Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation

Search Page

Filters

My NCBI Filters

Text availability

Article attribute

Article type

Publication date

Search Results

80 results

Filters applied: . Clear all
Results are displayed in a computed author sort order. The Results By Year timeline is not available.
Page 1
Security Analysis of ABAC under an Administrative Model.
Jha S, Sural S, Atluri V, Vaidysa J. Jha S, et al. Among authors: sural s. IET Inf Secur. 2019 Mar;13(2):96-103. doi: 10.1049/iet-ifs.2018.5010. Epub 2018 Oct 23. IET Inf Secur. 2019. PMID: 31214270 Free PMC article.
Efficient bottom-up Mining of Attribute Based Access Control Policies.
Talukdar T, Batra G, Vaidya J, Atluri V, Sural S. Talukdar T, et al. Among authors: sural s. IEEE Conf Collab Internet Comput. 2017 Oct;2017:339-348. doi: 10.1109/CIC.2017.00051. Epub 2017 Dec 14. IEEE Conf Collab Internet Comput. 2017. PMID: 30506058 Free PMC article.
Enabling the Deployment of ABAC Policies in RBAC Systems.
Batra G, Atluri V, Vaidya J, Sural S. Batra G, et al. Among authors: sural s. Data Appl Secur Priv XXXII (2018). 2018 Jul;10980:51-68. doi: 10.1007/978-3-319-95729-6_4. Epub 2018 Jul 10. Data Appl Secur Priv XXXII (2018). 2018. PMID: 30687849 Free PMC article.
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC.
Nath R, Das S, Sural S, Vaidya J, Atluri V. Nath R, et al. Among authors: sural s. Proc ACM Symp Access Control Model Technol. 2019 Jun;2019:25-35. doi: 10.1145/3322431.3325102. Proc ACM Symp Access Control Model Technol. 2019. PMID: 31346589 Free PMC article.
Deploying ABAC policies using RBAC Systems.
Batra G, Atluri V, Vaidya J, Sural S. Batra G, et al. Among authors: sural s. J Comput Secur. 2019;27(4):483-506. doi: 10.3233/JCS-191315. Epub 2019 Jul 18. J Comput Secur. 2019. PMID: 31929684 Free PMC article.
80 results