Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Creators is "Joshi,James"

Displaying results 21 to 40 of 57.
Refine search | New search | Previous | 1 | 2 | 3 | Next
Order the results:
Export 57 results as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
21. Gonzalez, JM and Anwar, M and Joshi, JBD (2011) Trust-based approaches to solve routing issues in ad-hoc wireless networks: A survey. In: UNSPECIFIED.
[img]
22. Kaya, M and Joshi, JBD and Shyu, ML (2011) Guest editorial - Introduction to the special issue on information reuse and integration. Journal of Information and Knowledge Management, 10 (3). ISSN 0219-6492
[img]
23. Zargar, ST and Takabi, H and Joshi, JBD (2011) DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In: UNSPECIFIED.
[img]
Preview
[img]
24. Masoumzadeh, Amirreza and Joshi, James B.D. (2011) Anonymizing Geo-Social Network Datasets. In: 4th ACM Sigspatial International Workshope on Security and Privacy in GIS and LBS (SPRINGL '11), 01 November 2011 - 01 November 2011, Chilcago, Illinois, USA.
[img]
25. Baracaldo, Nathalie and Masoumzadeh, Amirreza and Joshi, James B.D. (2011) A secure, constraint-aware role-based access control interoperation framework. In: 2011 5th International Conference on Network and System Security (NSS), 06 September 2011 - 08 September 2011.
[img]
Preview
[img]
26. Long, Xuelian and Joshi, James (2011) BaRMS: A Bayesian Reputation Management Approach for P2P Systems. Journal of Information & Knowledge Management, 10 (03). 273 - 283. ISSN 0219-6492
[img]
27. Gonzalez, JM and Anwar, M and Joshi, JBD (2011) A trust-based approach against IP-spoofing attacks. In: UNSPECIFIED.
[img]
28. Jin, L and Takabi, H and Joshi, JBD (2011) Towards active detection of identity clone attacks on online social networks. In: UNSPECIFIED.
[img]
29. Gritzaliz, Dimitris and Joshi, James (2011) Editorial. Computers & Security, 30 (2-3). 89 - 90. ISSN 0167-4048
[img]
30. Gonzales, Jesus and Anwar, Mohd and Joshi, James B.D. (2011) A Trust-based Approach to Mitigate Rerouting Attacks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), 15 October 2011 - 18 October 2011, Orlando, FL, USA.
[img]
31. Jin, Lei and Takabi, Hassan and Joshi, James B.D. (2011) Analysing security and privacy issues of using e-mail address as identity. International Journal of Information Privacy, Security and Integrity (IJIPSI), 1 (1). 34 - 58. ISSN 1741-8496
[img]
Preview
[img]
32. Jin, Lei and Takabi, Hassan and Joshi, James B.D. (2011) Analysing security and privacy issues of using e-mail address as identity. International Journal of Information Privacy, Security and Integrity, 1 (1). 34 - 34. ISSN 1741-8496
[img]
33. Masoumzadeh, Amirreza and Joshi, James (2011) An Alternative Approach to k-Anonymity for Location-Based Services. In: UNSPECIFIED.
[img]
34. Masoumzadeh, Amirreza and Joshi, James B.D. (2011) Ontology-based access control for social network systems. International Journal of Information Privacy, Security and Integrity (IJIPSI), 1 (1). 59 - 78. ISSN 1741-8496
[img]
Preview
[img]
35. Taghavi Zargar, Saman and Takabi, Hassan and Joshi, James B.D. (2011) DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud. In: the 14th International Symposium on Recent Advances in Intrusion Detection, 20 September 2011 - 21 September 2011, Menlo Park, California, USA.
[img]
Preview
[img]
36. Takabi, Hassan and Joshi, James B.D. (2011) An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. In: The 27th Annual Computer Security Applications Conference (ACSAC 2011), 05 December 2011 - 09 December 2011, Orlando, Florida, USA.
[img]
37. Youna, Jung and Kim, Minsoo and Joshi, James B.D. (2011) DRiBAC: Context-Aware Dynamic Role Interaction Access Control. In: 12th International Conference of Information Reuse and Integration, 03 August 2011 - 05 August 2011, Las Vegas, Nevada, USA.
[img]
38. Takabi, H and Joshi, JBD and Ahn, GJ (2010) SecureCloud: Towards a comprehensive security framework for cloud computing environments. In: UNSPECIFIED.
[img]
39. Jin, L and Takabi, H and Joshi, JBD (2010) Security and privacy risks of using e-mail address as an identity. In: UNSPECIFIED.
[img]
40. Takabi, H and Joshi, JBD and Ahn, GJ (2010) Security and privacy challenges in cloud computing environments. IEEE Security and Privacy, 8 (6). 24 - 31. ISSN 1540-7993
[img]
Displaying results 21 to 40 of 57.
Refine search | New search | Previous | 1 | 2 | 3 | Next
Order the results: