Khalid Bijon
Khalid Bijon
Snowflake Computing
Dirección de correo verificada de snowflake.net
TítuloCitado porAño
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
432013
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
312012
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131, 2013
302013
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
252013
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
212014
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
192015
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
132011
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
112015
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
International Conference on Network and System Security, 41-53, 2015
102015
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
92016
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
82012
A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders
KZ Bijon, T Ahmed, R Sandhu, R Krishnan
32012
The Overhead from Combating Side-Channels in Cloud Systems using VM-Scheduling
N Juma, J Shahen, K Bijon, MV Tripunitara
IEEE Transactions on Dependable and Secure Computing, 2018
22018
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the First International Workshop on Secure and Resilient …, 2012
22012
Equivalence of Group-Centric Collaboration with Expedient Insiders (GEI) and LBAC with Collaborative Compartments (LCC)
T Ahmed, R Sandhu, K Bijon, R Krishnan
12012
Periodicity Estimation of Dynamic Textures
KZ Bijon, A Hasan, A Rahman, M Murshed
International Journal of Information and Communication Technology 1 (3), 414-423, 2008
2008
Institute for Cyber Security
KZ Bijon, T Ahmed, R Sandhu, R Krishnan
University of Texas at San Antonio, 0
CIC 2017 Technical Program Committee
J Bae, N Baracaldo, K Bijon, S Bista, AB Cao, B Carminati, J Caverlee, ...
IEEE CIC 2016 Technical Program Committee
C Pu, D Georgakopoulos, B Carminati, ML Damiani, B Cao, ...
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–19