Tripunitara, Mahesh V.
57  results:
Search for persons X
?
1

Least-Privilege Calls to Amazon Web Services:

Gill, Puneet ; Dietl, Werner ; Tripunitara, Mahesh V
IEEE Transactions on Dependable and Secure Computing.  , 2022
 
?
3

Strengthening PUFs using Composition:

, In: 2019 IEEE/ACM International Conference on Computer-Aided Design (ICCAD),
 
?
4

The Limits of the Trade-Off Between Query-Anonymity and Com..:

, In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy,
 
?
6

The UNIX Process Identity Crisis : A Standards-Driven Ap..:

, In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security,
Dittmer, Mark S. ; Tripunitara, Mahesh V. - p. 1391-1402 , 2014
 
?
8

Least-restrictive enforcement of the Chinese wall security ..:

, In: Proceedings of the 18th ACM symposium on Access control models and technologies,
 
?
9

Property-testing real-world authorization systems:

, In: Proceedings of the 18th ACM symposium on Access control models and technologies,
 
?
10

The Foundational Work of Harrison-Ruzzo-Ullman Revisited:

Tripunitara, Mahesh V. ; Li, Ninghui
IEEE Transactions on Dependable and Secure Computing.  10 (2013)  1 - p. 28-39 , 2013
 
?
11

Relating declarative semantics and usability in access cont..:

, In: Proceedings of the Eighth Symposium on Usable Privacy and Security,
 
?
12

Reliable computing with ultra-reduced instruction set co-pr..:

, In: Proceedings of the 49th Annual Design Automation Conference,
 
?
13

An authorization scheme for version control systems:

, In: Proceedings of the 16th ACM symposium on Access control models and technologies,
 
?
14

Session details: Policy analysis:

, In: Proceedings of the 15th ACM symposium on Access control models and technologies,
 
?
15

Session details: Panel I:

, In: Proceedings of the 15th ACM symposium on Access control models and technologies,
 
1-15