Seuraa
Mahesh Tripunitara
Mahesh Tripunitara
Vahvistettu sähköpostiosoite verkkotunnuksessa uwaterloo.ca - Kotisivu
Nimike
Viittaukset
Viittaukset
Vuosi
Security analysis in role-based access control
N Li, MV Tripunitara
ACM Transactions on Information and System Security (TISSEC) 9 (4), 391-420, 2006
3072006
Securing Computer Hardware Using 3D Integrated Circuit ({{{{{IC}}}}}) Technology and Split Manufacturing for Obfuscation
F Imeson, A Emtenan, S Garg, M Tripunitara
22nd USENIX Security Symposium (USENIX Security 13), 495-510, 2013
2582013
Integrated circuit (IC) decamouflaging: Reverse engineering camouflaged ICs within minutes.
M El Massad, S Garg, MV Tripunitara
NDSS, 1-14, 2015
2322015
On mutually exclusive roles and separation-of-duty
N Li, MV Tripunitara, Z Bizri
ACM Transactions on Information and System Security (TISSEC) 10 (2), 5-es, 2007
2322007
Towards formal verification of role-based access control policies
S Jha, N Li, M Tripunitara, Q Wang, W Winsborough
IEEE Transactions on Dependable and Secure Computing 5 (4), 242-255, 2008
1802008
Reverse engineering camouflaged sequential circuits without scan access
M El Massad, S Garg, M Tripunitara
2017 IEEE/ACM International Conference on Computer-Aided Design (ICCAD), 33-40, 2017
1102017
Automatic error finding in access-control policies
K Jayaraman, V Ganesh, M Tripunitara, M Rinard, S Chapin
Proceedings of the 18th ACM conference on Computer and communications …, 2011
1092011
A middleware approach to asynchronous and backward compatible detection and prevention of ARP cache poisoning
MV Tripunitara, P Dutta
Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99 …, 1999
831999
Computer vulnerability analysis
I Krsul, E Spafford, M Tripunitara
COAST Laboratory, Purdue University, West Lafayette, IN, Technical Report, 1998
801998
Logic locking for secure outsourced chip fabrication: A new attack and provably secure defense mechanism
ME Massad, J Zhang, S Garg, MV Tripunitara
arXiv preprint arXiv:1703.10187, 2017
702017
Comparing the expressive power of access control models
MV Tripunitara, N Li
Proceedings of the 11th ACM conference on Computer and communications …, 2004
672004
On safety in discretionary access control
N Li, MV Tripunitara
2005 IEEE Symposium on Security and Privacy (S&P'05), 96-109, 2005
662005
A theory for comparing the expressive power of access control models
MV Tripunitara, N Li
Journal of Computer Security 15 (2), 231-272, 2007
652007
Robust shared objects for non-volatile main memory
R Berryhill, W Golab, M Tripunitara
19th International Conference on Principles of Distributed Systems (OPODIS 2015), 2016
622016
Resiliency policies in access control
N Li, Q Wang, M Tripunitara
ACM Transactions on Information and System Security (TISSEC) 12 (4), 1-34, 2009
602009
Mohawk: Abstraction-refinement and bound-estimation for verifying access control policies
K Jayaraman, M Tripunitara, V Ganesh, M Rinard, S Chapin
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-28, 2013
432013
Fair payments for outsourced computations
B Carbunar, M Tripunitara
2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2010
382010
Middle approach to asynchronous and backward-compatible detection and prevention of ARP cache poisoning
MV Tripunitara, P Dutta
US Patent 6,771,649, 2004
352004
The foundational work of Harrison-Ruzzo-Ullman revisited
MV Tripunitara, N Li
IEEE Transactions on Dependable and Secure Computing 10 (1), 28-39, 2012
312012
Payments for outsourced computations
B Carbunar, MV Tripunitara
IEEE Transactions on Parallel and Distributed Systems 23 (2), 313-320, 2011
292011
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20