Assured Information Sharing: Technologies, Challenges and Directions

[1]  Bhavani M. Thuraisingham Building Trustworthy Semantic Webs , 2009, IRI.

[2]  Bhavani M. Thuraisingham,et al.  Standards for secure data sharing across organizations , 2007, Comput. Stand. Interfaces.

[3]  Bhavani M. Thuraisingham,et al.  Dependable and secure TMO scheme , 2006, Ninth IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'06).

[4]  Bhavani M. Thuraisingham,et al.  Database and Applications Security: Integrating Information Security and Data Management , 2005 .

[5]  Bhavani M. Thuraisingham,et al.  Security standards for the semantic web , 2005, Comput. Stand. Interfaces.

[6]  Elisa Bertino,et al.  Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.

[7]  E. Schultz Book Review: The myth of Homeland security , 2003 .

[8]  Bhavani M. Thuraisingham,et al.  Web Data Mining and Applications in Business Intelligence and Counter-Terrorism , 2003 .

[9]  L. Spitzner,et al.  Honeypots: Tracking Hackers , 2002 .

[10]  Bhavani M. Thuraisingham,et al.  Information Survivability for Evolvable and Adaptable Real-Time Command and Control Systems , 1999, IEEE Trans. Knowl. Data Eng..

[11]  Bhavani Thuraisingham,et al.  Data Mining: Technologies, Techniques, Tools, and Trends , 1998 .

[12]  Ravi S. Sandhu,et al.  Role-Based Access Control Models , 1996, Computer.

[13]  Martin S. Olivier Self-protecting Objects in a Secure Federated Database , 1995, DBSec.

[14]  Bhavani M. Thuraisingham,et al.  An Adaptive Policy for Improved Timeliness in Secure Database Systems , 1995, DBSec.

[15]  Bhavani M. Thuraisingham Security issues for federated database systems , 1994, Comput. Secur..

[16]  A. J. Jones,et al.  Game Theory: Mathematical Models of Conflict , 1980 .