Year |
Citation |
Score |
2022 |
Pericherla A, Paul P, Sural S, Vaidya J, Atluri V. Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain. Ifip Advances in Information and Communication Technology. 648: 360-376. PMID 36544863 DOI: 10.1007/978-3-031-06975-8_21 |
0.335 |
|
2019 |
Batra G, Atluri V, Vaidya J, Sural S. Deploying ABAC policies using RBAC Systems. Journal of Computer Security. 27: 483-506. PMID 31929684 DOI: 10.3233/Jcs-191315 |
0.304 |
|
2019 |
DAS S, Sural S, Vaidya J, Atluri V. Policy Adaptation in Hierarchical Attribute-Based Access Control Systems. Acm Transactions On Internet Technology. 19. PMID 31885522 DOI: 10.1145/3323233 |
0.34 |
|
2019 |
Nath R, Das S, Sural S, Vaidya J, Atluri V. PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. Proceedings of the ... Acm Symposium On Access Control Models and Technologies. Acm Symposium On Access Control Models and Technologies. 2019: 25-35. PMID 31346589 DOI: 10.1145/3322431.3325102 |
0.321 |
|
2019 |
Jha S, Sural S, Atluri V, Vaidysa J. Security Analysis of ABAC under an Administrative Model. Iet Information Security. 13: 96-103. PMID 31214270 DOI: 10.1049/Iet-Ifs.2018.5010 |
0.349 |
|
2019 |
Roy A, Sural S, Majumdar AK, Vaidya J, Atluri V. Enabling Workforce Optimization in Constrained Attribute Based Access Control Systems Ieee Transactions On Emerging Topics in Computing. 1-1. DOI: 10.1109/Tetc.2019.2944787 |
0.309 |
|
2018 |
Jha S, Sural S, Atluri V, Vaidya J. Specification and Verification of Separation of Duty Constraints in Attribute-Based Access Control Ieee Transactions On Information Forensics and Security. 13: 897-911. DOI: 10.1109/Tifs.2017.2771492 |
0.326 |
|
2017 |
Talukdar T, Batra G, Vaidya J, Atluri V, Sural S. Efficient bottom-up Mining of Attribute Based Access Control Policies. ... Ieee Conference On Collaboration and Internet Computing. Ieee Conference On Collaboration and Internet Computing. 2017: 339-348. PMID 30506058 DOI: 10.1109/CIC.2017.00051 |
0.311 |
|
2017 |
Mitra B, Sural S, Vaidya J, Atluri V. Migrating from RBAC to temporal RBAC Iet Information Security. 11: 294-300. DOI: 10.1049/Iet-Ifs.2016.0258 |
0.316 |
|
2016 |
Badar N, Vaidya J, Atluri V, Verde NV, Warner J. Using classification for role-based access control management International Journal of Technology, Policy and Management. 16: 45-78. DOI: 10.1504/Ijtpm.2016.075940 |
0.599 |
|
2016 |
Mitra B, Sural S, Vaidya J, Atluri V. A Survey of Role Mining Acm Computing Surveys. 48. DOI: 10.1145/2871148 |
0.38 |
|
2016 |
Mitra B, Sural S, Vaidya J, Atluri V. Mining temporal roles using many-valued concepts Computers and Security. 60: 79-94. DOI: 10.1016/J.Cose.2016.04.002 |
0.354 |
|
2015 |
Mitra B, Sural S, Atluri V, Vaidya J. The generalized temporal role mining problem Journal of Computer Security. 23: 31-58. DOI: 10.3233/Jcs-140512 |
0.403 |
|
2015 |
Lu H, Vaidya J, Atluri V, Li Y. Statistical database auditing without query denial threat Informs Journal On Computing. 27: 20-34. DOI: 10.1287/Ijoc.2014.0607 |
0.561 |
|
2015 |
Roy A, Sural S, Majumdar AK, Vaidya J, Atluri V. Minimizing organizational user requirement while meeting security constraints Acm Transactions On Management Information Systems. 6. DOI: 10.1145/2811269 |
0.33 |
|
2015 |
Harika P, Nagajyothi M, John JC, Sural S, Vaidya J, Atluri V. Meeting cardinality constraints in role mining Ieee Transactions On Dependable and Secure Computing. 12: 71-84. DOI: 10.1109/Tdsc.2014.2309117 |
0.408 |
|
2015 |
Sarana P, Roy A, Sural S, Vaidya J, Atluri V. Role mining in the presence of separation of duty constraints Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9478: 98-117. DOI: 10.1007/978-3-319-26961-0_7 |
0.421 |
|
2015 |
Jha S, Sural S, Atluri V, Vaidya J. Enforcing separation of duty in attribute based access control systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9478: 61-78. DOI: 10.1007/978-3-319-26961-0_5 |
0.386 |
|
2015 |
Singh MP, Sural S, Atluri V, Vaidya J, Yakub U. Managing multi-dimensional multi-granular security policies using data warehousing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9408: 221-235. DOI: 10.1007/978-3-319-25645-0_15 |
0.322 |
|
2015 |
Uzun E, Lorenzi D, Atluri V, Vaidya J, Sural S. Migrating from DAC to RBAC Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9149: 69-84. DOI: 10.1007/978-3-319-20810-7_5 |
0.307 |
|
2014 |
Uzun E, Atluri V, Vaidya J, Sural S, Ferrara AL, Parlato G, Madhusudan P. Security analysis for temporal role based access control Journal of Computer Security. 22: 961-996. DOI: 10.3233/Jcs-140510 |
0.338 |
|
2014 |
Lu H, Vaidya J, Atluri V. An optimization framework for role mining Journal of Computer Security. 22: 1-31. DOI: 10.3233/Jcs-130484 |
0.577 |
|
2014 |
Jha S, Sural S, Vaidya J, Atluri V. Temporal RBAC security analysis using logic programming in the presence of administrative policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8880: 129-148. |
0.307 |
|
2013 |
Sharma M, Sural S, Vaidya J, Atluri V. AMTRAC: An administrative model for temporal role-based access control Computers and Security. 39: 201-218. DOI: 10.1016/J.Cose.2013.07.005 |
0.321 |
|
2013 |
Sharma M, Sural S, Atluri V, Vaidya J. An administrative model for spatio-temporal role based access control Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8303: 375-389. DOI: 10.1007/978-3-642-45204-8_28 |
0.334 |
|
2013 |
Mitra B, Sural S, Atluri V, Vaidya J. Toward mining of temporal roles Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7964: 65-80. DOI: 10.1007/978-3-642-39256-6_5 |
0.397 |
|
2013 |
Badar N, Vaidya J, Atluri V, Shafiq B. Risk based access control using classification Automated Security Management. 79-95. DOI: 10.1007/978-3-319-01433-3_5 |
0.35 |
|
2012 |
Lu H, Vaidya J, Atluri V, Hong Y. Constraint-aware role mining via extended Boolean matrix decomposition Ieee Transactions On Dependable and Secure Computing. 9: 655-669. DOI: 10.1109/Tdsc.2012.21 |
0.616 |
|
2012 |
Mehmood D, Shafiq B, Vaidya J, Hong Y, Adam N, Atluri V. Privacy-preserving subgraph discovery Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 161-176. DOI: 10.1007/978-3-642-31540-4_13 |
0.3 |
|
2012 |
John JC, Sural S, Atluri V, Vaidya JS. Role mining under role-usage cardinality constraint Ifip Advances in Information and Communication Technology. 376: 150-161. DOI: 10.1007/978-3-642-30436-1_13 |
0.453 |
|
2011 |
Shin H, Atluri V, Cho JS. Efficiently enforcing spatiotemporal access control under uncertain location information Journal of Computer Security. 19: 607-637. DOI: 10.3233/Jcs-2011-0423 |
0.591 |
|
2011 |
Shin H, Vaidya J, Atluri V. A profile anonymization model for location-based services Journal of Computer Security. 19: 795-833. DOI: 10.3233/Jcs-2010-0416 |
0.602 |
|
2011 |
Uzun E, Atluri V, Lu H, Vaidya J. An optimization model for the extended role mining problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6818: 76-89. DOI: 10.1007/978-3-642-22348-8_8 |
0.611 |
|
2011 |
Lu H, Vaidya J, Atluri V, Shin H, Jiang L. Weighted rank-one binary matrix factorization Proceedings of the 11th Siam International Conference On Data Mining, Sdm 2011. 283-294. |
0.548 |
|
2010 |
Atluri V, Guo Q, Shin H, Vaidya J. A unified index structure for efficient enforcement of spatiotemporal authorisations International Journal of Information and Computer Security. 4: 118-151. DOI: 10.1504/Ijics.2010.034814 |
0.553 |
|
2010 |
Qin L, Atluri V. Semantics-aware security policy specification for the semantic web data International Journal of Information and Computer Security. 4: 52-75. DOI: 10.1504/Ijics.2010.031859 |
0.334 |
|
2010 |
Vaidya J, Atluri V, Shafiq B, Adam N. Privacy-preserving trust verification Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 139-148. DOI: 10.1145/1809842.1809865 |
0.304 |
|
2010 |
Vaidya J, Atluri V, Guo Q. The Role Mining Problem: A formal perspective Acm Transactions On Information and System Security. 13. DOI: 10.1145/1805974.1805983 |
0.347 |
|
2010 |
Vaidya J, Atluri V, Warner J, Guo Q. Role engineering via prioritized subset enumeration Ieee Transactions On Dependable and Secure Computing. 7: 300-314. DOI: 10.1109/Tdsc.2008.61 |
0.587 |
|
2010 |
Shin H, Vaidya J, Atluri V, Choi S. Ensuring privacy and security for LBS through trajectory partitioning Proceedings - Ieee International Conference On Mobile Data Management. 224-226. DOI: 10.1109/MDM.2010.29 |
0.401 |
|
2010 |
Shin H, Vaidya J, Atluri V. Anonymization models for directional location based service environments Computers and Security. 29: 59-73. DOI: 10.1016/J.Cose.2009.07.006 |
0.588 |
|
2010 |
Vaidya J, Atluri V, Guo Q, Lu H. Role mining in the presence of noise Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 97-112. DOI: 10.1007/978-3-642-13739-6_7 |
0.532 |
|
2009 |
Vaidya J, Atluri V, Guo Q, Lu H. Edge-RMP: Minimizing administrative assignments for role-based access control Journal of Computer Security. 17: 211-235. DOI: 10.3233/Jcs-2009-0341 |
0.595 |
|
2009 |
Hong Y, He X, Vaidya J, Adam N, Atluri V. Effective anonymization of query logs International Conference On Information and Knowledge Management, Proceedings. 1465-1468. DOI: 10.1145/1645953.1646146 |
0.351 |
|
2009 |
Mondal S, Sural S, Atluri V. Towards formal security analysis of GTRBAC using timed automata Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 33-42. DOI: 10.1145/1542207.1542214 |
0.354 |
|
2009 |
Lu H, Li Y, Atluri V, Vaidya J. An efficient online auditing approach to limit private data disclosure Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 636-647. DOI: 10.1145/1516360.1516434 |
0.592 |
|
2009 |
Lu H, Vaidya J, Atluri V, Hong Y. Extended Boolean matrix decomposition Proceedings - Ieee International Conference On Data Mining, Icdm. 317-326. DOI: 10.1109/ICDM.2009.61 |
0.54 |
|
2009 |
Shin H, Atluri V. Spatiotemporal access control enforcement under uncertain location estimates Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5645: 159-174. DOI: 10.1007/978-3-642-03007-9_11 |
0.342 |
|
2008 |
Atluri V, Shin H, Vaidya J. Efficient security policy enforcement for the mobile environment Journal of Computer Security. 16: 439-475. DOI: 10.3233/Jcs-2008-0329 |
0.609 |
|
2008 |
Vaidya J, Atluri V, Adam N, Guo Q. Migrating to optimal RBAC with minimal perturbation Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 11-20. DOI: 10.1145/1377836.1377839 |
0.348 |
|
2008 |
Shin H, Atluri V, Vaidya J. A profile anonymization model for privacy in a personalized location based service environment Proceedings - Ieee International Conference On Mobile Data Management. 73-80. DOI: 10.1109/MDM.2008.33 |
0.373 |
|
2008 |
Lu H, Vaidya J, Atluri V. Optimal Boolean matrix decomposition: Application to role engineering Proceedings - International Conference On Data Engineering. 297-306. DOI: 10.1109/ICDE.2008.4497438 |
0.571 |
|
2008 |
Guo Q, Vaidya J, Atluri V. The role hierarchy mining problem: Discovery of optimal role hierarchies Proceedings - Annual Computer Security Applications Conference, Acsac. 237-246. DOI: 10.1109/ACSAC.2008.38 |
0.338 |
|
2008 |
Atluri V, Shin H. Efficiently enforcing the security and privacy policies in a mobile environment Handbook of Database Security: Applications and Trends. 553-573. DOI: 10.1007/978-0-387-48533-1_23 |
0.408 |
|
2008 |
Chun SA, Atluri V. Geospatial database security Handbook of Database Security: Applications and Trends. 247-266. DOI: 10.1007/978-0-387-48533-1_11 |
0.353 |
|
2007 |
Warner J, Atluri V, Mukkamala R, Vaidya J. Using semantics for automatic enforcement of access control policies among dynamic coalitions Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 235-244. DOI: 10.1145/1266840.1266877 |
0.424 |
|
2007 |
Atluri V, Shin H. Efficient security policy enforcement in a location based service environment Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4602: 61-76. |
0.3 |
|
2006 |
Vaidya J, Atluri V, Warner J. RoleMiner: Mining roles using subset enumeration Proceedings of the Acm Conference On Computer and Communications Security. 144-153. DOI: 10.1145/1180405.1180424 |
0.353 |
|
2006 |
Mitra P, Pan CC, Liu P, Atluri V. Privacy-preserving semantic interoperation and access control of heterogeneous databases Proceedings of the 2006 Acm Symposium On Information, Computer and Communications Security, Asiaccs '06. 2006: 66-77. DOI: 10.1145/1128817.1128831 |
0.378 |
|
2006 |
Atluri V, Shin H. Efficient enforcement of security policies based on tracking of mobile users Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 237-251. DOI: 10.1007/11805588_17 |
0.614 |
|
2006 |
Mukkamala R, Atluri V, Warner J, Abbadasari R. A distributed coalition service registry for ad-hoc dynamic coalitions: A service-oriented approach Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 209-223. DOI: 10.1007/11805588_15 |
0.489 |
|
2006 |
Mukkamala R, Atluri V, Warner J. A distributed service registry for resource sharing among ad-hoc dynamic coalitions Ifip International Federation For Information Processing. 193. |
0.32 |
|
2006 |
Mukkamala R, Atluri V, Warner J. A distributed service registry for resource sharing among ad-hoc dynamic coalitions Ifip International Federation For Information Processing. 193. |
0.32 |
|
2006 |
Youssef M, Adam NR, Atluri V. Semantically enhanced enforcement of mobile consumer's privacy preferences Proceedings of the Acm Symposium On Applied Computing. 2: 1172-1176. |
0.31 |
|
2006 |
Warner J, Atluri V. Inter-instance authorization constraints for secure workflow management Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 2006: 190-199. |
0.318 |
|
2005 |
Youssef M, Atluri V, Adam NR. Preserving mobile customer privacy: An access control system for moving objects and customer profiles Proceedings - Sixth International Conference On Mobile Data Management, Mdm'05. 67-76. DOI: 10.1145/1071246.1071257 |
0.39 |
|
2005 |
Atluri V, Warner J. Supporting conditional delegation in secure workflow management systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 49-58. DOI: 10.1145/1063979.1063990 |
0.319 |
|
2005 |
Warner J, Atluri V, Mukkamala R. An attribute graph based approach to map local access control policies to credential based access control policies Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3803: 134-147. DOI: 10.1007/11593980_10 |
0.342 |
|
2005 |
Atluri V, Guo Q. Unified index for mobile object data and authorizations Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3679: 80-97. DOI: 10.1007/11555827_6 |
0.379 |
|
2005 |
Warner J, Atluri V, Mukkamala R. A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions Lecture Notes in Computer Science. 3654: 252-266. DOI: 10.1007/11535706_19 |
0.597 |
|
2004 |
Atluri V, Chun SA. An authorization model for geospatial data Ieee Transactions On Dependable and Secure Computing. 1: 238-254. DOI: 10.1109/Tdsc.2004.32 |
0.369 |
|
2004 |
Atluri V, Warner J. Automatic enforcement of access control policies among dynamic coalitions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3347: 369-378. |
0.324 |
|
2004 |
Atluri V, Bertino E, Ferrari E, Mazzoleni P. Supporting delegation in secure workflow management systems Ifip Advances in Information and Communication Technology. 142: 190-204. |
0.345 |
|
2003 |
Atluri V, Adam N, Gomaa A, Adiwijaya I. Self-manifestation of composite multimedia objects to satisfy security constraints Proceedings of the Acm Symposium On Applied Computing. 927-934. |
0.307 |
|
2003 |
Qin L, Atluri V. Concept-level access control for the Semantic Web Proceedings of the Acm Workshop On Xml Security 2003 (in Association With 10th Acm Conference On Computer and Communications Security). 94-103. |
0.348 |
|
2002 |
Adam NR, Atluri V, Bertino E, Ferrari E. A content-based authorization model for digital libraries Ieee Transactions On Knowledge and Data Engineering. 14: 296-315. DOI: 10.1109/69.991718 |
0.375 |
|
2001 |
Adam NR, Atluri V, Adiwijaya I, Banerjee S, Holowczak R. A dynamic manifestation approach for providing universal access to digital library objects Ieee Transactions On Knowledge and Data Engineering. 13: 705-716. DOI: 10.1109/69.940742 |
0.301 |
|
1999 |
Bertino E, Ferrari E, Atluri V. The specification and enforcement of authorization constraints in workflow management systems Acm Transactions On Information and System Security. 2: 65-104. DOI: 10.1145/300830.300837 |
0.488 |
|
1997 |
Atluri V, Jajodia S, Bertino E. Transaction processing in multilevel secure databases with kernelized architecture: Challenges and solutions Ieee Transactions On Knowledge and Data Engineering. 9: 697-708. DOI: 10.1109/69.634749 |
0.367 |
|
1996 |
Atluri V, Jajodia S, Bertino E. Alternative correctness criteria for concurrent execution of transactions in multilevel secure databases Ieee Transactions On Knowledge and Data Engineering. 8: 839-854. DOI: 10.1109/69.542034 |
0.402 |
|
1993 |
Atluri V, Jajodia S, Bertino E. Achieving stricter correctness requirements in multilevel secure database management systems Journal of Computer Security. 2: 311-351. DOI: 10.3233/Jcs-1993-2404 |
0.302 |
|
Show low-probability matches. |