Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
120 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Content-Based Authorizations for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 4th International Conference on Web Information Systems Engineering, WISE 2003, Rome, Italy, December 10-12, 2003, pp. 103-114, 2003, IEEE Computer Society, 0-7695-1999-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation |
108 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Authorization Translation for XML Document Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 7(1), pp. 111-138, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML access control models, authorizations, database security, XML documents, document transformation |
97 | Vijayalakshmi Atluri, Qi Guo |
Unified Index for Mobile Object Data and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 80-97, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe |
Authorization Model for Summary Schemas Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: International Database Engineering & Applications Symposium, IDEAS'02, July 17-19, 2002, Edmonton, Canada, Proceedings, pp. 182-191, 2002, IEEE Computer Society, 0-7695-1638-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
72 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Towards Translating Authorizations for Transformed XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 3rd International Conference on Web Information Systems Engineering, WISE 2002, Singapore, December 12-14, 2002, Proceedings, pp. 291-300, 2002, IEEE Computer Society, 0-7695-1766-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Yun Bai 0001, Yan Zhang 0003, Vijay Varadharajan |
On the sequence of authorization policy transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(1-2), pp. 120-131, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Policy transformations, Formal language, Default logic, Authorization policy |
60 | Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
An Authorization Model and Its Formal Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 127-142, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
60 | Sylvia B. Encheva, Sharil Tumin |
Positive and Negative Authorizations to Access Protected Web Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, First International Conference, NBiS 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 79-87, 2007, Springer, 978-3-540-74572-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
positive and negative authorization, Collaboration |
60 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian |
A Logical Language for Expressing Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 31-42, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secuity policy, Access control, authorization |
60 | Dulce Domingos, António Rito Silva, Pedro Veiga |
Authorization and Access Control in Adaptive Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings, pp. 23-38, 2003, Springer, 3-540-20300-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
adaptive authorizations, Access control, adaptive workflow |
60 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia |
An authorization model for a public key management service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(4), pp. 453-482, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, Access control, public key infrastructure |
60 | Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia |
Providing flexibility in information flow control for object oriented systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 130-140, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
information flow control flexibility, exception specification, waivers, invoke-waivers, reply-waivers, information transmission, security specifications, safe information flows, access control, object-oriented programming, authorizations, transaction, object oriented systems, interaction modes |
48 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Assessing query privileges via safe and efficient permission composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 311-322, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization composition, access control |
48 | Béatrice Finance, Saïda Medjdoub, Philippe Pucheral |
The case for access control on XML relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 107-114, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML relationship, need-to-know and consent principles, data confidentiality, XML access control |
48 | Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati |
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 23(3), pp. 231-285, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
periodic authorization, access control, temporal constraints, time management |
48 | Elisa Bertino, Claudio Bettini, Pierangela Samarati |
A Temporal Authorization Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 126-135, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
48 | Fausto Rabitti, Darrell Woelk, Won Kim 0001 |
A Model of Authorization for Object-Oriented and Semantic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'88, Proceedings of the International Conference on Extending Database Technology, Venice, Italy, March 14-18, 1988, pp. 231-250, 1988, Springer, 3-540-19074-0. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
48 | Chun Ruan, Vijay Varadharajan |
Reasoning on Weighted Delegatable Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 20th International Conference, DEXA 2009, Linz, Austria, August 31 - September 4, 2009. Proceedings, pp. 279-286, 2009, Springer, 978-3-642-03572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Wolfgang Dobmeier, Günther Pernul |
Towards Privacy-Aware Handling of Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 70-76, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Amir H. Chinaei, Huaxin Zhang |
Hybrid Authorizations and Conflict Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, pp. 131-145, 2006, Springer, 978-3-540-38984-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Conflict Resolution, Combined Strategies |
48 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 292-304, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa |
A Unified Conflict Resolution Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hybrid Authorizations, Conflict Resolution, Access Control Models |
48 | Fabio Casati, Silvana Castano, Maria Grazia Fugini |
Managing Workflow Authorization Constraints through Active Database Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 3(3), pp. 319-338, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
workflows, authorizations, roles, active databases, triggers, authorization constraints |
48 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 285-292, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
36 | Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin |
Toward practical authorization-dependent user obligation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 180-191, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RBAC, policy, accountability, obligations, authorization systems |
36 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative Secondary Authorization Recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 20(2), pp. 275-288, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Sylvia B. Encheva, Sharil Tumin |
Belnap's Logic in Sharing Protected Web Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 125-132, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
positive and negative authorization, Collaboration |
36 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative secondary authorization recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 65-74, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CSAR, authorization recycling, cooperation, SAAM |
36 | Jason Crampton, Wing Leung, Konstantin Beznosov |
The secondary and approximate authorization model and its application to Bell-LaPadula policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 111-120, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bell-LaPadula model, authorization recycling, access control, SAAM |
36 | Vijayalakshmi Atluri, Soon Ae Chun |
An Authorization Model for Geospatial Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 1(4), pp. 238-254, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, access control, Geospatial databases |
36 | Indrakshi Ray, Marianna Muller |
Using Schemas to Simplify Access Control for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 363-368, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Hai Yu, Ee-Peng Lim |
LTAM: A Location-Temporal Authorization Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 172-186, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 402-413, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
A formal graph based framework for supporting authorization delegations and conflict resolutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(4), pp. 211-222, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Conflict resolution |
36 | Sampo Sovio, N. Asokan, Kaisa Nyberg |
Defining Authorization Domains Using Virtual Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 331-336, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
A Logic Model for Temporal Authorization Delegation with Negation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 310-324, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 |
Runtime verification of authorization hook placement for the linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 225-234, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 271-285, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Ramaswamy Chandramouli |
A Framework for Multiple Authorization Types in a Healthcare Application System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 137-148, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
A Flexible Authorization Mechanism for Relational Data Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 17(2), pp. 101-140, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control mechanism, group management support, relational database, authorization, access control policy, data management system |
36 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings, pp. 375-384, 1999, Springer, 3-540-66488-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
36 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
An Authorization Model for Federated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 99-117, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authorization administration, authorization autonomy, access control, Federated systems |
36 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
Supporting Multiple Access Control Policies in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 94-107, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
36 | Hiroyuki Seki, Yasunori Ishihara, Minoru Ito |
Authorization Analysis of Queries in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOOD ![In: Deductive and Object-Oriented Databases, Fourth International Conference, DOOD'95, Singapore, December 4-7, 1995, Proceedings, pp. 521-538, 1995, Springer, 3-540-60608-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
36 | Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen |
A Model for Temporal Interval Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell |
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 134-150, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Laurent Bussard, Refik Molva |
One-Time Capabilities for Authorizations without Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom ![In: Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 14-17 March 2004, Orlando, FL, USA, pp. 351-355, 2004, IEEE Computer Society, 0-7695-2090-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ghita Kouadri Mostéfaoui, Patrick Brézillon |
A Generic Framework for Context-Based Distributed Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, 4th International and Interdisciplinary Conference, CONTEXT 2003, Stanford, CA, USA, June 23-25, 2003, Proceedings, pp. 204-217, 2003, Springer, 3-540-40380-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
Logic-Based Reasoning on Delegatable Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 13th International Symposium, ISMIS 2002, Lyon, France, June 27-29, 2002, Proceedings, pp. 185-193, 2002, Springer, 3-540-43785-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Access Authorizations for Transformed XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 13th International Conference, DEXA 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings, pp. 290-299, 2002, Springer, 3-540-44126-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Pierangela Samarati, Paul Ammann, Sushil Jajodia |
Propagation of Authorizations in Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 136-147, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
36 | Néjib Moalla, Abdelaziz Bouras, Gilles Neubert, Yacine Ouzrout |
Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (Selected Papers) ![In: Enterprise Information Systems, 8th International Conference, ICEIS 2006, Paphos, Cyprus, May 23-27, 2006, Revised Selected Papers, pp. 98-111, 2006, Springer, 978-3-540-77580-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Vaccine industry, Marketing Authorizations, Interoperability, ERP, Compliance, health Information Systems |
36 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 317-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
24 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu 0001, William H. Winsborough |
A conceptual framework for Group-Centric secure information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 384-387, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
models, access control, information sharing |
24 | Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch |
A Flexible Access Control Model for Distributed Collaborative Editors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, pp. 89-106, 2009, Springer, 978-3-642-04218-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure Data Management, Authorization and Access Control, Collaborative Editing Systems |
24 | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang 0001, Rachida Dssouli |
Preserving Privacy in E-health Systems Using Hippocratic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 692-697, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mohamed Layouni, Maki Yoshida, Shingo Okamura |
Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 387-402, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jae-Gil Lee 0001, Kyu-Young Whang, Wook-Shin Han, Il-Yeol Song |
The dynamic predicate: integrating access control with query processing in XML databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 16(3), pp. 371-387, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy/security, Access control, Query processing, XML databases |
24 | Ulrich Flegel, Michael Meier 0001 |
Authorization Architectures for Privacy-Respecting Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection |
24 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 15(4), pp. 370-387, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection |
24 | Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos |
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 196-207, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 237-251, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Philip Robinson, Florian Kerschbaum, Andreas Schaad |
From Business Process Choreography to Authorization Policies. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 297-309, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou |
EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 18(2), pp. 115-145, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, role based access control, business process |
24 | Guillermo Navarro 0001, Joan Borrell |
An XML Standards Based Authorization Framework for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 54-66, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Mobile Agents, Authorization, XACML, SAML |
24 | Chun Ruan, Vijay Varadharajan |
Data Protection in Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 15th International Symposium, ISMIS 2005, Saratoga Springs, NY, USA, May 25-28, 2005, Proceedings, pp. 191-199, 2005, Springer, 3-540-25878-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
distributed database, authorization |
24 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera |
Maintaining privacy on derived objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES 2005, Alexandria, VA, USA, November 7, 2005, pp. 10-19, 2005, ACM, 1-59593-228-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, information flow, data protection |
24 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 438-454, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Consistency analysis of authorization hook placement in the Linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(2), pp. 175-205, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, access control models |
24 | Jaehong Park, Ravi S. Sandhu |
The UCONABC usage control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 128-174, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, trust, digital rights management, usage control |
24 | Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita |
An authorization model for geographical maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 12th ACM International Workshop on Geographic Information Systems, ACM-GIS 2004, November 12-13, 2004, Washington, DC, USA, Proceedings, pp. 82-91, 2004, ACM, 1-58113-979-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, GIS, authorization model |
24 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 490-499, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
24 | Chi-Hung Chi, Xiao-Yan Yu, Wenjie Zhang, Chen (Cherie) Ding, Weng-Fai Wong |
Data Integrity Framework and Language Support for Active Web Intermediaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCW ![In: Web Content Caching and Distribution: 9th International Workshop, WCW 2004, Beijing, China, October 18-20, 2004. Proceedings, pp. 94-105, 2004, Springer, 3-540-23516-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web Intermediaries, Data Integrity, Content Adaptation, Content Delivery |
24 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 233-246, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 32-42, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
24 | Li Qin, Vijayalakshmi Atluri |
Concept-level access control for the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 94-103, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ontology, Semantic Web, access control, concept, propagation |
24 | Shijin Yuan, Yunfa Hu |
Access Control Architecture for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 1004-1007, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Avigdor Gal |
An authorization model for temporal and derived data: securing information portals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(1), pp. 62-94, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authorization administration, Access control, temporal data, derived data |
24 | Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari |
A Content-Based Authorization Model for Digital Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(2), pp. 296-315, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, digital libraries, authorization |
24 | Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
A Component-Based Architecture for Secure Data Publication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 309-318, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo |
A Logical Framework for Reasoning on Data Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 175-189, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati |
Exception-Based Information Flow Control in Object-Oriented Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 1(1), pp. 26-65, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
condifentiality, object-oriented databases and systems, access control, information flow control |
24 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 44-64, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
24 | J. Ray Scott |
Library information access client. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Conference Companion ![In: Conference on Human Factors in Computing Systems, CHI 1994, Boston, Massachusetts, USA, April 24-28, 1994, Conference Companion, pp. 143-144, 1994, ACM, 0-89791-651-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
24 | Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, Jane Cleland-Huang |
Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07353, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Zhiwei Yan, Randy Bush, Guanggang Geng, Ties de Kock, Jiankang Yao |
Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9455, pp. 1-6, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Alexandru Sorici, Adina Magda Florea |
Towards Context-Based Authorizations for Interactions in Hypermedia-Driven Agent Environments - The CASHMERE Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMAS ![In: Engineering Multi-Agent Systems - 11th International Workshop, EMAS 2023, London, UK, May 29-30, 2023, Revised Selected Papers, pp. 191-207, 2023, Springer, 978-3-031-48538-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Matt Davison 0002, Ken King, Trevor Miller |
Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1646, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
24 | Padmavathi Iyer, Amirreza Masoumzadeh 0001, Paliath Narendran |
On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 116, pp. 102586, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Luca Ferretti, Francesco Longo 0001, Giovanni Merlino, Michele Colajanni, Antonio Puliafito, Nachiket Tapas |
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 59, pp. 102848, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Haibing Lu, Xi Chen 0014, Qi Liu, Michele Samorani, Guojie Song, Yanjiang Yang |
Stochastic Workflow Authorizations With Queueing Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 18(4), pp. 1605-1619, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Wei Sun 0026, Shiwei Wei, Huaping Guo, Hongbing Liu |
Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 11(9), pp. 201, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Junjie Zhao, Chuanxu Wang, Lang Xu |
Decision for pricing, service, and recycling of closed-loop supply chains considering different remanufacturing roles and technology authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. Eng. ![In: Comput. Ind. Eng. 132, pp. 59-73, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ivan Prokic, Jovanka Pantovic, Hugo Torres Vieira |
A calculus for modeling floating authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Log. Algebraic Methods Program. ![In: J. Log. Algebraic Methods Program. 107, pp. 136-174, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Zeyad A. Al-Odat, Eman Al-qtiemat, Samee Khan |
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BigDataSecurity/HPSC/IDS ![In: 5th IEEE International Conference on Big Data Security on Cloud, IEEE International Conference on High Performance and Smart Computing, and IEEE International Conference on Intelligent Data and Security, BigDataSecurity/HPSC/IDS 2019, Washington, DC, USA, May 27-29, 2019, pp. 13-18, 2019, IEEE, 978-1-7281-0006-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm |
Mutual Authorizations: Semantics and Integration Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019, pp. 213-218, 2019, ACM, 978-1-4503-6753-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Smriti Bhatt, Lo'ai Tawalbeh, Pankaj Chhetri, Paras Bhatt |
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMEC ![In: Fourth International Conference on Fog and Mobile Edge Computing, FMEC 2019, Rome, Italy, June 10-13, 2019, pp. 241-246, 2019, IEEE, 978-1-7281-1796-6. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira |
A Calculus for Modeling Floating Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1802.05863, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
24 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Enforcing authorizations while protecting access confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 26(2), pp. 143-175, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira |
A Calculus for Modeling Floating Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Distributed Objects, Components, and Systems - 38th IFIP WG 6.1 International Conference, FORTE 2018, Held as Part of the 13th International Federated Conference on Distributed Computing Techniques, DisCoTec 2018, Madrid, Spain, June 18-21, 2018, Proceedings, pp. 101-120, 2018, Springer, 978-3-319-92611-7. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|