D. Richard Kuhn
#161,694
Most Influential Person Now
D. Richard Kuhn's AcademicInfluence.com Rankings
D. Richard Kuhncomputer-science Degrees
Computer Science
#9356
World Rank
#9829
Historical Rank
Database
#6323
World Rank
#6555
Historical Rank

Download Badge
Computer Science
D. Richard Kuhn's Degrees
- PhD Computer Science University of Maryland, College Park
- Masters Computer Science University of Maryland, College Park
- Bachelors Computer Science University of Maryland, College Park
Similar Degrees You Can Earn
Why Is D. Richard Kuhn Influential?
(Suggest an Edit or Addition)D. Richard Kuhn's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Proposed NIST standard for role-based access control (2001) (2653)
- The NIST model for role-based access control: towards a unified standard (2000) (1031)
- Role-Based Access Controls (2009) (835)
- Software fault interactions and implications for software testing (2004) (787)
- Adding Attributes to Role-Based Access Control (2010) (431)
- A role-based access control model and reference implementation within a corporate intranet (1999) (424)
- Attribute-Based Access Control (2017) (363)
- IPOG: A General Strategy for T-Way Software Testing (2007) (350)
- Role-Based Access Control ( RBAC ) : Features and Motivations (2014) (299)
- Introduction to Combinatorial Testing (2013) (230)
- Security Considerations for Voice Over IP Systems (2005) (230)
- FAILURE MODES IN MEDICAL DEVICE SOFTWARE: AN ANALYSIS OF 15 YEARS OF RECALL DATA (2001) (216)
- Sources of Failure in the Public Switched Telephone Network (1997) (209)
- IPOG/IPOG‐D: efficient test generation for multi‐way combinatorial testing (2008) (190)
- Practical Combinatorial Testing: Beyond Pairwise (2008) (190)
- Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems (1997) (173)
- Practical Combinatorial Testing (2010) (168)
- Security Standards for the RFID Market (2005) (167)
- Refining the In-Parameter-Order Strategy for Constructing Covering Arrays (2008) (156)
- ACTS: A Combinatorial Test Generation Tool (2013) (149)
- IPOG-IPOG-D: efficient test generation for multi-way combinatorial testing (2008) (149)
- SP 800-32. Introduction to Public Key Technology and the Federal PKI Infrastructure (2001) (143)
- Combinatorial Software Testing (2009) (134)
- Learning Internet-of-Things Security "Hands-On" (2016) (127)
- Data Loss Prevention (2010) (120)
- Role-Based Access Control (2nd ed.) (2007) (105)
- Fault classes and error detection capability of specification-based testing (1999) (101)
- Challenges in securing voice over IP (2005) (99)
- RBAC Standard Rationale: Comments on "A Critique of the ANSI Standard on Role-Based Access Control" (2007) (88)
- Extensible Access Control Markup Language (XACML) and Next Generation Access Control (NGAC) (2016) (87)
- Combinatorial Methods for Event Sequence Testing (2012) (86)
- An Efficient Algorithm for Constraint Handling in Combinatorial Test Generation (2013) (76)
- A Survey of Binary Covering Arrays (2011) (74)
- Combinatorial Testing of ACTS: A Case Study (2012) (72)
- Role-Based Access Control, Second Edition (2007) (63)
- Combinatorial Testing: Theory and Practice (2015) (56)
- Combinatorial Coverage Measurement Concepts and Applications (2013) (52)
- Combinatorial Testing for Software: an Adaptation of Design of Experiments (2013) (50)
- Model Checking for Verification of Mandatory Access Control Models and Properties (2011) (49)
- Identifying Failure-Inducing Combinations in a Combinatorial Test Set (2012) (49)
- A combinatorial approach to building navigation graphs for dynamic web applications (2009) (47)
- Constraint handling in combinatorial test generation using forbidden tuples (2015) (43)
- Study of BGP Peering Session Attacks and Their Impacts on Routing Performance (2006) (40)
- Introducing Combinatorial Testing in a Large Organization (2015) (37)
- A method for analyzing system state-space coverage within a t-wise testing framework (2010) (35)
- Property Verification for Generic Access Control Models (2008) (35)
- Managing Security: The Security Content Automation Protocol (2011) (34)
- COMBINATORIAL TESTING (2011) (34)
- Composing and combining policies under the policy machine (2005) (33)
- Finding Bugs in Cryptographic Hash Function Implementations (2018) (33)
- An Access Control scheme for Big Data processing (2014) (31)
- Quantum computing and communication (2002) (31)
- Applying Combinatorial Testing to the Siemens Suite (2013) (31)
- SP 800-142. Practical Combinatorial Testing (2010) (31)
- Lessons from 342 medical device failures (1999) (30)
- Fault localization based on failure-inducing combinations (2013) (29)
- An Empirical Comparison of Combinatorial and Random Testing (2014) (28)
- Role based access control on MLS systems without kernel changes (1998) (28)
- Cost Effective Use of Formal Methods in Verification and Validation (2002) (28)
- Combinatorial Methods in Security Testing (2016) (27)
- BEN: A combinatorial testing-based fault localization tool (2015) (27)
- An Input Space Modeling Methodology for Combinatorial Testing (2013) (26)
- Isolating Failure-Inducing Combinations in Combinatorial Testing Using Test Augmentation and Classification (2012) (25)
- A Comparison of Attribute Based Access Control (ABAC) Standards for Data Service Applications (2015) (25)
- A combinatorial approach to detecting buffer overflow vulnerabilities (2011) (24)
- Cost Effective Uses of Formal Methods in Verification and Validation (2002) (23)
- Combinatorial Test Generation for Software Product Lines Using Minimum Invalid Tuples (2014) (23)
- An analysis of selected software safety standards (1992) (23)
- Rethinking Distributed Ledger Technology (2019) (22)
- Vetting Mobile Apps (2011) (21)
- Future directions in role-based access control (1996) (20)
- Measuring and specifying combinatorial coverage of test input configurations (2016) (20)
- Random vs. Combinatorial Methods for Discrete Event Simulation of a Grid Computer Network (2009) (20)
- High integrity software standards and guidelines (1992) (20)
- Combinatorial coverage as an aspect of test quality (2015) (19)
- Combinatorial Methods for Explainable AI (2020) (18)
- A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography (2003) (18)
- Implementing and Managing Policy Rules in Attribute Based Access Control (2015) (18)
- Surviving Insecure IT: Effective Patch Management (2009) (18)
- The computational complexity of enforceability validation for generic access control rules (2006) (18)
- A Technique for Analyzing the Effects of Changes in Formal Specifications (1992) (18)
- Guide to Attribute Based Access Control (ABAC) Definition and Considerations [includes updates as of 02-25-2019] (2019) (17)
- CAGEN: A fast combinatorial test generation tool with support for constraints and higher-index arrays (2020) (16)
- The Relationship between Software Bug Type and Number of Factors Involved in Failures (2016) (16)
- Pseudo-Exhaustive Testing of Attribute Based Access Control Rules (2016) (15)
- How does combinatorial testing perform in the real world: an empirical study (2020) (15)
- Role Based Access Control for the World Wide Web | NIST (1997) (15)
- Applying Combinatorial Testing to Data Mining Algorithms (2017) (15)
- Efficient Algorithms for T-way Test Sequence Generation (2012) (15)
- Toward Credible IT Testing and Certification (1999) (14)
- It Doesn’t Have to Be Like This: Cybersecurity Vulnerability Trends (2017) (14)
- Fault Classes and Error Detection in Specification Based Testing | NIST (1998) (14)
- Access Control for Emerging Distributed Systems (2018) (14)
- Improving MC/DC and Fault Detection Strength Using Combinatorial Testing (2017) (14)
- Applying Combinatorial Testing to Large-Scale Data Processing at Adobe (2019) (13)
- Formal specification and verification of control software for cryptographic equipment (1990) (13)
- Introducing Combinatorial Testing in a Large Organization: Pilot Project Experience Report (2014) (13)
- Practical Application of Formal Methods in Modeling and Simulation (2003) (13)
- Using combinatorial testing to build navigation graphs for dynamic web applications (2016) (12)
- What Happened to Software Metrics? (2017) (12)
- Evaluating the Effectiveness of BEN in Localizing Different Types of Software Fault (2016) (12)
- Combinatorial Testing Metrics for Machine Learning (2021) (11)
- SP 800-58. Security Considerations for Voice Over IP Systems (2005) (11)
- Estimating t-Way Fault Profile Evolution During Testing (2016) (10)
- Testing IoT Systems (2018) (10)
- An Approach to T-Way Test Sequence Generation With Constraints (2019) (10)
- Cybertrust in the IoT Age (2018) (10)
- A general conformance testing framework for IEEE 11073 PHD's communication model (2013) (10)
- Browser fingerprinting using combinatorial sequence testing (2019) (10)
- Combinatorial and MC/DC Coverage Levels of Random Testing (2017) (10)
- Security for Telecommuting and Broadband Communications (2002) (10)
- Optimizing IPOG's Vertical Growth with Constraints Based on Hypergraph Coloring (2017) (9)
- An Analysis of Vulnerability Trends, 2008-2016 (2017) (9)
- A quantum cryptographic protocol with detection of compromised server (2003) (9)
- CCM: A Tool for Measuring Combinatorial Coverage of System State Space (2013) (9)
- Introduction: Cybersecurity (2010) (9)
- Software Testing (2014) (8)
- Evaluation of Fault Detection Effectiveness for Combinatorial and Exhaustive Selection of Discretized Test Inputs (2012) (8)
- Vulnerabilities in Quantum Key Distribution Protocols (2003) (8)
- Combinatorial and Random Testing Effectiveness for a Grid Computer Simulator (2009) (8)
- Practical Interdomain Routing Security (2009) (8)
- Improving IPOG's vertical growth based on a graph coloring scheme (2015) (8)
- Vulnerability hierarchies in access control configurations (2011) (7)
- Tower of covering arrays (2015) (7)
- TLS Cipher Suites Recommendations: A Combinatorial Coverage Measurement Approach (2016) (7)
- Access Control Policy Verification (2016) (7)
- Systematic Testing of Post-Quantum Cryptographic Implementations Using Metamorphic Testing (2019) (7)
- Vulnerability Trends: Measuring Progress (2010) (7)
- Combinatorial Testing of Full Text Search in Web Applications (2017) (7)
- Introducing "Insecure IT" (2009) (6)
- SP 800-24. PBX Vulnerability Analysis: Finding Holes in Your PBX Before Someone Else Does (2001) (6)
- Understanding Insecure IT: Practical Risk Assessment (2009) (6)
- Cyberthreats and Security (2018) (6)
- Combinatorial Coverage Measurement (2012) (6)
- Can Reducing Faults Prevent Vulnerabilities? (2018) (6)
- Advanced Combinatorial Test Methods for System Reliability (2010) (6)
- Attribute considerations for access control systems (2019) (6)
- Equivalence class verification and oracle-free testing using two-layer covering arrays (2015) (5)
- Role-Based Access Control (1st ed.) (2003) (5)
- An algorithm for generating very large covering arrays (2006) (5)
- Role Engineering: Methods and Standards (2011) (5)
- A Combinatorial Approach to Explaining Image Classifiers (2021) (5)
- An application of combinatorial methods to conformance testing for document object model events (2010) (4)
- Vulnerabilities in Quantum Key Distribution Protocols | NIST (2003) (4)
- Protecting Wireless Local Area Networks (2012) (4)
- Security for Telecommuting and Broadband Communications: Recommendations of the National Institute of Standards and Technology (2003) (4)
- Towards an Automated Unified Framework to Run Applications for Combinatorial Interaction Testing (2019) (4)
- A Combinatorial Approach to Testing Deep Neural Network-based Autonomous Driving Systems (2021) (4)
- Role-Based Access Controls | NIST (1992) (4)
- Practical combinatorial (t-way) methods for detecting complex faults in regression testing (2011) (4)
- Understanding and Fixing Complex Faults in Embedded Cyberphysical Systems (2021) (4)
- Computer Science Education in 2018 (2018) (4)
- Improving public switched network security in an open environment (1993) (4)
- Converting System Failure Histories Into Future Win Situations (2000) (3)
- Effectiveness of dataset reduction in testing machine learning algorithms (2020) (3)
- What proportion of vulnerabilities can be attributed to ordinary coding errors?: poster (2018) (3)
- Detecting Vulnerabilities in Android Applications using Event Sequences (2019) (3)
- Applying higher strength combinatorial criteria to test case prioritization : a case study (2012) (3)
- Measuring Combinatorial Coverage at Adobe (2019) (3)
- Combinatorial testing for software used in metrology (2012) (3)
- IoT Metrology (2018) (3)
- Software Quality Lessons From Medical Device Failure Data | NIST (1999) (2)
- Using Parameter Mapping to Avoid Forbidden Tuples in a Covering Array (2019) (2)
- Estimating Fault Detection Effectiveness (2014) (2)
- An exploration of combinatorial testing-based approaches to fault localization for explainable AI (2021) (2)
- Systematic Software Testing of Critical Embedded Digital Devices in Nuclear Power Applications (2020) (2)
- Factorials Experiments, Covering Arrays, and Combinatorial Testing (2021) (2)
- Property verification for access control models via model checking (2008) (2)
- Combinatorially XSSing Web Application Firewalls (2021) (2)
- Combinatorial methods for testing Internet of Things smart home systems (2021) (2)
- CT-IoT: a combinatorial testing-based path selection framework for effective IoT testing (2021) (2)
- Measuring Combinatorial Coverage of System State-space for IV&V | NIST (2012) (2)
- Combinatorial Test Generation for Multiple Input Models With Shared Parameters (2022) (2)
- Combinatorial Coverage Measurement of Test Vectors used in Cryptographic Algorithm Validation (Presentation) (2017) (2)
- A Trusted Federated System to Share Granular Data Among Disparate Database Resources (2021) (2)
- General Methods for Access Control Policy Verification (Application Paper) (2016) (2)
- MCDC-Star: A White-Box Based Automated Test Generation for High MC/DC Coverage (2018) (2)
- Security in Open Systems | NIST (1994) (2)
- Border Gateway Protocol Security | NIST (2007) (1)
- Knowledge Extraction for Cryptographic Algorithm Validation Test Vectors by Means of Combinatorial Coverage Measurement (2019) (1)
- Proceedings of the Workshop on High Integrity Software; Gaithersburg, MD; Jan. 22-23, 1991 | NIST (1991) (1)
- Pseudo-Exhaustive Verification of Rule Based Systems (2018) (1)
- Aggregating Atomic Clocks for Time-Stamping (2020) (1)
- A Model for T-Way Fault Profile Evolution during Testing (2017) (1)
- A Combinatorial Approach to Fairness Testing of Machine Learning Models (2022) (1)
- The Path to a Consensus on Artificial Intelligence Assurance (2022) (1)
- IT Risks (2014) (1)
- Panel: The next generation of acess control models (panel session): do we need them and what should they be? (2001) (1)
- Educating Next-Gen Computer Scientists (2018) (1)
- Combinatorial Methods in Software Testing (2015) (1)
- Combinatorial security testing course (2018) (1)
- Characterizing the Risks and Costs of BGP Insecurity/Security | NIST (2005) (1)
- Combinatorial Methods in Testing (1)
- SP 800-54. Border Gateway Protocol Security (2007) (1)
- A Method-Level Test Generation Framework for Debugging Big Data Applications (2018) (1)
- Security or Privacy: Can You Have Both? (2020) (1)
- Efficient Verification of Equivalence Classes and Simultaneous Testing Using Two-layer Covering Arrays (2015) (1)
- In IoT We Trust? (2018) (1)
- Taking Score on the Success of Blockchain, So Far (2019) (1)
- A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences (2021) (1)
- Quantum Computing and Communication | NIST (2002) (1)
- IT Security [Guest editors' introduction] (2015) (0)
- 1 Evolution from Design of Experiments ( R . Kacker ) (2013) (0)
- Leading-Edge Technologies (2019) (0)
- Report on the Advanced Software Technology Workshop February 1, 1994 | NIST (1994) (0)
- Securing Voice Over Internet Protocol (IP) Networks | NIST (2004) (0)
- Authentication, Authorization, Access Control, and Privilege Management (2008) (0)
- Educating Next-Gen Computer Scientists | NIST (2018) (0)
- Software Fault Complexity and Implications for Software Testing (2004) (0)
- Combinatorial as an Aspect of Test Quality (2015) (0)
- Internet of Things (IoT) Metrology (2018) (0)
- Introduction to Combinatorial Testing: Preface, Appendix A (Mathematics Review), and Appendix B (Empirical Data on Software Failures) | NIST (2013) (0)
- Role-Based Access Control, Second Edition | NIST (2006) (0)
- Measuring Combinatorial Coverage | NIST (2013) (0)
- Combinatorial Testing: Theory and Practice, Section 8. | NIST (2015) (0)
- Number 17 (2017) (0)
- Poster: What Proportion of Vulnerabilities can be Attributed to Ordinary Coding Errors? (2018) (0)
- Combinatorial Testing Applied | NIST (2013) (0)
- Vetting Mobile Apps | NIST (2011) (0)
- Software Certification: Testing and Measurement (1999) (0)
- Security for Private Branch Exchange Systems | NIST (2000) (0)
- System Reliability using Simulation Models and Formal Methods (2016) (0)
- Correction to: Factorials Experiments, Covering Arrays, and Combinatorial Testing (2021) (0)
- General Methods for Access Control Policy Verification (2017) (0)
- Introducing Combinatorial Testing to a Large System-Software Organization (2015) (0)
- A Distributed Ledger Technology Design using Hyperledger Fabric and a Clinical Trial Use Case (2022) (0)
- An analysis of selected software safety standards (1992) (0)
- Combinatorial Methods in Testing | NIST (2013) (0)
- Evaluation of T-Way Testing of DNNs in Autonomous Driving Systems (2021) (0)
- Study of a Prototype Software Engineering Environment | NIST (1986) (0)
- Study of BGP Peering Session Attacks and Their Impacts or Performance | NIST (2006) (0)
- Computer Science in Education 2018 (2018) (0)
- Automated Combinatorial Test Methods: Beyond Pairwise Testing | NIST (2008) (0)
- Cyberthreats in 2025 (2020) (0)
- IT Risks | NIST (2014) (0)
- Generating extended state transitions from structured specifications for process control systems (1989) (0)
- IT Pro Conference on Information Systems Governance (2014) (0)
- A New Approach to Data Sharing and Distributed Ledger Technology: A Clinical Trial Use Case (2021) (0)
- Data Block Matrix and Hyperledger Implementation: Extending Distributed Ledger Technology for Privacy Requirements (2023) (0)
- Combinatorial Testing | NIST (2012) (0)
- Attack vs. Countermeasure Effectiveness (ACE): Modeling Tool for BGP | NIST (2004) (0)
- A Survey of Binary Covering Arrays | NIST (2011) (0)
- NISTIR 7878 Combinatorial Coverage Measurement (2012) (0)
- Autonomous System (AS) Isolation under Randomized BGP Session Attacks with RFD Exploitation | NIST (2006) (0)
- ITL Bulletin: Combinatorial Testing for Cybersecurity and Reliability (May 2016) (2016) (0)
- Evolution From Design of Experiments | NIST (2013) (0)
- Incorporating Subjective Risk Vales in BGP Attack Trees | NIST (2004) (0)
- Message from the WAAM 2022 Chairs (2022) (0)
- General message from the workshop organizers - IWCT (2015) (0)
- DeltaExplainer: A Software Debugging Approach to Generating Counterfactual Explanations (2022) (0)
- Role Engineering: Methods and Standards | NIST (2011) (0)
- Securing Voice Over IP Networks | NIST (2005) (0)
- In IoT We Trust? | NIST (2018) (0)
- How do Ordinary Coding Errors Contribute to Security Vulnerabilities? (2020) (0)
- Narrow Spectrum Software Testing Addressing Complexity and Trust (2020) (0)
- Security for Private Branch Exchange Systems (2000) (0)
- IR 8101 i A Rational Foundation for Software Metrology (2016) (0)
- ITL Bulletin: Securing Voice Over Internet Protocol (IP) Networks [October 2004] (2004) (0)
- Combinatorial Coverage Analysis of Subsets of the TLS Cipher Suite Registry | NIST (2016) (0)
- Enabling AI Adoption through Assurance (2022) (0)
This paper list is powered by the following services: