Privacy-aware role-based access control Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 501 | 2010 |
Foundations of disjunctive logic programming J Lobo, J Minker, A Rajasekar The MIT Press, 1992 | 501 | 1992 |
Apolicy DESCRIPTION LANGUAGE J Lobo | 416 | 1999 |
Mining roles with semantic meanings I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 231 | 2008 |
Evaluating role mining algorithms I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 186 | 2009 |
Conflict resolution using logic programming J Chomicki, J Lobo, S Naqvi IEEE Transactions on knowledge and data engineering 15 (1), 244-249, 2003 | 180 | 2003 |
Risk-based access control systems built on fuzzy inferences Q Ni, E Bertino, J Lobo Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010 | 178 | 2010 |
Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms W Rankothge, F Le, A Russo, J Lobo IEEE Transactions on Network and Service Management 14 (2), 343-356, 2017 | 173 | 2017 |
Method and system for supporting non-intrusive and effective voice communication among mobile users R Bhatia, H Johansson, J Lobo, S Sharma US Patent 7,330,721, 2008 | 173 | 2008 |
Access control policy combining: theory meets practice N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 161 | 2009 |
Policy-based management of networked computing systems D Agrawal, KW Lee, J Lobo IEEE Communications Magazine 43 (10), 69-75, 2005 | 152 | 2005 |
Weak generalized closed world assumption A Rajasekar, J Lobo, J Minker Journal of automated reasoning 5 (3), 293-307, 1989 | 137 | 1989 |
On the correctness criteria of fine-grained access control in relational databases Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun Proceedings of the 33rd international conference on Very large data bases …, 2007 | 133 | 2007 |
An algebra for fine-grained integration of XACML policies P Rao, D Lin, E Bertino, N Li, J Lobo Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 131 | 2009 |
An obligation model bridging access control policies and privacy policies Q Ni, E Bertino, J Lobo Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 128 | 2008 |
Policy ratification D Agrawal, J Giles, KW Lee, J Lobo Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005 | 128 | 2005 |
Mining roles with multiple objectives I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010 | 124 | 2010 |
A logic programming approach to conflict resolution in policy management J Chomicki, J Lobo, SA Naqvi Proceedings of the Seventh International Conference on Principles of …, 2000 | 122 | 2000 |
Expressive policy analysis with enhanced system dynamicity R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 110 | 2009 |
Towards Making Network Function Virtualization a Cloud Computing Service W Rankothge, J Ma, F Le, AM Russo, J Lobo Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium …, 2015 | 107 | 2015 |