










| |
Total: 40
At University of Texas at San Antonio: 24
-
Mohammad Nobi,
Towards Machine Learning Based Access Control, Summer 2022.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
(pdf)
-
Mir M.A. Pritom,
Defending Against Malicious Websites: Themed Threats, Detection, and Law-Enforcement, Summer 2022.
Principal advisor: Shouhuai Xu.
Defense presentation (pptx)
(pdf).
-
Mehrnoosh Shakarami,
Operation and Administration of Access Control in IoT Environments, Spring 2022.
Defense presentation (pptx)
(pdf)
-
Eric Ficke,
Reconstructing Alert Trees for Cyber Triage, Spring 2022.
Principal advisor: Shouhuai Xu.
Defense presentation (pptx)
(pdf).
-
Shuvra Chakraborty,
Feasibility Analysis of Access Control Policy Mining, Fall 2021.
Defense presentation (pptx)
(pdf)
-
Huashan Chen,
A Framework for Quantifying Security Effectiveness of Cyber Defenses, Fall 2021.
Principal advisor: Shouhuai Xu.
Defense presentation (pptx)
(pdf)
-
Safwa Ameer,
User-To-Device Access Control Models for Cloud-Enabled IoT With Smart Home Case Study, Summer 2021.
Defense presentation (pptx)
(pdf)
-
John Charlton,
Inferring Malware Detector Metrics in the Absence of Ground-Truth, Summer 2021.
Principal advisor: Shouhuai Xu.
-
Naiwei Liu,
Cache-Based Attack and Defense on ARM Platform, Fall 2020.
Principal advisor: Meng Yu.
Defense presentation (pptx)
(pdf)
-
Abdullah Al-Alaj,
Role Based Access Control for Software Defined Networking: Formal Models and Implementation, Summer 2020.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
(pdf)
-
Jin Han,
Enhancing Security in Cloud Computing through Virtual Machine Placement, Fall 2019.
Principal advisor: Meng Yu.
Defense presentation (pptx)
(pdf)
-
Mahmoud Abdelsalam,
Online Malware Detection in Cloud Auto-Scaling Systems using Performance Metrics, Fall 2018.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
(pdf)
-
Maanak Gupta,
Secure Cloud Assisted Smart Cars and Big Data: Access Control Models and Implementation, Fall 2018.
Defense presentation (pptx)
(pdf)
-
Smriti Bhatt,
Attribute-Based Access and Communication Control Models for Cloud and Cloud-Enabled Internet of Things, Summer 2018.
Defense presentation (pptx)
(pdf)
-
Asma Alshehri,
Access Control Models for Cloud-Enabled Internet of Things, Spring 2018.
Defense presentation (pptx)
(pdf)
-
Tahmina Ahmed,
Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models, Fall 2017.
Defense presentation (pptx)
(pdf)
-
Prosunjit Biswas,
Enumerated Authorization Policy ABAC Models: Expressive Power and Enforcement, Spring 2017.
Defense presentation (ppt)
(pdf)
-
Yun Zhang,
Secure Information and Resource Sharing in Cloud IaaS, Fall 2016.
Defense presentation (pdf)
-
Navid Pustchi,
Authorization Federation in Multi-Tenant Multi-Cloud IaaS, Spring 2016.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
pdf
-
Khalid Bijon,
Constraints for Attribute Based Access Control with Application in Cloud IaaS, Spring 2015.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
pdf
-
Dang Nguyen,
Provenance-Based Access Control Models, Summer 2014.
Co-advisor: Jaehong Park.
Defense presentation (pptx)
pdf
-
Bo Tang,
Multi-Tenant Access Control for Cloud Services, Summer 2014.
Co-mentor: Qi Li.
Defense presentation (pptx)
pdf
-
Xin Jin,
Attribute-Based Access Control Models and Implementation in Cloud Infrastructure as a Service, Spring 2014.
Co-advisor: Ram Krishnan.
Defense presentation (pptx)
pdf
-
Yuan Cheng,
Access Control for Online Social Networks Using Relationship Type Patterns, Spring 2014.
Co-advisor: Jaehong Park.
Defense presentation (pptx)
pdf
At George Mason University: 16
-
Ram Krishnan,
Group-Centric Secure Information Sharing Models, Fall 2009.
Committee Chair: Daniel Menasce.
Supporting Materials.
Defense presentation (pptx animated)
pdf
-
David A. Wheeler,
Fully Countering Trusting Trust through Diverse Double-Compiling, Fall 2009.
Committee Chair: Daniel Menasce.
Defense presentation (pdf)
Supplementary material
-
Venkata Bhamidipati,
Architectures and Models for Administration of User-Role Assignment in Role Based Access Control, Fall 2008.
Committee Chair: Daniel Menasce.
Defense presentation
-
Zhixiong Zhang,
Scalable Role and Organization Based Access Control and its Administration, Spring 2008.
Committee Chair: Daniel Menasce.
Defense presentation
-
Xinwen Zhang, Formal Model and Analysis of Usage Control, Summer 2006.
Co-advisor: Francesco Parisi-Presicce.
Defense presentation
-
Mohammad Abdullah Al-Kahtani, A Family
of Models for Rule-Based User-Role Assignment, Spring 2004
-
Jaehong Park, Usage
Control: A Unified Framework for Next Generation Access Control, Summer 2003
-
Ezedin S. Barka, Framework
for Role-Based Delegation Models, Summer 2002
- Pete A. Epstein, Engineering
of Role/Permission Assignments, Spring 2002
- Qamar Munawer, Administrative
Models for Role-Based Access Control, Spring 2000.
- Gail-Joon Ahn, The
RCL 2000 Language for Specifying Role-Based Authorization Constraints,
Fall 1999.
- Joon S. Park, Secure
Attribute Services on the Web, Summer 1999.
- Philip C. Hyland, Concentric
Supervision of Security Applications: An Assurance Methodology, Spring 1999.
- Tarik Himdi, A
Scaleable Extended DGSA Scheme for Confidentiality of Shared Data in
Multidomain Organizations, Spring 1998.
- Srinivas Ganta, Expressive
Power of Access Control Models Based on Propagation of Rights, Spring 1996.
- Roshan Thomas, Supporting Secure and
Efficient Write-up in High Assurance Multilevel Object-based Computing, Summer 1994.
My Own Dissertation
|