Khalid Bijon
Khalid Bijon
Verified email at
Cited by
Cited by
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
Constraints specication in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), pp. 131-144, 2013
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
Mitigating multi-tenancy risks in IaaS cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
International Conference on Network and System Security, 41-53, 2015
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
The overhead from combating side-channels in cloud systems using vm-scheduling
N Juma, J Shahen, K Bijon, M Tripunitara
IEEE Transactions on Dependable and Secure Computing 17 (2), 422-435, 2018
Constraints for attribute based access control with application in cloud IaaS
KZ Bijon
The University of Texas at San Antonio, 2015
A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders
KZ Bijon, T Ahmed, R Sandhu, R Krishnan
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the First International Workshop on Secure and Resilient …, 2012
Mitigating Multi-Tenancy Risks in IaaS Cloud through Constraints-Driven Virtual Resource Scheduling” acm. org
K Bijon, R Krishnan, R Sandhu
SACMAT15, June13, 2015
RK (nd)
KZ Bijon
Constraint Specification in Attribute Based Access Control, 2015
Equivalence of Group-Centric Collaboration with Expedient Insiders (GEI) and LBAC with Collaborative Compartments (LCC)
T Ahmed, R Sandhu, K Bijon, R Krishnan
Risk-aware sessions in role based access control systems and methods of use
R Krishnan, RS Sandhu, K Bijon
US Patent App. 14/505,388, 2020
Dynamic shared data object masking
A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar
US Patent App. 17/334,315, 2021
The system can't perform the operation now. Try again later.
Articles 1–20