default search action
Jason Crampton
Jason Alexis Valentine Crampton
Person information
- affiliation: Royal Holloway, University of London, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [i32]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Bi-objective Optimization in Role Mining. CoRR abs/2403.16757 (2024) - 2022
- [j28]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem: Theory and Experiments. ACM Trans. Priv. Secur. 25(4): 28:1-28:32 (2022) - [c77]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Generalized Noise Role Mining. SACMAT 2022: 91-102 - 2021
- [j27]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. ACM Trans. Priv. Secur. 24(3): 21:1-21:22 (2021) - [c76]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem. SACMAT 2021: 83-94 - [i31]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. CoRR abs/2104.05983 (2021) - [i30]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem: Theory and Experiments. CoRR abs/2106.05761 (2021) - 2020
- [j26]Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. IEEE Trans. Dependable Secur. Comput. 17(6): 1333-1344 (2020)
2010 – 2019
- 2019
- [j25]Jason Crampton, Gregory Z. Gutin, Martin Koutecký, Rémi Watrigant:
Parameterized resiliency problems. Theor. Comput. Sci. 795: 478-491 (2019) - [c75]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Bounded and Approximate Strong Satisfiability in Workflows. SACMAT 2019: 179-184 - [i29]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Bounded and Approximate Strong Satisfiability in Workflows. CoRR abs/1904.07234 (2019) - 2017
- [j24]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan, Rémi Watrigant:
The bi-objective workflow satisfiability problem and workflow resiliency. J. Comput. Secur. 25(1): 83-115 (2017) - [j23]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic enforcement of information flow policies without public information via tree partitions. J. Comput. Secur. 25(6): 511-535 (2017) - [c74]Jason Crampton, Gregory Z. Gutin, Martin Koutecký, Rémi Watrigant:
Parameterized Resiliency Problems via Integer Linear Programming. CIAC 2017: 164-176 - [c73]Jason Crampton, Conrad Williams:
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. CODASPY 2017: 47-58 - [c72]Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. CODASPY 2017: 163-165 - [c71]James Alderman, Naomi Farley, Jason Crampton:
Tree-Based Cryptographic Access Control. ESORICS (1) 2017: 47-64 - [c70]Jason Crampton, Conrad Williams:
Attribute Expressions, Policy Tables and Attribute-Based Access Control. SACMAT 2017: 79-90 - [c69]James Alderman, Jason Crampton, Naomi Farley:
A Framework for the Cryptographic Enforcement of Information Flow Policies. SACMAT 2017: 143-154 - [c68]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
On the Satisfiability of Workflows with Release Points. SACMAT 2017: 207-217 - [i28]Jason Crampton, Conrad Williams:
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. CoRR abs/1702.04173 (2017) - 2016
- [j22]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Algorithms for the workflow satisfiability problem engineered for counting constraints. J. Comb. Optim. 32(1): 3-24 (2016) - [j21]Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones, Magnus Wahlström:
On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations. ACM Trans. Priv. Secur. 19(3): 8:1-8:29 (2016) - [c67]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
A Multivariate Approach for Checking Resiliency in Access Control. AAIM 2016: 173-184 - [c66]Jason Crampton, James Sellwood:
ARPPM: Administration in the RPPM Model. CODASPY 2016: 219-230 - [c65]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. CT-RSA 2016: 147-163 - [c64]Jason Crampton, James Sellwood:
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances. DBSec 2016: 96-105 - [c63]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
Resiliency Policies in Access Control Revisited. SACMAT 2016: 101-111 - [c62]Jason Crampton, Conrad Williams:
On Completeness in Languages for Attribute-Based Access Control. SACMAT 2016: 149-160 - [i27]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
A Multivariate Approach for Checking Resiliency in Access Control. CoRR abs/1604.01550 (2016) - [i26]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
An Approach to Parameterized Resiliency Problems Using Integer Linear Programming. CoRR abs/1605.08738 (2016) - [i25]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions. CoRR abs/1608.08386 (2016) - [i24]Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. CoRR abs/1612.06191 (2016) - 2015
- [c61]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies Without Public Information. ACNS 2015: 389-408 - [c60]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Access Control in Publicly Verifiable Outsourced Computation. AsiaCCS 2015: 657-662 - [c59]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones:
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. DBSec 2015: 330-345 - [c58]Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
On the Workflow Satisfiability Problem with Class-independent Constraints. IPEC 2015: 66-77 - [c57]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan:
Valued Workflow Satisfiability Problem. SACMAT 2015: 3-13 - [c56]Jason Crampton, Charles Morisset, Nicola Zannone:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c55]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for an Open-Source Medical Records System. SACMAT 2015: 113-124 - [c54]Jason Crampton, Conrad Williams:
Obligations in PTaCL. STM 2015: 220-235 - [i23]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan:
Valued Workflow Satisfiability Problem. CoRR abs/1501.07814 (2015) - [i22]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones:
Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies. CoRR abs/1503.01382 (2015) - [i21]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for OpenMRS. CoRR abs/1503.06154 (2015) - [i20]David A. Cohen, Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
Algorithms for the workflow satisfiability problem engineered for counting constraints. CoRR abs/1504.02420 (2015) - [i19]Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
On the Workflow Satisfiability Problem with Class-Independent Constraints. CoRR abs/1504.03561 (2015) - [i18]Jason Crampton, James Sellwood:
Relationships, Paths and Principal Matching: A New Approach to Access Control. CoRR abs/1505.07945 (2015) - [i17]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan, Rémi Watrigant:
The Bi-Objective Workflow Satisfiability Problem and Workflow Resiliency. CoRR abs/1512.07019 (2015) - [i16]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. IACR Cryptol. ePrint Arch. 2015: 320 (2015) - 2014
- [j20]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Iterative Plan Construction for the Workflow Satisfiability Problem. J. Artif. Intell. Res. 51: 555-577 (2014) - [j19]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking. Int. J. Softw. Tools Technol. Transf. 16(1): 31-48 (2014) - [c53]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Revocation in Publicly Verifiable Outsourced Computation. Inscrypt 2014: 51-71 - [c52]Jason Crampton, Alexandre Pinto:
Attribute-Based Encryption for Access Control Using Elementary Operations. CSF 2014: 125-139 - [c51]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints. FAW 2014: 48-59 - [c50]Jason Crampton, James Sellwood:
Path conditions and principal matching: a new approach to access control. SACMAT 2014: 187-198 - [c49]Jason Crampton, Charles Morisset:
Monotonicity and Completeness in Attribute-Based Access Control. STM 2014: 33-48 - [c48]Jason Crampton, James Sellwood:
Caching and Auditing in the RPPM Model. STM 2014: 49-64 - [i15]Jason Crampton, James Sellwood:
Path Conditions and Principal Matching: A New Approach to Access Control. CoRR abs/1406.4988 (2014) - [i14]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Publicly Verifiable Outsourced Computation with a Key Distribution Centre. CoRR abs/1406.5720 (2014) - [i13]Jason Crampton, James Sellwood:
Caching and Auditing in the RPPM Model. CoRR abs/1407.7841 (2014) - [i12]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information. CoRR abs/1410.5567 (2014) - [i11]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Revocation in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 640 (2014) - [i10]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Access Control in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 762 (2014) - 2013
- [j18]Jason Crampton:
A personal tribute to Steve Barker. Sci. Comput. Program. 78(3): 269 (2013) - [j17]Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem. ACM Trans. Inf. Syst. Secur. 16(1): 4 (2013) - [c47]Jason Crampton, Robert Crowston, Gregory Z. Gutin, Mark Jones, M. S. Ramanujan:
Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints. FAW-AAIM 2013: 198-209 - [c46]James Sellwood, Jason Crampton:
Sleeping android: the danger of dormant permissions. SPSM@CCS 2013: 55-66 - [c45]James Alderman, Jason Crampton:
On the Use of Key Assignment Schemes in Authentication Protocols. NSS 2013: 607-613 - [c44]Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider, Helen Treharne, Adrian Waller:
Policy templates for relationship-based access control. PST 2013: 221-228 - [c43]Jason Crampton, Gregory Z. Gutin:
Constraint expressions and workflow satisfiability. SACMAT 2013: 73-84 - [e3]Jason Crampton, Sushil Jajodia, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9 [contents] - [i9]Jason Crampton, Gregory Z. Gutin:
Constraint Expressions and Workflow Satisfiability. CoRR abs/1301.3402 (2013) - [i8]James Alderman, Jason Crampton:
On the Use of Key Assignment Schemes in Authentication Protocols. CoRR abs/1303.4262 (2013) - [i7]David A. Cohen, Jason Crampton, Gregory Z. Gutin, Mark Jones:
Pattern-Based Plan Construction for the Workflow Satisfiability Problem. CoRR abs/1306.3649 (2013) - [i6]Rafael Accorsi, Jason Crampton, Michael Huth, Stefanie Rinderle-Ma:
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341). Dagstuhl Reports 3(8): 73-86 (2013) - 2012
- [c42]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning. PAAR@IJCAR 2012: 29-42 - [c41]Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the parameterized complexity of the workflow satisfiability problem. CCS 2012: 857-868 - [c40]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. POST 2012: 390-409 - [c39]Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman:
Obligations in risk-aware access control. PST 2012: 145-152 - [i5]Jason Crampton, Charles Morisset:
Towards A Generic Formal Framework for Access Control Systems. CoRR abs/1204.2342 (2012) - [i4]Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the Parameterized Complexity of the Workflow Satisfiability Problem. CoRR abs/1205.0852 (2012) - [i3]Jason Crampton, Robert Crowston, Gregory Z. Gutin, Mark Jones, M. S. Ramanujan:
Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints. CoRR abs/1210.3978 (2012) - 2011
- [j16]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:
User-friendly and certificate-free grid security infrastructure. Int. J. Inf. Sec. 10(3): 137-153 (2011) - [j15]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in hierarchical RBAC systems. ACM Trans. Inf. Syst. Secur. 14(1): 3:1-3:29 (2011) - [j14]Jason Crampton:
Practical and efficient cryptographic enforcement of interval-based access control policies. ACM Trans. Inf. Syst. Secur. 14(1): 14:1-14:30 (2011) - [c38]Jason Crampton, Michael Huth:
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems. Business Process Management Workshops (2) 2011: 423-434 - [c37]Jason Crampton:
Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. ESORICS 2011: 245-261 - [c36]Liang Chen, Jason Crampton:
Risk-Aware Role-Based Access Control. STM 2011: 140-156 - [e2]Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6 [contents] - [e1]Ruth Breu, Jason Crampton, Jorge Lobo:
16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0688-1 [contents] - [i2]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. CoRR abs/1111.5767 (2011) - 2010
- [c35]Jason Crampton, Rosli Daud, Keith M. Martin:
Constructing Key Assignment Schemes from Chain Partitions. DBSec 2010: 130-145 - [c34]Jason Crampton, Michael Huth:
An Authorization Framework Resilient to Policy Evaluation Failures. ESORICS 2010: 472-487 - [c33]Jason Crampton:
Cryptographic Enforcement of Role-Based Access Control. Formal Aspects in Security and Trust 2010: 191-205 - [c32]Jason Crampton, Michael Huth:
A Framework for the Modular Specification and Orchestration of Authorization Policies. NordSec 2010: 155-170 - [c31]Jason Crampton, Charles Morisset:
An Auto-delegation Mechanism for Access Control Systems. STM 2010: 1-16 - [p1]Jason Crampton, Michael Huth:
Towards an Access-Control Framework for Countering Insider Threats. Insider Threats in Cyber Security 2010: 173-195 - [i1]Jason Crampton:
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies. CoRR abs/1005.4993 (2010)
2000 – 2009
- 2009
- [j13]Jason Crampton:
Cryptographically-enforced hierarchical access control with multiple keys. J. Log. Algebraic Methods Program. 78(8): 690-700 (2009) - [c30]Jason Crampton, Hemanth Khambhammettu:
A Framework for Enforcing Constrained RBAC Policies. CSE (3) 2009: 195-200 - [c29]Liang Chen, Jason Crampton:
Set Covering Problems in Role-Based Access Control. ESORICS 2009: 689-704 - [c28]Jason Crampton:
Trade-Offs in Cryptographic Implementations of Temporal Access Control. NordSec 2009: 72-87 - 2008
- [j12]Jason Crampton, Hemanth Khambhammettu:
Delegation in role-based access control. Int. J. Inf. Sec. 7(2): 123-136 (2008) - [j11]Federica Paci, Elisa Bertino, Jason Crampton:
An Access-Control Framework for WS-BPEL. Int. J. Web Serv. Res. 5(3): 20-43 (2008) - [c27]Liang Chen, Jason Crampton:
On spatio-temporal constraints and inheritance in role-based access control. AsiaCCS 2008: 205-216 - [c26]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c25]Jason Crampton, Hemanth Khambhammettu:
On delegation and workflow execution models. SAC 2008: 2137-2144 - [c24]Jason Crampton, Hemanth Khambhammettu:
Delegation and satisfiability in workflow systems. SACMAT 2008: 31-40 - [c23]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in RBAC systems. SACMAT 2008: 63-72 - [c22]M. A. C. Dekker, Jason Crampton, Sandro Etalle:
RBAC administration in distributed systems. SACMAT 2008: 93-102 - [c21]Jason Crampton, Hoon Wei Lim:
Role Signatures for Access Control in Open Distributed Systems. SEC 2008: 205-220 - 2007
- [c20]M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - [c19]Allan Tucker, Stephen Swift, Jason Crampton:
Efficiency updates for the restricted growth function GA for grouping problems. GECCO 2007: 1536 - [c18]Stephen Swift, Allan Tucker, Jason Crampton, David Garway-Heath:
An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data. GECCO 2007: 2174-2181 - [c17]Liang Chen, Jason Crampton:
Applications of the Oriented Permission Role-Based Access Control Model. IPCCC 2007: 387-394 - [c16]Liang Chen, Jason Crampton:
Inter-domain role mapping and least privilege. SACMAT 2007: 157-162 - [c15]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson:
What can identity-based cryptography offer to web services? SWS 2007: 26-36 - [c14]James Skene, Allan Skene, Jason Crampton, Wolfgang Emmerich:
The monitorability of service-level agreements for application-service provision. WOSP 2007: 3-14 - 2006
- [j10]Jason Crampton:
Applying hierarchical and role-based access control to XML documents. Comput. Syst. Sci. Eng. 21(5) (2006) - [j9]Steve Counsell, Stephen Swift, Jason Crampton:
The interpretation and utility of three cohesion metrics for object-oriented design. ACM Trans. Softw. Eng. Methodol. 15(2): 123-149 (2006) - [c13]