| Role-based access control D Ferraiolo, DR Kuhn, R Chandramouli Artech house, 2003 | 4582 | 2003 |
| Role-based access controls D Ferriaolo, R Kuhn Proceedings of 15th NIST-NCSC National Computer Security Conference, 554-563, 1992 | 4247* | 1992 |
| The NIST model for role-based access control: towards a unified standard R Sandhu, D Ferraiolo, R Kuhn ACM workshop on Role-based access control 10 (344287.344301), 2000 | 1566 | 2000 |
| Guide to attribute based access control (ABAC) definition and considerations VC Hu, D Ferraiolo, R Kuhn, A Schnitzer, K Sandlin, R Miller, K Scarfone NIST special publication 800 (162), 1-54, 2014 | 1544 | 2014 |
| Role-based access control (RBAC): Features and motivations D Ferraiolo, J Cugini, DR Kuhn Proceedings of 11th annual computer security application conference, 241-48, 1995 | 1363 | 1995 |
| Software fault interactions and implications for software testing DR Kuhn, DR Wallace, AM Gallo IEEE transactions on software engineering 30 (6), 418-421, 2004 | 1087 | 2004 |
| Attribute-based access control VC Hu, DR Kuhn, DF Ferraiolo, J Voas Computer 48 (2), 85-88, 2015 | 784 | 2015 |
| A role-based access control model and reference implementation within a corporate intranet DF Ferraiolo, JF Barkley, DR Kuhn ACM Transactions on Information and System Security (TISSEC) 2 (1), 34-64, 1999 | 739 | 1999 |
| Adding attributes to role-based access control R Kuhn, E Coyne, T Weil | 686 | 2010 |
| IPOG: A general strategy for t-way software testing Y Lei, R Kacker, DR Kuhn, V Okun, J Lawrence 14th Annual IEEE International Conference and Workshops on the Engineering …, 2007 | 509 | 2007 |
| An investigation of the applicability of design of experiments to software testing DR Kuhn, MJ Reilly 27th Annual NASA Goddard/IEEE Software Engineering Workshop, 2002 …, 2002 | 481 | 2002 |
| Introduction to combinatorial testing DR Kuhn, RN Kacker, Y Lei CRC press, 2013 | 424 | 2013 |
| IPOG/IPOG‐D: efficient test generation for multi‐way combinatorial testing Y Lei, R Kacker, DR Kuhn, V Okun, J Lawrence Software Testing, Verification and Reliability 18 (3), 125-148, 2008 | 415 | 2008 |
| Assessment of access control systems VC Hu, D Ferraiolo, DR Kuhn US Department of Commerce, National Institute of Standards and Technology, 2006 | 366 | 2006 |
| Security considerations for voice over IP systems DR Kuhn, TJ Walsh, S Fries NIST special publication 800, 2005 | 354* | 2005 |
| Practical combinatorial testing DR Kuhn, RN Kacker, Y Lei NIST special Publication 800 (142), 142, 2010 | 304* | 2010 |
| Failure modes in medical device software: an analysis of 15 years of recall data DR Wallace, DR Kuhn International Journal of Reliability, Quality and Safety Engineering 8 (04 …, 2001 | 288 | 2001 |
| Sources of failure in the public switched telephone network DR Kuhn Computer 30 (4), 31-36, 1997 | 283 | 1997 |
| Practical combinatorial testing: Beyond pairwise R Kuhn, Y Lei, R Kacker It Professional 10 (3), 19-23, 2008 | 263 | 2008 |
| Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems DR Kuhn Proceedings of the second ACM workshop on Role-based access control, 23-30, 1997 | 259 | 1997 |