publications: - title: "On mutually-exclusive roles and separation of duty" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Ziad Bizri" link: "https://researchr.org/alias/ziad-bizri" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2004" doi: "http://doi.acm.org/10.1145/1030083.1030091" links: doi: "http://doi.acm.org/10.1145/1030083.1030091" researchr: "https://researchr.org/publication/LiBT04" cites: 0 citedby: 0 pages: "42-51" booktitle: "ccs" kind: "inproceedings" key: "LiBT04" - title: "Conditional Payments for Computing Markets" author: - name: "Bogdan Carbunar" link: "https://researchr.org/alias/bogdan-carbunar" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2008" doi: "http://dx.doi.org/10.1007/978-3-540-89641-8_23" links: doi: "http://dx.doi.org/10.1007/978-3-540-89641-8_23" researchr: "https://researchr.org/publication/CarbunarT08" cites: 0 citedby: 0 pages: "317-331" booktitle: "cans" kind: "inproceedings" key: "CarbunarT08" - title: "A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Partha Dutta" link: "https://researchr.org/alias/partha-dutta" year: "1999" doi: "http://csdl.computer.org/comp/proceedings/acsac/1999/0346/00/03460303abs.htm" links: doi: "http://csdl.computer.org/comp/proceedings/acsac/1999/0346/00/03460303abs.htm" tags: - "caching" - "systematic-approach" researchr: "https://researchr.org/publication/TripunitaraD99" cites: 0 citedby: 0 pages: "303-309" booktitle: "acsac" kind: "inproceedings" key: "TripunitaraD99" - title: "Security analysis in role-based access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2004" doi: "http://doi.acm.org/10.1145/990036.990058" links: doi: "http://doi.acm.org/10.1145/990036.990058" tags: - "rule-based" - "analysis" - "security" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/LiT04%3A7" cites: 0 citedby: 0 pages: "126-135" booktitle: "SACMAT" kind: "inproceedings" key: "LiT04:7" - title: "Social Learning Applications in Resource Constrained Networks" author: - name: "Ali Saidi" link: "https://researchr.org/alias/ali-saidi" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Mojdeh Mohtashemi" link: "https://researchr.org/alias/mojdeh-mohtashemi" year: "2009" doi: "http://dx.doi.org/10.1109/CSE.2009.303" links: doi: "http://dx.doi.org/10.1109/CSE.2009.303" tags: - "social" researchr: "https://researchr.org/publication/SaidiTM09" cites: 0 citedby: 0 pages: "256-262" booktitle: "cse" kind: "inproceedings" key: "SaidiTM09" - title: "Security analysis in role-based access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2006" doi: "http://doi.acm.org/10.1145/1187441.1187442" links: doi: "http://doi.acm.org/10.1145/1187441.1187442" tags: - "rule-based" - "analysis" - "security" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/LiT06%3A7" cites: 0 citedby: 0 journal: "tissec" volume: "9" number: "4" pages: "391-420" kind: "article" key: "LiT06:7" - title: "A theory for comparing the expressive power of access control models" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" year: "2007" doi: "http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=15&issue=2&spage=231" links: doi: "http://iospress.metapress.com/openurl.asp?genre=article&issn=0926-227X&volume=15&issue=2&spage=231" tags: - "access control" researchr: "https://researchr.org/publication/TripunitaraL07" cites: 0 citedby: 0 journal: "jcs" volume: "15" number: "2" pages: "231-272" kind: "article" key: "TripunitaraL07" - title: "Efficient access enforcement in distributed role-based access control (RBAC) deployments" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Bogdan Carbunar" link: "https://researchr.org/alias/bogdan-carbunar" year: "2009" doi: "http://doi.acm.org/10.1145/1542207.1542232" links: doi: "http://doi.acm.org/10.1145/1542207.1542232" tags: - "rule-based" - "deployment" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/TripunitaraC09" cites: 0 citedby: 0 pages: "155-164" booktitle: "SACMAT" kind: "inproceedings" key: "TripunitaraC09" - title: "Comparing the expressive power of access control models" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" year: "2004" doi: "http://doi.acm.org/10.1145/1030083.1030093" links: doi: "http://doi.acm.org/10.1145/1030083.1030093" tags: - "access control" researchr: "https://researchr.org/publication/TripunitaraL04" cites: 0 citedby: 0 pages: "62-71" booktitle: "ccs" kind: "inproceedings" key: "TripunitaraL04" - title: "On Safety in Discretionary Access Control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2005" doi: "http://doi.ieeecomputersociety.org/10.1109/SP.2005.14" links: doi: "http://doi.ieeecomputersociety.org/10.1109/SP.2005.14" tags: - "access control" researchr: "https://researchr.org/publication/LiT05%3A0" cites: 0 citedby: 0 pages: "96-109" booktitle: "sp" kind: "inproceedings" key: "LiT05:0" - title: "Resiliency policies in access control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" year: "2006" doi: "http://doi.acm.org/10.1145/1180405.1180421" links: doi: "http://doi.acm.org/10.1145/1180405.1180421" tags: - "access control policies" - "access control" researchr: "https://researchr.org/publication/LiTW06%3A0" cites: 0 citedby: 0 pages: "113-123" booktitle: "ccs" kind: "inproceedings" key: "LiTW06:0" - title: "Resiliency Policies in Access Control" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2009" doi: "http://doi.acm.org/10.1145/1513601.1513602" links: doi: "http://doi.acm.org/10.1145/1513601.1513602" tags: - "access control policies" - "access control" researchr: "https://researchr.org/publication/LiWT09" cites: 0 citedby: 0 journal: "tissec" volume: "12" number: "4" kind: "article" key: "LiWT09" - title: "Connectivity provisioning with security attributes" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Eugene H. Spafford" link: "https://researchr.org/alias/eugene-h.-spafford" year: "2001" tags: - "security" researchr: "https://researchr.org/publication/TripunitaraS01" cites: 0 citedby: 0 journal: "sofo" volume: "2" number: "3" pages: "112-116" kind: "article" key: "TripunitaraS01" - title: "Towards Formal Verification of Role-Based Access Control Policies" author: - name: "S. Jha" link: "https://researchr.org/alias/s.-jha" - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Qihua Wang" link: "https://researchr.org/alias/qihua-wang" - name: "William H. Winsborough" link: "https://researchr.org/alias/william-h.-winsborough" year: "2008" doi: "http://dx.doi.org/10.1109/TDSC.2007.70225" links: doi: "http://dx.doi.org/10.1109/TDSC.2007.70225" tags: - "rule-based" - "access control policies" - "access control" - "role-based access control" researchr: "https://researchr.org/publication/JhaLTWW08" cites: 0 citedby: 0 journal: "tdsc" volume: "5" number: "4" pages: "242-255" kind: "article" key: "JhaLTWW08" - title: "On mutually exclusive roles and separation-of-duty" author: - name: "Ninghui Li" link: "https://researchr.org/alias/ninghui-li" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Ziad Bizri" link: "https://researchr.org/alias/ziad-bizri" year: "2007" doi: "http://doi.acm.org/10.1145/1237500.1237501" links: doi: "http://doi.acm.org/10.1145/1237500.1237501" researchr: "https://researchr.org/publication/LiTB07" cites: 0 citedby: 0 journal: "tissec" volume: "10" number: "2" pages: "5" kind: "article" key: "LiTB07" - title: "A Correctness Proof of a Mesh Security Architecture" author: - name: "Doug Kuhlman" link: "https://researchr.org/alias/doug-kuhlman" - name: "Ryan Moriarty" link: "https://researchr.org/alias/ryan-moriarty" - name: "Tony Braskich" link: "https://researchr.org/alias/tony-braskich" - name: "Steve Emeott" link: "https://researchr.org/alias/steve-emeott" - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" year: "2008" doi: "http://doi.ieeecomputersociety.org/10.1109/CSF.2008.23" links: doi: "http://doi.ieeecomputersociety.org/10.1109/CSF.2008.23" tags: - "architecture" - "security" researchr: "https://researchr.org/publication/KuhlmanMBET08" cites: 0 citedby: 0 pages: "315-330" booktitle: "csfw" kind: "inproceedings" key: "KuhlmanMBET08" - title: "Resolving the Micropayment Problem" author: - name: "Mahesh V. Tripunitara" link: "http://ece.uwaterloo.ca/~tripunit/" - name: "Thomas S. Messerges" link: "https://researchr.org/alias/thomas-s.-messerges" year: "2007" doi: "http://doi.ieeecomputersociety.org/10.1109/MC.2007.72" links: doi: "http://doi.ieeecomputersociety.org/10.1109/MC.2007.72" researchr: "https://researchr.org/publication/TripunitaraM07" cites: 0 citedby: 0 journal: "Computer" volume: "40" number: "2" pages: "104-106" kind: "article" key: "TripunitaraM07"