James Joshi
James Joshi
Professor, School of Computing and Information, University of Pittsburgh
Dirección de correo verificada de pitt.edu - Página principal
TítuloCitado porAño
Security and privacy challenges in cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
IEEE Security & Privacy 8 (6), 24-31, 2010
13462010
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks
ST Zargar, J Joshi, D Tipper
IEEE communications surveys & tutorials 15 (4), 2046-2069, 2013
8062013
A generalized temporal role-based access control model
JBD Joshi, E Bertino, U Latif, A Ghafoor
IEEE Transactions on Knowledge and Data Engineering 17 (1), 4-23, 2005
7162005
Web-based applications
JBD Joshi, WG Aref, A Ghafoor, H Eugene
Communications of the ACM 44 (2), 39, 2001
3982001
Secure interoperation in a multidomain environment employing RBAC policies
B Shafiq, JBD Joshi, E Bertino, A Ghafoor
IEEE transactions on knowledge and data engineering 17 (11), 1557-1577, 2005
2502005
Access-control language for multidomain environments
JBD Joshi
IEEE Internet Computing 8 (6), 40-50, 2004
1962004
Digital government security infrastructure design challenges
J Joshi, A Ghafoor, WG Aref, EH Spafford
Computer 34 (2), 66-72, 2001
1932001
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control
R Bhatti, A Ghafoor, E Bertino, JBD Joshi
ACM Transactions on Information and System Security (TISSEC) 8 (2), 187-227, 2005
1882005
LoT-RBAC: A Location and Time-Based RBAC Model
SM Chandran, JBD Joshi
International Conference on Web Information Systems Engineering, 361-375, 2005
1732005
Securecloud: Towards a comprehensive security framework for cloud computing environments
H Takabi, JBD Joshi, GJ Ahn
2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010
1542010
Temporal hierarchies and inheritance semantics for GTRBAC
JBD Joshi, E Bertino, A Ghafoor
Proceedings of the seventh ACM symposium on Access control models and …, 2002
1392002
IPv6 security challenges
CE Caicedo, JBD Joshi, SR Tuladhar
Computer 42 (2), 36-42, 2009
1292009
XML-based specification for Web services document security
R Bhatti, E Bertino, A Ghafoor, JBD Joshi
Computer 37 (4), 41-49, 2004
1212004
Access Control in Dynamic XML-Based Web-Services with X-RBAC.
R Bhatti, J Joshi, E Bertino, A Ghafoor
ICWS 3, 243-249, 2003
1102003
Towards active detection of identity clone attacks on online social networks
L Jin, H Takabi, JBD Joshi
Proceedings of the first ACM conference on Data and application security and …, 2011
1062011
Dependencies and separation of duty constraints in GTRBAC
JBD Joshi, B Shafiq, A Ghafoor, E Bertino
Proceedings of the eighth ACM symposium on Access control models and …, 2003
1022003
Exploring trajectory-driven local geographic topics in foursquare
X Long, L Jin, J Joshi
Proceedings of the 2012 ACM conference on ubiquitous computing, 927-934, 2012
792012
Osnac: An ontology-based access control model for social networking systems
A Masoumzadeh, J Joshi
2010 IEEE Second International Conference on Social Computing, 751-759, 2010
732010
X-gtrbac admin: A decentralized administration model for enterprise-wide access control
R Bhatti, B Shafiq, E Bertino, A Ghafoor, JBD Joshi
ACM Transactions on Information and System Security (TISSEC) 8 (4), 388-423, 2005
712005
A role-based access control policy verification framework for real-time systems
B Shafiq, A Masood, J Joshi, A Ghafoor
10th IEEE International Workshop on Object-Oriented Real-Time Dependable …, 2005
652005
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20