| 2008 |
| 16 | EE | Amirreza Masoumzadeh,
James B. D. Joshi:
PuRBAC: Purpose-Aware Role-Based Access Control.
OTM Conferences (2) 2008: 1104-1121 |
| 15 | EE | Yue Zhang,
James B. D. Joshi:
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
SACMAT 2008: 83-92 |
| 14 | EE | Summit R. Tuladhar,
Carlos E. Caicedo,
James B. D. Joshi:
Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks.
SUTC 2008: 249-255 |
| 13 | EE | James B. D. Joshi,
Elisa Bertino,
Arif Ghafoor,
Yue Zhang:
Formal foundations for hybrid hierarchies in GTRBAC.
ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
| 2007 |
| 12 | EE | Yue Zhang,
James B. D. Joshi:
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies.
CollaborateCom 2007: 25-32 |
| 11 | EE | Yue Zhang,
James B. D. Joshi:
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy.
IAS 2007: 149-154 |
| 10 | EE | Kai Ouyang,
James B. D. Joshi:
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time.
IPCCC 2007: 467-474 |
| 9 | EE | Yue Zhang,
James B. D. Joshi:
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy.
IRI 2007: 196-202 |
| 2006 |
| 8 | | Jun-Hyung Park,
Minsoo Kim,
BongNam Noh,
James B. D. Joshi:
A similarity based technique for detecting malicious executable files for computer forensics.
IRI 2006: 188-193 |
| 7 | EE | Siqing Du,
James B. D. Joshi:
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy.
SACMAT 2006: 228-236 |
| 6 | EE | James B. D. Joshi,
Elisa Bertino:
Fine-grained role-based delegation in presence of the hybrid role hierarchy.
SACMAT 2006: 81-90 |
| 5 | EE | Suroop Mohan Chandran,
Korporn Panyim,
James B. D. Joshi:
A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments.
iTrust 2006: 33-47 |
| 2005 |
| 4 | EE | Suroop Mohan Chandran,
James B. D. Joshi:
Towards administration of a hybrid role hierarchy.
IRI 2005: 500-505 |
| 3 | EE | Suroop Mohan Chandran,
James B. D. Joshi:
LoT-RBAC: A Location and Time-Based RBAC Model.
WISE 2005: 361-375 |
| 2 | EE | Smithi Piromruen,
James B. D. Joshi:
An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments.
WORDS 2005: 36-48 |
| 2002 |
| 1 | EE | James B. D. Joshi,
Zhaohui Kevin Li,
Husni Fahmi,
Basit Shafiq,
Arif Ghafoor:
A model for secure multimedia document database system in a distributed environment.
IEEE Transactions on Multimedia 4(2): 215-234 (2002) |