The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Permissions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1998 (18) 1999-2000 (18) 2001 (20) 2002 (25) 2003 (41) 2004 (42) 2005 (50) 2006 (53) 2007 (59) 2008 (64) 2009 (43) 2010 (16) 2011 (16) 2012 (25) 2013 (24) 2014 (18) 2015 (23) 2016 (23) 2017 (25) 2018 (29) 2019 (22) 2020 (20) 2021 (31) 2022 (25) 2023 (19) 2024 (2)
Publication types (Num. hits)
article(155) data(2) incollection(5) inproceedings(576) phdthesis(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 519 occurrences of 282 keywords

Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
98Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
88Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu Role mining based on weights. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF similarity, weight, role engineering, role mining, rbac
71Kevin Bierhoff, Jonathan Aldrich Modular typestate checking of aliased objects. Search on Bibsonomy OOPSLA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF linear logic, aliasing, permissions, typestates, behavioral subtyping
70Jason Crampton On permissions, inheritance and role hierarchies. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF role-based access control, inheritance, mandatory access control, permissions
69Franz Kollmann Realizing fine-granular Read andWrite Rights on Tree Structured Documents. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
67Gleb Naumovich A conservative algorithm for computing the flow of permissions in Java programs. Search on Bibsonomy ISSTA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, java, verification, static analysis, data flow analysis
61Guido Boella, Leendert W. N. van der Torre Institutions with a hierarchy of authorities in distributed dynamic environments. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Institutions, Permissions, Normative systems
59Vikhyath Rao, Trent Jaeger Dynamic mandatory access control for multiple stakeholders. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mobile phones, selinux, distributed access control
57John Boyland Checking Interference with Fractional Permissions. Search on Bibsonomy SAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong Expandable grids for visualizing and authoring computer security policies. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF expandable grid, file permissions, security, visualization, privacy
51Kevin Bierhoff, Jonathan Aldrich PLURAL: checking protocol compliance under aliasing. Search on Bibsonomy ICSE Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF annotations, aliasing, permissions, typestate
50Sven Stork, Paulo Marques, Jonathan Aldrich Concurrency by default: using permissions to express dataflow in stateful programs. Search on Bibsonomy OOPSLA Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access permissions, concurrency, programming language, dataflow
50Lalana Kagal, Tim Finin Modeling conversation policies using permissions and obligations. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conversation policy, Conversation specifications, Speech act ontology, Agent communication, Permissions, Obligations, Ontology languages
49Jan Jürjens, Jörg Schreck, Yijun Yu Automated Analysis of Permission-Based Security Using UMLsec. Search on Bibsonomy FASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner RoleMiner: mining roles using subset enumeration. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
49Kun Wang, Zhenguo Ding, Lihua Zhou Efficient Access Control in Wireless Network. Search on Bibsonomy IAT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Jan Jürjens, Markus Lehrhuber, Guido Wimmel Model-Based Design and Analysis of Permission-Based Security. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Yang Zhao, Ligong Yu, Jia Bei Assure Parallel Interference Patterns in Multithreaded Programs with Permissions. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
48Matthias Merz The management of users, roles, and permissions in JDOSecure. Search on Bibsonomy PPPJ The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Richard Bornat, Cristiano Calcagno, Peter W. O'Hearn, Matthew J. Parkinson Permission accounting in separation logic. Search on Bibsonomy POPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concurrency, logic, separation, permissions
40Nels E. Beckman Verifying correct usage of atomic blocks using access permissions. Search on Bibsonomy OOPSLA Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transactional memory, permissions, typestate
39Thomas P. Jensen Certificates of Resource Usage on Mobile Telephones. Search on Bibsonomy ISoLA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Guido Boella, Leendert W. N. van der Torre A Logical Architecture of a Normative System. Search on Bibsonomy DEON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Jürgen Schlegelmilch, Ulrike Steffens Role mining with ORCA. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy
39Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan A Task-Oriented Access Control Model for WfMS. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Dirk Schwartmann An Attributable Role-Based Access Control for Healthcare. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39John A. Trono Comments on "Tagged Semaphores". Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Matthias Merz, Markus Aleksy Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. Search on Bibsonomy DEXA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Muhammad Alam, Ruth Breu, Michael Hafner Modeling permissions in a (U/X)ML world. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Souhila Kaci, Leendert W. N. van der Torre Permissions and Uncontrollable Propositions in DSDL3: Non-monotonicity and Algorithms. Search on Bibsonomy DEON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Guido Boella, Leendert W. N. van der Torre An architecture of a normative system: counts-as conditionals, obligations and permissions. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAS theory, normative multi-agent systems, normative systems
38Dong-Gue Park, You-Ri Lee A Flexible Role-Based Delegation Model Using Characteristics of Permissions. Search on Bibsonomy DEXA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Till Schümmer, Jörg M. Haake, Anja Haake A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems. Search on Bibsonomy From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, CSCW, virtual environments, Shared workspaces, group formation
38Sameer Patil, Jennifer Lai Who gets to know what when: configuring privacy permissions in an awareness application. Search on Bibsonomy CHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure
38Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström Removing permissions in the flexible authorization framework. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF logic programming, authorization, Access control policy
36Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. Search on Bibsonomy CHI The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
36Quang Do, Ben Martini, Kim-Kwang Raymond Choo Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. Search on Bibsonomy TrustCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
36Stefan Heule, K. Rustan M. Leino, Peter Müller 0001, Alexander J. Summers Abstract Read Permissions: Fractional Permissions without the Fractions. Search on Bibsonomy VMCAI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
36Romain Bardou Verification of Pointer Programs Using Regions and Permissions. (Vérification de programmes avec pointeurs à l'aide de régions et de permissions). Search on Bibsonomy 2011   RDF
36K. Hanner, Rudolf Hörmanseder Managing Windows NT®file system permissions - A security tool to master the complexity of Microsoft Windows NT®file system permissions. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
32Nels E. Beckman, Kevin Bierhoff, Jonathan Aldrich Verifying correct usage of atomic blocks and typestate. Search on Bibsonomy OOPSLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transactional memory, permissions, typestate
32Michael Sonntag, Maria Wimmer 0001 Legal Aspects of One-Stop Government: The Case of Applying for a Building Permission. Search on Bibsonomy EGOV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF one-stop government, electronic proceedings, building permissions, e-government
32Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
32Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou Ponder: Realising Enterprise Viewpoint Concepts. Search on Bibsonomy EDOC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF distributed object enterprise concepts, enterprise viewpoint concepts, Ponder language, prohibitions, nested communities, mobile telecommunication network, specification, declarative language, permissions, obligations, business communication, language constructs
29Mohammad Nauman, Sohail Khan, Xinwen Zhang Apex: extending Android permission model and enforcement with user-defined runtime constraints. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy framework, constraints, Android, mobile platforms
29Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia Effective Visualization of File System Access-Control. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Juan Manuel Crespo, Gustavo Betarte, Carlos Luna 0001 A Framework for the Analysis of Access Control Models for Interactive Mobile Devices. Search on Bibsonomy TYPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile devices, Access control models, formal proofs
29Paul El Khoury, Emmanuel Coquery, Mohand-Said Hacid Consistency checking of role assignments in inter-organizational collaboration. Search on Bibsonomy SPRINGL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bridge rules, role based access control, description logic, roles, inter-organizational
29Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong Advanced Permission-Role Relationship in Role-Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann Permission Set Mining: Discovering Practical and Useful Roles. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Byeong-Mo Chang Static check analysis for Java stack inspection. Search on Bibsonomy ACM SIGPLAN Notices The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, Java, Java, static analysis, stack inspection
29Romuald Thion, Stéphane Coulondre Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs. Search on Bibsonomy ICCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Noa Tuval, Ehud Gudes Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF role graph consistency, canonical groups, Role based access control
29Aizhong Lin, Erik Vullings, James Dalziel A Trust-based Access Control Model for Virtual Organizations. Search on Bibsonomy GCC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Antonio Corradi, Rebecca Montanari, Daniela Tibaldi Context-Based Access Control for Ubiquitous Service Provisioning. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Anindya Banerjee 0001, David A. Naumann History-Based Access Control and Secure Information Flow. Search on Bibsonomy CASSIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Jim J. Longstaff, Mike A. Lockyer, John Nicholas The tees confidentiality model: an authorisation model for identities and roles. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell Access Control for Active Spaces. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Emmett Witchel, Josh Cates, Krste Asanovic Mondrian memory protection. Search on Bibsonomy ASPLOS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Pete Epstein, Ravi S. Sandhu Engineering of Role/Permission Assignments. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Ravi S. Sandhu, Qamar Munawer The ARBAC99 Model for Administration of Roles. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Yang Zhao, John Boyland Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Stijn Goedertier, Jan Vanthienen Designing Compliant Business Processes with Obligations and Permissions. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Travis D. Breaux, Annie I. Antón Analyzing Goal Semantics for Rights, Permissions, and Obligations. Search on Bibsonomy RE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Philippe Balbiani A formal examination of roles and permissions in access control. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Lalana Kagal, Timothy W. Finin Modeling Communicative Behavior Using Permissions and Obligations. Search on Bibsonomy AC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil Adding Attributes to Role-Based Access Control. Search on Bibsonomy Computer The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Dynamic roles, Adding and managing attributes, Controlling permissions, Role-based access control, attribute based access control
22Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Zachary Sparks Typestate-oriented programming. Search on Bibsonomy OOPSLA Companion The full citation details ... 2009 DBLP  DOI  BibTeX  RDF programming language, objects, types, states, permissions, typestate, paradigms
22Kevin Bierhoff Checking API protocol compliance in java. Search on Bibsonomy OOPSLA Companion The full citation details ... 2008 DBLP  DOI  BibTeX  RDF permissions, typestate
22Sebastian Höhn, Jan Jürjens Rubacon: automated support for model-based compliance engineering. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF user permissions, access control, security analysis
22Rose K. Shumba Teaching hands-on Linux host computer security. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF file integrity, file permissions, host security exercises, user accounts, cryptography, Computer security
22John Tang Boyland, William Retert Connecting effects and uniqueness with adoption. Search on Bibsonomy POPL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF adoption, ownership, uniqueness, permissions
22Neelakantan R. Krishnaswami, Jonathan Aldrich Permission-based ownership: encapsulating state in higher-order typed languages. Search on Bibsonomy PLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modularity, lambda calculus, type theory, state, domains, ownership types, permissions, system f
22Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin On modeling system-centric information for role engineering. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attributive permissions, role-based access control, information flow, information model, role engineering
20Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita Capability-based delegation model in RBAC. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF capability-based access control, delegation, rbac
20Ninghui Li, Qihua Wang, Mahesh V. Tripunitara Resiliency Policies in Access Control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fault-tolerant, Access control, policy design
20Wamberto Weber Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman Normative conflict resolution in multi-agent systems. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Detection and resolution of normative conflicts, Norms
20Jan Camenisch, Maria Dubovitskaya, Gregory Neven Oblivious transfer with access control. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, oblivious transfer, anonymous credentials
20Puneet Gupta, Scott D. Stoller Verification of Security Policy Enforcement in Enterprise Systems. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Anas Abou El Kalam, Philippe Balbiani A Policy Language for Modelling Recommendations. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Frithjof Dau, Martin Knechtel Access Policy Design Supported by FCA Methods. Search on Bibsonomy ICCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby Modular string-sensitive permission analysis with demand-driven precision. Search on Bibsonomy ICSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20K. Rustan M. Leino, Peter Müller 0001, Jan Smans Verification of Concurrent Programs with Chalice. Search on Bibsonomy FOSAD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam Migrating to optimal RBAC with minimal perturbation. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
20Vijay Atluri Panel on role engineering. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RBAC, role engineering, role mining
20Pierre Parrend, Stéphane Frénot Component-Based Access Control: Secure Software Composition through Static Analysis. Search on Bibsonomy SC@ETAPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Yang Zhao, John Boyland A Fundamental Permission Interpretation for Ownership Types. Search on Bibsonomy TASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ownership, Permission
20Ruth Breu, Gerhard Popp, Muhammad Alam Model based development of access policies. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hassan Takabi, Morteza Amini, Rasool Jalili Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Mika Koganeyama, Naoshi Tabuchi, Takaaki Tateishi Reducing Unnecessary Conservativeness in Access Rights Analysis with String Analysis. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Lilong Han, Qingtang Liu, Zongkai Yang Role-based Administration of User-role Assignment and Its Oracle Implementation. Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee Activity-based Access Control Model to Hospital Information. Search on Bibsonomy RTCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Martin J. Kollingbaum, Wamberto Weber Vasconcelos, Andrés García-Camino, Timothy J. Norman Managing Conflict Resolution in Norm-Regulated Environments. Search on Bibsonomy ESAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Andrés García-Camino, Juan A. Rodríguez-Aguilar, Wamberto Weber Vasconcelos A Distributed Architecture for Norm Management in Multi-Agent Systems. Search on Bibsonomy COIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Manigandan Radhakrishnan, Jon A. Solworth Application security support in the operating system kernel. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorization properties, access controls, operating systems, authorization, information flow, separation of duty
20Ninghui Li, Mahesh V. Tripunitara, Qihua Wang Resiliency policies in access control. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fault-tolerant, access control, policy design
20Frode Hansen, Vladimir A. Oleshchuk Location-based Security Framework for use of Handheld Devices in Medical Information Systems. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 751 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license