基本信息
views: 157

Bio
M.B.A. , Old Dominion University, (1993)
Ph. D. in Computer Science, University Of Iowa, (1987)
M. Tech in Computer Systems, Indian Institute of Technology, (1978)
B.E. in Electronics and Communications, Osmania University, (1976)
honors
One of Top Five Papers (out of 277), Fifth International Conference on Data Engineering Conference
2009: Best Paper Award, The 1st International Conference on Advanced Service Computing
2008: Best Paper Award, Spring Simulation Mluticonference 2008, BIS 2008
2007: Best Paper Award, Third International Computer Engineering Conference
2002: First Prize, Technical Track 2, AOL-CIT Finding Common Ground University Research Day
1994: Appointed to the Executive Committee of the IEEE Technical Committee on Operating Systems, IEEE
1994: Elected to Phi Kappa Phi, Phi Kappa Phi
1994: Selcted for Membership in Beta Gamma Sigma, Beta Gamma Sigma
1994: Most Inspiring Faculty Member Award, Old Dominion University
1992: Special Grant to attend IFIP WG 11.3, Center for Secure Information Systems
1989: Faculty Honor Award, Old Dominion University
1981: Outstanding Performance Award, TELCO-PUNE, India
1980: Outstanding Performance Award, TELCO-PUNE, India
1971: State Special Merit Scholarship for Academic Excellence
Book Chapters
Mukkamala, R., Alturi, V., Warner, J., and Abbadasari, R. A distributed coalition service registry for ad-hoc dynamic coalitions: A service-oriented approach. In: Advances in Data and Applications Security XX.
Ashok, V. G., and Mukkamala, R. (2014). A Scalable and Efficient Privacy Preserving Global Itemset Support Approximation Using Bloom Filters.Data and Applications Security and Privacy XXVIII (pp. 382?389). Springer Berlin Heidelberg.
Aditya, T., Baruah, P. K., and Mukkamala, R. (2011). Employing Bloom Filters for Enforcing Integrity of Outsourced Databases in Cloud Environments.Advances in Computing and Communications (pp. 446?460). Springer.
Mukkamala, R., Kamisetty, V., and Yedugani, P. (2009). Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper).Information Systems Security (pp. 318?325). Springer.
Das, M. L., and Mukkamala, R. (2008). Revisiting Bluetooth Security (Short Paper).Information Systems Security (pp. 132?139). Springer.
Das, M., and Mukkamala, R. (2008). Revisiting bluetooth security. In: ICISS 2008.. (pp. 132-139). LNCS 5352.
Mukkamala, R., and Vatsayi, V. (2007). Mobile commerce payment systems. In: Global Mobile Commerce: Strategic Perspectives and Implementation Cases.. IDEA Group, Inc..
Bhoopalam, K., Maly, K. J., Mukkamala, R., Zubair, M., Agrawal, D., and Kaminsky, D. (2006). A comparative study of specification models for autonomic access control of digital rights.Digital Rights Management. Technologies, Issues, Challenges and Systems (pp. 102?112). Springer.
Mukkamala, R., Atluri, V., and Warner, J. (2006). A distributed service registry for resource sharing among ad-hoc dynamic coalitions.Security Management, Integrity, and Internal Control in Information Systems (pp. 319?333). Springer.
Warner, J., Atluri, V., and Mukkamala, R. (2005). An attribute graph-based approach to map local access control policies to credential based access control policies. In: Information Systems Security. (pp. 134-147). LNCS.
Warner, J., Atluri, V., and Mukkamala, R. (2005). A credential-based approach for facilitating automatic resource sharing among ad-hoc dynamic coalitions.Data and Applications Security XIX (pp. 252?266). Springer.
Research Interests
Papers共 241 篇Author StatisticsCo-AuthorSimilar Experts
By YearBy Citation主题筛选期刊级别筛选合作者筛选合作机构筛选
时间
引用量
主题
期刊级别
合作者
合作机构
Eranga Bandara, Safdar H. Bouk,Sachin Shetty,Sandip Roy,Ravi Mukkamala, Abdul Rahman,Peter Foytik, Xueping Liang, Ng Wee Keong,Kasun De Zoysa
Consumer Communications and Networking Conferencepp.1-6, (2025)
2024 IEEE 21ST CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNCpp.439-445, (2024)
Journal of Risk and Financial Managementno. 9 (2024): 415
2024 20TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SMART SYSTEMS AND THE INTERNET OF THINGS, DCOSS-IOT 2024pp.361-368, (2024)
2024 IEEE CLOUD SUMMIT, CLOUD SUMMIT 2024pp.28-35, (2024)
Meshari Aljohani, Saeed H. Alshamrani, Edward G. Amoroso, Ahmed Amro, Richard Anderson, Paolo Balboni,Martim Taborda Barata, Jeffrey S. Bardin,Cataldo Basile, Giampaolo Bella,Chiara Braghin,Francesco Capparelli,Matteo Maria Casalino,Richard J. Chasdi, Thomas M. Chen,N. M. Istiak Chowdhury, Lauren Collins,Marco Cremonini, José de Arimatéia da Cruz, Christopher Day, Roberto Di Pietro,Scott R. Ellis,Tewfiq El Maliki, Evan Evangelopoulos,Sara Foresti,Kate Francis, Errin W. Fulp, Angelo Genovese, Anurag Gurtu, Jim Harmening, Ragib Hasan,Omi Hodwitz,Mohammad Aminul Hoque, Md Ismail Hossain,Emin Huseynov, Sokratis K. Katsikas,Georgios Kavallieratos,Steff King, Costas Lambrinoudakis, Keith Lewis, Damien Lim,Giovanni Livraga,Flavio Lombardi, John McDonald, John McGowan, Nailah A. Mims,Ravi Mukkamala,Simone Mutti, Pete F. Nicoletti, Kevin Noble, Stephan Olariu,Pramod Pandya,Stefano Paraboschi,Harsh Kupwade Patil,Thea Peacock, Ken Perkins,Nikolaos Pitropakis,Vincenzo Piuri, Robert Rounsavall,Peter Y.A. Ryan,Pierangela Samarati,Steve Schneider,Fabio Scotti, Jean-Marc Seigneur,Matteo Signorini, William Stallings,Sabrina De Capitani di Vimercati,Dan Wing, Brian Wolf,Zhe Xia, Roman Zabicki
Computer and Information Security Handbook (2024)
Hawaii International Conference on System Sciencespp.1546-1555, (2024)
Cited0Views0EIBibtex
0
0
Load More
Author Statistics
#Papers: 238
#Citation: 2346
H-Index: 24
G-Index: 29
Sociability: 6
Diversity: 2
Activity: 11
Co-Author
Co-Institution
D-Core
- 合作者
- 学生
- 导师
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn