Role-based access controls DF Ferraiolo, R Kuhn Proc. of 15th NIST-NSA National Computer Security Conference, 1992 | 4923* | 1992 |
Proposed NIST standard for role-based access control RC DF Ferraiolo, R Sandhu, S Gavrila, DR Kuhn ACM Transactions on Information and System Security (TISSEC), 2001 | 4000 | 2001 |
The NIST model for role-based access control: towards a unified standard R Sandhu, D Ferraiolo, R Kuhn ACM workshop on Role-based access control 10 (344287.344301), 2000 | 1531 | 2000 |
Role-based access control (RBAC): Features and motivations D Ferraiolo, Cugini, J., DR & Kuhn Proceedings of 11th annual computer security applications conference, 1995 | 1290 | 1995 |
Guide to attribute based access control (abac) definition and considerations (draft) VC Hu, D Ferraiolo, R Kuhn, AR Friedman, AJ Lang, MM Cogdell, ... NIST special publication 800 (162), 1-54, 2013 | 1283 | 2013 |
Software fault interactions and implications for software testing DR Kuhn, DR Wallace, AM Gallo IEEE transactions on software engineering 30 (6), 418-421, 2004 | 1023 | 2004 |
Adding attributes to role-based access control R Kuhn, E Coyne, T Weil | 637 | 2010 |
Attribute-based access control VC Hu, DR Kuhn, DF Ferraiolo, J Voas Computer 48 (2), 85-88, 2015 | 617 | 2015 |
IPOG: A general strategy for t-way software testing Y Lei, R Kacker, DR Kuhn, V Okun, J Lawrence 14th Annual IEEE International Conference and Workshops on the Engineering …, 2007 | 471 | 2007 |
An investigation of the applicability of design of experiments to software testing DR Kuhn, MJ Reilly 27th Annual NASA Goddard/IEEE Software Engineering Workshop, 2002 …, 2002 | 459 | 2002 |
IPOG/IPOG‐D: efficient test generation for multi‐way combinatorial testing Y Lei, R Kacker, DR Kuhn, V Okun, J Lawrence Software Testing, Verification and Reliability 18 (3), 125-148, 2008 | 394 | 2008 |
Introduction to combinatorial testing DR Kuhn, RN Kacker, Y Lei CRC press, 2013 | 359 | 2013 |
Implementation of role-based access control in multi-level secure systems DR Kuhn US Patent 6,023,765, 2000 | 358 | 2000 |
Security considerations for voice over IP systems DR Kuhn, TJ Walsh, S Fries NIST special publication 800, 2005 | 352 | 2005 |
Assessment of access control systems VC Hu, D Ferraiolo, DR Kuhn US Department of Commerce, National Institute of Standards and Technology, 2006 | 319 | 2006 |
Sources of failure in the public switched telephone network DR Kuhn Computer 30 (4), 31-36, 1997 | 285 | 1997 |
Failure modes in medical device software: an analysis of 15 years of recall data DR Wallace, DR Kuhn International Journal of Reliability, Quality and Safety Engineering 8 (04 …, 2001 | 267 | 2001 |
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems DR Kuhn Proceedings of the second ACM workshop on Role-based access control, 23-30, 1997 | 254 | 1997 |
Practical combinatorial testing: Beyond pairwise R Kuhn, Y Lei, R Kacker It Professional 10 (3), 19-23, 2008 | 244 | 2008 |
Practical combinatorial testing DR Kuhn, RN Kacker, Y Lei NIST special Publication 800 (142), 142, 2010 | 243 | 2010 |