PhD's Awarded


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

At University of Texas at San Antonio

  1. Xin Jin, Attribute-Based Access Control Models and Implementation in Cloud Infrastructure as a Service, Spring 2014. Defense presentation (pptx) pdf
  2. Yuan Cheng, Access Control for Online Social Networks Using Relationship Type Patterns, Spring 2014. Defense presentation (pptx) pdf

At George Mason University

  1. Ram Krishnan, Group-Centric Secure Information Sharing Models, Fall 2009. Supporting Materials. Defense presentation (pptx animated) pdf
  2. David A. Wheeler, Fully Countering Trusting Trust through Diverse Double-Compiling, Fall 2009 Defense presentation (pdf) Supplementary material
  3. Venkata Bhamidipati, Architectures and Models for Administration of User-Role Assignment in Role Based Access Control, Fall 2008 Defense presentation
  4. Zhixiong Zhang, Scalable Role and Organization Based Access Control and its Administration, Spring 2008 Defense presentation
  5. Xinwen Zhang, Formal Model and Analysis of Usage Control, Summer 2006 Defense presentation
  6. Mohammad Abdullah Al-Kahtani, A Family of Models for Rule-Based User-Role Assignment, Spring 2004
  7. Jaehong Park, Usage Control: A Unified Framework for Next Generation Access Control, Summer 2003
  8. Ezedin S. Barka, Framework for Role-Based Delegation Models, Summer 2002
  9. Pete A. Epstein, Engineering of Role/Permission Assignments, Spring 2002
  10. Qamar Munawer, Administrative Models for Role-Based Access Control, Spring 2000.
  11. Gail-Joon Ahn, The RCL 2000 Language for Specifying Role-Based Authorization Constraints, Fall 1999.
  12. Joon S. Park, Secure Attribute Services on the Web, Summer 1999.
  13. Philip C. Hyland, Concentric Supervision of Security Applications: An Assurance Methodology, Spring 1999.
  14. Tarik Himdi, A Scaleable Extended DGSA Scheme for Confidentiality of Shared Data in Multidomain Organizations, Spring 1998.
  15. Srinivas Ganta, Expressive Power of Access Control Models Based on Propagation of Rights, Spring 1996.
  16. Roshan Thomas, Supporting Secure and Efficient Write-up in High Assurance Multilevel Object-based Computing, Summer 1994.

My Own Dissertation

bulletRavi Sandhu, Design and Analysis of Protection Schemes Based on the Send-Receive Transport Mechanism, Spring 1983.