A provenance-based access control model J Park, D Nguyen, R Sandhu 2012 Tenth Annual International Conference on Privacy, Security and Trust …, 2012 | 105 | 2012 |
Dependency Path Patterns as the Foundation of Access Control in Provenance-aware Systems. D Nguyen, J Park, R Sandhu TaPP, 2012 | 40 | 2012 |
A roadmap for privacy-enhanced secure data provenance E Bertino, G Ghinita, M Kantarcioglu, D Nguyen, J Park, R Sandhu, ... Journal of Intelligent Information Systems 43 (3), 481-501, 2014 | 34 | 2014 |
A provenance-based access control model for dynamic separation of duties D Nguyen, J Park, R Sandhu 2013 Eleventh Annual Conference on Privacy, Security and Trust, 247-256, 2013 | 30 | 2013 |
Adopting provenance-based access control in openstack cloud iaas D Nguyen, J Park, R Sandhu International Conference on Network and System Security, 15-27, 2015 | 20 | 2015 |
A provenance-aware access control framework with typed provenance L Sun, J Park, D Nguyen, R Sandhu IEEE Transactions on Dependable and Secure Computing 13 (4), 411-423, 2015 | 15 | 2015 |
On data provenance in group-centric secure collaboration J Park, D Nguyen, R Sandhu 7th International Conference on Collaborative Computing: Networking …, 2011 | 15 | 2011 |
Integrated provenance data for access control in group-centric collaboration D Nguyen, J Park, R Sandhu 2012 IEEE 13th International Conference on Information Reuse & Integration …, 2012 | 8 | 2012 |
Provenance-based access control models D Nguyen The University of Texas at San Antonio, 2014 | 6 | 2014 |
Towards provenance and risk-awareness in social computing Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu Proceedings of the First International Workshop on Secure and Resilient …, 2012 | 3 | 2012 |