|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 15 occurrences of 15 keywords
|
|
|
Results
Found 20 publication records. Showing 20 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
78 | Xiangning Zhou, Zhaolong Wang |
An Access Control Model of Workflow System Integrating RBAC and TBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 246-251, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
58 | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi |
Extending Java for Package based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 67-76, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation |
44 | Xiaoning Ma, Zhiyong Feng 0002, Chao Xu 0003, Jiafang Wang |
A Trust-Based Access Control with Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 510-514, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, trust, feedback |
44 | Gaofeng Ji, Yong Tang 0001, Fan Huang, Peng Wang, Guibin Wu |
An Access Control Model for Service Composite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 852-857, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Ritesh Kumar Tiwari, Vishal Dwivedi, Kamalakar Karlapalem |
SLA Driven Process Security through Monitored E-contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 28-35, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee |
A Flexible and Scalable Access Control for Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 688-689, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Chunchi Liu, Minghui Xu 0001, Hechuan Guo, Xiuzhen Cheng 0001, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang 0001, Weifeng Lyu |
TBAC: A Tokoin-Based Accountable Access Control Scheme for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 23(5), pp. 6133-6148, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Ke Ma 0009, Geng Yang |
TBAC: A Fine-Grained Topic-Based Access Control Model for Text Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 16(3), pp. 2215-2228, May - June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Santosh Kumar Yadav, Shreyas Bhat Kera, Raghurama Varma Gonela, Kamlesh Tiwari, Hari Mohan Pandey, Ali Akbar Shaikh |
TBAC: Transformers Based Attention Consensus for Human Activity Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: International Joint Conference on Neural Networks, IJCNN 2022, Padua, Italy, July 18-23, 2022, pp. 1-8, 2022, IEEE, 978-1-7281-8671-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Yan Zhu 0010, Yao Qin, Guohua Gan, Yang Shuai, William Cheng-Chung Chu |
TBAC: Transaction-Based Access Control on Blockchain for Resource Sharing with Cryptographically Decentralized Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (1) ![In: 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018, Tokyo, Japan, 23-27 July 2018, Volume 1, pp. 535-544, 2018, IEEE Computer Society, 978-1-5386-2667-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
34 | Sergey Lapin |
Access control model D-TBAC subject to the requirements to tasks' performing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 8th International Conference on Security of Information and Networks, SIN 2015, Sochi, Russian Federation, September 8-10, 2015, pp. 42-45, 2015, ACM, 978-1-4503-3453-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
34 | Jian-Hui Liu |
A Cooperative Framework of Remote Cooperative Fault Diagnosis Based on TBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIC (3) ![In: Applied Informatics and Communication - International Conference, ICAIC 2011, Xi'ian, China, August 20-21, 2011. Proceedings, Part III, pp. 175-181, 2011, Springer, 978-3-642-23234-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
34 | Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody |
Risk Models for Trust-Based Access Control(TBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 364-371, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Chul Lee, Sang Seok Lim, Joo Young Hwang, Kyu Ho Park |
A Ticket Based Admisson Controller ( TBAC ) for Users' Fairness of Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Internet Computing ![In: Proceedings of the International Conference on Internet Computing, IC 2002, Las Vegas, Nevada, USA, June 24-27, 2002, pp. 181-186, 2002, CSREA Press, 1-892512-38-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
34 | Roshan K. Thomas, Ravi S. Sandhu |
Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA, pp. 166-181, 1997, Chapman & Hall, 0-412-82090-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
22 | Latifa Boursas, Wolfgang Hommel |
Multidimensional Dynamic Trust Management for Federated Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 684-689, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Hao Jiang, Shengye Lu |
Access Control for Workflow Environment: The RTFW Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design III, 10th International Conference, CSCWD 2006, Nanjing, China, May 3-5, 2006, Revised Selected Papers, pp. 619-626, 2006, Springer, 978-3-540-72862-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Shengye Lu, Hao Jiang |
RTFW: An Access Control Model for Workflow Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 1005-1009, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Andreas K. Mattas, Ioannis Mavridis, George Pangalos |
Towards Dynamically Administered Role-Based Access Control ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 494-498, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin |
Organization based access contro. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 120-, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #20 of 20 (100 per page; Change: )
|
|