Search the dblp DataBase
James Joshi :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
James Joshi , Elisa Bertino , Arif Ghafoor Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. [Citation Graph (0, 0)][DBLP ] COMPSAC, 2002, pp:951-956 [Conf ] James Joshi , Arif Ghafoor A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents. [Citation Graph (0, 0)][DBLP ] IEEE International Conference on Multimedia and Expo (I), 2000, pp:533-536 [Conf ] Rafae Bhatti , James Joshi , Elisa Bertino , Arif Ghafoor Access Control in Dynamic XML-Based Web-Services with X-RBAC. [Citation Graph (0, 0)][DBLP ] ICWS, 2003, pp:243-249 [Conf ] Elisa Bertino , Bruno Crispo , James Joshi , Wengliang (Kevin) Du , Ravi S. Sandhu Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:125- [Conf ] Rafae Bhatti , James Joshi , Elisa Bertino , Arif Ghafoor X-GTRBAC admin: a decentralized administration model for enterprise wide access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:78-86 [Conf ] James Joshi , Elisa Bertino , Arif Ghafoor Temporal hierarchies and inheritance semantics for GTRBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:74-83 [Conf ] James Joshi , Basit Shafiq , Arif Ghafoor , Elisa Bertino Dependencies and separation of duty constraints in GTRBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:51-64 [Conf ] Sahra Sedigh , James Joshi , Ahmed Bashandy , Arif Ghafoor Evaluation of Filtering Mechanisms for MPEG Video Communications. [Citation Graph (0, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1998, pp:449-454 [Conf ] Basit Shafiq , Ammar Masood , James Joshi , Arif Ghafoor A Role-Based Access Control Policy Verification Framework for Real-Time Systems. [Citation Graph (0, 0)][DBLP ] WORDS, 2005, pp:13-20 [Conf ] James Joshi , Walid G. Aref , Arif Ghafoor , Eugene H. Spafford Security models for web-based applications. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2001, v:44, n:2, pp:38-44 [Journal ] Rafae Bhatti , Elisa Bertino , Arif Ghafoor , James Joshi XML-Based Specification for Web Services Document Security. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2004, v:37, n:4, pp:41-49 [Journal ] James Joshi , Arif Ghafoor , Walid G. Aref , Eugene H. Spafford Digital Government Security Infrastructure Design Challenges. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2001, v:34, n:2, pp:66-72 [Journal ] James Joshi , Rafae Bhatti , Elisa Bertino , Arif Ghafoor Access-Control Language for Multidomain Environments. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2004, v:8, n:6, pp:40-50 [Journal ] James Joshi , Elisa Bertino , Arif Ghafoor An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Dependable Sec. Comput., 2005, v:2, n:2, pp:157-175 [Journal ] Rafae Bhatti , Arif Ghafoor , Elisa Bertino , James Joshi X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:2, pp:187-227 [Journal ] Rafae Bhatti , Basit Shafiq , Elisa Bertino , Arif Ghafoor , James Joshi X-gtrbac admin: A decentralized administration model for enterprise-wide access control. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2005, v:8, n:4, pp:388-423 [Journal ] James Joshi , Elisa Bertino , Usman Latif , Arif Ghafoor A Generalized Temporal Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:1, pp:4-23 [Journal ] Basit Shafiq , James Joshi , Elisa Bertino , Arif Ghafoor Secure Interoperation in a Multidomain Environment Employing RBAC Policies. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2005, v:17, n:11, pp:1557-1577 [Journal ] IWSSE 2008 Workshop Organization. [Citation Graph (, )][DBLP ] Message from the IWSSE 2008 Workshop Organizers. [Citation Graph (, )][DBLP ] LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs