A generalized temporal role-based access control model
Joshi, J.B.D., Bertino, E., Latif, U., Ghafoor, A.
Published in IEEE transactions on knowledge and data engineering (01.01.2005)
Published in IEEE transactions on knowledge and data engineering (01.01.2005)
Get full text
Journal Article
Secure interoperation in a multidomain environment employing RBAC policies
Shafiq, B., Joshi, J.B.D., Bertino, E., Ghafoor, A.
Published in IEEE transactions on knowledge and data engineering (01.11.2005)
Published in IEEE transactions on knowledge and data engineering (01.11.2005)
Get full text
Journal Article
A model for secure multimedia document database system in a distributed environment
Joshi, J.B.D., Zhaohui Kevin Li, Fahmi, H., Shafiq, B., Ghafoor, A.
Published in IEEE transactions on multimedia (01.06.2002)
Published in IEEE transactions on multimedia (01.06.2002)
Get full text
Journal Article
IPv6 Security Challenges
Caicedo, C.E., Joshi, J.B.D., Tuladhar, S.R.
Published in Computer (Long Beach, Calif.) (01.02.2009)
Published in Computer (Long Beach, Calif.) (01.02.2009)
Get full text
Journal Article
XML-based specification for Web services document security
Bhatti, R., Bertino, E., Ghafoor, A., Joshi, J.B.D.
Published in Computer (Long Beach, Calif.) (01.04.2004)
Published in Computer (Long Beach, Calif.) (01.04.2004)
Get full text
Journal Article
A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies
Yue Zhang, Joshi, J.B.D.
Published in 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007) (01.11.2007)
Published in 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007) (01.11.2007)
Get full text
Conference Proceeding
SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy
Yue Zhang, Joshi, J.B.D.
Published in Third International Symposium on Information Assurance and Security (01.08.2007)
Published in Third International Symposium on Information Assurance and Security (01.08.2007)
Get full text
Conference Proceeding
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy
Yue Zhang, Joshi, J.B.D.
Published in 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01.12.2008)
Published in 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (01.12.2008)
Get full text
Conference Proceeding
ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy
Yue Zhang, Joshi, J.B.D.
Published in 2007 IEEE International Conference on Information Reuse and Integration (01.08.2007)
Published in 2007 IEEE International Conference on Information Reuse and Integration (01.08.2007)
Get full text
Conference Proceeding
CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time
Kai Ouyang, Joshi, J.B.D.
Published in 2007 IEEE International Performance, Computing, and Communications Conference (01.04.2007)
Published in 2007 IEEE International Performance, Computing, and Communications Conference (01.04.2007)
Get full text
Conference Proceeding
Towards administration of a hybrid role hierarchy
Suroop Mohan Chandran, Joshi, J.B.D.
Published in IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005 (2005)
Published in IRI -2005 IEEE International Conference on Information Reuse and Integration, Conf, 2005 (2005)
Get full text
Conference Proceeding
Hybrid role hierarchy for generalized temporal role based access control model
Joshi, J.B.D., Bertino, E., Ghafoor, A.
Published in Proceedings - International Computer Software & Applications Conference (2002)
Published in Proceedings - International Computer Software & Applications Conference (2002)
Get full text
Conference Proceeding
Journal Article
A Similarity based Technique for Detecting Malicious Executable files for Computer Forensics
Jun-Hyung Park, Minsoo Kim, Bong-Nam Noh, Joshi, J.B.D.
Published in 2006 IEEE International Conference on Information Reuse & Integration (01.09.2006)
Published in 2006 IEEE International Conference on Information Reuse & Integration (01.09.2006)
Get full text
Conference Proceeding