JAIDEEP S. VAIDYA

JAIDEEP S. VAIDYA

Management Science & Information Systems Department
Rutgers University
1 Washington Park
Newark, New Jersey 07102
(973)353-1441
Email: jsvaidya_nospam@business_nojunk.rutgers.edu
(Also available as postscript and PDF.)

RESEARCH INTERESTS

My primary research interests lie in the fields of privacy, security, data analytics, data management, and especially at their intersection. As such, I am very interested in the field of secure information sharing and the application of secure computation technologies to diverse fields such as biomedical informatics, supply chain management and optimization, among others. I am also very interested in the problems and issues in big data analytics applied to different domains such as biomedical informatics, healthcare management, digital government, and information security.

AWARDS AND HONORS

EDUCATION

Purdue University West Lafayette, IN, USA
Ph.D., Computer Science, August 2004
Dissertation Topic:Privacy Preserving Data Mining over Vertically Partitioned Data. (Bib).
Privacy and security concerns can prevent sharing of data, derailing data mining projects. Distributed knowledge discovery, if done correctly, can alleviate this problem. The key is to obtain valid results, while providing guarantees on the (non)disclosure of data. We focus on vertically partitioned data: situations where different sites contain different attributes for a common set of entities. The key challenges are to propose provably secure solutions which are also practical. The thesis argues that it is indeed possible to have efficient and practical techniques for provably privacy-preserving mining of knowledge from large amounts of data. The dissertation presents several privacy preserving data mining algorithms operating over vertically partitioned data. The set of underlying techniques solving independent sub-problems are also presented. Together, these enable the secure "mining" of knowledge.
Advisor: Chris Clifton

M.S., Computer Science, May 2001

Mumbai University Mumbai, Maharashtra, India
B.S. in Computer Engineering, August 1999.
Term Project:Implemented in C, a Text to Speech Synthesis system for the Indian National Language, Hindi, in collaboration with Faculte Polytechnic de Mons, Belgium. Received a Special Commendation from the Principal of the College.

PROFESSIONAL EXPERIENCE

Rutgers, the State University of New Jersey September, 2004 - present
RBS Dean's Research Professor of Management Science and Information Systems. September, 2016 - present
Professor of Management Science and Information Systems. July, 2015 - August 2016
Interim Vice Chair, Management Science and Information Systems. July, 2014 - Jan, 2015
Associate Professor of Management Science and Information Systems. July, 2010 - June, 2015
Assistant Professor of Management Science and Information Systems. August, 2004 - June 2010

Princeton University September, 2015 - July, 2016
Visiting Fellow, Electrical Engineering Department. Hosted by Prof. Vincent Poor.

Purdue University August, 1999 - June, 2004
Research Assitant in the Department of Computer Sciences (affiliated with CERIAS and ICDS). Work included Ph.D. research with Prof. Chris Clifton and on Secure Multi-Party Computation issues as well as Graph Reachability Analysis with Prof. Mike Atallah.
Teaching Assistant for Computer Architecture, Compilers: Principles and Practice, graduate level Cryptography. Involves instructing laboratory sessions, grading and assisting students.

NEC C&C Research Labs May 2002 to August 2002
Summer Intern as part of the Content Aware Networks group. Work on security issues in content aware networks.
Mentor: Wen-Syan Li

Microsoft Corporation May 2000 to August 2000
Summer Intern as part of the Trident Team in the Internet Explorer Group. Core responsibility was to add W3C Document Object Model (DOM) Level 1 support to IE 6.0.

MONOGRAPH

Privacy Preserving Data Mining. Jaideep Vaidya, Chris Clifton, and Michael Zhu, in Advances in Information Security bookseries, Sushil Jajodia, Series Editor, Springer-Verlag. November 2005, ISBN:0-387-25886-8. (Bib).

BOOK CHAPTERS

  1. Statistical Databases, Nabil Adam, Haibing Lu, Jaideep Vaidya, and Basit Shafiq in Encyclopedia of Cryptography and Security, van Tilborg, Henk; Jajodia, Sushil (Eds.), Springer, 2011.
  2. Vertically Partitioned data, Jaideep Vaidya in Encyclopedia of Database Systems, Ozsu, M. Tamer; Liu, Ling (Eds.), Springer, December, 2009.
  3. Secure Multiparty Computation Methods, Murat Kantacioglu and Jaideep Vaidya in Encyclopedia of Database Systems, Ozsu, M. Tamer; Liu, Ling (Eds.), Springer, December, 2009.
  4. Chapter 14 - A Survey of Privacy-Preserving Methods across Vertically Partitioned Data, Jaideep Vaidya in Privacy-Preserving Data Mining: Models and Algorithms, Charu Aggarwal, Philip S. Yu, eds., Springer, 2008.
  5. Chapter 6 - Privacy, Profiling, Targeted Marketing, and Data Mining. Jaideep Vaidya and Vijay Atluri in Digital Privacy: Theory, Technologies, and Practices, Taylor and Francis, December 18, 2007.
  6. Chapter 14 - Defining Privacy for Data Mining. Chris Clifton, Murat Kantarcioglu and Jaideep Vaidya in Data Mining: Next Generation Challenges and Future Directions , AAAI/MIT Press, October 1, 2004.
  7. Privacy-Preserving Data Mining. Chris Clifton, Murat Kantarcioglu and and Jaideep Vaidya, invited chapter in Foundations and Advances in Data Mining, T.Y. Lin and Wesley Chu, eds., Springer-Verlag, October 2005.

JOURNAL ARTICLES

  1. Migrating from RBAC to Temporal RBAC, Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, IET Information Security, accepted, 2017.
  2. Privacy-Preserving Item-based Recommendations over Partitioned Data with Overlaps, Ibrahim Yakut and Jaideep Vaidya, International Journal of Business Information Systems, accepted, 2015.
  3. On Optimal Employee Assignment in Constrained Role Based Access Control Systems, Arindam Roy, Shamik Sural, Arun Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri, ACM Transactions on Management Information Systems, 7(4), pp. 10:1--10:24, January 2017.
  4. Mining Temporal Roles using Many-Valued Concepts, Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Computers & Security, 60, pp. 79 -- 94, July, 2016.
  5. A Survey of Role Mining, Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, ACM Computing Surveys, 48(4), pp. 50:1 -- 50:37, 2016.
  6. Accurate and Efficient Query Clustering via Top Ranked Search Results, Yuan Hong, Jaideep Vaidya, Haibing Lu, Wen Ming Liu, Web Intelligence, 14(2), pp. 119 -- 138, 2016.
  7. Using classification for role-based access control management, Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, Nino Verde, Janice Warner, International Journal of Technology, Policy and Management, 16(1), pp. 45-78, 2016.
  8. Minimizing Organizational User Requirement while Meeting Security Constraints, Arindam Roy, Shamik Sural, Arun Kumar Majumdar, Jaideep Vaidya, Vijayalakshmi Atluri, ACM Transactions on Management Information Systems, 6(3), pp. 12:1-12:25, October, 2015.
  9. PEER: A Framework for Public Engagement in Emergency Response, David Lorenzi, Soon Chun, Jaideep Vaidya, Vijayalakshmi Atluri, Nabil Adam, International Journal of E-Planning Research, 4(3) pp. 29-46, 2015.
  10. Collaborative Search Log Sanitization: Toward Differential Privacy and Boosted Utility, Yuan Hong, Jaideep Vaidya, Haibing Lu, Panagiotis Karras, Sanjay Goel, IEEE Transactions on Dependable and Secure Computing, 12(5), pp. 504-518, 2015.
  11. The Generalized Temporal Role Mining Problem, Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Journal of Computer Security, 23(1), pp. 31-58, 2015.
  12. Statistical Database Auditing Without Query Denial Threat, Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Yingjiu Li, INFORMS Journal on Computing, 27(1), pp. 20-34, 2015.
  13. Meeting Cardinality Constraints in Role Mining, Pullamsetty Harika, Marreddy Nagajyothi, John C. John, Shamik Sural, Jaideep Vaidya and Vijayalakshmi Atluri, IEEE Transactions on Dependable and Secure Computing, 12(1), pp. 71 - 84, 2015.
  14. Security Analysis for Temporal Role Based Access Control, Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, Anna Lisa Ferrara, Gennaro Parlato, P. Madhusudan, Journal of Computer Security, 22(6), pp. 961 - 996, 2014.
  15. Opinions of People: Factoring in Privacy and Trust Anirban Basu, Jaideep Vaidya, Juan Camilo Corena, Shinsaky Kiyomoto, Stephen Marsh, Guibing Guo, Jie Zhang, Yutaka Miyake, ACM SIGAPP Applied Computing Review, 14(3), pp. 7-21, September, 2014.
  16. Security Analysis of Temporal RBAC under an Administrative Model Sadhana Jha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri, Computers & Security, 46, pp. 154-172, October 2014.
  17. A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications, Yuan Hong, Jaideep Vaidya, Shengbin Wang, Journal of Information Systems, 28(1), pp.243-268, Spring 2014, American Accounting Association.
  18. A Random Decision Tree Framework for Privacy-preserving Data Mining, Jaideep Vaidya, Basit Shafiq, Wei Fan, Danish Mehmood, David Lorenzi, IEEE Transactions on Dependable and Secure Computing, 11(5), pp. 399-411, 2014.
  19. Private Searching on Streaming Data Based on Keyword Frequency, Xun Yi, Elisa Bertino, Jaideep Vaidya, Chaoping Xing, IEEE Transactions on Dependable and Secure Computing, 11(2), pp. 155-167, 2014. (Bib)
  20. Inappropriate Access Detection for Electronic Health Records Using Collaborative Filtering, Aditya Menon, Xiaoqian Jiang, Jihoon Kim, Jaideep Vaidya, Lucila Ohno-Machado, Machine Learning Journal special issue: Machine Learning for Science and Society, 95(1), pp. 87-101, 2014. (Bib)
  21. An Optimization Framework for Role Mining, Haibing Lu, Jaideep Vaidya, and Vijayalakshmi Atluri, Journal of Computer Security, 22(1), pp. 1-31, January, 2014.
  22. Enhancing the Government Service Experience through QR Codes on Mobile Platforms, David Lorenzi, Jaideep Vaidya, Soon Chun, Basit Shafiq, and Vijayalakshmi Atluri, Government Information Quarterly, 31(1), pp. 6-16, January, 2014.
  23. An Inference-proof Approach to Privacy-preserving Horizontally Partitioned Linear Program, Yuan Hong and Jaideep Vaidya, Optimization Letters, 8(1), pp. 267-277, January, 2014. (Bib)
  24. AMTRAC: An Administrative Model for Temporal Role-based Access Control, Manisha Sharma, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, Computers & Security, Volume 39, Part B, pp. 201-218, 2013.
  25. Privacy preserving collaborative filtering for SaaS enabling PaaS clouds, Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, Theo Dimitrakos, and Srijith Nair, Journal of Cloud Computing: Advances, Systems and Applications, 1:8, 2012.
  26. Secure and Efficient Distributed Linear Programming, Yuan Hong, Jaideep Vaidya, and Haibing Lu, Journal of Computer Security, 20(5), pp. 583-634, 2012. (Bib)
  27. Constraint-Aware Role Mining Via Extended Boolean Matrix Decomposition, Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, and Yuan Hong, IEEE Transactions on Dependable and Secure Computing, Special Issue on Data & Application Security (DAS), 9(5), pp. 655-669, 2012, IEEE Computer Society, Los Alamitos, CA.
  28. Semantics Based Automated Service Discovery Aabhas Paliwal, Basit Shafiq, Jaideep Vaidya, Hui Xiong, and Nabil Adam, in IEEE Transactions on Services Computing, 5(2), 2012, pp. 260-275, IEEE Computer Society, Los Alamitos, CA.
  29. Structure-Aware Graph Anonymization, Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, and Vijay Atluri, Web Intelligence and Agent Systems, 10(2), pp. 193 - 208, April, 2012, IOS Press, NL.
  30. Resource Sharing using DHS-UICDS Framework for Incident Management, Vijayalakshmi Atluri, Basit Shafiq, Soon Chun, Ghulam Nabi, and Jaideep Vaidya, Transforming Government: People, Process and Policy, 6(1), pp. 41 - 61, 2012.
  31. Efficient Privacy-Preserving Collaborative Filtering Based on the Weighted Slope One Predictor, Anirban Basu, Jaideep Vaidya, and Hiroaki Kikuchi, in the Journal of Internet Services and Information Security (JISIS), 1(4), November 2011, pp. 26-46.
  32. A Profile Anonymization Model for Location Based Services, Heechang Shin, Jaideep Vaidya, and Vijayalakshmi Atluri, Journal of Computer Security, 19(5), 2011, pp. 795-833, IOS Press, NL.
  33. Secure Construction and Publication of Contingency Tables from Distributed Data, Xiaoyun He, Haibing Lu, Jaideep Vaidya, and Nabil Adam, Journal of Computer Security, 19(3), pp. 453-484, May 2011, IOS Press, NL.
  34. Similar Document Detection with Limited Information Disclosure, Mummoorthy Murugesan, Wei Jiang, Chris Clifton, Luo Si, and Jaideep Vaidya, International Journal of Very Large Data Bases (VLDB Journal), 19(4), pp. 457-475, August, 2010, VLDB Endowment.
  35. Privacy Preserving Integration of Health Care Data, Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, Thomas White, International Journal of Computational Models and Algorithms in Medicine, 1(2), special issue on Privacy and Security Issues for Medical Data, pp. 22-36, 2010, IGI Global.
  36. Spatial neighborhood based anomaly detection in sensor datasets Vandana Janeja, Nabil R. Adam, Vijayalakshmi Atluri and Jaideep Vaidya, Data Mining and Knowledge Discovery, special issue on Outlier Detection, 20(2), March 2010, pp. 221-258, Springer.
  37. A Unified Index Structure for Efficient Enforcement of Spatiotemporal Authorizations Vijayalakshmi Atluri, Qi Guo, Heechang Shin, and Jaideep Vaidya, International Journal of Information and Computer Security, 4(2), August 2010, pp. 118 - 151, Inderscience.
  38. Role Engineering via Prioritized Subset Enumeration. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner, and Qi Guo, IEEE Transactions on Dependable and Secure Computing, 7(3), pp. 300-314, July-September, 2010, IEEE Computer Society. (Bib).
  39. The Role Mining Problem: A Formal Perspective, Jaideep Vaidya, Vijayalakshmi Atluri, and Qi Guo, ACM Transactions on Information Systems Security, 13(3), pp. 1-31, 2010, ACM. (Invited extension of SACMAT '07 paper). (Bib).
  40. Anonymization Models for Directional Location Based Service Environments, Heechang Shin, Jaideep Vaidya, and Vijayalakshmi Atluri, Computers and Security, 29(1), pp. 59-73, February 2010, Elsevier. (Bib).
  41. Privacy-Preserving Indexing of Documents on the Network. Mayank Bawa, Roberto J. Bayardo, Rakesh Agrawal, and Jaideep Vaidya, The International Journal of Very Large Data Bases (VLDB Journal), 18(4), pp. 837-856, August 2009, VLDB Endowment. (Bib).
  42. Edge-EMP: Minimizing administrative assignments for role-based access control. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Haibing Lu, Journal of Computer Security, 17(2), pp. 211-235, 2009, IOS Press, NL. (Bib).
  43. Privacy-Preserving Kth Element Score over Vertically Partitioned Data. Jaideep Vaidya, and Chris Clifton, IEEE Transactions on Knowledge and Data Engineering, 21(2), 2009, pp. 253-258, IEEE Computer Society. (Bib).
  44. Privacy Preserving Decision Tree Classification over Vertically Partitioned Data. Jaideep Vaidya, Chris Clifton, Murat Kantarcioglu and A. Scott Patterson, ACM Transactions on Knowledge Discovery in Databases, 2(3), October, 2008, ACM. (Bib).
  45. Efficient Security Policy Enforcement for the Mobile Environment. Vijayalakshmi Atluri, Heechang Shin, and Jaideep Vaidya, Journal of Computer Security, 16(4), pp. 439-475, 2008, IOS Press, NL. (Bib).
  46. Privacy Preserving Naive Bayes Classification. Jaideep Vaidya, Murat Kantarcioglu, and Chris Clifton, International Journal on Very Large Data Bases, 17(4), pp. 879-898, July, 2008, Springer-Verlag, GmbH. (Bib).
  47. An Approach to Identifying Beneficial Collaboration Securely in Decentralized Logistics Systems. Chris Clifton, Ananth Iyer, Richard Cho, Wei Jiang, Murat Kantarcioglu, and Jaideep Vaidya, Manufacturing & Service Operations Management, 10(1), Winter 2008, pp. 108-125, INFORMS, Linthicum, Maryland. (Bib).
  48. Privacy Preserving SVM Classification. Jaideep Vaidya, Hwanjo Yu and Xiaoqian Jiang, in Knowledge and Information Systems, Springer, 14(2), pp. 161-178, February, 2008. (Bib).
  49. Secure Set Intersection Cardinality with Application to Association Rule Mining. Jaideep Vaidya and Chris Clifton, Journal of Computer Security, 13(4), IOS Press, November 2005, pp. 593 - 622. (Bib).
  50. Privacy-Preserving Data Mining: Why, How, and When?. Jaideep Vaidya and Chris Clifton, in IEEE Security & Privacy, New York, NY, 2(6), pp. 19-27, November/December 2004. (Bib).
  51. Tools for Privacy Preserving Distributed Data Mining. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, and Michael Zhu in ACM SIGKDD Explorations 4(2), December 2002. Invited paper. (Bib).

REFEREED CONFERENCES AND WORKSHOPS

  1. Sentiment based Analysis of Tweets during the US Presidential Elections, Ussama Yaqub, Soon Ae Chun, Vijay Atluri and Jaideep Vaidya, in Proceedings of the 18th Annual International Conference on Digital Government Research (dg.o 2017), June 7-9, 2017, Staten Island, NY, USA.
  2. EmojiTCHA: Using Emotion Recognition to Tell Computers and Humans Apart, David Lorenzi, Jaideep Vaidya, Achyuta Aich, Shamik Sural, Vijayalakshmi Atluri, Joseph Calca, in Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), May 29-31, 2017, Rome, Italy.
  3. Evaluating the Privacy Implications of Frequent Itemset Disclosure, Edoardo Serra, Jaideep Vaidya, Haritha Akella, and Ashish Sharma, in Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), May 29-31, 2017, Rome, Italy.
  4. Secure and Efficient k-NN Queries, Hafiz Asif, Jaideep Vaidya, Basit Shafiq, Nabil Adam, in Proceedings of the 32nd International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2017), May 29-31, 2017, Rome, Italy.
  5. Friends are Forever? Evolution of Active Friendship Clusters in Online Social Networks, Haritabh Gupta, Shamik Sural, Niloy Ganguly, Jaideep Vaidya, in Proceedings of the Social Networking Workshop held in conjunction with the 9th International Conference on COMmunication Systems \& NETworkS (COMSNETS), January 8, Bengaluru, India.
  6. An Administrative Model for Collaborative Management of ABAC Systems and its Security Analysis'' (Invited paper), Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, and Jaideep Vaidya, in Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, Nov 1-3, 2016, Pittsburgh, PA, USA.
  7. Collaborative Differentially Private Outlier detection for Categorical Data, Hafiz Asif, Tanay Talukdar, Jaideep Vaidya, Basit Shafiq, and Nabil Adam, in Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, Nov 1-3, 2016, Pittsburgh, PA, USA.
  8. Towards a shared scientific data infrastructure: a secure multiparty computation based perspective'' (extended abstract), Jaideep Vaidya and John Marcotte, SciDataCon, 11-13 September, 2016, Denver, CO, USA.
  9. Efficient Evaluation of Authorizations for Video Data, Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya, in Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016.
  10. PrefRank: quantification and aggregation of subjective user preferences, Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, in Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16), August 23-26, 2016, Tianjin, China.
  11. Deciphering Text from Touchscreen Key Taps, Haritabh Gupta, Shamik Sural, Vijayalakshmi Atluri and Jaideep Vaidya, in Proceedings of the 30th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC), July 18-21, 2016, Trento, Italy.
  12. Role Mining in the Presence of Separation of Duty Constraints, Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri, in Proceedings of the 11th International Conference on Information Systems Security (ICISS 2015), December 16-20, 2015, Kolkata, India.
  13. Enforcing Separation of Duty in Attribute based Access Control Systems, Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, in Proceedings of the 11th International Conference on Information Systems Security (ICISS 2015), December 16-20, 2015, Kolkata, India.
  14. Managing Multi-dimensional Multi-granular Security Policies using Data Warehousing, Mahendra Pratap Singh, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya, Ussama Yakub, in Proceedings of the 9th International Conference on Network and System Security, November 3-5, 2015, New York City, USA.
  15. A framework for policy similarity evaluation and migration based on change detection, Jaideep Vaidya, Basit Shafiq, Vijayalakshmi Atluri, David Lorenzi, in Proceedings of the 9th International Conference on Network and System Security, November 3-5, 2015, New York City, USA.
  16. Preserving Privacy in Collaborative Business Process Composition, Hassaan Irshad, Basit Shafiq, Jaideep Vaidya, Muhammad Ahmed Bashir, Shafay Shamail and Nabil Adam, in Proceedings of the 12th International Conference on Security and Cryptography (SECRYPT), July 20-22, 2015, Colmar, Alsace, France. Best Paper Award.
  17. Migrating from DAC to RBAC, Emre Uzun, David Lorenzi, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural, in Proceedings of the 29th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC), July 13-15, 2015, Fairfax, VA, USA.
  18. Enhancing the Security of Image CAPTCHAs through Noise Addition, David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri, in Proceedings of the IFIP International Information Security and Privacy Conference (IFIP SEC), May 26-28, 2015, Hamburg, Germany.
  19. Lightweight practical private one-way anonymous messaging, Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura, in Proceedings of the 9th IFIP WG 11.11 International Conference on Trust Management, May 26-29, 2015, Hamburg, Germany.
  20. Practical Private One-way Anonymous Message Routing, Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake, Poster paper in Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015), April 14-17, 2015, Singapore.
  21. Efficient Integrity Verification for Outsourced Collaborative Filtering, Jaideep Vaidya, Ibrahim Yakut, Anirban Basu, in Proceedings of the IEEE International Conference on Data Mining (ICDM), December 14 - 17, 2014, Shenzhen, China.
  22. CF-inspired privacy-preserving prediction of next location in the cloud, Anirban Basu, Juan Camilo Corena, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Shinsaku Kiyomoto, Jaideep Vaidya, and Yutaka Miyake, Poster Paper, in Proceedings of the 6th IEEE International Conference on Cloud Computing Technology and Science, December 15 - 18, 2014, Singapore.
  23. Temporal RBAC Security Analysis using Logic Programming in the Presence of Administrative Policies, Sadhana Jha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri, in Proceedings of the 10th International Conference on Information Systems Security (ICISS 2014), December 16 - 20, 2014, Hyderabad, India.
  24. Teaching Privacy in an Interactive Fashion, Jaideep Vaidya, David Lorenzi, Basit Shafiq, Soon Chun, in Proceedings of the 2014 Information Security Curriculum Development Conference, October 11, 2014, Kennesaw, GA, USA.
  25. More Data, More Security Challenges: Integrating Analytics in to the Information Security Curriculum, Nazia Badar, Jaideep Vaidya, in Proceedings of the 2014 Information Security Curriculum Development Conference, October 11, 2014, Kennesaw, GA, USA.
  26. Utilizing social media to improve local government responsiveness, David Lorenzi, Jaideep Vaidya, Basit Shafiq, Soon Chun, Neelima Vegesna, Zamil Alzamil, Nabil Adam, Seth Wainer, and Vijayalakshmi Atluri, in Proceedings of the 15th Annual International Conference on Digital Government Research (dg.o '14), pp. 236-244, June 18-21, 2014, Aguascalientes City, Mexico.
  27. PrefRank: fair aggregation of subjective user preferences, Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, and Yutaka Miyake, Poster Paper, in Proceedings of the 29th Symposium On Applied Computing, Recommender Systems: Theory and Applications Track, March 24 - 28, 2014, Gyeongju, Korea.
  28. Privacy preserving trusted social feedback, Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang and Yutaka Miyake, in Proceedings of the 29th Symposium On Applied Computing, Trust, Reputation, Evidence and other Collaboration Know-How Track, March 24 - 28, 2014, Gyeongju, Korea.
  29. Web Services Based Attacks against Image CAPTCHAs, David Lorenzi, Jaideep Vaidya, Shamik Sural and Vijay Atluri, in Proceedings of the 9th International Conference on Information Systems Security (ICISS 2013), 16-20 December 2013, ISI Kolkata, India.
  30. An Administrative Model for Spatio-Temporal Role based Access Control, Manisha Sharma, Shamik Sural, Vijay Atluri and Jaideep Vaidya, in Proceedings of the 9th International Conference on Information Systems Security (ICISS 2013), 16-20 December 2013, ISI Kolkata, India.
  31. Differentially Private Naive Bayes Classification, Jaideep Vaidya, Basit Shafiq, Anirban Basu, and Yuan Hong, in Proceedings of the 2013 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2013), 17-20 November 2013, Atlanta, GA, USA.
  32. Incorporating Privacy into the Undergraduate Curriculum, Jaideep Vaidya, Basit Shafiq, David Lorenzi, and Nazia Badar, in Proceedings of the 2013 Information Security Curriculum Development Conference, October 11-12, 2013, Kennesaw, GA, USA.
  33. Toward Mining of Temporal Roles, Barsha Mitra, Shamik Sural, Vijayalakshmi Atluri, and Jaideep Vaidya, in Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, July 15-17, 2013, Newark, NJ, USA.
  34. Analysis of TRBAC with Dynamic Temporal Role Hierarchies, Emre Uzun, Vijayalakshmi Atluri, Jaideep Vaidya, and Shamik Sural, in Proceedings of the 27th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, July 15-17, 2013, Newark, NJ, USA.
  35. Privacy-preserving collaborative filtering on the cloud -- practical implementation experiences, Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, and Theo Dimitrakos, in Proceedings of the 6th IEEE International Conference on Cloud Computing (CLOUD 2013), Applications and Experiences track, June 27 - July 2, 2013, Santa Clara, CA, USA.
  36. Community Based Emergency Response, David Lorenzi, Jaideep Vaidya, Soon Chun, Basit Shafiq, Varuna Naik, Vijayalakshmi Atluri, and Nabil Adam, in Proceedings of the 14th Annual International Conference on Digital Government Research (dg.o '13), Laval University, Quebec City, Quebec, Canada.
  37. Identifying Inference Attacks Against Healthcare Data Repositories, Jaideep Vaidya, Basit Shafiq, Xiaoqian Jiang, and Lucila Ohno-Machado, in Proceedings of the AMIA Clinical Research Informatics Summit, March 20-22, San Francisco, CA, USA.
  38. Attacking Image based CAPTCHAs using Image Recognition Techniques, David Lorenzi, Jaideep Vaidya, Emre Uzun, Shamik Sural and Vijay Atluri, in Proceedings of the 8th International Conference on Information Systems Security (ICISS '12), Guwahati, India, December 15-19, 2012. (Bib).
  39. Secure Composition of Cascaded Web Services, Basit Shafiq, Soon Ae Chun, Jaideep Vaidya, Nazia Badar and Nabil Adam, in Proceedings of the 8th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom '12), Pittsburgh, Pennsylvania, United States, October 14-17, 2012. (Bib).
  40. Risk based Access Control using Classification, Nazia Badar, Jaideep Vaidya, Vijayalakshmi Atluri, and Basit Shafiq, in Proceedings of the 5th Symposium on Configuration Analytics and Automation (SafeConfig 2012), Baltimore, Maryland, United States, October 3-4, 2012.
  41. Anonymizing set-valued data by nonreciprocal recoding, Mingqiang Xue, Panagiotis Karras, Chedy Raissi, Jaideep Vaidya, Kian-Lee Tan, in Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '12), Beijing, China, August 12-16, 2012.
  42. Privacy-Preserving Subgraph Discovery, Danish Mehmood, Basit Shafiq, Jaideep Vaidya, Yuan Hong, Nabil Adam, and Vijayalakshmi Atluri, in Proceedings of the 26th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec'12), July 11-13, 2012, Institut Mines-Telecom, Paris, France. (Bib).
  43. Analyzing Temporal Role Based Access Control Models, Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Madhusudan Parthasarathy, Gennaro Parlato, and Anna Lisa Ferrera, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT '12), June 20-22, 2012, Newark, NJ, USA.
  44. A framework for Verification and Optimal Reconfiguration of Event-driven Role Based Access Control Policies, Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, and Elisa Bertino, in Proceedings of the 17th ACM Symposium on Access Control Models and Technologies (SACMAT '12), June 20-22, 2012, Newark, NJ, USA.
  45. Using QR Codes for Enhancing the Scope of Digital Government Services, David Lorenzi, Jaideep Vaidya, Soon Chun, Basit Shafiq, Ghulam Nabi, and Vijayalakshmi Atluri, in Proceedings of the 13th Annual International Conference on Digital Government Research (dg.o '12), University of Maryland, College Park, MD, USA.
  46. Role Mining under Role-Usage Cardinality Constraint, John C. John, Shamik Sural, Vijayalakshmi Atluri, and Jaideep Vaidya, in Proceedings of the IFIP International Information Security and Privacy Conference (SEC 2012), June 4-6, 2012, Heraklion, Crete, Greece. (Bib).
  47. Perturbation based privacy preserving Slope One predictors for collaborative filtering, Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, and Theo Dimitrakos, in Proceedings of the 6th IFIP WG 11.11 International Conference on Trust Management, May 21-25, 2012, Surat, India. (Bib).
  48. Differentially Private Search Log Sanitization with Optimal Output Utility, Yuan Hong, Jaideep Vaidya, Haibing Lu, and Mingrui Wu, in Proceedings of the 15th International Conference on Extending Database Technology (EDBT), March 26-30, 2012, Berlin, Germany. (Bib).
  49. Feasibility of a privacy preserving collaborative filtering scheme on the Google App Engine - a performance case study, Anirban Basu, Jaideep Vaidya, Theo Dimitrakos, and Hiroaki Kikuchi, in Proceedings of the 27th ACM Symposium on Applied Computing (SAC), Cloud Computing Track, Mar 26-30, 2012, Trento, Italy. (Bib).
  50. Role Engineering: From Theory to Practice, Nino Verde, Jaideep Vaidya, Vijayalakshmi Atluri, Alessandro Colantonio, in Proceedings of the Second ACM Conference on Data and Application Security and Privacy (CODASPY '12), Feb 7-9, 2012, San Antonio, TX, USA.
  51. Privacy-preserving collaborative filtering for the cloud, Anirban Basu, Jaideep Vaidya, Hiroaki Kikuchi, and Theo Dimitrakos, in Proceedings of the Third IEEE International Conference on Cloud Computing Technology and Science (CloudCom '11), Nov 29 - Dec 1, 2011, Athens, Greece.
  52. Privacy-preserving Tabu Search for Distributed Graph Coloring, Yuan Hong, Jaideep Vaidya, Haibing Lu, and Basit Shafiq, in Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT '11), October 9-11, 2011, MIT, Boston, USA.
  53. Search Engine Query Clustering using Top-k Search Results, Yuan Hong, Jaideep Vaidya, and Haibing Lu, in Proceedings of the Tenth IEEE/WIC/ACM International Conference on Web Intelligence (WI '11), August 22-27, 2011, Campus Scientifique de la Doua, Lyon, France.
  54. An Optimization Model for the Extended Role Mining Problem, Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, and Jaideep Vaidya, in Proceedings of the 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC '11), July 11-13, 2011, Richmond, VA, USA.
  55. Efficient Distributed Linear Programming with Limited Disclosure, Yuan Hong, Jaideep Vaidya, and Haibing Lu, in Proceedings of the 25th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSEC '11), July 11-13, 2011, Richmond, VA, USA.
  56. Privacy Preserving weighted Slope One predictor for Item-based Collaborative Filtering, Anirban Basu, Hiroaki Kikuchi, and Jaideep Vaidya, Proceedings of the International Workshop on Trust and Privacy in Distributed Information Processing (workshop at the IFIPTM 2011), Copenhagen, Denmark, 2011.
  57. UICDS-based Information Sharing among Emergency Response Application Systems, Vijaylakshmi Atluri, Basit Shafiq, Soon Ae Chun, Ghulam Nabi and Jaideep Vaidya, in Proceedings of the 12th Annual International Conference on Digital Government Research (dg.o 2011), June 12-15 2011, University of Maryland, College Park, MD, USA. (Demo Paper - Best Demo or Poster Award)
  58. Weighted Rank-One Binary Matrix Factorization, Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, Heechang Shin, and Lili Jiang, in Proceedings of the Eleventh SIAM International Conference on Data Mining (SDM '11), April 28-30, 2011, Phoenix, Arizona, USA.
  59. Identifying a Critical Threat to Privacy through Automatic Image Classification, David Lorenzi, and Jaideep Vaidya, in Proceedings of the First ACM Conference on Data and Application Security and Privacy (CODASPY 2011), Feb 21-23, 2011, San Antonio, TX, USA.
  60. Information Sharing Infrastructure for Pharmaceutical Supply Chain Management in Emergency Response, Vijayalakshmi Atluri, Basit Shafiq, Jaideep Vaidya, Soon Chun, Michael Trocchia, Nabil Adam, Christopher Doyle and Lawrence Skelly, in Proceedings of the 2010 IEEE International Conference on Technologies for Homeland Security, 8-10 November 2010, Westin Hotel, Waltham, MA.
  61. Reachability Analysis in Privacy-Preserving Perturbed Graphs, Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, and Xiaodong Lin, in Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, August 31 - September 3, 2010, York University, Toronto, Canada.
  62. Role Mining in the Presence of Noise, Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Haibing Lu, in Proceedings of the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC '10), June 21-23, 2010, Rome, Italy.
  63. Privacy-preserving Trust Verification, Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, and Nabil Adam, in Proceedings of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT '10), June 9-11, 2010, Pittsburgh, PA, USA.
  64. Information Sharing among Incident Management Systems using UICDS, Basit Shafiq, Jaideep Vaidya, Vijayalakshmi Atluri, and Soon Chun, in Proceedings of the 11th Annual Conference on Digital Government Research (DGO '10), May 17-20, 2010, Puebla, Mexico.
  65. Extended Boolean Matrix Decomposition, Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri, and Yuan Hong in Proceedings of the 2009 IEEE International Conference on Data Mining (ICDM '09), December 6-9, 2009, Miami, Florida, USA.
  66. Integrated Resource and Logistics Management through Secure Information Sharing for Effective Emergency Response, Vijayalakshmi Atluri, Soon Chun, John Ellenberger, Basit Shafiq, and Jaideep Vaidya, Workshop on Emergency Management: Incident, Resource, and Supply Chain Management (EMWS09), November 5-6, 2009, Irvine CA.
  67. Effective Anonymization of Query Logs, Yuan Hong, Xiaoyun He, Jaideep Vaidya, Nabil Adam, and Vijayalakshmi Atluri, in Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM '09), November 2-6, 2009, Hong Kong, China. (Bib).
  68. Preserving Privacy in Social Networks: A Structure-Aware Approach, Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, and Vijayalakshmi Atluri, in Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI-09), September 15-18, 2009, Milan, Italy.
  69. Efficient Privacy-Preserving Link Discovery, Xiaoyun He, Jaideep Vaidya, Basit Shafiq, Nabil Adam, Evimaria Terzi, and Tyrone Grandison, in Proceedings of the 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD-09) , April 27-30, 2009, Bangkok, Thailand.
  70. An Efficient Approximate Protocol for Privacy-Preserving Association Rule Mining, Murat Kantarcioglu, Robert Nix, and Jaideep Vaidya, in Proceedings of the 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD-09) , April 27-30, 2009, Bangkok, Thailand.
  71. A Secure Revised Simplex Algorithm for Privacy-Preserving Linear Programming, Jaideep Vaidya, in Proceedings of the 23rd IEEE International Conference on Advanced Information Networking and Applications (AINA-09), Security, Privacy and Trust Track, May 26-29, 2009, Bradford, UK. (Bib).
  72. An Efficient Online Auditing Approach to Limit Private Data Disclosure, Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaideep Vaidya, in Proceedings of the 12th International Conference on Extending Database Technology, March 23-26, 2009, St. Petersburg, Russia (Bib).
  73. Privacy-Preserving Linear Programming, Jaideep Vaidya, in Proceedings of the 24th Annual ACM Symposium on Applied Computing, Security Track, March 8-12, 2009, Honolulu, Hawaii, USA. (Bib).
  74. The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies, Qi Guo, Jaideep Vaidya, and Vijayalakshmi Atluri, in Proceedings of the 24th Annual Computer Security Applications Conference, December 8-12, 2008, Anaheim, California. (Bib).
  75. Towards a holistic approach to privacy-preserving data analysis, Jaideep Vaidya, in Proceedings of the 2008 Workshop on Secure Knowledge Management, Richardson, TX, USA. (Bib).
  76. Ontology Driven Resource Management for Emergency Response , Basit Shafiq, Nabil Adam, Vijay Atluri, Jaideep Vaidya, and Soon Ae Chun, in Proceedings of the 2008 Workshop on Secure Knowledge Management, Richardson, TX, USA. (Bib).
  77. Secure Construction of Contingency Tables from Distributed Data, Haibing Lu, Xiaoyun He, Jaideep Vaidya, and Nabil Adam, in Proceedings of the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSEC '08), July 13-16, 2008, London, UK. (Bib).
  78. Migrating to Optimal RBAC with Minimal Perturbation, Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, and Nabil Adam, in Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT), June 11-13, 2008, Estes Park, Colorado, USA. (Bib).
  79. Secure Information Sharing and Analysis for Effective Emergency Management, Nabil Adam, Vijayalakshmi Atluri, Soon Ae Chun, John Ellenberger, Basit Shafiq, Jaideep Vaidya, and Hui Xiong, in Proceedings of the 9th Annual International Conference on Digital Government Research, May 18-21, 2008, Montreal, Canada. (Bib).
  80. A Profile Anonymization Model for Privacy in a Personalized Location Based Service Environment, Heechang Shin, Vijayalakshmi Atluri, and Jaideep Vaidya, in Proceedings of the 9th International Conference on Mobile Data Management, April 27-30, 2008, Beijing, China. (Bib).
  81. Privacy-preserving Link Discovery, Xiaoyun He, Basit Shafiq, Jaideep Vaidya, and Nabil Adam, in Proceedings of the 23rd Annual ACM Symposium on Applied Computing, Data Mining Track, March 16-20, 2008, Fortaleza, Ceara, Brazil. (Bib).
  82. Optimal Boolean Matrix Decomposition: Application to Role Engineering, Haibing Lu, Jaideep Vaidya, and Vijay Atluri, in Proceedings of the 24th International Conference on Data Engineering, April 7-12, 2008, Cancun, Mexico. (Bib).
  83. Privacy Preserving Integration of Health Care Data, Nabil Adam, Thomas White, Basit Shafiq, Jaideep Vaidya, and Xiaoyun He, American Medical Informatics Association 2007 Annual Symposium, November 10-14, 2007, Chicago, Illinois.
  84. Enabling better Medical Image Classification through Secure Collaboration, Jaideep Vaidya and Bhakti Tulpule, in Proceedings of the 14th IEEE International Conference on Image Processing, September 16-19, 2007, San Antonio, Texas. (Bib).
  85. The Role Mining Problem: Finding a Minimal Descriptive Set of Roles , Jaideep Vaidya, Vijay Atluri, and Qi Guo, in Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 20-June22, 2007, Sophia Antipolis, France. (Bib).
  86. Using Semantics for Automatic Enforcement of Access Control Policies among Dynamic Coalitions, Janice Warner, Vijay Atluri, Ravi Mukkamala and Jaideep Vaidya, in Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 20-June 22, 2007, Sophia Antipolis, France. (Bib).
  87. RoleMiner: Mining Roles using Subset Enumeration, Jaideep Vaidya, Vijay Atluri, and Janice Warner, in Proceedings of the 13th ACM Conference on Computer and Communications Security, October 30-November 3, 2006, Alexandria, VA, USA. (Bib).
  88. Privacy-Preserving SVM Classification on Vertically Partitioned Data, Hwanjo Yu, Jaideep Vaidya and Xiaoqian Jiang, in Proceedings of the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining, April 9-12,2006, Singapore. (Bib).
  89. Privacy-Preserving SVM using Nonlinear Kernels on Horizontally Partitioned Data, Hwanjo Yu, Jaideep Vaidya and Xiaoqian Jiang, in Proceedings of the 21st Annual ACM Symposium on Applied Computing, Data Mining Track, April 23-27, 2006, Dijon, France. (Bib).
  90. Privacy-Preserving Decision Trees over Vertically Partitioned Data, Jaideep Vaidya and Chris Clifton, in Proceedings of the 2005 IFIP WG 11.3 International Conference on Data and Applications Security, August 2005, Storrs, CT, USA. (Bib).
  91. Collusion Set Detection through Outlier Discovery, Vandana Janeja, Vijay Atluri, Jaideep Vaidya and Nabil R. Adam, in Proceedings of the IEEE International Conference on Intelligence and Security Informatics, May 19-20, 2005, Atlanta, GA.
  92. Privacy Preserving Top-K Queries, Jaideep Vaidya and Chris Clifton, in Proceedings of the 2005 IEEE International Conference on Data Engineering, April 2005, Tokyo, Japan. (Bib).
  93. Knowledge Discovery from Transportation Graph Data, Wei Jiang, Jaideep Vaidya, Zahir Balaporia, Chris Clifton, and Brett Banich, in Proceedings of the 2005 IEEE International Conference on Data Engineering, April 2005, Tokyo, Japan. Best Industrial Paper award. (Bib).
  94. Privacy Preserving Outlier Detection, Jaideep Vaidya and Chris Clifton, in Proceedings of the 2004 IEEE International Conference on Data Mining, November 2004, Brighton, UK. (Bib).
  95. Privacy Preserving Data Integration and Sharing. Chris Clifton, AnHai Doan, Ahmed Elmagarmid, Murat Kantarcioglu, Gunther Schadow, Dan Suciu, and Jaideep Vaidya, in The Ninth ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, June 13, 2004, Maison de la Chimie, Paris, France.
  96. Privacy Preserving Naive Bayes Classifier for Vertically Partitioned Data, Jaideep Vaidya and Chris Clifton, in Proceedings of the 2004 SIAM International Conference on Data Mining, May 2004, Orlando, Florida. (Bib).
  97. Privacy Preserving Naive Bayes Classifier for Horizontally Partitioned Data. Murat Kantarcioglu and Jaideep Vaidya, in Proceedings of the Workshop on Privacy Preserving Data Mining held in association with The Third IEEE International Conference on Data Mining, November 19 - 22, 2003, Melbourne, FL. (Bib).
  98. Leveraging the "Multi" in Secure Multi-Party Computation. Jaideep Vaidya and Chris Clifton, in Proceedings of the Workshop on Privacy in the Electronic Society held in association with The Tenth ACM Conference on Computer and Communications Security, October 27 - 31, 2003, Washington, D.C. (Bib).
  99. Privacy-Preserving K-Means Clustering over Vertically Partitioned Data. Jaideep Vaidya and Chris Clifton, in Proceedings of the The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, August 24 - 27, 2003, Washington, D.C. Honorable mention (runner up), best research paper. (Bib).
    (Revised paper invited for submission at Interface '04).
  100. An architecture for Privacy-preserving Mining of Client Information. Murat Kantarcioglu and Jaideep Vaidya, in Volume 14 - Privacy, Security and Data Mining of the ACS Series Conferences in Research and Practice in Information Technology.
  101. Privacy Preserving Association Rule Mining in Vertically Partitioned Data. Jaideep Vaidya and Chris Clifton, in Proceedings of the The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23 - 26, 2002, Edmonton, Alberta, Canada. (Bib).

EDITOR REFEREED PUBLICATIONS

  1. Using Secure-coprocessor for Creating Efficient Privacy-Preserving Distributed Data Mining Toolbox. Murat Kantarcioglu, Jaideep Vaidya and Chris Clifton, in International Workshop on Privacy and Security Issues in Data Mining held in conjuction with ECML/PKDD 2004, September 20, 2004, Italy. Invited paper.
  2. Defining Privacy for Data Mining. Chris Clifton and Murat Kantarcioglu and Jaideep Vaidya, in Proceedings of the National Science Foundation Workshop on Next Generation Data Mining, November 1-3, 2002, Baltimore, MD. Invited paper.

PRESENTATIONS (Conference presentations not included)

  1. Automating Security Configuration and Administration - An access control perspective, Department of Computer Science and Automation, Indian Institute of Science, August 14, 2013.
  2. Automating Security Configuration and Administration - An access control perspective, EMC Center of Excellence, Bangalore, India, August 14, 2013.
  3. Privacy-preserving Analytics and Collaboration, Department of Economics, Fergusson College, Pune, India, August 12, 2013.
  4. Privacy in the context of digital government, Tutorial at the 13th Annual International Conference on Digital Government Research (dg.o 2012), June 4-7, 2012, University of Maryland, College Park, MD.
  5. The Role Mining Problem - A formal perspective, University of Texas at Austin, February 9, 2012.
  6. Automating Security Configuration and Administration: An Access Control Perspective, Winter 2011 Security and Privacy Day, New Jersey Institute of Technology, December 2, 2011.
  7. The Role Mining Problem - A formal perspective, University of Maryland, Baltimore County, June 15, 2011.
  8. The Role Mining Problem - A formal perspective, Arizona State University, April 28, 2011.
  9. Privacy-preserving Graph Analysis, Tokai University, Tokyo, Japan, November 26, 2010.
  10. Automated Security Configuration and Administration -- An Access Control Perspective, Keynote at the 5th International Workshop on Security (IWSEC 2010), November 22-24, 2010, Kobe, Japan.
  11. Role Engineering and Role Mining, Tutorial at the 5th International Conference on Information Systems Security (ICISS 2009), 14-18 December 2009, Eastern Zone Cultural Center, Kolkata, India.
  12. The Role Mining Problem - A Formal Perspective, University of Pittsburgh, Pittsburgh, PA, February 13, 2009.
  13. Effective Query Log Anonymization, Google, Inc., Mountain View, CA, December 8, 2008.
  14. The Role Mining Problem - A Formal Perspective, Syracuse University, Syracuse, NY, December 3, 2008.
  15. The Role Mining Problem - A Formal Perspective, University of Texas at San Antonio, San Antonio, TX, November 5, 2008.
  16. The Role Mining Problem - A Formal Perspective, Stevens Institute of Technology, Hoboken, NJ, October 20, 2008.
  17. Role Engineering and the Role Mining Problem, University of Texas at Dallas, Dallas, TX, September 17, 2007.
  18. Role Engineering and the Role Mining Problem, Tata Research Design & Development Center, August 1, 2007, Pune, India.
  19. Privacy-Preserving Data Mining at the Tata Research Design & Development Center, Pune, India, June 21, 2005
  20. Privacy-Preserving Outlier Detection, at the Stevens Institute of Technology, Hoboken, NJ, May 2, 2005.
  21. Privacy-Preserving Collaboration - Supply Chain, Transportation Logistics, and Other problems, Supply Chain Management Research Seminar Series, Rutgers Business School, Newark, NJ, April 28, 2005.
  22. Privacy Preserving K-Means Clustering on Vertically Partitioned Data, invited talk at Interface '04, the best of data mining at KDD session, Baltimore, Maryland, May 27, 2004.
  23. Privacy Preserving Data Mining over Vertically Partitioned Data at the CSIS Seminar at the Department of Information and Software Engineering, George Mason University, May 25, 2004.
  24. Privacy Preserving Data Mining on Vertically Partitioned Data at the CERIAS Security Seminar, January 14, 2004.
  25. Privacy Preserving Data Mining over Vertically Partitioned Data at the DAIS Seminar at the CS Department at University of Illinois at Urbana-Champaign, October 24, 2003.
  26. Privacy Preserving Data Mining with Chris Clifton in CERIAS Security Seminar, February 27, 2002.
  27. A new architecture for Privacy Preserving Data Mining in Indiana Center for Database Systems seminar, December 4, 2002.

PROFESSIONAL ACTIVITIES