{"id":384,"date":"2022-05-02T12:27:35","date_gmt":"2022-05-02T17:27:35","guid":{"rendered":"https:\/\/ceid1.wpenginepowered.com\/rkrishnan\/?page_id=384"},"modified":"2026-02-11T08:47:46","modified_gmt":"2026-02-11T14:47:46","slug":"publications","status":"publish","type":"page","link":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","title":{"rendered":"Publications"},"content":{"rendered":"\r\n<p>You can also see my <a href=\"http:\/\/scholar.google.com\/citations?user=cHjkxfUAAAAJ&amp;hl=en\" target=\"_blank\" rel=\"noreferrer noopener\">Google Scholar Public Profile<\/a>.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Conference Publications<\/h2>\r\n\r\n\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li><span class=\"paper-title\">[To appear] Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large Language Models<\/span><br \/><span data-sheets-root=\"1\">\u0110or\u0111e Klisura, Joseph Khoury, Ashish Kundu, Ram Krishnan, and Anthony Rios<\/span><br \/>19th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2026), Rabat, Morocco, March 24-29, 2026.<\/li>\r\n<li>Optimizing Machine Learning Based Access Control Administration Through Data Distillation<br \/>Mohammad Nur Nobi, Md Shohel Rana and Ram Krishnan<br \/>21st International Conference on Information Systems Security, (ICISS \u201925), Indore, India, December 16 &#8211; 20, 2025.<\/li>\r\n<li><span data-olk-copy-source=\"MessageBody\">Machine Learning in Access Control: A Taxonomy (SoK)<\/span><br \/>Mohammad Nur Nobi, Ram Krishnan, Maanak Gupta, Md Shohel Rana, Lopamudra Praharaj and Mahmoud Abdelsalam<br \/>ACM Symposium on Access Control Models and Technologies (ACM SACMAT), Stony Brook, New York, July 8-10, 2025.<\/li>\r\n<li>Administration of Environment Aware Deep Learning Based Access Control<br \/>Pankaj Chhetri, Mohammad Nur Nobi and Ram Krishnan<br \/>8th International Conference on Mobile Internet Security, (MobiSec \u201924), Sapporo, Japan, December 17-19, 2024.<\/li>\r\n<li>Translating Natural Language Specifications into Access Control Policies by Leveraging Large Language Models<br \/>Sherifdeen Lawal, Xingmeng Zhao, Anthony Rios, Ram Krishnan and David Ferraiolo<br \/>IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, (IEEE TPS \u201924), Washington D.C., October 28-20, 2024.<\/li>\r\n<li>Environment Aware Deep Learning Based Access Control Model<br \/>Pankaj Chhetri, Smriti Bhatt, Paras Bhatt, Mohammad Nur Nobi, James Benson and Ram Krishnan<br \/>2024 ACM Workshop on Secure and Trustworthy Cyber-Physical Systems, Porto, Portugal, June 21, 2024.<\/li>\r\n<li>A Cycle-GAN Based Image Encoding Scheme for Privacy Enhanced Deep Neural Networks<br \/>David Rodriguez and Ram Krishnan<br \/>19th International Conference on Information Systems Security, (ICISS \u201923), Raipur, India, December 16 &#8211; 20, 2023.<\/li>\r\n<li>Learnable Image Transformations for Privacy Enhanced Deep Neural Networks<br \/>David Rodriguez and Ram Krishnan<br \/>IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, (IEEE TPS \u201923), Atlanta, Georgia, November 1 &#8211; 3, 2023.<\/li>\r\n<li>An Autoencoder-Based Image Anonymization Scheme for Privacy Enhanced Deep Learning<br \/>David Rodriguez and Ram Krishnan<br \/>37th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, (DBSec \u201923), Sophia Antipolis, France &#8211; July 19 &#8211; 21, 2023.<\/li>\r\n<li>Utilizing the DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems (poster)<br \/>Safwa Ameer, Ram Krishnan, Ravi Sandhu and Maanak Gupta<br \/>ACM Conference on Data and Application Security and Privacy (CODASPY 2023), Charlotte, North Carolina, USA, April 24-26, 2023.<\/li>\r\n<li>MiCAM: Visualizing Feature Extraction of Nonnatural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>International Conference on Machine Learning and Soft Computing (MLSC 2023), Copenhagen, Denmark, January 28-29, 2023.<\/li>\r\n<li>Administration of Machine Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Ravi Sandhu<br \/>European Symposium on Research in Computer Security (ESORICS) 2022, Copenhagen, Denmark, September 26-30, 2022.<\/li>\r\n<li>Adversarial Attacks in Machine Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan and Ravi Sandhu<br \/>Italian Conference on Big Data and Data Science (ITADATA 2022), Milan, Italy, September 20-21, 2022.<\/li>\r\n<li>Toward Deep Learning Based Access Control<br \/>Mohammad Nur Nobi, Ram Krishnan, Yufei Huang, Mehrnoosh Shakarami and Ravi Sandhu<br \/>ACM Conference on Data and Application Security and Privacy (CODASPY 2022), Baltimore, MD, April 25-27, 2022<\/li>\r\n<li>Attribute-Based Access Control Policy Review in Permissioned Blockchain<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence<br \/>Era (SKM \u201921), Virtual Event, October 8-9, 2021, 13 pages.<\/li>\r\n<li>Analyzing CNN Models\u2019 Sensitivity to the Ordering of Non-Natural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence<br \/>Era (SKM \u201921), Virtual Event, October 8-9, 2021, 19 pages.<\/li>\r\n<li>Utilizing Policy Machine for Attribute-Based Access Control in Permissioned Blockchain<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>IEEE International Conference on Omni-layer Intelligent systems (IEEE COINS \u201921), Virtual Event, August 23-26, 2021.<\/li>\r\n<li>On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical<br \/>Images.<br \/>David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei Huang<br \/>International Conference on Intelligent Biology and Medicine (ICIBM 2021), Virtual<br \/>Event, August 8-10, 2021.<\/li>\r\n<li>Access Control Policy Generation From User Stories Using Machine Learning.<br \/>John Heaps, Ram Krishnan, Yufei Huang, Jianwei Niu and Ravi Sandhu<br \/>35th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy<br \/>(DBSec \u201921), Virtual Event, July 19-20, 2021, 18 pages.<\/li>\r\n<li>Enabling Flexible Administration in ABAC Through Policy Review: A Policy Machine Case Study.<br \/>Sherifdeen Lawal and Ram Krishnan<br \/>In Proceedings of 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), Virtual Event, May 15-17, 2021.<\/li>\r\n<li>Role-Based Access Control Models for Android<br \/>Samir Talegaon and Ram Krishnan<br \/>In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions<br \/>Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu<br \/>In Proceedings of 6th IEEE International Conference on Collaboration and Internet Computing (CIC), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>A Model for the Administration of Access Control in Software Defined Networking using Custom Permissions.<br \/>Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan<br \/>In Proceedings of 2nd IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS), Virtual Event, December 1-3, 2020.<\/li>\r\n<li>Toward Relationship Based Access Control for Secure Sharing of Structured Cyber Threat Intelligence<br \/>Md. Farhan Haque and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>A Formal Specification of Access Control In Android<br \/>Samir Talegaon and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>On the Feasibility of RBAC to ABAC Policy Mining: A Formal Analysis<br \/>Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan<br \/>International Conference on Secure Knowledge Management in the Artificial Intelligence Era, (SKM 2019), December 21-22, 2019, Goa, India.<\/li>\r\n<li>Analyzing CNN Model Performance Sensitivity to the Ordering of Non-Natural Data<br \/>Randy Klepetko and Ram Krishnan<br \/>4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy<\/li>\r\n<li>SDN-RBAC: An Access Control Model for SDN Controller Applications<br \/>Abdullah Al-Alaj, Ram Krishnan and Ravi Sandhu<br \/>4th IEEE International Conference on Computing Communication and Security (ICCCS 2019), October 10-12, 2019, Rome, Italy<\/li>\r\n<li>On the Feasibility of Attribute-Based Access Control Policy Mining<br \/>Shuvra Chakraborty, Ravi Sandhu and Ram Krishnan<br \/>20th IEEE Conference on Information Reuse and Integration (IRI), July 30-August 1, 2019, Los Angeles, California.<\/li>\r\n<li>Online Malware Detection in Cloud Auto-Scaling Systems Using Shallow Convolutional Neural Networks<br \/>Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu<br \/>33rd Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec&#8217;19), July 15-17, 2019, Charleston, South Carolina, USA<\/li>\r\n<li>A Formal Access Control Model for SE-Floodlight Controller<br \/>Abdullah Al-Alaj, Ravi Sandhu and Ram Krishnan<br \/>ACM International Workshop on Security in Software Defined Networks &amp; Network Function Virtualization <em>(ACM SDN-NFV Security 2019)<\/em>, March 27, 2019, Dallas, Texas, USA<\/li>\r\n<li>Malware Detection in Cloud Infrastructures using Convolutional Neural Networks<br \/>Mahmoud Abdelsalam, Ram Krishnan, Yufei Huang and Ravi Sandhu<br \/>IEEE International Conference on Cloud Computing <em>(IEEE CLOUD 2018)<\/em>, July 2-7, 2018, San Francisco, California, USA<\/li>\r\n<li>AARBAC: Attribute-Based Administration of<br \/>Role-Based Access Control<br \/>Jiwan Ninglekhu and Ram Krishnan<br \/><em>IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2017), <\/em>October 15-17, 2017, San Jose, California, USA<\/li>\r\n<li>Demystifying Android\u2019s URI Permission System<br \/>Samir Talegaon and Ram Krishnan<br \/><em>International Conference on Secure Knowledge Management, <\/em>October 6-7, 2017, Tampa, Florida, USA<\/li>\r\n<li>ARRA: Attribute-Based Role-Role Assignment<br \/>Jiwan Ninglekhu and Ram Krishnan<br \/><em>International Conference on Secure Knowledge Management, <\/em>October 6-7, 2017, Tampa, Florida, USA<\/li>\r\n<li>Clustering-Based IaaS Cloud Monitoring<br \/>Mahmoud Abdelsalam, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE International Conference on Cloud Computing (IEEE Cloud &#8217;17), <\/em>June 25-30, 2017, Honolulu, Hawaii, USA<\/li>\r\n<li>Attribute Transformation for Attribute-Based Access Control<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>ACM Workshop on Attribute-Based Access Control (ABAC 2016)<\/em>, Scottsdale, Arizona, March 24, 2017.<\/li>\r\n<li>An Attribute-Based Protection Model for JSON Documents<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>International Conference on Network and System Security (NSS 2016)<\/em>, Taipei, Taiwan, September 28-30, 2016.<\/li>\r\n<li>Uni-ARBAC: A Unified Administrative Model for Role-Based Access Control<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>Information Security Conference (ISC 2016)<\/em>, Honolulu, Hawaii, September 7-9, 2016.<\/li>\r\n<li>A Comparison of Logical Formula and Enumerated Authorization Policy ABAC Models<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2016)<\/em>, Trento, Italy, July 18-21, 2016.<\/li>\r\n<li>PVDetector: A Detector of Privacy-Policy Violations for Android Apps<br \/>Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu<br \/><em>International Conference on\u00a0Mobile\u00a0Software Engineering and Systems (MOBILESoft\u00a02016)<\/em>, Austin, TX, May 14-22, 2016.<\/li>\r\n<li>Toward a Framework for Detecting Privacy Policy Violation in Android Application Code<br \/>Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, William Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux and Jianwei Niu<br \/><em>International Conference on Software Engineering (ICSE 2016)<\/em>, Austin, TX, May 14-22, 2016.<\/li>\r\n<li>Label-Based Access Control: An ABAC Model with Enumerated Authorization Policy<br \/>Prosunjit Biswas, Ravi Sandhu and Ram Krishnan<br \/><em>ACM Workshop on Attribute-Based Access Control (ABAC 2016)<\/em>, New Orleans, Louisiana, March 11, 2016.<\/li>\r\n<li>Attributes Enhanced Role-Based Access Control Model<br \/>Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan<br \/><em>International Conference on Trust, Privacy and Security in Digital Business (TrustBus 2015),<\/em> Valencia, Spain, September 1-2, 2015.<\/li>\r\n<li>Integrating Attributes into Role-Based Access Control<br \/>Qasim Mahmood Rajpoot, Christian Damsgaard Jensen and Ram Krishnan<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2015)<\/em>, Fairfax, VA, July 13-15, 2015.<\/li>\r\n<li>Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/>ACM Symposium on Access Control Models and Technologies (ACM SACMAT 2015), June 1-3, 2015, Vienna, Austria.<\/li>\r\n<li>Authorization Federation in IaaS Multi Cloud<br \/>Navid Pustchi, Ram Krishnan and Ravi Sandhu<br \/><em>International Workshop on Security in Cloud Computing (SCC 2015)<\/em>, April 14-17, 2015, Singapore<br \/><em>(held in conjunction with ACM Symposium on Information, Computer and Communications Security (ASIACCS 2015)).<\/em><\/li>\r\n<li>Secure Information and Resource Sharing in Cloud (poster)<br \/>Amy Zhang, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Conference on Data and Application Security and Privacy (CODASPY 2015)<\/em>, San Antonio, TX, March 2-4, 2015. Poster: [pdf] [pptx].<\/li>\r\n<li>Virtual Resource Orchestration Constraints in Cloud Infrastructure as a Service<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Conference on Data and Application Security and Privacy (CODASPY 2015)<\/em>, San Antonio, TX, March 2-4, 2015.<\/li>\r\n<li>Smartphone-based Secure Authenticated Session Sharing in Internet of Personal Things<br \/>Ram Krishnan and Jiwan Ninglekhu<br \/><em>Mobile Devices and Multimedia: Enabling Technologies, Algorithms, and Applications<\/em>, San Francisco, CA, February 10-11, 2015.<\/li>\r\n<li>Secure Information and Resource Sharing in Cloud Infrastructure as a Service<br \/>Amy Zhang, Ram Krishnan and Ravi Sandhu<br \/><em>ACM Workshop on Information Sharing and Collaborative Security (WISCS 2014)<\/em>, November 3, 2014, Scottsdale, AZ.<\/li>\r\n<li>Role and Attribute Based Collaborative Administration of Intra-Tenant Cloud IaaS<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014)<\/em>, Miami, Florida, October 22-25, 2014.<\/li>\r\n<li>A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Network and System Security (NSS 2014), <\/em>October 15-17, 2014, Xi&#8217;an, China.<\/li>\r\n<li>Cloud Computing Benchmarking: A Survey<br \/>Carlos Vazquez, Ram Krishnan and Eugene John<br \/><em>International Conference on Grid &amp; Cloud Computing and Applications (GCA 2014)<\/em>, July 21-24, 2014, Las Vegas, NV.<\/li>\r\n<li>Reachability Analysis for Role-based Administration of Attributes<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/>ACM Digital Identity Management Workshop, November 8, 2013, Berlin, Germany.<\/li>\r\n<li>Relational Abstraction in Community-Based Secure Collaboration<br \/>Philip Fong, Pooya Mehregan and Ram Krishnan<br \/><em>ACM Conference on Computer and Communications Security (ACM CCS)<\/em>, November 4-8, 2013, Berlin, Germany.<\/li>\r\n<li>A Framework for Risk-Aware Role Based Access Control<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE Symposium on Security Analytics and Automation (IEEE SafeConfig 2013)<\/em>, October 14-16, 2013, Washington DC.<\/li>\r\n<li>Towards An Attribute Based Constraints Specification Language<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>ASE\/IEEE International Conference on Information Privacy, Security, Risk and Trust<\/em>, September 8-14, 2013, Washington DC.<\/li>\r\n<li>Design of a Curriculum on Cloud Computing<br \/>Ram Krishnan and Eugene John<br \/><em>International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS&#8217;13)<\/em>, July 22-25, 2013, Las Vegas, NV.<\/li>\r\n<li>Risk-Aware RBAC Sessions<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Information Systems Security (ICISS 2012),<\/em> Guwahati, India , December 15-19, 2012.<\/li>\r\n<li>RABAC: Role-Centric Attribute-Based Access Control<br \/>Xin Jin, Ravi Sandhu and Ram Krishnan<br \/><em>International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS 2012<\/em>), St. Petersburg, Russia, October 17-20, 2012<br \/>Published as Springer Lecture Notes in Computer Science Vol. 7531, Computer Network Security (Igor Kotenko and Victor Skormin, editors), 2012.<\/li>\r\n<li>A Lattice Interpretation of Group-Centric Collaboration with Expedient Insiders<br \/>Khalid Bijon, Tahmina Ahmed, Ravi Sandhu and Ram Krishnan<br \/><em>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing(CollaborateCom 2012)<\/em>, October 14\u201317, 2012, Pittsburgh, PA.<\/li>\r\n<li>Towards provenance and risk-awareness in social computing<br \/>Yuan Cheng, Dang Nguyen, Khalid Bijon, Ram Krishnan, Jaehong Park and Ravi Sandhu<br \/><em>International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012)<\/em>, September 19\u201323, 2012, Minneapolis, MN.<\/li>\r\n<li>A role-based administration model for attributes<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>International Workshop on Secure and Resilient Architectures and Systems (SRAS 2012)<\/em>, September 19\u201323, 2012, Minneapolis, MN.<\/li>\r\n<li>Design and Low Power VLSI Implementation of Triple-DES Algorithm<br \/>Alexandra Camacho, Eugene John and Ram Krishnan<br \/>World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP&#8217;12), Las Vegas, NV, July 16-19, 2012.<\/li>\r\n<li>Towards Security Policy and Architecture for Managing Implantable Medical Devices<br \/>Ram Krishnan, Eugene John and Manoj Panday<br \/>World Congress in Computer Science, Computer Engineering, and Applied Computing (WORLDCOMP&#8217;12), Las Vegas NV, July 16-19, 2012.<\/li>\r\n<li>A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC<br \/>Xin Jin, Ram Krishnan and Ravi Sandhu<br \/><em>Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2012)<\/em>, Paris, France, July 11-13, 2012.<\/li>\r\n<li>A Group-Centric Model for Collaboration with Expedient Insiders in Multilevel Systems<br \/>Khalid Bijon, Ravi Sandhu and Ram Krishnan<br \/><em>IEEE International Symposium on Security in Collaboration Technologies and Systems (SECOTS 2012)<\/em>, Denver, CO, May 24th, 2012.<\/li>\r\n<li>Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Information Systems Security (ICISS 2011),<\/em> Kolkata, India, December 15-19, 2011. Detailed version with proof.<\/li>\r\n<li>RT-Based Administrative Models for Community Cyber Security Information Sharing<br \/>Ravi Sandhu, Khalid Zaman Bijon, Xin Jin, and Ram Krishnan<br \/><em>IEEE International Workshop on Trusted Collaboration (TrustCol 2011),<\/em> Orlando, Florida, October 15, 2011.<\/li>\r\n<li>Towards a Discipline of Mission-Aware Cloud Computing<br \/>Ravi Sandhu, Raj Boppana, Ram Krishnan, Jeff Reich, Todd Wolff and Josh Zachry<br \/><em>ACM Cloud Computing Security Workshop (CCSW 2010),<\/em> Oct 08, 2010, Chicago, Illinois.<em><br \/>(held in conjunction with ACM Conference on Computer and Communications Security (CCS 2010))<\/em><\/li>\r\n<li>Towards Secure Information Sharing Models for Community Cyber Security<br \/>Ravi Sandhu, Ram Krishnan and Greg White<br \/><em>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing<\/em>, Oct 09-12, 2010, Chicago, Illinois.<\/li>\r\n<li>Group-Centric Models for Secure and Agile Information Sharing <em><br \/>Ravi Sandhu, Ram Krishnan, Jianwei Niu and William Winsborough<br \/>International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS)<\/em>, September 8-11, 2010, St. Petersburg, Russia. Springer Lecture Notes in Computer Science.<\/li>\r\n<li>Towards a Framework for Group-Centric Secure Collaboration<br \/>Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough<br \/>IEEE International Conference on Collaborative Computing (CollaborateCom): Networking, Applications and Worksharing, Nov 11-14, 2009, Crystal City, Washington D.C.<\/li>\r\n<li>A Hybrid Enforcement Model for Group-Centric Secure Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/>IEEE International Symposium on Secure Computing (SecureCom 2009), August 29-31, 2009, Vancouver, Canada. Detailed Version.<\/li>\r\n<li>Foundations for Group-Centric Secure Information Sharing Models<br \/>Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough<br \/>ACM Symposium on Access Control Models and Technologies (SACMAT), June 3-5, 2009, Stresa, Italy<\/li>\r\n<li>Enforcement Architecture and Implementation Model for Group-Centric Information Sharing<br \/>Ram Krishnan and Ravi Sandhu<br \/>International Workshop on Security and Communication Networks (IWSCN), May 20-22, 2009, Trondheim, Norway.<\/li>\r\n<li>A Conceptual Framework for Group-Centric Secure Information Sharing Model<em><br \/>R am Krishnan, Ravi Sandhu , Jianwei Niu and William Winsborough<br \/>ACM Symposium on Information, Computer and Communications Security (ASIACCS) <\/em>, March 10 \u2013 12, 2009, Sydney, Australia.<\/li>\r\n<li>Stale-Safe Security Properties for Group-Based Secure Information Sharing<br \/>Ram Krishnan, Jianwei Niu, Ravi Sandhu and William Winsborough<br \/><em>ACM workshop on Formal Methods in Security Engineering (FMSE)<\/em>. Oct 27- Oct 31, 2008, Alexandria, Virginia, USA.<\/li>\r\n<li>A New Modeling Paradigm for Dynamic Authorization in Multi-domain Systems<br \/>Manoj Sastry, Ram Krishnan and Ravi Sandhu<br \/><em>International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security (MMM-ACNS) <\/em>. September 13-15, 2007, St. Petersburg, Russia.\u00a0Detailed version.<\/li>\r\n<li>PEI Models towards Scalable, Usable and High-Assurance Information Sharing<br \/>Ram Krishnan, Ravi Sandhu and Kumar Ranganathan<br \/><em>ACM Symposium on Access Control Models and Technologies (SACMAT) <\/em>. June 20-22, 2007, Nice-Sophia Antipolis, France.\u00a0Detailed version.<\/li>\r\n<li>Efficient and Reliable Link State Information Dissemination<br \/>N. Ansari, G. Cheng, and Ram N. Krishnan<br \/><em>IEEE Communications Letters<\/em>, Vol. 8, No. 5, pp. 317-319, May 2004.<\/li>\r\n<\/ol>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\">Journal Publications<\/h2>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<ol class=\"wp-block-list\">\r\n<li>Visualizing Convolutional Neural Network Models\u2019 Sensitivity to Nonnatural Data Order<br \/>Randy Klepetko and Ram Krishnan<br \/>Springer Information System Frontiers (Sep 2022). <a href=\"https:\/\/doi.org\/10.1007\/s10796-022-10330-0\">https:\/\/doi.org\/10.1007\/s10796-022-10333-0<\/a><\/li>\r\n<li>David Rodriguez, Tapsya Nayak, Yidong Chen, Ram Krishnan and Yufei<br \/>Huang<br \/>On the Role of Deep Learning Model Complexity in Adversarial Robustness for Medical Images.<br \/>BMC Medical Informatics and Decision Making, Springer Nature Series, Vol 22, Article 160, June 2022. https:\/\/doi.org\/10.1186\/s12911-022-01891-w<\/li>\r\n<li>Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence<br \/>Md. Farhan Haque and Ram Krishnan<br \/>Springer Information System Frontiers (Feb 2021). https:\/\/doi.org\/10.1007\/s10796-020-10103-7<\/li>\r\n<li>A Formal Specification of Access Control in Android with URI Permissions<br \/>Samir Talegaon and Ram Krishnan<br \/>Springer Information System Frontiers (Nov 2020). https:\/\/doi.org\/10.1007\/s10796-020-10066-9<\/li>\r\n<li>Administrative Models for Role Based Access Control in Android<br \/>Samir Talegaon and Ram Krishnan<br \/><em>Journal of Internet Services and Information Security, Vol. 10, Issue 3, pp 31-46, August 2020.<\/em><\/li>\r\n<li>Policy Review in Attribute Based Access Control &#8211; A Policy Machine Case Study<br \/>Sherifdeen Lawal and Ram Krishnan<br \/><em>Journal of Internet Services and Information Security, Vol. 10, Issue 2, pp 67-81, May 2020.<\/em><\/li>\r\n<li>Algorithms for Joint Sensor and Control Nodes Selection in Dynamic Networks<br \/>Sebastian Nugroho, Ahmad Taha, Nikolaos Gatsis, Tyler Summers and Ram Krishnan<br \/><em>Automatica, Volume 106, August 2019, Pages 124-133<\/em>.<\/li>\r\n<li>Access Control in Cloud IaaS<br \/>Yun Zhang, Ram Krishnan , Farhan Patwa and Ravi Sandhu<br \/>In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le\u2010Khac), 2019.<\/li>\r\n<li>Access Control in Cloud IaaS. In Security, Privacy, and Digital Forensics in the Cloud (eds L. Chen, H. Takabi and N. Le\u2010Khac).<\/li>\r\n<li>Periodic Virtual Hierarchy: A Trust Model for Smart Grid Devices<br \/>Arezou Moussavi-Khalkhali, Ram Krishnan, and Mo Jamshidi<br \/><em>International Journal of Security and Its Applications<\/em>, Vol. 10, No. 11, November 2016.<\/li>\r\n<li>Sequence Diagram Aided Privacy Policy Specification<br \/>Hui Shen, Ram Krishnan, Rocky Slavin, and Jianwei Niu<br \/><em>IEEE Transactions on Dependable and Secure Computing (IEEE TDSC)<\/em>, Vol. 13, No. 3, pp. 381-393, May-June 1 2016.<\/li>\r\n<li>Time Series Forecasting of Cloud Data Center Workloads for Dynamic Resource Provisioning<br \/>Carlos Vazquez, Ram Krishnan and Eugene John<br \/>Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol 6, No. 3, pp 87-110, September 2015.<\/li>\r\n<li>Design And Implementation of Low-Power Nanoscale Cryptosystem for Group-Centric Secure Information Sharing<br \/>Valliyappan Valliyappan, Eugene John, Ram Krishnan and Sruthi Nanduru<br \/><em>Research Briefs on Informaiton &amp; Communication Technology Evolution (ReBICTE)<\/em>, Vol. 1, No. 20, August 31, 2015.<\/li>\r\n<li>Kerberos-Based Authentication for OpenStack Cloud Infrastructure as a Service<br \/>Sazzad Masud and Ram Krishnan<br \/><em>Journal of IT CoNvergence PRActice (INPRA)<\/em>, Vol. 3, No. 2, pp 1-24, June 2015.<\/li>\r\n<li>Securing Implantable Cardioverter Defibrillators Using Smartphones<br \/>Jiwan Ninglekhu, Ram Krishnan, Eugene John, and Manoj Panday<br \/><em>Journal of Internet Services and Information Security<\/em>, Vol. 5, Issue 2, pp 47-64, May 2015.<\/li>\r\n<li>Constraints Specification in Attribute Based Access Control<br \/>Khalid Bijon, Ram Krishnan and Ravi Sandhu<br \/><em>IEEE\/ASE Science Journal<\/em>, Vol. 2, No. 3, 2013, pp 131-144.<\/li>\r\n<li>Collaboration in Multicloud Computing Environments: Framework and Security Issues<br \/>Mukesh Singhal, Santosh Chandrasekhar, Tingjian Ge, Ravi Sandhu, Ram Krishnan, Gail-Joon Ahn, Elisa Bertino<br \/><em>IEEE Computer<\/em>, Vol. 46, Issue 2, pp 76-84, Februrary 2013.<\/li>\r\n<li>Group-Centric Secure Information Sharing Models for Isolated Groups<br \/>Ram Krishnan, Jianwei Niu, Ravi Sandhu and William H. Winsborough<br \/><em>ACM Transactions on Information and System Security<\/em> (ACM TISSEC), Vol. 14, Issue 3, pp 1-29, 2011. Electronic Appendix. NuSMV Code (model checking).<\/li>\r\n<\/ol>\r\n","protected":false},"excerpt":{"rendered":"<p>You can also see my Google Scholar Public Profile. Conference Publications [To appear] Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large Language Models\u0110or\u0111e Klisura, Joseph Khoury, Ashish Kundu, Ram Krishnan, and Anthony Rios19th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2026), Rabat, Morocco, March 24-29, 2026. Optimizing Machine Learning Based &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Publications&#8221;<\/span><\/a><\/p>\n","protected":false},"author":24,"featured_media":0,"parent":0,"menu_order":1,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-384","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Publications - Ram Krishnan<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Publications - Ram Krishnan\" \/>\n<meta property=\"og:description\" content=\"You can also see my Google Scholar Public Profile. Conference Publications [To appear] Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large Language Models\u0110or\u0111e Klisura, Joseph Khoury, Ashish Kundu, Ram Krishnan, and Anthony Rios19th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2026), Rabat, Morocco, March 24-29, 2026. Optimizing Machine Learning Based &hellip; Continue reading &quot;Publications&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/\" \/>\n<meta property=\"og:site_name\" content=\"Ram Krishnan\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-11T14:47:46+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\",\"name\":\"Publications - Ram Krishnan\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\"},\"datePublished\":\"2022-05-02T17:27:35+00:00\",\"dateModified\":\"2026-02-11T14:47:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/publications\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Publications\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/#website\",\"url\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/\",\"name\":\"Ram Krishnan\",\"description\":\"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ceid.utsa.edu\\\/rkrishnan\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Publications - Ram Krishnan","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","og_locale":"en_US","og_type":"article","og_title":"Publications - Ram Krishnan","og_description":"You can also see my Google Scholar Public Profile. Conference Publications [To appear] Role-Conditioned Refusals: Evaluating Access Control Reasoning in Large Language Models\u0110or\u0111e Klisura, Joseph Khoury, Ashish Kundu, Ram Krishnan, and Anthony Rios19th Conference of the European Chapter of the Association for Computational Linguistics (EACL 2026), Rabat, Morocco, March 24-29, 2026. Optimizing Machine Learning Based &hellip; Continue reading \"Publications\"","og_url":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","og_site_name":"Ram Krishnan","article_modified_time":"2026-02-11T14:47:46+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/","name":"Publications - Ram Krishnan","isPartOf":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website"},"datePublished":"2022-05-02T17:27:35+00:00","dateModified":"2026-02-11T14:47:46+00:00","breadcrumb":{"@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/publications\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ceid.utsa.edu\/rkrishnan\/"},{"@type":"ListItem","position":2,"name":"Publications"}]},{"@type":"WebSite","@id":"https:\/\/ceid.utsa.edu\/rkrishnan\/#website","url":"https:\/\/ceid.utsa.edu\/rkrishnan\/","name":"Ram Krishnan","description":"Professor &amp; Chair | Department of Computer Engineering | UT San Antonio","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ceid.utsa.edu\/rkrishnan\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/384","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/comments?post=384"}],"version-history":[{"count":0,"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/pages\/384\/revisions"}],"wp:attachment":[{"href":"https:\/\/ceid.utsa.edu\/rkrishnan\/wp-json\/wp\/v2\/media?parent=384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}