dblp.uni-trier.dewww.uni-trier.de

James B. D. Joshi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
16EEAmirreza Masoumzadeh, James B. D. Joshi: PuRBAC: Purpose-Aware Role-Based Access Control. OTM Conferences (2) 2008: 1104-1121
15EEYue Zhang, James B. D. Joshi: UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. SACMAT 2008: 83-92
14EESummit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi: Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. SUTC 2008: 249-255
13EEJames B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): (2008)
2007
12EEYue Zhang, James B. D. Joshi: A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. CollaborateCom 2007: 25-32
11EEYue Zhang, James B. D. Joshi: SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. IAS 2007: 149-154
10EEKai Ouyang, James B. D. Joshi: CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. IPCCC 2007: 467-474
9EEYue Zhang, James B. D. Joshi: ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. IRI 2007: 196-202
2006
8 Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi: A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193
7EESiqing Du, James B. D. Joshi: Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. SACMAT 2006: 228-236
6EEJames B. D. Joshi, Elisa Bertino: Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90
5EESuroop Mohan Chandran, Korporn Panyim, James B. D. Joshi: A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. iTrust 2006: 33-47
2005
4EESuroop Mohan Chandran, James B. D. Joshi: Towards administration of a hybrid role hierarchy. IRI 2005: 500-505
3EESuroop Mohan Chandran, James B. D. Joshi: LoT-RBAC: A Location and Time-Based RBAC Model. WISE 2005: 361-375
2EESmithi Piromruen, James B. D. Joshi: An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments. WORDS 2005: 36-48
2002
1EEJames B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor: A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia 4(2): 215-234 (2002)

Coauthor Index

1Elisa Bertino [6] [13]
2Carlos E. Caicedo [14]
3Suroop Mohan Chandran [3] [4] [5]
4Siqing Du [7]
5Husni Fahmi [1]
6Arif Ghafoor [1] [13]
7Minsoo Kim [8]
8Zhaohui Kevin Li [1]
9Amirreza Masoumzadeh [16]
10BongNam Noh (Bong-Nam Noh) [8]
11Kai Ouyang [10]
12Korporn Panyim [5]
13Jun-Hyung Park [8]
14Smithi Piromruen [2]
15Basit Shafiq [1]
16Summit R. Tuladhar [14]
17Yue Zhang [9] [11] [12] [13] [15]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)