Henk C.A. van Tilborg is the Scientific Director of the research school EIDMA (Euler Institute for Discrete Mathematics and its Applications) and the Eindhoven Institute for the Protection of Systems and Information EIPSI. He is a board member of WIC (Werkgemeenschap voor Informatie en Communicatietheorie). Dr. van Tilborg received his M.Sc. () and Ph.D. degree () from the Eindhoven University of Technology, the Netherlands. He was working as associate professor at the university, before he became a full professor in. During – he also served a part-time professorship at the Dutch Open University. He has also been a visiting professor at California Institute of Technology, the University of Pretoria and Macquarie University and visiting scientist at the IBM Almaden Research Center and Bell Laboratories. He has been involved in the organization ofmany international conferences.He was the program committee co-chair of ISIT- (IEEE International Symposium on Information Theory), Germany. He was Program Committee Member of WCC, WCC, WCC, WCC, and WCC (Workshop on Coding theory and Cryptography). He has been the advisor of about Ph.D. and M.Sc. students in the area of coding theory and cryptography. Dr. van Tilborg has written three books, two on cryptology and one on coding theory. He is the (co-)author of more than articles in leading journals and also holds two patents. He is the Associate editor of Designs, Codes and Cryptography and Journal of Combinatorics, Information & System Sciences. From April –December he was the Associate editor for the Journal of the Indonesian Mathematical Society. He is also the Advisory editor of Advances in Mathematics of Communications since January and editor of the Asian-European Journal of Mathematics.Sushil Jajodia is University Professor, BDM International Professor of Information Technology, and the director of Center for Secure Information Systems at the George Mason University, Fairfax, Virginia. He served as the chair of the Department of Information and Software Engineering during -0.He joined GMU after serving as the director of the Database and Expert Systems Program within the Division of Information, Robotics, and Intelligent Systems at the National Science Foundation. Before that he was the head of the Database and Distributed Systems Section in the Computer Science and Systems Branch at the Naval Research Laboratory, Washington and Associate Professor of Computer Science and Director of Graduate Studies at the University of Missouri, Columbia. He has also been a visiting professor at the University of Milan and University of Rome “La Sapienza”, Italy and at the Isaac Newton Institute for Mathematical Sciences, Cambridge University, England. Dr. Jajodia received his Ph.D. from the University of Oregon, Eugene. The scope of his current research interests encompasses information secrecy, privacy, integrity, and availability problems in military, civil, and commercial sectors. He has authored six books, edited thirty four books and conference proceedings, and published more than technical papers in the refereed journals and conference proceedings. He is also a holder of eight patents and has several patent applications pending.He received the Kristian Beckman award from IFIP TC for his contributions to the discipline of Information Security, Outstanding Research Faculty Award from Mason’s Volgenau School of Engineering, and ACM SIGSAC Outstanding Contributions Award for his research and teaching contributions to the information security field and his service to ACM SIGSAC and the computing community. He was recognized for the most accepted papers at the th anniversary of the IEEE Symposium on Security and Privacy. His h-index is. Dr. Jajodia has served in different capacities for various journals and conferences. He serves on the editorial boards of IET Information Security, International Journal of Cooperative Information Systems, International Journal of Information and Computer Security, and International Journal of Information Security and Privacy. He was the founding editor-in-chief of the Journal of Computer Security (–) and a past editor of ACM Transactions on Information and Systems Security (–) and IEEE Transactions on Knowledge and Data Engineering. He is the consulting editor of the Springer International Series on Advances in Information Security. He has been named a Golden Core member for his service to the IEEE Computer Society, and received International Federation for Information Processing (IFIP) Silver Core Award “in recognition of outstanding services to IFIP” in.He is a past chair of the ACM Special Interest Group on Security, Audit, and Control (SIGSAC), IEEE Computer Society Technical Committee on Data Engineering, and IFIPWG. on Systems Integrity and Control. He is a seniormember of the IEEE and a member of IEEE Computer Society and Association for Computing Machinery.
44 Ebook di Sushil Jajodia
Ting Yu & Sushil Jajodia: Secure Data Management in Decentralized Systems
Database security is one of the classical topics in the research of information system security. Ever since the early years of database management systems, a great deal of research activity has been …
PDF
Inglese
€106.99
Lingyu Wang & Sushil Jajodia: Preserving Privacy in On-Line Analytical Processing (OLAP)
Preserving Privacy for On-Line Analytical Processing addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. OLAP systems usually need to meet two conflicting goals. First, the sen …
PDF
Inglese
€96.29
Michael Gertz & Sushil Jajodia: Handbook of Database Security
Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a la …
PDF
Inglese
€106.99
Sushil Jajodia & Peng Liu: Cyber Situational Awareness
Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading resea …
PDF
Inglese
€96.29
Henk C.A. van Tilborg & Sushil Jajodia: Encyclopedia of Cryptography and Security / Encyclopedia of Cryptography and Security
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptog …
PDF
Inglese
€593.81
Sushil Jajodia & Anup K. Ghosh: Moving Target Defense
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and ide …
PDF
Inglese
€96.29
Sushil Jajodia & Anup K. Ghosh: Moving Target Defense II
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks …
PDF
Inglese
€96.29
Sushil Jajodia & Krishna Kant: Secure Cloud Computing
This book presents a range of cloud computing security challenges and promising solution paths. The first two chapters focus on practical considerations of cloud computing. In Chapter 1, Chandramouli …
PDF
Inglese
€96.29
Lingyu Wang & Massimiliano Albanese: Network Hardening
This Springer Brief examines the tools based on attack graphs that help reveal network hardening threats. Existing tools detail all possible attack paths leading to critical network resources. Though …
PDF
Inglese
€53.49
Sushil Jajodia & Paulo Shakarian: Cyber Warfare
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundati …
PDF
Inglese
€128.39
Sushil Jajodia & V.S. Subrahmanian: Cyber Deception
This edited volume features a wide spectrum of the latest computer science research relating to cyber deception. Specifically, it features work from the areas of artificial intelligence, game theory, …
PDF
Inglese
€171.19
Lingyu Wang & Sushil Jajodia: Network Security Metrics
This book examines different aspects of network security metrics and their application to enterprise networks. One of the most pertinent issues in securing mission-critical computing networks is the …
PDF
Inglese
€96.29
Sushil Jajodia & Chandan Mazumdar: Information Systems Security
This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers pr …
PDF
Inglese
DRM
€63.06
Sushil Jajodia & William List: Integrity and Internal Control in Information Systems
Dear readers, Although it is well-known that confidentiality, integrity and availability are high- level objectives of information security, much of the attention in the security arena has been devot …
PDF
Inglese
DRM
€165.51
Sushil Jajodia & William List: Integrity and Internal Control in Information Systems
Integrity and Internal Control in Information Systems is a state-of-the-art book that establishes the basis for an ongoing dialogue between the IT security specialists and the internal control specia …
PDF
Inglese
DRM
€229.35
Sushil Jajodia: Database Security XII
New technology is always evolving and companies must have appropriate security for their business to be able to keep up-to-date with the changes. With the rapid growth in internet and www facilities, …
PDF
Inglese
DRM
€165.11
Sushil Jajodia & Leon Strous: Integrity and Internal Control in Information Systems VI
The development and integration of integrity and internal control mechanisms into information system infrastructures is a challenge for researchers, IT personnel and auditors. Since its beginning in …
PDF
Inglese
DRM
€115.00
Frederic Cuppens & Yves Deswarte: Security and Protection in Information Processing Systems
Security is probably the most critical factor for the development of the "Information Society". E-government, e-commerce, e-healthcare and all other e-activities present challenging securit …
PDF
Inglese
DRM
€57.47
Frederic Cuppens & Yves Deswarte: Information Security Management, Education and Privacy
This volume gathers the papers presented at three workshops that are embedded in the IFIP/Sec Conference in 2004, to enlighten specific topics that are currently particularly active in Security. The …
PDF
Inglese
DRM
€114.33
Sushil Jajodia & Peng Ning: Intrusion Detection in Distributed Systems
Intrusion Detection In Distributed Systems: An Abstraction-Based Approach presents research contributions in three areas with respect to intrusion detection in distributed systems. The first contribu …
PDF
Inglese
DRM
€57.78
Daniel Barbara & Sushil Jajodia: Applications of Data Mining in Computer Security
Data mining is becoming a pervasive technology in activities as diverse as using historical data to predict the success of a marketing campaign, looking for patterns in financial transactions to disc …
PDF
Inglese
DRM
€113.77
Zoran Duric & Sushil Jajodia: Information Hiding: Steganography and Watermarking-Attacks and Countermeasures
Information Hiding: Steganography and Watermarking – Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two …
PDF
Inglese
DRM
€115.00
Vijay Atluri & Binto George: Multilevel Secure Transaction Processing
Information security is receiving a great deal of attention as computers increasingly process more and more sensitive information. A multilevel secure database management system (MLS DBMS) is designe …
PDF
Inglese
DRM
€166.30
Sushil Jajodia & Larry Kerschberg: Advanced Transaction Models and Architectures
Motivation Modem enterprises rely on database management systems (DBMS) to collect, store and manage corporate data, which is considered a strategic corporate re- source. Recently, with the prolifera …
PDF
Inglese
DRM
€166.93
Sushil Jajodia & Peng Liu: Trusted Recovery and Defensive Information Warfare
Information security concerns the confidentiality, integrity, and availability of information processed by a computer system. With an emphasis on prevention, traditional information security research …
PDF
Inglese
DRM
€113.51
Raja Naeem Akram & Sushil Jajodia: Information Security Theory and Practice
This volume constitutes the refereed proceedings of the 9th IFIP WG 11.2 International Conference(formerly Workshop) on Information Security Theory and Practices, WISTP 2015, held in Heraklion, Crete …
PDF
Inglese
DRM
€57.36
Sushil Jajodia & Barbara Kordy: Graphical Models for Security
This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, Gra MSec 2015, held in Verona, Italy, in July 2015.T …
PDF
Inglese
DRM
€48.79
Sushil Jajodia & Peng Liu: Theory and Models for Cyber Situation Awareness
Today, when a security incident happens, the top three questions a cyber operation center would ask are: What has happened? Why did it happen? What should I do? Answers to the first two questions for …
EPUB
Inglese
DRM
€64.04
Elisa Bertino & Sushil Jajodia: Journal on Data Semantics II
The LNCS Journal on Data Semantics is devoted to the presentation of notable work that, in one way or another, addresses research and development on issues related to data semantics. Based on the hig …
PDF
Inglese
DRM
€57.49
Sushil Jajodia & Hideko S. Kunii: Conceptual Modeling – ER 2001
This book constitutes the refereed proceedings of the 20th International Conference on Conceptual Modeling, ER 2001, held in Tokohama, Japan, in November 2001.The 45 revised full papers presented tog …
PDF
Inglese
DRM
€114.52
Asuman Dogac & Sushil Jajodia: Advances in Multimedia Information Systems
This book constitutes the proceedings of the Fourth International Workshop on Mul timedia Information Systems (MIS’98) held in Istanbul, Turkey in September 1998. This workshop builds upon the succes …
PDF
Inglese
DRM
€57.05
Sushil Jajodia: Computer Security – ESORICS 2008
These proceedings contain the papers selected for presentation at the 13th European Symposium on Research in Computer Security–ESORICS 2008–held October 6-8, 2008 in Torremolinos (Malaga), Spain, a …
PDF
Inglese
DRM
€57.78
Claudio Bettini & Sushil Jajodia: Privacy in Location-Based Applications
Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of inform …
PDF
Inglese
DRM
€57.64
Sara Foresti & Sushil Jajodia: Data and Applications Security and Privacy XXIV
This book constitutes the proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, held in Rome Italy in June 2010. The 18 full and 11 short papers presented …
PDF
Inglese
DRM
€57.51
Sushil Jajodia & Jianying Zhou: Security and Privacy in Communication Networks
…
PDF
Inglese
DRM
€114.94
Jason Crampton & Sushil Jajodia: Computer Security — ESORICS 2013
This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.The 43 papers included in the book were carefull …
PDF
Inglese
DRM
€57.81
Frederic Cuppens & Nora Cuppens-Boulahia: ICT Systems Security and Privacy Protection
This book constitutes the refereed proceedings of the 29th IFIP TC 11 International Information Security and Privacy Conference, SEC 2014, held in Marrakech, Morocco, in June 2014. The 27 revised ful …
PDF
Inglese
DRM
€115.13
Sushil Jajodia & V.S. Subrahmanian: Multimedia Database Systems
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia data, the problem of how to store and retrieve such data is becoming increasingly important. Thus, al …
PDF
Inglese
DRM
€115.05
Claudio Bettini & Sushil Jajodia: Time Granularities in Databases, Data Mining, and Temporal Reasoning
Calendar units, such as months and days, clock units, such as hours and seconds, and specialized units, such as business days and academic years, play a major role in a wide range of information syst …
PDF
Inglese
DRM
€57.36
George Cybenko & Sushil Jajodia: Adversarial and Uncertain Reasoning for Adaptive Cyber Defense
Today’s cyber defenses are largely static allowing adversaries to pre-plan their attacks. In response to this situation, researchers have started to investigate various methods that make networked in …
EPUB
Inglese
DRM
€63.72
Sushil Jajodia & George Cybenko: Adaptive Autonomous Secure Cyber Systems
This book explores fundamental scientific problems essential for autonomous cyber defense. Specific areas include:
- Game and control theory-based moving target defenses (MTDs) and adaptive c …
PDF
Inglese
€160.49
Stelvio Cimato & Sushil Jajodia: Proceedings of the IFIP TC 11 23rd International Information Security Conference
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference (SEC 2008), co-located with IFIP World Computer Congress (WCC 2008), September …
PDF
Inglese
DRM
€166.30