Vijay Varadharajan

Professor

  • 3402 Citations
  • 28 h-Index
1983 …2019
If you made any changes in Pure these will be visible here soon.

Research Outputs 1983 2019

Filter
Article
2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications

Policy-based access control for constrained healthcare resources in the context of the Internet of Things

Pal, S., Hitchens, M., Varadharajan, V. & Rabehaja, T., 1 Aug 2019, In : Journal of Network and Computer Applications. 139, p. 57-74 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Smart sensors
Internet of things
2018

Malytics: a malware detection scheme

Yousefi-Azar, M., Hamey, L. G. C., Varadharajan, V. & Chen, S., 28 Sep 2018, In : IEEE Access. 6, p. 49418-49431 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Open Access
Feature extraction
Neural networks
Mobile devices
Malware

Securing services in networked cloud infrastructures

Varadharajan, V. & Tupakula, U., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1149-1163 15 p., 7473937.

Research output: Contribution to journalArticleResearchpeer-review

Restoration
Virtual machine
Servers
Communication
2017

Intrusion detection techniques in cloud environment: a survey

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 1 Jan 2017, In : Journal of Network and Computer Applications. 77, p. 18-47 30 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Taxonomies
Cloud computing
Computer hardware
Virtual machine

On the design and implementation of an integrated security architecture for cloud with improved resilience

Varadharajan, V. & Tupakula, U., 1 Jul 2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 375-389 15 p., 7420656.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Access control
Servers
Life cycle
Feedback

Optimized identity-based encryption from bilinear pairing for lightweight devices

Guo, F., Mu, Y., Susilo, W., Hsing, H., Wong, D. S. & Varadharajan, V., 1 Mar 2017, In : IEEE Transactions on Dependable and Secure Computing. 14, 2, p. 211-220 10 p., 7123602.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Hardware
Smart cards
Random access storage
Radio frequency identification (RFID)

Privacy-preserving mutual authentication in RFID with designated readers

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., Oct 2017, In : Wireless Personal Communications. 96, 3, p. 4819-4845 27 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
Authentication
Network protocols
Servers

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Virtual Machine
Intrusion detection
Intrusion Detection
Semantics
Attack

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 25 Jun 2017, In : Concurrency Computation. 29, 12, p. 1-21 21 p., e4133.

Research output: Contribution to journalArticleResearchpeer-review

Malware
Infrastructure
Virtualization
Computer monitors
Dependency Graph
2016

A novel malware for subversion of self-protection in anti-virus

Min, B. & Varadharajan, V., 1 Mar 2016, In : Software - Practice and Experience. 46, 3, p. 361-379 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer viruses
Viruses
Malware

A secure role-based cloud storage system for encrypted patient-centric health records

Zhou, L., Varadharajan, V. & Gopinath, K., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1593-1611 19 p.

Research output: Contribution to journalArticleResearchpeer-review

Health
Access control
Electronic scales
Data storage equipment
Security of data

Practical approximate k nearest neighbor queries with location and query privacy

Yi, X., Paulet, R., Bertino, E. & Varadharajan, V., 1 Jun 2016, In : IEEE Transactions on Knowledge and Data Engineering. 28, 6, p. 1546-1559 14 p., 7389401.

Research output: Contribution to journalArticleResearchpeer-review

Location based services
Cryptography
Railroad cars
Communication
Experiments

Rethinking software component security: software component level integrity and cross verification

Min, B. & Varadharajan, V., 3 Nov 2016, In : Computer Journal. 59, 11, p. 1735-1748 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Web browsers
Malware
2015

A new extension to kernel entropy component analysis for image-based authentication systems

Damavandinejadmonfared, S. & Varadharajan, V., 1 Aug 2015, In : Journal of WSCG. 23, 1, p. 1-8 8 p.

Research output: Contribution to journalArticleResearchpeer-review

Authentication
Entropy
kernel
Principal component analysis
Principal Component Analysis

A stochastic time-domain model for burst data aggregation in IEEE 802.15.4 wireless sensor networks

Haghighi, M. S., Xiang, Y., Varadharajan, V. & Quinn, B. G., 1 Mar 2015, In : IEEE Transactions on Computers. 64, 3, p. 627-639 13 p., 6698362.

Research output: Contribution to journalArticleResearchpeer-review

IEEE 802.15.4
Data Aggregation
Domain Model
Burst
Wireless Sensor Networks

Enabling Cloud Storage Auditing With Key-Exposure Resistance

Yu, J., Ren, K., Wang, C. & Varadharajan, V., 1 Jun 2015, In : IEEE Transactions on Information Forensics and Security. 10, 6, p. 1167-1179 13 p., 7031921.

Research output: Contribution to journalArticleResearchpeer-review

Binary trees

Generic constructions for role-based encryption

Zhou, L., Varadharajan, V. & Hitchens, M., 1 Oct 2015, In : International Journal of Information Security. 14, 5, p. 417-430 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Outsourcing

Securing wireless mobile nodes from distributed denial-of-service attacks

Varadharajan, V. & Tupakula, U., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3794-3815 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Denial of Service
Mobile devices
Attack
Vertex of a graph
Mobile Devices

Shared RFID ownership transfer protocols

Li, N., Mu, Y., Susilo, W. & Varadharajan, V., 1 Nov 2015, In : Computer Standards and Interfaces. 42, p. 95-104 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
radio

Trust Enhanced Cryptographic Role-Based Access Control for Secure Cloud Data Storage

Zhou, L., Varadharajan, V. & Hitchens, M., 1 Nov 2015, In : IEEE Transactions on Information Forensics and Security. 10, 11, p. 2381-2395 15 p., 7155561.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Data storage equipment
Decision making
Control systems
Costs

Trust Enhanced Security for Tenant Transactions in the Cloud Environment

Tupakula, U. & Varadharajan, V., Oct 2015, In : Computer Journal. 58, 10, p. 2388-2403 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Trusted computing

Vulnerabilities of an ECC-based RFID authentication scheme

Li, N., Mu, Y., Susilo, W., Guo, F. & Varadharajan, V., 25 Nov 2015, In : Security and Communication Networks. 8, 17, p. 3262-3270 9 p.

Research output: Contribution to journalArticleResearchpeer-review

Radio frequency identification (RFID)
Authentication
Cryptography
2014

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer systems
Malware

Counteracting security attacks in virtual machines in the cloud using property based attestation

Varadharajan, V. & Tupakula, U., 2014, In : Journal of Network and Computer Applications. 40, p. 31-45 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Virtual machine
Mobile phones
Hardware
Hardware security

CP-ABE with constant-size keys for lightweight devices

Guo, F., Mu, Y., Susilo, W., Wong, D. S. & Varadharajan, V., 2014, In : IEEE Transactions on Information Forensics and Security. 9, 5, p. 763-771 9 p., 6757025.

Research output: Contribution to journalArticleResearchpeer-review

Cryptography
Radio frequency identification (RFID)

Dynamic delegation framework for role based access control in distributed data management systems

Ruan, C. & Varadharajan, V., 2014, In : Distributed and Parallel Databases. 32, 2, p. 245-269 25 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Information management
Acoustic waves
Control systems
Chemical analysis

Secure administration of cryptographic role-based access control for large-scale cloud storage systems

Zhou, L., Varadharajan, V. & Hitchens, M., 2014, In : Journal of Computer and System Sciences. 80, 8, p. 1518-1533 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Role-based Access Control
Storage System
Access control
Encryption
Cryptography

Security as a service model for cloud environment

Varadharajan, V. & Tupakula, U., 2014, In : IEEE Transactions on Network and Service Management. 11, 1, p. 60-75 16 p., 6805344.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Internet

Server-aided signature verification for lightweight devices

Guo, F., Mu, Y., Susilo, W. & Varadharajan, V., 2014, In : Computer Journal. 57, 4, p. 481-493 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Servers
Network protocols
Computer hardware
Hardware
Costs

The silence of the LANs: efficient leakage resilience for IPsec VPNs

Schulz, S., Varadharajan, V. & Sadeghi, A-R., Feb 2014, In : IEEE Transactions on Information Forensics and Security. 9, 2, p. 221-232 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Virtual private networks
Local area networks
2013

Achieving secure role-based access control on encrypted data in cloud storage

Zhou, L., Varadharajan, V. & Hitchens, M., 2013, In : IEEE Transactions on Information Forensics and Security. 8, 12, p. 1947-1960 14 p., 6642048.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Cloud computing
Data storage equipment
2012

A Flexible cryptographic approach for secure data storage in the cloud using role-based access control

Zhou, L., Varadharajan, V. & Hitchens, M., 2012, In : International journal of cloud computing. 1, 2-3, p. 201-220 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Data storage equipment
Control systems
Cryptography
Managers

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Computer operating systems
Computer monitors
Virtual machine
Computer systems
2011

Dynamic trust enhanced security model for trusted platform based services

Nagarajan, A. & Varadharajan, V., May 2011, In : Future Generation Computer Systems. 27, 5, p. 564-573 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Decision making
Trusted computing
Uncertainty

Enforcing role-based access control for secure data storage in the cloud

Zhou, L., Varadharajan, V. & Hitchens, M., Oct 2011, In : Computer Journal. 54, 10, p. 1675-1687 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Access control
Cryptography
Data storage equipment

Stochastic modeling of hello flooding in slotted CSMA/CA wireless sensor networks

Sayad Haghighi, M., Mohamedpour, K., Varadharajan, V. & Quinn, B. G., Dec 2011, In : IEEE Transactions on Information Forensics and Security. 6, 4, p. 1185-1199 15 p., 5966343.

Research output: Contribution to journalArticleResearchpeer-review

Carrier sense multiple access
Collision avoidance
Wireless sensor networks
Network protocols
Broadcasting
2010

A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems

Ruan, C. & Varadharajan, V., Feb 2010, In : Distributed and Parallel Databases. 27, 1, p. 1-29 29 p.

Research output: Contribution to journalArticleResearchpeer-review

Security of data
Graph
Authorization
Delegation
Conflict resolution

Internet filtering issues and challenges

Varadharajan, V., Jul 2010, In : IEEE Security and Privacy. 8, 4, p. 62-65 4 p., 5523867.

Research output: Contribution to journalArticleResearchpeer-review

Internet

MobileTrust: a trust enhanced security architecture for mobile agent systems

Lin, C. & Varadharajan, V., Jun 2010, In : International Journal of Information Security. 9, 3, p. 153-178 26 p.

Research output: Contribution to journalArticleResearchpeer-review

Mobile agents
Decision making
Specifications
2009

A note on trust-enhanced security

Varadharajan, V., May 2009, In : IEEE Security and Privacy. 7, 3, p. 57-59 3 p., 5054911.

Research output: Contribution to journalArticleResearchpeer-review

software development
information service
information system
economy
Information services

Trust management towards service-oriented applications

Wang, Y., Lin, K. J., Wong, D. S. & Varadharajan, V., Jun 2009, In : Service Oriented Computing and Applications. 3, 2, p. 129-146 18 p.

Research output: Contribution to journalArticleResearchpeer-review

Fuzzy logic
Feedback
Service provider
Service-oriented
Trust management
2008

A hybrid model against TCP SYN and reflection DDoS attacks

Tupakula, U. K. & Varadharajan, V., May 2008, In : Computer Systems Science and Engineering. 23, 3, p. 153-166 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Denial of Service
Hybrid Model
Attack
Flooding
Traffic

Evaluating transaction trust and risk levels in peer-to-peer e-commerce environments

Wang, Y., Wong, D. S., Lin, K. J. & Varadharajan, V., Jan 2008, In : Information Systems and e-Business Management. 6, 1, p. 25-48 24 p.

Research output: Contribution to journalArticleResearchpeer-review

Sales
Decision making
History
Peer to peer
Electronic commerce
2007

DDoS: design, implementation and analysis of automated model

Tupakula, U. K., Varadharajan, V., Gajam, A. K., Vuppala, S. K. & Rao, P. N. S., 2007, In : International Journal of Wireless and Mobile Computing. 2, 1, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Internet
Intrusion detection
Managers

On the design, implementation and application of an authorisation architecture for web services

Indrakanti, S., Varadharajan, V. & Agarwal, R., 2007, In : International Journal of Information and Computer Security. 1, 1-2, p. 64-108 45 p.

Research output: Contribution to journalArticleResearchpeer-review

Web services
Service oriented architecture (SOA)
Middleware
Access control

Trust-enhanced secure mobile agent-based system design

Foster, D. & Varadharajan, V., 2007, In : International Journal of Agent-Oriented Software Engineering. 1, 2, p. 205-224 20 p.

Research output: Contribution to journalArticleResearchpeer-review

Mobile agents
Systems analysis
2006

Fair online gambling scheme and TTP-free mental poker protocols

Zhao, W. & Varadharajan, V., 2006, In : Journal of information assurance and security. 1, 2, p. 95-106 12 p.

Research output: Contribution to journalArticleResearchpeer-review

2005

Maximizing utility of mobile agent based e-commerce applications with trust enhanced security

Lin, C., Varadharajan, V. & Wang, Y., 2005, In : Lecture Notes in Computer Science. 3592, p. 151-160 10 p.

Research output: Contribution to journalArticleResearchpeer-review

Mobile agents
Mobile Agent
Electronic Commerce
Security of data
Utility Maximization

On the sequence of authorization policy transformations

Bai, Y., Zhang, Y. & Varadharajan, V., Feb 2005, In : International Journal of Information Security. 4, 1-2, p. 120-131 12 p.

Research output: Contribution to journalArticleResearchpeer-review

Formal languages
Authorization