Jason Crampton

2.4k total citations
70 papers, 1.2k citations indexed

About

Jason Crampton is a scholar working on Sociology and Political Science, Artificial Intelligence and Computer Networks and Communications. According to data from OpenAlex, Jason Crampton has authored 70 papers receiving a total of 1.2k indexed citations (citations by other indexed papers that have themselves been cited), including 54 papers in Sociology and Political Science, 51 papers in Artificial Intelligence and 16 papers in Computer Networks and Communications. Recurrent topics in Jason Crampton's work include Access Control and Trust (54 papers), Cryptography and Data Security (35 papers) and Security and Verification in Computing (24 papers). Jason Crampton is often cited by papers focused on Access Control and Trust (54 papers), Cryptography and Data Security (35 papers) and Security and Verification in Computing (24 papers). Jason Crampton collaborates with scholars based in United Kingdom, Mexico and United States. Jason Crampton's co-authors include George Loizou, Stephen Swift, Gregory Gutin, Steve Counsell, Elisa Bertino, Federica Paci, Carl A. Gunter, Liang Chen, Anders Yeo and Konstantin Beznosov and has published in prestigious journals such as American Journal of Respiratory and Critical Care Medicine, Theoretical Computer Science and Lecture notes in computer science.

In The Last Decade

Jason Crampton

65 papers receiving 1.0k citations

Peers

Jason Crampton
Jonathan Moffett United Kingdom
Naftaly H. Minsky United States
David Ferraiolo United States
A. Ghafoor United States
Leo A. Meyerovich United States
P. David Stotts United States
Jonathan Moffett United Kingdom
Jason Crampton
Citations per year, relative to Jason Crampton Jason Crampton (= 1×) peers Jonathan Moffett

Countries citing papers authored by Jason Crampton

Since Specialization
Citations

This map shows the geographic impact of Jason Crampton's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Jason Crampton with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Jason Crampton more than expected).

Fields of papers citing papers by Jason Crampton

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Jason Crampton. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Jason Crampton. The network helps show where Jason Crampton may publish in the future.

Co-authorship network of co-authors of Jason Crampton

This figure shows the co-authorship network connecting the top 25 collaborators of Jason Crampton. A scholar is included among the top collaborators of Jason Crampton based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Jason Crampton. Jason Crampton is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Crampton, Jason, et al.. (2024). Bi-objective Optimization in Role Mining. ACM Transactions on Privacy and Security. 28(1). 1–22.
2.
Crampton, Jason, et al.. (2021). Valued Authorization Policy Existence Problem. arXiv (Cornell University). 1 indexed citations
3.
Crampton, Jason, et al.. (2019). Parameterized resiliency problems. Theoretical Computer Science. 795. 478–491. 3 indexed citations
4.
Bergé, P., et al.. (2018). The Authorization Policy Existence Problem. IEEE Transactions on Dependable and Secure Computing. 17(6). 1333–1344. 10 indexed citations
5.
Crampton, Jason, et al.. (2017). Attribute Expressions, Policy Tables and Attribute-Based Access Control. 79–90. 2 indexed citations
6.
Crampton, Jason, Andrei Gagarin, Gregory Gutin, & Mark Jones. (2015). On the Workflow Satisfiability Problem with Class-independent Constraints. DROPS (Schloss Dagstuhl – Leibniz Center for Informatics). 5 indexed citations
7.
Crampton, Jason, Gregory Gutin, & Daniel Karapetyan. (2015). Valued Workflow Satisfiability Problem. 3–13. 18 indexed citations
9.
Crampton, Jason. (2011). Practical and efficient cryptographic enforcement of interval-based access control policies. ACM Transactions on Information and System Security. 14(1). 1–30. 6 indexed citations
10.
Crampton, Jason & Michael Huth. (2009). Detecting and Countering Insider Threats: Can Policy-Based Access Control Help?. 4 indexed citations
11.
Crampton, Jason, et al.. (2008). Authorization recycling in RBAC systems. Figshare. 63–72. 17 indexed citations
12.
Crampton, Jason. (2006). Lazy Updates in Key Assignment Schemes for Hierarchical Access Control. American Journal of Respiratory and Critical Care Medicine. 197(10). P17–P18. 1 indexed citations
13.
Crampton, Jason. (2006). Applying hierarchical and role-based access control to XML documents.. Computer Systems: Science & Engineering. 21. 6 indexed citations
14.
Bertino, Elisa, Jason Crampton, & Federica Paci. (2006). Access Control and Authorization Constraints for WS-BPEL. Purdue e-Pubs (Purdue University System). 275–284. 41 indexed citations
15.
Crampton, Jason. (2005). Introduction to February 2005 issue of ISTR. Information Security Technical Report. 10(1). 1–1. 1 indexed citations
16.
Crampton, Jason, et al.. (2004). The Consistency of Task-Based Authorization Constraints in Workflow Systems. 17. 155–169. 47 indexed citations
17.
Crampton, Jason, et al.. (2003). Access Control in a Distributed Object Environment Using XML and Roles. South African Computer Journal. 31. 2–8. 1 indexed citations
18.
Crampton, Jason. (2003). On permissions, inheritance and role hierarchies. 85–92. 34 indexed citations
19.
Crampton, Jason. (2002). Administrative scope and role hierarchy operations. 1 indexed citations
20.
Crampton, Jason & George Loizou. (2001). Authorisation and antichains. ACM SIGOPS Operating Systems Review. 35(3). 6–15. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026