What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Vijayalakshmi Atluri
Google Scholar
ORCID:
0000-0003-2068-780X
31
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Performance analysis of dynamic ABAC systems using a queuing theoretic framework.
Gaurav Madkaikar
Karthikeya S. M. Yelisetty
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2024
conf/sec
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems.
Gaurav Madkaikar
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2022
conf/asiaccs
Enabling Attribute-Based Access Control in Linux Kernel.
H. O. Sai Varshith
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2019
journals/compsec
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database.
Mahendra Pratap Singh
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2019
conf/iciss
VisMAP: Visual Mining of Attribute-Based Access Control Policies.
Saptarshi Das
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
Gerhard Rigoll
2019
conf/iciss
Policy Reconciliation and Migration in Attribute Based Access Control.
Gunjan Batra
Vijayalakshmi Atluri
Jaideep Vaidya
Shamik Sural
2018
journals/tifs
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control.
Sadhana Jha
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2017
conf/sec
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart.
David Lorenzi
Jaideep Vaidya
Achyuta Aich
Shamik Sural
Vijayalakshmi Atluri
Joseph Calca
2016
journals/compsec
Mining temporal roles using many-valued concepts.
Barsha Mitra
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2015
conf/sec
Enhancing the Security of Image CAPTCHAs Through Noise Addition.
David Lorenzi
Emre Uzun
Jaideep Vaidya
Shamik Sural
Vijayalakshmi Atluri
2015
conf/iciss
Role Mining in the Presence of Separation of Duty Constraints.
Prasuna Sarana
Arindam Roy
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2015
conf/iciss
Enforcing Separation of Duty in Attribute Based Access Control Systems.
Sadhana Jha
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2014
journals/compsec
Security analysis of temporal RBAC under an administrative model.
Sadhana Jha
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2014
conf/iciss
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies.
Sadhana Jha
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2013
journals/compsec
AMTRAC: An administrative model for temporal role-based access control.
Manisha Sharma
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
2013
conf/iciss
Web Services Based Attacks against Image CAPTCHAs.
David Lorenzi
Jaideep Vaidya
Shamik Sural
Vijayalakshmi Atluri
2013
conf/iciss
An Administrative Model for Spatio-Temporal Role Based Access Control.
Manisha Sharma
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2012
conf/sec
Role Mining under Role-Usage Cardinality Constraint.
John C. John
Shamik Sural
Vijayalakshmi Atluri
Jaideep Vaidya
2012
conf/iciss
Attacking Image Based CAPTCHAs Using Image Recognition Techniques.
David Lorenzi
Jaideep Vaidya
Emre Uzun
Shamik Sural
Vijayalakshmi Atluri
2011
journals/compsec
Security analysis of GTRBAC and its variants using model checking.
Samrat Mondal
Shamik Sural
Vijayalakshmi Atluri
2010
journals/compsec
Anonymization models for directional location based service environments.
Heechang Shin
Jaideep Vaidya
Vijayalakshmi Atluri
2008
conf/acsac
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies.
Qi Guo
Jaideep Vaidya
Vijayalakshmi Atluri
2006
conf/ccs
Privacy-preserving semantic interoperation and access control of heterogeneous databases.
Prasenjit Mitra
Chi-Chun Pan
Peng Liu
Vijayalakshmi Atluri
2006
conf/ccs
RoleMiner: mining roles using subset enumeration.
Jaideep Vaidya
Vijayalakshmi Atluri
Janice Warner
2005
conf/iciss
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Janice Warner
Vijayalakshmi Atluri
Ravi Mukkamala
2005
conf/esorics
Unified Index for Mobile Object Data and Authorizations.
Vijayalakshmi Atluri
Qi Guo
2001
conf/ccs
A Chinese wall security model for decentralized workflow systems.
Vijayalakshmi Atluri
Soon Ae Chun
Pietro Mazzoleni
2000
conf/ccs
An authorization model for temporal data.
Avigdor Gal
Vijayalakshmi Atluri
1996
conf/esorics
An Authorization Model for Workflows.
Vijayalakshmi Atluri
Wei-kuang Huang
1993
conf/sp
Achieving stricter correctness requirements in multilevel secure databases.
Vijayalakshmi Atluri
Elisa Bertino
Sushil Jajodia
1992
conf/sp
Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases.
Sushil Jajodia
Vijayalakshmi Atluri
Coauthors
Achyuta Aich
(1)
Arindam Roy
(1)
Avigdor Gal
(1)
Barsha Mitra
(1)
Chi-Chun Pan
(1)
David Lorenzi
(4)
Elisa Bertino
(1)
Emre Uzun
(2)
Gaurav Madkaikar
(2)
Gerhard Rigoll
(1)
Gunjan Batra
(1)
H. O. Sai Varshith
(1)
Heechang Shin
(1)
Jaideep Vaidya
(22)
Janice Warner
(2)
John C. John
(1)
Joseph Calca
(1)
Karthikeya S. M. Yelisetty
(1)
Mahendra Pratap Singh
(1)
Manisha Sharma
(2)
Peng Liu
(1)
Pietro Mazzoleni
(1)
Prasenjit Mitra
(1)
Prasuna Sarana
(1)
Qi Guo
(2)
Ravi Mukkamala
(1)
Sadhana Jha
(4)
Samrat Mondal
(1)
Saptarshi Das
(1)
Shamik Sural
(20)
Soon Ae Chun
(1)
Sushil Jajodia
(2)
Vijayalakshmi Atluri
(31)
Wei-kuang Huang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to