Year |
Citation |
Score |
2020 |
Juma N, Shahen J, Bijon K, Tripunitara M. The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling Ieee Transactions On Dependable and Secure Computing. 17: 422-435. DOI: 10.1109/Tdsc.2018.2790932 |
0.407 |
|
2020 |
Massad ME, Garg S, Tripunitara MV. The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 39: 1577-1590. DOI: 10.1109/Tcad.2019.2926478 |
0.31 |
|
2020 |
Juma N, Dietl W, Tripunitara M. A computational complexity analysis of tunable type inference for Generic Universe Types Theoretical Computer Science. 814: 189-209. DOI: 10.1016/J.Tcs.2020.01.035 |
0.396 |
|
2019 |
Shahen J, Niu J, Tripunitara MV. Cree: a Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2949410 |
0.442 |
|
2019 |
Mousavi N, Tripunitara M. Constructing cascade bloom filters for efficient access enforcement Computers & Security. 81: 1-14. DOI: 10.1016/J.Cose.2018.09.015 |
0.372 |
|
2014 |
Woo JLT, Tripunitara MV. Composing kerberos and multimedia internet keying (MIKEY) for authenticatedtransport of group keys Ieee Transactions On Parallel and Distributed Systems. 25: 898-907. DOI: 10.1109/Tpds.2013.81 |
0.352 |
|
2014 |
Rehman ASU, Oliveira AB, Tripunitara M, Fischmeister S. The use of mTags for mandatory security: a case study Software - Practice and Experience. 44: 1511-1523. DOI: 10.1002/Spe.2222 |
0.423 |
|
2013 |
Sharifi A, Tripunitara MV. Least-restrictive enforcement of the chinese wall security policy Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 61-72. DOI: 10.1145/2462410.2462425 |
0.373 |
|
2013 |
Jayaraman K, Tripunitara M, Ganesh V, Rinard M, Chapin S. Mohawk Acm Transactions On Information and System Security. 15: 1-28. DOI: 10.1145/2445566.2445570 |
0.525 |
|
2013 |
Tripunitara MV, Li N. The foundational work of harrison-ruzzo-ullman revisited Ieee Transactions On Dependable and Secure Computing. 10: 28-39. DOI: 10.1109/Tdsc.2012.77 |
0.49 |
|
2012 |
Carbunar B, Tripunitara MV. Payments for outsourced computations Ieee Transactions On Parallel and Distributed Systems. 23: 313-320. DOI: 10.1109/Tpds.2011.163 |
0.375 |
|
2012 |
Rajendiran A, Ananthanarayanan S, Patel HD, Tripunitara MV, Garg S. Reliable computing with ultra-reduced instruction set co-processors Proceedings - Design Automation Conference. 697-702. DOI: 10.1109/Mm.2013.130 |
0.343 |
|
2012 |
Mousavi N, Tripunitara MV. Mitigating the intractability of the user authorization query problem in role-based access control (RBAC) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7645: 516-529. DOI: 10.1007/978-3-642-34601-9_39 |
0.373 |
|
2011 |
Chamarty S, Patel HD, Tripunitara MV. An authorization scheme for version control systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 123-132. DOI: 10.1145/1998441.1998460 |
0.354 |
|
2009 |
Li N, Wang Q, Tripunitara M. Resiliency Policies in Access Control Acm Transactions On Information and System Security. 12: 20. DOI: 10.1145/1513601.1513602 |
0.62 |
|
2008 |
Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225 |
0.644 |
|
2007 |
Tripunitara MV, Li N. A theory for comparing the expressive power of access control models Journal of Computer Security. 15: 231-272. DOI: 10.3233/Jcs-2007-15202 |
0.501 |
|
2007 |
Li N, Tripunitara MV, Bizri Z. On mutually exclusive roles and separation-of-duty Acm Transactions On Information and System Security. 10. DOI: 10.1145/1237500.1237501 |
0.615 |
|
2006 |
Li N, Tripunitara MV, Wang Q. Resiliency policies in access control Proceedings of the Acm Conference On Computer and Communications Security. 113-123. DOI: 10.1145/1180405.1180421 |
0.493 |
|
2005 |
Li N, Tripunitara MV. On safety in discretionary access control Proceedings - Ieee Symposium On Security and Privacy. 96-109. DOI: 10.1109/SP.2005.14 |
0.303 |
|
2004 |
Li N, Tripunitara MV. Security analysis in role-based access control Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 9: 126-135. DOI: 10.1145/1187441.1187442 |
0.597 |
|
2004 |
Li N, Bizri Z, Tripunitara MV. On mutually-exclusive roles and separation of duty Proceedings of the Acm Conference On Computer and Communications Security. 42-51. |
0.454 |
|
2004 |
Tripunitara MV, Li N. Comparing the expressive power of access control models Proceedings of the Acm Conference On Computer and Communications Security. 62-71. |
0.321 |
|
2001 |
Tripunitara MV, Spafford G. Connectivity provisioning with security attributes Software Focus. 2: 112-116. DOI: 10.1002/Swf.43 |
0.385 |
|
Show low-probability matches. |