Name
Affiliation
Papers
MAHESH V. TRIPUNITARA
University of Waterloo, Waterloo, ON, Canada
48
Collaborators
Citations 
PageRank 
63
558
33.06
Referers 
Referees 
References 
839
738
623
Search Limit
100839
Title
Citations
PageRank
Year
Locked Circuit Indistinguishability: A Notion of Security for Logic Locking00.342022
Cree: A Performant Tool for Safety Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies00.342021
Forensic Analysis in Access Control: Foundations and a Case-Study from Practice00.342020
A computational complexity analysis of tunable type inference for Generic Universe Types00.342020
The Overhead from Combating Side-Channels in Cloud Systems using VM-Scheduling10.352020
The SAT Attack on IC Camouflaging: Impact and Potential Countermeasures10.362020
Strengthening PUFs using Composition00.342019
Constructing cascade bloom filters for efficient access enforcement.00.342019
Logic Locking for Secure Outsourced Chip Fabrication: A New Attack and Provably Secure Defense Mechanism.30.462017
Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF).00.342017
Reverse engineering camouflaged sequential circuits without scan access.40.392017
Reverse Engineering Camouflaged Sequential Integrated Circuits Without Scan Access.10.362017
The Need for Declarative Properties in Digital IC Security.00.342017
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).00.342016
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).00.342016
Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.351.212015
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid30.412014
Mohawk: Abstraction-Refinement and Bound-Estimation for Verifying Access Control Policies100.522013
Securing computer hardware using 3D integrated circuit (IC) technology and split manufacturing for obfuscation481.952013
The Foundational Work of Harrison-Ruzzo-Ullman Revisited60.492013
Property-testing real-world authorization systems00.342013
Least-restrictive enforcement of the Chinese wall security policy20.392013
Panel on granularity in access control10.372013
Relating declarative semantics and usability in access control00.342012
Payments for Outsourced Computations20.392012
Mitigating the intractability of the user authorization query problem in role-based access control (RBAC)50.442012
Automatic error finding in access-control policies340.982011
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)50.552011
ARBAC Policy for a Large Multi-National Bank20.392011
An authorization scheme for version control systems00.342011
Access control in practice: pain points00.342010
Role-based access control (RBAC) in Java via proxy objects using annotations60.492010
Method-Specific Java Access Control via RMI Proxy Objects Using Annotations10.382009
Social Learning Applications in Resource Constrained Networks00.342009
Efficient access enforcement in distributed role-based access control (RBAC) deployments50.462009
Resiliency Policies in Access Control50.652009
A Correctness Proof of a Mesh Security Architecture70.822008
Towards Formal Verification of Role-Based Access Control Policies641.882008
A Proof of Security of a Mesh Security Architecture.40.482007
On mutually exclusive roles and separation-of-duty612.032007
A theory for comparing the expressive power of access control models200.892007
Resolving the Micropayment Problem10.372007
Resiliency policies in access control100.722006
Security analysis in role-based access control862.882006
On Safety in Discretionary Access Control160.802005
On mutually-exclusive roles and separation of duty883.752004
Comparing the expressive power of access control models211.042004
Connectivity provisioning with security attributes00.342001