|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 67 occurrences of 26 keywords
|
|
|
Results
Found 47 publication records. Showing 47 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
172 | Jaehong Park, Ravi S. Sandhu |
Towards usage control models: beyond traditional access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 57-64, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
153 | Hao Hu, Hao Li, Dengguo Feng |
L-UCON: Towards Layered Access Control with UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 823-829, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
124 | Mohammad Nauman, Masoom Alam, Xinwen Zhang, Tamleek Ali |
Remote Attestation of Attribute Updates and Information Flows in a UCON System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing, Second International Conference, Trust 2009, Oxford, UK, April 6-8, 2009, Proceedings, pp. 63-80, 2009, Springer, 978-3-642-00586-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, Information flow, usage control, remote attestation |
114 | Gunhee Lee, Wonil Kim, Dong-Kyoo Kim |
A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 906-914, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
105 | Helge Janicke, Antonio Cau, Hussein Zedan |
A note on the formalisation of UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 163-168, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, formal specification, security policy, usage control |
104 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
Toward a Usage-Based Security Framework for Collaborative Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(1), pp. 3:1-3:36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, Authorization, security architecture, collaborative computing, usage control, UCON |
104 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
Safety analysis of usage control authorization models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 243-254, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, safety, usage control, UCON |
95 | Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert |
A general obligation model and continuity: enhanced policy enforcement engine for usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 123-132, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
95 | Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo |
Enforcing DRM policies across applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 8th ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 27, 2008, pp. 87-94, 2008, ACM, 978-1-60558-290-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, digital rights management, usage control, policy enforcement |
86 | Jungin Kim, Bhavani Thuraisingham |
Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 7-9 May 2007, Santorini Island, Greece, pp. 146-155, 2007, IEEE Computer Society, 0-7695-2765-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
76 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park |
Formal model and policy specification of usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 351-387, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, formal specification, security policy, usage control |
76 | Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu |
A logical specification for usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 1-10, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
logic specification, access control, security policy, usage control |
75 | Danwei Chen, Xiuli Huang, Xunyi Ren |
Access Control of Cloud Service Based on UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CloudCom ![In: Cloud Computing, First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009. Proceedings, pp. 559-564, 2009, Springer, 978-3-642-10664-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Negotiation, Cloud Service, UCON |
67 | Jianfeng Lu, Ruixuan Li 0001, Vijay Varadharajan, Zhengding Lu, Xiaopu Ma |
Secure Interoperation in Multidomain Environments Employing UCON Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 395-402, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multidomain, cyclic inheritance, interoperation, separation of duty, usage control |
66 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert |
Model-based behavioral attestation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 175-184, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavioral attestation, highlevel framework, remote attestation, UCON |
66 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
A usage-based authorization framework for collaborative computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 180-189, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, security architecture, collaborative computing, usage control, UCON |
57 | Jianfeng Lu, Ruixuan Li 0001, Zhengding Lu, Jinwei Hu, Xiaopu Ma |
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 403-410, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
constraint, Separation-of-Duty, usage control |
57 | Jaehong Park, Ravi S. Sandhu |
The UCONABC usage control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 128-174, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, trust, digital rights management, usage control |
38 | Hui Xie, Bin Zhang 0015, Dianyou Hu |
A Role-Based Dynamic Authorization Model and Its Implementation in PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 661-664, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
38 | Michael Hafner, Mukhtiar Memon, Muhammad Alam |
Modeling and Enforcing Advanced Access Control Policies in Healthcare Systems with Sectet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS (Workshops) ![In: Models in Software Engineering, Workshops and Symposia at MoDELS 2007, Nashville, TN, USA, September 30 - October 5, 2007, Reports and Revised Selected Papers, pp. 132-144, 2007, Springer, 978-3-540-69069-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Jungin Kim, Bhavani Thuraisingham |
Dependable and Secure TMO Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Ninth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2006), 24-26 April 2006, Gyeongju, Korea, pp. 133-140, 2006, IEEE Computer Society, 0-7695-2561-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Masayuki Nakae, Xinwen Zhang, Ravi S. Sandhu |
A general design towards secure ad-hoc collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 358, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
collaboration, access control, information flow, usage control |
29 | K. Divya, P. S. Uma Priyadarsini |
Defending Delicate Health Information with Corda Blockchain Enabled MAC and UCON-Based Access Controls via IPFS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Perform. Eng. ![In: Int. J. Perform. Eng. 20(1), pp. 48, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
29 | Rong Jiang, Xue Chen, Yimin Yu, Ying Zhang, Weiping Ding 0001 |
Risk and UCON-based access control model for healthcare big data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Big Data ![In: J. Big Data 10(1), pp. 104, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Dan Long, Juan Wang 0017, Bin Han, Ding Chen, Lei Shi |
MS-UCON: A Usage Control Model for Meteorological Operational Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC-FSKD ![In: 19th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery ICNC-FSKD 2023, Harbin, China, July 29-31, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-0439-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Antonia M. Reina Quintero, Salvador Martínez Perez, Ángel Jesús Varela-Vaca, María Teresa Gómez-López, Jordi Cabot |
A domain-specific language for the specification of UCON policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 64, pp. 103006, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
29 | Xie Lili, Zhai Zhigang |
Formal Specification of Concurrent Enforcement UCON Model with CTL Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIS (2) ![In: Artificial Intelligence and Security - 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, Proceedings, Part II, pp. 627-641, 2019, Springer, 978-3-030-24264-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Antonio La Marra, Fabio Martinelli, Paolo Mori, Athanasios Rizos, Andrea Saracino |
Using IFTTT to Express and Enforce UCON Obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience - 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings, pp. 213-231, 2019, Springer, 978-3-030-34338-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Athanasios Rizos, Daniel Bastos, Andrea Saracino, Fabio Martinelli |
Distributed UCON in CoAP and MQTT Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS ![In: Computer Security - ESORICS 2019 International Workshops, CyberICPS, SECPRE, SPOSE, and ADIoT, Luxembourg City, Luxembourg, September 26-27, 2019 Revised Selected Papers, pp. 35-52, 2019, Springer, 978-3-030-42047-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Zhifeng Liu, Zhulin Mao |
一种基于RBAC的UCON管理模型 (Administrative Model for UCON Based on RBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
计算机科学 ![In: 计算机科学 43(10), pp. 150-153, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Abdulgader Almutairi, François Siewe |
Modelling Usage Control of a U-Learning System Using CA-UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiWIS (Workshops) ![In: Trends in Mobile Web Information Systems - MobiWIS 2013 International Workshops, Paphos, Cyprus, August 26-28, 2013, Revised Selected Papers, pp. 95-109, 2013, Springer, 978-3-319-03736-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
29 | Arlindo Luis Marcon Jr. |
Avaliação resiliente de autorização UCON abc para computação em nuvem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
29 | Christos Grompanopoulos, Antonios Gouglidis, Ioannis Mavridis |
A Use-Based Approach for Enhancing UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers, pp. 81-96, 2012, Springer, 978-3-642-38003-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Um-e-Ghazia, Rahat Masood, Muhammad Awais Shibli, Muhammad Bilal |
Usage Control Model Specification in XACML Policy Language - XACML Policy Engine of UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: Computer Information Systems and Industrial Management - 11th IFIP TC 8 International Conference, CISIM 2012, Venice, Italy, September 26-28, 2012. Proceedings, pp. 68-79, 2012, Springer, 978-3-642-33259-3. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Christos Grompanopoulos, Ioannis Mavridis |
Challenging issues of UCON in modern computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCI ![In: Balkan Conference in Informatics, 2012, BCI '12, Novi Sad, Serbia, September 16-20, 2012, pp. 156-161, 2012, ACM, 978-1-4503-1240-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
29 | Guoping Zhang, Wentao Gong |
The Research of Access Control Based on UCON in the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Softw. ![In: J. Softw. 6(4), pp. 724-731, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Hui Feng, Wenchang Shi, Zhaohui Liang, Bin Liang 0002 |
On Mutual Support of Modern and Traditional Access Control Models with UCON and BLP as Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CMC ![In: Third International Conference on Communications and Mobile Computing, CMC 2011, Qingdao, China, 18-20 April 2011, pp. 65-70, 2011, IEEE Computer Society, 978-0-7695-4357-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Abdulgader Almutairi, François Siewe |
CA-UCON: a context-aware usage control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASEMANS@Ubicomp ![In: CASEMANS@Ubicomp '11: The 5th ACM International workshop on context-awareness for self-managing systems, Beijing, China, 17 September 2011, pp. 38-43, 2011, ACM, 978-1-4503-0877-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | JianGuo Ju, Weihe Chen, Yongzhao Zhan |
Research of Access Control in Electronic Medical Record Based on UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Seventh International Conference on Computational Intelligence and Security, CIS 2011, Sanya, Hainan, China, December 3-4, 2011, pp. 1037-1040, 2011, IEEE Computer Society, 978-1-4577-2008-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Gabriela Gheorghe, Paolo Mori, Bruno Crispo, Fabio Martinelli |
Enforcing UCON Policies on the Enterprise Service Bus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems, OTM 2010 - Confederated International Conferences: CoopIS, IS, DOA and ODBASE, Hersonissos, Crete, Greece, October 25-29, 2010, Proceedings, Part II, pp. 876-893, 2010, Springer, 978-3-642-16948-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Farzad Salim, Jason Reid, Ed Dawson |
An Administrative Model for UCON ABC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISC ![In: 8th Australasian Information Security Conference 2010, AISC 2010, Brisbane, Australia, January 2010, pp. 32-38, 2010, Australian Computer Society, 978-1-920682-86-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
29 | Jun Wu, Shigeru Shimamoto |
Integrated UCON-Based Access Control and Adaptive Intrusion Detection for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2010. GLOBECOM 2010, 6-10 December 2010, Miami, Florida, USA, pp. 1-5, 2010, IEEE, 978-1-4244-5638-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
29 | Zetao Jiang, Jiafei He, Shuo Hu, Bina Zheng |
Research on an UCON Model Supporting Distributed Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WGEC ![In: 2009 Third International Conference on Genetic and Evolutionary Computing, WGEC 2009, Guilin, China, 14-17 October 2009, pp. 235-239, 2009, IEEE Computer Society, 978-0-7695-3899-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Fengying Wang, Fei Wang |
The Research and Application of Resource Dissemination Based on Credibility and UCON. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2007, Harbin, Heilongjiang, China, December 15-19, 2007, pp. 584-588, 2007, IEEE Computer Society, 0-7695-3072-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
Towards a VMM-based usage control framework for OS kernel integrity protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 71-80, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
kernel integrity, operating system protection, access control, authorization, security architecture, usage control, VMM, UCON |
19 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan |
Concurrent Enforcement of Usage Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 111-118, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy, System Management, Usage Control, Enforcement |
19 | Ravi S. Sandhu, Jaehong Park |
Usage Control: A Vision for Next Generation Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 17-31, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #47 of 47 (100 per page; Change: )
|
|