Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet |
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 369-381, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
112 | Audun Jøsang, Dieter Gollmann, Richard Au |
A method for access authorisation through delegation networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSW ![In: The proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Tasmania, Australia, January 2006, pp. 165-174, 2006, Australian Computer Society, 1-920-68236-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
86 | Arash Faroughi, Roozbeh Faroughi, Philipp Wieder, Wolfgang Ziegler |
Attributes and VOs: Extending the UNICORE Authorisation Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 121-130, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
86 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
UML |
86 | Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko |
Experiences of Applying Advanced Grid Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGC ![In: Advances in Grid Computing - EGC 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers, pp. 265-274, 2005, Springer, 3-540-26918-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla |
Analyzing and Managing Role-Based Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 20(7), pp. 924-939, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access controls, Protection mechanisms |
78 | Hongbin Zhou, Simon N. Foley |
A Logic for Analysing Subterfuge in Delegation Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers, pp. 127-141, 2005, Springer, 3-540-32628-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Changyu Dong, Giovanni Russello, Naranker Dulay |
Flexible Resolution of Authorisation Conflicts in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Managing Large-Scale Service Deployment, 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings, pp. 95-108, 2008, Springer, 978-3-540-85999-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Jay Chin, Ning Zhang 0001, Aleksandra Nenadic, Li Yao, J. M. Brooke |
Towards Context Constrained Authorisation for Pervasive Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), January 7-12, 2007, Bangalore, India, 2007, IEEE, 1-4244-0614-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Simon N. Foley, Hongbin Zhou |
Authorisation Subterfuge by Delegation in Decentralised Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 97-102, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi |
A Secure Anonymous Authorisation Architecture for E-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 106-111, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Ying-Lie O |
A Life-Cycle Based Authorisation Expert Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMDM ![In: Artificial Intelligence in Medicine. Joint European Conference on Artificial Intelligence in Medicine and Medical Decision Making, AIMDM'99, Aalborg, Denmark, June 1999, Proceedings, pp. 153-157, 1999, Springer, 3-540-66162-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
65 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 94-102, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
65 | Jonathon Tidswell, John Potter |
A graphical definition of authorization schema in the DTAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 109-120, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
DTAC, access control, constraints, graphs, dynamic, computer security, type, roles, schema |
65 | John T. Robinson, Murthy V. Devarakonda |
Note on a Problem with Reed and Long's FBR Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 31(1), pp. 3-4, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
60 | David W. Chadwick, Kaniz Fatema |
An advanced policy based authorisation infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009, pp. 81-84, 2009, ACM, 978-1-60558-786-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy |
60 | A. J. Stell, Richard O. Sinnott, John P. Watt |
Comparison of Advanced Authorisation Infrastructures for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCS ![In: 19th Annual International Symposium on High Performance Computing Systems and Applications (HPCS 2005), 15-18 May 2005, Guelph, Ontario, Canada, pp. 195-201, 2005, IEEE Computer Society, 0-7695-2343-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi |
A user-centric anonymous authorisation framework in e-commerce environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 138-147, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Yuri Demchenko, Oscar Koeroo, Cees de Laat, Håkon Sagehaug |
Extending XACML authorisation model to support policy obligations handling in distributed application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MGC ![In: Proceedings of the 6th International Workshop on Middleware for Grid Computing (MGC 2008), held at the ACM/IFIP/USENIX 9th International Middleware Conference, December 1-5, Leuven, Belgium, pp. 5, 2008, ACM, 978-1-60558-365-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
complex resource provisioning, generic AAA authorisation framework, policy obligations, reference model for policy obligations handling, XACML |
52 | Nilufer Tuptuk, Emil Lupu |
Risk Based Authorisation for Mobile Ad Hoc Networks. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007, Proceedings, pp. 188-191, 2007, Springer, 978-3-540-72985-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Mobile Ad Hoc Network, Trust, Authorisation, Bayesian Belief Networks |
52 | Ligang He, Mark Calleja, Mark Hayes, Stephen A. Jarvis |
Performance prediction for running workflows under role-based authorization mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-8, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Xin Wang, Yanchun Zhang, Hao Shi, Jian Yang 0001 |
BPEL4RBAC: An Authorisation Specification for WS-BPEL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2008, 9th International Conference, Auckland, New Zealand, September 1-3, 2008. Proceedings, pp. 381-395, 2008, Springer, 978-3-540-85480-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yuri Demchenko, Alfred Wan, Mihai Cristea, Cees de Laat |
Authorisation infrastructure for on-demand network resource provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29 - October 1, 2008, pp. 95-103, 2008, IEEE Computer Society, 978-1-4244-2578-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 254-262, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Giovanni Russello, Changyu Dong, Naranker Dulay |
Authorisation and Conflict Resolution for Hierarchical Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 201-210, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul |
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 7th International Conference, EC-Web 2006, Krakow, Poland, September 5-7, 2006, Proceedings, pp. 132-141, 2006, Springer, 3-540-37743-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Wensheng Xu, David W. Chadwick, Sassa Otenko |
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 162-179, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Simon N. Foley |
Authorisation Subterfuge by Delegation in Decentralised Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 103-111, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge |
Specification and Validation of Authorisation Constraints Using UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 64-79, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Raffaele Giaffreda, Hannes Tschofenig, Theo Kanter, Christoph Reichert |
An Authorisation and Privacy Framework for Context-Aware Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MATA ![In: Mobility Aware Technologies and Applications, Second International Workshop, MATA 2005, Montreal, Canada, October 17-19, 2005, Proceedings, pp. 149-160, 2005, Springer, 3-540-29410-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Ligang He, Kewei Duan, Xueguang Chen, Deqing Zou, Zongfen Han, Ali Fadavinia, Stephen A. Jarvis |
Modelling Workflow Executions under Role-Based Authorisation Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: IEEE International Conference on Services Computing, SCC 2011, Washington, DC, USA, 4-9 July, 2011, pp. 200-208, 2011, IEEE Computer Society, 978-1-4577-0863-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Modelling, Workflow, RBAC, Authorisation |
39 | Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser |
Recognition of Authority in Virtual Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 3-13, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Yuri Demchenko, Cees de Laat, Leon Gommans, René van Buuren |
Domain Based Access Control Model for Distributed Collaborative Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 24, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Ryszard Kruk, Slawomir Grzonkowski, Adam Gzella, Tomasz Woroniecki, Hee-Chul Choi |
D-FOAF: Distributed Identity Management with Access Rights Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASWC ![In: The Semantic Web - ASWC 2006, First Asian Semantic Web Conference, Beijing, China, September 3-7, 2006, Proceedings, pp. 140-154, 2006, Springer, 3-540-38329-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Bruce Christianson |
Anonymous Authentication (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 12th International Workshop, Cambridge, UK, April 26-28, 2004. Revised Selected Papers, pp. 306-311, 2004, Springer, 3-540-40925-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth |
Trust for Location-Based Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCNC ![In: WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008 - April 3 2008, Las Vegas, Nevada, USA, Conference Proceedings, pp. 3163-3168, 2008, IEEE, 978-1-4244-1997-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Steven Gordon |
Formal Analysis of PANA Authentication and Authorisation Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2008, Dunedin, Otago, New Zealand, 1-4 December 2008, pp. 277-284, 2008, IEEE Computer Society, 978-0-7695-3443-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tracy McKay, James Irvine 0001 |
Authentication and Authorisation for a Personal Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 65th IEEE Vehicular Technology Conference, VTC Spring 2007, 22-25 April 2007, Dublin, Ireland, pp. 174-178, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Roland Erber, Christian Schläger, Günther Pernul |
Patterns for Authentication and Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 755-759, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Christian Schläger, Thomas Nowey, José A. Montenegro |
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 709-716, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Xiangpeng Zhao, Antonio Cerone, Padmanabhan Krishnan |
Verifying BPEL Workflows Under Authorisation Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management ![In: Business Process Management, 4th International Conference, BPM 2006, Vienna, Austria, September 5-7, 2006, Proceedings, pp. 439-444, 2006, Springer, 3-540-38901-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
model-checking, Workflow, RBAC, BPEL |
34 | David W. Chadwick |
Authorisation Using Attributes from Multiple Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 15th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2006), 26-28 June 2006, Manchester, United Kingdom, pp. 326-331, 2006, IEEE Computer Society, 0-7695-2623-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Andreas Schaad |
Revocation of Obligation and Authorisation Policy Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 28-39, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Christian Schläger, Günther Pernul |
Authentication and Authorisation Infrastructures in b2c e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies: 6th International Conference, EC-Web 2005, Copenhagen, Denmark, August 23-26, 2005, Proceedings, pp. 306-315, 2005, Springer, 3-540-28467-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 125-133, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Richard Au, Ming Yao, Mark Looi |
Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 13-17 October 2003, Halifax, Canada, pp. 519-522, 2003, IEEE Computer Society, 0-7695-1931-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Darrell Raymond |
Authorisation Requirements on a Budget. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 7(4), pp. 179-191, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Authorization, Dependency analysis, Security requirements |
31 | Khaled Gaaloul, François Charoy |
Task Delegation Based Access Control Models for Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E ![In: Software Services for e-Business and e-Society, 9th IFIP WG 6.1 Conference on e-Business, e-Services and e-Society, I3E 2009, Nancy, France, September 23-25, 2009. Proceedings, pp. 400-414, 2009, Springer, 978-3-642-04279-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Workflow, Delegation, Task, Authorisation |
31 | Christian Schläger, Günther Pernul |
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 344-351, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Authentication and Authorisation Infrastructures (AAIs), Trust, E-Commerce, Fuzzy Cognitive Maps |
31 | Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo |
Security and dynamics in customer controlled virtual workspace organisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 231-232, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation |
31 | Vino Fernando Crescini, Yan Zhang 0003 |
PolicyUpdater: a system for dynamic access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(3), pp. 145-165, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Policy update, Access control, Artificial intelligence, Logic programming, Authorisation |
31 | Yuko Murayama |
Configuration Detection as a Problem of Knowledge Discovery in Computer Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS ![In: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, Kiawah Island, South Carolina, USA, June 24-27, 1997, Sponsored by IFCIS, The Intn'l Foundation on Cooperative Information Systems, pp. 47-55, 1997, IEEE Computer Society, 0-8186-7946-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
configuration detection, network object existence, network object location, network configuration knowledge maintenance, scale problem, management domain partitioning, network address authorisation, network-level threats, security technique, address resolution, data mining, knowledge discovery, computer networks, configuration management, routers, inconsistency, internetworking, dynamic learning, invalidity, hosts |
31 | Nicholas Yialelis, Emil Lupu, Morris Sloman |
Role-based security for distributed object systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 80-85, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents |
26 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Task-based entailment constraints for basic workflow patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 51-60, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
task-based entailment constraints, access control, workflow management, separation of duty, workflow modelling |
26 | Mark Slaymaker, David J. Power, Douglas Russell, Andrew Simpson |
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008, Proceedings, pp. 169-184, 2008, Springer, 978-3-540-85258-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Aleksandra Nenadic, Ning Zhang 0001, Li Yao, Terry Morrow |
Levels of Authentication Assurance: an Investigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 155-160, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Paul Sheppard |
On implementing mpeg-21 intellectual property management and protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Seventh ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 29, 2007, pp. 10-22, 2007, ACM, 978-1-59593-884-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MPEG REL, MPEG-21 IPMP, implementation, digital rights management |
26 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 183-187, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Aleksandra Nenadic, Ning Zhang 0001, Jay Chin, Carole A. Goble |
FAME: Adding Multi-Level Authentication to Shibboleth. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 157, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 67-86, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
26 | Peter Lamb, Robert Power, Gavin Walker, Michael Compton |
Role-based access control for data service integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 3-12, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, data integration |
26 | Daniel Cvrcek, Jan Krhovjak, Vashek Matyas |
PIN (and Chip) or Signature: Beating the Cheating? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 69-75, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Partha Das Chowdhury, Bruce Christianson, James A. Malcolm |
Anonymous Context Based Role Activation Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 315-321, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Vashek Matyas |
PIN (and Chip) or Signature: Beating the Cheating? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers, pp. 76-81, 2005, Springer, 978-3-540-77155-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 27-30 June 2005, Murcia, Cartagena, Spain, pp. 442-447, 2005, IEEE Computer Society, 0-7695-2373-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Florina Almenárez, Mildrey Carbonell, Jordi Forné, M. Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro |
Design of an Enhanced PKI for Ubiquitous Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 16th International Workshop on Database and Expert Systems Applications (DEXA 2005), 22-26 August 2005, Copenhagen, Denmark, pp. 262-266, 2005, IEEE Computer Society, 0-7695-2424-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Thomas B. Quillinan, Simon N. Foley |
Security in WebCom: addressing naming issues for a web services architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 1st ACM Workshop On Secure Web Services, SWS 2004, Fairfax, VA, USA, October 29, 2004, pp. 97-105, 2004, ACM, 1-58113-973-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
distributed systems, trust management, web services security, naming |
26 | Andreas Schaad, Jonathan D. Moffett |
Delegation of Obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 25-35, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Michael C. Fairhurst, Richard M. Guest, Farzin Deravi, J. George |
Using Biometrics as an Enabling Technology in Balancing Universality and Selectivity for Management of Information Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Interfaces for All ![In: Universal Access: Theoretical Perspectives, Practice, and Experience, 7th ERCIM International Workshop on User Interfaces for All, Paris, France, October 24-25, 2002, Revised Papers, pp. 249-262, 2002, Springer, 3-540-00855-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Martyn Fletcher |
A Database Authorization Framework for Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 61-67, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 71-76, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Arbër Beshiri, Anastas Mishev |
Authentication and authorisation in service-oriented grid architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Grid Util. Comput. ![In: Int. J. Grid Util. Comput. 14(5), pp. 422-435, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Adil Merabet, Atidel Lahoulou, Ahmed Alioua |
A multi-authorisation blockchain-based access control for cloud healthcare system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Intell. Eng. Informatics ![In: Int. J. Intell. Eng. Informatics 11(3), pp. 191-213, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Karen Li, Awais Rashid, Anne Roudaut |
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroUSEC ![In: Proceedings of the 2023 European Symposium on Usable Security, EuroUSEC 2023, Copenhagen, Denmark, October 16-17, 2023, pp. 205-217, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang |
Authorisation inconsistency in IoT third-party integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 16(2), pp. 133-143, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Boyi Xu, Li Da Xu, Yuxiao Wang 0004, Hongming Cai |
A distributed dynamic authorisation method for Internet+ medical & healthcare data access based on consortium blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Enterp. Inf. Syst. ![In: Enterp. Inf. Syst. 16(12), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Khizar Hameed, Ali Raza, Saurabh Garg 0001, Muhammad Bilal Amin |
A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.07060, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Kheng-Leong Tan, Chi-Hung Chi, Kwok-Yan Lam |
Secure Multi-Party Delegated Authorisation For Access and Sharing of Electronic Health Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2203.12837, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Minyue Jin, Gendao Li, Marc Reimann |
Team of rivals: How should original equipment manufacturers cooperate with independent remanufacturers via authorisation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 296(3), pp. 837-845, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Steph Rudd, Hamish Cunningham |
Towards Lightweight Authorisation of IoT-Oriented Smart-Farms using a Self-Healing Consensus Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FRUCT ![In: 31st Conference of Open Innovations Association, FRUCT 2022, Helsinki, Finland, April 27-29, 2022, pp. 265-276, 2022, IEEE, 978-952-69244-7-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo |
WiP: Metamodel for Continuous Authorisation and Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022, pp. 43-48, 2022, ACM, 978-1-4503-9357-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Edon Gashi, Blerim Rexha, Artan Rexhepi |
Trust establishment between OAuth 2.0 resource servers using claims-based authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Gov. an Int. J. ![In: Electron. Gov. an Int. J. 17(3), pp. 339-353, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Parveen Kumar Sharma, Rajiv Mahajan, Surender Kumar |
Trust-based multi-level secure routing for authentication and authorisation in WMN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Adv. Intell. Paradigms ![In: Int. J. Adv. Intell. Paradigms 20(3/4), pp. 323-342, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng |
An authorisation certificate-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 16(4), pp. 258-266, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Aafaf Ouaddah, Badr Bellaj |
FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 15(1), pp. 18-48, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Konrad M. Dryja, Milan Markovic, Peter Edwards |
FlyTrap: A Blockchain-based Proxy for Authorisation and Audit of MQTT Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOTSMS ![In: 8th International Conference on Internet of Things: Systems, Management and Security, IOTSMS 2021, Gandia, Spain, December 6-9, 2021, pp. 1-8, 2021, IEEE, 978-1-6654-5868-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris |
CAPODAZ: A containerised authorisation and policy-driven architecture using microservices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 104, pp. 102153, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Pradeep Sudhakaran, Chidambaranathan Malathy |
Authorisation, attack detection and avoidance framework for IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Networks ![In: IET Networks 9(5), pp. 209-214, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Brian Bockelman, Andrea Ceccanti, Ian Collier, Linda Cornwall, Thomas Dack, Jaroslav Guenther, Mario Lassnig, Maarten Litmaath, A. Paul Millar, Mischa Sallé, Hannah Short, Jeny Teheran, Romain Wartel |
WLCG Authorisation from X.509 to Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2007.03602, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris |
CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2004.10276, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
21 | Christopher Bailey, Rogério de Lemos |
Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 113, pp. 113-131, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoshuai Zhang, Chao Liu 0012, Kok Keong Chai, Stefan Poslad |
A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 20(17), pp. 4681, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Rui Lebre, Micael Pedrosa, Marcos Gestal Pose, Carlos Costa 0001 |
A safe architecture for authorisation grant in healthcare ecosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHI ![In: 8th IEEE International Conference on Healthcare Informatics, ICHI 2020, Oldenburg, Germany, November 30 - December 3, 2020, pp. 1-5, 2020, IEEE, 978-1-7281-5382-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Ahmad Salehi Shahraki |
Dynamic Cross-Domain Authorisation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
DOI RDF |
|
21 | Aniruddha S. Rumale, Dinesh N. Chaudhari |
IAM with postlogin authentication for service usage authorisation in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Cloud Comput. ![In: Int. J. Cloud Comput. 8(1), pp. 68-82, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Montrieux, Rogério de Lemos, Chris Bailey |
Engineering Self-adaptive Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1909.13708, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
21 | Tong Zhou 0003, Xiaofeng Li, He Zhao 0011 |
EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Appl. Technol. ![In: Int. J. Comput. Appl. Technol. 60(3), pp. 281-295, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Montrieux, Rogério de Lemos, Chris Bailey |
Challenges in Engineering Self-Adaptive Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Engineering Adaptive Software Systems ![In: Engineering Adaptive Software Systems - Communications of NII Shonan Meetings, pp. 57-94, 2019, Springer, 978-981-13-2184-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Formal analysis of HMAC authorisation in the TPM2.0 specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 12(2), pp. 133-140, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Carlos Eduardo da Silva, Thomas Diniz, Nélio Cacho, Rogério de Lemos |
Self-adaptive authorisation in OpenStack cloud platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Internet Serv. Appl. ![In: J. Internet Serv. Appl. 9(1), pp. 19:1-19:17, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|