Mahesh V. Tripunitara, Ph.D. - Publications

Affiliations: 
2005 Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

24 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Juma N, Shahen J, Bijon K, Tripunitara M. The Overhead from Combating Side-Channels in Cloud Systems Using VM-Scheduling Ieee Transactions On Dependable and Secure Computing. 17: 422-435. DOI: 10.1109/Tdsc.2018.2790932  0.407
2020 Massad ME, Garg S, Tripunitara MV. The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 39: 1577-1590. DOI: 10.1109/Tcad.2019.2926478  0.31
2020 Juma N, Dietl W, Tripunitara M. A computational complexity analysis of tunable type inference for Generic Universe Types Theoretical Computer Science. 814: 189-209. DOI: 10.1016/J.Tcs.2020.01.035  0.396
2019 Shahen J, Niu J, Tripunitara MV. Cree: a Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies Ieee Transactions On Dependable and Secure Computing. 1-1. DOI: 10.1109/Tdsc.2019.2949410  0.442
2019 Mousavi N, Tripunitara M. Constructing cascade bloom filters for efficient access enforcement Computers & Security. 81: 1-14. DOI: 10.1016/J.Cose.2018.09.015  0.372
2014 Woo JLT, Tripunitara MV. Composing kerberos and multimedia internet keying (MIKEY) for authenticatedtransport of group keys Ieee Transactions On Parallel and Distributed Systems. 25: 898-907. DOI: 10.1109/Tpds.2013.81  0.352
2014 Rehman ASU, Oliveira AB, Tripunitara M, Fischmeister S. The use of mTags for mandatory security: a case study Software - Practice and Experience. 44: 1511-1523. DOI: 10.1002/Spe.2222  0.423
2013 Sharifi A, Tripunitara MV. Least-restrictive enforcement of the chinese wall security policy Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 61-72. DOI: 10.1145/2462410.2462425  0.373
2013 Jayaraman K, Tripunitara M, Ganesh V, Rinard M, Chapin S. Mohawk Acm Transactions On Information and System Security. 15: 1-28. DOI: 10.1145/2445566.2445570  0.525
2013 Tripunitara MV, Li N. The foundational work of harrison-ruzzo-ullman revisited Ieee Transactions On Dependable and Secure Computing. 10: 28-39. DOI: 10.1109/Tdsc.2012.77  0.49
2012 Carbunar B, Tripunitara MV. Payments for outsourced computations Ieee Transactions On Parallel and Distributed Systems. 23: 313-320. DOI: 10.1109/Tpds.2011.163  0.375
2012 Rajendiran A, Ananthanarayanan S, Patel HD, Tripunitara MV, Garg S. Reliable computing with ultra-reduced instruction set co-processors Proceedings - Design Automation Conference. 697-702. DOI: 10.1109/Mm.2013.130  0.343
2012 Mousavi N, Tripunitara MV. Mitigating the intractability of the user authorization query problem in role-based access control (RBAC) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7645: 516-529. DOI: 10.1007/978-3-642-34601-9_39  0.373
2011 Chamarty S, Patel HD, Tripunitara MV. An authorization scheme for version control systems Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 123-132. DOI: 10.1145/1998441.1998460  0.354
2009 Li N, Wang Q, Tripunitara M. Resiliency Policies in Access Control Acm Transactions On Information and System Security. 12: 20. DOI: 10.1145/1513601.1513602  0.62
2008 Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225  0.644
2007 Tripunitara MV, Li N. A theory for comparing the expressive power of access control models Journal of Computer Security. 15: 231-272. DOI: 10.3233/Jcs-2007-15202  0.501
2007 Li N, Tripunitara MV, Bizri Z. On mutually exclusive roles and separation-of-duty Acm Transactions On Information and System Security. 10. DOI: 10.1145/1237500.1237501  0.615
2006 Li N, Tripunitara MV, Wang Q. Resiliency policies in access control Proceedings of the Acm Conference On Computer and Communications Security. 113-123. DOI: 10.1145/1180405.1180421  0.493
2005 Li N, Tripunitara MV. On safety in discretionary access control Proceedings - Ieee Symposium On Security and Privacy. 96-109. DOI: 10.1109/SP.2005.14  0.303
2004 Li N, Tripunitara MV. Security analysis in role-based access control Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 9: 126-135. DOI: 10.1145/1187441.1187442  0.597
2004 Li N, Bizri Z, Tripunitara MV. On mutually-exclusive roles and separation of duty Proceedings of the Acm Conference On Computer and Communications Security. 42-51.  0.454
2004 Tripunitara MV, Li N. Comparing the expressive power of access control models Proceedings of the Acm Conference On Computer and Communications Security. 62-71.  0.321
2001 Tripunitara MV, Spafford G. Connectivity provisioning with security attributes Software Focus. 2: 112-116. DOI: 10.1002/Swf.43  0.385
Show low-probability matches.