Segui
Khalid Bijon
Khalid Bijon
Snowflake
Email verificata su snowflake.com
Titolo
Citata da
Citata da
Anno
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
692013
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
422015
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
402012
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
392013
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131, 2013
392013
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
262014
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
192011
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
172014
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
162016
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
162015
The overhead from combating side-channels in cloud systems using VM-scheduling
N Juma, J Shahen, K Bijon, M Tripunitara
IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018
152018
Dynamic shared data object masking
A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar
US Patent 10,867,063, 2020
142020
Row-level security
A Avanes, KZ Bijon, Z Mi, S Muralidhar, D Schultz, J Xu
US Patent 11,397,826, 2022
102022
Risk-aware sessions in role based access control systems and methods of use
R Krishnan, RS Sandhu, K Bijon
US Patent App. 14/505,388, 2020
102020
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
102012
Container-centric Access Control On Database Objects
A Avanes, K Bijon, P Povinec
US Patent App. 16/745,922, 2021
92021
Remote execution using a global identity
KZ Bijon, D Carru, CP Child, E Karlson, Z Mi
US Patent 11,057,491, 2021
62021
Constraints for attribute based access control with application in cloud IaaS
KZ Bijon
The University of Texas at San Antonio, 2015
52015
System for implementing an object tagging framework
A Avanes, KZ Bijon, Y Li, Z Mi, S Muralidhar, D Schultz
US Patent 11,301,478, 2022
42022
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the first international workshop on secure and resilient …, 2012
42012
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20