dblp.uni-trier.dewww.uni-trier.de

Mahesh V. Tripunitara

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
13EEDoug Kuhlman, Ryan Moriarty, Tony Braskich, Steve Emeott, Mahesh V. Tripunitara: A Correctness Proof of a Mesh Security Architecture. CSF 2008: 315-330
12EES. Jha, Ninghui Li, Mahesh V. Tripunitara, Qihua Wang, William H. Winsborough: Towards Formal Verification of Role-Based Access Control Policies. IEEE Trans. Dependable Sec. Comput. 5(4): 242-255 (2008)
2007
11EENinghui Li, Mahesh V. Tripunitara, Ziad Bizri: On mutually exclusive roles and separation-of-duty. ACM Trans. Inf. Syst. Secur. 10(2): (2007)
10EEMahesh V. Tripunitara, Thomas S. Messerges: Resolving the Micropayment Problem. IEEE Computer 40(2): 104-106 (2007)
9EEMahesh V. Tripunitara, Ninghui Li: A theory for comparing the expressive power of access control models. Journal of Computer Security 15(2): 231-272 (2007)
2006
8EENinghui Li, Mahesh V. Tripunitara, Qihua Wang: Resiliency policies in access control. ACM Conference on Computer and Communications Security 2006: 113-123
7EENinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. ACM Trans. Inf. Syst. Secur. 9(4): 391-420 (2006)
2005
6EENinghui Li, Mahesh V. Tripunitara: On Safety in Discretionary Access Control. IEEE Symposium on Security and Privacy 2005: 96-109
2004
5EENinghui Li, Ziad Bizri, Mahesh V. Tripunitara: On mutually-exclusive roles and separation of duty. ACM Conference on Computer and Communications Security 2004: 42-51
4EEMahesh V. Tripunitara, Ninghui Li: Comparing the expressive power of access control models. ACM Conference on Computer and Communications Security 2004: 62-71
3EENinghui Li, Mahesh V. Tripunitara: Security analysis in role-based access control. SACMAT 2004: 126-135
2001
2 Mahesh V. Tripunitara, Eugene H. Spafford: Connectivity provisioning with security attributes. Software Focus 2(3): 112-116 (2001)
1999
1EEMahesh V. Tripunitara, Partha Dutta: A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. ACSAC 1999: 303-309

Coauthor Index

1Ziad Bizri [5] [11]
2Tony Braskich [13]
3Partha Dutta [1]
4Steve Emeott [13]
5S. Jha [12]
6Doug Kuhlman [13]
7Ninghui Li [3] [4] [5] [6] [7] [8] [9] [11] [12]
8Thomas S. Messerges [10]
9Ryan Moriarty [13]
10Eugene H. Spafford [2]
11Qihua Wang [8] [12]
12William H. Winsborough [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)