The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorizations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1994 (15) 1995-1997 (16) 1998-2000 (17) 2001-2002 (29) 2003 (17) 2004 (22) 2005 (26) 2006 (18) 2007 (25) 2008 (19) 2009 (15) 2010-2013 (15) 2015-2019 (17) 2021-2024 (7)
Publication types (Num. hits)
article(55) incollection(6) inproceedings(195) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 319 occurrences of 179 keywords

Results
Found 258 publication records. Showing 258 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
120Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Translating Content-Based Authorizations for XML Documents. Search on Bibsonomy WISE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation
108Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Authorization Translation for XML Document Transformation. Search on Bibsonomy World Wide Web The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML access control models, authorizations, database security, XML documents, document transformation
97Vijayalakshmi Atluri, Qi Guo Unified Index for Mobile Object Data and Authorizations. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
73Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe Authorization Model for Summary Schemas Model. Search on Bibsonomy IDEAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
72Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Towards Translating Authorizations for Transformed XML Documents. Search on Bibsonomy WISE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
60Yun Bai 0001, Yan Zhang 0003, Vijay Varadharajan On the sequence of authorization policy transformations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Policy transformations, Formal language, Default logic, Authorization policy
60Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo An Authorization Model and Its Formal Semantics. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
60Sylvia B. Encheva, Sharil Tumin Positive and Negative Authorizations to Access Protected Web Resources. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF positive and negative authorization, Collaboration
60Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian A Logical Language for Expressing Authorizations. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secuity policy, Access control, authorization
60Dulce Domingos, António Rito Silva, Pedro Veiga Authorization and Access Control in Adaptive Workflows. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive authorizations, Access control, adaptive workflow
60Pierangela Samarati, Michael K. Reiter, Sushil Jajodia An authorization model for a public key management service. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorizations specification and enforcement, Access control, public key infrastructure
60Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia Providing flexibility in information flow control for object oriented systems. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF information flow control flexibility, exception specification, waivers, invoke-waivers, reply-waivers, information transmission, security specifications, safe information flows, access control, object-oriented programming, authorizations, transaction, object oriented systems, interaction modes
48Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Assessing query privileges via safe and efficient permission composition. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authorization composition, access control
48Béatrice Finance, Saïda Medjdoub, Philippe Pucheral The case for access control on XML relationships. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML relationship, need-to-know and consent principles, data confidentiality, XML access control
48Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF periodic authorization, access control, temporal constraints, time management
48Elisa Bertino, Claudio Bettini, Pierangela Samarati A Temporal Authorization Model. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
48Fausto Rabitti, Darrell Woelk, Won Kim 0001 A Model of Authorization for Object-Oriented and Semantic Databases. Search on Bibsonomy EDBT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
48Chun Ruan, Vijay Varadharajan Reasoning on Weighted Delegatable Authorizations. Search on Bibsonomy DEXA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Wolfgang Dobmeier, Günther Pernul Towards Privacy-Aware Handling of Authorizations. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Amir H. Chinaei, Huaxin Zhang Hybrid Authorizations and Conflict Resolution. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Access Control, Conflict Resolution, Combined Strategies
48Along Lin A Knowledge-Based Approach to Internet Authorizations. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa A Unified Conflict Resolution Algorithm. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hybrid Authorizations, Conflict Resolution, Access Control Models
48Fabio Casati, Silvana Castano, Maria Grazia Fugini Managing Workflow Authorization Constraints through Active Database Technology. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF workflows, authorizations, roles, active databases, triggers, authorization constraints
48Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets
36Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin Toward practical authorization-dependent user obligation systems. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RBAC, policy, accountability, obligations, authorization systems
36Qiang Wei, Matei Ripeanu, Konstantin Beznosov Cooperative Secondary Authorization Recycling. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Sylvia B. Encheva, Sharil Tumin Belnap's Logic in Sharing Protected Web Resources. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF positive and negative authorization, Collaboration
36Qiang Wei, Matei Ripeanu, Konstantin Beznosov Cooperative secondary authorization recycling. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CSAR, authorization recycling, cooperation, SAAM
36Jason Crampton, Wing Leung, Konstantin Beznosov The secondary and approximate authorization model and its application to Bell-LaPadula policies. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bell-LaPadula model, authorization recycling, access control, SAAM
36Vijayalakshmi Atluri, Soon Ae Chun An Authorization Model for Geospatial Data. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, access control, Geospatial databases
36Indrakshi Ray, Marianna Muller Using Schemas to Simplify Access Control for XML Documents. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Hai Yu, Ee-Peng Lim LTAM: A Location-Temporal Authorization Model. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Chun Ruan, Vijay Varadharajan A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Chun Ruan, Vijay Varadharajan A formal graph based framework for supporting authorization delegations and conflict resolutions. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Access control, Authorization, Conflict resolution
36Sampo Sovio, N. Asokan, Kaisa Nyberg Defining Authorization Domains Using Virtual Devices. Search on Bibsonomy SAINT Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 A Logic Model for Temporal Authorization Delegation with Negation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 Runtime verification of authorization hook placement for the linux security modules framework. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Chun Ruan, Vijay Varadharajan Resolving Conflicts in Authorization Delegations. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Ramaswamy Chandramouli A Framework for Multiple Authorization Types in a Healthcare Application System. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Elisa Bertino, Sushil Jajodia, Pierangela Samarati A Flexible Authorization Mechanism for Relational Data Management Systems. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF access control mechanism, group management support, relational database, authorization, access control policy, data management system
36Yun Bai 0001, Vijay Varadharajan On Formal Languages for Sequences of Authorization Transformations. Search on Bibsonomy SAFECOMP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Policy Transformation, Formal language, Default logic, Authorization Policies
36Sabrina De Capitani di Vimercati, Pierangela Samarati An Authorization Model for Federated Systems. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF authorization administration, authorization autonomy, access control, Federated systems
36Elisa Bertino, Sushil Jajodia, Pierangela Samarati Supporting Multiple Access Control Policies in Database Systems. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
36Hiroyuki Seki, Yasunori Ishihara, Minoru Ito Authorization Analysis of Queries in Object-Oriented Databases. Search on Bibsonomy DOOD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
36Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen A Model for Temporal Interval Authorizations. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Laurent Bussard, Refik Molva One-Time Capabilities for Authorizations without Trust. Search on Bibsonomy PerCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Ghita Kouadri Mostéfaoui, Patrick Brézillon A Generic Framework for Context-Based Distributed Authorizations. Search on Bibsonomy CONTEXT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 Logic-Based Reasoning on Delegatable Authorizations. Search on Bibsonomy ISMIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Translating Access Authorizations for Transformed XML Documents. Search on Bibsonomy DEXA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Pierangela Samarati, Paul Ammann, Sushil Jajodia Propagation of Authorizations in Distributed Database Systems. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
36Néjib Moalla, Abdelaziz Bouras, Gilles Neubert, Yacine Ouzrout Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems. Search on Bibsonomy ICEIS (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vaccine industry, Marketing Authorizations, Interoperability, ERP, Compliance, health Information Systems
36Michael A. Schneider, Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad
24Ram Krishnan, Ravi S. Sandhu, Jianwei Niu 0001, William H. Winsborough A conceptual framework for Group-Centric secure information sharing. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF models, access control, information sharing
24Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch A Flexible Access Control Model for Distributed Collaborative Editors. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Secure Data Management, Authorization and Access Control, Collaborative Editing Systems
24Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang 0001, Rachida Dssouli Preserving Privacy in E-health Systems Using Hippocratic Databases. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Mohamed Layouni, Maki Yoshida, Shingo Okamura Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Jae-Gil Lee 0001, Kyu-Young Whang, Wook-Shin Han, Il-Yeol Song The dynamic predicate: integrating access control with query processing in XML databases. Search on Bibsonomy VLDB J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy/security, Access control, Query processing, XML databases
24Ulrich Flegel, Michael Meier 0001 Authorization Architectures for Privacy-Respecting Surveillance. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection
24Fabio Massacci, John Mylopoulos, Nicola Zannone Hierarchical hippocratic databases with minimal disclosure for virtual organizations. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection
24Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Vijayalakshmi Atluri, Heechang Shin Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Philip Robinson, Florian Kerschbaum, Andreas Schaad From Business Process Choreography to Authorization Policies. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, role based access control, business process
24Guillermo Navarro 0001, Joan Borrell An XML Standards Based Authorization Framework for Mobile Agents. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access Control, Mobile Agents, Authorization, XACML, SAML
24Chun Ruan, Vijay Varadharajan Data Protection in Distributed Database Systems. Search on Bibsonomy ISMIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed database, authorization
24Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera Maintaining privacy on derived objects. Search on Bibsonomy WPES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, information flow, data protection
24Fabio Massacci, John Mylopoulos, Nicola Zannone Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 Consistency analysis of authorization hook placement in the Linux security modules framework. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, access control models
24Jaehong Park, Ravi S. Sandhu The UCONABC usage control model. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, access control, trust, digital rights management, usage control
24Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita An authorization model for geographical maps. Search on Bibsonomy GIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control, GIS, authorization model
24Ramaswamy Chandramouli Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning
24Chi-Hung Chi, Xiao-Yan Yu, Wenjie Zhang, Chen (Cherie) Ding, Weng-Fai Wong Data Integrity Framework and Language Support for Active Web Intermediaries. Search on Bibsonomy WCW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web Intermediaries, Data Integrity, Content Adaptation, Content Delivery
24Ali E. Abdallah, Etienne J. Khayat A Formal Model for Parameterized Role-Based Access Control. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24François Siewe, Antonio Cau, Hussein Zedan A compositional framework for access control policies enforcement. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, authorization, delegation, policy composition
24Li Qin, Vijayalakshmi Atluri Concept-level access control for the Semantic Web. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ontology, Semantic Web, access control, concept, propagation
24Shijin Yuan, Yunfa Hu Access Control Architecture for Web Services. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Vijayalakshmi Atluri, Avigdor Gal An authorization model for temporal and derived data: securing information portals. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authorization administration, Access control, temporal data, derived data
24Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari A Content-Based Authorization Model for Digital Libraries. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access control, digital libraries, authorization
24Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati A Component-Based Architecture for Secure Data Publication. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo A Logical Framework for Reasoning on Data Access Control Policies. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati Exception-Based Information Flow Control in Object-Oriented Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF condifentiality, object-oriented databases and systems, access control, information flow control
24Vijayalakshmi Atluri, Wei-kuang Huang An Authorization Model for Workflows. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Security, Petri nets, Workflow, Authorization
24J. Ray Scott Library information access client. Search on Bibsonomy CHI Conference Companion The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, Jane Cleland-Huang Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
24Zhiwei Yan, Randy Bush, Guanggang Geng, Ties de Kock, Jiankang Yao Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Alexandru Sorici, Adina Magda Florea Towards Context-Based Authorizations for Interactions in Hypermedia-Driven Agent Environments - The CASHMERE Framework. Search on Bibsonomy EMAS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
24Matt Davison 0002, Ken King, Trevor Miller Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
24Padmavathi Iyer, Amirreza Masoumzadeh 0001, Paliath Narendran On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models. Search on Bibsonomy Comput. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
24Luca Ferretti, Francesco Longo 0001, Giovanni Merlino, Michele Colajanni, Antonio Puliafito, Nachiket Tapas Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Haibing Lu, Xi Chen 0014, Qi Liu, Michele Samorani, Guojie Song, Yanjiang Yang Stochastic Workflow Authorizations With Queueing Constraints. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
24Wei Sun 0026, Shiwei Wei, Huaping Guo, Hongbing Liu Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations. Search on Bibsonomy Future Internet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Junjie Zhao, Chuanxu Wang, Lang Xu Decision for pricing, service, and recycling of closed-loop supply chains considering different remanufacturing roles and technology authorizations. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Ivan Prokic, Jovanka Pantovic, Hugo Torres Vieira A calculus for modeling floating authorizations. Search on Bibsonomy J. Log. Algebraic Methods Program. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Zeyad A. Al-Odat, Eman Al-qtiemat, Samee Khan A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations. Search on Bibsonomy BigDataSecurity/HPSC/IDS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm Mutual Authorizations: Semantics and Integration Issues. Search on Bibsonomy SACMAT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Smriti Bhatt, Lo'ai Tawalbeh, Pankaj Chhetri, Paras Bhatt Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. Search on Bibsonomy FMEC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
24Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira A Calculus for Modeling Floating Authorizations. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
24Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati Enforcing authorizations while protecting access confidentiality. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
24Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira A Calculus for Modeling Floating Authorizations. Search on Bibsonomy FORTE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 258 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license