At George Mason University
Group-Centric Secure Information Sharing Models, Fall 2009.
Defense presentation (pptx animated)
David A. Wheeler,
Fully Countering Trusting Trust through Diverse Double-Compiling, Fall 2009
Defense presentation (pdf)
Architectures and Models for Administration of User-Role Assignment in Role Based Access Control, Fall 2008
Scalable Role and Organization Based Access Control and its Administration, Spring 2008
Xinwen Zhang, Formal Model and Analysis of Usage Control, Summer 2006
Mohammad Abdullah Al-Kahtani, A Family
of Models for Rule-Based User-Role Assignment, Spring 2004
Jaehong Park, Usage
Control: A Unified Framework for Next Generation Access Control, Summer 2003
Ezedin S. Barka, Framework
for Role-Based Delegation Models, Summer 2002
- Pete A. Epstein, Engineering
of Role/Permission Assignments, Spring 2002
- Qamar Munawer, Administrative
Models for Role-Based Access Control, Spring 2000.
- Gail-Joon Ahn, The
RCL 2000 Language for Specifying Role-Based Authorization Constraints,
- Joon S. Park, Secure
Attribute Services on the Web, Summer 1999.
- Philip C. Hyland, Concentric
Supervision of Security Applications: An Assurance Methodology, Spring 1999.
- Tarik Himdi, A
Scaleable Extended DGSA Scheme for Confidentiality of Shared Data in
Multidomain Organizations, Spring 1998.
- Srinivas Ganta, Expressive
Power of Access Control Models Based on Propagation of Rights, Spring 1996.
- Roshan Thomas, Supporting Secure and
Efficient Write-up in High Assurance Multilevel Object-based Computing, Summer 1994.
My Own Dissertation