A unified attribute-based access control model covering DAC, MAC and RBAC X Jin, R Krishnan, R Sandhu Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012 | 624 | 2012 |
Toward a framework for detecting privacy policy violations in android application code R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the 38th International conference on software engineering, 25-36, 2016 | 262 | 2016 |
RABAC: role-centric attribute-based access control X Jin, R Sandhu, R Krishnan Computer Network Security: 6th International Conference on Mathematical …, 2012 | 172 | 2012 |
Collaboration in multicloud computing environments: Framework and security issues M Singhal, S Chandrasekhar, T Ge, R Sandhu, R Krishnan, GJ Ahn, ... Computer 46 (2), 76-84, 2013 | 155 | 2013 |
Malware detection in cloud infrastructures using convolutional neural networks M Abdelsalam, R Krishnan, Y Huang, R Sandhu 2018 IEEE 11th international conference on cloud computing (CLOUD), 162-169, 2018 | 111 | 2018 |
Methods and apparatuses for privacy in location-aware systems MR Sastry, MJ Covington, R Krishnan US Patent App. 11/772,196, 2010 | 83 | 2010 |
Label-based access control: An ABAC model with enumerated authorization policy P Biswas, R Sandhu, R Krishnan Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016 | 70 | 2016 |
A framework for risk-aware role based access control KZ Bijon, R Krishnan, R Sandhu 2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013 | 69 | 2013 |
Attributes enhanced role-based access control model QM Rajpoot, CD Jensen, R Krishnan Trust, Privacy and Security in Digital Business: 12th International …, 2015 | 68 | 2015 |
Integrating attributes into role-based access control QM Rajpoot, CD Jensen, R Krishnan Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015 | 60 | 2015 |
Towards a discipline of mission-aware cloud computing R Sandhu, R Boppana, R Krishnan, J Reich, T Wolff, J Zachry Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 13-18, 2010 | 53 | 2010 |
Group-centric secure information-sharing models for isolated groups R Krishnan, J Niu, R Sandhu, WH Winsborough ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011 | 52 | 2011 |
Foundations for group-centric secure information sharing models R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 52 | 2009 |
Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices R Krishnan, EB John, MM Panday, JL Ninglekhu US Patent App. 14/493,305, 2015 | 48 | 2015 |
Toward deep learning based access control MN Nobi, R Krishnan, Y Huang, M Shakarami, R Sandhu Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 46 | 2022 |
Clustering-based IaaS cloud monitoring M Abdelsalam, R Krishnan, R Sandhu 2017 IEEE 10th international conference on cloud computing (CLOUD), 672-679, 2017 | 43 | 2017 |
A conceptual framework for group-centric secure information sharing R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 43 | 2009 |
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling K Bijon, R Krishnan, R Sandhu Proceedings of the 20th ACM symposium on access control models and …, 2015 | 42 | 2015 |
Online malware detection in cloud auto-scaling systems using shallow convolutional neural networks M Abdelsalam, R Krishnan, R Sandhu Data and Applications Security and Privacy XXXIII: 33rd Annual IFIP WG 11.3 …, 2019 | 40 | 2019 |
Risk-aware RBAC sessions KZ Bijon, R Krishnan, R Sandhu Information Systems Security: 8th International Conference, ICISS 2012 …, 2012 | 40 | 2012 |