Follow
Ram Krishnan
Ram Krishnan
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
A unified attribute-based access control model covering DAC, MAC and RBAC
X Jin, R Krishnan, R Sandhu
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
6002012
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016
2242016
RABAC: role-centric attribute-based access control
X Jin, R Sandhu, R Krishnan
Computer Network Security: 6th International Conference on Mathematical …, 2012
1672012
Collaboration in multicloud computing environments: Framework and security issues
M Singhal, S Chandrasekhar, T Ge, R Sandhu, R Krishnan, GJ Ahn, ...
Computer 46 (2), 76-84, 2013
1492013
Methods and apparatuses for privacy in location-aware systems
MR Sastry, MJ Covington, R Krishnan
US Patent App. 11/772,196, 2010
832010
Malware detection in cloud infrastructures using convolutional neural networks
M Abdelsalam, R Krishnan, Y Huang, R Sandhu
2018 IEEE 11th international conference on cloud computing (CLOUD), 162-169, 2018
822018
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
682013
Label-based access control: An ABAC model with enumerated authorization policy
P Biswas, R Sandhu, R Krishnan
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
672016
Attributes enhanced role-based access control model
QM Rajpoot, CD Jensen, R Krishnan
Trust, Privacy and Security in Digital Business: 12th International …, 2015
652015
Integrating attributes into role-based access control
QM Rajpoot, CD Jensen, R Krishnan
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
572015
Towards a discipline of mission-aware cloud computing
R Sandhu, R Boppana, R Krishnan, J Reich, T Wolff, J Zachry
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 13-18, 2010
522010
Foundations for group-centric secure information sharing models
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 14th ACM symposium on Access control models and …, 2009
522009
Group-centric secure information-sharing models for isolated groups
R Krishnan, J Niu, R Sandhu, WH Winsborough
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011
512011
Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices
R Krishnan, EB John, MM Panday, JL Ninglekhu
US Patent App. 14/493,305, 2015
462015
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
442009
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
402015
Risk-aware RBAC sessions
KZ Bijon, R Krishnan, R Sandhu
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
392012
Clustering-based IaaS cloud monitoring
M Abdelsalam, R Krishnan, R Sandhu
2017 IEEE 10th international conference on cloud computing (CLOUD), 672-679, 2017
382017
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
382013
PEI models towards scalable, usable and high-assurance information sharing
R Krishnan, R Sandhu, K Ranganathan
Proceedings of the 12th ACM symposium on Access control models and …, 2007
382007
The system can't perform the operation now. Try again later.
Articles 1–20