PhD's Awarded


Home
Publications
Most Cited Papers
Guide to Papers
Patents
Grants
PhD's Awarded
Invited Talks etc.
Teaching
Vitae etc.
Contact Me

Total: 40

At University of Texas at San Antonio: 24

  1. Mohammad Nobi, Towards Machine Learning Based Access Control, Summer 2022. Co-advisor: Ram Krishnan. Defense presentation (pptx) (pdf)
  2. Mir M.A. Pritom, Defending Against Malicious Websites: Themed Threats, Detection, and Law-Enforcement, Summer 2022. Principal advisor: Shouhuai Xu. Defense presentation (pptx) (pdf).
  3. Mehrnoosh Shakarami, Operation and Administration of Access Control in IoT Environments, Spring 2022. Defense presentation (pptx) (pdf)
  4. Eric Ficke, Reconstructing Alert Trees for Cyber Triage, Spring 2022. Principal advisor: Shouhuai Xu. Defense presentation (pptx) (pdf).
  5. Shuvra Chakraborty, Feasibility Analysis of Access Control Policy Mining, Fall 2021. Defense presentation (pptx) (pdf)
  6. Huashan Chen, A Framework for Quantifying Security Effectiveness of Cyber Defenses, Fall 2021. Principal advisor: Shouhuai Xu. Defense presentation (pptx) (pdf)
  7. Safwa Ameer, User-To-Device Access Control Models for Cloud-Enabled IoT With Smart Home Case Study, Summer 2021. Defense presentation (pptx) (pdf)
  8. John Charlton, Inferring Malware Detector Metrics in the Absence of Ground-Truth, Summer 2021. Principal advisor: Shouhuai Xu.
  9. Naiwei Liu, Cache-Based Attack and Defense on ARM Platform, Fall 2020. Principal advisor: Meng Yu. Defense presentation (pptx) (pdf)
  10. Abdullah Al-Alaj, Role Based Access Control for Software Defined Networking: Formal Models and Implementation, Summer 2020. Co-advisor: Ram Krishnan. Defense presentation (pptx) (pdf)
  11. Jin Han, Enhancing Security in Cloud Computing through Virtual Machine Placement, Fall 2019. Principal advisor: Meng Yu. Defense presentation (pptx) (pdf)
  12. Mahmoud Abdelsalam, Online Malware Detection in Cloud Auto-Scaling Systems using Performance Metrics, Fall 2018. Co-advisor: Ram Krishnan. Defense presentation (pptx) (pdf)
  13. Maanak Gupta, Secure Cloud Assisted Smart Cars and Big Data: Access Control Models and Implementation, Fall 2018. Defense presentation (pptx) (pdf)
  14. Smriti Bhatt, Attribute-Based Access and Communication Control Models for Cloud and Cloud-Enabled Internet of Things, Summer 2018. Defense presentation (pptx) (pdf)
  15. Asma Alshehri, Access Control Models for Cloud-Enabled Internet of Things, Spring 2018. Defense presentation (pptx) (pdf)
  16. Tahmina Ahmed, Expressive Power, Safety and Cloud Implementation of Attribute and Relationship Based Access Control Models, Fall 2017. Defense presentation (pptx) (pdf)
  17. Prosunjit Biswas, Enumerated Authorization Policy ABAC Models: Expressive Power and Enforcement, Spring 2017. Defense presentation (ppt) (pdf)
  18. Yun Zhang, Secure Information and Resource Sharing in Cloud IaaS, Fall 2016. Defense presentation (pdf)
  19. Navid Pustchi, Authorization Federation in Multi-Tenant Multi-Cloud IaaS, Spring 2016. Co-advisor: Ram Krishnan. Defense presentation (pptx) pdf
  20. Khalid Bijon, Constraints for Attribute Based Access Control with Application in Cloud IaaS, Spring 2015. Co-advisor: Ram Krishnan. Defense presentation (pptx) pdf
  21. Dang Nguyen, Provenance-Based Access Control Models, Summer 2014. Co-advisor: Jaehong Park. Defense presentation (pptx) pdf
  22. Bo Tang, Multi-Tenant Access Control for Cloud Services, Summer 2014. Co-mentor: Qi Li. Defense presentation (pptx) pdf
  23. Xin Jin, Attribute-Based Access Control Models and Implementation in Cloud Infrastructure as a Service, Spring 2014. Co-advisor: Ram Krishnan. Defense presentation (pptx) pdf
  24. Yuan Cheng, Access Control for Online Social Networks Using Relationship Type Patterns, Spring 2014. Co-advisor: Jaehong Park. Defense presentation (pptx) pdf

At George Mason University: 16

  1. Ram Krishnan, Group-Centric Secure Information Sharing Models, Fall 2009. Committee Chair: Daniel Menasce. Supporting Materials. Defense presentation (pptx animated) pdf
  2. David A. Wheeler, Fully Countering Trusting Trust through Diverse Double-Compiling, Fall 2009. Committee Chair: Daniel Menasce. Defense presentation (pdf) Supplementary material
  3. Venkata Bhamidipati, Architectures and Models for Administration of User-Role Assignment in Role Based Access Control, Fall 2008. Committee Chair: Daniel Menasce. Defense presentation
  4. Zhixiong Zhang, Scalable Role and Organization Based Access Control and its Administration, Spring 2008. Committee Chair: Daniel Menasce. Defense presentation
  5. Xinwen Zhang, Formal Model and Analysis of Usage Control, Summer 2006. Co-advisor: Francesco Parisi-Presicce. Defense presentation
  6. Mohammad Abdullah Al-Kahtani, A Family of Models for Rule-Based User-Role Assignment, Spring 2004
  7. Jaehong Park, Usage Control: A Unified Framework for Next Generation Access Control, Summer 2003
  8. Ezedin S. Barka, Framework for Role-Based Delegation Models, Summer 2002
  9. Pete A. Epstein, Engineering of Role/Permission Assignments, Spring 2002
  10. Qamar Munawer, Administrative Models for Role-Based Access Control, Spring 2000.
  11. Gail-Joon Ahn, The RCL 2000 Language for Specifying Role-Based Authorization Constraints, Fall 1999.
  12. Joon S. Park, Secure Attribute Services on the Web, Summer 1999.
  13. Philip C. Hyland, Concentric Supervision of Security Applications: An Assurance Methodology, Spring 1999.
  14. Tarik Himdi, A Scaleable Extended DGSA Scheme for Confidentiality of Shared Data in Multidomain Organizations, Spring 1998.
  15. Srinivas Ganta, Expressive Power of Access Control Models Based on Propagation of Rights, Spring 1996.
  16. Roshan Thomas, Supporting Secure and Efficient Write-up in High Assurance Multilevel Object-based Computing, Summer 1994.

My Own Dissertation

bulletRavi Sandhu, Design and Analysis of Protection Schemes Based on the Send-Receive Transport Mechanism, Spring 1983.