Follow
John C. John
Title
Cited by
Cited by
Year
Meeting cardinality constraints in role mining
P Harika, M Nagajyothi, JC John, S Sural, J Vaidya, V Atluri
IEEE transactions on dependable and secure computing 12 (1), 71-84, 2014
452014
Role mining under role-usage cardinality constraint
JC John, S Sural, V Atluri, JS Vaidya
Information Security and Privacy Research: 27th IFIP TC 11 Information …, 2012
392012
Authorization management in multi-cloud collaboration using attribute-based access control
JC John, S Sural, A Gupta
2016 15th International Symposium on Parallel and Distributed Computing …, 2016
102016
Attribute‐based access control management for multicloud collaboration
JC John, S Sural, A Gupta
Concurrency and Computation: Practice and Experience 29 (19), e4199, 2017
72017
Optimal rule mining for dynamic authorization management in collaborating clouds using attribute-based access control
JC John, S Sural, A Gupta
2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 739-742, 2017
72017
Data leakage free ABAC policy construction in multi-cloud collaboration
JC John, A Gupta, S Sural
2022 IEEE 15th International Conference on Cloud Computing (CLOUD), 315-320, 2022
22022
Attribute-Based Authorization Management in Multi-Domain Collaboration
JC John
IIT Kharagpur, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–7