![]() | 2009 | |
---|---|---|
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, David Kaminsky: Towards Energy Efficient Change Management in a Cloud Computing Environment. AIMS 2009: 161-166 |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani: Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). ICISS 2009: 318-325 |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Jeremiah Creedon: Measuring The Effect of Modeling Assumptions on Estimating Origin-Destination Airport Passenger Traffic. MSV 2009: 106-110 |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Sharma Abhishek Srinivasan, Ravi Mukkamala, K. Venkataramaniah: Design and Anlysis of Cryptographically Strong S-Boxes: A Novel Approach. Security and Management 2009: 124-129 |
2008 | ||
78 | ![]() ![]() ![]() ![]() ![]() ![]() | S. Sampath, Ravi Iyer, K. S. Sridharan, Ravi Mukkamala, Sandhya Kapoor: Coalition Service Registry for Ad-hoc Dynamic Coalitions. Enterprise Information Systems and Web Technologies 2008: 41-46 |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammad Zubair, Ravi Mukkamala: High Performance Implementation of Binomial Option Pricing. ICCSA (1) 2008: 852-866 |
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Manik Lal Das, Ravi Mukkamala: Revisiting Bluetooth Security (Short Paper). ICISS 2008: 132-139 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Mahantesh Halappanavar, Amit Kumar, Ravi Mukkamala, Mohammad Zubair: Efficient Parallel Implementations of Binomial Tree Option Price Valuation. ISCA PDCCS 2008: 74-81 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | S. Sampath, Ravi Iyer, K. S. Sridharan, Ravi Mukkamala, Sandhya Kapoor: Secure Web-Based Sharing of Health Information Services Using Ad-Hoc Dynamic Coalitions. ITNG 2008: 297-302 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, S. Lakkoju, V. Kamineni, S. Kamisetty, A. Polu, Jeremiah Creedon: Improving runway capacity: an integrated approach using modeling, simulation, and analysis. SpringSim 2008: 190-197 |
2007 | ||
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair: Framework for Information Sharing Across Multiple Government Agencies under Dynamic Access Policies. ARES 2007: 934-940 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady S. AbdelSalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair: Infrastructure-Aware Autonomic Manager for Change Management. POLICY 2007: 66-69 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya: Using semantics for automatic enforcement of access control policies among dynamic coalitions. SACMAT 2007: 235-244 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayalakshmi Atluri, Soon Ae Chun, Ravi Mukkamala, Pietro Mazzoleni: A decentralized execution model for inter-organizational workflows. Distributed and Parallel Databases 22(1): 55-83 (2007) |
2006 | ||
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari: A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. DBSec 2006: 209-223 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy: A novel collusion-resilient architecture for secure group communication in wireless ad-hoc networks. J. High Speed Networks 15(1): 73-92 (2006) |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammed A. Moharrum, Mohamed Eltoweissy, Ravi Mukkamala: Dynamic combinatorial key management scheme for sensor networks. Wireless Communications and Mobile Computing 6: 1017-1035 (2006) |
2005 | ||
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. DBSec 2005: 252-266 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Kailash Bhoopalam, Kurt Maly, Ravi Mukkamala, Mohammad Zubair, D. Agrawal, David Kaminsky: A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights. DRMTICS 2005: 102-112 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Kailash Bhoopalam, Kurt Maly, Frank McCown, Ravi Mukkamala, Mohammad Zubair: A Flexible Framework for Content-Based Access Management for Federated Digital Libraries. ECDL 2005: 489-490 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Kailash Bhoopalam, Kurt Maly, Frank McCown, Ravi Mukkamala, Mohammad Zubair: A Standards-Based Approach for Supporting Dynamic Access Policies for a Federated Digital Library. ICADL 2005: 242-252 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala: An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ICISS 2005: 134-147 |
2004 | ||
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley: Policy-based Security Management for Enterprise Systems. DBSec 2004: 219-233 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy: TKGS: Verifiable Threshold-Based Key Generation Scheme in Open Wireless Ad Hoc Networks. ICCCN 2004: 31-36 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Ranjit Abbadasari, Ravi Mukkamala, V. Valli Kumari: MobiCoin: Digital Cash for M-Commerce. ICDCIT 2004: 441-451 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammed A. Moharrum, Ravi Mukkamala, Mohamed Eltoweissy: Efficient Secure Multicast with Well-Populated Multicast Key Trees. ICPADS 2004: 215-222 |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Kailash Bhoopalam, Kurt Maly, Mohammad Zubair, Ravi Mukkamala: Access Management in Federated Digital Libraries. ICWI 2004: 201-208 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Myron Sheu, Le Tang, Ravi Mukkamala: A Systematic Approach to Security Deployment in a Networking Environment. Security and Management 2004: 228-234 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Jeff Adams, Ranjit Abbadasari, Ravi Mukkamala: EZ-Park: An Innovative Secure M-Commerce Application. Security and Management 2004: 348-352 |
2003 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Mahantesh Halappanavar, Ravi Mukkamala: ECPV: Efficient Certificate Path Validation in Public-key Infrastructure. DBSec 2003: 215-228 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Myron Sheu, Ravi Mukkamala, Stewart Shen: A Reasoning Framework for Optimal Design Decisions. IKE 2003: 283-289 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Pavan K. Sura, Ravi Mukkamala: A PKI Architecture for Academic Institutions: Design and Prototype. Security and Management 2003: 205-212 |
2002 | ||
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar: Recertification: A Technique to Improve Services in PKI. DBSec 2002: 259-270 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Srikanth Balusani: Active Certificates: A New Paradigm in Digital Certificate Management. ICPP Workshops 2002: 30-40 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Somasekhar Vemulapalli, Mahantesh Halappanavar, Ravi Mukkamala: Security in Distributed Digital Libraries: Issues and Challenges . ICPP Workshops 2002: 480-486 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). INDOCRYPT 2002: 108-121 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayalakshmi Atluri, Ravi Mukkamala: Employing an extended transaction model in multilevel secure transaction processing. Informatica (Slovenia) 26(2): (2002) |
2001 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Sushil Jajodia: A Novel Approach to Certificate Revocation Management. DBSec 2001: 225-238 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayalakshmi Atluri, Ravi Mukkamala: An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. DBSec 2001: 255-268 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Jonathan Cranford, Ravi Mukkamala, Vijayalakshmi Atluri: Modeling and Evaluation of Distributed Workflow Algorithms. ISAS-SCI (1) 2001: 183-188 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Sang Hyuk Son, Ravi Mukkamala, Rasikan David: Correction to 'Integrating Security and Real-Time Requirements Using Covert Channel Capacity'. IEEE Trans. Knowl. Data Eng. 13(5): 862 (2001) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Vijayalakshmi Atluri, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Security Transaction Processing. Journal of Computer Security 9(3): 165-195 (2001) |
2000 | ||
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayalakshmi Atluri, Ravi Mukkamala: Modeling and Evaluation of Redesigning Methodologies for Distributed Workflows. MASCOTS 2000: 248- |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Sang Hyuk Son, Ravi Mukkamala, Rasikan David: Integrating Security and Real-Time Requirements Using Covert Channel Capacity. IEEE Trans. Knowl. Data Eng. 12(6): 865-879 (2000) |
1999 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Jason Gagnon, Sushil Jajodia: Integrating Data Mining Techniques with Intrusion Detection Methods. DBSec 1999: 33-46 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Ashok K. Agrawala: Modeling Memory Reference Patterns of Programs in Cache Memory Systems. MASCOTS 1999: 288-295 |
1998 | ||
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Ramesh Yerraballi, Ravi Mukkamala: Routing and admission control of real-time channels. ECRTS 1998: 115-122 |
1997 | ||
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ravi Mukkamala, Indrajit Ray: A Two-tier Coarse Indexing Scheme for MLS Database Systems. DBSec 1997: 199-218 |
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Hussein M. Abdel-Wahab, Ravi Mukkamala, Ajay K. Gupta, Mohamed Kholief, S. Dittakavi, C. S. Vemuru, H. Syed: CoProcess: A Java-based Environment for Collaborative Process Management Over the Web. WebNet 1997 |
1996 | ||
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Vijayalakshmi Atluri, Sushil Jajodia, Thomas F. Keefe, Catherine D. McCollum, Ravi Mukkamala: Multilevel Secure Transaction Processing: Status and Prospects. DBSec 1996: 79-98 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Ajay K. Gupta, Irwin B. Levinstein, Ravi Mukkamala, Bjorn Kvande, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers: PMES: privilege mangagement and enforcement system for secure distributed resource sharing. IFIP World Conference on IT Tools 1996: 348-358 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Ajay K. Gupta, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers: A privilege management and enforcement system for distributed resource sharing. WETICE 1996: 106-111 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ravi Mukkamala: Reduction in Transaction Conflicts Using Semantics-Based Concurrency Control. Performance of Concurrency Control Mechanisms in Centralized Database Systems 1996: 387-405 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | John P. McDermott, Ravi Mukkamala: A Performance Comparison of Five Transaction Processing Algorithms for the SINTRA Replicated-Architecture Database system. Journal of Computer Security 4(2/3): 189-228 (1996) |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Ramesh Yerraballi, Ravi Mukkamala: Scalability in real-time systems with end-to-end requirements. Journal of Systems Architecture 42(6-7): 409-429 (1996) |
1995 | ||
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Sang Hyuk Son: A Secure Concurrency Control Protocol for Real-Time Databases. DBSec 1995: 215-230 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Ramesh Yerraballi, Ravi Mukkamala: Schedulability related issues in end-to-end systems. ICECCS 1995: 215-222 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Hussein M. Abdel-Wahab, Ravi Mukkamala, Ajay K. Gupta, A. Prabhu, H. Syed, C. S. Vemuru: Mosaic + XTV = CoReview. Computer Networks and ISDN Systems 27(6): 849-860 (1995) |
1994 | ||
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Edwin C. Foudriat, Kurt Maly, Ravi Mukkamala, C. Michael Overstreet, L. Mathews, S. Balay: RAIN (Redundant Array of Inexpensive Networks): Expanding Existing Networks to Support Multitraffic Performance. HPN 1994: 63-77 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Storage Efficient and Secure Replicated Distribted Databases. IEEE Trans. Knowl. Data Eng. 6(2): 337-341 (1994) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ravi Mukkamala, K. V. S. Ramarao: A View-Based Dynamic Replication Control Algorithm. Nord. J. Comput. 1(2): 214-230 (1994) |
1993 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Sushil Jajodia: A Performance Comparison of two Decomposition Techniques for Multilevel Secure Database Systems. DBSec 1993: 199-214 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | John P. McDermott, Ravi Mukkamala: Performance Analysis of Transaction Management Algorithms for the SINTRA Replicated-Architecture Database System. DBSec 1993: 215-234 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ravi Mukkamala: Measuring the effect of commutative transactions on distributed database performance. Inf. Sci. 68(1-2): 91-111 (1993) |
1992 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Sanjeev Khanna, Ravi Mukkamala, C. Michael Overstreet, Ramesh Yerraballi, Edwin C. Foudriat, B. Madan: Parallel TCP/IP for Multiprocessor Workstations. HPN 1992: 103-118 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Frank Paterra, C. Michael Overstreet, Ravi Mukkamala, Sanjeev Khanna: Concurrent Use of Parallel Communication to Enable Remote Visualization. ICCI 1992: 449-452 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Sanjeev Khanna, C. Michael Overstreet, Ravi Mukkamala, Mohammad Zubair, Y. S. Sekhar: Multiprocessor Architectures for High Speed Networks: A Performance Study. IFIP Congress (1) 1992: 645-651 |
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Edwin C. Foudriat, Ravi Mukkamala, C. Michael Overstreet, David Game: Dynamic Allocation of Bandwidth in Multichannel Metropolitan Area Networks. Computer Networks and ISDN Systems 25(2): 203-223 (1992) |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Measuring the Effects of Distributed Database Models on Transaction Availability Measures. Perform. Eval. 14(1): 1-20 (1992) |
1991 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Sushil Jajodia, Ravi Mukkamala: Effects of SeaView Decomposition of Multilevel Relations on Database Performance. DBSec 1991: 203-225 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Osman ZeinElDine, Mohamed Eltoweissy, Ravi Mukkamala: A Distributed Scheduling Algorithm for Heterogeneous Real-Time Systems. ICCI 1991: 588-598 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Sushil Jajodia: A Note on Estimating the Cardinality of the Projection of a Database Relation. ACM Trans. Database Syst. 16(3): 564-566 (1991) |
1990 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Effects of distributed database modeling on evaluation of transaction rollbacks. Winter Simulation Conference 1990: 839-845 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Steven C. Bruell: Efficient Schemes to Evaluate Transaction Performance in Distributed Database Systems. Comput. J. 33(1): 79-89 (1990) |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | R. L. Bailey, Ravi Mukkamala: Pipelining Data Compression Algorithms. Comput. J. 33(4): 308-313 (1990) |
1989 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Measuring the Effect of Data Distribution and Replication Models on Performance Evaluation of Distributed Database Systems. ICDE 1989: 513-520 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Kurt Maly, Edwin C. Foudriat, David Game, Ravi Mukkamala, C. Michael Overstreet: Traffic Placement Policies for Multi-Band Network. SIGCOMM 1989: 94-105 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Measuring the Effects of Data Distribution Models on Performance Evaluation of Distributed Database Systems. IEEE Trans. Knowl. Data Eng. 1(4): 494-507 (1989) |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala: Some Properties of View-Based Replication Control Algorithms for Distributed Systems. Inf. Process. Lett. 31(6): 295-298 (1989) |
1988 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Steven C. Bruell, Roger K. Shultz: A Heuristic Algorithm for Determining a Near-optimal Set of Nodes to Access in a Partially Replicated Distributed Database System. ICDE 1988: 330-336 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Roger K. Shultz: Performance Comparision of Two Multiprocessor B-Link Tree Implementations. ICPP (1) 1988: 182-186 |
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Ravi Mukkamala, Steven C. Bruell, Roger K. Shultz: Design of Partially Replicated Distributed Database Systems: An Integrated Methodology. SIGMETRICS 1988: 187-196 |