|
Search the dblp DataBase
Mahesh V. Tripunitara:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Mahesh V. Tripunitara, Partha Dutta
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning. [Citation Graph (0, 0)][DBLP] ACSAC, 1999, pp:303-309 [Conf]
- Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara
On mutually-exclusive roles and separation of duty. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:42-51 [Conf]
- Mahesh V. Tripunitara, Ninghui Li
Comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:62-71 [Conf]
- Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
Resiliency policies in access control. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2006, pp:113-123 [Conf]
- Ninghui Li, Mahesh V. Tripunitara
Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2004, pp:126-135 [Conf]
- Ninghui Li, Mahesh V. Tripunitara
On Safety in Discretionary Access Control. [Citation Graph (0, 0)][DBLP] IEEE Symposium on Security and Privacy, 2005, pp:96-109 [Conf]
- Mahesh V. Tripunitara, Ninghui Li
A theory for comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:2, pp:231-272 [Journal]
- Mahesh V. Tripunitara, Eugene H. Spafford
Connectivity provisioning with security attributes. [Citation Graph (0, 0)][DBLP] Software Focus, 2001, v:2, n:3, pp:112-116 [Journal]
- Ninghui Li, Mahesh V. Tripunitara
Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2006, v:9, n:4, pp:391-420 [Journal]
- Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri
On mutually exclusive roles and separation-of-duty. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2007, v:10, n:2, pp:- [Journal]
Conditional Payments for Computing Markets. [Citation Graph (, )][DBLP]
A Correctness Proof of a Mesh Security Architecture. [Citation Graph (, )][DBLP]
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations. [Citation Graph (, )][DBLP]
Efficient access enforcement in distributed role-based access control (RBAC) deployments. [Citation Graph (, )][DBLP]
Role-based access control (RBAC) in Java via proxy objects using annotations. [Citation Graph (, )][DBLP]
Access control in practice: pain points. [Citation Graph (, )][DBLP]
Social Learning Applications in Resource Constrained Networks. [Citation Graph (, )][DBLP]
Resolving the Micropayment Problem. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|