Mudhakar Srivatsa  Mudhakar Srivatsa photo       

contact information

Principal Research Staff Member and Manager (IoT Analytics)
Thomas J. Watson Research Center, Yorktown Heights, NY USA
  +1dash914dash945dash3766

links

Professional Associations

Professional Associations:  ACM  |  IEEE  |  USENIX: The Advanced Computing Systems Association


2012

Byte Caching in Wireless Networks
Franck Le, Mudhakar Srivatsa, Arun Iyengar
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 265--274

Using Subjective Logic to Handle Uncertainty and Conflicts
M. Sensoy, J.Z. Pan, A. Fokoue, M. Srivatsa, F. Meneguzzi
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pp. 1323--1326

Semantics-Aware Storage and Replication of Trust Metadata in Mobile Ad-hoc Networks
V. Natarajan, S. Zhu, M. Srivatsa, J. Opper
Advanced Information Networking and Applications (AINA), 2012 IEEE 26th International Conference on, pp. 376--383

Distributed graph query processing in dynamic networks
M. Srivatsa, V. Kawadia, S. Yang
Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on, pp. 20--25

Fine-grained access control of personal data
T. Wang, M. Srivatsa, L. Liu
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 145--156, 2012

Knowledge-oriented secure multiparty computation
P. Mardziel, M. Hicks, J. Katz, M. Srivatsa
Proceedings of the 7th Workshop on Programming Languages and Analysis for Security, pp. 2, 2012


Limitations of Generating a Secret Key Using Wireless Fading Under Active Adversary
M. Zafer, D. Agrawal, M. Srivatsa
IEEE/ACM Transactions on Networking, IEEE, 2012

Deanonymizing mobility traces: using social network as a side-channel
M. Srivatsa, M. Hicks
Proceedings of the 2012 ACM conference on Computer and communications security, pp. 628--637

Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks
W. Gao, G. Cao, M. Srivatsa, A. Iyengar
Distributed Computing Systems (ICDCS), 2012 IEEE 32nd International Conference on, pp. 132--141


2011

Trust-based probabilistic query answering
A. Fokoue, M. Srivatsa, R. Young
Web Information System Engineering--WISE 2011, 57--71, Springer

Decorrelating WSN traffic patterns with maximally uninformative constrained routing
J. Tapiador, M. Srivatsa, J. Clark, J. McDermid
NETWORKING 2011 Workshops, pp. 207--218

Probabilistic Abox Abduction in Description Logics
M. Sensoy, A. Fokoue, M. Srivatsa, J.Z. Pan
7th International Workshop on Scalable Semantic Web Knowledge Base Systems (SSWS’11), 2011

Trust Inference and Query Answering over Uncertain Information
A. Fokoue, M. Srivatsa, R. Young
Web Information System Engineering--WISE 2011, 57--71, Technical Report RC25157, IBM Research

Multiagent communication security in adversarial settings
S. Okamoto, P. Paruchuri, Y. Wang, K. Sycara, J. Marecki, M. Srivatsa
Web Intelligence and Intelligent Agent Technology (WI-IAT), 2011 IEEE/WIC/ACM International Conference on, pp. 296--303

Provenance-driven data dissemination in disruption tolerant networks
M. Srivatsa, W. Gao, A. Iyengar
Information Fusion (FUSION), 2011 Proceedings of the 14th International Conference on, pp. 1--8

Modeling Data Flow in Socio-Information Networks: A Risk Estimation Approach
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
Proceeding of the 16th ACM symposium on Access control models and technologies, pp. 113--122, ACM, 2011

Dynamic enforcement of knowledge-based security policies
P. Mardziel, S. Magill, M. Hicks, M. Srivatsa
Computer Security Foundations Symposium (CSF), 2011 IEEE 24th, pp. 114--128

EventGuard: A System Architecture for Securing Publish-Subscribe Networks
M Srivatsa, L Liu, A Iyengar
ACM Transactions on Computer Systems (to appear) 29(4), 10, ACM, 2011

Poster: on quantitative information flow metrics
J. Zhu, M. Srivatsa
Proceedings of the 18th ACM conference on Computer and communications security, pp. 877--880, 2011

Privacy in VoIP Networks: Flow Analysis Attacks and Defense
M. Srivatsa, A. Iyengar, L. Liu, H. Jiang
Parallel and Distributed Systems, IEEE Transactions on 22(4), 621--633, IEEE, 2011

Supporting cooperative caching in disruption tolerant networks
W Gao, G Cao, A Iyengar, M Srivatsa
Distributed Computing Systems (ICDCS), 2011 31st International Conference on, pp. 151--161


2010


Assessing trust in uncertain information
A Fokoue, M Srivatsa, R Young
The Semantic Web--ISWC 2010, 209--224, Springer

Assessing trust in uncertain information using Bayesian description logic
A Fokoue, M Srivatsa, R Young
Proceedings of the 17th ACM conference on Computer and communications security, pp. 675--677, ACM, 2010


2009

Scalable key management algorithms for location-based services
M Srivatsa, A Iyengar, J Yin, L Liu
Networking, IEEE/ACM Transactions on 17(5), 1399--1412, IEEE, 2009

A framework for distributed monitoring and root cause analysis for large ip networks
D Banerjee, V Madduri, M Srivatsa
2009 28th IEEE International Symposium on Reliable Distributed Systems, pp. 246--255

The fable of the bees: incentivizing robust revocation decision making in ad hoc networks
Steffen Reidt, Mudhakar Srivatsa, Shane Balfe
Proceedings of the 16th ACM conference on Computer and communications security, pp. 291--302, ACM, 2009
Abstract

A Framework for Distributed Monitoring and Root Cause Analysis for IP Networks
D. Banerjee, V. Madduri, M. Srivatsa
IEEE Symposium on Reliable and Distributed Systems (SRDS) (winner of the best paper award), 2009

Search-as-a-service: Outsourced search over outsourced storage
A Singh, M Srivatsa, L Liu
ACM Transactions on the Web (TWEB) 3(4), 13, ACM, 2009

Learning, indexing, and diagnosing network faults
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 857--866, ACM, 2009


Scalable Key Management Algorithms for Location Based Services
M Srivatsa, A Iyengar, J Yin, L Liu
IEEE/ACM Transactions on Networking, 2009

A decision support system for secure information sharing
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg
Proceedings of the 14th ACM symposium on Access control models and technologies, pp. 105--114, 2009

Privacy in VoIP networks: A k-anonymity approach
M Srivatsa, A Iyengar, L Liu
Proceedings of 28th IEEE International Conference on Computer Communications (INFOCOM), 2009


2008

An economic model for securing cross-domain information flows
M Srivatsa, P Rohatgi, S Balfe, KG Paterson
Submitted AC-ITA, 2008

Bootstrapping Coalition MANETs
M Srivatsa, D Agrawal, S Balfe
IBM Research Report RC24588, 2008


Scalable Topology Discovery and Link State Detection Using Routing Events
M Srivatsa, B J Ko, A Beygelzimer, V Madduri
Proceedings of the 2008 Symposium on Reliable Distributed Systems, pp. 165--174

A Policy Evaluation Tool for Multisite Resource Management
M. Srivatsa, N. Rajamani, M. Devarakonda
Parallel and Distributed Systems, IEEE Transactions on 19(10), 1352--1366, IEEE, 2008

SERvartuka: Dynamic Distribution of State to Improve SIP Server Scalability
V A Balasubramaniyan, A Acharya, M Ahamad, M Srivatsa, I Dacosta, C P Wright
Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems-Volume 00, pp. 562--572

Who is Listening? Security in Wireless Networks
M Srivatsa
Proc. of IEEE ICSCN, 167--172, 2008

Securing information flows: A metadata framework
M Srivatsa, P Rohatgi, S Balfe, S Reidt
Proceedings of 1st IEEE Workshop on Quality of Information for Sensor Networks (QoISN), 2008

Securing information flows: A quantitative risk analysis approach
M Srivatsa, P Rohatgi, S Balfe
Proceedings of 27th IEEE Conference on Military Communications (MILCOM), 2008

A metadata calculus for securing information flows
M Srivatsa, D Agrawal, S Balfe
Proceedings of 26th Army Science Conference (ASC 2008)

Trust management for secure information flows
M Srivatsa, S Balfe, K G Paterson, P Rohatgi
Proceedings of the 15th ACM conference on Computer and communications security, pp. 175--188, 2008


2007

Secure event dissemination in publish-subscribe networks
M Srivatsa, L Liu
2007 - computer.org, IEEE Computer Society

DSphere: A source-centric approach to crawling, indexing and searching the world wide web
B Bamba, L Liu, J Caverlee, V Padliya, M Srivatsa, T Bansal, M Palekar, J Patrao, S Li, A Singh
IEEE 23rd International Conference on Data Engineering, 2007, pp. 1515--1516

An access control system for web service compositions
M Srivatsa, A Iyengar, T Mikalsen, I Rouvellou, J Yin
Proceedings of the IEEE International Conference on Web Services, pp. 1--8, IEEE Computer Society, 2007


2006

Large scaling unstructured peer-to-peer networks with heterogeneity-aware topology and routing
M Srivatsa, B Gedik, L Liu
IEEE Transactions on Parallel and Distributed Systems 17(11), 1277, THE IEEE, INC., 2006

Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
M Srivatsa, L Liu
Lecture Notes in Computer Science4189, 347, Springer, 2006

A client-transparent approach to defend against denial of service attacks
M Srivatsa, A Iyengar, J Yin, L Liu
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems, pp. 61--70, 2006



2005

Countering targeted file attacks using locationguard
M Srivatsa, L Liu
USENIX Security Symposium, 2005

Exchangeguard: A distributed protocol for electronic fair-exchange
M Srivatsa, L Xiong, L Liu
19th International Parallel and Distributed Processing Symposium (IPDPS 2005)

Resilient trust management for web service integration
S Park, L Liu, C Pu, M Srivatsa, J Zhang
IEEE International Conference on Web Services, 2005

Method and apparatus for performance and policy analysis in distributed computing systems
M V Devarakonda, N Rajamani, M Srivatsa
US Patent App. 11/258,435, 2005 - Google Patents, Google Patents
US Patent App. 11/258,435

Securing publish-subscribe overlay services with eventguard
M Srivatsa, L Liu
Proceedings of the 12th ACM conference on Computer and communications security, pp. 298, 2005

TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
M Srivatsa, L Xiong, L Liu
Proceedings of the 14th international conference on World Wide Web, pp. 431, 2005


2004



Year Unknown



A Judgment Mechanism for Key Revocation
S Reidt, M Srivatsa, S Balfe
usukita.org, 0

Multi-Site Resource Management: Policy Performance Analysis
M Srivatsa, N Rajamani, M Devarakonda
IBM Research Report\# RC23497, Yorktown Heights, NY, 0

Securing Information Flows: A Metadata Model
M Srivatsa, P Rohatgi, S Balfe, S Reidt
1st Int’l Workshop on Quality of Information for Sensor Networks (QoISN 2008)