PUBLICATIONS& PRESENTATION

Book

  1. James B. D. Joshi et al. "Network Security: Know It All," May, 2008 (Contributor).
  2. Co-Editor of Book titled: “Information Assurance: Survivability and Security in Networked Systems,”, Published in 2007 by Elsevier, Inc. Editors: Yi Qian, James Joshi, David Tipper, Prashant Krishnamurthy.
  3. James B. D. Joshi, “A Generalized Temporal Role Based Access Control Model for Developing Secure Applications”, PhD Thesis, Purdue University, August, 2003.

Book Chapter

  1. H. Takabi, S.T. Zargar, and J. Joshi, "Mobile Cloud Computing and Its Security, Privacy and Trust Management Challenges," in Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, D. B. Rawat, B.B. Bista, and G. Yan Ed. IGI Global, 2014. doi:10.4018/978-1-4666-4691-9, 2013
  2. Hassan Takabi and James B. D. Joshi. Policy Management in Cloud Computing Environment: Challenges and Approaches. in Security Engineering for Cloud Computing: Approaches and Tools, Editors: D. G. Rosado, D. Mellado, E. Fernandez-Medina, and M. Piattini, IGI Global, September 2012.
  3. Hassan Takabi and James B. D. Joshi, Gail-Joon Ahn, Security and Privacy in Cloud Computing: Towards a Comprehensive FrameworkService-Oriented Methodology and Technologies for Cloud Computing", in Principles, Methods and Service-oriented Approaches for Cloud Computing, Editors: X. Yang and L. Liu, IGI Global, January 2013.
  4. Mohd Anwa,r Amirreza Masoumzadeh and James Joshi, “Security and Privacy in Location Based Services,” Location Based Services; Advanced Location-Based Technologies and Services, H. A. Karimi, Ed. CRC Press, 2013, pp. 235–264.
  5. Yue Zhang, James Joshi, “Access Control and Trust Management for Emerging Multidomain Environments,” in Annals of Emerging Research in Information Assurance, Security and Privacy Services, Editors: S. Upadhyaya, R. O. Rao 2009.
  6. Yue Zhang, James Joshi, “Temporal Access Control,” Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer, 2009.
  7. Yue Zhang, James Joshi, “Role based Access Control”, Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu Springer, 2009.
  8. Yue Zhang, James B. D. Joshi, “ANSI/INCITS RBAC Standard.” Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer, 2009
  9. Yue Zhang, James B. D. Joshi, “GEO-RBAC Model,” Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer, 2009
  10. Yue Zhang, James B. D. Joshi, “Administration Model for RBAC,” Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer, 2009
  11. James B. D. Joshi, Mei-Ling Shyu, Shu-Ching Chen, Walid Aref, Arif Ghafoor, "A Multimedia-Based Threat Management and Information Security Framework," in Multimedia Technologies: Concepts, Methodologies, Tools, and Applications (3 Volumes) Edited By: Mahbubur Rahman Syed, Minnesota State University, Mankato, USA, June, 2008
  12. James B. D. Joshi, Siqing Du, Saubhagya R Joshi, “A Trust Based Access Control Management Framework for a Secure Grid Environment” in Book titled: Security in Distributed, Grid, and Pervasive Computing, Edited by Dr. Yang Xiao, to be published by Auerbach Publications, CRC Press 2007.
  13. James B. D. Joshi, S. R. Joshi, and S. M. Chandran, "Information Security Issues and Challenges," in Encyclopedia of Digital Government, 2006.
  14. James B. D. Joshi, S. R. Joshi, and S. M. Chandran, "Identity Management and Privacy Issues," in Encyclopedia of Digital Government, 2006.
  15. James B. D. Joshi, S. M. Chandran, A. Ghafoor, and W. G. Aref, "Survivability Issues and Challenges," in Encyclopedia of Digital Government, 2006.
  16. James B.D. Joshi, Mei-Ling Shyu, Shu-Ching Chen, Walid Aref, Arif Ghafoor, “A Multimedia-Based Threat Management and Information Security Framework,” Web and Information Security (editors: Elena Ferrari, Bhavani Thuraisingham), IDEA Group, 2005.
  17. James B. D. Joshi, Arif Ghafoor, Walid Aref, Eugene H. Spafford, “Digital Government Security and Privacy Challenges,” William J. McIver, Jr. & Ahmed K. Elmagarmid (eds) Advances in Digital Government: Technology, Human Factors, & Policy. Boston, Kluwer, 2002, Chapter 7, pp. 121-136.

Special Issue Guest Editor

  1. Lakshmish Ramaswamy, Barbara Carminati, Lujo Bauer, Dongwan Shin, James Joshi, Calton Pu, Dimitris Gritzalis: Editorial. Computers & Security 41: 1-2 (2014)
  2. James Caverlee, Calton Pu, Dimitrios Georgakopoulos, James Joshi: Editorial for CollaborateCom 2011 Special Issue. MONET 18 (2): 235-236 (2013)
  3. Weisong Shi, James Joshi, Tao Zhang, Eun K. Park, Juan Quemada: ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". MONET 17(3): 376-377 (2012)
  4. James Joshi, Elisa Bertino, Calton Pu, Heri Ramampiaro: ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". MONET 17(3): 325-326 (2012)
  5. Songqing Chen, Le Gruenwald, James Joshi, Karl Aberer: ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Collaborative Computing: Networking, Applications and Worksharing”. Mobile Networks and Applications, 17 (4). pp. 506-507; (2012)
  6. James Joshi, Barbara Carminati: Guest Editorial SACMAT 2009 and 2010. ACM Transactions on Information Systems Security, 14(3): 22 (2011).
  7. Dimitris Gritzalis and James Joshi (Editors); Special Issue on Access Control Methods and Technologies, Computer and Security, Volume 30, Issues 2–3, Pages 89-170 (March–May 2011)
  8. Mehmet Kaya, James B. D. Joshi, Mei-Ling Shyu: Guest Editorial - Introduction to the Special Issue on Information Reuse and Integration. JIKM 10(3): (2011)

Refereed Journal /Articles

  1. Nathalie Baracaldo, James Joshi: An adaptive risk management and access control framework to mitigate insider threats. Computers & Security 39: 237-254 (2013)
  2. Youna Jung, James B. D. Joshi: CPBAC: Property-based access control model for secure cooperation in online social networks. Computers & Security 41: 19-39 (2014)
  3. S.T. Zargar, J. Joshi, and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks," IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-24. (Early Access-online Mar. 28, 2013)
  4. Lei Jin, James B. D. Joshi, Mohd Anwar; Mutual-friend based attacks in social network systems. Computers & Security 37: 15-30 (2013) (Online available, September 2013 pub date)
  5. Amirreza Masoumzadeh and James Joshi, “Top Location Anonymization for Geosocial Network Datasets,” Transactions on Data Privacy, vol. 6, no. 1, pp. 107-126, 2013.
  6. Hassan Takabi, James B. D. Joshi, “Semantic-based Policy Management for Cloud Computing Environments,” International Journal of Cloud Comuting 1(2/3): 119-144 (2012)
  7. Amirreza Masoumzadeh and James Joshi, “Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks,” IEEE Transactions on Secure and Dependable Computing 9(6): 877-889 (2012)
  8. Youna Jung and James B.D. Joshi, “CRiBAC: Community based Role interaction Access Control Model”, Computers & Security, Elsevier, 31(4): 497-523 (2012)
  9. Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B.D Joshi, “A Survey of Security for Multiagent Systems”, Artificial Intelligence Review, Springer Netherlands, Doi: 10.1007/s10462-011-9228-8
  10. Lei Jin, Hassan Takabi, James B. D. Joshi, “Analyzing Security and Privacy Issues of Using E-mail Address as Identity” International Journal Information Privacy, Security and Integrity, Vol. 1, No. 1, 2011
  11. Amirreza Masoumzadeh and James Joshi, "Ontology-Based Access Control for Social Network Systems," , International Journal Information Privacy, Security and Integrity, Vol. 1, No. 1, 2011
  12. Xuelian Long, James Joshi, "BaRMS: A Bayesian Reputation Management Approach for P2P Systems, Journal of Information & Knowledge Management, Vol: 10, No: 3, pp 273-283 (2011)
  13. Hassan Takabi, James Joshi, Gail-Joon Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, Jan-Feb, 2011.
  14. Carlos E. Caicedo, James Joshi, Summit Tuladhar, “IPv6 Security Challenges,” Vol(42), Issue(2), (Feb, 2009), IEEE Computer, Page(s): 36-42.
  15. Yue Zhang, James Joshi, “SRBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy,” Journal of Information Assurance and Security 2007 (Volume 2, issue 4)
  16. James, B.D. Joshi, Elisa Bertino, Arif Ghafoor and Yue Zhang, "Formal Foundations for hybrid hierarchies in GTRBAC", ACM Transactions on Information and System Security (TISSEC), Vol. 10, No. 4, Jan, 2008, pp. 1-39.
  17. Basit Shafiq, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, "Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering. Vol. 17, No. 11, Pages 1557 - 1577, Nov. 2005.
  18. Rafae Bhatti, James B. D. Joshi, Basit Shafiq, Elisa Bertino, Arif Ghafoor, “X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control,” ACM Transactions on Information and System Security (TISSEC), Vol. 8 No. 4, Nov, 2005.
  19. James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “Analysis of Expressiveness and Design Issues for a Temporal Role Based Access Control Model,” IEEE Transactions on Dependable and Secure Computing, April, 2005.
  20. James B. D. Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor, “Generalized Temporal Role Based Access Control Model,” IEEE Transactions on Knowledge and Data Engineering, Vol 17, No. 1 pages 4-23, Jan, 2005.
  21. Rafae Bhatti, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “X-GTRBAC: An XML-based Policy Specification Framework and Architecture for Enterprise-Wide Access Control,ACM Transactions on Information and System Security Vol. 8, No. 2, Pages 187-227, May 2005.
  22. Rafae Bhatti, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “XML-based Specification for Web-Services Document Security”, IEEE Computer, Vol. 37, No. 4, April, 2004.
  23. James B. D. Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor, “An Access Control Language for Multidomain Environments,” IEEE Internet Computing, Nov-Dec 2004, pages 40-50.
  24. James B. D. Joshi, Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor, “A Model for Secure Multimedia Document Database System in a Distributed Environment,” IEEE Transactions on Multimedia: Special Issue on Multimedia Databases, Vol. 4, No. 2, June, 2002, pp. 215-234.
  25. James B. D. Joshi, Arif Ghafoor, Walid Aref, Eugene H. Spafford, “Digital Government Security Infrastructure Design Challenges,” IEEE Computer, Vol. 34, No. 2, February, 2001, pp 66-72.
  26. James B. D. Joshi, Walid G. Aref, Arif Ghafoor and Eugene H. Spafford, “Security Models for Web-Based Applications,” Communications of the ACM, Vol. 44, No. 2, February, 2001, pp. 38-44.
Refereed Symposium/Conferences/Workshop
  1. Xuelian Long, Lei Jin and James Joshi, “Towards Understanding Traveler Behavior in Location-Based Social Networks,” IEEE GlobeCom 2013, Dec, Atlanta, USA
  2. Xuelian Long and James Joshi, “A HITS-based POI Recommendation Algorithm in Location-Based Social Networks,” (Short Paper) The 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) Niagara Falls, Canada, August 25-28, 2013
  3. Nathalie Baracaldo, James Joshi, “Beyond Accountability: Using Obligations to Reduce Risk Exposure and Deter Insider Attacks. ACM SACMAT 2013: June, 2013, 213-224
  4. A. Masoumzadeh and J. Joshi, "Privacy Settings in Social Networking Systems: What You Cannot Control," in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May, 2013
  5. A. Masoumzadeh, L. Jin, J. Joshi, and R. Constantino, "HELPP Zone: Towards Protecting College Students from Dating Violence," in iConference 2013 Proceedings, 2013, pp. 925-928.
  6. S.T. Zargar, and J. Joshi, "DiCoDefense: Distributed Collaborative Defense against DDoS flooding attacks," the 34th IEEE Symposium on Security & Privacy (S&P'13)(Poster), May 19-22, 2013, San Francisco, CA.
  7. Rose Constantino, Amirreza Masoumzadeh, Lei Jin, James Joshi, Joseph Burroughs, Dominique de la Cruz, “HELPP Zone App and TMI: Disrupting Intimate Partner Violence in College Students” 2013 International Nursing High-end Forum (INHF), China, 22nd - 23rd June, 2013.
  8. Youna Jung, Minsoo Kim, James B. D. Joshi: Towards secure cooperation in online social networks. CollaborateCom 2012: October, 2012, 80-88
  9. Lei Jin, Xuelian Long and Joshi B.D. Joshi, Towards understanding Residential Privacy by Analyzing User' Activities in Foursquare, In Proceedings of the 2012 Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS'12), Held in conjunction with CCS 2012, Raleigh, NC, USA.
  10. Xuelian Long, Lei Jin, James Joshi, “Exploring Trajectory-Driven Local Geographic Topics in Foursquare,” in the 4th International Workshop on Location-Based Social Networks (LBSN 2012), Sept 8, 2012 - Pittsburgh, Pennsylvania, USA (Held in conjunction with Ubicomp 2012).
  11. Lei Jin, Xuelian Long, Mohd Anwar, James Joshi, “Analysis of Access Control Mechanisms for Users’ Check-ins in Location-based Social Network Systems,” 2nd International Workshop on Issues and Challenges on Social Computing (WICSOC), 2012 (with IEEE IRI2012).
  12. Nathalie Baracaldo, James Joshi, “A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat,” ACM SACMAT 2012: 167-176
  13. Hassan Takabi and James B. D. Joshi. Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. In Proc. 45th Hawaii International Conference on System Sciences (HICSS), Hawaii, USA, January 4-7, 2012.
  14. Hassan Takabi and James B. D. Joshi. Toward a Semantic Based Policy Management Framework for Interoperable Cloud Environments. In Proc. 1st International IBM Cloud Academy Conference (ICA CON 2012), Research Triangle Park (RTP), North Carolina, USA, April 19-20, 2012.
  15. Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi, "Trust-Based Approaches to Solve Routing Issues in Ad-Hoc Wireless Networks: A Survey," IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2011, vol., no., pp.556,563, 16-18 Nov. 2011
  16. Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi, “A Trust-based Approach Against IP-spoofing Attacks.” Ninth Annual Conference on Privacy, Security and Trust (PST 2011), 19-21 July, 2011, Montreal, Québec, Canada.(pg 63-70)
  17. Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi, "A Trust-based Approach to Mitigate Rerouting Attacks,  CollaborateCom, poster version, International Conference on, 15-18 October 2011.
  18. Amirreza Masoumzadeh, James Joshi, “Anonymizing Geo-Social Network Datasets, 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, November 1st, 2011, Chicago, IL, USA (Best Student Paper Award)
  19. Hassan Takabi and James Joshi, “An Approach to manage Policy Heterogeneity in Cloud Computing Environment,” Poster,The 27th Annual Computer Security Applications Conference (ACSAC 2011), Orlando, FL, USA, December 5-9, 2011.
  20. Hassan Takabi and James B. D. Joshi, “Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment,” In Proc. 45th Hawaii International Conference on System Sciences (HICSS), Hawaii, USA, January 4-7, 2012.
  21. Amirreza Masoumzadeh, James Joshi, “An Alternative Approach to k-Anonymity for Location-Based Services,” The 8th International Conference on Mobile Web Information Systems (MobiWIS 2011), Procedia CS  Vol:5: 522-530 (2011)
  22. Baracaldo, Nathalie;   Masoumzadeh, Amirreza;   Joshi, James; “A Secure, Constraint-aware Role-based Access Control Interoperation Framework,” The 5th International Conference on  Network and System Security (NSS), Italy, 2011
  23. Saman Taghavi Zargar, Hassan Takabi, and James B. D. Joshi, “DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments.”, the 7th Intl Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), October 15-18, 2011, Orlando, FL.
  24. Saman Taghavi Zargar, Hassan Takabi, and James B. D. Joshi, “DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for Cloud”, the 14th International Symposium on Recent Advances in Intrusion Detection (RAID'11)(Poster), September 20-21, 2011, Menlo Park, CA.
  25. Youna Jung, Minsoo Kim, James B. D. Joshi, “DRiBAC: Context-Aware Dynamic Role Interaction Access Control”, In Proc. of 12th International Conference of Information Reuse and Integration, pp. 88 – 93, USA, 2011
  26. Lei Jin, Hassan Takabi, and James B.D Joshi, "Towards Active Detection of Identity Clone Attacks on Online Social Networks", In Proc. of the ACM Conference on Data and Application  Security and Privacy (CODASPY 2011), San Antonio, TX, USA, 21-23 February 2011. (Best Paper Award)
  27. Saman Taghavi Zargar, and James B. D. Joshi, “A Collaborative Approach to Facilitate Intrusion Detection and Response against DDoS Attacks”, the 6th Int’l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), October 9-12, 2010, Chicago, IL.
  28. Amirreza Masoumzadeh and James Joshi, "Preserving Structural Properties in Anonymization of Social Networks," in Proc. 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, USA, Oct. 9-12, 2010.
  29. Amirreza Masoumzadeh and James Joshi, "OSNAC: An Ontology-Based Access Control Model for Social Networking Systems," in Proc. 2nd IEEE Int'l Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, MN, USA, Aug. 20-22, 2010.
  30. Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments", In Proc. of the First IEEE International Workshop on Emerging Applications for Cloud Computing (CloudApp2010). Held in conjunction (COMPSAC 2010), Seoul, Korea, July 19-23, 2010.
  31. Lei Jin, Hassan Takabi, and James B.D Joshi, "Security and Privacy Risks: Using Email Address as Identity", In Proc. of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, USA, August 20-22, 2010.
  32. Xuelian Long and James Joshi. "Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS." International Communications Conference (ICC2010), South Africa, May 23-27, 2010
  33. Hassan Takabi and James Joshi. "StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy." In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), Pittsburgh, June 9-11, 2010.
  34. Guo, Yanhui & Joshi, James. "Topic-based Personalized recommendation for Collaborative Tagging System," ACM Hypertext-2011, Toronto, Canada, June 13-16, 2010
  35. Yue Zhang and James B.D. Joshi, "An Implementation Architecture of the GTRBAC Model", 2010 International Conference on Computer Design and Applications (ICCDA-10), Jun. 2010, Qinghuangdao, Hebei, China
  36. Yue Zhang and James B.D. Joshi, "Understanding Access Control Challenges in Loosely-Coupled Multidomain Environment",  12th International Conference on Enterprise Information Systems (ICEIS-10), Jun. 2010, Funchal, Madeira, Portugal
  37. Yue Zhang and James B.D. Joshi, “Role Based Domain Discovery in Decentralized Secure Interoperations”, 2010 International Symposium on Collaborative Technologies and Systems (CTS-10), May. 2010, Chicago, IL
  38. Amirreza Masoumzadeh, James Joshi, and Hassan A. Karimi, "LBS (k,T)-Anonymity: A Spatio-Temporal Approach to Anonymity for Location-Based Service Users," in Proc. 17th ACM SIGSPATIAL GIS, Seattle, WA, USA, Nov. 4-6 2009.
  39. Hassan Takabi, James B. D. Joshi, and Hassan A. Karimi. A Collaborative K-anonymity Approach for Location Privacy in Location-Based Services. In Proc. the 5th Int’l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009), Crystal City, Washington D.C., USA, November 11-14, 2009.
  40. Hassan Takabi, Minsoo Kim, James B. D. Joshi, and Michael B. Spring. An Architecture for Specification and Enforcement of Temporal Access Control Constraints using OWL. In Proc. 2009 ACM Workshop on Secure Web Services (SWS 2009), Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 21–28. Chicago, IL, USA, November 13, 2009.
  41. Hassan Takabi and James B. D. Joshi. An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy. In Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009)(Poster), Chicago, IL, USA, November 9-13, 2009.
  42. Saman Taghavi Zargar, Martin B.H. Weiss, and James B. D. Joshi, “Security Issues in Dynamic Spectrum Access”, the 37th Research Conference on Communication, Information and Internet Policy (TPRC ‘09), September 25-27, 2009, Arlington, VA.
  43. Saman Taghavi Zargar, M. Amir Moulavi, Rajkumar Buyya, Mahmoud Naghibzadeh, and James B. D. Joshi, “RRNA: Reliable Soft Real-Time Network Aware Grid Scheduling Algorithm Using Round Trip Time”, 12th Communications and Networking Simulation Symposium (CNS'09), March22 -27, 2009 , San Diego, CA.
  44. Amirreza Masoumzadeh and James B. D. Joshi, "PuRBAC: Purpose-aware role-based access control," in Proc. 3rd Int'l Symposium on Information Security, Lecture Notes in Computer Science. Springer, Nov. 10-11 2008.
  45. Yue Zhang and James B.D. Joshi, "Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy", IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08), Dec. 2008, ShangHai, China
  46. Youna Jung, Amirreza Masoumzadeh, James B.D. Joshi, Minkoo Kim, " RiBAC: Role Interaction based Access Control Model for Community Computing", The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2008), Nov.13-16, 2008, Orlando, FL, USA.
  47. Minsoo Kim, James B.D. Joshi, Minkoo Kim, " Access Control for Cooperation Systems based on Group Situation", The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2008), Nov. 13-16, 2008, Orlando, FL, USA
  48. Yue Zhang and James B.D. Joshi, "UAQ: A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints", ACM symposium on access control models and technologies (SACMAT), Jun. 2008, Estes Park, CO.
  49. Yue Zhang and James B.D. Joshi, “A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies,” International Conference on Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007.; 12/2007
  50. Yue Zhang, James Joshi, “SRBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy,” The Third International Symposium on Information Assurance and Security, August 29-31, 2007, Manchester, United Kingdom.
  51. Yue Zhang, James Joshi, “ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy,” IEEE Proceedings of the International Conference on Information Reuse and Integration, Las Vegas, Aug13-15, 2007.
  52. Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi, “Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks,” IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, June 11-13, 2008 Taichung, Taiwan.
  53. Carlos E. Caicedo, James B. D. Joshi, “Security Issues in IPv6,” ITERA-08, March 27-29, 2008
  54. Kai Ouyang James B. D. Joshi, “CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time,” Third International Workshop on Information Assurance, New Orleans, April 2007.
  55. Michael Chuang, Suronapee Phoomvuthisarn, James B. D. Joshi, “An Integrated Framework for Trust-Based Access Control for Open Systems,” CollaborateCom 2006, GA, USA.
  56. Jun-Hyung Park, Min-Soo Kim, Bong-Nam Noh, James B. D. Joshi, “A Similarity based Technique for Detecting Malicious Executable files,” IEEE Proceedings of the International Conference on Information Reuse and Integration, Hawaii, 2006.
  57. Siqing Du, James B. D. Joshi, “Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy,” The 11th ACM Symposium on Access Control Models and Technologies, USA, June 2006.
  58. James B. D. Joshi, Elisa Bertino, “Fine-grained Role-based Delegation in Presence of Hybrid Role Hierarchy,” The 11th ACM Symposium on Access Control Models and Technologies, USA, June 2006.
  59. Suroop M Chandran, Korporn Panyim, James B. D. Joshi, “A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments", The Fourth International Conference on Trust Management, (iTrust-06), May 16-19, Italy, 2006.
  60. Suroop M Chandran, James B. D. Joshi, “LoT RBAC: A Location and Time-based RBAC Model", Proceedings of the 6th International Conference on Web Information Systems Engineering (WISE 2005), New York, Nov 2005.
  61. Suroop M Chandran, James B. D. Joshi, “Towards Administration of a Hybrid Role Hierarchy", IEEE International Conference on Information Reuse and Integration, Las Vegas, Aug 15-17, 2005.
  62. Smithi Piromruen, James B. D. Joshi, “An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environment,” IEEE Workshop on Object-oriented Real-time Databases (WORDS-2005), 2005.
  63. Basit Shafiq, Ammar Masood, and Arif Ghafoor, James B. D. Joshi, "A Role-Based Access Control Policy Verification Framework for Real-Time Systems", IEEE Workshop on Object-oriented Real-time Databases (WORDS-2005), 2005.
  64. Rafae Bhatti, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control”, The 9th ACM Symposium on Access Control Models and Technologies, New York, June 2004.
  65. James B. D. Joshi, Elisa Bertino, Basit Shafiq, Arif Ghafoor, “Dependencies and Separation of Duty Constraints in GTRBAC”, The 8th ACM Symposium on Access Control Models and Technologies, Como, Italy, June 2003.
  66. Rafae Bhatti, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “Access Control in Dynamic XML-based Web-Services with X-RBAC”, The First International Conference in Web Services, June 23-26, Las Vegas, Nevada, 2003.
  67. James B. D. Joshi, Elisa Bertino, Arif Ghafoor, "Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model,” 26th Annual International Computer Software and Applications Conference Workshop, (COMPSAC 2002 Workshop), Oxford, England, 26-29th August, 2002, pp. 951-956.
  68. James B. D. Joshi, Elisa Bertino, Arif Ghafoor, “Temporal Hierarchy and Inheritance Semantics for GTRBAC,” The 7th ACM Symposium on Access Control Models and Technologies, June 3-4, 2002, Moterey, CA, pp 74-83.
  69. J. Joshi, A. Ghafoor, “A Petri-Net Based Multilevel Security Specification Mechanism for Multimedia Documents in a Multidomain Environment,” The Second Annual Systems Security Engineering Conference, February 28 – March 2, 2001, Orlando, FL.
  70. J. Joshi, A. Ghafoor, “A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents,” IEEE International Conference on Multimedia and Expo, New York, USA, July 30-August 2, 2000, pp 533-536.
  71. S. Sedigh, J. Joshi, A. Bashandy, A. Ghafoor, “Quality Based Evaluation of Filtering Mechanisms in MPEG Video Communications,” Proc. of 17th IEEE Symposium on Reliable and Distributed Computing, West Lafayette, IN, USA, October 20-23, 1998, pp.  449-454.
Technical Reports
  1. James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor, “X-RBAC: An Access Control Language for Multi-domain Environments,” CERIAS TR 2004-46.
  2. Basit Shafiq, James B. D. Joshi, Arif Ghafoor “A Petri-net Model for Verification of RBAC Policies,” CERIAS Technical Report TR 2002-33, Purdue University, 2003.
  3. Joshi, J., Bhatti, R., Bertino, E., Ghafoor, A., “X- RBAC : An Access Control Language for Multi-domain Environments,” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2004-46
  4. Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J., “XML-Based Specification for Web Services Document Security” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS TR 2004-65
  5. Bhatti, R., Joshi, J, Bertino, E., Ghafoor, A, “X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control,” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2004-04
  6. Bhatii, R., Joshi, J., Bertino, E, Ghafoor, A., “Access Control in Dynamic XML-based Web-Services with X-RBAC” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2003-26
  7. Joshi, J., “Generalized Temporal Role Based Access Control Model for Developing Secure Systems” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2003-23
  8. Shafiq, B. Joshi, J., Bertino, E., Ghafoor, A., “Optimal Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2003-24
  9. Joshi, J., Bertino, E., Shafiq, Ghafoor, A., “Dependencies and Separation of Duty Constraints In GTRBAC” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2003-04
  10. Joshi, J., Bertino, E., Latif, U., Ghafoor, A., “Generalized Temporal Role Based Access Control Model (GTRBAC) (Part I) - Specification and Modeling” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2001-47
  11. Joshi, J., Bertino, E., Shafiq, B., Latif, U., Ghafoor, A., “Generalized Temporal Role Based Access Control Model (GTRBAC) (Part II) - Expressiveness and Design Issues” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2003-01
  12. Shafiq, B., Joshi, J. B. D., and Ghafoor, A., "A Petri-Net Model for Verification of RBAC Policies," CERIAS, Purdue University, Technical Report TR 2002-33, 2002.
  13. Shafiq, B., Joshi, J., Bertino, E., and Ghafoor, A., "Optimal Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies," CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS TR 2003-24, 2003.
  14. Joshi, J. Bertino, E. Ghafoor, A., “Temporal Hierarchy and Inheritance Semantics for GTRBAC” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2001-52
  15. Joshi, J. Ghafoor, A., Aref, W. G., Spafford, E., “Digital Government Security Infrastructure Design Challenges” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2001-31
  16. Joshi, J., Ghafoor, A., “A Petri-net Based Multilevel Security Specification Model for Multimedia Documents”  CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2000-09
  17. Joshi, J., Ghafoor, A, “A Petri-net Based Multilevel Security Specification Model for Multimedia Documents” CERIAS, School of Electrical and Computer Engineering, Purdue University, Technical Report CERIAS  TR 2000-09