A unified attribute-based access control model covering DAC, MAC and RBAC X Jin, R Krishnan, R Sandhu Data and Applications Security and Privacy XXVI, 41-55, 2012 | 623 | 2012 |
Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network A Liu, X Jin, G Cui, Z Chen Information Sciences 230, 197-226, 2013 | 173 | 2013 |
RABAC: Role-Centric Attribute-Based Access Control X Jin, R Sandhu, R Krishnan 6th International Conference, on Mathematical Methods, Models, and …, 2012 | 172 | 2012 |
Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud X Jin The University of Texas at San Antonio, 2014 | 60* | 2014 |
An elaborate chronological and spatial analysis of energy hole for wireless sensor networks A Liu, ZH Liu, M Nurudeen, X Jin, Z Chen Computer Standards & Interfaces 35 (1), 132-149, 2013 | 41 | 2013 |
A role-based administration model for attributes X Jin, R Krishnan, R Sandhu Proceedings of the first international workshop on secure and resilient …, 2012 | 38 | 2012 |
Role and attribute based collaborative administration of intra-tenant cloud iaas X Jin, R Krishnan, R Sandhu 10th IEEE International Conference on Collaborative Computing: Networking …, 2014 | 33 | 2014 |
Reachability analysis for role-based administration of attributes X Jin, R Krishnan, R Sandhu Proceedings of the 2013 ACM workshop on Digital identity management, 73-84, 2013 | 22 | 2013 |
RT-based administrative models for community cyber security information sharing R Sandhu, KZ Bijon, X Jin, R Krishnan 7th International Conference on Collaborative Computing: Networking …, 2011 | 19 | 2011 |