Cyber Security

  1. Multilevel Security in Database Management Systems, Computers and Security Journal, June 1987 (North Holland), Vol. 6, No. 3, pp. 252-260, (co-author: A. Dwyer, G. Jelatis).
  2. Security Checking in Relational Database Management Systems Augmented with Inference Engines, Computers and Security Journal, December 1987 (North Holland), Vol. 6, No. 6, pp. 479-492.
  3. Multilevel Security Issues in Distributed Database Management Systems, Computers and Security Journal August 1988 (North Holland), Vol. 7, No. 4, (co-author: J. McHugh).
  4. Secure Query Processing Strategies, IEEE Computer, March 1989,Vol. 22, No. 3 (invited paper, co-authors: T. F. Keefe and W. T. Tsai).
  5. SODA - A Secure Object-Oriented Database System, Computers and Security Journal, Vol. 8, October 1989 (co-authors: W. T. Tsai and T. F. Keefe).
  6. Prototyping to Explore MLS/DBMS Design, Computers and Security Journal, May 1989 (Elsevier, formerly North Holland), Vol. 8, No. 3 (co-authors: W. T. Tsai and D. Thomsen).
  7. A Functional View of Multilevel Databases, Computers and Security Journal (Elsevier), Vol. 8, No. 8, December 1989.
  8. Towards the Design of a Secure Data/Knowledge Base Management System, Data and Knowledge Engineering Journal, March 1990, (North Holland), Vol. 5, No. 1.
  9. Security in Object-Oriented Database Systems, Journal of ObjectOriented Programming, March/April 1990, Vol. 2, No. 6. (also reprinted in book on object-oriented database management systems by SIG publishers).
  10. Design of LDV - A Multilevel Secure Database Management System, IEEE Transactions on Knowledge and Data Engineering, June 1990, Vol. 2, No. 2 (co-author: P. Stachour).
  11. SQL Extensions for Security Assertions, Computer Standards and Interfaces Journal, 1990 (North Holland), Vol. 11, No.1, 5-14 (co-author: P. Stachour).
  12. Artificial Intelligence Applications in Database Security, Computer Security Journal, 1990 (Miller Freeman Publishers), Vol. 6, No. 1, (co-authors: W. Tsai, T. Keefe, and D. Thomsen)
  13. Multilevel Secure Object-Oriented Data Model - Issues on Noncomposite Objects, Composite Objects, and Versioning, Journal of Object-Oriented Programming, Volume 4, November/December 1991. (Version of the article reprinted by the MITRE Journal, 1992) (Also reprinted in book on object-oriented database management systems by SIG publishers)
  14. Multilevel Security Issues in Distributed Database Management Systems - II, Computers and Security Journal (Elsevier), Volume 10, No. 8, December 1991.
  15. Multilevel Security Issues in Distributed Database Management - III, Computers and Security (Elsevier), Vol. 11, November 1992 (co-author: H. Rubinovitz).
  16. Design and Implementation of a Distributed Query Processor for a Trusted Distributed Database Management Systems, Journal of Systems and Software, April 1993 (North Holland), Vol. 21, No. 1 (co-author: Harvey Rubinovitz).
  17. Design and Implementation of a Database Inference Controller, Data and Knowledge Engineering Journal, December 1993 (North Holland), Vol. 11, No. 3 (co-authors: W. Ford, M. Collins, J. O'Keeffe); (Article reprinted by the MITRE Journal, 1994).
  18. Integrating Intelligent Database Technology and Trusted Database Technology, Computer Security Journal, 1993 (Miller Freeman Publishers).
  19. Simulation of Join Query Processing Algorithms for a Trust Distributed Database Management System, Information and Software Technology Journal (Chapman and Hall), Vol. 35, No. 5, 1993 (co-author: Harvey Rubinovitz) (version of conference paper published in Simulation Conference, 1991).
  20. Towards Developing a Standard Multilevel Relational Data Model for Representing a Multilevel Universe, Computer Standards and Interfaces Journal (North Holland), Vol. 15, No. 1, 1993 (also published by Computer Standards Interface Journal special issue in 1999 as one of the seminal papers to appear in the journal).
  21. Multilevel Security in Information Retrieval Systems, Information and Management Journal (North Holland) Vol. 24, 1993.
  22. User Role Based Security for Collaborative Computer Systems, Multimedia Review: The Journal of Multimedia Computing (Penton Media publishers), Summer 1993 (co-authors: S. Demurjian and T.C. Ting).
  23. Security Issues for Federated Database Systems, Computers and Security (North Holland), Vol. 13, No. 6, December 1994.
  24. Multilevel Security in Information Retrieval Systems - II, Information and Management Journal (North Holland), Vol. 28, No. 1, 1995.
  25. Security Constraint Processing in a Multilevel Secure Distributed Database Management System, IEEE Transactions on Knowledge and Data Engineering, April 1995 (co-author: W. Ford).
  26. Towards the Design of a Multilevel Secure Object-Oriented Database Management System, Journal of Object-Oriented Programming, June 1995.
  27. MOMT: A Multilevel Object Modeling Technique for designing Secure Database Applications, Journal of Object-Oriented Programming, 1996 (co-authors: D. Marks and P. Sell).
  28. Adaptable Object Request Brokers for Information Survivability for Real-time Command and Control Systems, Distributed Computer Systems, 1999, p. 242 - 245 (co-author: J. Maurer).
  29. Secure Distributed Database Systems, Information Security Journal (Elsevier Science special issue in Database Security), 2001.
  30. Selective and Authentic Third-Party Publication of XML Documents, IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, p. 1263 - 1278, 2004 (co-author: E. Bertino et al). (version also published as MIT Working Paper, 2002)
  31. Secure Sensor Information Management & Mining, IEEE Signal Processing, May 2004.
  32. Security and Privacy for Sensor Databases, Sensor Letters, Inaugural Issue (American Scientific), Vol. 2, No.1, March 2004.
  33. Security and Privacy for Multimedia Database Management Systems, Multimedia Tools (Kluwer), Vol. 33, No. 1, October 2007 (keynote at IEEE Multimedia Software Engineering and Distributed Multimedia 2003).
  34. Privacy-preserving Data Mining: Developments and Directions, Journal of Database Management, (special issue in Database Technologies for National Security), p. 75 - 87, March 2005.
  35. Privacy Constraint Processing in a Privacy-Enhanced Database Management System, Data and Knowledge Engineering Journal, Vo. 55, No. 2 (North Holland), 2005.
  36. Security Standards for the Semantic Web, Computer Standards and Interface Journal (North Holland), March 2005 (version of COMPSAC Conference workshop paper, 2003).
  37. Access Control for Web Data Models and Policy Languages, Invited Paper - Annales des Telecommunications, p. 245, January 2006 (co-author: E. Ferrari et al).
  38. Directions for Security and Privacy for Semantic E-Business Applications, Invited Paper, Communications of ACM, December 2005.
  39. A New Intrusion Detection System using Support Vector Machines and Hierarchical Clustering, Accepted in VLDB Journal, 2005 (co-authors: M. Awad et al; 2007).
  40. A Framework for a Video Analysis Tool for Suspicious Event Detection, Multimedia Tools, Vol. 35 No. 1, October 2007 (co-author: G. Lavee et al).
  41. Standards for Secure Data Sharing Across Organizations, Computer Standards and Interface Journal, Vol. 29, No. 1, January 2007 (co-author: D. Harris et al).
  42. Secure Knowledge Management: Confidentiality, Trust and Privacy, IEEE Transactions on Systems, Man and Cybernetics, May 2006 (co-authors: E. Bertino et al) (based on keynote presented at SKM 2004).
  43. PP-trust-X: A System for Privacy Preserving Trust Negotiation, ACM Transactions on Information and Systems Security, July 2007 (co-author: E. Bertino et al).
  44. Administering the Semantic Web, International Journal of Information Security and Privacy, 2007 (co-author: N. Tsybulnik, A. Ashraful).
  45. Secure Grid Computing, Journal of Computer Science and Network Security, August 2006 (co-author: J. Zhu).
  46. Security for ERP Systems, Information Systems Security Journal, May 2007 (co-author: W. She).
  47. Secure Data Warehousing, Data Warehousing Journal, IDEA Press, 2007 (co-authors: Srinivasan, M. Kantarcioglu).
  48. Secure Scalable P2P Data Grid, Accepted in IEEE Transactions on Dependable and Secure Computing, Accepted January 2008 (co-authors: I. Yen, M. Tu et al).
  49. Design and Implementation of a Framework for Assured Information Sharing Across Organized Boundaries, Journal of Information Security and Privacy, 2008. (co-authors: Y. Harshakumar, L. Khan).
  50. Geospatial RDF and Security, Computer Standards and Interfaces Journal, 2008 (special issue from ICDE conference workshop)
  51. A Scalable Multi-level Feature Extraction Technique to Detect Malicious Executables, Information Systems Frontiers, (Springer Netherlands), Vol. 10, No. 1, Page 33-45, March 2008 (co-authors: M. Masud, L. Khan).
  52. The Applicability of the Perturbation Based Privacy Preserving Data Mining for Real-World Data, Data and Knowledge Engineering (DKE), Vol. 65, No. 1, p.5-21, 2008 Leading Journal (co-authors: L. Liu, M. Kantarcioglu).
  53. A Risk Management Approach to RBAC, Risk and Decision Analysis Journal, 2008 (co-authors: E. Celikel, M. Kantarcioglu, E. Bertino).
  54. Exploiting an Antivirus Interface, Computer Standards & Interfaces, Vol. 31, No. 6, p. 1182-1189, November 2009 (co-authors: K. Hamlen, V. Mohan, M. Masud, L. Khan).
  55. Privacy Preservation in Wireless Sensor Networks: A State-of-the-art Survey, Ad-Hoc Networks Journal, Vol. 7, No. 8, November 2009 (co-authors: L. Na et al).
  56. Design and Implementation of a Secure Social Network System, Computer Systems Science and Engineering, Vol. 24, No. 2, March 2009 (co-authors: R. Layfield et al).
  57. Delegation Model for Web Services, Journal of Web Services Research 2009 (co-authors: W. She, I. Yen).
  58. Relationalization of Provenance Data in Complex RDF Reification Nodes, Special Issue of Electronic Commerce Research Journal on Trust and Privacy Aspects of Electronic Commerce, 2009 (co-authors: S. Sriram et al).
  59. Classification and Novel Class Detection in Concept-Drifting Data Streams under Time Constraints, Accepted and to appear in IEEE Transactions on Knowledge and Data Engineering, 2010 (co-authors: M. Masud, L. Khan, J. Han).
  60. Semantic Web, Data Mining and Security, To appear in IEEE Intelligent Systems Special Issue, 2010 (co-authors: M. Kantarcioglu and L. Khan).
  61. Secure Data Objects Replication in Data Grid, IEEE Transactions on Dependable and Secure Computing, January 2010 (co-authors: Manghui Tu, Peng Li, I-Ling Yen, Bhavani Thuraisingham, and Latifur Khan)
  62. Security Issues for Cloud Computing, Journal of Information Security and Privacy, Accepted 2010 (coauthors: K. Hamlen, L. Khan, M. Kantarcioglu).
  63. Privacy-Preserved Social Network Integration and Analysis for Security Informatics, IEEE Intelligent Systems Special Issue, Vol. 25, No. 5, p. 88 - 90, 2010 (co-author: C. Yang).
  64. Geospatial Resource Description Framework (GRDF) and security constructs, Computer Standards & Interfaces, Vol. 33, No. 1, p. 35-41, 2011 (co-authors: Ashraful Alam, Latifur Khan).
  65. Semantic Web-based Social Network Access Control, Computers and Security, Vol. 30, No. 2 - 3, 2011 (special issue for SACMAT conference) (co-authors: B. Carminati et al).
  66. Adaptive Information Coding for Secure and Reliable Wireless Telesugery Communications, Journale of Mobile Networks and Applications (MONET), Springer online (http://www.springerlink.com/content/r71p755326k68814/), July 2011.
  67. Cyberphysical Systems Security Applied to Telesurgical Robotics, Computer Standards & Interfaces, Vol. 34, No. 1, p. 225-229, January 2012 (co-author: Gregory S. Lee).
  68. Data Security Services, Solutions and Standards for Outsourcing, To appear in Computer Standards and Interfaces Journal, 2012 (co-author: K. Hamlen).
  69. Security-aware Service Composition with Fine-grained Access and Information Flow Control, To appear in IEEE Transactions on Services Computing, 2012 (co-authors: W. She et al).
  70. Database Inference Controller for 3D Motion Capture Database, To appear in Journal of Information Security and Privacy, 2012 (co-author: R. Natarajan et al).
  71. Effective Software Fault Localization using an RBF Neural Network, To appear in IEEE Transactions on Reliability , 2012 (co-authors: W. E. Wong, V. Debroy, R. Golden, X. Xu).
  72. Secure Semantic Computing, To appear in the Semantic Computing Journal 2012 (co-author: K. Hamlen).
  73. Malware Detection in the Cloud, To appear in ACM Transactions on Management Information Systems, 2012 (co-author: M. Masud et al).
  74. Bin-Carver: Automatic Recovery of Binary Executable Files, To appear in the Journal of Digital Investigation (Special issue of the digital forensics research workshop), 2012 (co-authors: Z. Lin et al).
  75. Preventing Private Information Inference Attacks on Social Networks, To appear in IEEE Transactions on Knowledge and Data Engineering, 2012 (co-authors: R. Heatherly, M. Kantarcioglu).
  76. Design and Implementation of a Data Mining System for Malware Detection, Invited paper to appear in the Journal of Design and Process Engineering, 2012 (co-authors: T. Al-Khateeb, M. Masud, K. Hamlen and L. Khan).