Ram Krishnan

Orcid: 0000-0002-7402-553X

According to our database1, Ram Krishnan authored at least 98 papers between 1993 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Environment Aware Deep Learning Based Access Control Model.
Proceedings of the 2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, 2024

2023
Secure Knowledge Management and Cybersecurity in the Era of Artificial Intelligence.
Inf. Syst. Frontiers, April, 2023

Visualizing Convolutional Neural Network Models' Sensitivity to Nonnatural Data Order.
Inf. Syst. Frontiers, April, 2023

Learnable Image Transformations for Privacy Enhanced Deep Neural Networks.
Proceedings of the 5th IEEE International Conference on Trust, 2023

A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks.
Proceedings of the Information Systems Security - 19th International Conference, 2023

An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning.
Proceedings of the Data and Applications Security and Privacy XXXVII, 2023

Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems.
Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, 2023

2022
On the role of deep learning model complexity in adversarial robustness for medical images.
BMC Medical Informatics Decis. Mak., 2022

Machine Learning in Access Control: A Taxonomy and Survey.
CoRR, 2022

Adversarial Attacks in Machine Learning Based Access Control.
Proceedings of the 1st Italian Conference on Big Data and Data Science (itaDATA 2022), 2022

Administration of Machine Learning Based Access Control.
Proceedings of the Computer Security - ESORICS 2022, 2022

Toward Deep Learning Based Access Control.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

2021
A Formal Specification of Access Control in Android with URI Permissions.
Inf. Syst. Frontiers, 2021

Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence.
Inf. Syst. Frontiers, 2021

Attribute-Based Access Control Policy Review in Permissioned Blockchain.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Analyzing CNN Models' Sensitivity to the Ordering of Non-natural Data.
Proceedings of the Secure Knowledge Management In The Artificial Intelligence Era, 2021

Access Control Policy Generation from User Stories Using Machine Learning.
Proceedings of the Data and Applications Security and Privacy XXXV, 2021

Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain.
Proceedings of the 2021 IEEE International Conference on Omni-Layer Intelligent Systems, 2021

Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
Service Function Chaining (SFC) Operations, Administration, and Maintenance (OAM) Framework.
RFC, October, 2020

Administrative Models for Role Based Access Control in Android.
J. Internet Serv. Inf. Secur., 2020

Policy Review in Attribute Based Access Control - A Policy Machine Case Study.
J. Internet Serv. Inf. Secur., 2020

Role-Based Access Control Models for Android.
Proceedings of the Second IEEE International Conference on Trust, 2020

A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.
Proceedings of the Second IEEE International Conference on Trust, 2020

ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions.
Proceedings of the 6th IEEE International Conference on Collaboration and Internet Computing, 2020

2019
Algorithms for joint sensor and control nodes selection in dynamic networks.
Autom., 2019

A Formal Specification of Access Control in Android.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

On the Feasibility of Attribute-Based Access Control Policy Mining.
Proceedings of the 20th IEEE International Conference on Information Reuse and Integration for Data Science, 2019

Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data.
Proceedings of the 2019 4th International Conference on Computing, 2019

SDN-RBAC: An Access Control Model for SDN Controller Applications.
Proceedings of the 2019 4th International Conference on Computing, 2019

Online Malware Detection in Cloud Auto-scaling Systems Using Shallow Convolutional Neural Networks.
Proceedings of the Data and Applications Security and Privacy XXXIII, 2019

A Formal Access Control Model for SE-Floodlight Controller.
Proceedings of the SDN-NFV@CODASPY 2019, 2019

2018
Use of Multicast across Inter-domain Peering Points.
RFC, January, 2018

A Framework for Multicast in Network Virtualization over Layer 3.
RFC, January, 2018

Mobile Applications Recommendation Based on User Ratings and Permissions.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Malware Detection in Cloud Infrastructures Using Convolutional Neural Networks.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
A Model for Attribute Based Role-Role Assignment (ARRA).
CoRR, 2017

Attribute Based Administration of Role Based Access Control : A Detail Description.
CoRR, 2017

AARBAC: Attribute-Based Administration of Role-Based Access Control.
Proceedings of the 3rd IEEE International Conference on Collaboration and Internet Computing, 2017

Attribute Transformation for Attribute-Based Access Control.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

Clustering-Based IaaS Cloud Monitoring.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
Sequence Diagram Aided Privacy Policy Specification.
IEEE Trans. Dependable Secur. Comput., 2016

Special Section on Advanced Technologies for Homeland and Cyber Defense.
Intell. Autom. Soft Comput., 2016

An Attribute-Based Protection Model for JSON Documents.
Proceedings of the Network and System Security - 10th International Conference, 2016

Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control.
Proceedings of the Information Security - 19th International Conference, 2016

PVDetector: a detector of privacy-policy violations for Android apps.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016

A Comparison of Logical-Formula and Enumerated Authorization Policy ABAC Models.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy.
Proceedings of the 2016 ACM International Workshop on Attribute Based Access Control, 2016

2015
Mechanisms for Optimizing Link Aggregation Group (LAG) and Equal-Cost Multipath (ECMP) Component Link Utilization in Networks.
RFC, January, 2015

Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Securing Implantable Cardioverter Defibrillators Using Smartphones.
J. Internet Serv. Inf. Secur., 2015

The NFVRG Network Function Virtualization Research at the IRTF.
J. ICT Stand., 2015

Attributes Enhanced Role-Based Access Control Model.
Proceedings of the Trust, Privacy and Security in Digital Business, 2015

Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Smartphone-based secure authenticated session sharing in Internet of Personal Things.
Proceedings of the Mobile Devices and Multimedia: Enabling Technologies, 2015

Integrating Attributes into Role-Based Access Control.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Secure Information and Resource Sharing in Cloud.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Authorization Federation in IaaS Multi Cloud.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

An open NFV and cloud architectural framework for managing application virality behaviour.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Bringing Knowledge to the Edge with Jnana Edge and Buddhi Edge: Architecture, Implementation, and Future Directions.
Proceedings of the Sixth IEEE International Conference on Technology for Education, 2014

A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service.
Proceedings of the Network and System Security - 8th International Conference, 2014

Behavioral Security Threat Detection Strategies for Data Center Switches and Routers.
Proceedings of the 34th International Conference on Distributed Computing Systems Workshops (ICDCS 2014 Workshops), Madrid, Spain, June 30, 2014

Role and attribute based collaborative administration of intra-tenant cloud IaaS.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

Secure Information and Resource Sharing in Cloud Infrastructure as a Service.
Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, 2014

2013
Collaboration in Multicloud Computing Environments: Framework and Security Issues.
Computer, 2013

Towards an Attribute Based Constraints Specification Language.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Reachability analysis for role-based administration of attributes.
Proceedings of the DIM'13, 2013

A framework for risk-aware role based access control.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Relational abstraction in community-based secure collaboration.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
BuddhiEdge: Taking Education to the Edge.
Proceedings of the 2012 IEEE Fourth International Conference on Technology for Education, 2012

RABAC: Role-Centric Attribute-Based Access Control.
Proceedings of the Computer Network Security, 2012

Risk-Aware RBAC Sessions.
Proceedings of the Information Systems Security, 8th International Conference, 2012

LTE signal classification and center frequency detection without Priori information.
Proceedings of the IEEE International Symposium on Dynamic Spectrum Access Networks, 2012

A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

A group-centric model for collaboration with expedient insiders in multilevel systems.
Proceedings of the 2012 International Conference on Collaboration Technologies and Systems, 2012

A lattice interpretation of group-centric collaboration with expedient insiders.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Group-Centric Secure Information-Sharing Models for Isolated Groups.
ACM Trans. Inf. Syst. Secur., 2011

Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing.
Proceedings of the Information Systems Security - 7th International Conference, 2011

RT-based administrative models for community cyber security information sharing.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

2010
Group-Centric Models for Secure and Agile Information Sharing.
Proceedings of the Computer Network Security, 2010

Towards Secure Information Sharing models for community Cyber Security.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Towards a discipline of mission-aware cloud computing.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Foundations for group-centric secure information sharing models.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

A Hybrid Enforcement Model for Group-centric Secure Information Sharing.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Towards a framework for group-centric secure collaboration.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

A conceptual framework for Group-Centric secure information sharing.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Stale-safe security properties for group-based secure information sharing.
Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, 2008

2007
PEI models towards scalable, usable and high-assurance information sharing.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

2002
Multi-Protocol Label Switching (MPLS) Support of Differentiated Services.
RFC, May, 2002

1997
Rate-based control schemes for ABR traffic - Design principles and performance comparison.
Comput. Networks ISDN Syst., 1997

1993
Life beyond linear topologies [MANs].
IEEE Netw., 1993

A Comparison of Linear and Mesh Topologies - DQDB and the Manhattan Street Network.
IEEE J. Sel. Areas Commun., 1993

Choice of Allocation Granularity in Multipath Source Routing Schemes.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993

Is There Life beyond Linear Topologies? A Comparison of DQDB and Manhattan Street Network.
Proceedings of the Proceedings IEEE INFOCOM '93, The Conference on Computer Communications, Twelfth Annual Joint Conference of the IEEE Computer and Communications Societies, Networking: Foundation for the Future, San Francisco, CA, USA, March 28, 1993


  Loading...