James Joshi
List of publications from the DBLP Bibliography Server - FAQ
2009 | ||
---|---|---|
50 | Barbara Carminati, James Joshi: SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings ACM 2009 | |
49 | Elisa Bertino, James B. D. Joshi: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers Springer 2009 | |
48 | Amirreza Masoumzadeh, James Joshi, Hassan A. Karimi: LBS (k, T)-anonymity: a spatio-temporal approach to anonymity for location-based service users. GIS 2009: 464-467 | |
47 | Hassan Takabi, Minsoo Kim, James B. D. Joshi, Michael B. Spring: An architecture for specification and enforcement of temporal access control constraints using OWL. SWS 2009: 21-28 | |
46 | Saman Taghavi Zargar, M. Amir Moulavi, Rajkumar Buyya, Mahmoud Naghibzadeh, James B. D. Joshi: RRNA: reliable soft real-time network aware grid scheduling algorithm using round trip time. SpringSim 2009 | |
45 | Yue Zhang, James B. D. Joshi: GEO-RBAC Model. Encyclopedia of Database Systems 2009: 1244-1245 | |
44 | Yue Zhang, James B. D. Joshi: Role Based Access Control. Encyclopedia of Database Systems 2009: 2447-2452 | |
43 | Yue Zhang, James B. D. Joshi: Temporal Access Control. Encyclopedia of Database Systems 2009: 2920-2924 | |
42 | Yue Zhang, James B. D. Joshi: Administration Model for RBAC. Encyclopedia of Database Systems 2009: 58 | |
41 | Yue Zhang, James B. D. Joshi: ANSI/INCITS RBAC Standard. Encyclopedia of Database Systems 2009: 91-92 | |
40 | Carlos E. Caicedo, James B. D. Joshi, Summit R. Tuladhar: IPv6 Security Challenges. IEEE Computer 42(2): 36-42 (2009) | |
2008 | ||
39 | Michael Jiang, James Joshi: Message from the IWSSE 2008 Workshop Organizers. COMPSAC 2008: 935 | |
38 | Michael Jiang, James Joshi: IWSSE 2008 Workshop Organization. COMPSAC 2008: 936 | |
37 | Minsoo Kim, James B. D. Joshi, Minkoo Kim: Access Control for Cooperation Systems Based on Group Situation. CollaborateCom 2008: 11-23 | |
36 | Youna Jung, Amirreza Masoumzadeh, James B. D. Joshi, Minkoo Kim: RiBAC: Role Interaction Based Access Control Model for Community Computing. CollaborateCom 2008: 304-321 | |
35 | Yue Zhang, James B. D. Joshi: Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. EUC (2) 2008: 264-271 | |
34 | Amirreza Masoumzadeh, James B. D. Joshi: PuRBAC: Purpose-Aware Role-Based Access Control. OTM Conferences (2) 2008: 1104-1121 | |
33 | Yue Zhang, James B. D. Joshi: UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. SACMAT 2008: 83-92 | |
32 | Summit R. Tuladhar, Carlos E. Caicedo, James B. D. Joshi: Inter-domain Authentication for Seamless Roaming in Heterogeneous Wireless Networks. SUTC 2008: 249-255 | |
31 | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang: Formal foundations for hybrid hierarchies in GTRBAC. ACM Trans. Inf. Syst. Secur. 10(4): (2008) | |
2007 | ||
30 | Yue Zhang, James B. D. Joshi: A request-driven secure interoperation framework in loosely-coupled multi-domain environments employing RBAC policies. CollaborateCom 2007: 25-32 | |
29 | Yue Zhang, James B. D. Joshi: SARBAC07: A Scoped Administration Model for RBAC with Hybrid Hierarchy. IAS 2007: 149-154 | |
28 | Kai Ouyang, James B. D. Joshi: CT-RBAC: A Temporal RBAC Model with Conditional Periodic Time. IPCCC 2007: 467-474 | |
27 | Yue Zhang, James B. D. Joshi: ARBAC07: A Role-based Administration Model for RBAC with Hybrid Hierarchy. IRI 2007: 196-202 | |
2006 | ||
26 | Jun-Hyung Park, Minsoo Kim, BongNam Noh, James B. D. Joshi: A similarity based technique for detecting malicious executable files for computer forensics. IRI 2006: 188-193 | |
25 | Siqing Du, James B. D. Joshi: Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. SACMAT 2006: 228-236 | |
24 | James B. D. Joshi, Elisa Bertino: Fine-grained role-based delegation in presence of the hybrid role hierarchy. SACMAT 2006: 81-90 | |
23 | Suroop Mohan Chandran, Korporn Panyim, James B. D. Joshi: A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments. iTrust 2006: 33-47 | |
2005 | ||
22 | Suroop Mohan Chandran, James B. D. Joshi: Towards administration of a hybrid role hierarchy. IRI 2005: 500-505 | |
21 | Suroop Mohan Chandran, James B. D. Joshi: LoT-RBAC: A Location and Time-Based RBAC Model. WISE 2005: 361-375 | |
20 | Basit Shafiq, Ammar Masood, James Joshi, Arif Ghafoor: A Role-Based Access Control Policy Verification Framework for Real-Time Systems. WORDS 2005: 13-20 | |
19 | Smithi Piromruen, James B. D. Joshi: An RBAC Framework for Time Constrained Secure Interoperation in Multi-domain Environments. WORDS 2005: 36-48 | |
18 | Rafae Bhatti, Arif Ghafoor, Elisa Bertino, James Joshi: X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(2): 187-227 (2005) | |
17 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi: X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ACM Trans. Inf. Syst. Secur. 8(4): 388-423 (2005) | |
16 | James Joshi, Elisa Bertino, Arif Ghafoor: An Analysis of Expressiveness and Design Issues for the Generalized Temporal Role-Based Access Control Model. IEEE Trans. Dependable Sec. Comput. 2(2): 157-175 (2005) | |
15 | James Joshi, Elisa Bertino, Usman Latif, Arif Ghafoor: A Generalized Temporal Role-Based Access Control Model. IEEE Trans. Knowl. Data Eng. 17(1): 4-23 (2005) | |
14 | Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor: Secure Interoperation in a Multidomain Environment Employing RBAC Policies. IEEE Trans. Knowl. Data Eng. 17(11): 1557-1577 (2005) | |
2004 | ||
13 | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu: Security for grid-based computing systems issues and challenges. SACMAT 2004: 125 | |
12 | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor: X-GTRBAC admin: a decentralized administration model for enterprise wide access control. SACMAT 2004: 78-86 | |
11 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor, James Joshi: XML-Based Specification for Web Services Document Security. IEEE Computer 37(4): 41-49 (2004) | |
10 | James Joshi, Rafae Bhatti, Elisa Bertino, Arif Ghafoor: Access-Control Language for Multidomain Environments. IEEE Internet Computing 8(6): 40-50 (2004) | |
2003 | ||
9 | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor: Access Control in Dynamic XML-Based Web-Services with X-RBAC. ICWS 2003: 243-249 | |
8 | James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino: Dependencies and separation of duty constraints in GTRBAC. SACMAT 2003: 51-64 | |
2002 | ||
7 | James Joshi, Elisa Bertino, Arif Ghafoor: Hybrid Role Hierarchy for Generalized Temporal Role Based Access Control Model. COMPSAC 2002: 951-956 | |
6 | James Joshi, Elisa Bertino, Arif Ghafoor: Temporal hierarchies and inheritance semantics for GTRBAC. SACMAT 2002: 74-83 | |
5 | James B. D. Joshi, Zhaohui Kevin Li, Husni Fahmi, Basit Shafiq, Arif Ghafoor: A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia 4(2): 215-234 (2002) | |
2001 | ||
4 | James Joshi, Walid G. Aref, Arif Ghafoor, Eugene H. Spafford: Security models for web-based applications. Commun. ACM 44(2): 38-44 (2001) | |
3 | James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford: Digital Government Security Infrastructure Design Challenges. IEEE Computer 34(2): 66-72 (2001) | |
2000 | ||
2 | James Joshi, Arif Ghafoor: A Petri-Net Based Multilevel Security Specification Model for Multimedia Documents. IEEE International Conference on Multimedia and Expo (I) 2000: 533-536 | |
1998 | ||
1 | Sahra Sedigh, James Joshi, Ahmed R. Bashandy, Arif Ghafoor: Evaluation of Filtering Mechanisms for MPEG Video Communications. SRDS 1998: 449-454 |