Name
Papers
Collaborators
VIJAYALAKSHMI ATLURI
234
201
Citations 
PageRank 
Referers 
3256
424.98
4169
Referees 
References 
2591
2678
Search Limit
1001000
Title
Citations
PageRank
Year
Computer Security - ESORICS 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part I00.342022
Towards Supporting Attribute-Based Access Control in Hyperledger Fabric Blockchain00.342022
Analyzing social media messages of public sector organizations utilizing sentiment analysis and topic modeling00.342021
Algorithms and Applications to Weighted Rank-one Binary Matrix Factorization10.352020
Security, Privacy and Trust for Responsible Innovations and Governance.00.342020
Policy Adaptation in Hierarchical Attribute-based Access Control Systems10.372019
Deploying ABAC policies using RBAC systems.10.432019
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC00.342019
ABACaaS - Attribute-Based Access Control as a Service.00.342019
Towards designing robust CAPTCHAs.00.342018
Policy Engineering in RBAC and ABAC.10.372018
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.00.342018
Efficient Bottom-Up Mining of Attribute Based Access Control Policies20.402017
Policy Adaptation in Attribute-Based Access Control for Inter-Organizational Collaboration00.342017
Migrating from RBAC to temporal RBAC.20.382017
Efficient Evaluation of Authorizations for Video Data.00.342016
Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing.10.362015
Security analysis for temporal role based access control00.342014
An optimization framework for role mining50.402014
Data and Applications Security and Privacy XXVIII - 28th Annual IFIP WG 11.3 Working Conference, DBSec 2014, Vienna, Austria, July 14-16, 2014. Proceedings00.342014
Utilizing social media to improve local government responsiveness40.402014
Policy Mining: A Bottom-Up Approach toward a Model Based Firewall Management.20.372013
An Administrative Model for Spatio-Temporal Role Based Access Control.40.412013
AMTRAC: An administrative model for temporal role-based access control70.512013
Constraint-Aware Role Mining via Extended Boolean Matrix Decomposition290.882012
Using QR codes for enhancing the scope of digital government services30.432012
Attacking Image Based CAPTCHAs Using Image Recognition Techniques.30.422012
Role Mining Under Role-Usage Cardinality Constraint120.532012
Privacy-preserving subgraph discovery20.372012
UICDS-based information sharing among emergency response application systems50.462011
Security analysis of GTRBAC and its variants using model checking40.412011
Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings371.852011
Role mining in the presence of noise70.462010
Semantics-aware security policy specification for the semantic web data.30.482010
Privacy-preserving trust verification00.342010
The role mining problem: A formal perspective311.132010
Anonymization models for directional location based service environments50.442010
Evaluating the validity of data instances against ontology evolution over the Semantic Web180.892009
Edge-RMP: Minimizing administrative assignments for role-based access control140.712009
An efficient online auditing approach to limit private data disclosure10.352009
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates70.512009
Secure information sharing and analysis for effective emergency management100.522008
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings222.162008
Optimal Boolean Matrix Decomposition: Application to Role Engineering913.242008
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007141.482007
Efficient security policy enforcement in a location based service environment130.702007
Semantic feature selection for object discovery in high-resolution remote sensing imagery10.372007
Proceedings of the 2nd ACM Workshop on Scalable Trusted Computing, STC 2007, Alexandria, VA, USA, November 2, 2007113.422007
The role mining problem: finding a minimal descriptive set of roles1606.032007
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007101.532007
  • 1
  • 2