Skip to main content
James B.D. Joshi
James B.D. Joshi Professor
Information Sciences Building, Room 706A 412-624-9982 jjoshi@pitt.edu http://www.sis.pitt.edu/~jjoshi/

Biography

Institution of highest degree:
PhD, Purdue University

Research Interests

Advanced Access control, Distributed and Multimedia systems security, Systems and Network survivability, IPv6 and mobile Security, Secure Information Sharing.

All Publications

View in D-Scholarship

Recent Publications

Jin, L and Long, X and Zhang, K and Lin, YR and Joshi, J (2016) Characterizing users’ check-in activities using their scores in a location-based social network. Multimedia Systems, 22 (1). 87 - 98. ISSN 0942-4962

Chen, Songqing and Gruenwald, Le and Joshi, James B.D. and Aberer, Karl (2012) ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Collaborative Computing: Networking, Applications and Worksharing”. Mobile Networks and Applications, 17 (4). pp. 506-507. ISSN 1383-469X

Joshi, James B.D. and Bertino, Elisa and Pu, Calton and Ramampiaro, Heri (2012) ACM/Springer Mobile Networks and Applications (MONET) Special Issue on “Collaborative Computing: Networking, Applications and Worksharing”. Mobile Networks and Applications, 17 (3). pp. 325-326. ISSN 1383-469X

Jung, Youna and Joshi, James B.D. (2012) CRiBAC: Community based Role interaction Access Control Model. Computers & Security, 31 (4). pp. 497-523. ISSN 0167-4048

Weisong, Shi and Joshi, James B.D. and Zhang, Tao and Park, Eun K. and Quemada, Juan (2012) ACM/Springer Mobile Networks and Applications (MONET) Special Issue on "Collaborative Computing: Networking, Applications and Worksharing". Mobile Networks and Applications, 17 (3). pp. 376-377. ISSN 1383-469X

Taghavi Zargar, Saman and Takabi, Hassan and Joshi, James B.D. (2012) DCDIDP: A Distributed, Collaborative, and Data-driven Intrusion Detection and Prevention Framework for Cloud Computing Environments. In: CollaborateCom 2011, October 15-18, 2011, Orlando, Florida, USA.

Baracaldo, Nathalie and Joshi, James B.D. (2012) A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat. In: SACMAT '12: Proceedings of the 17th ACM symposium on Access Control Models and Technologies, June 20-22, 2012, Newark, New Jersey, USA.

Jin, Lei and Long, Xuelian and Anwar, Mohd and Joshi, James B.D (2012) Analysis of Access Control Mechanisms for Users’ Check-ins in Location-based Social Network Systems. In: Proceeding of: IEEE International Conference on Information Reuse & Integration.

Jung, Youna and Kim, Minsoo and Masoumzadeh, Amirreza and Joshi, James B.D. (2012) A Survey of Security for Multiagent Systems. Artificial Intelligence Review, 37 (3). pp. 239-260.

Long, Xuelian and Jin, Lei and Joshi, James B.D (2012) Exploring trajectory-driven local geographic topics in foursquare. In: Proceedings of the 2012 ACM Conference on Ubiquitous Computing - UbiComp '12. ACM, New York, pp. 927-934. ISBN 9781450312240

Last updated: April 27, 2017