 | 2001 |
4 |  | Amgad Fayad,
Sushil Jajodia,
Donald B. Faatz,
Vinti Doshi:
Going Beyond MAC and DAC Using Mobile Policies.
SEC 2001: 245-260 |
| 2000 |
3 |  | Vinti Doshi,
Amgad Fayad,
Sushil Jajodia,
Roswitha MacLean:
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications.
ACSAC 2000: 298-307 |
| 1999 |
2 |  | Arnon Rosenthal,
Edward Sciore,
Vinti Doshi:
Security Administration for Federations, Warehouses, and other Derived Data.
DBSec 1999: 209-223 |
| 1992 |
1 |  | Vinti Doshi,
Sushil Jajodia:
Referential Integrity in Multilevel Secure Database Management Systems.
SEC 1992: 359-371 |