2008 |
13 | EE | Doug Kuhlman,
Ryan Moriarty,
Tony Braskich,
Steve Emeott,
Mahesh V. Tripunitara:
A Correctness Proof of a Mesh Security Architecture.
CSF 2008: 315-330 |
12 | EE | S. Jha,
Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang,
William H. Winsborough:
Towards Formal Verification of Role-Based Access Control Policies.
IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008) |
2007 |
11 | EE | Ninghui Li,
Mahesh V. Tripunitara,
Ziad Bizri:
On mutually exclusive roles and separation-of-duty.
ACM Trans. Inf. Syst. Secur. 10(2): (2007) |
10 | EE | Mahesh V. Tripunitara,
Thomas S. Messerges:
Resolving the Micropayment Problem.
IEEE Computer 40(2): 104-106 (2007) |
9 | EE | Mahesh V. Tripunitara,
Ninghui Li:
A theory for comparing the expressive power of access control models.
Journal of Computer Security 15(2): 231-272 (2007) |
2006 |
8 | EE | Ninghui Li,
Mahesh V. Tripunitara,
Qihua Wang:
Resiliency policies in access control.
ACM Conference on Computer and Communications Security 2006: 113-123 |
7 | EE | Ninghui Li,
Mahesh V. Tripunitara:
Security analysis in role-based access control.
ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006) |
2005 |
6 | EE | Ninghui Li,
Mahesh V. Tripunitara:
On Safety in Discretionary Access Control.
IEEE Symposium on Security and Privacy 2005: 96-109 |
2004 |
5 | EE | Ninghui Li,
Ziad Bizri,
Mahesh V. Tripunitara:
On mutually-exclusive roles and separation of duty.
ACM Conference on Computer and Communications Security 2004: 42-51 |
4 | EE | Mahesh V. Tripunitara,
Ninghui Li:
Comparing the expressive power of access control models.
ACM Conference on Computer and Communications Security 2004: 62-71 |
3 | EE | Ninghui Li,
Mahesh V. Tripunitara:
Security analysis in role-based access control.
SACMAT 2004: 126-135 |
2001 |
2 | | Mahesh V. Tripunitara,
Eugene H. Spafford:
Connectivity provisioning with security attributes.
Software Focus 2(3): 112-116 (2001) |
1999 |
1 | EE | Mahesh V. Tripunitara,
Partha Dutta:
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
ACSAC 1999: 303-309 |