelhakim:
An Automatic Attribute Based Access Control Policy Extraction from Access Logs. CoRR abs/2003.07270 (2020) - [i3]Runhua Xu, James Joshi:
Revisiting Secure Computation Using Functional Encryption: Opportunities and Research Directions. CoRR abs/2011.06191 (2020) - [i2]Runhua Xu, James Joshi, Chao Li:
NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-sourced Datasets. CoRR abs/2012.10547 (2020) - 2019
- [i1]Runhua Xu, James B. D. Joshi, Chao Li:
CryptoNN: Training Neural Networks over Encrypted Data. CoRR abs/1904.07303 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint