Security and privacy challenges in cloud computing environments H Takabi, JBD Joshi, GJ Ahn IEEE Security & Privacy 8 (6), 24-31, 2010 | 1964 | 2010 |
A survey of defense mechanisms against distributed denial of service (DDoS) flooding attacks ST Zargar, J Joshi, D Tipper IEEE communications surveys & tutorials 15 (4), 2046-2069, 2013 | 1726 | 2013 |
A generalized temporal role-based access control model JBD Joshi, E Bertino, U Latif, A Ghafoor IEEE transactions on knowledge and data engineering 17 (1), 4-23, 2005 | 836 | 2005 |
Security models for web-based applications JBD Joshi, WG Aref, A Ghafoor, EH Spafford Communications of the ACM 44 (2), 38-44, 2001 | 458 | 2001 |
Secure interoperation in a multidomain environment employing RBAC policies B Shafiq, JBD Joshi, E Bertino, A Ghafoor IEEE transactions on knowledge and data engineering 17 (11), 1557-1577, 2005 | 307 | 2005 |
Access-control language for multidomain environments JBD Joshi IEEE Internet Computing 8 (6), 40-50, 2004 | 226 | 2004 |
Digital government security infrastructure design challenges J Joshi, A Ghafoor, WG Aref, EH Spafford Computer 34 (2), 66-72, 2001 | 220 | 2001 |
Securecloud: Towards a comprehensive security framework for cloud computing environments H Takabi, JBD Joshi, GJ Ahn 2010 IEEE 34th Annual Computer Software and Applications Conference …, 2010 | 215 | 2010 |
X-GTRBAC: an XML-based policy specification framework and architecture for enterprise-wide access control R Bhatti, A Ghafoor, E Bertino, JBD Joshi ACM Transactions on Information and System Security (TISSEC) 8 (2), 187-227, 2005 | 205 | 2005 |
LoT-RBAC: A Location and Time-Based RBAC Model SM Chandran, JBD Joshi Web Information Systems Engineering–WISE 2005: 6th International Conference …, 2005 | 202 | 2005 |
IPv6 security challenges CE Caicedo, JBD Joshi, SR Tuladhar Computer 42 (2), 36-42, 2009 | 162 | 2009 |
Towards active detection of identity clone attacks on online social networks L Jin, H Takabi, JBD Joshi Proceedings of the first ACM conference on Data and application security and …, 2011 | 161 | 2011 |
Temporal hierarchies and inheritance semantics for GTRBAC JBD Joshi, E Bertino, A Ghafoor Proceedings of the seventh ACM symposium on Access control models and …, 2002 | 156 | 2002 |
XML-based specification for Web services document security R Bhatti, E Bertino, A Ghafoor, JBD Joshi Computer 37 (4), 41-49, 2004 | 136 | 2004 |
Exploring trajectory-driven local geographic topics in foursquare X Long, L Jin, J Joshi Proceedings of the 2012 ACM conference on ubiquitous computing, 927-934, 2012 | 121 | 2012 |
Access Control in Dynamic XML-Based Web-Services with X-RBAC. R Bhatti, J Joshi, E Bertino, A Ghafoor ICWS 3, 243-249, 2003 | 119 | 2003 |
An adaptive risk management and access control framework to mitigate insider threats N Baracaldo, J Joshi Computers & Security 39, 237-254, 2013 | 101 | 2013 |
Dependencies and separation of duty constraints in GTRBAC JBD Joshi, B Shafiq, A Ghafoor, E Bertino Proceedings of the eighth ACM symposium on Access control models and …, 2003 | 99 | 2003 |
Osnac: An ontology-based access control model for social networking systems A Masoumzadeh, J Joshi 2010 IEEE Second International Conference on Social Computing, 751-759, 2010 | 91 | 2010 |
Privacy-preserving machine learning: Methods, challenges and directions R Xu, N Baracaldo, J Joshi arXiv preprint arXiv:2108.04417, 2021 | 88 | 2021 |