N. V. Narendra Kumar

According to our database1, N. V. Narendra Kumar authored at least 28 papers between 2006 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
GssMILP for anomaly classification in surveillance videos.
Expert Syst. Appl., 2022

Samyukta: A Unified Access Control Model using Roles, Labels, and Attributes.
Proceedings of the Information Systems Security - 18th International Conference, 2022

PPAS: Privacy-preserving Resource Discovery for Multi-domain SFC orchestration.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

2021
Towards Unifying RBAC with Information Flow Control.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2020
Consistency analysis and flow secure enforcement of SELinux policies.
Comput. Secur., 2020

2019
Convex vs Convex-Concave Objective for Rare Label Classification.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2019

Skew Aware Partitioning Techniques for Multi-way Spatial Join.
Proceedings of the Mining Intelligence and Knowledge Exploration, 2019

2018
An Experimental Flow Secure File System.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Semantic Notion of Secure Information-Flow.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Static Security Certification of Programs via Dynamic Labelling.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Security Analysis of EMV Protocol and Approaches for Strengthening It.
Proceedings of the Distributed Computing and Internet Technology, 2018

Secure Synthesis of IoT via Readers-Writers Flow Model.
Proceedings of the Distributed Computing and Internet Technology, 2018

FlowConSEAL: Automatic Flow Consistency Analysis of SEAndroid and SELinux Policies.
Proceedings of the Data and Applications Security and Privacy XXXII, 2018

2017
A Complete Generative Label Model for Lattice-Based Access Control Models.
Proceedings of the Software Engineering and Formal Methods - 15th International Conference, 2017

Realizing software vault on Android through information-flow control.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Dynamic Labelling to Enforce Conformance of Cross Domain Security/Privacy Policies.
Proceedings of the Distributed Computing and Internet Technology, 2017

Analyzing Protocol Security Through Information-Flow Control.
Proceedings of the Distributed Computing and Internet Technology, 2017

2016
Information-Flow Control for Building Security and Privacy Preserving Hybrid Clouds.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

An End-to-End Privacy Preserving Design of a Map-Reduce Framework.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Labelled mobile ambients model for information flow security in distributed systems.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control.
Proceedings of the Information Systems Security - 11th International Conference, 2015

POSTER: Dynamic Labelling for Analyzing Security Protocols.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Realizing Purpose-Based Privacy Policies Succinctly via Information-Flow Labels.
Proceedings of the 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, 2014

2011
SLA Monitor: A System for Dynamic Monitoring of Adaptive Web Services.
Proceedings of the 9th IEEE European Conference on Web Services, 2011

Towards Checking Tampering of Software.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Can we certify systems for freedom from malware.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

Malware: From Modelling to Practical Detection.
Proceedings of the Distributed Computing and Internet Technology, 2010

2006
Specification and Realization of Access Control in SPKI/SDSI.
Proceedings of the Information Systems Security, Second International Conference, 2006


  Loading...