Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Creators is "Joshi,James"

Displaying results 21 to 40 of 58.
Refine search | New search | Previous | 1 | 2 | 3 | Next
Order the results:
Export 58 results as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
21. Gonzalez, JM and Anwar, M and Joshi, JBD (2011) Trust-based approaches to solve routing issues in ad-hoc wireless networks: A survey. In: UNSPECIFIED.
[img]
22. Kaya, M and Joshi, JBD and Shyu, ML (2011) Guest editorial - Introduction to the special issue on information reuse and integration. Journal of Information and Knowledge Management, 10 (3). ISSN 0219-6492
[img]
23. Long, X and Joshi, J (2011) BaRMS: A bayesian reputation management approach for P2P systems. In: UNSPECIFIED.
[img]
24. Masoumzadeh, A and Joshi, J (2011) Anonymizing geo-social network datasets. In: UNSPECIFIED.
[img]
25. Zargar, ST and Takabi, H and Joshi, JBD (2011) DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments. In: UNSPECIFIED.
[img]
Preview
[img]
26. Baracaldo, N and Masoumzadeh, A and Joshi, J (2011) A secure, constraint-aware role-based access control interoperation framework. In: UNSPECIFIED.
[img]
Preview
[img]
27. Joshi, J and Carminati, B (2011) Guest editorial SACMAT 2009 and 2010. ACM Transactions on Information and System Security, 14 (3). ISSN 1094-9224
[img]
Preview
[img]
28. Long, Xuelian and Joshi, James (2011) BaRMS: A Bayesian Reputation Management Approach for P2P Systems. Journal of Information & Knowledge Management, 10 (03). 273 - 283. ISSN 0219-6492
[img]
29. Gonzalez, JM and Anwar, M and Joshi, JBD (2011) A trust-based approach against IP-spoofing attacks. In: UNSPECIFIED.
[img]
30. Jin, L and Takabi, H and Joshi, JBD (2011) Towards active detection of identity clone attacks on online social networks. In: UNSPECIFIED.
[img]
31. Gritzaliz, D and Joshi, J (2011) Computers and Security: Editorial. Computers and Security, 30 (2-3). 89 - 90. ISSN 0167-4048
[img]
32. Masoumzadeh, A and Joshi, J (2011) An alternative approach to k-anonymity for location-based services. In: UNSPECIFIED.
[img]
33. Gonzales, Jesus and Anwar, Mohd and Joshi, James B.D. (2011) A Trust-based Approach to Mitigate Rerouting Attacks. In: 7th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2011), 15 October 2011 - 18 October 2011, Orlando, FL, USA.
[img]
34. Jin, Lei and Takabi, Hassan and Joshi, James B.D. (2011) Analysing security and privacy issues of using e-mail address as identity. International Journal of Information Privacy, Security and Integrity (IJIPSI), 1 (1). 34 - 58. ISSN 1741-8496
[img]
Preview
[img]
35. Jin, Lei and Takabi, Hassan and Joshi, James B.D. (2011) Analysing security and privacy issues of using e-mail address as identity. International Journal of Information Privacy, Security and Integrity, 1 (1). 34 - 34. ISSN 1741-8496
[img]
36. Masoumzadeh, Amirreza and Joshi, James B.D. (2011) Ontology-based access control for social network systems. International Journal of Information Privacy, Security and Integrity (IJIPSI), 1 (1). 59 - 78. ISSN 1741-8496
[img]
Preview
[img]
37. Taghavi Zargar, Saman and Takabi, Hassan and Joshi, James B.D. (2011) DCDIDP: A Distributed, Collaborative, and Data-driven IDP Framework for the Cloud. In: the 14th International Symposium on Recent Advances in Intrusion Detection, 20 September 2011 - 21 September 2011, Menlo Park, California, USA.
[img]
Preview
[img]
38. Takabi, Hassan and Joshi, James B.D. (2011) An Approach to Manage Policy Heterogeneity in Cloud Computing Environment. In: The 27th Annual Computer Security Applications Conference (ACSAC 2011), 05 December 2011 - 09 December 2011, Orlando, Florida, USA.
[img]
39. Youna, Jung and Kim, Minsoo and Joshi, James B.D. (2011) DRiBAC: Context-Aware Dynamic Role Interaction Access Control. In: 12th International Conference of Information Reuse and Integration, 03 August 2011 - 05 August 2011, Las Vegas, Nevada, USA.
[img]
40. Takabi, H and Joshi, JBD and Ahn, GJ (2010) SecureCloud: Towards a comprehensive security framework for cloud computing environments. In: UNSPECIFIED.
[img]
Displaying results 21 to 40 of 58.
Refine search | New search | Previous | 1 | 2 | 3 | Next
Order the results: