|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 469 occurrences of 303 keywords
|
|
|
Results
Found 957 publication records. Showing 957 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
99 | Yang Zhao, John Boyland |
A Fundamental Permission Interpretation for Ownership Types. |
TASE |
2008 |
DBLP DOI BibTeX RDF |
Ownership, Permission |
67 | Yoonkyung Kim, Byeong-Mo Chang |
Visualization of Permission Checks in Java Using Static Analysis. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
security, Java, static analysis, stack inspection |
67 | Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon |
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
67 | Richard Bornat, Cristiano Calcagno, Peter W. O'Hearn, Matthew J. Parkinson |
Permission accounting in separation logic. |
POPL |
2005 |
DBLP DOI BibTeX RDF |
concurrency, logic, separation, permissions |
57 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Steve Zelinka, Michael Garland |
Permission grids: practical, error-bounded simplification. |
ACM Trans. Graph. |
2002 |
DBLP DOI BibTeX RDF |
level of detail, Error bounds, surface simplification |
51 | Yang Zhao, John Boyland |
Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. |
Australian Software Engineering Conference |
2009 |
DBLP DOI BibTeX RDF |
|
51 | Frédéric Cuppens, Alexandre Miège |
Administration Model for Or-BAC. |
OTM Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
48 | Toshio Kodama, Tosiyasu L. Kunii, Yoichi Seki |
An organizational file permission management system using the cellular data system. |
IDEAS |
2009 |
DBLP DOI BibTeX RDF |
attaching map, file permission information management, formula expression, cellular model, cyberworlds |
48 | Ahmed Housni, Michel Tréhel |
Distributed Mutual Exclusion Token-Permission Based by Prioritized Groups. |
AICCSA |
2001 |
DBLP DOI BibTeX RDF |
Algorithm, Groups, Priority, Token, permission, Distributed Mutual Exclusion, Rooted tree |
47 | Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby |
Modular string-sensitive permission analysis with demand-driven precision. |
ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Dan Hong, Vincent Y. Shen |
Setting Access Permission through Transitive Relationship in Web-based Social Networks. |
Weaving Services and People on the World Wide Web |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Liang Chen, Jason Crampton |
Applications of the Oriented Permission Role-Based Access Control Model. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
47 | YongHoon Yi, MyongJae Kim, YoungLok Lee, HyungHyo Lee, BongNam Noh |
Applying RBAC Providing Restricted Permission Inheritance to a Corporate Web Environment. |
APWeb |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Subhendu Aich, Samrat Mondal, Shamik Sural, Arun K. Majumdar |
Role Based Access Control with Spatiotemporal Context for Mobile Applications. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Spatiotemporal domain, Role extent, Permission extent, Spatiotemporal SOD and Telemedicine |
42 | Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
A Logic for Reasoning About Security. |
ACM Trans. Comput. Syst. |
1992 |
DBLP DOI BibTeX RDF |
composition knowledge, security, integrity, policy, time, logic, secrecy, permission, obligation, possible-worlds |
41 | Yang Zhao, Ligong Yu, Jia Bei |
Assure Parallel Interference Patterns in Multithreaded Programs with Permissions. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Byeong-Mo Chang |
Static check analysis for Java stack inspection. |
ACM SIGPLAN Notices |
2006 |
DBLP DOI BibTeX RDF |
security, Java, Java, static analysis, stack inspection |
41 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
41 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas |
Flexible team-based access control using contexts. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
active security, access control, contexts, teams |
41 | T. V. Lakshman, Dipak Ghosal |
Performance Evaluation of an Efficient Multiple Copy Update Algorithm. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
distributeddatabases, multiple copy update algorithm, Thomas majorityconsensus algorithm, response-time behavior, distributed update-synchronizationalgorithm, distributed mutual exclusion algorithm, multiple-copy update-synchronization, performance evaluation, performance evaluation, performance evaluation, transaction processing, queueing model |
38 | Masoom Alam, Xinwen Zhang, Mohammad Nauman, Sohail Khan, Quratulain Alam |
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
Permission Delegation, Security, Access Control, Mashup |
38 | Wouter De Borger, Bart De Win, Bert Lagaisse, Wouter Joosen |
A permission system for secure AOP. |
AOSD |
2010 |
DBLP DOI BibTeX RDF |
execution history, permission system, aspect-oriented programming, language-based security |
38 | Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A Small But Non-negligible Flaw in the Android Permission Scheme. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
Vulnerability, Android, Permission |
37 | Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng |
An Extended Permission-Based Delegation Authorization Model. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann |
Permission Set Mining: Discovering Practical and Useful Roles. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Changyou Zhang, Liu Renfen, Yuanda Cao, Zhitao Guan |
The Permission Delegation Mechanism for P2P Network. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
37 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Modeling Security Requirements Through Ownership, Permission and Delegation. |
RE |
2005 |
DBLP DOI BibTeX RDF |
|
37 | Najam Perwaiz |
Structured management of role-permission relationships. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Pete Epstein, Ravi S. Sandhu |
Engineering of Role/Permission Assignments. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
37 | A. J. I. Jones |
On the Relationship Between Permission and Obligation. |
ICAIL |
1987 |
DBLP DOI BibTeX RDF |
|
32 | Hakan Temiz, Ahmet Buyukeke |
An Inverse Approach to Windows' Resource-Based Permission Mechanism for Access Permission Vulnerability Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Ke Sun 0012, Chunyu Xia, Songlin Xu, Xinyu Zhang 0003 |
StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors. |
NDSS |
2023 |
DBLP BibTeX RDF |
|
32 | |
A novel permission ranking system for android malware detection - the permission grader. |
J. Ambient Intell. Humaniz. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Jiyou Wang, Ron Poet |
Permission Management and User Privacy Based On Android: Permission Management On Android. |
SIN |
2020 |
DBLP DOI BibTeX RDF |
|
32 | Michael Cash, Mostafa A. Bassiouni |
Two-Tier Permission-ed and Permission-Less Blockchain for Secure Data Sharing. |
SmartCloud |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Daniel E. Krutz, Nuthan Munaiah, Anthony Peruma, Mohamed Wiem Mkaouer |
Who Added That Permission to My App? An Analysis of Developer Permission Changes in Open Source Android Apps. |
MOBILESoft@ICSE |
2017 |
DBLP DOI BibTeX RDF |
|
32 | Seung-hwan Ju, Hee Suk Seo, Jin Kwak |
Research on android malware permission pattern using permission monitoring system. |
Multim. Tools Appl. |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Vincent F. Taylor, Ivan Martinovic |
SecuRank: Starving Permission-Hungry Apps Using Contextual Permission Analysis. |
SPSM@CCS |
2016 |
DBLP BibTeX RDF |
|
32 | Daibin Wang, Haixia Yao, Yingjiu Li, Hai Jin 0001, Deqing Zou, Robert H. Deng |
CICC: a fine-grained, semantic-aware, and transparent approach to preventing permission leaks for Android permission managers. |
WISEC |
2015 |
DBLP DOI BibTeX RDF |
|
32 | René van den Brink |
Axiomatizations of Banzhaf permission values for games with a permission structure. |
Int. J. Game Theory |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Victor Echeverría, Lorie M. Liebrock, Dongwan Shin |
Permission Management System: Permission as a Service in Cloud Computing. |
COMPSAC Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Nicholas Asher, Daniel Bonevac |
Free Choice Permission is Strong Permission. |
Synth. |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
32 | Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno |
An Access Control Model for Tree Data Structures. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule |
32 | Matthias A. Blumrich, Cezary Dubnicki, Edward W. Felten, Kai Li 0001 |
Protected, User-Level DMA for the SHRIMP Network Interface. |
HPCA |
1996 |
DBLP DOI BibTeX RDF |
SHRIMP network interface, User-level Direct Memory Access, DMA transfers, permission checking, virtual memory translation, operating system, computer networks, file organisation, network interfaces, DMA, address translation, computer interfaces |
32 | Vijay Varadharajan, Yi Mu 0001 |
On The Design Of Secure Electronic Payment Schemes For Internet. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
secure electronic payment schemes, commercial electronic credit card transactions, iKP, STT, SEPP, permission-based payment protocol, PBP protocol, purchase request phase, payment phase, secret private key, Internet, disputes, EFTS |
32 | Jean-Michel Hélary, Achour Mostéfaoui, Michel Raynal |
A General Scheme for Token- and Tree-Based Distributed Mutual Exclusion Algorithms. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
token-based distributed mutualexclusion algorithms, tree-based distributed mutual exclusion algorithms, permission-based mutual exclusion algorithms, rooted tree structure, informationstructure, topology requirements, distributed algorithms, distributed algorithms, topology, tree data structures, generic algorithm |
31 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Mining Stable Roles in RBAC. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Jinwei Hu, Ruixuan Li 0001, Zhengding Lu |
RBAC-Based Secure Interoperation Using Constraint Logic Programming. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
31 | James B. D. Joshi, Elisa Bertino, Arif Ghafoor, Yue Zhang 0002 |
Formal foundations for hybrid hierarchies in GTRBAC. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Derived relation, Role hierarchy |
31 | Mario Frank 0001, David A. Basin, Joachim M. Buhmann |
A class of probabilistic models for role engineering. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
clustering, machine learning, RBAC, role mining |
31 | Devdatta Kulkarni, Anand Tripathi |
Context-aware role-based access control in pervasive computing systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
context-based access control, pervasive computing, RBAC, context-aware computing |
31 | Li Ma, Shilong Ma, Yuefei Sui |
A Dynamic Description Logic Approach to Extended RBAC Model. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
RoleMiner: mining roles using subset enumeration. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
31 | Lihua Yu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong |
Securely Sharing Data in Encrypted Databases. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. |
DEXA |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Hua Wang 0002, Yanchun Zhang, Jinli Cao, Jian Yang |
Specifying Role-Based Access Constraints with Object Constraint Language. |
APWeb |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Kevin Leyton-Brown, Robert McGrew 0001, Ryan Porter |
Conference report: the fourth ACM conference on electronic commerce. |
SIGecom Exch. |
2003 |
DBLP DOI BibTeX RDF |
|
31 | Xinwen Zhang, Sejong Oh, Ravi S. Sandhu |
PBDM: a flexible delegation model in RBAC. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation |
31 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
A Novel Approach to Role-Based Access Control. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Doug Lundquist, Aris M. Ouksel |
Dynamic Subscription Permission: Extending the Depth of Demand-Controlled Flooding. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting |
Role Slices: A Notation for RBAC Permission Assignment and Enforcement. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Håkan Zeffer, Zoran Radovic, Oskar Grenholm, Erik Hagersten |
Exploiting Spatial Store Locality Through Permission Caching in Software DSMs. |
Euro-Par |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Guido Boella, Leendert W. N. van der Torre |
Permission and Authorization in Policies for Virtual Communities of Agents. |
AP2PC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Michael Sonntag, Maria Wimmer 0001 |
Legal Aspects of One-Stop Government: The Case of Applying for a Building Permission. |
EGOV |
2003 |
DBLP DOI BibTeX RDF |
one-stop government, electronic proceedings, building permissions, e-government |
26 | Ugur Halici, Asuman Dogac |
A Method for Concurrency Control in Distributed DBMSs: Permission Test Method. |
SIGMOD Rec. |
1987 |
DBLP DOI BibTeX RDF |
|
22 | Kyoji Kawagoe, Keisuke Kasai |
STRAC: Personal Information Access Control for Emergency Systems. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
Permission rights, Security, Access control, Contexts, Emergency, Situations, Personal information |
22 | Leon Pan, Chang N. Zhang |
A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. |
ACM Trans. Multim. Comput. Commun. Appl. |
2008 |
DBLP DOI BibTeX RDF |
Multilayer access control, secure object, secure permission, secure user, security criterion |
22 | Sylvie Doutre, Peter McBurney, Laurent Perrussel, Jean-Marc Thévenin |
Arguing for gaining access to information. |
AAMAS |
2007 |
DBLP DOI BibTeX RDF |
argumentation, dialogue, permission |
22 | Muhammad Alam, Michael Hafner, Ruth Breu |
Constraint based role based access control (CRBAC) for restricted administrative delegation constraints in the SECTET. |
PST |
2006 |
DBLP DOI BibTeX RDF |
administrative role based access control, permission-level delegation, service oriented architectures, model-driven architecture |
22 | Sameer Patil, Jennifer Lai |
Who gets to know what when: configuring privacy permissions in an awareness application. |
CHI |
2005 |
DBLP DOI BibTeX RDF |
contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure |
22 | Alban Gabillon |
An authorization model for XML databases. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
Xupdate, privilege, security, XML, access controls, XPath, permission |
22 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
A graph-based formalism for RBAC. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
Access control in information systems, decentralized administration, permission management, role-based access control, correctness, graph transformations |
22 | Yu-Chen Kuo |
Composite k-Arbiters. |
IEEE Trans. Parallel Distributed Syst. |
2001 |
DBLP DOI BibTeX RDF |
h-out-of-k mutual exclusion, permission-based algorithms, fault tolerance, Distributed systems, quorums |
22 | Michel Raynal |
A Distributed Solution to the k-out of-M Resources Allocation Problem. |
ICCI |
1991 |
DBLP DOI BibTeX RDF |
k-out of-M resources allocation, and-synchronization, permission-based algorithms, distributed mutual exclusion, distributed synchronization |
20 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson |
Package-Role Based Authorization Control Model for Wireless Network Services. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Mike Dodds, Xinyu Feng 0001, Matthew J. Parkinson, Viktor Vafeiadis |
Deny-Guarantee Reasoning. |
ESOP |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri |
Towards formal security analysis of GTRBAC using timed automata. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
GTRBAC, model checking, timed automata, security analysis, ctl |
20 | K. Rustan M. Leino, Peter Müller 0001, Jan Smans |
Verification of Concurrent Programs with Chalice. |
FOSAD |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson |
TVA: a DoS-limiting network architecture. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Joseph Y. Halpern, Vicky Weissman |
A formal foundation for XrML. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
Digital rights management |
20 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Leveraging Lattices to Improve Role Mining. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Ninghui Li |
How to make Discretionary Access Control secure against trojan horses. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Vijay Atluri |
Panel on role engineering. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
20 | Huaiming Li, Ke Tian, Yingying Gao |
Research on Dynamic Delegation Model. |
Web Intelligence/IAT Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Shaomin Zhang, Xiangjun Kong, Baoyi Wang |
Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yaling Nie 0001, Hideya Yoshiuchi |
A Fast Channel Switching Method in EPON System for IPTV Service. |
AccessNets |
2008 |
DBLP DOI BibTeX RDF |
Channel switching, IPTV, QoE, EPON |
20 | Kevin Bierhoff, Jonathan Aldrich |
PLURAL: checking protocol compliance under aliasing. |
ICSE Companion |
2008 |
DBLP DOI BibTeX RDF |
annotations, aliasing, permissions, typestate |
20 | Hanne Riis Nielson, Flemming Nielson |
A flow-sensitive analysis of privacy properties. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
20 | Cristian Prisacariu, Gerardo Schneider |
A Formal Language for Electronic Contracts. |
FMOODS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Qun Ni, Dan Lin 0001, Elisa Bertino, Jorge Lobo 0001 |
Conditional Privacy-Aware Role Based Access Control. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sejong Oh, Ravi S. Sandhu, Xinwen Zhang |
An effective role administration model using organization structure. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
role administration, Access control, RBAC, role-based access control |
20 | Hiroaki Hazeyama, Youki Kadobayashi, Daisuke Miyamoto, Masafumi Oe |
An Autonomous Architecture for Inter-Domain Traceback across the Borders of Network Operation. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Håkan Zeffer, Zoran Radovic, Martin Karlsson, Erik Hagersten |
TMA: a trap-based memory architecture. |
ICS |
2006 |
DBLP DOI BibTeX RDF |
distributed shared memory (DSM), low complexity server design, node coherence checks, server design, simultaneous multi-threading (SMT), software coherence, trap-based memory architecture (TMA), chip multi processor (CMP) |
20 | Yu Peng, Quanyuan Wu |
Secure Communication and Access Control for Web Services Container. |
GCC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Muhammad Alam, Michael Hafner, Ruth Breu |
A constraint based role based access control in the SECTET a model-driven approach. |
PST |
2006 |
DBLP DOI BibTeX RDF |
service oriented architectures, role based access control, model-driven architecture, model-driven security |
20 | Hua Wang 0002, Jinli Cao, David Ross |
Role-Based Delegation with Negative Authorization. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 957 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|