A framework for risk-aware role based access control KZ Bijon, R Krishnan, R Sandhu 2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013 | 69 | 2013 |
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling K Bijon, R Krishnan, R Sandhu Proceedings of the 20th ACM symposium on access control models and …, 2015 | 41 | 2015 |
Risk-Aware RBAC Sessions KZ Bijon, R Krishnan, R Sandhu Eighth International Conference on Information Systems Security, 2012 | 40 | 2012 |
Towards an attribute based constraints specification language KZ Bijon, R Krishnan, R Sandhu 2013 International Conference on Social Computing, 108-113, 2013 | 38 | 2013 |
Constraints specification in attribute based access control KZ Bijon, R Krishman, R Sandhu Science 2 (3), 131, 2013 | 38 | 2013 |
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty K Bijon, MM Haque, R Hasan 12th International Conference on Privacy, Security and Trust (PST), 2014 | 26 | 2014 |
RT-based administrative models for community cyber security information sharing R Sandhu, KZ Bijon, X Jin, R Krishnan 7th International Conference on Collaborative Computing: Networking …, 2011 | 18 | 2011 |
Extended ReBAC administrative models with cascading revocation and provenance support Y Cheng, K Bijon, R Sandhu Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016 | 16 | 2016 |
Virtual resource orchestration constraints in cloud infrastructure as a service K Bijon, R Krishnan, R Sandhu Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 16 | 2015 |
A formal model for isolation management in cloud infrastructure-as-a-service KZ Bijon, R Krishnan, R Sandhu Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014 | 16 | 2014 |
The overhead from combating side-channels in cloud systems using VM-scheduling N Juma, J Shahen, K Bijon, M Tripunitara IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018 | 15 | 2018 |
Dynamic shared data object masking A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar US Patent 10,867,063, 2020 | 12 | 2020 |
A group-centric model for collaboration with expedient insiders in multilevel systems KZ Bijon, R Sandhu, R Krishnan 2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012 | 10 | 2012 |
Row-level security A Avanes, KZ Bijon, Z Mi, S Muralidhar, D Schultz, J Xu US Patent 11,397,826, 2022 | 9 | 2022 |
Risk-aware sessions in role based access control systems and methods of use R Krishnan, RS Sandhu, K Bijon US Patent App. 14/505,388, 2020 | 9 | 2020 |
Container-centric Access Control On Database Objects A Avanes, K Bijon, P Povinec US Patent App. 16/745,922, 2021 | 7 | 2021 |
Constraints for attribute based access control with application in cloud IaaS KZ Bijon The University of Texas at San Antonio, 2015 | 5 | 2015 |
System for implementing an object tagging framework A Avanes, KZ Bijon, Y Li, Z Mi, S Muralidhar, D Schultz US Patent 11,301,478, 2022 | 4 | 2022 |
Towards provenance and risk-awareness in social computing Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu Proceedings of the first international workshop on secure and resilient …, 2012 | 4 | 2012 |
Object dependency tracking in a cloud database system R Balakrishnan, KZ Bijon, S Muralidhar, D Schultz, J Xu US Patent 11,347,730, 2022 | 3 | 2022 |