Khalid Bijon
Khalid Bijon
Verified email at
Cited by
Cited by
A framework for risk-aware role based access control
KZ Bijon, R Krishnan, R Sandhu
2013 IEEE Conference on Communications and Network Security (CNS), 462-469, 2013
Mitigating multi-tenancy risks in iaas cloud through constraints-driven virtual resource scheduling
K Bijon, R Krishnan, R Sandhu
Proceedings of the 20th ACM symposium on access control models and …, 2015
Risk-Aware RBAC Sessions
KZ Bijon, R Krishnan, R Sandhu
Eighth International Conference on Information Systems Security, 2012
Towards an attribute based constraints specification language
KZ Bijon, R Krishnan, R Sandhu
2013 International Conference on Social Computing, 108-113, 2013
Constraints specification in attribute based access control
KZ Bijon, R Krishman, R Sandhu
Science 2 (3), 131, 2013
A TRUst based Information Sharing Model (TRUISM) in MANET in the Presence of Uncertainty
K Bijon, MM Haque, R Hasan
12th International Conference on Privacy, Security and Trust (PST), 2014
RT-based administrative models for community cyber security information sharing
R Sandhu, KZ Bijon, X Jin, R Krishnan
7th International Conference on Collaborative Computing: Networking …, 2011
Extended ReBAC administrative models with cascading revocation and provenance support
Y Cheng, K Bijon, R Sandhu
Proceedings of the 21st ACM on Symposium on Access Control Models and …, 2016
Virtual resource orchestration constraints in cloud infrastructure as a service
K Bijon, R Krishnan, R Sandhu
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
A formal model for isolation management in cloud infrastructure-as-a-service
KZ Bijon, R Krishnan, R Sandhu
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
The overhead from combating side-channels in cloud systems using VM-scheduling
N Juma, J Shahen, K Bijon, M Tripunitara
IEEE transactions on dependable and secure computing 17 (2), 422-435, 2018
Dynamic shared data object masking
A Avanes, KZ Bijon, D Carru, T Cruanes, V Jain, Z Mi, S Muralidhar
US Patent 10,867,063, 2020
A group-centric model for collaboration with expedient insiders in multilevel systems
KZ Bijon, R Sandhu, R Krishnan
2012 International Conference on Collaboration Technologies and Systems (CTS …, 2012
Row-level security
A Avanes, KZ Bijon, Z Mi, S Muralidhar, D Schultz, J Xu
US Patent 11,397,826, 2022
Risk-aware sessions in role based access control systems and methods of use
R Krishnan, RS Sandhu, K Bijon
US Patent App. 14/505,388, 2020
Container-centric Access Control On Database Objects
A Avanes, K Bijon, P Povinec
US Patent App. 16/745,922, 2021
Constraints for attribute based access control with application in cloud IaaS
KZ Bijon
The University of Texas at San Antonio, 2015
System for implementing an object tagging framework
A Avanes, KZ Bijon, Y Li, Z Mi, S Muralidhar, D Schultz
US Patent 11,301,478, 2022
Towards provenance and risk-awareness in social computing
Y Cheng, D Nguyen, K Bijon, R Krishnan, J Park, R Sandhu
Proceedings of the first international workshop on secure and resilient …, 2012
Object dependency tracking in a cloud database system
R Balakrishnan, KZ Bijon, S Muralidhar, D Schultz, J Xu
US Patent 11,347,730, 2022
The system can't perform the operation now. Try again later.
Articles 1–20