The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Permission with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1991 (16) 1992-1996 (16) 1997-1999 (23) 2000-2001 (31) 2002 (24) 2003 (32) 2004 (42) 2005 (47) 2006 (42) 2007 (46) 2008 (62) 2009 (32) 2010 (22) 2011 (15) 2012 (25) 2013 (23) 2014 (31) 2015 (38) 2016 (51) 2017 (59) 2018 (54) 2019 (42) 2020 (55) 2021 (43) 2022 (46) 2023 (35) 2024 (5)
Publication types (Num. hits)
article(293) book(1) incollection(3) inproceedings(654) phdthesis(6)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 469 occurrences of 303 keywords

Results
Found 957 publication records. Showing 957 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
99Yang Zhao, John Boyland A Fundamental Permission Interpretation for Ownership Types. Search on Bibsonomy TASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ownership, Permission
67Yoonkyung Kim, Byeong-Mo Chang Visualization of Permission Checks in Java Using Static Analysis. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Java, static analysis, stack inspection
67Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
67Richard Bornat, Cristiano Calcagno, Peter W. O'Hearn, Matthew J. Parkinson Permission accounting in separation logic. Search on Bibsonomy POPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concurrency, logic, separation, permissions
57Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong Advanced Permission-Role Relationship in Role-Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Steve Zelinka, Michael Garland Permission grids: practical, error-bounded simplification. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF level of detail, Error bounds, surface simplification
51Yang Zhao, John Boyland Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Frédéric Cuppens, Alexandre Miège Administration Model for Or-BAC. Search on Bibsonomy OTM Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki An organizational file permission management system using the cellular data system. Search on Bibsonomy IDEAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attaching map, file permission information management, formula expression, cellular model, cyberworlds
48Ahmed Housni, Michel Tréhel Distributed Mutual Exclusion Token-Permission Based by Prioritized Groups. Search on Bibsonomy AICCSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Algorithm, Groups, Priority, Token, permission, Distributed Mutual Exclusion, Rooted tree
47Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby Modular string-sensitive permission analysis with demand-driven precision. Search on Bibsonomy ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Dan Hong, Vincent Y. Shen Setting Access Permission through Transitive Relationship in Web-based Social Networks. Search on Bibsonomy Weaving Services and People on the World Wide Web The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Liang Chen, Jason Crampton Applications of the Oriented Permission Role-Based Access Control Model. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. Search on Bibsonomy APWeb The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar Role Based Access Control with Spatiotemporal Context for Mobile Applications. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine
42Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden A Logic for Reasoning About Security. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds
41Yang Zhao, Ligong Yu, Jia Bei Assure Parallel Interference Patterns in Multithreaded Programs with Permissions. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Byeong-Mo Chang Static check analysis for Java stack inspection. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Java, Java, static analysis, stack inspection
41Jürgen Schlegelmilch, Ulrike Steffens Role mining with ORCA. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy
41Jim J. Longstaff, Mike A. Lockyer, John Nicholas The tees confidentiality model: an authorisation model for identities and roles. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas Flexible team-based access control using contexts. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF active security, access control, contexts, teams
41T. V. Lakshman, Dipak Ghosal Performance Evaluation of an Efficient Multiple Copy Update Algorithm. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF distributeddatabases, multiple copy update algorithm, Thomas majorityconsensus algorithm, response-time behavior, distributed update-synchronizationalgorithm, distributed mutual exclusion algorithm, multiple-copy update-synchronization, performance evaluation, performance evaluation, performance evaluation, transaction processing, queueing model
38Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. Search on Bibsonomy SERVICES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Permission Delegation, Security, Access Control, Mashup
38Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen A permission system for secure AOP. Search on Bibsonomy AOSD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF execution history, permission system, aspect-oriented programming, language-based security
38Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A Small But Non-negligible Flaw in the Android Permission Scheme. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Vulnerability, Android, Permission
37Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng An Extended Permission-Based Delegation Authorization Model. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann Permission Set Mining: Discovering Practical and Useful Roles. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Changyou Zhang, Liu Renfen, Yuanda Cao, Zhitao Guan The Permission Delegation Mechanism for P2P Network. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone Modeling Security Requirements Through Ownership, Permission and Delegation. Search on Bibsonomy RE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Najam Perwaiz Structured management of role-permission relationships. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Pete Epstein, Ravi S. Sandhu Engineering of Role/Permission Assignments. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37A. J. I. Jones On the Relationship Between Permission and Obligation. Search on Bibsonomy ICAIL The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
32Hakan Temiz, Ahmet Buyukeke An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
32Ke Sun 0012, Chunyu Xia, Songlin Xu, Xinyu Zhang 0003 StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors. Search on Bibsonomy NDSS The full citation details ... 2023 DBLP  BibTeX  RDF
32 A novel permission ranking system for android malware detection - the permission grader. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
32Jiyou Wang, Ron Poet Permission Management and User Privacy Based On Android: Permission Management On Android. Search on Bibsonomy SIN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
32Michael Cash, Mostafa A. Bassiouni Two-Tier Permission-ed and Permission-Less Blockchain for Secure Data Sharing. Search on Bibsonomy SmartCloud The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Daniel E. Krutz, Nuthan Munaiah, Anthony Peruma, Mohamed Wiem Mkaouer Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps. Search on Bibsonomy MOBILESoft@ICSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Seung-hwan Ju, Hee Suk Seo, Jin Kwak Research on android malware permission pattern using permission monitoring system. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
32Vincent F. Taylor, Ivan Martinovic SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. Search on Bibsonomy SPSM@CCS The full citation details ... 2016 DBLP  BibTeX  RDF
32Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin 0001, Deqing Zou, Robert H. Deng CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. Search on Bibsonomy WISEC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
32René van den Brink Axiomatizations of Banzhaf permission values for games with a permission structure. Search on Bibsonomy Int. J. Game Theory The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Victor Echeverría, Lorie M. Liebrock, Dongwan Shin Permission Management System: Permission as a Service in Cloud Computing. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Nicholas Asher, Daniel Bonevac Free Choice Permission is Strong Permission. Search on Bibsonomy Synth. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Samrat Mondal, Shamik Sural XML-based policy specification framework for spatiotemporal access control. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF estarbac, permission extent, role extent, spatiotemporal policy specification, xml
32Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno An Access Control Model for Tree Data Structures. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule
32Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li 0001 Protected, User-Level DMA for the SHRIMP Network Interface. Search on Bibsonomy HPCA The full citation details ... 1996 DBLP  DOI  BibTeX  RDF SHRIMP network interface, User-level Direct Memory Access, DMA transfers, permission checking, virtual memory translation, operating system, computer networks, file organisation, network interfaces, DMA, address translation, computer interfaces
32Vijay Varadharajan, Yi Mu 0001 On The Design Of Secure Electronic Payment Schemes For Internet. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS
32Jean-Michel Hélary, Achour Mostéfaoui, Michel Raynal A General Scheme for Token- and Tree-Based Distributed Mutual Exclusion Algorithms. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF token-based distributed mutualexclusion algorithms, tree-based distributed mutual exclusion algorithms, permission-based mutual exclusion algorithms, rooted tree structure, informationstructure, topology requirements, distributed algorithms, distributed algorithms, topology, tree data structures, generic algorithm
31Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde Mining Stable Roles in RBAC. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Jinwei Hu, Ruixuan Li 0001, Zhengding Lu RBAC-Based Secure Interoperation Using Constraint Logic Programming. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang 0002 Formal foundations for hybrid hierarchies in GTRBAC. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Derived relation, Role hierarchy
31Mario Frank 0001, David A. Basin, Joachim M. Buhmann A class of probabilistic models for role engineering. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF clustering, machine learning, RBAC, role mining
31Devdatta Kulkarni, Anand Tripathi Context-aware role-based access control in pervasive computing systems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-based access control, pervasive computing, RBAC, context-aware computing
31Li Ma, Shilong Ma, Yuefei Sui A Dynamic Description Logic Approach to Extended RBAC Model. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner RoleMiner: mining roles using subset enumeration. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
31Lihua Yu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong Securely Sharing Data in Encrypted Databases. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Dong-Gue Park, You-Ri Lee A Flexible Role-Based Delegation Model Using Characteristics of Permissions. Search on Bibsonomy DEXA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Hua Wang 0002, Yanchun Zhang, Jinli Cao, Jian Yang Specifying Role-Based Access Constraints with Object Constraint Language. Search on Bibsonomy APWeb The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Kevin Leyton-Brown, Robert McGrew 0001, Ryan Porter Conference report: the fourth ACM conference on electronic commerce. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Xinwen Zhang, Sejong Oh, Ravi S. Sandhu PBDM: a flexible delegation model in RBAC. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, RBAC, delegation
31Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim A Novel Approach to Role-Based Access Control. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Doug Lundquist, Aris M. Ouksel Dynamic Subscription Permission: Extending the Depth of Demand-Controlled Flooding. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting Role Slices: A Notation for RBAC Permission Assignment and Enforcement. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Håkan Zeffer, Zoran Radovic, Oskar Grenholm, Erik Hagersten Exploiting Spatial Store Locality Through Permission Caching in Software DSMs. Search on Bibsonomy Euro-Par The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Guido Boella, Leendert W. N. van der Torre Permission and Authorization in Policies for Virtual Communities of Agents. Search on Bibsonomy AP2PC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Michael Sonntag, Maria Wimmer 0001 Legal Aspects of One-Stop Government: The Case of Applying for a Building Permission. Search on Bibsonomy EGOV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF one-stop government, electronic proceedings, building permissions, e-government
26Ugur Halici, Asuman Dogac A Method for Concurrency Control in Distributed DBMSs: Permission Test Method. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
22Kyoji Kawagoe, Keisuke Kasai STRAC: Personal Information Access Control for Emergency Systems. Search on Bibsonomy SERVICES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Permission rights, Security, Access control, Contexts, Emergency, Situations, Personal information
22Leon Pan, Chang N. Zhang A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multilayer access control, secure object, secure permission, secure user, security criterion
22Sylvie Doutre, Peter McBurney, Laurent Perrussel, Jean-Marc Thévenin Arguing for gaining access to information. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF argumentation, dialogue, permission
22Muhammad Alam, Michael Hafner, Ruth Breu Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture
22Sameer Patil, Jennifer Lai Who gets to know what when: configuring privacy permissions in an awareness application. Search on Bibsonomy CHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure
22Alban Gabillon An authorization model for XML databases. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Xupdate, privilege, security, XML, access controls, XPath, permission
22Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce A graph-based formalism for RBAC. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access control in information systems, decentralized administration, permission management, role-based access control, correctness, graph transformations
22Yu-Chen Kuo Composite k-Arbiters. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF h-out-of-k mutual exclusion, permission-based algorithms, fault tolerance, Distributed systems, quorums
22Michel Raynal A Distributed Solution to the k-out of-M Resources Allocation Problem. Search on Bibsonomy ICCI The full citation details ... 1991 DBLP  DOI  BibTeX  RDF k-out of-M resources allocation, and-synchronization, permission-based algorithms, distributed mutual exclusion, distributed synchronization
20Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson Package-Role Based Authorization Control Model for Wireless Network Services. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mike Dodds, Xinyu Feng 0001, Matthew J. Parkinson, Viktor Vafeiadis Deny-Guarantee Reasoning. Search on Bibsonomy ESOP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri Towards formal security analysis of GTRBAC using timed automata. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GTRBAC, model checking, timed automata, security analysis, ctl
20K. Rustan M. Leino, Peter Müller 0001, Jan Smans Verification of Concurrent Programs with Chalice. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson TVA: a DoS-limiting network architecture. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Joseph Y. Halpern, Vicky Weissman A formal foundation for XrML. Search on Bibsonomy J. ACM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital rights management
20Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello Leveraging Lattices to Improve Role Mining. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ninghui Li How to make Discretionary Access Control secure against trojan horses. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Vijay Atluri Panel on role engineering. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
20Huaiming Li, Ke Tian, Yingying Gao Research on Dynamic Delegation Model. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Shaomin Zhang, Xiangjun Kong, Baoyi Wang Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Yaling Nie 0001, Hideya Yoshiuchi A Fast Channel Switching Method in EPON System for IPTV Service. Search on Bibsonomy AccessNets The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Channel switching, IPTV, QoE, EPON
20Kevin Bierhoff, Jonathan Aldrich PLURAL: checking protocol compliance under aliasing. Search on Bibsonomy ICSE Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF annotations, aliasing, permissions, typestate
20Hanne Riis Nielson, Flemming Nielson A flow-sensitive analysis of privacy properties. Search on Bibsonomy CSF The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Lei Xia, Wei Huang, Hao Huang A Compositional Multiple Policies Operating System Security Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege
20Cristian Prisacariu, Gerardo Schneider A Formal Language for Electronic Contracts. Search on Bibsonomy FMOODS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 Conditional Privacy-Aware Role Based Access Control. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sejong Oh, Ravi S. Sandhu, Xinwen Zhang An effective role administration model using organization structure. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF role administration, Access control, RBAC, role-based access control
20Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Håkan Zeffer, Zoran Radovic, Martin Karlsson, Erik Hagersten TMA: a trap-based memory architecture. Search on Bibsonomy ICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed shared memory (DSM), low complexity server design, node coherence checks, server design, simultaneous multi-threading (SMT), software coherence, trap-based memory architecture (TMA), chip multi processor (CMP)
20Yu Peng, Quanyuan Wu Secure Communication and Access Control for Web Services Container. Search on Bibsonomy GCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Muhammad Alam, Michael Hafner, Ruth Breu A constraint based role based access control in the SECTET a model-driven approach. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF service oriented architectures, role based access control, model-driven architecture, model-driven security
20Hua Wang 0002, Jinli Cao, David Ross Role-Based Delegation with Negative Authorization. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 957 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license