Publications



Narrow Publications...

2017

Conference & Symposium Papers

Chao Li and Balaji Palanisamy, "Emerge: Self-emerging Data Release using Cloud Data Storage", Proc. of 10th IEEE International Conference on Cloud Computing, Honolulu, USA. (IEEE CLOUD 2017)

Jinlai Xu and Balaji Palanisamy, "Cost-aware resource management for federated clouds using resource sharing contracts", Proc. of 10th IEEE International Conference on Cloud Computing, Honolulu, USA. (IEEE CLOUD 2017).

Jinlai Xu and Balaji Palanisamy, Heiko Ludwig, and Qingyang Wang, "Zenith: Utility-aware Resource Allocation for Edge Computing.", Proc. of 1st IEEE International Conference on Edge Computing, Honolulu, USA. (IEEE EDGE 2017).

Chao Li, Balaji Palanisamy and James Joshi, "Differentially Private Trajectory Analysis for Points-of-Interest Recommendation", Proc. of 6th IEEE International Congress on Big Data , Honolulu, USA. (IEEE BigData Congress 2017)

Chao Li and Balaji Palanisamy, "Timed-release of Self-emerging Data using Distributed Hash Tables", Proc. of 37th IEEE International Conference on Distributed Computing Systems, Atlanta, USA.

Hui Chen, Qingyang Wang, Balaji Palanisamy, and Pengcheng Xiong, "DCM: Dynamic Concurrency Management for Scaling n-Tier Applications in Cloud", Proc. of the 37th International Conference on Distributed Computing Systems, Atlanta, GA, USA.

Chao Li, Balaji Palanisamy, Aravind Kalaivanan and Sriram Raghunathan, "ReverseCloak: A Reversible Multi-level Location Privacy Protection System", Proc. of 37th IEEE International Conference on Distributed Computing Systems, Atlanta, USA.(System Demonstration)

Balaji Palanisamy, Chao Li and Prashant Krishnamurthy, "Group Differential Privacy-preserving Disclosure of Multi-level Association Graphs", Proc. of 37th IEEE International Conference on Distributed Computing Systems, Atlanta, USA.(poster)

Runhua Xu, James B.D. Joshi, Prashant Krishnamurthy and David Tipper. "Insider Threat Mitigation in Attribute based Encryption." In 9th Annual National Cyber Security Summit (Research Track), Von Braun Center, Huntsville, AL, USA. 2017.

Journal Articles

Baracaldo, Nathalie, Balaji Palanisamy, and James Joshi. "G-SIR: An Insider Attack Resilient Geo-Social Access Control Framework." IEEE Transactions on Dependable and Secure Computing (2017).

2016

Conference & Symposium Papers

Xu, Runhua, and James BD Joshi. "An Integrated Privacy Preserving Attribute Based Access Control Framework." In Cloud Computing (CLOUD), 2016 IEEE 9th International Conference on, pp. 68-76. IEEE, 2016.

Xu, Runhua, and James BD Joshi. "Enabling Attribute Based Encryption as an Internet Service." In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on, pp. 417-425. IEEE, 2016.

Su, Yue, Ziyi Lan, Yu-Ru Lin, Louise K. Comfort, and James Joshi. "Tracking Disaster Response and Relief Following the 2015 Nepal Earthquake." In Collaboration and Internet Computing (CIC), 2016 IEEE 2nd International Conference on, pp. 495-499. IEEE, 2016.

Leila Karimi, Balaji Palanisamy, James Joshi, "A Dynamic Privacy Aware Access Control Model for Location Based Services", Proc. of 1st International Workshop on Privacy in Collaborative & Social Computing, PiCSoC 2016, in conjunction with 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)

Chao Li, Balaji Palanisamy and James Joshi, "SocialMix: Privacy-aware Communication in Online Social Networks", Proc. of 23rd IEEE International Conference on Web Services, San Francisco, USA.

Journal Articles

Jin, Lei, Xuelian Long, Ke Zhang, Yu-Ru Lin, and James Joshi. "Characterizing users’ check-in activities using their scores in a location-based social network." Multimedia Systems 22, no. 1 (2016): 87-98.

Kisung Lee, Ling Liu, Balaji Palanisamy and Emre Yigitoglu, "Road Network-Aware Spatial Alarms" in IEEE Transactions on Mobile Computing (IEEE TMC 2016)

Qiulei Guo, Balaji Palanisamy, Hassan A. Karimi and Liming Zhang "Distributed Algorithms for Spatial Retrieval Queries in Geospatial Analysis" in Services Transactions on Cloud Computing (STCC 2016)

2015

Conference & Symposium Papers

Chao Li and Balaji Palanisamy, "ReverseCloak: Protecting Multi-level Location Privacy over Road Networks", Proc. of 24th ACM International Conference on Information and Knowledge Management, Melbourne, Australia.

Chao Li and Balaji Palanisamy, "De-anonymizable Location Cloaking for Privacy-controlled Mobile Systems", Proc. of 9th International Conference on Network and System Security (NSS 2015) , New York, USA

Hardik Vasa, Anirudh Vasudevan and Balaji Palanisamy, "Link Analysis of Wikipedia Documents using MapReduce", Proc. of 4th IEEE International Workshop on Data Integration and Mining (DIM), collocated with 16th IEEE International Conference on Information Reuse and Integration, San Franscisco, USA

Qiulei Quo, Balaji Palanisamy and Hassan Karimi, "A Distributed Polygon Retrieval Algorithm using MapReduce", Proc. of International Symposium on Spatio-temporal Computing, Fairfax, Virginia, USA (ISSC ’15)

Balaji Palanisamy and Ling Liu, " Privacy-preserving Data Publishing in the Cloud: A Multi-level Utility Controlled Approach", Proc. of 8th IEEE International Conference on Cloud Computing, New York, USA. (IEEE CLOUD ’15)

Qiulei Quo, Balaji Palanisamy and Hassan Karimi, "A MapReduce Algorithm for Polygon Retrieval in Geospatial Analysis", Proc. of 8th IEEE International Conference on Cloud Computing, New York, USA. (IEEE CLOUD ’15)

Yang Zhou, Ling Liu, Xianqiang Bao, Kisung Lee, Calton Pu, Balaji Palanisamy, Emre Yigitoglu, Qi Zhang, "Clustering Service Networks with Entity, Attribute and Link Heterogeneity", Proc. of 22nd IEEE International Conference on Web Services (IEEE ICWS’ 15), New York, USA.

Yuzhe Tang, Arun Iyengar, Wei Tan, Liana Fong, Ling Liu and Balaji Palanisamy, "Lightweight Indexing for Log-Structured Key-Value Stores", Proc. of 15th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (IEEE/ACM CCGrid ’15) (Best Paper Award)

Journal Articles

Lu, Jianfeng, James BD Joshi, Lei Jin, and Yiding Liu. "Towards complexity analysis of User Authorization Query problem in RBAC." Computers & Security 48 (2015): 116-130.

Anwar, Mohd, James Joshi, and Joseph Tan. "Anytime, anywhere access to secure, privacy-aware healthcare services: Issues, approaches and challenges."Health Policy and Technology 4, no. 4 (2015): 299-311.

Balaji Palanisamy, Aameek Singh and Ling Liu, "Cost-effective Resource Provisioning for MapReduce in a Cloud", in IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS 2015).

Balaji Palanisamy and Ling Liu, "Attack-resilient Mix-zones over Road Networks: Architecture and Algorithms" in IEEE Transactions on Mobile Computing (IEEE TMC 2015).

Book Chapters

Palanisamy, Balaji, and James Joshi. "Protecting Privacy in Indoor Positioning Systems." Indoor Wayfinding and Navigation (2015): 227.

2014

Conference & Symposium Papers

Jin, Lei, Hassan Takabi, Xuelian Long, and James Joshi. "Exploiting Users' Inconsistent Preferences in Online Social Networks to Discover Private Friendship Links." In Proceedings of the 13th Workshop on Privacy in the Electronic Society, pp. 59-68. ACM, 2014.

Jin, Lei, Balaji Palanisamy, and James BD Joshi. "POSTER: Compromising Cloaking-based Location Privacy Preserving Mechanisms with Location Injection Attacks." In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 1439-1441. ACM, 2014.

Joshi, James, and Balaji Palanisamy. "Towards Risk-aware Policy based Framework for Big Data Security and Privacy." (2014).

Palanisamy, Balaji, Sheldon Sensenig, James Joshi, and Rose Constantino. "LEAF: A privacy-conscious social network-based intervention tool for IPV survivors." In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on, pp. 138-146. IEEE, 2014.

Zargar, Saman Taghavi, James Joshi, and David Tipper. "DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring." In Information Reuse and Integration (IRI), 2014 IEEE 15th International Conference on, pp. 120-129. IEEE, 2014.

Baracaldo, Nathalie, Balaji Palanisamy, and James Joshi. "Geo-Social-RBAC: A location-based socially aware access control framework." In International Conference on Network and System Security, pp. 501-509. Springer International Publishing, 2014.

Qiulei Quo, Balaji Palanisamy and Hassan Karimi, "A Distributed Polygon Retrieval Algorithm using MapReduce", Proc. of 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, (Collaboratecom 2014) , Miami, Florida, USA (Poster)

Balaji Palanisamy, Aameek Singh, Nagapramod Mandagere, Gabriel Alatore and Ling Liu, "VNCache: Map Reduce Analysis for Cloud-archived Data", Proc. of 14th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (IEEE/ACM CCGrid ’14)

Journal Articles

Zhang, Chengcui, Elisa Bertino, Bhavani Thuraisingham, and James Joshi. "Guest editorial: Information reuse, integration, and reusable systems." Information Systems Frontiers 16, no. 5 (2014): 749.

Takabi, Hassan, Saman Taghavi Zargar, and James BD Joshi. "Mobile Cloud Computing and Its Security, Privacy and Trust Management Challenges." Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, DB Rawat, BB Bista, and G. Yan Ed. IGI Global, 2014. doi: 10.4018/978-1-4666-4691 9 (2014).

Jung, Youna, and James BD Joshi. "CPBAC: Property-based access control model for secure cooperation in online social networks." Computers & Security 41 (2014): 19-39.

Balaji Palanisamy and Ling Liu, "Effective Mix-zone Anonymization for Mobile Travelers", Geoinformatica 2014.

Balaji Palanisamy, Ling Liu, Kisung Lee, Shicong Meng, Yuzhe Tang and Yang Zhou, "Anonymizing Continuous Queries with Delay-tolerant Mix-zones on Road Networks", Distributed and Parallel Databases (DAPD 2014).

Book Chapters

Takabi, Hassan, Saman Taghavi Zargar, and James BD Joshi. "Mobile Cloud Computing and Its Security and Privacy Challenges." In Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, pp. 384-407. IGI Global, 2014.

2013

Book Chapters

H. Takabi, S.T. Zargar, and J. Joshi, "Mobile Cloud Computing and its Security, Privacy and Trust Management Challenges," in Security, Privacy, Trust, and Resource Management in Mobile and Wireless Communications, D. B. Rawat, B.B. Bista, and G. Yan Ed. IGI Global, 2014. doi:10.4018/978-1-4666-4691-9 (In Press)

Hassan Takabi and James B. D. Joshi, Gail-Joon Ahn, "Security and Privacy in Cloud Computing: Towards a Comprehensive Framework" in Principles, Methods and Service-oriented Approaches for Cloud Computing, Editors: X. Yang and L. Liu, IGI Global, January 2013.

Amirreza Masoumzadeh, Mohd Anwar and James Joshi, "Security and Privacy in Location Based Services," Location Based Services; Advanced Location-Based Technologies and Services, H. A. Karimi, Ed. CRC Press, 2013, pp. 235-264.

Conference & Symposium Papers

Xuelian Long and James Joshi, "A HITS-based POI Recommendation Algorithm in Location-Based Social Networks," (Short Paper) The 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013) Niagara Falls, Canada, August 25-28, 2013

Nathalie Baracaldo, James Joshi, "Beyond Accountability: Using Obligations to Reduce Risk Exposure and Deter Insider Attacks." ACM SACMAT 2013: June, 2013, 213-224

A. Masoumzadeh, L. Jin, J. Joshi, and R. Constantino, "HELPP Zone: Towards Protecting College Students from Dating Violence," in iConference 2013 Proceedings, 2013, pp. 925-928

Rose Constantino, Amirreza Masoumzadeh, Lei Jin, James Joshi, Joseph Burroughs, Dominique de la Cruz, "HELPP Zone App and TMI: Disrupting Intimate Partner Violence in College Students" 2013 International Nursing High-end Forum (INHF), China, 22nd - 23rd June, 2013.

J. Ning, K. Pelechrinis, S.V. Krishnamurthy and R. Govindan, "On the Trade-offs between Collecting Packet Level Forensic Evidence and Data Delivery Performance in Wireless Networks", in IEEE ICC '13, Budapest, Hungary, June 2013.

A. Masoumzadeh and J. Joshi, "Privacy Settings in Social Networking Systems: What You Cannot Control," in Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), May, 2013

Balaji Palanisamy, Sindhuja Ravichandran, Ling Liu, Binh Han and Kisung Lee, "Road Network Mix-zones for Anonymous Location Based Services", Demonstration at 28th IEEE International Conference on Data Engineering (ICDE' 13).

Xuelian Long, Lei Jin and James Joshi, "Towards Understanding Traveler Behavior in Location-Based Social Networks," IEEE GlobeCom 2013, Dec, Atlanta, USA

Journal Articles

S.T. Zargar, J. Joshi, and D. Tipper, "A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks," IEEE Communications Surveys & Tutorials, vol. PP, no. 99, pp. 1-24. (Early Access-online Mar. 28, 2013)

Nathalie Baracaldo, James Joshi, "An Adaptive Risk Management and Access Control Framework to Mitigate Insider Threats", Elsevier Computer & Security (Accepted in Aug 2013)

Balaji Palanisamy, Ling Liu, Kisung Lee, Shicong Meng, Yuzhe Tang and Yang Zhou, "Anonymizing Continuous Queries with Delay-tolerant Mix-zones on Road Networks", Distributed and Parallel Databases (DAPD 2013).

K. Pelechrinis, V. Zadorozhny, V. Kounev, V. Oleshchuk, M. Anwar and Y. Lin, "Automatic Evaluation of Information Provider Reliability and Expertise", to appear in Springer World Wide Web Journal.

Youna Jung, James Joshi, "CPBAC: Property-based Access Control Model for Secure Cooperation in Online Social Networks," Elsevier Computers & Security (Accepted in July 2013)

Balaji Palanisamy and Ling Liu, "Effective Mix-zone Anonymization for Mobile Travelers", Geoinformatica 2013.

Y. Cai, K. Pelechrinis, X. Wang, P. Krishnamurthy and Y. Mo, "Joint Reactive Jammer Detection and Localization in an Enterprise WiFi Network", to appear in Elsevier Computer Networks

Lei Jin, James B. D. Joshi, Mohd Anwar. "Mutual-friend based attacks in social network systems." Computers & Security 37: 15-30 (2013) (Online available, September 2013 pub date)

Amirreza Masoumzadeh and James Joshi, "Top Location Anonymization for Geosocial Network Datasets," Transactions on Data Privacy, vol. 6, no. 1, pp. 107-126, 2013.

K. Pelechrinis, P. Krishanmurthy, C. Gkantsidis, "Trustworthy Operations in Cellular Networks: The Case of PF Scheduler" to appear in IEEE Transactions of Parallel and Distributed Systems

M.S. Theses

A. Horneman (Co-Chairs: James Joshi, Timur Snoke [SEI/CERT]), "Examining Threat Groups from the Outside: Generating High-Level Overviews of Persistent and Traditional Compromises." Master's Thesis, University of Pittsburgh. December 2013.

Ph.D. Dissertations

H. Takabi (Advisor: J. Joshi), "A Semantic Based Policy Management Framework for Cloud Computing Environments", Ph.D. Information Science, University of Pittsburgh, defended Jul. 12, 2013

Posters

K. Zhang, K. Pelechrinis and P. Krishnamurthy, "Detecting Fake Check-Ins in Location-based Social Networks Through Honeypot Venues", in ACM HotMobile '13 (Poster Session), Jekyll Island, GA, February 2013

S.T. Zargar, and J. Joshi, "DiCoDefense: Distributed Collaborative Defense against DDoS flooding attacks," the 34th IEEE Symposium on Security & Privacy (S&P'13)(Poster), May 19-22, 2013, San Francisco, CA.

2012

Book Chapters

Hassan Takabi and James B. D. Joshi. "Policy Management in Cloud Computing Environment: Challenges and Approaches." in Security Engineering for Cloud Computing: Approaches and Tools, Editors: D. G. Rosado, D. Mellado, E. Fernandez-Medina, and M. Piattini, IGI Global, September 2012.

Conference & Symposium Papers

Nathalie Baracaldo, James Joshi, "A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat," ACM SACMAT 2012: 167-176

Z. Feng, K. Pelechrinis, S.V. Krishnamurthy, A. Swami, S. Felix Wu and M. Singh, "Collaborative Assessment of Functional Reliability in Wireless Networks", in IEEE MASS '12, Las Vegas, NV, October 2012.

J. Ning, S. Singh, K. Pelechrinis, B. Liu, S.V. Krishnamurthy and R. Govindan, "Forensic Analysis of Packet Losses in Wireless Networks", in IEEE ICNP '12, Austin, TX, October 2012.

Balaji Palanisamy, Ling Liu, Kisung Lee, Aameek Singh and Yuzhe Tang, "Location Privacy with Road Network Mix-zones", Proc. of 8th IEEE International Conference on Mobile Ad-hoc and Sensor Networks (IEEE MSN'12).

Hassan Takabi and James B. D. Joshi, "Policy Management as a Service: An Approach to Manage Policy Heterogeneity in Cloud Computing Environment," In Proc. 45th Hawaii International Conference on System Sciences (HICSS), Hawaii, USA, January 4-7, 2012.

Lei Jin, Xuelian Long, H. Takabi, and James B. D. Joshi. "Sybil Attacks VS Identity Clone Attacks in Online Social Networks". In Proc. 6th International Conference on Information Security and Assurance (ISA 2012), Shanghai, China, April 28-30, 2012

Hassan Takabi and James B. D. Joshi. "Toward a Semantic Based Policy Management Framework for Interoperable Cloud Environments". In Proc. 1st International IBM Cloud Academy Conference (ICA CON 2012), Research Triangle Park (RTP), North Carolina, USA, April 19-20, 2012.

Youna Jung, Minsoo Kim, James B. D. Joshi "Towards Secure Cooperation in Online Social Networks." CollaborateCom 2012: October, 2012, 80-88

Journal Articles

Youna Jung, Minsoo Kim, Amirreza Masoumzadeh, James B.D Joshi, "A Survey of Security for Multiagent Systems" Artificial Intelligence Review, Springer Netherlands, Doi: 10.1007/s10462-011-9228-8

Yan, Ye and Qian, Yi and Sharif, Hamid and Tipper, David, "A Survey on Cyber Security for Smart Grid Communications." IEEE Communications Surveys & Tutorials.

Lei Jin, Hassan Takabi, James B. D. Joshi, "Analyzing Security and Privacy Issues of Using E-mail Address as Identity" International Journal Information Privacy, Security and Integrity, Vol. 1, No. 1, 2011

Youna Jung and James B.D. Joshi, "CRiBAC: Community based Role interaction Access Control Model", Computers & Security, 31 (4). pp. 497-523. ISSN 0167-4048. 2012.

Amirreza Masoumzadeh and James Joshi, "Preserving Structural Properties in Edge-Perturbing Anonymization Techniques for Social Networks," IEEE Transactions on Secure and Dependable Computing 9(6): 877-889 (2012)

Hassan Takabi, and James B.D. Joshi. "Semantic Based Policy Management for Cloud Computing Environment." International Journal of Cloud Computing, 1 (2/3). pp. 119-144. 2012.

Workshop Papers

Lei Jin, Xuelian Long, Mohd Anwar, James Joshi, "Analysis of Access Control Mechanisms for Users' Check-ins in Location-based Social Network Systems," 2nd International Workshop on Issues and Challenges on Social Computing (WICSOC), 2012 (with IEEE IRI2012).

Xuelian Long, Lei Jin, James Joshi, "Exploring Trajectory-Driven Local Geographic Topics in Foursquare," in the 4th International Workshop on Location-Based Social Networks (LBSN 2012), Sept 8, 2012 - Pittsburgh, Pennsylvania, USA (Held in conjunction with Ubicomp 2012).

Lei Jin, Xuelian Long and Joshi B.D. Joshi, "Towards understanding Residential Privacy by Analyzing Users' Activities in Foursquare", In Proceedings of the 2012 Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS'12), Held in conjunction with CCS 2012, Raleigh, NC, USA.

2011

Conference & Symposium Papers

Baracaldo, Nathalie; Masoumzadeh, Amirreza; Joshi, James; "A Secure, Constraint-aware Role-based Access control Interoperation Framework," The 5th International Conference on Network and System Security (NSS), Italy, 2011

Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi, "A Trust-based Approach Against IP-spoofing Attacks." Ninth Annual Conference on Privacy, Security and Trust (PST 2011), 19-21 July, 2011, Montreal, Québec, Canada.(pg 63-70)

Jesus M. Gonzalez, Mohd Anwar, James B. D. Joshi, "A Trust-based Approach to Mitigate Rerouting Attacks," CollaborateCom, poster version, International Conference on, 15-18 October 2011.

Amirreza Masoumzadeh, James Joshi, "An Alternative Approach to k-Anonymity for Location-Based Services," The 8th International Conference on Mobile Web Information Systems (MobiWIS 2011), Procedia CS Vol:5: 522-530 (2011)

K. Pelechrinis, V. Zadorozhny, V. Oleshchuk, "Collaborative Assesment of Information Provider's Reliability and Expertise using Subjective Logic". Proc. of the 7th International Conference on Collaborative Computing (CollaborateCom'11), 2011.

Saman Taghavi Zargar, Hassan Takabi, and James B. D. Joshi, "DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments", the 7th Intl Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), October 15-18, 2011, Orlando, FL.

Youna Jung, Minsoo Kim, James B. D. Joshi, "DRiBAC: Context-Aware Dynamic Role Interaction Access Control", In Proc. of 12th International Conference of Information Reuse and Integration, pp. 88 – 93, USA, 2011

Balaji Palanisamy and Ling Liu, "MobiMix: Protecting Location Privacy with Mix-zones over Road Networks", Proc. of 27th IEEE International Conference on Data Engineering (ICDE' 11).

T-A. Le, P. Krishnamurthy, D. Tipper, K. Pelechrinis, "Modeling and Simulation of Wireless Link Quality (ETT) Through Principal Component Analysis of Trace Data," The Eighth ACM International Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN), Miami, 2011.

Yuzhe Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy, "Privacy Preserving Indexing for eHealth Information Networks", Proc. of 20th ACM Conference on Information and Knowledge Management (CIKM' 11)

Lei Jin, Hassan Takabi, and James B.D Joshi, "Towards Active Detection of Identity Clone Attacks on Online Social Networks", In Proc. of the ACM Conference on Data and Application Security and Privacy (CODASPY 2011), San Antonio, TX, USA, 21-23 February 2011. (Best Paper Award)

Journal Articles

K. Pelechrinis, I. Broustis, S.V. Krishnamurthy and C. Gkantsidis, "A Measurement Driven Anti-Jamming System for 802.11 Networks", to appear in IEEE/ACM Transactions on Networking.

Xuelian Long, James Joshi, "BaRMS: A Bayesian Reputation Management Approach for P2P Systems", Journal of Information & Knowledge Management, Vol: 10, No: 3, pp 273-283 (2011)

K. Pelechrinis, M. Iliofotou and S.V. Krishnamurthy, "Denial of Service Attacks in Wireless Networks: The Case of Jammers", to appear in IEEE Communication Surveys and Tutorials, second quarter 2011.

Amirreza Masoumzadeh and James Joshi, "Ontology-Based Access Control for Social Network Systems," International Journal Information Privacy, Security and Integrity, Vol. 1, No. 1, 2011

T. Hayajneh, P. Krishnamurthy, D. Tipper and T. Le, "Secure Neighborhood Creation in Wireless Ad Hoc Networks using Hop Count Discrepancies," to appear in ACM Mobile Networks and Applications.

Hassan Takabi, James Joshi, Gail-Joon Ahn, "Security and Privacy Challenges in Cloud Computing Environments," IEEE Security and Privacy, Jan-Feb, 2011.

T. Hayajneh, R. Doomun, P. Krishnamurthy and D. Tipper, "Source-Destination Obfuscation in Wireless Ad hoc Networks," Security and Communication Networks, Vol. 3, No. 1, Jan./Feb., 2011

Ph.D. Dissertations

Nitipaichit, Yuttasart (Advisor: Joseph Kabara), "Security in Wireless Sensor Networks Employing MACGSP6." Doctoral Dissertation, University of Pittsburgh, 2011.

Posters

Hassan Takabi and James Joshi, "An Approach to manage Policy Heterogeneity in Cloud Computing Environment," The 27th Annual Computer Security Applications Conference (ACSAC 2011), Orlando, FL, USA, December 5-9, 2011.

Saman Taghavi Zargar, Hassan Takabi, and James B. D. Joshi, "DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for Cloud", the 14th International Symposium on Recent Advances in Intrusion Detection (RAID'11)(Poster), September 20-21, 2011, Menlo Park, CA.

Workshop Papers

Pelechrinis, K., Zadorozhny, V.,Oleshchuk,V. A Cognitive-based Scheme for User Reliability and Expertise Assesment in Q&A Social Networks. Proc. of the International Workshop on Issues and Challenges in Social Computing (WICSOC 2011). In conjunction with the 12th IEEE International Conference on Information Reuse and Integration, 2011.

Amirreza Masoumzadeh, James Joshi, "Anonymizing Geo-Social Network Datasets", 4th ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, November 1st, 2011, Chicago, IL, USA (Best Student Paper Award)

2010

Conference & Symposium Papers

Saman Taghavi Zargar, and James B. D. Joshi, "A Collaborative Approach to Facilitate Intrusion Detection and Response against DDoS Attacks", the 6th Int'l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), October 9-12, 2010, Chicago, IL.

30. Yue Zhang and James B.D. Joshi, "An Implementation Architecture of the GTRBAC Model", 2010 International Conference on Computer Design and Applications (ICCDA-10), Jun. 2010, Qinghuangdao, Hebei, China

Xuelian Long and James Joshi. "Enhanced One-Pass IP Multimedia Subsystem Authentication Protocol for UMTS." International Communications Conference (ICC2010), South Africa, May 23-27, 2010

A. Aksu, P. Krishnamurthy, D. Tipper and O. Ercetin, "On Security and Reliability using Cooperative Transmissions in Sensor Networks", Proceedings 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), Chicago, IL, Oct. 9-14, 2010.

Amirreza Masoumzadeh and James Joshi, "OSNAC: An Ontology-Based Access Control Model for Social Networking Systems," in Proc. 2nd IEEE Int'l Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, MN, USA, Aug. 20-22, 2010.

Amirreza Masoumzadeh and James Joshi, "Preserving Structural Properties in Anonymization of Social Networks," in Proc. 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010), Chicago, IL, USA, Oct. 9-12, 2010.

Yue Zhang and James B.D. Joshi, "Role Based Domain Discovery in Decentralized Secure Interoperations", 2010 International Symposium on Collaborative Technologies and Systems (CTS-10), May. 2010, Chicago, IL

Lei Jin, Hassan Takabi, and James B.D Joshi, "Security and Privacy Risks: Using Email Address as Identity", In Proc. of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT2010), Minneapolis, USA, August 20-22, 2010.

Hassan Takabi and James Joshi. "StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy." In Proc. ACM Symposium on Access Control Models and Technologies (SACMAT), Pittsburgh, June 9-11, 2010.

Yue Zhang and James B.D. Joshi, "Understanding Access Control Challenges in Loosely-Coupled Multidomain Environment", 12th International Conference on Enterprise Information Systems (ICEIS-10), Jun. 2010, Funchal, Madeira, Portugal

Journal Articles

K. Panyim and P. Krishnamurthy, "A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks," To Appear in Mobile Networks and Applications, Springer, Available Online (DOI: 10.1007/s11036-010-0244-8), June 2010.

K.Pelechrinis, C. Koufogiannakis and S.V. Krishnamurthy, "On the Efficacy of Frequency Hopping in Coping with Jamming Attacks in 802.11 Networks", in IEEE Transactions on Wireless Communications, Vol. 9, Issue 10, p. 3258-3271, October, 2010

M.S. Theses

J. Spring (Co-chairs: P. Krishnamurthy, E. Stoner [SEI/CERT]), "Large Scale DNS Traffic Analysis of Malicious Internet Activity with a Focus on Evaluating the Response Time of Blocking Phishing Sites", MS Thesis, School of Information Sciences, University of Pittsburgh, April 2010

Ph.D. Dissertations

Zhang, Yue (Advisor: J. Joshi), "An Access Control and Trust Management Framework for Loosely-Coupled Multidomain Environments", Ph.D. Information Science, University of Pittsburgh, defended Nov. 4, 2010.

Kim, Tae-Hoon (Advisor: D. Tipper), Cross-Layer Resilience Based On Critical Points in MANETs. Ph.D. Telecommunications, University of Pittsburgh, 2010

Pacharintanakul, Peera (Advisor: D. Tipper), "Crosslayer Survivability in Overlay-IP-WDM Networks." Doctoral Dissertation, University of Pittsburgh, 2010

Panyim, Korporn (Advisor: P. Krishnamurthy), "Secure Connectivity Through Key Predistribution Under Jamming Attacks in Ad Hoc and Sensor Networks," Ph.D. Telecommunications, University of Pittsburgh, defended September 2010.

Workshop Papers

Hassan Takabi, James B. D. Joshi, and Gail-Joon Ahn, "SecureCloud: Towards a Comprehensive Security Framework for Cloud Computing Environments", In Proc. of the First IEEE International Workshop on Emerging Applications for Cloud Computing (CloudApp2010). Held in conjunction (COMPSAC 2010), Seoul, Korea, July 19-23, 2010.

2009

Book Chapters

James B.D. Joshi, Yue Zhang "Access Control and Trust Management for Emerging Multidomain Environments," in Annals of Emerging Research in Information Assurance, Security and Privacy Services, Editors: S. Upadhyaya, R. O. Rao

James B.D. Joshi and Yue Zhang, "Role Based Access Control," Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer (In Print)

James B.D. Joshi and Yue Zhang, "Temporal Access Control," Encyclopedia of Database Systems, Editors-in-Chief: Ling Liu, M. Tamer Özsu, Springer (In Print).

Conference & Symposium Papers

Hassan Takabi, James B. D. Joshi, and Hassan A. Karimi. "A Collaborative K-anonymity Approach for Location Privacy in Location-Based Services". In Proc. the 5th Int’l Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2009), Crystal City, Washington D.C., USA, November 11-14, 2009.

Hassan Takabi, Minsoo Kim, James B. D. Joshi, and Michael B. Spring. "An Architecture for Specification and Enforcement of Temporal Access Control Constraints using OWL." In Proc. 2009 ACM Workshop on Secure Web Services (SWS 2009), Held in conjunction with the 16th ACM Conference on Computer and Communications Security (CCS 2009), pages 21–28. Chicago, IL, USA, November 13, 2009.

K.Pelechrinis, I.Broustis, S.V.Krishnamurthy and C.Gkantsidis, "ARES: an Anti-jamming REinforcement System for 802.11 Networks", in ACM CoNEXT '09, Rome, Italy, December 2009.

K.Pelechrinis, C.Koufogiannakis and S.V.Krishnamurthy, "Gaming the Jammer: Is Frequency Hopping Effective?", in WiOpt '09, Seoul, Korea, June 2009.

Amirreza Masoumzadeh, James Joshi, and Hassan A. Karimi, "LBS (k,T)-Anonymity: A Spatio-Temporal Approach to Anonymity for Location-Based Service Users," in Proc. 17th ACM SIGSPATIAL GIS, Seattle, WA, USA, Nov. 4-6 2009.

K.Pelechrinis, I.Koutsopoulos, I.Broustis and S.V.Krishnamurthy, "Lighweight Jammer Localization in Wireless Networks: System Design and Implementation", in IEEE Globecom CISS '09, Honolulu, Hawaii, November 2009.

Saman Taghavi Zargar, M. Amir Moulavi, Rajkumar Buyya, Mahmoud Naghibzadeh, and James B. D. Joshi, "RRNA: Reliable Soft Real-Time Network Aware Grid Scheduling Algorithm Using Round Trip Time", 12th Communications and Networking Simulation Symposium (CNS'09), March22 -27, 2009 , San Diego, CA.

Saman Taghavi Zargar, Martin B.H. Weiss, and James B. D. Joshi, "Security Issues in Dynamic Spectrum Access", the 37th Research Conference on Communication, Information and Internet Policy (TPRC ‘09), September 25-27, 2009, Arlington, VA.

Journal Articles

Carlos E. Caicedo, James Joshi, Summit Tuladhar, "IPv6 Security Challenges," Vol(42), Issue(2), (Feb, 2009), IEEE Computer, Page(s): 36-42.

Ph.D. Dissertations

Hayajneh, Thaier (Advisor: P. Krishnamurthy), "Protocols for Detection and Removal of Wormholes for Secure Routing and Neighborhood Creation in Wireless Ad Hoc Networks". Doctoral Dissertation, University of Pittsburgh, 2009.

Posters

Hassan Takabi and James B. D. Joshi. "An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy." In Proc. 16th ACM Conference on Computer and Communications Security (CCS 2009)(Poster), Chicago, IL, USA, November 9-13, 2009.

2008

Books

Lin, Chih-kuang (Advisors: P. Krishnamurthy, V. Zadorozhny) "Channel Access Management in Data Intensive Sensor Networks. Doctoral Dissertation, University of Pittsburgh, 2008.

Yi Qian, J. Joshi, D. Tipper, P. Krishnamurthy, Information Assurance: Dependability and Security in Networked Systems, Morgan Kaufmann Publishers, an imprint of ELSEVIER, 2008.

J. Joshi (contributor), "Network Security: Know It All," Morgan Kaufmann Publishers, an imprint of ELSEVIER, 2008.

Book Chapters

James B.D. Joshi, Mei-Ling Shyu, Shu-Ching Chen, Walid Aref, Arif Ghafoor, "A Multimedia-Based Threat Management and Information Security Framework," in Multimedia Technologies: Concepts, Methodologies, Tools, and Applications (3 Volumes) Edited By: Mahbubur Rahman Syed, Minnesota State University, Mankato, USA, June, 2008

James Joshi et al (all editors), "Information Assurance," (Chapter 2), in Information Assurance: Survivability and Security in Networked Systems

James Joshi, Prashant Krisnamurthy, "Network Security," (Chapter 1), in Network Security: Know It All

Conference & Symposium Papers

Yue Zhang and James B.D. Joshi, "A Framework for User Authorization Query Processing in RBAC extended with Hybrid Hierarchy and Constraints", ACM symposium on access control models and technologies (SACMAT), Jun. 2008, Estes Park, CO.

K. Panyim and P. Krishnamurthy, "A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks," Proc. The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing CollaborateCom'08, Orlando, Nov. 2008

Minsoo Kim, James B.D. Joshi, Minkoo Kim, "Access Control for Cooperation Systems based on Group Situation", The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2008), Nov. 13-16, 2008, Orlando, FL, USA

Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi, "Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks," IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, June 11-13, 2008 Taichung, Taiwan.

Amirreza Masoumzadeh and James B. D. Joshi, "PuRBAC: Purpose-aware role-based access control," in Proc. 3rd Int'l Symposium on Information Security, Lecture Notes in Computer Science. Springer, Nov. 10-11 2008.

Youna Jung, Amirreza Masoumzadeh, James B.D. Joshi, Minkoo Kim, "RiBAC: Role Interaction based Access Control Model for Community Computing", The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom2008), Nov.13-16, 2008, Orlando, FL, USA.

Carlos E. Caicedo, James B. D. Joshi, "Security Issues in IPv6," ITERA-08, March 27-29, 2008

Yue Zhang and James B.D. Joshi, "Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy", IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications (TSP-08), Dec. 2008, ShangHai, China

Journal Articles

James, B.D. Joshi, Elisa Bertino, Arif Ghafoor and Yue Zhang, "Formal Foundations for hybrid hierarchies in GTRBAC", ACM Transactions on Information and System Security (TISSEC), Vol. 10, No. 4, Jan, 2008, pp. 1-39.

M.S. Theses

Gonzalez, Jesus (Advisor: P. Krishnamurthy), "Exploring Jamming Attacks Using OPNET 12.0." Master's Thesis, University of Pittsburgh, 2008.

Tuladhar, Summit Raj (Advisor: J. Joshi), "Inter-Domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks." Master's Thesis, University of Pittsburgh, 2008.

Ph.D. Dissertations

Anusas-amornkul, Tanapat (Advisor: P. Krishnamurthy), "On Detection Mechanisms and Their Performance for Packet Dropping Attack in Ad Hoc Networks. Doctoral Dissertation", University of Pittsburgh, 2008.

2007

Book Chapters

James B.D. Joshi, Siqing Du, Saubhagya R Joshi, "A Trust Based Access Control Management Framework for a Secure Grid Environment" in Book titled: Security in Distributed, Grid, and Pervasive Computing, Edited by Dr. Yang Xiao, to be published by Auerbach Publications, CRC Press 2007.

James B.D. Joshi, Prashant Krishnamurthy, "Network Security", a chapter for book Information Assurance: Dependability and Security in Networked Systems. Elsevier, Inc., 2007

Conference & Symposium Papers

Yue Zhang, James Joshi, "ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy," IEEE Proceedings of the International Conference on Information Reuse and Integration, Las Vegas, Aug13-15, 2007.

V. Chatzigiannakis, G. Androulidakis, K. Pelechrinis, S. Papavassiliou and V. Maglaris, "Data fusion algorithms for network anomaly detection: classification and evaluation", IEEE International Conference on Networking and Services, ICNS'07, Athens, Greece, June 2007.

Yue Zhang, James Joshi, "SRBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy," The Third International Symposium on Information Assurance and Security, August 29-31, 2007, Manchester, United Kingdom.

Oleshchuck, V., Zadorozhny, V. "Trust-Aware Query Processing in Data Intensive Sensor Networks." Proceedings of the International Conference on Sensor Technologies and Applications (SENSORCOMM'07), 2007.

Journal Articles

Yue Zhang, James Joshi, "SRBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy," The Third International Symposium on Information Assurance and Security, Journal of Information Assurance and Security 2007 (Volume 2, issue 4)

Ph.D. Dissertations

Vajanapoom, Korn (Advisor: D. Tipper). "Risk-based Survivable Network Design." Doctoral Dissertation, University of Pittsburgh, 2008.

Workshop Papers

Kai Ouyang James B. D. Joshi, "CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time," Third International Workshop on Information Assurance, New Orleans, April 2007.

2006

Book Chapters

James B.D. Joshi, S. R. Joshi, and S. M. Chandran, "Identity Management and Privacy Issues," in Encyclopedia of Digital Government, 2006.

James B.D. Joshi, S. R. Joshi, and S. M. Chandran, "Information Security Issues and Challenges," in Encyclopedia of Digital Government, 2006.

James B.D. Joshi, S. M. Chandran, A. Ghafoor, and W. G. Aref, "Survivability Issues and Challenges," in Encyclopedia of Digital Government, 2006.

Conference & Symposium Papers

Suroop M Chandran, Korporn Panyim, James B. D. Joshi, "A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments", The Fourth International Conference on Trust Management, (iTrust-06), May 16-19, Italy

Jun-Hyung Park, Min-Soo Kim, Bong-Nam Noh, James B. D. Joshi, "A Similarity based Technique for Detecting Malicious Executable files," IEEE Proceedings of the International Conference on Information Reuse and Integration, Hawaii, 2006.

Michael Chuang, Suronapee Phoomvuthisarn, James B. D. Joshi, "An Integrated Framework for Trust-Based Access Control for Open Systems," CollaborateCom 2006, GA, USA.

P. Keeratiwintakorn and P. Krishnamurthy, "Energy Efficient Security Services for Limited Wireless Devices," 1st IEEE International Symposium on Wireless Pervasive Computing, (ISWPC), Jan 16-18, 2006.

James B. D. Joshi, Elisa Bertino, "Fine-grained Role-based Delegation in Presence of Hybrid Role Hierarchy," The 11th ACM Symposium on Access Control Models and Technologies, USA, June 2006. 2006.

N. Swangmuang and P. Krishnamurthy, "Modeling Authentication Delay in WLANs," ITERA 2006 Conference on Telecommunications and IT, Las Vegas, March 2006.

Siqing Du, James B. D. Joshi, "Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy," The 11th ACM Symposium on Access Control Models and Technologies, USA, June 2006.

Journal Articles

P. Kiratiwintakorn and P. Krishnamurthy, "An Energy Efficient Security Protocol for IEEE 802.11 WLANs," Elsevier Pervasive and Mobile Computing Journal, 2006.

2005

Book Chapters

James B.D. Joshi, Mei-Ling Shyu, Shu-Ching Chen, Walid Aref, Arif Ghafoor, "A Multimedia-Based Threat Management and Information Security Framework," in eds: Elena Ferrari, Bhavani Thuraisingham in Web and Information Security, IDEA Group, 2005.

Conference & Symposium Papers

P. Kiratiwintakorn and P. Krishnamurthy, "An Energy Efficient Authentication and Key Management Protocol for IEEE 802.11 WLANs," Proc. Fifth International Conference on Information, Communications and Signal Processing (ICICS), Bangkok, December 6-9, 2005.

Suroop M Chandran, James B.D. Joshi, "LoT RBAC: A Location and Time-based RBAC Model", Proceedings of the 6th International Conference on Web Information Systems Engineering (WISE 2005), New York, Nov 2005.

Suroop M Chandran, James B.D. Joshi, "Towards Administration of a Hybrid Role Hierarchy", IEEE International Conference on Information Reuse and Integration, 2005.

Ph.D. Dissertations

Phongsak Prasithsangaree (Advisor: P. Krishnamurthy), "Energy Efficient Security Framework for Mobile Wireless Environments," Ph. D. Dissertation, April 15th, 2005.

Journal Articles

James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Analysis of Expressiveness and Design Issues for a Temporal Role Based Access Control Model," IEEE Transactions on Dependable and Secure Computing, April-June 2005.

Yu Liu, D. Tipper, and P. Siripongwutikorn, "Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing," ACM/IEEE Transactions on Networking, Vol. 13., No. 1, pp. 198-211, Feb., 2005

W. Grover and D. Tipper, "Design and Operation of Survivable Networks," Guest Editorial, Journal of Network and Systems Management, Special Issue on Designing and Managing Optical Networks and Service Reliability, Vol. 13, No. 1, March, 2005.

James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Formal Foundations for Hybrid Role Hierarchy", Submitted to ACM Transaction in Information and Systems Security.

P. Siripongwutikorn, S. Banerjee and D. Tipper, "Fuzzy Based Adaptive Bandwidth Control for Loss Guarantees," (Special Issue on Adaptive Learning Systems in Communication Networks) IEEE Transactions on Neural Networks, Vol. 16, No. 5., pp. 1147-1162, September 2005

James B.D. Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor, "Generalized Temporal Role Based Access Control Model," IEEE Transactions on Knowledge and Data Engineering, Vol 7, No. 1, Jan, 2005.

Basit Shafiq, James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Secure Interoperation in a Multi-Domain Environment Employing RBAC Policies," IEEE Transactions on Knowledge and Data Engineering. Vol. 17, No. 11, Pages 1557 - 1577, Nov. 2005.

Rafae Bhatti, James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "X-GTRBAC: An XML-based Policy Specification Framework and Architecture for Enterprise-Wide Access Control", ACM Transactions on Information and System Security, Vol. 8, No. 2, Pages 187-227, May 2005.

Rafae Bhatti, Basit Shafiq, James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control," ACM Transactions on Information and System Security, Vol. 8, No. 4, November 2005, Pages 388-423.

Posters

D. Tipper and P. Krishnamurthy, "A Mobile Applications Course," Poster at NSF Engineering and Computing Education Grantee PI Meeting, Washington, DC, Feb.16-18, 2005

Workshop Papers

Basit Shafiq, Ammar Masood, and Arif Ghafoor, James B.D. Joshi, "A Role-Based Access Control Policy Verification Framework for Real-Time Systems", IEEE WORDS-2005, 2005.

Smithi Piromruen, James B.D. Joshi, "An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environment," IEEE WORDS-2005, 2005.

Y. Lu, D. Tipper and K. Vajanapoom, "Spare Capacity Allocation in Multi-Layer Networks" Proceedings Fifth International Workshop on the Design of Reliable Communication Networks, (DRCN 2005), Oct.17-19, 2005, Ischia, Italy

C. Charnsripinyo and D. Tipper, "Topological Design of 3G Wireless Backhaul Networks for Service Assurance" Proceedings Fifth International Workshop on the Design of Reliable Communication Networks, (DRCN 2005), Oct. 17-19, 2005, Ischia, Italy

2004

Conference & Symposium Papers

H. Bin-Abbas and D. Tipper, "A Lyapunov Approach to Adaptive Capacity Allocation," Proceedings International Conference on Computing, Communications and Control Technology (CCCT 2004), Austin, Tx, Aug 17-19, 2004.

P. Prasithsangaree and P. Krishnamurthy, "A New Authentication Framework for Loosely Coupled 3G-WLAN Integrated Networks," IEEE Semiannual Vehicular Technology Conference (VTC Spring'04), Milan, Italy, May 17-19, 2004.

Y. Qian and D. Tipper, "Adaptive Channel Allocation Scheme for Next Generation Wireless Networks," Proceedings of IEEE Vehicular Technology Conference, Los Angeles, CA, Sept. 26-29,2004

X. Hou, D. Tipper, D. Yupho and J. Kabara, "Gossip-based Sleep Protocol for Energy Efficient Routing in Wireless Sensor Networks," Proceedings of 16th International Wireless Communications Conference, Calgary, AB, Canada, July 14-16, 2004.

P. Krishnamurthy, D.Tipper and Y. Qian, "Interaction of Security and Survivability in Hybrid Wireless Networks" Proceedings of IEEE Workshop on Information Assurance (WIA04) at the IEEE International Performance Computing and Communications Conference (IPCCC), Phoenix, AZ April, 2004

X. Hou, D. Tipper, and J. Kabara, "Label-based Multipath Routing (LMR) in Wireless Sensor Routing," Proceedings 6th International Symposium on Advanced Radio Technologies (ISART 04), Boulder, CO, March 2-4, 2004.

Rafae Bhatti, James B. D. Joshi, Elisa Bertino, Arif Ghafoor, "X-GTRBAC Admin: A Decentralized Administration Model for Enterprise Wide Access Control", The 9th ACM Symposium on Access Control Models and Technologies, New York, June 2004.

Journal Articles

James B.D. Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor, "An Access Control Language for Multidomain Environments", IEEE Internet Computing. Nov-Dec, 2004

Rafae Bhatti, James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "XML-Based Specification for Web Services Document Security", IEEE Computer, Vol. 37, Number 4, April, 2004, pp 41-49.

Patents

Y. Liu and D. Tipper, "Apparatus and Method for Spare Capacity Allocation," U.S. Patent 6,744,727 B2, June 1, 2004

Workshop Papers

C. Prommak, J. Kabara and D. Tipper, "Demand Based Network Planning for Large Scale WLANs," Proceedings First International Workshop on Broadband Wireless Services and Applications (BroadWISE 2004), Oct. 25, 2004.

D. Tipper, Y. Qian, and X. Hou, "Modeling the Time Varying Behavior of Mobile Ad Hoc Networks," Proceedings of ACM International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2004), Venice, Italy, Oct., 2004.

2003

Book Chapters

T. Dahlberg, D. Tipper, B. Cao, and C. Charnsripinyo, "Survivability in Wireless Mobile Networks," pp. 81-114 in Reliability, Survivability, and Quality of Large Scale Telecommunication Systems, Ed. P. Stavroulakis, John Wiley and Sons, London, England, 2003

Conference & Symposium Papers

Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb Znati, Rami G. Melhem, Daniel Moss. "A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks". Annual Simulation Symposium 2003 : 7-14

Rafae Bhatti, James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Access Control in Dynamic XML-based Web-Services with X-RBAC", The First International Conference on Web Services , Las Vegas, June 23-26, 2003.

P. Prasithsangaree and P. Krishnamurthy, "Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs," IEEE Global Communications Conference (Globecom 2003), December 1-5, 2003, San Francisco, CA.

James B.D. Joshi, Elisa Bertino, Basit Shafiq, Arif Ghafoor, "Dependencies and Separation of Duty Constraints in GTRBAC", 8th ACM Symposium on Access Control Models and Technologies , Como , Italy , June 2-3, 2003.

X. Hou and D. Tipper, "Impact of Failures on Routing in Mobile Ad Hoc Networks Using DSR," Proceedings of Communication Networks and Distributed Systems Modeling and Simulation Conference, Jan., 2003, Orlando, FL

Journal Articles

B. Jaeger and D. Tipper, "Prioritized Traffic Restoration in Connection Oriented QoS Based Networks," Computer Communications, Vol. 26, No. 18, pp.2025-2036, Dec., 2003

M.S. Theses

Sohail Hirani (Advisor: P. Krishnamurthy), "Energy Consumption of Encryption Schemes in Wireless Devices," MS Thesis, School of Information Sciences, University of Pittsburgh, April, 2003.

Ph.D. Dissertations

C. Charnsripinyo (Advisor: D. Tipper), "Design of Survivable Wireless Access Networks," Ph.D. Telecommunications. University of Pittsburgh, defended Sept. 29, 2003.

Workshop Papers

C. Charnsripinyo and D. Tipper, "Topological Design of Survivable Wireless Access Networks" to appear Proceedings Fourth International Workshop on the Design of Reliable Communication Networks, (DRCN 2003) Oct. 20-22, 2003, Banff, Canada

2002

Conference & Symposium Papers

C. Charnsripinyo and D. Tipper, "Designing Fault Tolerant Wireless Access Networks" Proceedings IEEE Military Communications Conference MILCOM 2002, Oct., 2002, Anaheim, CA

D. Tipper, C. Charnsripinyo, H. Shin, and T. Dahlberg, "Survivability Analysis for Mobile Cellular Networks," Proceedings Communication Networks and Distributed Systems Modeling and Simulation Conference 2002, San Antonio, Texas, Jan., 27-31, 2002

James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Temporal Hierarchy and Inheritance Semantics for GTRBAC", 7th ACM Symposium on Access Control Models and Technologies , California , USA , June 3-4, 2002.

Journal Articles

James B.D. Joshi, Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor, "A Model for Secure Multimedia Document Database System in a Distributed Environment", IEEE Transactions on Multimedia: Special Issue of on Multimedia Datbases, Vol. 4, No. 2, June , 2002.pages 215-234.

Yu Liu, D. Tipper, and P. Siripongwutikorn, "Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing," submitted to ACM/IEEE Transactions on Networking, Dec., 2002

D. Tipper, T. Dahlberg, H. Shin and C. Charnsripinyo, "Providing Fault Tolerance in Wireless Access Networks", IEEE Communications Magazine, Jan., 2002.

P. Krishnamurthy, J. F. Kabara, T. Anusas-amornkul, "Security in Wireless Residential Networks", IEEE Transactions on Consumer Electronics. Vol. 48, No. 1, 2002, pages 157-166.

Workshop Papers

James B.D. Joshi, Elisa Bertino, Arif Ghafoor, "Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model". 26th Annual International Computer Software and Applications Conference Workshop, (COMPSAC 2002 Workshop), Oxford, England , 26-29th August, 2002.

C. Prommak and D. Tipper, "Load Distribution Survivable Lightpath Routing for Optical Based Virtual Private Networks" Proceedings IEEE Workshop on High Performance Switching and Routing, (HPSR 2002), Kobe, Japan, May 26-29, 2002

2001

Conference & Symposium Papers

J. Joshi, A. Ghafoor, "A Petri-Net Based Multilevel Security Specification Mechanism for Multimedia Documents in a Multidomain Environment", The Second Annual Systems Security Engineering Conference, 28 Feb - Mar 2, 2001 , Orlando , FL

P. Krishnamurthy, J. Kabara, and D. Tipper, "A Wireless Information Assurance Architecture," Proceedings of Information Society Technologies (IST) Mobile Summit 2001, Sept., 2001, Barcelona, Spain.

Yu Liu, D. Tipper, P. Siripongwutikorn, "Approximating Optimal Spare Capacity Allocation by Successive Survivable Routing," Proceedings of IEEE INFOCOM 2001, Anchorage, AK, April 2001.

Yu Liu, and David Tipper, "Successive Survivable Routing for Node Failures," Proceedings IEEE GLOBECOM 2001, San Antonio, TX, Nov., 25-29, 2001

Journal Articles

B. Gronkinsky, D. Medhi and D. Tipper, "An Investigation of Adaptive Capacity Control Schemes in a Dynamic Traffic Environment," IEICE Transactions on Communication, Vol. E84-B, No. 2, Feb. 2001 pp: 262-274.

James B.D. Joshi, Arif Ghafoor, Walid Aref, Eugene H. Spafford, "Digital Government Security Infrastructure Design Challenges", IEEE Computer, Vol. 34, No. 2, February 2001, pages 66-72.

James B.D. Joshi, Walid G. Aref, Arif Ghafoor and Eugene H. Spafford, "Security models for web-based applications", Communications of the ACM , 44, 2 (Feb. 2001), Page 38-44.

Ph.D. Dissertations

Yu Liu (Advisor: D. Tipper), "Spare Capacity Allocation: Model, Analysis and Algorithms," Ph.D. Telecommunications, University of Pittsburgh, Dec. 2001.

Workshop Papers

Yu Liu and D. Tipper, "Spare Capacity Allocation for Non-Linear Cost and Failure Dependent Path Restoration," Proceedings of Third International Workshop on the Design of Reliable Communication Networks, Oct., 2001, Budapest, Hungary

H. Shin, C. Charnsripinyo, D. Tipper, and T. Dahlberg, "The Effects of Failures in PCS Networks," Proceedings of Third International Workshop on the Design of Reliable Communication Networks (DRCN 2001), Oct., 7-10, 2001, Budapest, Hungary

2000

Conference & Symposium Papers

W. Yurcik and D. Tipper "A Survivability Framework for Connection Oriented Group Communications," Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing 2000, (PRDC 2000) Los Angeles, CA, Dec., 2000.

D. Medhi and D. Tipper, "Multi-Layered Network Survivability - Models, Analysis, Architecture, Framework and Implementation: An Overview," Proceedings of DARPA Information Survivability Conference DISCEX’2000, IEEE Computer Society Press, Hilton Head, SC, Jan., 2000

W. Yurcik and D. Tipper "Providing Guaranteed Assurance to Connection-Oriented Group Communications Using Disjoint Routing," Proceedings Fifth International Symposium on High Assurance Systems Engineering, Albuquerque, NM, Nov., 2000.

W. Yurcik, D. Tipper, and D. Medhi, "Scalable and Survivable ATM Group Communications," Proceedings of the IEEE Military Communications Conference 2000, Los Angeles, CA, Oct., 2000.

P. Krishnamurthy and J. Kabara, "Security Architecture for Wireless Residential Networks" IEEE Vehicular Technology Conference'00, Boston , MA , September 2000.

A. Al-Rumaih, D. Tipper, Y. Liu, and B. Norman, "Spare Capacity Planning for Survivable Mesh Networks," Lecture notes in Computer Science 1815, Proceedings of the IFIFP Networking 2000, Paris, France, May, 2000.

P. Krishnamurthy and H. Karimi, "Telegeoinformatics for Efficient Resource Allocation and Protocol Development in Wireless Networking", IEEE Vehicular Technology Conference'00, Boston, MA, September 2000.

Ph.D. Dissertations

Bordin Sapsomboon (Advisor: M. Spring), "Shared Defect Detection: The Effects of Annotations in Asynchronous Software Inspection," Ph.D. Thesis, Department of Information Science and Telecommunications, University of Pittsburgh, 2000.

Bjorn Jager (Advisor: D. Tipper), "Traffic Restoration in Survivable Wide Area Communication Networks." Ph.D. Informatics, University of Bergen, Bergen, Norway, Sept., 2000.

Workshop Papers

W. Yurcik, D. Tipper, and D. Medhi, "The Use of Hop Limits to Provide Survivable ATM Group Communications," Proceedings of ACM Workshop on Networked Group Communications (NGC 2000), Stanford University, Nov. 2000, pp, 131-140.

Before 2000

Conference & Symposium Papers

A. Srikitja and D. Tipper, "On Providing Survivable QoS Services in the Next Generation Internet," Proceedings of the IEEE Military Communications Conference 1999, Atlantic City, NJ, Oct., 1999

D. Tipper, S. Ramaswamy, and T. Dahlberg, "PCS Network Survivability," Proceedings of the IEEE Wireless Communications and Networking Conference 1999, (WCNC’99) New Orleans, LA, Sept., 1999

G. Rogers, D. Medhi, W.-J. Hsin, S. Muppala, and D. Tipper, "Performance Analysis of Multicast and Priority-Based Routing Under a Failure in Differentiated Services Internet," Proceedings of the IEEE Military Communications Conference 1999, Atlantic City, NJ, Oct., 1999

B. Jager and D. Tipper, "On Fault Recovery Priority in ATM Networks," Proceedings of IEEE 1998 International Communications Conference, (ICC’98) Atlanta, GA, June, 1998.

A. Pitsillides, S. Nikolopoulos, and D. Tipper, "Addressing Network Survivability Issues by Finding the K-best Paths Through a Trellis Graph," Proceedings of IEEE INFOCOM '97, Kobe, Japan, April, 1997.

W. P. Wang, D. Tipper, B. Jaeger, and D. Medhi, "Fault Recovery Routing in Wide Area Packet Networks," Proceedings of 15th International Teletraffic Congress (ITC), Washington, D.C., June, 1997 (one of only four papers out of over 100 selected for Plenary Session Presentation).

R. Cotter, D. Medhi, and D. Tipper, "Traffic Backlog and Impact on Network Dimensioning for Survivability for Wide-Area VP-based ATM Networks," Proceedings of 15th International Teletraffic Congress, (ITC) Washington, D.C., June, 1997.

K. Balakrishnan, D. Tipper, and D. Medhi, "Routing Strategies for Fault Recovery in Wide Area Packet Networks," Proceedings of IEEE Milcom '95, San Diego, CA, Nov., 1995

K. Balakrishnan, D. Tipper, and J. Hammond, "An Analysis of the Timing of Traffic Restoration in Wide Area Communication Networks," Proceedings 14th International Teletraffic Congress, Antibes, France, June, 1994

D. Tipper, J. Hammond, S. Sharma, A. Khetan, K. Balakrishnan, and S. Menon, "An Analysis of the Congestion Effects of Link Failures in Wide Area Networks," Proceedings of IEEE INFOCOM '93, San Francisco, CA, April, 1993

Journal Articles

D. Medhi and D. Tipper, Guest Editorial, "Towards Fault Recovery and Management in Communication Networks," Journal of Network and Systems Management, Vol. 5, No. 2, June, 1997.

A. Pitsillides, J. Lambert, and D. Tipper, "Dynamic Bandwidth Allocation in Broadband - ISDN Using a Multilevel Optimal Control Approach," Telecommunication Systems, Vol. 4, No. 2, pp. 71-95, July, 1995

D. Tipper, J. Hammond, S. Sharma, A. Khetan, K. Balakrishnan, and S. Menon, "An Analysis of the Congestion Effects of Link Failures in Wide Area Networks," IEEE Journal on Selected Areas in Communications, Vol. 12, No. 1, pp. 179-192, Jan. 1994.

M.S. Theses

H. Shin (Advisor: D. Tipper), "PCS Network Survivability," M.S. Telecom, August 1999.

S. Ramaswamy (Advisor: D. Tipper), "A Framework for Survivability in Mobile Cellular and PCS," M.S.Telecom, July, 1997.

K. Balakrishnan (Advisor: D. Tipper), "An Analysis of Routing Strategies for Traffic Restoration in Wide Area Communication Networks," M.S.Cp.E., December 1992.

Ph.D. Dissertations

Adel Al-Rumaih (Advisor: D. Tipper), "A Spare Capacity Planning Methodology for Wide Area Survivable Networks," Ph.D. Information Science, University of Pittsburgh, May, 1999.