BibTeX records: Ram Krishnan

download as .bib file

@inproceedings{DBLP:conf/codaspy/ChhetriBBNBK24,
  author       = {Pankaj Chhetri and
                  Smriti Bhatt and
                  Paras Bhatt and
                  Mohammad Nur Nobi and
                  James O. Benson and
                  Ram Krishnan},
  editor       = {Maanak Gupta and
                  Mahmoud Abdelsalam and
                  Mir Mehedi A. Pritom and
                  Feras M. Awaysheh},
  title        = {Environment Aware Deep Learning Based Access Control Model},
  booktitle    = {Proceedings of the 2024 {ACM} Workshop on Secure and Trustworthy Cyber-Physical
                  Systems, SaT-CPS 2024, Porto, Portugal, 21 June 2024},
  pages        = {81--89},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3643650.3659105},
  doi          = {10.1145/3643650.3659105},
  timestamp    = {Thu, 04 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/ChhetriBBNBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2024,
  editor       = {Anna Lisa Ferrara and
                  Ram Krishnan},
  title        = {Data and Applications Security and Privacy {XXXVIII} - 38th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15-17,
                  2024, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14901},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-65172-4},
  doi          = {10.1007/978-3-031-65172-4},
  isbn         = {978-3-031-65171-7},
  timestamp    = {Tue, 30 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/2024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/SamtaniZK23,
  author       = {Sagar Samtani and
                  Ziming Zhao and
                  Ram Krishnan},
  title        = {Secure Knowledge Management and Cybersecurity in the Era of Artificial
                  Intelligence},
  journal      = {Inf. Syst. Frontiers},
  volume       = {25},
  number       = {2},
  pages        = {425--429},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10796-023-10372-y},
  doi          = {10.1007/S10796-023-10372-Y},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isf/SamtaniZK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/KlepetkoK23,
  author       = {Randy Klepetko and
                  Ram Krishnan},
  title        = {Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural
                  Data Order},
  journal      = {Inf. Syst. Frontiers},
  volume       = {25},
  number       = {2},
  pages        = {613--638},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10796-022-10330-0},
  doi          = {10.1007/S10796-022-10330-0},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/KlepetkoK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/AmeerKSG23,
  author       = {Safwa Ameer and
                  Ram Krishnan and
                  Ravi S. Sandhu and
                  Maanak Gupta},
  editor       = {Mohamed Shehab and
                  Maribel Fern{\'{a}}ndez and
                  Ninghui Li},
  title        = {Utilizing The {DLBAC} Approach Toward a {ZT} Score-based Authorization
                  for IoT Systems},
  booktitle    = {Proceedings of the Thirteenth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2023, Charlotte, NC, USA, April 24-26,
                  2023},
  pages        = {283--285},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3577923.3585046},
  doi          = {10.1145/3577923.3585046},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/AmeerKSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RodriguezK23,
  author       = {David Rodriguez and
                  Ram Krishnan},
  editor       = {Vijayalakshmi Atluri and
                  Anna Lisa Ferrara},
  title        = {An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced
                  Deep Learning},
  booktitle    = {Data and Applications Security and Privacy {XXXVII} - 37th Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2023, Sophia-Antipolis, France,
                  July 19-21, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13942},
  pages        = {302--316},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-37586-6\_18},
  doi          = {10.1007/978-3-031-37586-6\_18},
  timestamp    = {Fri, 14 Jul 2023 22:01:48 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RodriguezK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/RodriguezK23,
  author       = {David Rodriguez and
                  Ram Krishnan},
  editor       = {Vallipuram Muthukkumarasamy and
                  Sithu D. Sudarsan and
                  Rudrapatna K. Shyamasundar},
  title        = {A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep
                  Neural Networks},
  booktitle    = {Information Systems Security - 19th International Conference, {ICISS}
                  2023, Raipur, India, December 16-20, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14424},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49099-6\_11},
  doi          = {10.1007/978-3-031-49099-6\_11},
  timestamp    = {Thu, 04 Jan 2024 08:13:46 +0100},
  biburl       = {https://dblp.org/rec/conf/iciss/RodriguezK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/RodriguezK23,
  author       = {David Rodriguez and
                  Ram Krishnan},
  title        = {Learnable Image Transformations for Privacy Enhanced Deep Neural Networks},
  booktitle    = {5th {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta,
                  GA, USA, November 1-4, 2023},
  pages        = {64--73},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/TPS-ISA58951.2023.00018},
  doi          = {10.1109/TPS-ISA58951.2023.00018},
  timestamp    = {Tue, 05 Mar 2024 12:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/RodriguezK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/midm/RodriguezNCKH22,
  author       = {David Rodriguez and
                  Tapsya Nayak and
                  Yidong Chen and
                  Ram Krishnan and
                  Yufei Huang},
  title        = {On the role of deep learning model complexity in adversarial robustness
                  for medical images},
  journal      = {{BMC} Medical Informatics Decis. Mak.},
  volume       = {22-S},
  number       = {2},
  pages        = {160},
  year         = {2022},
  url          = {https://doi.org/10.1186/s12911-022-01891-w},
  doi          = {10.1186/S12911-022-01891-W},
  timestamp    = {Mon, 27 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/midm/RodriguezNCKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/NobiKHSS22,
  author       = {Mohammad Nur Nobi and
                  Ram Krishnan and
                  Yufei Huang and
                  Mehrnoosh Shakarami and
                  Ravi S. Sandhu},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Toward Deep Learning Based Access Control},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {143--154},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511497},
  doi          = {10.1145/3508398.3511497},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/NobiKHSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NobiKHS22,
  author       = {Mohammad Nur Nobi and
                  Ram Krishnan and
                  Yufei Huang and
                  Ravi S. Sandhu},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Administration of Machine Learning Based Access Control},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {189--210},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_10},
  doi          = {10.1007/978-3-031-17146-8\_10},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NobiKHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itadata/NobiKS22,
  author       = {Mohammad Nur Nobi and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Marco Anisetti and
                  Angela Bonifati and
                  Nicola Bena and
                  Claudio A. Ardagna and
                  Donato Malerba},
  title        = {Adversarial Attacks in Machine Learning Based Access Control},
  booktitle    = {Proceedings of the 1st Italian Conference on Big Data and Data Science
                  (itaDATA 2022), Milan, Italy, September 20-21, 2022},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3340},
  pages        = {3--14},
  publisher    = {CEUR-WS.org},
  year         = {2022},
  url          = {https://ceur-ws.org/Vol-3340/paper44.pdf},
  timestamp    = {Mon, 18 Sep 2023 16:58:22 +0200},
  biburl       = {https://dblp.org/rec/conf/itadata/NobiKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/skm/2021,
  editor       = {Ram Krishnan and
                  H. Raghav Rao and
                  Sanjay K. Sahay and
                  Sagar Samtani and
                  Ziming Zhao},
  title        = {Secure Knowledge Management In The Artificial Intelligence Era - 9th
                  International Conference, {SKM} 2021, San Antonio, TX, USA, October
                  8-9, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1549},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97532-6},
  doi          = {10.1007/978-3-030-97532-6},
  isbn         = {978-3-030-97531-9},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-15124,
  author       = {Mohammad Nur Nobi and
                  Ram Krishnan and
                  Yufei Huang and
                  Mehrnoosh Shakarami and
                  Ravi S. Sandhu},
  title        = {Toward Deep Learning Based Access Control},
  journal      = {CoRR},
  volume       = {abs/2203.15124},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.15124},
  doi          = {10.48550/ARXIV.2203.15124},
  eprinttype    = {arXiv},
  eprint       = {2203.15124},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-15124.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-01739,
  author       = {Mohammad Nur Nobi and
                  Maanak Gupta and
                  Lopamudra Praharaj and
                  Mahmoud Abdelsalam and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {Machine Learning in Access Control: {A} Taxonomy and Survey},
  journal      = {CoRR},
  volume       = {abs/2207.01739},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.01739},
  doi          = {10.48550/ARXIV.2207.01739},
  eprinttype    = {arXiv},
  eprint       = {2207.01739},
  timestamp    = {Wed, 06 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-01739.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/TalegaonK21,
  author       = {Samir Talegaon and
                  Ram Krishnan},
  title        = {A Formal Specification of Access Control in Android with {URI} Permissions},
  journal      = {Inf. Syst. Frontiers},
  volume       = {23},
  number       = {4},
  pages        = {849--866},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10796-020-10066-9},
  doi          = {10.1007/S10796-020-10066-9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/TalegaonK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HaqueK21,
  author       = {Md. Farhan Haque and
                  Ram Krishnan},
  title        = {Toward Automated Cyber Defense with Secure Sharing of Structured Cyber
                  Threat Intelligence},
  journal      = {Inf. Syst. Frontiers},
  volume       = {23},
  number       = {4},
  pages        = {883--896},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10796-020-10103-7},
  doi          = {10.1007/S10796-020-10103-7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isf/HaqueK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdatasec/LawalK21,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  title        = {Enabling Flexible Administration in {ABAC} Through Policy Review:
                  {A} Policy Machine Case Study},
  booktitle    = {7th {IEEE} International Conference on Big Data Security on Cloud,
                  {IEEE} International Conference on High Performance and Smart Computing,
                  and {IEEE} International Conference on Intelligent Data and Security,
                  BigDataSecurity/HPSC/IDS 2021, New York City, NY, USA, May 15-17,
                  2021},
  pages        = {69--74},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/BigDataSecurityHPSCIDS52275.2021.00023},
  doi          = {10.1109/BIGDATASECURITYHPSCIDS52275.2021.00023},
  timestamp    = {Wed, 14 Jul 2021 09:33:42 +0200},
  biburl       = {https://dblp.org/rec/conf/bigdatasec/LawalK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/LawalK21,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  title        = {Utilizing Policy Machine for Attribute-Based Access Control in Permissioned
                  Blockchain},
  booktitle    = {2021 {IEEE} International Conference on Omni-Layer Intelligent Systems,
                  {COINS} 2021, Barcelona, Spain, August 23-25, 2021},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/COINS51742.2021.9524248},
  doi          = {10.1109/COINS51742.2021.9524248},
  timestamp    = {Thu, 09 Sep 2021 16:05:21 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/LawalK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/HeapsKH0S21,
  author       = {John Heaps and
                  Ram Krishnan and
                  Yufei Huang and
                  Jianwei Niu and
                  Ravi S. Sandhu},
  editor       = {Ken Barker and
                  Kambiz Ghazinour},
  title        = {Access Control Policy Generation from User Stories Using Machine Learning},
  booktitle    = {Data and Applications Security and Privacy {XXXV} - 35th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12840},
  pages        = {171--188},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81242-3\_10},
  doi          = {10.1007/978-3-030-81242-3\_10},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/HeapsKH0S21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/LawalK21,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  editor       = {Ram Krishnan and
                  H. Raghav Rao and
                  Sanjay K. Sahay and
                  Sagar Samtani and
                  Ziming Zhao},
  title        = {Attribute-Based Access Control Policy Review in Permissioned Blockchain},
  booktitle    = {Secure Knowledge Management In The Artificial Intelligence Era - 9th
                  International Conference, {SKM} 2021, San Antonio, TX, USA, October
                  8-9, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1549},
  pages        = {97--109},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_6},
  doi          = {10.1007/978-3-030-97532-6\_6},
  timestamp    = {Thu, 03 Mar 2022 14:27:17 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/LawalK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/KlepetkoK21,
  author       = {Randy Klepetko and
                  Ram Krishnan},
  editor       = {Ram Krishnan and
                  H. Raghav Rao and
                  Sanjay K. Sahay and
                  Sagar Samtani and
                  Ziming Zhao},
  title        = {Analyzing {CNN} Models' Sensitivity to the Ordering of Non-natural
                  Data},
  booktitle    = {Secure Knowledge Management In The Artificial Intelligence Era - 9th
                  International Conference, {SKM} 2021, San Antonio, TX, USA, October
                  8-9, 2021, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1549},
  pages        = {130--148},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-97532-6\_8},
  doi          = {10.1007/978-3-030-97532-6\_8},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/KlepetkoK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LawaK20,
  author       = {Sherifdeen Lawal and
                  Ram Krishnan},
  title        = {Policy Review in Attribute Based Access Control - {A} Policy Machine
                  Case Study},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {2},
  pages        = {67--81},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.05.31.067},
  doi          = {10.22667/JISIS.2020.05.31.067},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LawaK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TalegaonK20,
  author       = {Samir Talegaon and
                  Ram Krishnan},
  title        = {Administrative Models for Role Based Access Control in Android},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {10},
  number       = {3},
  pages        = {31--46},
  year         = {2020},
  url          = {https://doi.org/10.22667/JISIS.2020.08.31.031},
  doi          = {10.22667/JISIS.2020.08.31.031},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/TalegaonK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/Al-AlajKS20,
  author       = {Abdullah S. Al{-}Alaj and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {ParaSDN: An Access Control Model for {SDN} Applications based on Parameterized
                  Roles and Permissions},
  booktitle    = {6th {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2020, Atlanta, GA, USA, December 1-3, 2020},
  pages        = {107--116},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CIC50333.2020.00022},
  doi          = {10.1109/CIC50333.2020.00022},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/Al-AlajKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/Al-AlajSK20,
  author       = {Abdullah S. Al{-}Alaj and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {A Model for the Administration of Access Control in Software Defined
                  Networking using Custom Permissions},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {169--178},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00032},
  doi          = {10.1109/TPS-ISA50397.2020.00032},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tpsisa/Al-AlajSK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/TalegaonK20,
  author       = {Samir Talegaon and
                  Ram Krishnan},
  title        = {Role-Based Access Control Models for Android},
  booktitle    = {Second {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta,
                  GA, USA, October 28-31, 2020},
  pages        = {179--188},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TPS-ISA50397.2020.00033},
  doi          = {10.1109/TPS-ISA50397.2020.00033},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/TalegaonK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8924,
  author       = {Sam Aldrin and
                  Carlos Pignataro and
                  Nagendra Kumar and
                  Ram Krishnan and
                  Anoop Ghanwani},
  title        = {Service Function Chaining {(SFC)} Operations, Administration, and
                  Maintenance {(OAM)} Framework},
  journal      = {{RFC}},
  volume       = {8924},
  pages        = {1--20},
  year         = {2020},
  url          = {https://doi.org/10.17487/RFC8924},
  doi          = {10.17487/RFC8924},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8924.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/automatica/NugrohoTGSK19,
  author       = {Sebastian A. Nugroho and
                  Ahmad F. Taha and
                  Nikolaos Gatsis and
                  Tyler H. Summers and
                  Ram Krishnan},
  title        = {Algorithms for joint sensor and control nodes selection in dynamic
                  networks},
  journal      = {Autom.},
  volume       = {106},
  pages        = {124--133},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.automatica.2019.04.047},
  doi          = {10.1016/J.AUTOMATICA.2019.04.047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/automatica/NugrohoTGSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/Al-AlajSK19,
  author       = {Abdullah S. Al{-}Alaj and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Gail{-}Joon Ahn and
                  Guofei Gu and
                  Hongxin Hu and
                  Seungwon Shin},
  title        = {A Formal Access Control Model for SE-Floodlight Controller},
  booktitle    = {SDN-NFV@CODASPY 2019 - roceedings of the {ACM} International Workshop
                  on Security in Software Defined Networks {\&} Network Function
                  Virtualization, Richardson, TX, USA, March 27, 2019},
  pages        = {1--6},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3309194.3309195},
  doi          = {10.1145/3309194.3309195},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/Al-AlajSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/AbdelsalamKS19,
  author       = {Mahmoud Abdelsalam and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Simon N. Foley},
  title        = {Online Malware Detection in Cloud Auto-scaling Systems Using Shallow
                  Convolutional Neural Networks},
  booktitle    = {Data and Applications Security and Privacy {XXXIII} - 33rd Annual
                  {IFIP} {WG} 11.3 Conference, DBSec 2019, Charleston, SC, USA, July
                  15-17, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11559},
  pages        = {381--397},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22479-0\_20},
  doi          = {10.1007/978-3-030-22479-0\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/AbdelsalamKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccs/Al-AlajKS19,
  author       = {Abdullah S. Al{-}Alaj and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {{SDN-RBAC:} An Access Control Model for {SDN} Controller Applications},
  booktitle    = {2019 4th International Conference on Computing, Communications and
                  Security (ICCCS), Rome, Italy, October 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCCS.2019.8888031},
  doi          = {10.1109/CCCS.2019.8888031},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccs/Al-AlajKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccs/KlepetkoK19,
  author       = {Randy Klepetko and
                  Ram Krishnan},
  title        = {Analyzing {CNN} Model Performance Sensitivity to the Ordering of Non-Natural
                  Data},
  booktitle    = {2019 4th International Conference on Computing, Communications and
                  Security (ICCCS), Rome, Italy, October 10-12, 2019},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CCCS.2019.8888041},
  doi          = {10.1109/CCCS.2019.8888041},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icccs/KlepetkoK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iri/ChakrabortySK19,
  author       = {Shuvra Chakraborty and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {On the Feasibility of Attribute-Based Access Control Policy Mining},
  booktitle    = {20th {IEEE} International Conference on Information Reuse and Integration
                  for Data Science, {IRI} 2019, Los Angeles, CA, USA, July 30 - August
                  1, 2019},
  pages        = {245--252},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/IRI.2019.00047},
  doi          = {10.1109/IRI.2019.00047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iri/ChakrabortySK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/HaqueK19,
  author       = {Md. Farhan Haque and
                  Ram Krishnan},
  editor       = {Sanjay K. Sahay and
                  Nihita Goel and
                  Vishwas Patil and
                  Murtuza Jadliwala},
  title        = {Toward Relationship Based Access Control for Secure Sharing of Structured
                  Cyber Threat Intelligence},
  booktitle    = {Secure Knowledge Management In Artificial Intelligence Era - 8th International
                  Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1186},
  pages        = {21--37},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-3817-9\_2},
  doi          = {10.1007/978-981-15-3817-9\_2},
  timestamp    = {Wed, 11 Mar 2020 13:22:25 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/HaqueK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/TalegaonK19,
  author       = {Samir Talegaon and
                  Ram Krishnan},
  editor       = {Sanjay K. Sahay and
                  Nihita Goel and
                  Vishwas Patil and
                  Murtuza Jadliwala},
  title        = {A Formal Specification of Access Control in Android},
  booktitle    = {Secure Knowledge Management In Artificial Intelligence Era - 8th International
                  Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1186},
  pages        = {101--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-3817-9\_7},
  doi          = {10.1007/978-981-15-3817-9\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/skm/TalegaonK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/skm/ChakrabortySK19,
  author       = {Shuvra Chakraborty and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Sanjay K. Sahay and
                  Nihita Goel and
                  Vishwas Patil and
                  Murtuza Jadliwala},
  title        = {On the Feasibility of {RBAC} to {ABAC} Policy Mining: {A} Formal Analysis},
  booktitle    = {Secure Knowledge Management In Artificial Intelligence Era - 8th International
                  Conference, {SKM} 2019, Goa, India, December 21-22, 2019, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1186},
  pages        = {147--163},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-3817-9\_9},
  doi          = {10.1007/978-981-15-3817-9\_9},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/skm/ChakrabortySK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2019,
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006},
  doi          = {10.1145/3292006},
  isbn         = {978-1-4503-6099-9},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/AbdelsalamKHS18,
  author       = {Mahmoud Abdelsalam and
                  Ram Krishnan and
                  Yufei Huang and
                  Ravi S. Sandhu},
  title        = {Malware Detection in Cloud Infrastructures Using Convolutional Neural
                  Networks},
  booktitle    = {11th {IEEE} International Conference on Cloud Computing, {CLOUD} 2018,
                  San Francisco, CA, USA, July 2-7, 2018},
  pages        = {162--169},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CLOUD.2018.00028},
  doi          = {10.1109/CLOUD.2018.00028},
  timestamp    = {Tue, 28 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/AbdelsalamKHS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icacci/JishaKV18,
  author       = {R. C. Jisha and
                  Ram Krishnan and
                  Varun Vikraman},
  title        = {Mobile Applications Recommendation Based on User Ratings and Permissions},
  booktitle    = {2018 International Conference on Advances in Computing, Communications
                  and Informatics, {ICACCI} 2018, Bangalore, India, September 19-22,
                  2018},
  pages        = {1000--1005},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICACCI.2018.8554691},
  doi          = {10.1109/ICACCI.2018.8554691},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icacci/JishaKV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2018,
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {http://dl.acm.org/citation.cfm?id=3176258},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-11792,
  author       = {Sebastian A. Nugroho and
                  Ahmad F. Taha and
                  Nikolaos Gatsis and
                  Tyler H. Summers and
                  Ram Krishnan},
  title        = {Algorithms for Joint Sensor and Control Nodes Selection in Dynamic
                  Networks},
  journal      = {CoRR},
  volume       = {abs/1811.11792},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.11792},
  eprinttype    = {arXiv},
  eprint       = {1811.11792},
  timestamp    = {Wed, 03 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-11792.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8293,
  author       = {Anoop Ghanwani and
                  Linda Dunbar and
                  Mike McBride and
                  Vinay Bannai and
                  Ram Krishnan},
  title        = {A Framework for Multicast in Network Virtualization over Layer 3},
  journal      = {{RFC}},
  volume       = {8293},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.17487/RFC8293},
  doi          = {10.17487/RFC8293},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8293.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc8313,
  author       = {Percy Tarapore and
                  Robert Sayko and
                  Greg Shepherd and
                  Toerless Eckert and
                  Ram Krishnan},
  title        = {Use of Multicast across Inter-domain Peering Points},
  journal      = {{RFC}},
  volume       = {8313},
  pages        = {1--44},
  year         = {2018},
  url          = {https://doi.org/10.17487/RFC8313},
  doi          = {10.17487/RFC8313},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc8313.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/AbdelsalamKS17,
  author       = {Mahmoud Abdelsalam and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Geoffrey C. Fox},
  title        = {Clustering-Based IaaS Cloud Monitoring},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {672--679},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.90},
  doi          = {10.1109/CLOUD.2017.90},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/AbdelsalamKS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BiswasSK17,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Attribute Transformation for Attribute-Based Access Control},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control,
                  ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017},
  pages        = {1--8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041048.3041052},
  doi          = {10.1145/3041048.3041052},
  timestamp    = {Tue, 09 Feb 2021 08:50:28 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BiswasSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coinco/NinglekhuK17,
  author       = {Jiwan Ninglekhu and
                  Ram Krishnan},
  title        = {{AARBAC:} Attribute-Based Administration of Role-Based Access Control},
  booktitle    = {3rd {IEEE} International Conference on Collaboration and Internet
                  Computing, {CIC} 2017, San Jose, CA, USA, October 15-17, 2017},
  pages        = {126--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CIC.2017.00027},
  doi          = {10.1109/CIC.2017.00027},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/coinco/NinglekhuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017abac,
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Proceedings of the 2nd {ACM} Workshop on Attribute-Based Access Control,
                  ABAC@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3041048},
  doi          = {10.1145/3041048},
  isbn         = {978-1-4503-4910-9},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2017abac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NinglekhuK17,
  author       = {Jiwan Ninglekhu and
                  Ram Krishnan},
  title        = {Attribute Based Administration of Role Based Access Control : {A}
                  Detail Description},
  journal      = {CoRR},
  volume       = {abs/1706.03171},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.03171},
  eprinttype    = {arXiv},
  eprint       = {1706.03171},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NinglekhuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/NinglekhuK17a,
  author       = {Jiwan Ninglekhu and
                  Ram Krishnan},
  title        = {A Model for Attribute Based Role-Role Assignment {(ARRA)}},
  journal      = {CoRR},
  volume       = {abs/1706.10274},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.10274},
  eprinttype    = {arXiv},
  eprint       = {1706.10274},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/NinglekhuK17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/YouZK16,
  author       = {Ilsun You and
                  Gansen Zhao and
                  Ram Krishnan},
  title        = {Special Section on Advanced Technologies for Homeland and Cyber Defense},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {22},
  number       = {3},
  pages        = {343--344},
  year         = {2016},
  url          = {https://doi.org/10.1080/10798587.2016.1146504},
  doi          = {10.1080/10798587.2016.1146504},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iasc/YouZK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShenKSN16,
  author       = {Hui Shen and
                  Ram Krishnan and
                  Rocky Slavin and
                  Jianwei Niu},
  title        = {Sequence Diagram Aided Privacy Policy Specification},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {13},
  number       = {3},
  pages        = {381--393},
  year         = {2016},
  url          = {https://doi.org/10.1109/TDSC.2014.2384500},
  doi          = {10.1109/TDSC.2014.2384500},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ShenKSN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BiswasSK16,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Label-Based Access Control: An {ABAC} Model with Enumerated Authorization
                  Policy},
  booktitle    = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491.2875498},
  doi          = {10.1145/2875491.2875498},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/BiswasSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BiswasSK16,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Silvio Ranise and
                  Vipin Swarup},
  title        = {A Comparison of Logical-Formula and Enumerated Authorization Policy
                  {ABAC} Models},
  booktitle    = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9766},
  pages        = {122--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-41483-6\_9},
  doi          = {10.1007/978-3-319-41483-6\_9},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dbsec/BiswasSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16,
  author       = {Rocky Slavin and
                  Xiaoyin Wang and
                  Mitra Bokaei Hosseini and
                  James Hester and
                  Ram Krishnan and
                  Jaspreet Bhatia and
                  Travis D. Breaux and
                  Jianwei Niu},
  editor       = {Laura K. Dillon and
                  Willem Visser and
                  Laurie A. Williams},
  title        = {Toward a framework for detecting privacy policy violations in android
                  application code},
  booktitle    = {Proceedings of the 38th International Conference on Software Engineering,
                  {ICSE} 2016, Austin, TX, USA, May 14-22, 2016},
  pages        = {25--36},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2884781.2884855},
  doi          = {10.1145/2884781.2884855},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/SlavinWHHKBBN16a,
  author       = {Rocky Slavin and
                  Xiaoyin Wang and
                  Mitra Bokaei Hosseini and
                  James Hester and
                  Ram Krishnan and
                  Jaspreet Bhatia and
                  Travis D. Breaux and
                  Jianwei Niu},
  title        = {PVDetector: a detector of privacy-policy violations for Android apps},
  booktitle    = {Proceedings of the International Conference on Mobile Software Engineering
                  and Systems, MOBILESoft '16, Austin, Texas, USA, May 14-22, 2016},
  pages        = {299--300},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897073.2897720},
  doi          = {10.1145/2897073.2897720},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/SlavinWHHKBBN16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BiswasSK16,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Uni-ARBAC: {A} Unified Administrative Model for Role-Based Access
                  Control},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {218--230},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_14},
  doi          = {10.1007/978-3-319-45871-7\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/BiswasSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BiswasSK16,
  author       = {Prosunjit Biswas and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {An Attribute-Based Protection Model for {JSON} Documents},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {303--317},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_20},
  doi          = {10.1007/978-3-319-46298-1\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BiswasSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016abac,
  editor       = {Elisa Bertino and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  title        = {Proceedings of the 2016 {ACM} International Workshop on Attribute
                  Based Access Control, ABAC@CODASPY 2016, New Orleans, Louisiana, USA,
                  March 11, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2875491},
  doi          = {10.1145/2875491},
  isbn         = {978-1-4503-4079-3},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/2016abac.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jicts/LopezK15,
  author       = {Diego R. L{\'{o}}pez and
                  Ram Krishnan},
  title        = {The {NFVRG} Network Function Virtualization Research at the {IRTF}},
  journal      = {J. {ICT} Stand.},
  volume       = {3},
  number       = {1},
  pages        = {57--66},
  year         = {2015},
  url          = {https://doi.org/10.13052/jicts2245-800x.313},
  doi          = {10.13052/JICTS2245-800X.313},
  timestamp    = {Thu, 01 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jicts/LopezK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/NinglekhuKJP15,
  author       = {Jiwan Ninglekhu and
                  Ram Krishnan and
                  Eugene John and
                  Manoj Panday},
  title        = {Securing Implantable Cardioverter Defibrillators Using Smartphones},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {47--64},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.047},
  doi          = {10.22667/JISIS.2015.05.31.047},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/NinglekhuKJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/VazquezKJ15,
  author       = {Carlos Vazquez and
                  Ram Krishnan and
                  Eugene John},
  title        = {Time Series Forecasting of Cloud Data Center Workloads for Dynamic
                  Resource Provisioning},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {6},
  number       = {3},
  pages        = {87--110},
  year         = {2015},
  url          = {https://doi.org/10.22667/JOWUA.2015.09.31.087},
  doi          = {10.22667/JOWUA.2015.09.31.087},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/VazquezKJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/KrishnaswamyKLW15,
  author       = {Dilip Krishnaswamy and
                  Ram Krishnan and
                  Diego R. L{\'{o}}pez and
                  Peter Willis and
                  Asif Qamar},
  title        = {An open {NFV} and cloud architectural framework for managing application
                  virality behaviour},
  booktitle    = {12th Annual {IEEE} Consumer Communications and Networking Conference,
                  {CCNC} 2015, Las Vegas, NV, USA, January 9-12, 2015},
  pages        = {746--754},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CCNC.2015.7158071},
  doi          = {10.1109/CCNC.2015.7158071},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/KrishnaswamyKLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PustchiKS15,
  author       = {Navid Pustchi and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Authorization Federation in IaaS Multi Cloud},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {63--71},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732523},
  doi          = {10.1145/2732516.2732523},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/PustchiKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/ZhangKS15,
  author       = {Yun Zhang and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Secure Information and Resource Sharing in Cloud},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {131--133},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699126},
  doi          = {10.1145/2699026.2699126},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/ZhangKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BijonKS15,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Jaehong Park and
                  Anna Cinzia Squicciarini},
  title        = {Virtual Resource Orchestration Constraints in Cloud Infrastructure
                  as a Service},
  booktitle    = {Proceedings of the 5th {ACM} Conference on Data and Application Security
                  and Privacy, {CODASPY} 2015, San Antonio, TX, USA, March 2-4, 2015},
  pages        = {183--194},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2699026.2699112},
  doi          = {10.1145/2699026.2699112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/BijonKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/RajpootJK15,
  author       = {Qasim Mahmood Rajpoot and
                  Christian Damsgaard Jensen and
                  Ram Krishnan},
  editor       = {Pierangela Samarati},
  title        = {Integrating Attributes into Role-Based Access Control},
  booktitle    = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
                  {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
                  2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9149},
  pages        = {242--249},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-20810-7\_17},
  doi          = {10.1007/978-3-319-20810-7\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/RajpootJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ei-mobmu/KrishnanN15,
  author       = {Ram Krishnan and
                  Jiwan Ninglekhu},
  editor       = {Reiner Creutzburg and
                  David Akopian},
  title        = {Smartphone-based secure authenticated session sharing in Internet
                  of Personal Things},
  booktitle    = {Mobile Devices and Multimedia: Enabling Technologies, Algorithms,
                  and Applications 2015, San Francisco, California, USA, February 8-12,
                  2015},
  series       = {{SPIE} Proceedings},
  volume       = {9411},
  pages        = {941109},
  publisher    = {{SPIE}},
  year         = {2015},
  url          = {https://doi.org/10.1117/12.2086282},
  doi          = {10.1117/12.2086282},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ei-mobmu/KrishnanN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BijonKS15,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Edgar R. Weippl and
                  Florian Kerschbaum and
                  Adam J. Lee},
  title        = {Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven
                  Virtual Resource Scheduling},
  booktitle    = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
                  Technologies, Vienna, Austria, June 1-3, 2015},
  pages        = {63--74},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2752952.2752964},
  doi          = {10.1145/2752952.2752964},
  timestamp    = {Mon, 26 Jun 2023 20:45:28 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/BijonKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustbus/RajpootJK15,
  author       = {Qasim Mahmood Rajpoot and
                  Christian Damsgaard Jensen and
                  Ram Krishnan},
  editor       = {Simone Fischer{-}H{\"{u}}bner and
                  Costas Lambrinoudakis and
                  Javier L{\'{o}}pez},
  title        = {Attributes Enhanced Role-Based Access Control Model},
  booktitle    = {Trust, Privacy and Security in Digital Business - 12th International
                  Conference, TrustBus 2015, Valencia, Spain, September 1-2, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9264},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22906-5\_1},
  doi          = {10.1007/978-3-319-22906-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustbus/RajpootJK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc7424,
  author       = {Ram Krishnan and
                  Lucy Yong and
                  Anoop Ghanwani and
                  Ning So and
                  Bhumip Khasnabish},
  title        = {Mechanisms for Optimizing Link Aggregation Group {(LAG)} and Equal-Cost
                  Multipath {(ECMP)} Component Link Utilization in Networks},
  journal      = {{RFC}},
  volume       = {7424},
  pages        = {1--29},
  year         = {2015},
  url          = {https://doi.org/10.17487/RFC7424},
  doi          = {10.17487/RFC7424},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc7424.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhangKS14,
  author       = {Yun Zhang and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Gail{-}Joon Ahn and
                  Tomas Sander},
  title        = {Secure Information and Resource Sharing in Cloud Infrastructure as
                  a Service},
  booktitle    = {Proceedings of the 2014 {ACM} Workshop on Information Sharing {\&}
                  Collaborative Security, {WISCS} '14, Scottsdale, Arizona, USA, November
                  3, 2014},
  pages        = {81--90},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2663876.2663884},
  doi          = {10.1145/2663876.2663884},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhangKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/JinKS14,
  author       = {Xin Jin and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Elisa Bertino and
                  Shu{-}Ching Chen and
                  Karl Aberer and
                  Prashant Krishnamurthy and
                  Murat Kantarcioglu},
  title        = {Role and attribute based collaborative administration of intra-tenant
                  cloud IaaS},
  booktitle    = {10th {IEEE} International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2014, Miami, Florida,
                  USA, October 22-25, 2014},
  pages        = {261--274},
  publisher    = {{ICST} / {IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2014.257591},
  doi          = {10.4108/ICST.COLLABORATECOM.2014.257591},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/JinKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/KrishnanKM14,
  author       = {Ram Krishnan and
                  Dilip Krishnaswamy and
                  Dave McDysan},
  title        = {Behavioral Security Threat Detection Strategies for Data Center Switches
                  and Routers},
  booktitle    = {34th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2014 Workshops), Madrid, Spain, June 30 - July 3, 2014},
  pages        = {82--87},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/ICDCSW.2014.19},
  doi          = {10.1109/ICDCSW.2014.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/KrishnanKM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/BijonKS14,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Man Ho Au and
                  Barbara Carminati and
                  C.{-}C. Jay Kuo},
  title        = {A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service},
  booktitle    = {Network and System Security - 8th International Conference, {NSS}
                  2014, Xi'an, China, October 15-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8792},
  pages        = {41--53},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11698-3\_4},
  doi          = {10.1007/978-3-319-11698-3\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/BijonKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/t4e/KrishnaswamyQKRNBM14,
  author       = {Dilip Krishnaswamy and
                  Asif Qamar and
                  Ram Krishnan and
                  Krishnakumar Rajagopal and
                  Naveen Narayan and
                  Kamal Bijlani and
                  Kannan M. Moudgalya},
  editor       = {Kinshuk and
                  Sahana Murthy},
  title        = {Bringing Knowledge to the Edge with Jnana Edge and Buddhi Edge: Architecture,
                  Implementation, and Future Directions},
  booktitle    = {Sixth {IEEE} International Conference on Technology for Education,
                  {T4E} 2014, Amritapuri, India, December 18-21, 2014},
  pages        = {48--51},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/T4E.2014.35},
  doi          = {10.1109/T4E.2014.35},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/t4e/KrishnaswamyQKRNBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/SinghalCGSKAB13,
  author       = {Mukesh Singhal and
                  Santosh Chandrasekhar and
                  Tingjian Ge and
                  Ravi S. Sandhu and
                  Ram Krishnan and
                  Gail{-}Joon Ahn and
                  Elisa Bertino},
  title        = {Collaboration in Multicloud Computing Environments: Framework and
                  Security Issues},
  journal      = {Computer},
  volume       = {46},
  number       = {2},
  pages        = {76--84},
  year         = {2013},
  url          = {https://doi.org/10.1109/MC.2013.46},
  doi          = {10.1109/MC.2013.46},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/SinghalCGSKAB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FongMK13,
  author       = {Philip W. L. Fong and
                  Pooya Mehregan and
                  Ram Krishnan},
  editor       = {Ahmad{-}Reza Sadeghi and
                  Virgil D. Gligor and
                  Moti Yung},
  title        = {Relational abstraction in community-based secure collaboration},
  booktitle    = {2013 {ACM} {SIGSAC} Conference on Computer and Communications Security,
                  CCS'13, Berlin, Germany, November 4-8, 2013},
  pages        = {585--598},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2508859.2516720},
  doi          = {10.1145/2508859.2516720},
  timestamp    = {Tue, 10 Nov 2020 19:58:06 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FongMK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BijonKS13,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {A framework for risk-aware role based access control},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2013,
                  National Harbor, MD, USA, October 14-16, 2013},
  pages        = {462--469},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/CNS.2013.6682761},
  doi          = {10.1109/CNS.2013.6682761},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BijonKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/JinKS13,
  author       = {Xin Jin and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Thomas Gro{\ss} and
                  Marit Hansen},
  title        = {Reachability analysis for role-based administration of attributes},
  booktitle    = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Berlin, Germany, November 8, 2013},
  pages        = {73--84},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517881.2517891},
  doi          = {10.1145/2517881.2517891},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/JinKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/BijonKS13,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {Towards an Attribute Based Constraints Specification Language},
  booktitle    = {International Conference on Social Computing, SocialCom 2013, SocialCom/PASSAT/BigData/EconCom/BioMedCom
                  2013, Washington, DC, USA, 8-14 September, 2013},
  pages        = {108--113},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SocialCom.2013.23},
  doi          = {10.1109/SOCIALCOM.2013.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/BijonKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/BijonASK12,
  author       = {Khalid Zaman Bijon and
                  Tahmina Ahmed and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Calton Pu and
                  James Joshi and
                  Surya Nepal},
  title        = {A lattice interpretation of group-centric collaboration with expedient
                  insiders},
  booktitle    = {8th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2012, Pittsburgh, PA,
                  USA, October 14-17, 2012},
  pages        = {200--209},
  publisher    = {{ICST} / {IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2012.250468},
  doi          = {10.4108/ICST.COLLABORATECOM.2012.250468},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/BijonASK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cts/BijonSK12,
  author       = {Khalid Zaman Bijon and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Waleed W. Smari and
                  Geoffrey Charles Fox},
  title        = {A group-centric model for collaboration with expedient insiders in
                  multilevel systems},
  booktitle    = {2012 International Conference on Collaboration Technologies and Systems,
                  {CTS} 2012, Denver, CO, USA, May 21-25, 2012},
  pages        = {419--426},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/CTS.2012.6261086},
  doi          = {10.1109/CTS.2012.6261086},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/cts/BijonSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/JinKS12,
  author       = {Xin Jin and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Nora Cuppens{-}Boulahia and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {A Unified Attribute-Based Access Control Model Covering DAC, {MAC}
                  and {RBAC}},
  booktitle    = {Data and Applications Security and Privacy {XXVI} - 26th Annual {IFIP}
                  {WG} 11.3 Conference, DBSec 2012, Paris, France, July 11-13,2012.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7371},
  pages        = {41--55},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31540-4\_4},
  doi          = {10.1007/978-3-642-31540-4\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/dbsec/JinKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dyspan/ErpekSKC12,
  author       = {Tugba Erpek and
                  Karl Steadman and
                  Ram Krishnan and
                  Qiao Chen},
  title        = {{LTE} signal classification and center frequency detection without
                  Priori information},
  booktitle    = {{IEEE} International Symposium on Dynamic Spectrum Access Networks,
                  DySPAN 2012, Bellevue, WA, USA, October 16-19, 2012},
  pages        = {299--304},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/DYSPAN.2012.6478153},
  doi          = {10.1109/DYSPAN.2012.6478153},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/dyspan/ErpekSKC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/BijonKS12,
  author       = {Khalid Zaman Bijon and
                  Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Venkat N. Venkatakrishnan and
                  Diganta Goswami},
  title        = {Risk-Aware {RBAC} Sessions},
  booktitle    = {Information Systems Security, 8th International Conference, {ICISS}
                  2012, Guwahati, India, December 15-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7671},
  pages        = {59--74},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35130-3\_5},
  doi          = {10.1007/978-3-642-35130-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/BijonKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/JinSK12,
  author       = {Xin Jin and
                  Ravi S. Sandhu and
                  Ram Krishnan},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {{RABAC:} Role-Centric Attribute-Based Access Control},
  booktitle    = {Computer Network Security - 6th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7531},
  pages        = {84--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33704-8\_8},
  doi          = {10.1007/978-3-642-33704-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/JinSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/t4e/KrishnanKQBM12,
  author       = {Ram Krishnan and
                  Dilip Krishnaswamy and
                  Asif Qamar and
                  Kamal Bijlani and
                  Kannan M. Moudgalya},
  editor       = {Sahana Murthy and
                  Demetrios G. Sampson},
  title        = {BuddhiEdge: Taking Education to the Edge},
  booktitle    = {2012 {IEEE} Fourth International Conference on Technology for Education,
                  {T4E} 2012, Hyderabad, India, July 18-20, 2012},
  pages        = {235--236},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/T4E.2012.56},
  doi          = {10.1109/T4E.2012.56},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/t4e/KrishnanKQBM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KrishnanNSW11,
  author       = {Ram Krishnan and
                  Jianwei Niu and
                  Ravi S. Sandhu and
                  William H. Winsborough},
  title        = {Group-Centric Secure Information-Sharing Models for Isolated Groups},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {14},
  number       = {3},
  pages        = {23:1--23:29},
  year         = {2011},
  url          = {https://doi.org/10.1145/2043621.2043623},
  doi          = {10.1145/2043621.2043623},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KrishnanNSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SandhuBJK11,
  author       = {Ravi S. Sandhu and
                  Khalid Zaman Bijon and
                  Xin Jin and
                  Ram Krishnan},
  editor       = {Dimitrios Georgakopoulos and
                  James B. D. Joshi},
  title        = {RT-based administrative models for community cyber security information
                  sharing},
  booktitle    = {7th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2011, Orlando, FL, USA,
                  15-18 October, 2011},
  pages        = {473--478},
  publisher    = {{ICST} / {IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2011.247176},
  doi          = {10.4108/ICST.COLLABORATECOM.2011.247176},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/SandhuBJK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/KrishnanS11,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu},
  editor       = {Sushil Jajodia and
                  Chandan Mazumdar},
  title        = {Authorization Policy Specification and Enforcement for Group-Centric
                  Secure Information Sharing},
  booktitle    = {Information Systems Security - 7th International Conference, {ICISS}
                  2011, Kolkata, India, December 15-19, 2011, Procedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7093},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25560-1\_7},
  doi          = {10.1007/978-3-642-25560-1\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/KrishnanS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SandhuBKRWZ10,
  author       = {Ravi S. Sandhu and
                  Raj Boppana and
                  Ram Krishnan and
                  Jeff Reich and
                  Todd Wolff and
                  Josh Zachry},
  editor       = {Adrian Perrig and
                  Radu Sion},
  title        = {Towards a discipline of mission-aware cloud computing},
  booktitle    = {Proceedings of the 2nd {ACM} Cloud Computing Security Workshop, {CCSW}
                  2010, Chicago, IL, USA, October 8, 2010},
  pages        = {13--18},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1866835.1866839},
  doi          = {10.1145/1866835.1866839},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/SandhuBKRWZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/SandhuKW10,
  author       = {Ravi S. Sandhu and
                  Ram Krishnan and
                  G. B. White},
  editor       = {Karl Aberer and
                  James Joshi},
  title        = {Towards Secure Information Sharing models for community Cyber Security},
  booktitle    = {The 6th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2010, Chicago, IL, USA,
                  9-12 October 2010},
  pages        = {1--6},
  publisher    = {{ICST} / {IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.4108/icst.collaboratecom.2010.3},
  doi          = {10.4108/ICST.COLLABORATECOM.2010.3},
  timestamp    = {Sun, 08 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/SandhuKW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mmmacns/SandhuKNW10,
  author       = {Ravi S. Sandhu and
                  Ram Krishnan and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {Igor V. Kotenko and
                  Victor A. Skormin},
  title        = {Group-Centric Models for Secure and Agile Information Sharing},
  booktitle    = {Computer Network Security, 5th International Conference on Mathematical
                  Methods, Models and Architectures for Computer Network Security, {MMM-ACNS}
                  2010, St. Petersburg, Russia, September 8-10, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6258},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14706-7\_5},
  doi          = {10.1007/978-3-642-14706-7\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mmmacns/SandhuKNW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnanSNW09,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {A conceptual framework for Group-Centric secure information sharing},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {384--387},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533111},
  doi          = {10.1145/1533057.1533111},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrishnanSNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/KrishnanSNW09,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {James B. D. Joshi and
                  Tao Zhang},
  title        = {Towards a framework for group-centric secure collaboration},
  booktitle    = {The 5th International Conference on Collaborative Computing: Networking,
                  Applications and Worksharing, CollaborateCom 2009, Washington DC,
                  USA, November 11-14, 2009},
  pages        = {1--10},
  publisher    = {{ICST} / {IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.4108/ICST.COLLABORATECOM2009.8305},
  doi          = {10.4108/ICST.COLLABORATECOM2009.8305},
  timestamp    = {Tue, 20 Aug 2024 07:54:43 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/KrishnanSNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/KrishnanS09,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu},
  title        = {A Hybrid Enforcement Model for Group-centric Secure Information Sharing},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {189--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.397},
  doi          = {10.1109/CSE.2009.397},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/KrishnanS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KrishnanSNW09,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu and
                  Jianwei Niu and
                  William H. Winsborough},
  editor       = {Barbara Carminati and
                  James Joshi},
  title        = {Foundations for group-centric secure information sharing models},
  booktitle    = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2009, Stresa, Italy, June 3-5, 2009, Proceedings},
  pages        = {115--124},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1542207.1542227},
  doi          = {10.1145/1542207.1542227},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/KrishnanSNW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KrishnanNSW08,
  author       = {Ram Krishnan and
                  Jianwei Niu and
                  Ravi S. Sandhu and
                  William H. Winsborough},
  editor       = {Vitaly Shmatikov},
  title        = {Stale-safe security properties for group-based secure information
                  sharing},
  booktitle    = {Proceedings of the 6th {ACM} Workshop on Formal Methods in Security
                  Engineering, {FMSE} 2008, Alexandria, VA, USA, October 27, 2008},
  pages        = {53--62},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1456396.1456402},
  doi          = {10.1145/1456396.1456402},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KrishnanNSW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KrishnanSR07,
  author       = {Ram Krishnan and
                  Ravi S. Sandhu and
                  Kumar Ranganathan},
  editor       = {Volkmar Lotz and
                  Bhavani Thuraisingham},
  title        = {{PEI} models towards scalable, usable and high-assurance information
                  sharing},
  booktitle    = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages        = {145--150},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1266840.1266863},
  doi          = {10.1145/1266840.1266863},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/KrishnanSR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/rfc/rfc3270,
  author       = {Francois Le Faucheur and
                  Liwen Wu and
                  Bruce Davie and
                  Shahram Davari and
                  Pasi Vaananen and
                  Ram Krishnan and
                  Pierrick Cheval and
                  Juha Hein{\"{a}}nen},
  title        = {Multi-Protocol Label Switching {(MPLS)} Support of Differentiated
                  Services},
  journal      = {{RFC}},
  volume       = {3270},
  pages        = {1--64},
  year         = {2002},
  url          = {https://doi.org/10.17487/RFC3270},
  doi          = {10.17487/RFC3270},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/rfc/rfc3270.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Krishnan97,
  author       = {Ram Krishnan},
  title        = {Rate-based control schemes for {ABR} traffic - Design principles and
                  performance comparison},
  journal      = {Comput. Networks {ISDN} Syst.},
  volume       = {29},
  number       = {5},
  pages        = {583--593},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0169-7552(96)00121-3},
  doi          = {10.1016/S0169-7552(96)00121-3},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/Krishnan97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/MaxemchukK93,
  author       = {Nicholas F. Maxemchuk and
                  Ram Krishnan},
  title        = {A Comparison of Linear and Mesh Topologies - {DQDB} and the Manhattan
                  Street Network},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {11},
  number       = {8},
  pages        = {1278--1289},
  year         = {1993},
  url          = {https://doi.org/10.1109/49.245916},
  doi          = {10.1109/49.245916},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/MaxemchukK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/KrishnanM93,
  author       = {Ram Krishnan and
                  Nicholas F. Maxemchuk},
  title        = {Life beyond linear topologies [MANs]},
  journal      = {{IEEE} Netw.},
  volume       = {7},
  number       = {2},
  pages        = {48--54},
  year         = {1993},
  url          = {https://doi.org/10.1109/65.216902},
  doi          = {10.1109/65.216902},
  timestamp    = {Wed, 05 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/KrishnanM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KrishnanS93,
  author       = {Ram Krishnan and
                  John A. Silvester},
  title        = {Choice of Allocation Granularity in Multipath Source Routing Schemes},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '93, The Conference on Computer Communications,
                  Twelfth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking: Foundation for the Future, San Francisco, CA,
                  USA, March 28 - April 1, 1993},
  pages        = {322--329},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/INFCOM.1993.253345},
  doi          = {10.1109/INFCOM.1993.253345},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/KrishnanS93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/KrishnanM93,
  author       = {Ram Krishnan and
                  Nicholas F. Maxemchuk},
  title        = {Is There Life beyond Linear Topologies? {A} Comparison of {DQDB} and
                  Manhattan Street Network},
  booktitle    = {Proceedings {IEEE} {INFOCOM} '93, The Conference on Computer Communications,
                  Twelfth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Networking: Foundation for the Future, San Francisco, CA,
                  USA, March 28 - April 1, 1993},
  pages        = {690--698},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/INFCOM.1993.253302},
  doi          = {10.1109/INFCOM.1993.253302},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/KrishnanM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}