Ram Krishnan
Ram Krishnan
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
A unified attribute-based access control model covering DAC, MAC and RBAC
X Jin, R Krishnan, R Sandhu
IFIP Annual Conference on Data and Applications Security and Privacy, 41-55, 2012
4802012
RABAC: role-centric attribute-based access control
X Jin, R Sandhu, R Krishnan
International Conference on Mathematical Methods, Models, and Architectures …, 2012
1362012
Collaboration in multicloud computing environments: Framework and security issues
M Singhal, S Chandrasekhar, T Ge, R Sandhu, R Krishnan, GJ Ahn, ...
Computer 46 (2), 76-84, 2013
1352013
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016
1132016
Methods and apparatuses for privacy in location-aware systems
MR Sastry, MJ Covington, R Krishnan
US Patent App. 11/772,196, 2010
732010
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
622013
Foundations for group-centric secure information sharing models
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 14th ACM symposium on Access control models and …, 2009
512009
Attributes enhanced role-based access control model
QM Rajpoot, CD Jensen, R Krishnan
International Conference on Trust and Privacy in Digital Business, 3-17, 2015
502015
Towards a discipline of mission-aware cloud computing
R Sandhu, R Boppana, R Krishnan, J Reich, T Wolff, J Zachry
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 13-18, 2010
452010
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
452009
Group-centric secure information-sharing models for isolated groups
R Krishnan, J Niu, R Sandhu, WH Winsborough
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011
432011
Malware detection in cloud infrastructures using convolutional neural networks
M Abdelsalam, R Krishnan, Y Huang, R Sandhu
2018 IEEE 11th International conference on cloud computing (CLOUD), 162-169, 2018
412018
Label-based access control: An ABAC model with enumerated authorization policy
P Biswas, R Sandhu, R Krishnan
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
392016
Integrating attributes into role-based access control
QM Rajpoot, CD Jensen, R Krishnan
IFIP Annual Conference on Data and Applications Security and Privacy, 242-249, 2015
392015
Risk-aware RBAC sessions
KZ Bijon, R Krishnan, R Sandhu
International Conference on Information Systems Security, 59-74, 2012
382012
PEI models towards scalable, usable and high-assurance information sharing
R Krishnan, R Sandhu, K Ranganathan
Proceedings of the 12th ACM symposium on Access control models and …, 2007
372007
Efficient and reliable link state information dissemination
N Ansari, G Cheng, RN Krishnan
IEEE Communications Letters 8 (5), 317-319, 2004
362004
Constraints specication in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), pp. 131-144, 2013
342013
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
322013
A role-based administration model for attributes
X Jin, R Krishnan, R Sandhu
Proceedings of the First International Workshop on Secure and Resilient …, 2012
322012
The system can't perform the operation now. Try again later.
Articles 1–20