R OWL BAC: representing role based access control in OWL T Finin, A Joshi, L Kagal, J Niu, R Sandhu, W Winsborough, ... Proceedings of the 13th ACM symposium on Access control models and …, 2008 | 275 | 2008 |
Toward a framework for detecting privacy policy violations in android application code R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016 | 67 | 2016 |
Template semantics for model-based notations J Niu, JM Atlee, NA Day IEEE Transactions on Software Engineering 29 (10), 866-882, 2003 | 58 | 2003 |
Foundations for group-centric secure information sharing models R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 49 | 2009 |
A conceptual framework for group-centric secure information sharing R Krishnan, R Sandhu, J Niu, WH Winsborough Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 44 | 2009 |
Group-centric secure information-sharing models for isolated groups R Krishnan, J Niu, R Sandhu, WH Winsborough ACM Transactions on Information and System Security (TISSEC) 14 (3), 23, 2011 | 37 | 2011 |
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule O Chowdhury, A Gampe, J Niu, J von Ronne, J Bennatt, A Datta, L Jia, ... Proceedings of the 18th ACM symposium on Access control models and …, 2013 | 32 | 2013 |
Deconstructing the semantics of big-step modelling languages S Esmaeilsabzali, NA Day, JM Atlee, J Niu Requirements Engineering 15 (2), 235-265, 2010 | 29 | 2010 |
Towards a framework for group-centric secure collaboration R Krishnan, R Sandhu, J Niu, W Winsborough 2009 5th International Conference on Collaborative Computing: Networking …, 2009 | 27 | 2009 |
Formalize UML 2 sequence diagrams H Shen, A Virani, J Niu 2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008 | 25 | 2008 |
Formalize UML 2 sequence diagrams H Shen, A Virani, J Niu 2008 11th IEEE High Assurance Systems Engineering Symposium, 437-440, 2008 | 25 | 2008 |
Stale-safe security properties for group-based secure information sharing R Krishnan, J Niu, R Sandhu, WH Winsborough Proceedings of the 6th ACM workshop on Formal methods in security …, 2008 | 25 | 2008 |
Mapping template semantics to SMV Y Lu, JM Atlee, NA Day, J Niu Proceedings of the 19th IEEE international conference on Automated software …, 2004 | 22 | 2004 |
Role based access control and OWL T Finin, A Joshi, L Kagal, J Niu, R Sandhu, WH Winsborough, ... Proceedings of the fourth OWL: Experiences and Directions Workshop, 2008 | 21 | 2008 |
Group-centric models for secure and agile information sharing R Sandhu, R Krishnan, J Niu, WH Winsborough International Conference on Mathematical Methods, Models, and Architectures …, 2010 | 17 | 2010 |
Managing security requirements patterns using feature diagram hierarchies R Slavin, JM Lehker, J Niu, TD Breaux 2014 IEEE 22nd International Requirements Engineering Conference (RE), 193-202, 2014 | 16 | 2014 |
Apply model checking to security analysis in trust management M Reith, J Niu, WH Winsborough 2007 IEEE 23rd International Conference on Data Engineering Workshop, 734-743, 2007 | 15 | 2007 |
Understanding and comparing model-based specification notations J Niu, JM Atlee, NA Day Proceedings. 11th IEEE International Requirements Engineering Conference …, 2003 | 15 | 2003 |
Engineering trust management into software models M Reith, J Niu, WH Winsborough Proceedings of the International Workshop on Modeling in Software Engineering, 9, 2007 | 12 | 2007 |
Toward practical analysis for trust management policy M Reith, J Niu, WH Winsborough Proceedings of the 4th International Symposium on Information, Computer, and …, 2009 | 11 | 2009 |