publications: - title: "On mutually-exclusive roles and separation of duty" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Ziad Bizri" link: "https://researchr.org/alias/ziad-bizri" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2004" doi: "http://doi.acm.org/10.1145/1030083.1030091" links: doi: "http://doi.acm.org/10.1145/1030083.1030091" researchr: "https://researchr.org/publication/LiBT04" cites: 0 citedby: 0 pages: "42-51" booktitle: "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004" editor: - name: "Vijayalakshmi Atluri" link: "https://researchr.org/alias/vijayalakshmi-atluri" - name: "Birgit Pfitzmann" link: "https://researchr.org/alias/birgit-pfitzmann" - name: "Patrick Drew McDaniel" link: "https://researchr.org/alias/patrick-drew-mcdaniel" publisher: "ACM" isbn: "1-58113-961-6" kind: "inproceedings" key: "LiBT04" - title: "Conditional Payments for Computing Markets" author: - name: "Bogdan Carbunar" link: "https://researchr.org/alias/bogdan-carbunar" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2008" doi: "http://dx.doi.org/10.1007/978-3-540-89641-8_23" links: doi: "http://dx.doi.org/10.1007/978-3-540-89641-8_23" researchr: "https://researchr.org/publication/CarbunarT08" cites: 0 citedby: 0 pages: "317-331" booktitle: "Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings" editor: - name: "Matthew K. Franklin" link: "https://researchr.org/alias/matthew-k.-franklin" - name: "Lucas Chi Kwong Hui" link: "https://researchr.org/alias/lucas-chi-kwong-hui" - name: "Duncan S. Wong" link: "https://researchr.org/alias/duncan-s.-wong" volume: "5339" series: "Lecture Notes in Computer Science" publisher: "Springer" isbn: "978-3-540-89640-1" kind: "inproceedings" key: "CarbunarT08" - title: "A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Partha Dutta" link: "https://researchr.org/alias/partha-dutta" year: "1999" doi: "http://csdl.computer.org/comp/proceedings/acsac/1999/0346/00/03460303abs.htm" links: doi: "http://csdl.computer.org/comp/proceedings/acsac/1999/0346/00/03460303abs.htm" tags: - "caching" - "systematic-approach" researchr: "https://researchr.org/publication/TripunitaraD99" cites: 0 citedby: 0 pages: "303-309" booktitle: "15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA" publisher: "IEEE Computer Society" isbn: "0-7695-0346-2" kind: "inproceedings" key: "TripunitaraD99" - title: "Security analysis in role-based access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2004" doi: "http://doi.acm.org/10.1145/990036.990058" links: doi: "http://doi.acm.org/10.1145/990036.990058" tags: - "rule-based" - "analysis" - "security" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/LiT04%3A7" cites: 0 citedby: 0 pages: "126-135" booktitle: "SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings" editor: - name: "Trent Jaeger" link: "https://researchr.org/alias/trent-jaeger" - name: "Elena Ferrari" link: "https://researchr.org/alias/elena-ferrari" publisher: "ACM" isbn: "1-58113-872-5" kind: "inproceedings" key: "LiT04:7" - title: "Social Learning Applications in Resource Constrained Networks" author: - name: "Ali Saidi" link: "https://researchr.org/alias/ali-saidi" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Mojdeh Mohtashemi" link: "https://researchr.org/alias/mojdeh-mohtashemi" year: "2009" doi: "http://dx.doi.org/10.1109/CSE.2009.303" links: doi: "http://dx.doi.org/10.1109/CSE.2009.303" tags: - "social" researchr: "https://researchr.org/publication/SaidiTM09" cites: 0 citedby: 0 pages: "256-262" booktitle: "Proceedings IEEE CSE 09, 12th IEEE International Conference on Computational Science and Engineering, August 29-31, 2009, Vancouver, BC, Canada" publisher: "IEEE Computer Society" kind: "inproceedings" key: "SaidiTM09" - title: "Security analysis in role-based access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2006" doi: "http://doi.acm.org/10.1145/1187441.1187442" links: doi: "http://doi.acm.org/10.1145/1187441.1187442" tags: - "rule-based" - "analysis" - "security" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/LiT06%3A7" cites: 0 citedby: 0 journal: "ACM Trans. Inf. Syst. Secur." volume: "9" number: "4" pages: "391-420" kind: "article" key: "LiT06:7" - title: "A theory for comparing the expressive power of access control models" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" year: "2007" doi: "http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=15&issue=2&spage=231" links: doi: "http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=15&issue=2&spage=231" tags: - "access control" researchr: "https://researchr.org/publication/TripunitaraL07" cites: 0 citedby: 0 journal: "Journal of Computer Security" volume: "15" number: "2" pages: "231-272" kind: "article" key: "TripunitaraL07" - title: "Efficient access enforcement in distributed role-based access control (RBAC) deployments" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Bogdan Carbunar" link: "https://researchr.org/alias/bogdan-carbunar" year: "2009" doi: "http://doi.acm.org/10.1145/1542207.1542232" links: doi: "http://doi.acm.org/10.1145/1542207.1542232" tags: - "rule-based" - "deployment" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/TripunitaraC09" cites: 0 citedby: 0 pages: "155-164" booktitle: "SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings" editor: - name: "Barbara Carminati" link: "https://researchr.org/alias/barbara-carminati" - name: "James Joshi" link: "https://researchr.org/alias/james-joshi" publisher: "ACM" isbn: "978-1-60558-537-6" kind: "inproceedings" key: "TripunitaraC09" - title: "Comparing the expressive power of access control models" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" year: "2004" doi: "http://doi.acm.org/10.1145/1030083.1030093" links: doi: "http://doi.acm.org/10.1145/1030083.1030093" tags: - "access control" researchr: "https://researchr.org/publication/TripunitaraL04" cites: 0 citedby: 0 pages: "62-71" booktitle: "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004" editor: - name: "Vijayalakshmi Atluri" link: "https://researchr.org/alias/vijayalakshmi-atluri" - name: "Birgit Pfitzmann" link: "https://researchr.org/alias/birgit-pfitzmann" - name: "Patrick Drew McDaniel" link: "https://researchr.org/alias/patrick-drew-mcdaniel" publisher: "ACM" isbn: "1-58113-961-6" kind: "inproceedings" key: "TripunitaraL04" - title: "On Safety in Discretionary Access Control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2005" doi: "http://doi.ieeecomputersociety.org/10.1109/SP.2005.14" links: doi: "http://doi.ieeecomputersociety.org/10.1109/SP.2005.14" tags: - "access control" researchr: "https://researchr.org/publication/LiT05%3A0" cites: 0 citedby: 0 pages: "96-109" booktitle: "2005 IEEE Symposium on Security and Privacy (S&P 2005), 8-11 May 2005, Oakland, CA, USA" publisher: "IEEE Computer Society" isbn: "0-7695-2339-0" kind: "inproceedings" key: "LiT05:0" - title: "Resiliency policies in access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" year: "2006" doi: "http://doi.acm.org/10.1145/1180405.1180421" links: doi: "http://doi.acm.org/10.1145/1180405.1180421" tags: - "access control policies" - "access control" researchr: "https://researchr.org/publication/LiTW06%3A0" cites: 0 citedby: 0 pages: "113-123" booktitle: "Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30 - November 3, 2006" editor: - name: "Ari Juels" link: "https://researchr.org/alias/ari-juels" - name: "Rebecca N. Wright" link: "https://researchr.org/alias/rebecca-n.-wright" - name: "Sabrina De Capitani di Vimercati" link: "https://researchr.org/alias/sabrina-de-capitani-di-vimercati" publisher: "ACM" kind: "inproceedings" key: "LiTW06:0" - title: "Resiliency Policies in Access Control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2009" doi: "http://doi.acm.org/10.1145/1513601.1513602" links: doi: "http://doi.acm.org/10.1145/1513601.1513602" tags: - "access control policies" - "access control" researchr: "https://researchr.org/publication/LiWT09" cites: 0 citedby: 0 journal: "ACM Trans. Inf. Syst. Secur." volume: "12" number: "4" kind: "article" key: "LiWT09" - title: "Connectivity provisioning with security attributes" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Eugene H. Spafford" link: "https://researchr.org/alias/eugene-h.-spafford" year: "2001" tags: - "security" researchr: "https://researchr.org/publication/TripunitaraS01" cites: 0 citedby: 0 journal: "Software Focus" volume: "2" number: "3" pages: "112-116" kind: "article" key: "TripunitaraS01" - title: "Towards Formal Verification of Role-Based Access Control Policies" author: - name: "S. Jha" link: "https://researchr.org/alias/s.-jha" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" - name: "William H. Winsborough" link: "https://researchr.org/alias/william-h.-winsborough" year: "2008" doi: "http://dx.doi.org/10.1109/TDSC.2007.70225" links: doi: "http://dx.doi.org/10.1109/TDSC.2007.70225" tags: - "rule-based" - "access control policies" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/JhaLTWW08" cites: 0 citedby: 0 journal: "IEEE Trans. Dependable Sec. Comput." volume: "5" number: "4" pages: "242-255" kind: "article" key: "JhaLTWW08" - title: "On mutually exclusive roles and separation-of-duty" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ziad Bizri" link: "https://researchr.org/alias/ziad-bizri" year: "2007" doi: "http://doi.acm.org/10.1145/1237500.1237501" links: doi: "http://doi.acm.org/10.1145/1237500.1237501" researchr: "https://researchr.org/publication/LiTB07" cites: 0 citedby: 0 journal: "ACM Trans. Inf. Syst. Secur." volume: "10" number: "2" pages: "5" kind: "article" key: "LiTB07" - title: "A Correctness Proof of a Mesh Security Architecture" author: - name: "Doug Kuhlman" link: "https://researchr.org/alias/doug-kuhlman" - name: "Ryan Moriarty" link: "https://researchr.org/alias/ryan-moriarty" - name: "Tony Braskich" link: "https://researchr.org/alias/tony-braskich" - name: "Steve Emeott" link: "https://researchr.org/alias/steve-emeott" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2008" doi: "http://doi.ieeecomputersociety.org/10.1109/CSF.2008.23" links: doi: "http://doi.ieeecomputersociety.org/10.1109/CSF.2008.23" tags: - "architecture" - "security" researchr: "https://researchr.org/publication/KuhlmanMBET08" cites: 0 citedby: 0 pages: "315-330" booktitle: "Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, 23-25 June 2008" publisher: "IEEE Computer Society" isbn: "978-0-7695-3182-3" kind: "inproceedings" key: "KuhlmanMBET08" - title: "Resolving the Micropayment Problem" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Thomas S. Messerges" link: "https://researchr.org/alias/thomas-s.-messerges" year: "2007" doi: "http://doi.ieeecomputersociety.org/10.1109/MC.2007.72" links: doi: "http://doi.ieeecomputersociety.org/10.1109/MC.2007.72" researchr: "https://researchr.org/publication/TripunitaraM07" cites: 0 citedby: 0 journal: "IEEE Computer" volume: "40" number: "2" pages: "104-106" kind: "article" key: "TripunitaraM07"