If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Fingerprint is based on mining the text of the experts' scientific documents to create an index of weighted terms, which defines the key subjects of each individual researcher.

  • 12 Similar Profiles
Access control Engineering & Materials Science
Data mining Engineering & Materials Science
Role-based Access Control Mathematics
Collaborative filtering Engineering & Materials Science
Privacy Preserving Mathematics
Access Control Mathematics
Location based services Engineering & Materials Science
Control systems Engineering & Materials Science

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Projects 2008 2019

Drug interactions
Risk analysis
Access control
Sampling
Economics
National security
Outsourcing
Innovation
Education
Productivity
privacy
education
curriculum
website
infrastructure
Education
Computational complexity
Costs
Industry

Research Output 2002 2019

Abacaas: Attribute-based access control as a service

Meshram, A., Das, S., Sural, S., Vaidya, J. & Atluri, V., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 153-155 3 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Access control
Costs

Advances in hardware trojan detection

Vaidya, J., Jun 1 2019, Computer, 52, 6, p. 4-5 2 p.

Research output: Contribution to specialist publicationArticle

Hardware security

Editorial

Vaidya, J., Jan 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 1, p. 1-4 4 p., 8613033.

Research output: Contribution to journalEditorial

PolTree: A data structure for making efficient access decisions in ABAC

Nath, R., Das, S., Sural, S., Vaidya, J. & Atluri, V., May 28 2019, SACMAT 2019 - Proceedings of the 24th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 25-35 11 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forestry
Access control
Data structures
Decision making
Scalability

Security analysis of ABAC under an administrative model

Jha, S., Sural, S., Atluri, V. & Vaidya, J., Mar 1 2019, In : IET Information Security. 13, 2, p. 96-103 8 p.

Research output: Contribution to journalArticle

Access control
Control systems
Model checking