Follow
Vijayalakshmi Atluri
Vijayalakshmi Atluri
Professor of Information Systems, Rutgers Universtiy
Verified email at rutgers.edu - Homepage
Title
Cited by
Cited by
Year
The specification and enforcement of authorization constraints in workflow management systems
E Bertino, E Ferrari, V Atluri
ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999
8001999
Modeling and analysis of workflows using Petri nets
NR Adam, V Atluri, WK Huang
Journal of Intelligent Information Systems 10 (2), 131-158, 1998
5161998
The role mining problem: finding a minimal descriptive set of roles
J Vaidya, V Atluri, Q Guo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
3772007
An authorization model for workflows
V Atluri, W Huang
Computer Security—ESORICS 96, 44-64, 1996
3511996
Roleminer: mining roles using subset enumeration
J Vaidya, V Atluri, J Warner
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2432006
Analysis of political discourse on twitter in the context of the 2016 US presidential elections
U Yaqub, SA Chun, V Atluri, J Vaidya
Government Information Quarterly 34 (4), 613-626, 2017
2102017
Optimal Boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on …, 2008
2002008
A content-based authorization model for digital libraries
NR Adam, V Atluri, E Bertino, E Ferrari
Knowledge and Data Engineering, IEEE Transactions on 14 (2), 296-315, 2002
1852002
Concept-level access control for the semantic web
L Qin, V Atluri
Proceedings of the 2003 ACM workshop on XML security, 94-103, 2003
1642003
Secureflow: A secure web-enabled workflow management system
WK Huang, V Atluri
Proceedings of the fourth ACM workshop on Role-based access control, 83-94, 1999
1581999
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems
E Bertino, E Ferrari, V Atluri
Proceedings of the second ACM workshop on Role-based access control, 1-12, 1997
1581997
A Chinese wall security model for decentralized workflow systems
V Atluri, SA Chun, P Mazzoleni
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
1222001
A petri net based safety analysis of workflow authorization models
V Atluri, WK Huang
Journal of Computer Security 8 (2/3), 209-240, 2000
1172000
Supporting conditional delegation in secure workflow management systems
V Atluri, J Warner
Proceedings of the tenth ACM symposium on Access control models and …, 2005
1152005
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets
NR Adam, VP Janeja, V Atluri
Proceedings of the 2004 ACM symposium on Applied computing, 576-583, 2004
1102004
A survey of role mining
B Mitra, S Sural, J Vaidya, V Atluri
ACM Computing Surveys (CSUR) 48 (4), 1-37, 2016
1032016
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
D Ferraiolo, V Atluri, S Gavrila
Journal of Systems Architecture 57 (4), 412-424, 2011
952011
Migrating to optimal RBAC with minimal perturbation
J Vaidya, V Atluri, Q Guo, N Adam
Proceedings of the 13th ACM symposium on Access control models and …, 2008
922008
The role mining problem: A formal perspective
J Vaidya, V Atluri, Q Guo
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
912010
A clickstream-based collaborative filtering personalization model: towards a better performance
DH Kim, V Atluri, M Bieber, N Adam, Y Yesha
Proceedings of the 6th annual ACM international workshop on Web information …, 2004
892004
The system can't perform the operation now. Try again later.
Articles 1–20