Follow
Ram Krishnan
Ram Krishnan
Verified email at utsa.edu - Homepage
Title
Cited by
Cited by
Year
A unified attribute-based access control model covering DAC, MAC and RBAC
X Jin, R Krishnan, R Sandhu
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
6112012
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International conference on software engineering, 25-36, 2016
2452016
RABAC: role-centric attribute-based access control
X Jin, R Sandhu, R Krishnan
Computer Network Security: 6th International Conference on Mathematical …, 2012
1702012
Collaboration in multicloud computing environments: Framework and security issues
M Singhal, S Chandrasekhar, T Ge, R Sandhu, R Krishnan, GJ Ahn, ...
Computer 46 (2), 76-84, 2013
1542013
Malware detection in cloud infrastructures using convolutional neural networks
M Abdelsalam, R Krishnan, Y Huang, R Sandhu
2018 IEEE 11th international conference on cloud computing (CLOUD), 162-169, 2018
992018
Methods and apparatuses for privacy in location-aware systems
MR Sastry, MJ Covington, R Krishnan
US Patent App. 11/772,196, 2010
832010
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
692013
Label-based access control: An ABAC model with enumerated authorization policy
P Biswas, R Sandhu, R Krishnan
Proceedings of the 2016 ACM International Workshop on Attribute Based Access …, 2016
682016
Attributes enhanced role-based access control model
QM Rajpoot, CD Jensen, R Krishnan
Trust, Privacy and Security in Digital Business: 12th International …, 2015
662015
Integrating attributes into role-based access control
QM Rajpoot, CD Jensen, R Krishnan
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
592015
Group-centric secure information-sharing models for isolated groups
R Krishnan, J Niu, R Sandhu, WH Winsborough
ACM Transactions on Information and System Security (TISSEC) 14 (3), 1-29, 2011
532011
Towards a discipline of mission-aware cloud computing
R Sandhu, R Boppana, R Krishnan, J Reich, T Wolff, J Zachry
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 13-18, 2010
532010
Foundations for group-centric secure information sharing models
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 14th ACM symposium on Access control models and …, 2009
522009
Methods for secure control of and secure data extraction from implantable medical devices using smartphones or other mobile devices
R Krishnan, EB John, MM Panday, JL Ninglekhu
US Patent App. 14/493,305, 2015
482015
Toward deep learning based access control
MN Nobi, R Krishnan, Y Huang, M Shakarami, R Sandhu
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
432022
A conceptual framework for group-centric secure information sharing
R Krishnan, R Sandhu, J Niu, WH Winsborough
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
432009
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
412015
Risk-aware RBAC sessions
KZ Bijon, R Krishnan, R Sandhu
Information Systems Security: 8th International Conference, ICISS 2012 …, 2012
402012
Clustering-based IaaS cloud monitoring
M Abdelsalam, R Krishnan, R Sandhu
2017 IEEE 10th international conference on cloud computing (CLOUD), 672-679, 2017
392017
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131, 2013
392013
The system can't perform the operation now. Try again later.
Articles 1–20