A unified attribute-based access control model covering DAC, MAC and RBAC X Jin, R Krishnan, R Sandhu Data and Applications Security and Privacy XXVI, 41-55, 2012 | 606 | 2012 |
Deployment guidelines for achieving maximum lifetime and avoiding energy holes in sensor network A Liu, X Jin, G Cui, Z Chen Information Sciences 230, 197-226, 2013 | 171 | 2013 |
RABAC: Role-Centric Attribute-Based Access Control X Jin, R Sandhu, R Krishnan 6th International Conference, on Mathematical Methods, Models, and …, 2012 | 168 | 2012 |
Attribute Based Access Control and Implementation in Infrastructure as a Service Cloud X Jin The University of Texas at San Antonio, 2014 | 59* | 2014 |
An elaborate chronological and spatial analysis of energy hole for wireless sensor networks A Liu, ZH Liu, M Nurudeen, X Jin, Z Chen Computer Standards & Interfaces 35 (1), 132-149, 2013 | 42 | 2013 |
A role-based administration model for attributes X Jin, R Krishnan, R Sandhu Proceedings of the first international workshop on secure and resilient …, 2012 | 35 | 2012 |
Role and attribute based collaborative administration of intra-tenant cloud iaas X Jin, R Krishnan, R Sandhu 10th IEEE International Conference on Collaborative Computing: Networking …, 2014 | 33 | 2014 |
Reachability analysis for role-based administration of attributes X Jin, R Krishnan, R Sandhu Proceedings of the 2013 ACM workshop on Digital identity management, 73-84, 2013 | 22 | 2013 |
RT-based administrative models for community cyber security information sharing R Sandhu, KZ Bijon, X Jin, R Krishnan 7th International Conference on Collaborative Computing: Networking …, 2011 | 18 | 2011 |
An elaborate chronological and spatial analysis of energy hole for wireless sensor networksComputer A Liu, Z Liu, M Nurudeen, X Jin, Z Chen Standards & Interfaces2013351132 149, 0 | 5 | |