{"id":384,"date":"2022-05-02T12:27:35","date_gmt":"2022-05-02T17:27:35","guid":{"rendered":"https:\/\/ceid1.wpenginepowered.com\/rkrishnan\/?page_id=384"},"modified":"2026-04-28T10:22:46","modified_gmt":"2026-04-28T15:22:46","slug":"publications","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\r\n<p>You can also see my <a href=\"http:\/\/scholar.google.com\/citations?user=cHjkxfUAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Google Scholar Public Profile<\/a>.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Conference Publications<\/h2>\r\n\r\n\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li>[To appear] Rethinking Access-Control Policy Authoring as a Multimodal Challenge<br \/>Sherifdeen Lawal, Xingmeng Zhao, <span data-olk-copy-source=\"MessageBody\">Enrique Navarro Espino,<\/span> Anthony Rios, and Ram Krishnan<br \/>ACM Symposium on Access Control Models and Technologies, (ACM SACMAT \u201926), Waterloo, Canada, July 8-10, 2026.<\/li>\r\n<li><span class=\"paper-title\">Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large Language Models<\/span><br \/><span data-sheets-root=\"1\">\u0110or\u0111e Klisura, Joseph Khoury, Ashish Kundu, Ram Krishnan, and Anthony Rios<\/span><br \/>19th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2026), Rabat, Morocco, March 24-29, 2026.<\/li>\r\n<li>Optimizing Machine Learning Based Access Control Administration Through Data Distillation<br \/>Mohammad Nur Nobi, Md Shohel Rana and Ram Krishnan<br \/>21st International Conference on Information Systems Security, (ICISS \u201925), Indore, India, December 16 &#8211; 20, 2025.<\/li>\r\n<li><span data-olk-copy-source=\"MessageBody\">Machine Learning in Access Control: A Taxonomy (SoK)<\/span><br \/>Mohammad Nur Nobi, Ram Krishnan, Maanak Gupta, Md Shohel Rana, Lopamudra Praharaj and Mahmoud Abdelsalam<br \/>ACM Symposium on Access Control Models and Technologies (ACM SACMAT), Stony Brook, New York, July 8-10, 2025.<\/li>\r\n<li>Administration of Environment Aware Deep Learning Based Access Control<br \/>Pankaj Chhetri, Mohammad Nur Nobi and Ram Krishnan<br \/>8th International Conference on Mobile Internet Security, (MobiSec \u201924), Sapporo, Japan, December 17-19, 2024.<\/li>\r\n<li>Translating Natural Language Specifications into Access Control Policies by Leveraging Large Language Models<br \/>Sherifdeen Lawal, Xingmeng Zhao, Anthony Rios, Ram Krishnan and David Ferraiolo<br \/>IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, (IEEE TPS \u201924), Washington D.C., October 28-20, 2024.<\/li>\r\n<li>Environment Aware Deep Learning Based Access Control Model<br \/>Pankaj Chhetri, Smriti Bhatt, Paras Bhatt, Mohammad Nur Nobi, James Benson and Ram Krishnan<br \/>2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Porto, Portugal, June 21, 2024.<\/li>\r\n<li>A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks<br \/>David Rodriguez and Ram Krishnan<br \/>19th International Conference on Information Systems Security, (ICISS \u201923), Raipur, India, December 16 &#8211; 20, 2023.<\/li>\r\n<li>Learnable Image Transformations for Privacy Enhanced Deep Neural Networks<br \/>David Rodriguez and Ram Krishnan<br \/>IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, (IEEE TPS \u201923), Atlanta, Georgia, November 1 &#8211; 3, 2023.<\/li>\r\n<li>An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning<br \/>David Rodriguez and Ram Krishnan<br \/>37th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, (DBSec \u201923), Sophia Antipolis, France &#8211; July 19 &#8211; 21, 2023.<\/li>\r\n<li>Utilizing the DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems (poster)<br \/>Safwa Ameer, Ram Krishnan, Ravi Sandhu and Maanak Gupta<br \/>ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, North Carolina, USA, April 24-26, 2023.<\/li>\r\n<li>MiCAM: Visualizing Feature Extraction of Nonnatural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>International Conference on Machine Learning and Soft Computing (MLSC 2023), Copenhagen, Denmark, January 28-29, 2023.<\/li>\r\n<li>Administration of Machine Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi Sandhu<br \/>European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark, September 26-30, 2022.<\/li>\r\n<li>Adversarial Attacks in Machine Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan and Ravi Sandhu<br \/>Italian Conference on Big Data and Data Science (ITADATA 2022), Milan, Italy, September 20-21, 2022.<\/li>\r\n<li>Toward Deep Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu<br \/>ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore, MD, April 25-27, 2022<\/li>\r\n<li>Attribute-Based Access Control Policy Review in Permissioned Blockchain<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence<br \/>Era (SKM \u201921), Virtual Event, October 8-9, 2021, 13 pages.<\/li>\r\n<li>Analyzing CNN Models\u2019 Sensitivity to the Ordering of Non-Natural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence<br \/>Era (SKM \u201921), Virtual Event, October 8-9, 2021, 19 pages.<\/li>\r\n<li>Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>IEEE International Conference on Omni-layer Intelligent systems (IEEE COINS \u201921), Virtual Event, August 23-26, 2021.<\/li>\r\n<li>On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical<br \/>Images.<br \/>David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei Huang<br \/>International Conference on Intelligent Biology and Medicine (ICIBM 2021), Virtual<br \/>Event, August 8-10, 2021.<\/li>\r\n<li>Access Control Policy Generation From User Stories Using Machine Learning.<br \/>John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu<br \/>35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy<br \/>(DBSec \u201921), Virtual Event, July 19-20, 2021, 18 pages.<\/li>\r\n<li>Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study.<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>In Proceedings of 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), Virtual Event, May 15-17, 2021.<\/li>\r\n<li>Role-Based Access Control Models for Android<br \/>Samir Talegaon and Ram Krishnan<br \/>In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions<br \/>Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu<br \/>In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.<br \/>Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan<br \/>In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence<br \/>Md. Farhan Haque and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>A Formal Specification of Access Control In Android<br \/>Samir Talegaon and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis<br \/>Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy<\/li>\r\n<li>SDN-RBAC: An Access Control Model for SDN Controller Applications<br \/>Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu<br \/>4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy<\/li>\r\n<li>On the Feasibility of Attribute-Based Access Control Policy Mining<br \/>Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan<br \/>20th IEEE Conference on Information Reuse and Integration (IRI), July 30-August 1, 2019, Los Angeles, California.<\/li>\r\n<li>Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks<br \/>Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu<br \/>33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec&#8217;19), July 15-17, 2019, Charleston, South Carolina, USA<\/li>\r\n<li>A Formal Access Control Model for SE-Floodlight Controller<br \/>Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan<br \/>ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization <em>(ACM SDN-NFV Security 2019)<\/em>, March 27, 2019, Dallas, Texas, USA<\/li>\r\n<li>Malware Detection in Cloud Infrastructures using Convolutional Neural Networks<br \/>Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu<br \/>IEEE International Conference on Cloud Computing <em>(IEEE CLOUD 2018)<\/em>, July 2-7, 2018, San Francisco, California, USA<\/li>\r\n<li>AARBAC: Attribute-Based Administration of<br \/>Role-Based Access Control<br \/>Jiwan Ninglekhu and Ram Krishnan<br \/><em>IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2017), <\/em>October 15-17, 2017, San Jose, California, USA<\/li>\r\n<li>Demystifying Android\u2019s URI Permission System<br \/>Samir Talegaon and Ram Krishnan<br \/><em>International Conference on Secure Knowledge Management, <\/em>October 6-7, 2017, Tampa, Florida, USA<\/li>\r\n<li>ARRA: Attribute-Based Role-Role Assignment<br \/>Jiwan Ninglekhu and Ram Krishnan<br \/><em>International Conference on Secure Knowledge Management, <\/em>October 6-7, 2017, Tampa, Florida, USA<\/li>\r\n<li>Clustering-Based IaaS Cloud Monitoring<br \/>Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE International Conference on Cloud Computing (IEEE Cloud &#8217;17), <\/em>June 25-30, 2017, Honolulu, Hawaii, USA<\/li>\r\n<li>Attribute Transformation for Attribute-Based Access Control<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>ACM Workshop on Attribute-Based Access Control (ABAC 2016)<\/em>, Scottsdale, Arizona, March 24, 2017.<\/li>\r\n<li>An Attribute-Based Protection Model for JSON Documents<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>International Conference on Network and System Security (NSS 2016)<\/em>, Taipei, Taiwan, September 28-30, 2016.<\/li>\r\n<li>Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>Information Security Conference (ISC 2016)<\/em>, Honolulu, Hawaii, September 7-9, 2016.<\/li>\r\n<li>A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)<\/em>, Trento, Italy, July 18-21, 2016.<\/li>\r\n<li>PVDetector: A Detector of Privacy-Policy Violations for Android Apps<br \/>Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu<br \/><em>International Conference on\u00a0Mobile\u00a0Software Engineering and Systems (MOBILESoft\u00a02016)<\/em>, Austin, TX, May 14-22, 2016.<\/li>\r\n<li>Toward a Framework for Detecting Privacy Policy Violation in Android Application Code<br \/>Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu<br \/><em>International Conference on Software Engineering (ICSE 2016)<\/em>, Austin, TX, May 14-22, 2016.<\/li>\r\n<li>Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>ACM Workshop on Attribute-Based Access Control (ABAC 2016)<\/em>, New Orleans, Louisiana, March 11, 2016.<\/li>\r\n<li>Attributes Enhanced Role-Based Access Control Model<br \/>Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan<br \/><em>International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015),<\/em> Valencia, Spain, September 1-2, 2015.<\/li>\r\n<li>Integrating Attributes into Role-Based Access Control<br \/>Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015)<\/em>, Fairfax, VA, July 13-15, 2015.<\/li>\r\n<li>Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/>ACM Symposium on Access Control Models and Technologies (ACM SACMAT 2015), June 1-3, 2015, Vienna, Austria.<\/li>\r\n<li>Authorization Federation in IaaS Multi Cloud<br \/>Navid Pustchi, Ram Krishnan and Ravi Sandhu<br \/><em>International Workshop on Security in Cloud Computing (SCC 2015)<\/em>, April 14-17, 2015, Singapore<br \/><em>(held in conjunction with ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)).<\/em><\/li>\r\n<li>Secure Information and Resource Sharing in Cloud (poster)<br \/>Amy Zhang, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Conference on Data and Application Security and Privacy (CODASPY 2015)<\/em>, San Antonio, TX, March 2-4, 2015. Poster: [pdf] [pptx].<\/li>\r\n<li>Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Conference on Data and Application Security and Privacy (CODASPY 2015)<\/em>, San Antonio, TX, March 2-4, 2015.<\/li>\r\n<li>Smartphone-based Secure Authenticated Session Sharing in Internet of Personal Things<br \/>Ram Krishnan and Jiwan Ninglekhu<br \/><em>Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications<\/em>, San Francisco, CA, February 10-11, 2015.<\/li>\r\n<li>Secure Information and Resource Sharing in Cloud Infrastructure as a Service<br \/>Amy Zhang, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014)<\/em>, November 3, 2014, Scottsdale, AZ.<\/li>\r\n<li>Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014)<\/em>, Miami, Florida, October 22-25, 2014.<\/li>\r\n<li>A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Network and System Security (NSS 2014), <\/em>October 15-17, 2014, Xi&#8217;an, China.<\/li>\r\n<li>Cloud Computing Benchmarking: A Survey<br \/>Carlos Vazquez, Ram Krishnan and Eugene John<br \/><em>International Conference on Grid &amp; Cloud Computing and Applications (GCA 2014)<\/em>, July 21-24, 2014, Las Vegas, NV.<\/li>\r\n<li>Reachability Analysis for Role-based Administration of Attributes<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/>ACM Digital Identity Management Workshop, November 8, 2013, Berlin, Germany.<\/li>\r\n<li>Relational Abstraction in Community-Based Secure Collaboration<br \/>Philip Fong, Pooya Mehregan and Ram Krishnan<br \/><em>ACM Conference on Computer and Communications Security (ACM CCS)<\/em>, November 4-8, 2013, Berlin, Germany.<\/li>\r\n<li>A Framework for Risk-Aware Role Based Access Control<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE Symposium on Security Analytics and Automation (IEEE SafeConfig 2013)<\/em>, October 14-16, 2013, Washington DC.<\/li>\r\n<li>Towards An Attribute Based Constraints Specification Language<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>ASE\/IEEE International Conference on Information Privacy, Security, Risk and Trust<\/em>, September 8-14, 2013, Washington DC.<\/li>\r\n<li>Design of a Curriculum on Cloud Computing<br \/>Ram Krishnan and Eugene John<br \/><em>International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS&#8217;13)<\/em>, July 22-25, 2013, Las Vegas, NV.<\/li>\r\n<li>Risk-Aware RBAC Sessions<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Information Systems Security (ICISS 2012),<\/em> Guwahati, India , December 15-19, 2012.<\/li>\r\n<li>RABAC: Role-Centric Attribute-Based Access Control<br \/>Xin Jin, Ravi Sandhu and Ram Krishnan<br \/><em>International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2012<\/em>), St. Petersburg, Russia, October 17-20, 2012<br \/>Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012.<\/li>\r\n<li>A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders<br \/>Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan<br \/><em>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing(CollaborateCom 2012)<\/em>, October 14\u201317, 2012, Pittsburgh, PA.<\/li>\r\n<li>Towards provenance and risk-awareness in social computing<br \/>Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu<br \/><em>International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012)<\/em>, September 19\u201323, 2012, Minneapolis, MN.<\/li>\r\n<li>A role-based administration model for attributes<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012)<\/em>, September 19\u201323, 2012, Minneapolis, MN.<\/li>\r\n<li>Design and Low Power VLSI Implementation of Triple-DES Algorithm<br \/>Alexandra Camacho, Eugene John and Ram Krishnan<br \/>World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP&#8217;12), Las Vegas, NV, July 16-19, 2012.<\/li>\r\n<li>Towards Security Policy and Architecture for Managing Implantable Medical Devices<br \/>Ram Krishnan, Eugene John and Manoj Panday<br \/>World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP&#8217;12), Las Vegas NV, July 16-19, 2012.<\/li>\r\n<li>A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012)<\/em>, Paris, France, July 11-13, 2012.<\/li>\r\n<li>A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems<br \/>Khalid Bijon, Ravi Sandhu and Ram Krishnan<br \/><em>IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012)<\/em>, Denver, CO, May 24th, 2012.<\/li>\r\n<li>Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Information Systems Security (ICISS 2011),<\/em> Kolkata, India, December 15-19, 2011. Detailed version with proof.<\/li>\r\n<li>RT-Based Administrative Models for Community Cyber Security Information Sharing<br \/>Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan<br \/><em>IEEE International Workshop on Trusted Collaboration (TrustCol 2011),<\/em> Orlando, Florida, October 15, 2011.<\/li>\r\n<li>Towards a Discipline of Mission-Aware Cloud Computing<br \/>Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachry<br \/><em>ACM Cloud Computing Security Workshop (CCSW 2010),<\/em> Oct 08, 2010, Chicago, Illinois.<em><br \/>(held in conjunction with ACM Conference on Computer and Communications Security (CCS 2010))<\/em><\/li>\r\n<li>Towards Secure Information Sharing Models for Community Cyber Security<br \/>Ravi Sandhu, Ram Krishnan and Greg White<br \/><em>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing<\/em>, Oct 09-12, 2010, Chicago, Illinois.<\/li>\r\n<li>Group-Centric Models for Secure and Agile Information Sharing <em><br \/>Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough<br \/>International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS)<\/em>, September 8-11, 2010, St. Petersburg, Russia. Springer Lecture Notes in Computer Science.<\/li>\r\n<li>Towards a Framework for Group-Centric Secure Collaboration<br \/>Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough<br \/>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing, Nov 11-14, 2009, Crystal City, Washington D.C.<\/li>\r\n<li>A Hybrid Enforcement Model for Group-Centric Secure Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/>IEEE International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada. Detailed Version.<\/li>\r\n<li>Foundations for Group-Centric Secure Information Sharing Models<br \/>Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough<br \/>ACM Symposium on Access Control Models and Technologies (SACMAT), June 3-5, 2009, Stresa, Italy<\/li>\r\n<li>Enforcement Architecture and Implementation Model for Group-Centric Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/>International Workshop on Security and Communication Networks (IWSCN), May 20-22, 2009, Trondheim, Norway.<\/li>\r\n<li>A Conceptual Framework for Group-Centric Secure Information Sharing Model<em><br \/>R am Krishnan, Ravi Sandhu , Jianwei Niu and William Winsborough<br \/>ACM Symposium on Information, Computer and Communications Security (ASIACCS) <\/em>, March 10 \u2013 12, 2009, Sydney, Australia.<\/li>\r\n<li>Stale-Safe Security Properties for Group-Based Secure Information Sharing<br \/>Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough<br \/><em>ACM workshop on Formal Methods in Security Engineering (FMSE)<\/em>. Oct 27- Oct 31, 2008, Alexandria, Virginia, USA.<\/li>\r\n<li>A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems<br \/>Manoj Sastry, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS) <\/em>. September 13-15, 2007, St. Petersburg, Russia.\u00a0Detailed version.<\/li>\r\n<li>PEI Models towards Scalable, Usable and High-Assurance Information Sharing<br \/>Ram Krishnan, Ravi Sandhu and Kumar Ranganathan<br \/><em>ACM Symposium on Access Control Models and Technologies (SACMAT) <\/em>. June 20-22, 2007, Nice-Sophia Antipolis, France.\u00a0Detailed version.<\/li>\r\n<li>Efficient and Reliable Link State Information Dissemination<br \/>N. Ansari, G. Cheng, and Ram N. Krishnan<br \/><em>IEEE Communications Letters<\/em>, Vol. 8, No. 5, pp. 317-319, May 2004.<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Journal Publications<\/h2>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li>Visualizing Convolutional Neural Network Models\u2019 Sensitivity to Nonnatural Data Order<br \/>Randy Klepetko and Ram Krishnan<br \/>Springer Information System Frontiers (Sep 2022). <a href=\"https:\/\/doi.org\/10.1007\/s10796-022-10330-0\">https:\/\/doi.org\/10.1007\/s10796-022-10333-0<\/a><\/li>\r\n<li>David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei<br \/>Huang<br \/>On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical Images.<br \/>BMC Medical Informatics and Decision Making, Springer Nature Series, Vol 22, Article 160, June 2022. https:\/\/doi.org\/10.1186\/s12911-022-01891-w<\/li>\r\n<li>Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence<br \/>Md. Farhan Haque and Ram Krishnan<br \/>Springer Information System Frontiers (Feb 2021). https:\/\/doi.org\/10.1007\/s10796-020-10103-7<\/li>\r\n<li>A Formal Specification of Access Control in Android with URI Permissions<br \/>Samir Talegaon and Ram Krishnan<br \/>Springer Information System Frontiers (Nov 2020). https:\/\/doi.org\/10.1007\/s10796-020-10066-9<\/li>\r\n<li>Administrative Models for Role Based Access Control in Android<br \/>Samir Talegaon and Ram Krishnan<br \/><em>Journal of Internet Services and Information Security, Vol. 10, Issue 3, pp 31-46, August 2020.<\/em><\/li>\r\n<li>Policy Review in Attribute Based Access Control &#8211; A Policy Machine Case Study<br \/>Sherifdeen Lawal and Ram Krishnan<br \/><em>Journal of Internet Services and Information Security, Vol. 10, Issue 2, pp 67-81, May 2020.<\/em><\/li>\r\n<li>Algorithms for Joint Sensor and Control Nodes Selection in Dynamic Networks<br \/>Sebastian Nugroho, Ahmad Taha, Nikolaos Gatsis, Tyler Summers and Ram Krishnan<br \/><em>Automatica, Volume 106, August 2019, Pages 124-133<\/em>.<\/li>\r\n<li>Access Control in Cloud IaaS<br \/>Yun Zhang, Ram Krishnan , Farhan Patwa and Ravi Sandhu<br \/>In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le\u2010Khac), 2019.<\/li>\r\n<li>Access Control in Cloud IaaS. In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le\u2010Khac).<\/li>\r\n<li>Periodic Virtual Hierarchy: A Trust Model for Smart Grid Devices<br \/>Arezou Moussavi-Khalkhali, Ram Krishnan, and Mo Jamshidi<br \/><em>International Journal of Security and Its Applications<\/em>, Vol. 10, No. 11, November 2016.<\/li>\r\n<li>Sequence Diagram Aided Privacy Policy Specification<br \/>Hui Shen, Ram Krishnan, Rocky Slavin, and Jianwei Niu<br \/><em>IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)<\/em>, Vol. 13, No. 3, pp. 381-393, May-June 1 2016.<\/li>\r\n<li>Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning<br \/>Carlos Vazquez, Ram Krishnan and Eugene John<br \/>Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol 6, No. 3, pp 87-110, September 2015.<\/li>\r\n<li>Design And Implementation of Low-Power Nanoscale Cryptosystem for Group-Centric Secure Information Sharing<br \/>Valliyappan Valliyappan, Eugene John, Ram Krishnan and Sruthi Nanduru<br \/><em>Research Briefs on Informaiton &amp; Communication Technology Evolution (ReBICTE)<\/em>, Vol. 1, No. 20, August 31, 2015.<\/li>\r\n<li>Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service<br \/>Sazzad Masud and Ram Krishnan<br \/><em>Journal of IT CoNvergence PRActice (INPRA)<\/em>, Vol. 3, No. 2, pp 1-24, June 2015.<\/li>\r\n<li>Securing Implantable Cardioverter Defibrillators Using Smartphones<br \/>Jiwan Ninglekhu, Ram Krishnan, Eugene John, and Manoj Panday<br \/><em>Journal of Internet Services and Information Security<\/em>, Vol. 5, Issue 2, pp 47-64, May 2015.<\/li>\r\n<li>Constraints Specification in Attribute Based Access Control<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE\/ASE Science Journal<\/em>, Vol. 2, No. 3, 2013, pp 131-144.<\/li>\r\n<li>Collaboration in Multicloud Computing Environments: Framework and Security Issues<br \/>Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino<br \/><em>IEEE Computer<\/em>, Vol. 46, Issue 2, pp 76-84, Februrary 2013.<\/li>\r\n<li>Group-Centric Secure Information Sharing Models for Isolated Groups<br \/>Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough<br \/><em>ACM Transactions on Information and System Security<\/em> (ACM TISSEC), Vol. 14, Issue 3, pp 1-29, 2011. Electronic Appendix. NuSMV Code (model checking).<\/li>\r\n<\/ol>\r\n","protected":false},"excerpt":{"rendered":"<p>You can also see my Google Scholar Public Profile. Conference Publications [To appear] Rethinking Access-Control Policy Authoring as a Multimodal ChallengeSherifdeen Lawal, Xingmeng Zhao, Enrique Navarro Espino, Anthony Rios, and Ram KrishnanACM Symposium on Access Control Models and Technologies, (ACM SACMAT \u201926), Waterloo, Canada, July 8-10, 2026. Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Publications&#8221;<\/span><\/a><\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-384","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Ram Krishnan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Ram Krishnan\" \/>\n<meta property=\"og:description\" content=\"You can also see my Google Scholar Public Profile. Conference Publications [To appear] Rethinking Access-Control Policy Authoring as a Multimodal ChallengeSherifdeen Lawal, Xingmeng Zhao, Enrique Navarro Espino, Anthony Rios, and Ram KrishnanACM Symposium on Access Control Models and Technologies, (ACM SACMAT \u201926), Waterloo, Canada, July 8-10, 2026. Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large &hellip; Continue reading &quot;Publications&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Ram Krishnan\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-28T15:22:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\",\"name\":\"Publications - Ram Krishnan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\"},\"datePublished\":\"2022-05-02T17:27:35+00:00\",\"dateModified\":\"2026-04-28T15:22:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\",\"name\":\"Ram Krishnan\",\"description\":\"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Ram Krishnan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Ram Krishnan","og_description":"You can also see my Google Scholar Public Profile. Conference Publications [To appear] Rethinking Access-Control Policy Authoring as a Multimodal ChallengeSherifdeen Lawal, Xingmeng Zhao, Enrique Navarro Espino, Anthony Rios, and Ram KrishnanACM Symposium on Access Control Models and Technologies, (ACM SACMAT \u201926), Waterloo, Canada, July 8-10, 2026. Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large &hellip; Continue reading \"Publications\"","og_url":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","og_site_name":"Ram Krishnan","article_modified_time":"2026-04-28T15:22:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","name":"Publications - Ram Krishnan","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website"},"datePublished":"2022-05-02T17:27:35+00:00","dateModified":"2026-04-28T15:22:46+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/","name":"Ram Krishnan","description":"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/rkrishnan\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/384\/revisions"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media?parent=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}