Follow
Khalid Bijon
Khalid Bijon
Snowflake
Verified email at snowflake.com
Title
Cited by
Cited by
Year
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
692013
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
412015
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
402012
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
382013
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131, 2013
382013
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
262014
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
182011
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
162016
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
162015
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
162014
The overhead from combating side-channels in cloud systems using VM-scheduling
N Juma, J Shahen, K Bijon, M Tripunitara
IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018
152018
Dynamic shared data object masking
A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar
US Patent 10,867,063, 2020
122020
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
102012
Row-level security
A Avanes, KZ Bijon, Z Mi, S Muralidhar, D Schultz, J Xu
US Patent 11,397,826, 2022
92022
Risk-aware sessions in role based access control systems and methods of use
R Krishnan, RS Sandhu, K Bijon
US Patent App. 14/505,388, 2020
92020
Container-centric Access Control On Database Objects
A Avanes, K Bijon, P Povinec
US Patent App. 16/745,922, 2021
72021
Constraints for attribute based access control with application in cloud IaaS
KZ Bijon
The University of Texas at San Antonio, 2015
52015
System for implementing an object tagging framework
A Avanes, KZ Bijon, Y Li, Z Mi, S Muralidhar, D Schultz
US Patent 11,301,478, 2022
42022
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the first international workshop on secure and resilient …, 2012
42012
Object dependency tracking in a cloud database system
R Balakrishnan, KZ Bijon, S Muralidhar, D Schultz, J Xu
US Patent 11,347,730, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20