2009 |
23 | EE | David F. Ferraiolo,
D. Richard Kuhn:
Role-Based Access Controls
CoRR abs/0903.2171: (2009) |
2008 |
22 | EE | Yu Lei,
Raghu Kacker,
D. Richard Kuhn,
Vadim Okun,
James Lawrence:
IPOG/IPOG-D: efficient test generation for multi-way combinatorial testing.
Softw. Test., Verif. Reliab. 18(3): 125-148 (2008) |
2007 |
21 | EE | Yu Lei,
Raghu Kacker,
D. Richard Kuhn,
Vadim Okun,
James Lawrence:
IPOG: A General Strategy for T-Way Software Testing.
ECBS 2007: 549-556 |
2006 |
20 | EE | D. Richard Kuhn,
Vadim Okun:
Pseudo-Exhaustive Testing for Software.
SEW 2006: 153-158 |
19 | EE | Vincent C. Hu,
D. Richard Kuhn,
David F. Ferraiolo:
The Computational Complexity of Enforceability Validation for Generic Access Control Rules.
SUTC (1) 2006: 260-267 |
18 | EE | Kotikalapudi Sriram,
Doug Montgomery,
Oliver Borchert,
Okhee Kim,
D. Richard Kuhn:
Study of BGP Peering Session Attacks and Their Impacts on Routing Performance.
IEEE Journal on Selected Areas in Communications 24(10): 1901-1915 (2006) |
2005 |
17 | EE | David F. Ferraiolo,
Serban I. Gavrila,
Vincent C. Hu,
D. Richard Kuhn:
Composing and combining policies under the policy machine.
SACMAT 2005: 11-20 |
16 | EE | Thomas J. Walsh,
D. Richard Kuhn:
Challenges in Securing Voice over IP.
IEEE Security & Privacy 3(3): 44-49 (2005) |
2004 |
15 | EE | D. Richard Kuhn,
Dolores R. Wallace,
Albert M. Gallo:
Software Fault Interactions and Implications for Software Testing.
IEEE Trans. Software Eng. 30(6): 418-421 (2004) |
2002 |
14 | | Paul E. Black,
D. Richard Kuhn,
Carl J. Williams:
Quantum computing and communication.
Advances in Computers 56: 190-245 (2002) |
2001 |
13 | EE | Ravi S. Sandhu,
Elisa Bertino,
Trent Jaeger,
D. Richard Kuhn,
Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
SACMAT 2001: 53 |
12 | EE | David F. Ferraiolo,
Ravi S. Sandhu,
Serban I. Gavrila,
D. Richard Kuhn,
Ramaswamy Chandramouli:
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur. 4(3): 224-274 (2001) |
2000 |
11 | EE | Ravi S. Sandhu,
David F. Ferraiolo,
D. Richard Kuhn:
The NIST model for role-based access control: towards a unified standard.
ACM Workshop on Role-Based Access Control 2000: 47-63 |
1999 |
10 | EE | Dolores R. Wallace,
D. Richard Kuhn:
Lessons from 342 Medical Device Failures.
HASE 1999: 123-131 |
9 | EE | David F. Ferraiolo,
John F. Barkley,
D. Richard Kuhn:
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet.
ACM Trans. Inf. Syst. Secur. 2(1): 34-64 (1999) |
8 | EE | D. Richard Kuhn:
Fault classes and error detection capability of specification-based testing.
ACM Trans. Softw. Eng. Methodol. 8(4): 411-424 (1999) |
7 | EE | Shukri Wakid,
D. Richard Kuhn,
Dolores R. Wallace:
Toward Credible IT Testing and Certification.
IEEE Software 16(4): 39-47 (1999) |
1998 |
6 | EE | D. Richard Kuhn:
Role Based Access Control on MLS Systems without Kernel Changes.
ACM Workshop on Role-Based Access Control 1998: 25-32 |
1997 |
5 | EE | D. Richard Kuhn:
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems.
ACM Workshop on Role-Based Access Control 1997: 23-30 |
4 | | D. Richard Kuhn:
Sources of Failure in the Public Switched Telephone Network.
IEEE Computer 30(4): 31-36 (1997) |
1995 |
3 | EE | David F. Ferraiolo,
D. Richard Kuhn:
Future directions in role-based access control.
ACM Workshop on Role-Based Access Control 1995 |
1993 |
2 | | D. Richard Kuhn,
Patricia Edfors,
Victoria Howard,
Chuck Caputo,
Ted S. Phillips:
Improving Public Switched Network Security in an Open Environment.
IEEE Computer 26(8): 32-35 (1993) |
1990 |
1 | | D. Richard Kuhn:
On the Effective Use of Software Standards in Systems Integration.
ICSI 1990: 455-461 |