Follow
Vijayalakshmi Atluri
Vijayalakshmi Atluri
Professor of Information Systems, Rutgers Universtiy
Verified email at rutgers.edu - Homepage
Title
Cited by
Cited by
Year
The specification and enforcement of authorization constraints in workflow management systems
E Bertino, E Ferrari, V Atluri
ACM Transactions on Information and System Security (TISSEC) 2 (1), 65-104, 1999
8121999
Modeling and analysis of workflows using Petri nets
NR Adam, V Atluri, WK Huang
Journal of Intelligent Information Systems 10 (2), 131-158, 1998
5301998
The role mining problem: finding a minimal descriptive set of roles
J Vaidya, V Atluri, Q Guo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
3892007
An authorization model for workflows
V Atluri, W Huang
Computer Security—ESORICS 96, 44-64, 1996
3451996
Analysis of political discourse on twitter in the context of the 2016 US presidential elections
U Yaqub, SA Chun, V Atluri, J Vaidya
Government Information Quarterly 34 (4), 613-626, 2017
2472017
Roleminer: mining roles using subset enumeration
J Vaidya, V Atluri, J Warner
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2462006
Optimal Boolean matrix decomposition: Application to role engineering
H Lu, J Vaidya, V Atluri
Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on …, 2008
2082008
A content-based authorization model for digital libraries
NR Adam, V Atluri, E Bertino, E Ferrari
Knowledge and Data Engineering, IEEE Transactions on 14 (2), 296-315, 2002
1872002
A Flexible Model Supporting the Specification and Enforcement of Authorization Constraints in Workflow Management Systems
E Bertino, E Ferrari, V Atluri
Proceedings of 2nd ACM Workshop on Role-Based Access Control, 66-79, 1997
168*1997
Concept-level access control for the semantic web
L Qin, V Atluri
Proceedings of the 2003 ACM workshop on XML security, 94-103, 2003
1662003
Secureflow: A secure web-enabled workflow management system
WK Huang, V Atluri
Proceedings of the fourth ACM workshop on Role-based access control, 83-94, 1999
1581999
A Chinese wall security model for decentralized workflow systems
V Atluri, SA Chun, P Mazzoleni
Proceedings of the 8th ACM conference on Computer and Communications …, 2001
1222001
Security for workflow systems
V Atluri, J Warner
Handbook of Database Security, 213-230, 2008
1202008
A survey of role mining
B Mitra, S Sural, J Vaidya, V Atluri
ACM Computing Surveys (CSUR) 48 (4), 1-37, 2016
1192016
Supporting conditional delegation in secure workflow management systems
V Atluri, J Warner
Proceedings of the tenth ACM symposium on Access control models and …, 2005
1152005
A petri net based safety analysis of workflow authorization models
V Atluri, WK Huang
Journal of Computer Security 8 (2/3), 209-240, 2000
1152000
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets
NR Adam, VP Janeja, V Atluri
Proceedings of the 2004 ACM symposium on Applied computing, 576-583, 2004
1092004
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement
D Ferraiolo, V Atluri, S Gavrila
Journal of Systems Architecture 57 (4), 412-424, 2011
1012011
Enhancing the government service experience through QR codes on mobile platforms
D Lorenzi, J Vaidya, S Chun, B Shafiq, V Atluri
Government Information Quarterly 31 (1), 6-16, 2014
942014
The role mining problem: A formal perspective
J Vaidya, V Atluri, Q Guo
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
942010
The system can't perform the operation now. Try again later.
Articles 1–20