default search action
BibTeX records: Ram Krishnan
@inproceedings{DBLP:conf/codaspy/ChhetriBBNBK24, author = {Pankaj Chhetri and Smriti Bhatt and Paras Bhatt and Mohammad Nur Nobi and James O. Benson and Ram Krishnan}, editor = {Maanak Gupta and Mahmoud Abdelsalam and Mir Mehedi A. Pritom and Feras M. Awaysheh}, title = {Environment Aware Deep Learning Based Access Control Model}, booktitle = {Proceedings of the 2024 {ACM} Workshop on Secure and Trustworthy Cyber-Physical Systems, SaT-CPS 2024, Porto, Portugal, 21 June 2024}, pages = {81--89}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3643650.3659105}, doi = {10.1145/3643650.3659105}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ChhetriBBNBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2024, editor = {Anna Lisa Ferrara and Ram Krishnan}, title = {Data and Applications Security and Privacy {XXXVIII} - 38th Annual {IFIP} {WG} 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17, 2024, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14901}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-65172-4}, doi = {10.1007/978-3-031-65172-4}, isbn = {978-3-031-65171-7}, timestamp = {Tue, 30 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/SamtaniZK23, author = {Sagar Samtani and Ziming Zhao and Ram Krishnan}, title = {Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence}, journal = {Inf. Syst. Frontiers}, volume = {25}, number = {2}, pages = {425--429}, year = {2023}, url = {https://doi.org/10.1007/s10796-023-10372-y}, doi = {10.1007/S10796-023-10372-Y}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isf/SamtaniZK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/KlepetkoK23, author = {Randy Klepetko and Ram Krishnan}, title = {Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural Data Order}, journal = {Inf. Syst. Frontiers}, volume = {25}, number = {2}, pages = {613--638}, year = {2023}, url = {https://doi.org/10.1007/s10796-022-10330-0}, doi = {10.1007/S10796-022-10330-0}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/KlepetkoK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/AmeerKSG23, author = {Safwa Ameer and Ram Krishnan and Ravi S. Sandhu and Maanak Gupta}, editor = {Mohamed Shehab and Maribel Fern{\'{a}}ndez and Ninghui Li}, title = {Utilizing The {DLBAC} Approach Toward a {ZT} Score-based Authorization for IoT Systems}, booktitle = {Proceedings of the Thirteenth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26, 2023}, pages = {283--285}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3577923.3585046}, doi = {10.1145/3577923.3585046}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/AmeerKSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RodriguezK23, author = {David Rodriguez and Ram Krishnan}, editor = {Vijayalakshmi Atluri and Anna Lisa Ferrara}, title = {An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning}, booktitle = {Data and Applications Security and Privacy {XXXVII} - 37th Annual {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19-21, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13942}, pages = {302--316}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-37586-6\_18}, doi = {10.1007/978-3-031-37586-6\_18}, timestamp = {Fri, 14 Jul 2023 22:01:48 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RodriguezK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/RodriguezK23, author = {David Rodriguez and Ram Krishnan}, editor = {Vallipuram Muthukkumarasamy and Sithu D. Sudarsan and Rudrapatna K. Shyamasundar}, title = {A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks}, booktitle = {Information Systems Security - 19th International Conference, {ICISS} 2023, Raipur, India, December 16-20, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14424}, pages = {178--196}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49099-6\_11}, doi = {10.1007/978-3-031-49099-6\_11}, timestamp = {Thu, 04 Jan 2024 08:13:46 +0100}, biburl = {https://dblp.org/rec/conf/iciss/RodriguezK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/RodriguezK23, author = {David Rodriguez and Ram Krishnan}, title = {Learnable Image Transformations for Privacy Enhanced Deep Neural Networks}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {64--73}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00018}, doi = {10.1109/TPS-ISA58951.2023.00018}, timestamp = {Tue, 05 Mar 2024 12:00:59 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/RodriguezK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/midm/RodriguezNCKH22, author = {David Rodriguez and Tapsya Nayak and Yidong Chen and Ram Krishnan and Yufei Huang}, title = {On the role of deep learning model complexity in adversarial robustness for medical images}, journal = {{BMC} Medical Informatics Decis. Mak.}, volume = {22-S}, number = {2}, pages = {160}, year = {2022}, url = {https://doi.org/10.1186/s12911-022-01891-w}, doi = {10.1186/S12911-022-01891-W}, timestamp = {Mon, 27 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/midm/RodriguezNCKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/NobiKHSS22, author = {Mohammad Nur Nobi and Ram Krishnan and Yufei Huang and Mehrnoosh Shakarami and Ravi S. Sandhu}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Toward Deep Learning Based Access Control}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {143--154}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511497}, doi = {10.1145/3508398.3511497}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/NobiKHSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NobiKHS22, author = {Mohammad Nur Nobi and Ram Krishnan and Yufei Huang and Ravi S. Sandhu}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Administration of Machine Learning Based Access Control}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {189--210}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_10}, doi = {10.1007/978-3-031-17146-8\_10}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NobiKHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itadata/NobiKS22, author = {Mohammad Nur Nobi and Ram Krishnan and Ravi S. Sandhu}, editor = {Marco Anisetti and Angela Bonifati and Nicola Bena and Claudio A. Ardagna and Donato Malerba}, title = {Adversarial Attacks in Machine Learning Based Access Control}, booktitle = {Proceedings of the 1st Italian Conference on Big Data and Data Science (itaDATA 2022), Milan, Italy, September 20-21, 2022}, series = {{CEUR} Workshop Proceedings}, volume = {3340}, pages = {3--14}, publisher = {CEUR-WS.org}, year = {2022}, url = {https://ceur-ws.org/Vol-3340/paper44.pdf}, timestamp = {Mon, 18 Sep 2023 16:58:22 +0200}, biburl = {https://dblp.org/rec/conf/itadata/NobiKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/skm/2021, editor = {Ram Krishnan and H. Raghav Rao and Sanjay K. Sahay and Sagar Samtani and Ziming Zhao}, title = {Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, {SKM} 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1549}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97532-6}, doi = {10.1007/978-3-030-97532-6}, isbn = {978-3-030-97531-9}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/2021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-15124, author = {Mohammad Nur Nobi and Ram Krishnan and Yufei Huang and Mehrnoosh Shakarami and Ravi S. Sandhu}, title = {Toward Deep Learning Based Access Control}, journal = {CoRR}, volume = {abs/2203.15124}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.15124}, doi = {10.48550/ARXIV.2203.15124}, eprinttype = {arXiv}, eprint = {2203.15124}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-15124.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-01739, author = {Mohammad Nur Nobi and Maanak Gupta and Lopamudra Praharaj and Mahmoud Abdelsalam and Ram Krishnan and Ravi S. Sandhu}, title = {Machine Learning in Access Control: {A} Taxonomy and Survey}, journal = {CoRR}, volume = {abs/2207.01739}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.01739}, doi = {10.48550/ARXIV.2207.01739}, eprinttype = {arXiv}, eprint = {2207.01739}, timestamp = {Wed, 06 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-01739.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/TalegaonK21, author = {Samir Talegaon and Ram Krishnan}, title = {A Formal Specification of Access Control in Android with {URI} Permissions}, journal = {Inf. Syst. Frontiers}, volume = {23}, number = {4}, pages = {849--866}, year = {2021}, url = {https://doi.org/10.1007/s10796-020-10066-9}, doi = {10.1007/S10796-020-10066-9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/TalegaonK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isf/HaqueK21, author = {Md. Farhan Haque and Ram Krishnan}, title = {Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence}, journal = {Inf. Syst. Frontiers}, volume = {23}, number = {4}, pages = {883--896}, year = {2021}, url = {https://doi.org/10.1007/s10796-020-10103-7}, doi = {10.1007/S10796-020-10103-7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isf/HaqueK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdatasec/LawalK21, author = {Sherifdeen Lawal and Ram Krishnan}, title = {Enabling Flexible Administration in {ABAC} Through Policy Review: {A} Policy Machine Case Study}, booktitle = {7th {IEEE} International Conference on Big Data Security on Cloud, {IEEE} International Conference on High Performance and Smart Computing, and {IEEE} International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2021, New York City, NY, USA, May 15-17, 2021}, pages = {69--74}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigDataSecurityHPSCIDS52275.2021.00023}, doi = {10.1109/BIGDATASECURITYHPSCIDS52275.2021.00023}, timestamp = {Wed, 14 Jul 2021 09:33:42 +0200}, biburl = {https://dblp.org/rec/conf/bigdatasec/LawalK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coins/LawalK21, author = {Sherifdeen Lawal and Ram Krishnan}, title = {Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain}, booktitle = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems, {COINS} 2021, Barcelona, Spain, August 23-25, 2021}, pages = {1--6}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/COINS51742.2021.9524248}, doi = {10.1109/COINS51742.2021.9524248}, timestamp = {Thu, 09 Sep 2021 16:05:21 +0200}, biburl = {https://dblp.org/rec/conf/coins/LawalK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/HeapsKH0S21, author = {John Heaps and Ram Krishnan and Yufei Huang and Jianwei Niu and Ravi S. Sandhu}, editor = {Ken Barker and Kambiz Ghazinour}, title = {Access Control Policy Generation from User Stories Using Machine Learning}, booktitle = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP} {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12840}, pages = {171--188}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81242-3\_10}, doi = {10.1007/978-3-030-81242-3\_10}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/HeapsKH0S21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/LawalK21, author = {Sherifdeen Lawal and Ram Krishnan}, editor = {Ram Krishnan and H. Raghav Rao and Sanjay K. Sahay and Sagar Samtani and Ziming Zhao}, title = {Attribute-Based Access Control Policy Review in Permissioned Blockchain}, booktitle = {Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, {SKM} 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1549}, pages = {97--109}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_6}, doi = {10.1007/978-3-030-97532-6\_6}, timestamp = {Thu, 03 Mar 2022 14:27:17 +0100}, biburl = {https://dblp.org/rec/conf/skm/LawalK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/KlepetkoK21, author = {Randy Klepetko and Ram Krishnan}, editor = {Ram Krishnan and H. Raghav Rao and Sanjay K. Sahay and Sagar Samtani and Ziming Zhao}, title = {Analyzing {CNN} Models' Sensitivity to the Ordering of Non-natural Data}, booktitle = {Secure Knowledge Management In The Artificial Intelligence Era - 9th International Conference, {SKM} 2021, San Antonio, TX, USA, October 8-9, 2021, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1549}, pages = {130--148}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-97532-6\_8}, doi = {10.1007/978-3-030-97532-6\_8}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/KlepetkoK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LawaK20, author = {Sherifdeen Lawal and Ram Krishnan}, title = {Policy Review in Attribute Based Access Control - {A} Policy Machine Case Study}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {2}, pages = {67--81}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.05.31.067}, doi = {10.22667/JISIS.2020.05.31.067}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LawaK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TalegaonK20, author = {Samir Talegaon and Ram Krishnan}, title = {Administrative Models for Role Based Access Control in Android}, journal = {J. Internet Serv. Inf. Secur.}, volume = {10}, number = {3}, pages = {31--46}, year = {2020}, url = {https://doi.org/10.22667/JISIS.2020.08.31.031}, doi = {10.22667/JISIS.2020.08.31.031}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/TalegaonK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/Al-AlajKS20, author = {Abdullah S. Al{-}Alaj and Ram Krishnan and Ravi S. Sandhu}, title = {ParaSDN: An Access Control Model for {SDN} Applications based on Parameterized Roles and Permissions}, booktitle = {6th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020}, pages = {107--116}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CIC50333.2020.00022}, doi = {10.1109/CIC50333.2020.00022}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/Al-AlajKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/Al-AlajSK20, author = {Abdullah S. Al{-}Alaj and Ravi S. Sandhu and Ram Krishnan}, title = {A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {169--178}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00032}, doi = {10.1109/TPS-ISA50397.2020.00032}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/Al-AlajSK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/TalegaonK20, author = {Samir Talegaon and Ram Krishnan}, title = {Role-Based Access Control Models for Android}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {179--188}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00033}, doi = {10.1109/TPS-ISA50397.2020.00033}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/TalegaonK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8924, author = {Sam Aldrin and Carlos Pignataro and Nagendra Kumar and Ram Krishnan and Anoop Ghanwani}, title = {Service Function Chaining {(SFC)} Operations, Administration, and Maintenance {(OAM)} Framework}, journal = {{RFC}}, volume = {8924}, pages = {1--20}, year = {2020}, url = {https://doi.org/10.17487/RFC8924}, doi = {10.17487/RFC8924}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8924.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/automatica/NugrohoTGSK19, author = {Sebastian A. Nugroho and Ahmad F. Taha and Nikolaos Gatsis and Tyler H. Summers and Ram Krishnan}, title = {Algorithms for joint sensor and control nodes selection in dynamic networks}, journal = {Autom.}, volume = {106}, pages = {124--133}, year = {2019}, url = {https://doi.org/10.1016/j.automatica.2019.04.047}, doi = {10.1016/J.AUTOMATICA.2019.04.047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/automatica/NugrohoTGSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/Al-AlajSK19, author = {Abdullah S. Al{-}Alaj and Ravi S. Sandhu and Ram Krishnan}, editor = {Gail{-}Joon Ahn and Guofei Gu and Hongxin Hu and Seungwon Shin}, title = {A Formal Access Control Model for SE-Floodlight Controller}, booktitle = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop on Security in Software Defined Networks {\&} Network Function Virtualization, Richardson, TX, USA, March 27, 2019}, pages = {1--6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3309194.3309195}, doi = {10.1145/3309194.3309195}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/Al-AlajSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AbdelsalamKS19, author = {Mahmoud Abdelsalam and Ram Krishnan and Ravi S. Sandhu}, editor = {Simon N. Foley}, title = {Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks}, booktitle = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July 15-17, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11559}, pages = {381--397}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-22479-0\_20}, doi = {10.1007/978-3-030-22479-0\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AbdelsalamKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccs/Al-AlajKS19, author = {Abdullah S. Al{-}Alaj and Ram Krishnan and Ravi S. Sandhu}, title = {{SDN-RBAC:} An Access Control Model for {SDN} Controller Applications}, booktitle = {2019 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCCS.2019.8888031}, doi = {10.1109/CCCS.2019.8888031}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccs/Al-AlajKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccs/KlepetkoK19, author = {Randy Klepetko and Ram Krishnan}, title = {Analyzing {CNN} Model Performance Sensitivity to the Ordering of Non-Natural Data}, booktitle = {2019 4th International Conference on Computing, Communications and Security (ICCCS), Rome, Italy, October 10-12, 2019}, pages = {1--8}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CCCS.2019.8888041}, doi = {10.1109/CCCS.2019.8888041}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccs/KlepetkoK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iri/ChakrabortySK19, author = {Shuvra Chakraborty and Ravi S. Sandhu and Ram Krishnan}, title = {On the Feasibility of Attribute-Based Access Control Policy Mining}, booktitle = {20th {IEEE} International Conference on Information Reuse and Integration for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August 1, 2019}, pages = {245--252}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/IRI.2019.00047}, doi = {10.1109/IRI.2019.00047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iri/ChakrabortySK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/HaqueK19, author = {Md. Farhan Haque and Ram Krishnan}, editor = {Sanjay K. Sahay and Nihita Goel and Vishwas Patil and Murtuza Jadliwala}, title = {Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence}, booktitle = {Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1186}, pages = {21--37}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-3817-9\_2}, doi = {10.1007/978-981-15-3817-9\_2}, timestamp = {Wed, 11 Mar 2020 13:22:25 +0100}, biburl = {https://dblp.org/rec/conf/skm/HaqueK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/TalegaonK19, author = {Samir Talegaon and Ram Krishnan}, editor = {Sanjay K. Sahay and Nihita Goel and Vishwas Patil and Murtuza Jadliwala}, title = {A Formal Specification of Access Control in Android}, booktitle = {Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1186}, pages = {101--125}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-3817-9\_7}, doi = {10.1007/978-981-15-3817-9\_7}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/skm/TalegaonK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/skm/ChakrabortySK19, author = {Shuvra Chakraborty and Ravi S. Sandhu and Ram Krishnan}, editor = {Sanjay K. Sahay and Nihita Goel and Vishwas Patil and Murtuza Jadliwala}, title = {On the Feasibility of {RBAC} to {ABAC} Policy Mining: {A} Formal Analysis}, booktitle = {Secure Knowledge Management In Artificial Intelligence Era - 8th International Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1186}, pages = {147--163}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-3817-9\_9}, doi = {10.1007/978-981-15-3817-9\_9}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/skm/ChakrabortySK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2019, editor = {Gail{-}Joon Ahn and Bhavani Thuraisingham and Murat Kantarcioglu and Ram Krishnan}, title = {Proceedings of the Ninth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3292006}, doi = {10.1145/3292006}, isbn = {978-1-4503-6099-9}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/AbdelsalamKHS18, author = {Mahmoud Abdelsalam and Ram Krishnan and Yufei Huang and Ravi S. Sandhu}, title = {Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks}, booktitle = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018, San Francisco, CA, USA, July 2-7, 2018}, pages = {162--169}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CLOUD.2018.00028}, doi = {10.1109/CLOUD.2018.00028}, timestamp = {Tue, 28 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEcloud/AbdelsalamKHS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icacci/JishaKV18, author = {R. C. Jisha and Ram Krishnan and Varun Vikraman}, title = {Mobile Applications Recommendation Based on User Ratings and Permissions}, booktitle = {2018 International Conference on Advances in Computing, Communications and Informatics, {ICACCI} 2018, Bangalore, India, September 19-22, 2018}, pages = {1000--1005}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICACCI.2018.8554691}, doi = {10.1109/ICACCI.2018.8554691}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icacci/JishaKV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2018, editor = {Ziming Zhao and Gail{-}Joon Ahn and Ram Krishnan and Gabriel Ghinita}, title = {Proceedings of the Eighth {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21, 2018}, publisher = {{ACM}}, year = {2018}, url = {http://dl.acm.org/citation.cfm?id=3176258}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-11792, author = {Sebastian A. Nugroho and Ahmad F. Taha and Nikolaos Gatsis and Tyler H. Summers and Ram Krishnan}, title = {Algorithms for Joint Sensor and Control Nodes Selection in Dynamic Networks}, journal = {CoRR}, volume = {abs/1811.11792}, year = {2018}, url = {http://arxiv.org/abs/1811.11792}, eprinttype = {arXiv}, eprint = {1811.11792}, timestamp = {Wed, 03 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-11792.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8293, author = {Anoop Ghanwani and Linda Dunbar and Mike McBride and Vinay Bannai and Ram Krishnan}, title = {A Framework for Multicast in Network Virtualization over Layer 3}, journal = {{RFC}}, volume = {8293}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.17487/RFC8293}, doi = {10.17487/RFC8293}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8293.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc8313, author = {Percy Tarapore and Robert Sayko and Greg Shepherd and Toerless Eckert and Ram Krishnan}, title = {Use of Multicast across Inter-domain Peering Points}, journal = {{RFC}}, volume = {8313}, pages = {1--44}, year = {2018}, url = {https://doi.org/10.17487/RFC8313}, doi = {10.17487/RFC8313}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc8313.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/AbdelsalamKS17, author = {Mahmoud Abdelsalam and Ram Krishnan and Ravi S. Sandhu}, editor = {Geoffrey C. Fox}, title = {Clustering-Based IaaS Cloud Monitoring}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {672--679}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.90}, doi = {10.1109/CLOUD.2017.90}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/AbdelsalamKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BiswasSK17, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Attribute Transformation for Attribute-Based Access Control}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, pages = {1--8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041048.3041052}, doi = {10.1145/3041048.3041052}, timestamp = {Tue, 09 Feb 2021 08:50:28 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BiswasSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/NinglekhuK17, author = {Jiwan Ninglekhu and Ram Krishnan}, title = {{AARBAC:} Attribute-Based Administration of Role-Based Access Control}, booktitle = {3rd {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017}, pages = {126--135}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CIC.2017.00027}, doi = {10.1109/CIC.2017.00027}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/NinglekhuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2017abac, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control, ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3041048}, doi = {10.1145/3041048}, isbn = {978-1-4503-4910-9}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2017abac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NinglekhuK17, author = {Jiwan Ninglekhu and Ram Krishnan}, title = {Attribute Based Administration of Role Based Access Control : {A} Detail Description}, journal = {CoRR}, volume = {abs/1706.03171}, year = {2017}, url = {http://arxiv.org/abs/1706.03171}, eprinttype = {arXiv}, eprint = {1706.03171}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NinglekhuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NinglekhuK17a, author = {Jiwan Ninglekhu and Ram Krishnan}, title = {A Model for Attribute Based Role-Role Assignment {(ARRA)}}, journal = {CoRR}, volume = {abs/1706.10274}, year = {2017}, url = {http://arxiv.org/abs/1706.10274}, eprinttype = {arXiv}, eprint = {1706.10274}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NinglekhuK17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/YouZK16, author = {Ilsun You and Gansen Zhao and Ram Krishnan}, title = {Special Section on Advanced Technologies for Homeland and Cyber Defense}, journal = {Intell. Autom. Soft Comput.}, volume = {22}, number = {3}, pages = {343--344}, year = {2016}, url = {https://doi.org/10.1080/10798587.2016.1146504}, doi = {10.1080/10798587.2016.1146504}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iasc/YouZK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ShenKSN16, author = {Hui Shen and Ram Krishnan and Rocky Slavin and Jianwei Niu}, title = {Sequence Diagram Aided Privacy Policy Specification}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {13}, number = {3}, pages = {381--393}, year = {2016}, url = {https://doi.org/10.1109/TDSC.2014.2384500}, doi = {10.1109/TDSC.2014.2384500}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ShenKSN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BiswasSK16, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Label-Based Access Control: An {ABAC} Model with Enumerated Authorization Policy}, booktitle = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, pages = {1--12}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491.2875498}, doi = {10.1145/2875491.2875498}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/BiswasSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BiswasSK16, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Silvio Ranise and Vipin Swarup}, title = {A Comparison of Logical-Formula and Enumerated Authorization Policy {ABAC} Models}, booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP} {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9766}, pages = {122--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-41483-6\_9}, doi = {10.1007/978-3-319-41483-6\_9}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BiswasSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16, author = {Rocky Slavin and Xiaoyin Wang and Mitra Bokaei Hosseini and James Hester and Ram Krishnan and Jaspreet Bhatia and Travis D. Breaux and Jianwei Niu}, editor = {Laura K. Dillon and Willem Visser and Laurie A. Williams}, title = {Toward a framework for detecting privacy policy violations in android application code}, booktitle = {Proceedings of the 38th International Conference on Software Engineering, {ICSE} 2016, Austin, TX, USA, May 14-22, 2016}, pages = {25--36}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2884781.2884855}, doi = {10.1145/2884781.2884855}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16a, author = {Rocky Slavin and Xiaoyin Wang and Mitra Bokaei Hosseini and James Hester and Ram Krishnan and Jaspreet Bhatia and Travis D. Breaux and Jianwei Niu}, title = {PVDetector: a detector of privacy-policy violations for Android apps}, booktitle = {Proceedings of the International Conference on Mobile Software Engineering and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016}, pages = {299--300}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897073.2897720}, doi = {10.1145/2897073.2897720}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BiswasSK16, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Uni-ARBAC: {A} Unified Administrative Model for Role-Based Access Control}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {218--230}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_14}, doi = {10.1007/978-3-319-45871-7\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/BiswasSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BiswasSK16, author = {Prosunjit Biswas and Ravi S. Sandhu and Ram Krishnan}, editor = {Jiageng Chen and Vincenzo Piuri and Chunhua Su and Moti Yung}, title = {An Attribute-Based Protection Model for {JSON} Documents}, booktitle = {Network and System Security - 10th International Conference, {NSS} 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9955}, pages = {303--317}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-46298-1\_20}, doi = {10.1007/978-3-319-46298-1\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BiswasSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/codaspy/2016abac, editor = {Elisa Bertino and Ravi S. Sandhu and Ram Krishnan}, title = {Proceedings of the 2016 {ACM} International Workshop on Attribute Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA, March 11, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2875491}, doi = {10.1145/2875491}, isbn = {978-1-4503-4079-3}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/2016abac.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jicts/LopezK15, author = {Diego R. L{\'{o}}pez and Ram Krishnan}, title = {The {NFVRG} Network Function Virtualization Research at the {IRTF}}, journal = {J. {ICT} Stand.}, volume = {3}, number = {1}, pages = {57--66}, year = {2015}, url = {https://doi.org/10.13052/jicts2245-800x.313}, doi = {10.13052/JICTS2245-800X.313}, timestamp = {Thu, 01 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jicts/LopezK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/NinglekhuKJP15, author = {Jiwan Ninglekhu and Ram Krishnan and Eugene John and Manoj Panday}, title = {Securing Implantable Cardioverter Defibrillators Using Smartphones}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {47--64}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.047}, doi = {10.22667/JISIS.2015.05.31.047}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/NinglekhuKJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/VazquezKJ15, author = {Carlos Vazquez and Ram Krishnan and Eugene John}, title = {Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {6}, number = {3}, pages = {87--110}, year = {2015}, url = {https://doi.org/10.22667/JOWUA.2015.09.31.087}, doi = {10.22667/JOWUA.2015.09.31.087}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/VazquezKJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccnc/KrishnaswamyKLW15, author = {Dilip Krishnaswamy and Ram Krishnan and Diego R. L{\'{o}}pez and Peter Willis and Asif Qamar}, title = {An open {NFV} and cloud architectural framework for managing application virality behaviour}, booktitle = {12th Annual {IEEE} Consumer Communications and Networking Conference, {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015}, pages = {746--754}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CCNC.2015.7158071}, doi = {10.1109/CCNC.2015.7158071}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccnc/KrishnaswamyKLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PustchiKS15, author = {Navid Pustchi and Ram Krishnan and Ravi S. Sandhu}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Authorization Federation in IaaS Multi Cloud}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {63--71}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732523}, doi = {10.1145/2732516.2732523}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/PustchiKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ZhangKS15, author = {Yun Zhang and Ram Krishnan and Ravi S. Sandhu}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Secure Information and Resource Sharing in Cloud}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {131--133}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699126}, doi = {10.1145/2699026.2699126}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/ZhangKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/BijonKS15, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, editor = {Jaehong Park and Anna Cinzia Squicciarini}, title = {Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service}, booktitle = {Proceedings of the 5th {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015}, pages = {183--194}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2699026.2699112}, doi = {10.1145/2699026.2699112}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/BijonKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/RajpootJK15, author = {Qasim Mahmood Rajpoot and Christian Damsgaard Jensen and Ram Krishnan}, editor = {Pierangela Samarati}, title = {Integrating Attributes into Role-Based Access Control}, booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP} {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9149}, pages = {242--249}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-20810-7\_17}, doi = {10.1007/978-3-319-20810-7\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/RajpootJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ei-mobmu/KrishnanN15, author = {Ram Krishnan and Jiwan Ninglekhu}, editor = {Reiner Creutzburg and David Akopian}, title = {Smartphone-based secure authenticated session sharing in Internet of Personal Things}, booktitle = {Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications 2015, San Francisco, California, USA, February 8-12, 2015}, series = {{SPIE} Proceedings}, volume = {9411}, pages = {941109}, publisher = {{SPIE}}, year = {2015}, url = {https://doi.org/10.1117/12.2086282}, doi = {10.1117/12.2086282}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ei-mobmu/KrishnanN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BijonKS15, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, editor = {Edgar R. Weippl and Florian Kerschbaum and Adam J. Lee}, title = {Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling}, booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015}, pages = {63--74}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2752952.2752964}, doi = {10.1145/2752952.2752964}, timestamp = {Mon, 26 Jun 2023 20:45:28 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BijonKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustbus/RajpootJK15, author = {Qasim Mahmood Rajpoot and Christian Damsgaard Jensen and Ram Krishnan}, editor = {Simone Fischer{-}H{\"{u}}bner and Costas Lambrinoudakis and Javier L{\'{o}}pez}, title = {Attributes Enhanced Role-Based Access Control Model}, booktitle = {Trust, Privacy and Security in Digital Business - 12th International Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9264}, pages = {3--17}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22906-5\_1}, doi = {10.1007/978-3-319-22906-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustbus/RajpootJK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc7424, author = {Ram Krishnan and Lucy Yong and Anoop Ghanwani and Ning So and Bhumip Khasnabish}, title = {Mechanisms for Optimizing Link Aggregation Group {(LAG)} and Equal-Cost Multipath {(ECMP)} Component Link Utilization in Networks}, journal = {{RFC}}, volume = {7424}, pages = {1--29}, year = {2015}, url = {https://doi.org/10.17487/RFC7424}, doi = {10.17487/RFC7424}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc7424.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangKS14, author = {Yun Zhang and Ram Krishnan and Ravi S. Sandhu}, editor = {Gail{-}Joon Ahn and Tomas Sander}, title = {Secure Information and Resource Sharing in Cloud Infrastructure as a Service}, booktitle = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&} Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November 3, 2014}, pages = {81--90}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2663876.2663884}, doi = {10.1145/2663876.2663884}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/JinKS14, author = {Xin Jin and Ram Krishnan and Ravi S. Sandhu}, editor = {Elisa Bertino and Shu{-}Ching Chen and Karl Aberer and Prashant Krishnamurthy and Murat Kantarcioglu}, title = {Role and attribute based collaborative administration of intra-tenant cloud IaaS}, booktitle = {10th {IEEE} International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2014, Miami, Florida, USA, October 22-25, 2014}, pages = {261--274}, publisher = {{ICST} / {IEEE}}, year = {2014}, url = {https://doi.org/10.4108/icst.collaboratecom.2014.257591}, doi = {10.4108/ICST.COLLABORATECOM.2014.257591}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/JinKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/KrishnanKM14, author = {Ram Krishnan and Dilip Krishnaswamy and Dave McDysan}, title = {Behavioral Security Threat Detection Strategies for Data Center Switches and Routers}, booktitle = {34th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014}, pages = {82--87}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/ICDCSW.2014.19}, doi = {10.1109/ICDCSW.2014.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/KrishnanKM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/BijonKS14, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, editor = {Man Ho Au and Barbara Carminati and C.{-}C. Jay Kuo}, title = {A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service}, booktitle = {Network and System Security - 8th International Conference, {NSS} 2014, Xi'an, China, October 15-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8792}, pages = {41--53}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11698-3\_4}, doi = {10.1007/978-3-319-11698-3\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/BijonKS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/t4e/KrishnaswamyQKRNBM14, author = {Dilip Krishnaswamy and Asif Qamar and Ram Krishnan and Krishnakumar Rajagopal and Naveen Narayan and Kamal Bijlani and Kannan M. Moudgalya}, editor = {Kinshuk and Sahana Murthy}, title = {Bringing Knowledge to the Edge with Jnana Edge and Buddhi Edge: Architecture, Implementation, and Future Directions}, booktitle = {Sixth {IEEE} International Conference on Technology for Education, {T4E} 2014, Amritapuri, India, December 18-21, 2014}, pages = {48--51}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/T4E.2014.35}, doi = {10.1109/T4E.2014.35}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/t4e/KrishnaswamyQKRNBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/SinghalCGSKAB13, author = {Mukesh Singhal and Santosh Chandrasekhar and Tingjian Ge and Ravi S. Sandhu and Ram Krishnan and Gail{-}Joon Ahn and Elisa Bertino}, title = {Collaboration in Multicloud Computing Environments: Framework and Security Issues}, journal = {Computer}, volume = {46}, number = {2}, pages = {76--84}, year = {2013}, url = {https://doi.org/10.1109/MC.2013.46}, doi = {10.1109/MC.2013.46}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FongMK13, author = {Philip W. L. Fong and Pooya Mehregan and Ram Krishnan}, editor = {Ahmad{-}Reza Sadeghi and Virgil D. Gligor and Moti Yung}, title = {Relational abstraction in community-based secure collaboration}, booktitle = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security, CCS'13, Berlin, Germany, November 4-8, 2013}, pages = {585--598}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2508859.2516720}, doi = {10.1145/2508859.2516720}, timestamp = {Tue, 10 Nov 2020 19:58:06 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FongMK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BijonKS13, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, title = {A framework for risk-aware role based access control}, booktitle = {{IEEE} Conference on Communications and Network Security, {CNS} 2013, National Harbor, MD, USA, October 14-16, 2013}, pages = {462--469}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CNS.2013.6682761}, doi = {10.1109/CNS.2013.6682761}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BijonKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/JinKS13, author = {Xin Jin and Ram Krishnan and Ravi S. Sandhu}, editor = {Thomas Gro{\ss} and Marit Hansen}, title = {Reachability analysis for role-based administration of attributes}, booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013}, pages = {73--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517881.2517891}, doi = {10.1145/2517881.2517891}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/JinKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/BijonKS13, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, title = {Towards an Attribute Based Constraints Specification Language}, booktitle = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom 2013, Washington, DC, USA, 8-14 September, 2013}, pages = {108--113}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SocialCom.2013.23}, doi = {10.1109/SOCIALCOM.2013.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/BijonKS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/BijonASK12, author = {Khalid Zaman Bijon and Tahmina Ahmed and Ravi S. Sandhu and Ram Krishnan}, editor = {Calton Pu and James Joshi and Surya Nepal}, title = {A lattice interpretation of group-centric collaboration with expedient insiders}, booktitle = {8th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA, USA, October 14-17, 2012}, pages = {200--209}, publisher = {{ICST} / {IEEE}}, year = {2012}, url = {https://doi.org/10.4108/icst.collaboratecom.2012.250468}, doi = {10.4108/ICST.COLLABORATECOM.2012.250468}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/BijonASK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cts/BijonSK12, author = {Khalid Zaman Bijon and Ravi S. Sandhu and Ram Krishnan}, editor = {Waleed W. Smari and Geoffrey Charles Fox}, title = {A group-centric model for collaboration with expedient insiders in multilevel systems}, booktitle = {2012 International Conference on Collaboration Technologies and Systems, {CTS} 2012, Denver, CO, USA, May 21-25, 2012}, pages = {419--426}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/CTS.2012.6261086}, doi = {10.1109/CTS.2012.6261086}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/cts/BijonSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/JinKS12, author = {Xin Jin and Ram Krishnan and Ravi S. Sandhu}, editor = {Nora Cuppens{-}Boulahia and Fr{\'{e}}d{\'{e}}ric Cuppens and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {A Unified Attribute-Based Access Control Model Covering DAC, {MAC} and {RBAC}}, booktitle = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP} {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7371}, pages = {41--55}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31540-4\_4}, doi = {10.1007/978-3-642-31540-4\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/JinKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dyspan/ErpekSKC12, author = {Tugba Erpek and Karl Steadman and Ram Krishnan and Qiao Chen}, title = {{LTE} signal classification and center frequency detection without Priori information}, booktitle = {{IEEE} International Symposium on Dynamic Spectrum Access Networks, DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012}, pages = {299--304}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/DYSPAN.2012.6478153}, doi = {10.1109/DYSPAN.2012.6478153}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/dyspan/ErpekSKC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BijonKS12, author = {Khalid Zaman Bijon and Ram Krishnan and Ravi S. Sandhu}, editor = {Venkat N. Venkatakrishnan and Diganta Goswami}, title = {Risk-Aware {RBAC} Sessions}, booktitle = {Information Systems Security, 8th International Conference, {ICISS} 2012, Guwahati, India, December 15-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7671}, pages = {59--74}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35130-3\_5}, doi = {10.1007/978-3-642-35130-3\_5}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BijonKS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/JinSK12, author = {Xin Jin and Ravi S. Sandhu and Ram Krishnan}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {{RABAC:} Role-Centric Attribute-Based Access Control}, booktitle = {Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7531}, pages = {84--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33704-8\_8}, doi = {10.1007/978-3-642-33704-8\_8}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/t4e/KrishnanKQBM12, author = {Ram Krishnan and Dilip Krishnaswamy and Asif Qamar and Kamal Bijlani and Kannan M. Moudgalya}, editor = {Sahana Murthy and Demetrios G. Sampson}, title = {BuddhiEdge: Taking Education to the Edge}, booktitle = {2012 {IEEE} Fourth International Conference on Technology for Education, {T4E} 2012, Hyderabad, India, July 18-20, 2012}, pages = {235--236}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/T4E.2012.56}, doi = {10.1109/T4E.2012.56}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/t4e/KrishnanKQBM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/KrishnanNSW11, author = {Ram Krishnan and Jianwei Niu and Ravi S. Sandhu and William H. Winsborough}, title = {Group-Centric Secure Information-Sharing Models for Isolated Groups}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {14}, number = {3}, pages = {23:1--23:29}, year = {2011}, url = {https://doi.org/10.1145/2043621.2043623}, doi = {10.1145/2043621.2043623}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/KrishnanNSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/SandhuBJK11, author = {Ravi S. Sandhu and Khalid Zaman Bijon and Xin Jin and Ram Krishnan}, editor = {Dimitrios Georgakopoulos and James B. D. Joshi}, title = {RT-based administrative models for community cyber security information sharing}, booktitle = {7th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA, 15-18 October, 2011}, pages = {473--478}, publisher = {{ICST} / {IEEE}}, year = {2011}, url = {https://doi.org/10.4108/icst.collaboratecom.2011.247176}, doi = {10.4108/ICST.COLLABORATECOM.2011.247176}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/colcom/SandhuBJK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/KrishnanS11, author = {Ram Krishnan and Ravi S. Sandhu}, editor = {Sushil Jajodia and Chandan Mazumdar}, title = {Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing}, booktitle = {Information Systems Security - 7th International Conference, {ICISS} 2011, Kolkata, India, December 15-19, 2011, Procedings}, series = {Lecture Notes in Computer Science}, volume = {7093}, pages = {102--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25560-1\_7}, doi = {10.1007/978-3-642-25560-1\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/KrishnanS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SandhuBKRWZ10, author = {Ravi S. Sandhu and Raj Boppana and Ram Krishnan and Jeff Reich and Todd Wolff and Josh Zachry}, editor = {Adrian Perrig and Radu Sion}, title = {Towards a discipline of mission-aware cloud computing}, booktitle = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW} 2010, Chicago, IL, USA, October 8, 2010}, pages = {13--18}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1866835.1866839}, doi = {10.1145/1866835.1866839}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/SandhuBKRWZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/SandhuKW10, author = {Ravi S. Sandhu and Ram Krishnan and G. B. White}, editor = {Karl Aberer and James Joshi}, title = {Towards Secure Information Sharing models for community Cyber Security}, booktitle = {The 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA, 9-12 October 2010}, pages = {1--6}, publisher = {{ICST} / {IEEE}}, year = {2010}, url = {https://doi.org/10.4108/icst.collaboratecom.2010.3}, doi = {10.4108/ICST.COLLABORATECOM.2010.3}, timestamp = {Sun, 08 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/colcom/SandhuKW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/SandhuKNW10, author = {Ravi S. Sandhu and Ram Krishnan and Jianwei Niu and William H. Winsborough}, editor = {Igor V. Kotenko and Victor A. Skormin}, title = {Group-Centric Models for Secure and Agile Information Sharing}, booktitle = {Computer Network Security, 5th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, {MMM-ACNS} 2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6258}, pages = {55--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14706-7\_5}, doi = {10.1007/978-3-642-14706-7\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/SandhuKNW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrishnanSNW09, author = {Ram Krishnan and Ravi S. Sandhu and Jianwei Niu and William H. Winsborough}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {A conceptual framework for Group-Centric secure information sharing}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {384--387}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533111}, doi = {10.1145/1533057.1533111}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrishnanSNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/KrishnanSNW09, author = {Ram Krishnan and Ravi S. Sandhu and Jianwei Niu and William H. Winsborough}, editor = {James B. D. Joshi and Tao Zhang}, title = {Towards a framework for group-centric secure collaboration}, booktitle = {The 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2009, Washington DC, USA, November 11-14, 2009}, pages = {1--10}, publisher = {{ICST} / {IEEE}}, year = {2009}, url = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8305}, doi = {10.4108/ICST.COLLABORATECOM2009.8305}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/colcom/KrishnanSNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/KrishnanS09, author = {Ram Krishnan and Ravi S. Sandhu}, title = {A Hybrid Enforcement Model for Group-centric Secure Information Sharing}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {189--194}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.397}, doi = {10.1109/CSE.2009.397}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/KrishnanS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KrishnanSNW09, author = {Ram Krishnan and Ravi S. Sandhu and Jianwei Niu and William H. Winsborough}, editor = {Barbara Carminati and James Joshi}, title = {Foundations for group-centric secure information sharing models}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {115--124}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542227}, doi = {10.1145/1542207.1542227}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/KrishnanSNW09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/KrishnanNSW08, author = {Ram Krishnan and Jianwei Niu and Ravi S. Sandhu and William H. Winsborough}, editor = {Vitaly Shmatikov}, title = {Stale-safe security properties for group-based secure information sharing}, booktitle = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008}, pages = {53--62}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1456396.1456402}, doi = {10.1145/1456396.1456402}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/KrishnanNSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KrishnanSR07, author = {Ram Krishnan and Ravi S. Sandhu and Kumar Ranganathan}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {{PEI} models towards scalable, usable and high-assurance information sharing}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {145--150}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266863}, doi = {10.1145/1266840.1266863}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/KrishnanSR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc3270, author = {Francois Le Faucheur and Liwen Wu and Bruce Davie and Shahram Davari and Pasi Vaananen and Ram Krishnan and Pierrick Cheval and Juha Hein{\"{a}}nen}, title = {Multi-Protocol Label Switching {(MPLS)} Support of Differentiated Services}, journal = {{RFC}}, volume = {3270}, pages = {1--64}, year = {2002}, url = {https://doi.org/10.17487/RFC3270}, doi = {10.17487/RFC3270}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc3270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/Krishnan97, author = {Ram Krishnan}, title = {Rate-based control schemes for {ABR} traffic - Design principles and performance comparison}, journal = {Comput. Networks {ISDN} Syst.}, volume = {29}, number = {5}, pages = {583--593}, year = {1997}, url = {https://doi.org/10.1016/S0169-7552(96)00121-3}, doi = {10.1016/S0169-7552(96)00121-3}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/Krishnan97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsac/MaxemchukK93, author = {Nicholas F. Maxemchuk and Ram Krishnan}, title = {A Comparison of Linear and Mesh Topologies - {DQDB} and the Manhattan Street Network}, journal = {{IEEE} J. Sel. Areas Commun.}, volume = {11}, number = {8}, pages = {1278--1289}, year = {1993}, url = {https://doi.org/10.1109/49.245916}, doi = {10.1109/49.245916}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsac/MaxemchukK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/KrishnanM93, author = {Ram Krishnan and Nicholas F. Maxemchuk}, title = {Life beyond linear topologies [MANs]}, journal = {{IEEE} Netw.}, volume = {7}, number = {2}, pages = {48--54}, year = {1993}, url = {https://doi.org/10.1109/65.216902}, doi = {10.1109/65.216902}, timestamp = {Wed, 05 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/KrishnanM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KrishnanS93, author = {Ram Krishnan and John A. Silvester}, title = {Choice of Allocation Granularity in Multipath Source Routing Schemes}, booktitle = {Proceedings {IEEE} {INFOCOM} '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28 - April 1, 1993}, pages = {322--329}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/INFCOM.1993.253345}, doi = {10.1109/INFCOM.1993.253345}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/KrishnanS93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/KrishnanM93, author = {Ram Krishnan and Nicholas F. Maxemchuk}, title = {Is There Life beyond Linear Topologies? {A} Comparison of {DQDB} and Manhattan Street Network}, booktitle = {Proceedings {IEEE} {INFOCOM} '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the {IEEE} Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28 - April 1, 1993}, pages = {690--698}, publisher = {{IEEE} Computer Society}, year = {1993}, url = {https://doi.org/10.1109/INFCOM.1993.253302}, doi = {10.1109/INFCOM.1993.253302}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/KrishnanM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.