2007 | ||
---|---|---|
4 | EE | Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan: PEI models towards scalable, usable and high-assurance information sharing. SACMAT 2007: 145-150 |
2006 | ||
3 | EE | Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang: Secure information sharing enabled by Trusted Computing and PEI models. ASIACCS 2006: 2-12 |
2 | EE | Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington: Client-side access control enforcement using trusted computing and PEI models. J. High Speed Networks 15(3): 229-245 (2006) |
2004 | ||
1 | EE | Kumar Ranganathan: Trustworthy Pervasive Computing: The Hard Security Problems. PerCom Workshops 2004: 117-121 |
1 | Michael J. Covington | [2] |
2 | Ram Krishnan | [4] |
3 | Ravi S. Sandhu | [2] [3] [4] |
4 | Xinwen Zhang | [2] [3] |