


default search action
Jaideep Vaidya
- > Home > Persons > Jaideep Vaidya
Publications
- 2025
- [j93]Gaurav Madkaikar
, Karthikeya S. M. Yelisetty
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Performance analysis of dynamic ABAC systems using a queuing theoretic framework. Comput. Secur. 154: 104432 (2025) - [c154]Anand Manojkumar Parikh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enabling Right to be Forgotten in a Collaborative Environment Using Permissioned Blockchains. DBSec 2025: 156-175 - 2024
- [j86]Mahendra Pratap Singh
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri:
A Role-Based Administrative Model for Administration of Heterogeneous Access Control Policies and its Security Analysis. Inf. Syst. Frontiers 26(6): 2255-2272 (2024) - [j85]H. O. Sai Varshith
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Efficiently Supporting Attribute-Based Access Control in Linux. IEEE Trans. Dependable Secur. Comput. 21(4): 2012-2026 (2024) - [c151]Mian Yang
, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
A Graph-Based Framework for ABAC Policy Enforcement and Analysis. DBSec 2024: 3-23 - [c150]Saptarshi De Chaudhury, Likhith Reddy, Matta Varun, Tirthankar Sengupta, Sandip Chakraborty, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Incentivized Federated Learning with Local Differential Privacy Using Permissioned Blockchains. DBSec 2024: 301-319 - [c148]Gaurav Madkaikar, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Queuing Theoretic Analysis of Dynamic Attribute-Based Access Control Systems. SEC 2024: 323-337 - 2023
- [j79]Eeshan Gupta, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Enabling Attribute-Based Access Control in NoSQL Databases. IEEE Trans. Emerg. Top. Comput. 11(1): 208-223 (2023) - 2022
- [c142]H. O. Sai Varshith, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri:
Enabling Attribute-Based Access Control in Linux Kernel. AsiaCCS 2022: 1237-1239 - [c137]Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural
, Jaideep Vaidya:
Contemporaneous Update and Enforcement of ABAC Policies. SACMAT 2022: 31-42 - [c136]Amshumaan Pericherla, Proteet Paul, Shamik Sural
, Jaideep Vaidya, Vijay Atluri:
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. SEC 2022: 360-376 - 2021
- [j70]Arindam Roy
, Shamik Sural
, Arun Kumar Majumdar
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Enabling Workforce Optimization in Constrained Attribute-Based Access Control Systems. IEEE Trans. Emerg. Top. Comput. 9(4): 1901-1913 (2021) - [j69]Arindam Roy, Shamik Sural
, Arun Kumar Majumdar, Jaideep Vaidya
, Vijayalakshmi Atluri:
Optimal Employee Recruitment in Organizations under Attribute-Based Access Control. ACM Trans. Manag. Inf. Syst. 12(1): 6:1-6:24 (2021) - [c129]Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural
:
Incremental Maintenance of ABAC Policies. CODASPY 2021: 185-196 - [c128]Eeshan Gupta, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri:
Attribute-Based Access Control for NoSQL Databases. CODASPY 2021: 317-319 - 2019
- [j62]Mahendra Pratap Singh, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. Comput. Secur. 86: 183-205 (2019) - [j60]Sadhana Jha, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Security analysis of ABAC under an administrative model. IET Inf. Secur. 13(2): 96-103 (2019) - [j59]Gunjan Batra, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Deploying ABAC policies using RBAC systems. J. Comput. Secur. 27(4): 483-506 (2019) - [j57]Saptarshi Das
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Policy Adaptation in Hierarchical Attribute-based Access Control Systems. ACM Trans. Internet Techn. 19(3): 40:1-40:24 (2019) - [c120]Augustee Meshram, Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
ABACaaS: Attribute-Based Access Control as a Service. CODASPY 2019: 153-155 - [c118]Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
, Gerhard Rigoll:
VisMAP: Visual Mining of Attribute-Based Access Control Policies. ICISS 2019: 79-98 - [c117]Gunjan Batra, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Policy Reconciliation and Migration in Attribute Based Access Control. ICISS 2019: 99-120 - [c116]Ronit Nath, Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijay Atluri
:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. SACMAT 2019: 25-35 - [c115]Mahendra Pratap Singh, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Security Analysis of Unified Access Control Policies. SKM 2019: 126-146 - [c114]Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Central Attribute Authority (CAA): A Vision for Seamless Sharing of Organizational Resources. TPS-ISA 2019: 209-217 - 2018
- [j53]Haritabh Gupta, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
A side-channel attack on smartphones: Deciphering key taps using built-in microphones. J. Comput. Secur. 26(2): 255-281 (2018) - [j52]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural
, Vijayalakshmi Atluri
:
Towards designing robust CAPTCHAs. J. Comput. Secur. 26(6): 731-760 (2018) - [j50]Sadhana Jha, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya
:
Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control. IEEE Trans. Inf. Forensics Secur. 13(4): 897-911 (2018) - [c113]Saptarshi Das
, Barsha Mitra, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Policy Engineering in RBAC and ABAC. From Database to Cyber Security 2018: 24-54 - [c112]Gunjan Batra, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Enabling the Deployment of ABAC Policies in RBAC Systems. DBSec 2018: 51-68 - [c106]Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. SACMAT 2018: 213-215 - 2017
- [j48]Barsha Mitra, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Migrating from RBAC to temporal RBAC. IET Inf. Secur. 11(5): 294-300 (2017) - [j46]Arindam Roy, Shamik Sural
, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri
:
On Optimal Employee Assignment in Constrained Role-Based Access Control Systems. ACM Trans. Manag. Inf. Syst. 7(4): 10:1-10:24 (2017) - [c104]Saptarshi Das
, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration. CIC 2017: 136-145 - [c103]Tanay Talukdar, Gunjan Batra, Jaideep Vaidya, Vijayalakshmi Atluri
, Shamik Sural
:
Efficient Bottom-Up Mining of Attribute Based Access Control Policies. CIC 2017: 339-348 - [c102]Haritabh Gupta, Shamik Sural
, Niloy Ganguly
, Jaideep Vaidya:
Friends are forever? Evolution of active friendship clusters in online social networks. COMSNETS 2017: 558-563 - [c101]Emre Uzun, Gennaro Parlato
, Vijayalakshmi Atluri
, Anna Lisa Ferrara, Jaideep Vaidya, Shamik Sural
, David Lorenzi:
Preventing Unauthorized Data Flows. DBSec 2017: 41-62 - [c99]Mayank Gautam, Sadhana Jha, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Poster: Constrained Policy Mining in Attribute Based Access Control. SACMAT 2017: 121-123 - [c97]David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural
, Vijayalakshmi Atluri
, Joseph Calca:
EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart. SEC 2017: 281-295 - 2016
- [j45]Barsha Mitra, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Mining temporal roles using many-valued concepts. Comput. Secur. 60: 79-94 (2016) - [j44]Barsha Mitra, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
A Survey of Role Mining. ACM Comput. Surv. 48(4): 50:1-50:37 (2016) - [c95]Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis. CIC 2016: 64-73 - [c93]Haritabh Gupta, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Deciphering Text from Touchscreen Key Taps. DBSec 2016: 3-18 - 2015
- [j41]Barsha Mitra, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
The generalized temporal role mining problem. J. Comput. Secur. 23(1): 31-58 (2015) - [j40]Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Meeting Cardinality Constraints in Role Mining. IEEE Trans. Dependable Secur. Comput. 12(1): 71-84 (2015) - [j38]Arindam Roy, Shamik Sural
, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri
:
Minimizing Organizational User Requirement while Meeting Security Constraints. ACM Trans. Manag. Inf. Syst. 6(3): 12:1-12:25 (2015) - [c89]Emre Uzun, David Lorenzi, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Migrating from DAC to RBAC. DBSec 2015: 69-84 - [c87]Sadhana Jha, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. ICISS 2015: 61-78 - [c86]Prasuna Sarana, Arindam Roy, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Role Mining in the Presence of Separation of Duty Constraints. ICISS 2015: 98-117 - [c83]Mahendra Pratap Singh
, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya, Ussama Yakub:
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing. NSS 2015: 221-235 - [c82]David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural
, Vijayalakshmi Atluri
:
Generating Secure Images for CAPTCHAs through Noise Addition. SACMAT 2015: 169-172 - [c81]David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural
, Vijayalakshmi Atluri
:
Enhancing the Security of Image CAPTCHAs Through Noise Addition. SEC 2015: 354-368 - 2014
- [j37]Sadhana Jha, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Security analysis of temporal RBAC under an administrative model. Comput. Secur. 46: 154-172 (2014) - [j34]Emre Uzun, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
, Anna Lisa Ferrara, Gennaro Parlato
, P. Madhusudan:
Security analysis for temporal role based access control. J. Comput. Secur. 22(6): 961-996 (2014) - [c75]Sadhana Jha, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies. ICISS 2014: 129-148 - 2013
- [j28]Manisha Sharma, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
AMTRAC: An administrative model for temporal role-based access control. Comput. Secur. 39: 201-218 (2013) - [c69]Barsha Mitra, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Toward Mining of Temporal Roles. DBSec 2013: 65-80 - [c68]Emre Uzun, Vijayalakshmi Atluri
, Jaideep Vaidya, Shamik Sural
:
Analysis of TRBAC with Dynamic Temporal Role Hierarchies. DBSec 2013: 297-304 - [c66]David Lorenzi, Jaideep Vaidya, Shamik Sural
, Vijayalakshmi Atluri
:
Web Services Based Attacks against Image CAPTCHAs. ICISS 2013: 214-229 - [c65]Manisha Sharma, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
An Administrative Model for Spatio-Temporal Role Based Access Control. ICISS 2013: 375-389 - 2012
- [c55]David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural
, Vijayalakshmi Atluri
:
Attacking Image Based CAPTCHAs Using Image Recognition Techniques. ICISS 2012: 327-342 - [c51]Emre Uzun, Vijayalakshmi Atluri
, Shamik Sural
, Jaideep Vaidya, Gennaro Parlato
, Anna Lisa Ferrara, Parthasarathy Madhusudan:
Analyzing temporal role based access control models. SACMAT 2012: 177-186 - [c48]John C. John, Shamik Sural
, Vijayalakshmi Atluri
, Jaideep Vaidya:
Role Mining under Role-Usage Cardinality Constraint. SEC 2012: 150-161

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-07-23 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint