2008 |
16 | EE | Amirreza Masoumzadeh,
James B. D. Joshi:
PuRBAC: Purpose-Aware Role-Based Access Control.
OTM Conferences (2) 2008: 1104-1121 |
15 | EE | Yue Zhang,
James B. D. Joshi:
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
SACMAT 2008: 83-92 |
14 | EE | Summit R. Tuladhar,
Carlos E. Caicedo,
James B. D. Joshi:
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks.
SUTC 2008: 249-255 |
13 | EE | James B. D. Joshi,
Elisa Bertino,
Arif Ghafoor,
Yue Zhang:
Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 |
12 | EE | Yue Zhang,
James B. D. Joshi:
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies.
CollaborateCom 2007: 25-32 |
11 | EE | Yue Zhang,
James B. D. Joshi:
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
IAS 2007: 149-154 |
10 | EE | Kai Ouyang,
James B. D. Joshi:
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time.
IPCCC 2007: 467-474 |
9 | EE | Yue Zhang,
James B. D. Joshi:
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy.
IRI 2007: 196-202 |
2006 |
8 | | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh,
James B. D. Joshi:
A similarity based technique for detecting malicious executable files for computer forensics.
IRI 2006: 188-193 |
7 | EE | Siqing Du,
James B. D. Joshi:
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy.
SACMAT 2006: 228-236 |
6 | EE | James B. D. Joshi,
Elisa Bertino:
Fine-grained role-based delegation in presence of the hybrid role hierarchy.
SACMAT 2006: 81-90 |
5 | EE | Suroop Mohan Chandran,
Korporn Panyim,
James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.
iTrust 2006: 33-47 |
2005 |
4 | EE | Suroop Mohan Chandran,
James B. D. Joshi:
Towards administration of a hybrid role hierarchy.
IRI 2005: 500-505 |
3 | EE | Suroop Mohan Chandran,
James B. D. Joshi:
LoT-RBAC: A Location and Time-Based RBAC Model.
WISE 2005: 361-375 |
2 | EE | Smithi Piromruen,
James B. D. Joshi:
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments.
WORDS 2005: 36-48 |
2002 |
1 | EE | James B. D. Joshi,
Zhaohui Kevin Li,
Husni Fahmi,
Basit Shafiq,
Arif Ghafoor:
A model for secure multimedia document database system in a distributed environment.
IEEE Transactions on Multimedia 4(2): 215-234 (2002) |