James Joshi
List of publications from the DBLP Bibliography Server - FAQ
![]() | 2009 | |
---|---|---|
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Barbara Carminati, James Joshi: SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings ACM 2009 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, James B. D. Joshi: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers Springer 2009 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Amirreza Masoumzadeh, James Joshi, Hassan A. Karimi: LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. GIS 2009: 464-467 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Hassan Takabi, Minsoo Kim, James B. D. Joshi, Michael B. Spring: An architecture for specification and enforcement of temporal access control constraints using OWL. SWS 2009: 21-28 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Saman Taghavi Zargar, M. Amir Moulavi, Rajkumar Buyya, Mahmoud Naghibzadeh, James B. D. Joshi: RRNA: reliable soft real-time network aware grid scheduling algorithm using round trip time. SpringSim 2009 |
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: GEO-RBAC Model. Encyclopedia of Database Systems 2009: 1244-1245 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: Role Based Access Control. Encyclopedia of Database Systems 2009: 2447-2452 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: Temporal Access Control. Encyclopedia of Database Systems 2009: 2920-2924 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: Administration Model for RBAC. Encyclopedia of Database Systems 2009: 58 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: ANSI/INCITS RBAC Standard. Encyclopedia of Database Systems 2009: 91-92 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar: IPv6 Security Challenges. IEEE Computer 42(2): 36-42 (2009) |
2008 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Jiang, James Joshi: Message from the IWSSE 2008 Workshop Organizers. COMPSAC 2008: 935 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Jiang, James Joshi: IWSSE 2008 Workshop Organization. COMPSAC 2008: 936 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Minsoo Kim, James B. D. Joshi, Minkoo Kim: Access Control for Cooperation Systems Based on Group Situation. CollaborateCom 2008: 11-23 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Youna Jung, Amirreza Masoumzadeh, James B. D. Joshi, Minkoo Kim: RiBAC: Role Interaction Based Access Control Model for Community Computing. CollaborateCom 2008: 304-321 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. EUC (2) 2008: 264-271 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Amirreza Masoumzadeh, James B. D. Joshi: PuRBAC: Purpose-Aware Role-Based Access Control. OTM Conferences (2) 2008: 1104-1121 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. SACMAT 2008: 83-92 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi: Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. SUTC 2008: 249-255 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): (2008) |
2007 | ||
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. CollaborateCom 2007: 25-32 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. IAS 2007: 149-154 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Kai Ouyang, James B. D. Joshi: CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. IPCCC 2007: 467-474 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Yue Zhang, James B. D. Joshi: ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. IRI 2007: 196-202 |
2006 | ||
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi: A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Siqing Du, James B. D. Joshi: Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. SACMAT 2006: 228-236 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | James B. D. Joshi, Elisa Bertino: Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi: A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. iTrust 2006: 33-47 |
2005 | ||
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Suroop Mohan Chandran, James B. D. Joshi: Towards administration of a hybrid role hierarchy. IRI 2005: 500-505 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Suroop Mohan Chandran, James B. D. Joshi: LoT-RBAC: A Location and Time-Based RBAC Model. WISE 2005: 361-375 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor: A Role-Based Access Control Policy Verification Framework for Real-Time Systems. WORDS 2005: 13-20 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Smithi Piromruen, James B. D. Joshi: An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments. WORDS 2005: 36-48 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi: X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(2): 187-227 (2005) |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi: X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(4): 388-423 (2005) |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Elisa Bertino, Arif Ghafoor: An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. IEEE Trans. Dependable Sec. Comput. 2(2): 157-175 (2005) |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor: A Generalized Temporal Role-Based Access Control Model. IEEE Trans. Knowl. Data Eng. 17(1): 4-23 (2005) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor: Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Trans. Knowl. Data Eng. 17(11): 1557-1577 (2005) |
2004 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor: X-GTRBAC admin: a decentralized administration model for enterprise wide access control. SACMAT 2004: 78-86 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi: XML-Based Specification for Web Services Document Security. IEEE Computer 37(4): 41-49 (2004) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor: Access-Control Language for Multidomain Environments. IEEE Internet Computing 8(6): 40-50 (2004) |
2003 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor: Access Control in Dynamic XML-Based Web-Services with X-RBAC. ICWS 2003: 243-249 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino: Dependencies and separation of duty constraints in GTRBAC. SACMAT 2003: 51-64 |
2002 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Elisa Bertino, Arif Ghafoor: Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. COMPSAC 2002: 951-956 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Elisa Bertino, Arif Ghafoor: Temporal hierarchies and inheritance semantics for GTRBAC. SACMAT 2002: 74-83 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor: A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia 4(2): 215-234 (2002) |
2001 | ||
4 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford: Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001) |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford: Digital Government Security Infrastructure Design Challenges. IEEE Computer 34(2): 66-72 (2001) |
2000 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | James Joshi, Arif Ghafoor: A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents. IEEE International Conference on Multimedia and Expo (I) 2000: 533-536 |
1998 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Sahra Sedigh, James Joshi, Ahmed R. Bashandy, Arif Ghafoor: Evaluation of Filtering Mechanisms for MPEG Video Communications. SRDS 1998: 449-454 |