Mahesh V. Tripunitara

According to our database1, Mahesh V. Tripunitara authored at least 32 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Strengthening PUFs using Composition.
Proceedings of the International Conference on Computer-Aided Design, 2019

2016
Non-Deterministic Timers for Hardware Trojan Activation (or How a Little Randomness Can Go the Wrong Way).
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

2015
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Hard Instances for Verification Problems in Access Control.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Integrated Circuit (IC) Decamouflaging: Reverse Engineering Camouflaged ICs within Minutes.
Proceedings of the 22nd Annual Network and Distributed System Security Symposium, 2015

The Limits of the Trade-Off Between Query-Anonymity and Communication-Cost in Wireless Sensor Networks.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
The UNIX Process Identity Crisis: A Standards-Driven Approach to Setuid.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Securing Computer Hardware Using 3D Integrated Circuit (IC) Technology and Split Manufacturing for Obfuscation.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Least-restrictive enforcement of the Chinese wall security policy.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Property-testing real-world authorization systems.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Panel on granularity in access control.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

2012
Relating declarative semantics and usability in access control.
Proceedings of the Symposium On Usable Privacy and Security, 2012

Mitigating the Intractability of the User Authorization Query Problem in Role-Based Access Control (RBAC).
Proceedings of the Network and System Security - 6th International Conference, 2012

Reliable computing with ultra-reduced instruction set co-processors.
Proceedings of the 49th Annual Design Automation Conference 2012, 2012

2011
An authorization scheme for version control systems.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC).
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Automatic error finding in access-control policies.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Fair Payments for Outsourced Computations.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Role-based access control (RBAC) in Java via proxy objects using annotations.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Access control in practice: pain points.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

2009
Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Method-Specific Java Access Control via RMI Proxy Objects Using Annotations.
Proceedings of the Information Systems Security, 5th International Conference, 2009

Social Learning Applications in Resource Constrained Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Correctness Proof of a Mesh Security Architecture.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Conditional Payments for Computing Markets.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2006
Resiliency policies in access control.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
A theory based on security analysis for comparing the expressive power of access control models
PhD thesis, 2005

On Safety in Discretionary Access Control.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005

2004
Security analysis in role-based access control.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Comparing the expressive power of access control models.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

On mutually-exclusive roles and separation of duty.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

1999
A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache Poisoning.
Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC 1999), 1999


  Loading...