|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 519 occurrences of 282 keywords
|
|
|
Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu |
Role mining based on weights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 65-74, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
similarity, weight, role engineering, role mining, rbac |
71 | Kevin Bierhoff, Jonathan Aldrich |
Modular typestate checking of aliased objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21-25, 2007, Montreal, Quebec, Canada, pp. 301-320, 2007, ACM, 978-1-59593-786-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
linear logic, aliasing, permissions, typestates, behavioral subtyping |
70 | Jason Crampton |
On permissions, inheritance and role hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 85-92, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
role-based access control, inheritance, mandatory access control, permissions |
69 | Franz Kollmann |
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 517-523, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Gleb Naumovich |
A conservative algorithm for computing the flow of permissions in Java programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the International Symposium on Software Testing and Analysis, ISSTA 2002, Roma, Italy, July 22-24, 2002, pp. 33-43, 2002, ACM, 1-58113-562-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, java, verification, static analysis, data flow analysis |
61 | Guido Boella, Leendert W. N. van der Torre |
Institutions with a hierarchy of authorities in distributed dynamic environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 16(1), pp. 53-71, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Institutions, Permissions, Normative systems |
59 | Vikhyath Rao, Trent Jaeger |
Dynamic mandatory access control for multiple stakeholders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 53-62, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, selinux, distributed access control |
57 | John Boyland |
Checking Interference with Fractional Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 10th International Symposium, SAS 2003, San Diego, CA, USA, June 11-13, 2003, Proceedings, pp. 55-72, 2003, Springer, 3-540-40325-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong |
Expandable grids for visualizing and authoring computer security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, 2008, Florence, Italy, April 5-10, 2008, pp. 1473-1482, 2008, ACM, 978-1-60558-011-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, file permissions, security, visualization, privacy |
51 | Kevin Bierhoff, Jonathan Aldrich |
PLURAL: checking protocol compliance under aliasing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, Companion Volume, pp. 971-972, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
annotations, aliasing, permissions, typestate |
50 | Sven Stork, Paulo Marques, Jonathan Aldrich |
Concurrency by default: using permissions to express dataflow in stateful programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 933-940, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access permissions, concurrency, programming language, dataflow |
50 | Lalana Kagal, Tim Finin |
Modeling conversation policies using permissions and obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 14(2), pp. 187-206, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Conversation policy, Conversation specifications, Speech act ontology, Agent communication, Permissions, Obligations, Ontology languages |
49 | Jan Jürjens, Jörg Schreck, Yijun Yu |
Automated Analysis of Permission-Based Security Using UMLsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FASE ![In: Fundamental Approaches to Software Engineering, 11th International Conference, FASE 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29-April 6, 2008. Proceedings, pp. 292-295, 2008, Springer, 978-3-540-78742-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
RoleMiner: mining roles using subset enumeration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 144-153, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
49 | Kun Wang, Zhenguo Ding, Lihua Zhou |
Efficient Access Control in Wireless Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT Workshops ![In: Proceedings of the 2006 IEEE/WIC/ACM International Conference on Intelligent Agent Technology - Workshops, Hong Kong, China, 18-22 December 2006, pp. 85-88, 2006, IEEE Computer Society, 0-7695-2749-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jan Jürjens, Markus Lehrhuber, Guido Wimmel |
Model-Based Design and Analysis of Permission-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 16-20 June 2005, Shanghai, China, pp. 224-233, 2005, IEEE Computer Society, 0-7695-2284-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Yang Zhao, Ligong Yu, Jia Bei |
Assure Parallel Interference Patterns in Multithreaded Programs with Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 668-671, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Matthias Merz |
The management of users, roles, and permissions in JDOSecure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java, PPPJ 2006, Mannheim, Germany, August 30 - September 1, 2006, pp. 85-93, 2006, ACM, 3-939352-05-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Richard Bornat, Cristiano Calcagno, Peter W. O'Hearn, Matthew J. Parkinson |
Permission accounting in separation logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005, pp. 259-270, 2005, ACM, 1-58113-830-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
concurrency, logic, separation, permissions |
40 | Nels E. Beckman |
Verifying correct usage of atomic blocks using access permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-13, 2007, Nashville, TN, USA, pp. 905-906, 2008, ACM, 978-1-60558-220-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
transactional memory, permissions, typestate |
39 | Thomas P. Jensen |
Certificates of Resource Usage on Mobile Telephones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Second International Symposium, ISoLA 2006, Paphos, Cyprus, 15-19 November 2006, pp. 6-7, 2006, IEEE Computer Society, 978-0-7695-3071-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Guido Boella, Leendert W. N. van der Torre |
A Logical Architecture of a Normative System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEON ![In: Deontic Logic and Artificial Normative Systems, 8th International Workshop on Deontic Logic in Computer Science, DEON 2006, Utrecht, The Netherlands, July 12-14, 2006, Proceedings, pp. 24-35, 2006, Springer, 3-540-35842-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 168-176, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
39 | Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan |
A Task-Oriented Access Control Model for WfMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 168-177, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Dirk Schwartmann |
An Attributable Role-Based Access Control for Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part IV, pp. 1148-1155, 2004, Springer, 3-540-22129-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
39 | John A. Trono |
Comments on "Tagged Semaphores". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 34(4), pp. 7-11, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Matthias Merz, Markus Aleksy |
Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 449-458, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Muhammad Alam, Ruth Breu, Michael Hafner |
Modeling permissions in a (U/X)ML world. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 685-692, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Souhila Kaci, Leendert W. N. van der Torre |
Permissions and Uncontrollable Propositions in DSDL3: Non-monotonicity and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEON ![In: Deontic Logic and Artificial Normative Systems, 8th International Workshop on Deontic Logic in Computer Science, DEON 2006, Utrecht, The Netherlands, July 12-14, 2006, Proceedings, pp. 161-174, 2006, Springer, 3-540-35842-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Guido Boella, Leendert W. N. van der Torre |
An architecture of a normative system: counts-as conditionals, obligations and permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), Hakodate, Japan, May 8-12, 2006, pp. 229-231, 2006, ACM, 1-59593-303-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MAS theory, normative multi-agent systems, normative systems |
38 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 310-323, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Till Schümmer, Jörg M. Haake, Anja Haake |
A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments ![In: From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, Essays Dedicated to Erich J. Neuhold on the Occasion of His 65th Birthday, pp. 251-260, 2005, Springer, 3-540-24551-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, CSCW, virtual environments, Shared workspaces, group formation |
38 | Sameer Patil, Jennifer Lai |
Who gets to know what when: configuring privacy permissions in an awareness application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 101-110, 2005, ACM, 1-58113-998-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure |
38 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström |
Removing permissions in the flexible authorization framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 28(3), pp. 209-229, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
logic programming, authorization, Access control policy |
36 | Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid |
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.06534, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid |
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, CHI 2023, Hamburg, Germany, April 23-28, 2023, pp. 168:1-168:24, 2023, ACM, 978-1-4503-9421-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Quang Do, Ben Martini, Kim-Kwang Raymond Choo |
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014, pp. 949-954, 2014, IEEE Computer Society, 978-1-4799-6513-7. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Heule, K. Rustan M. Leino, Peter Müller 0001, Alexander J. Summers |
Abstract Read Permissions: Fractional Permissions without the Fractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 14th International Conference, VMCAI 2013, Rome, Italy, January 20-22, 2013. Proceedings, pp. 315-334, 2013, Springer, 978-3-642-35872-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Romain Bardou |
Verification of Pointer Programs Using Regions and Permissions. (Vérification de programmes avec pointeurs à l'aide de régions et de permissions). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2011 |
RDF |
|
36 | K. Hanner, Rudolf Hörmanseder |
Managing Windows NT®file system permissions - A security tool to master the complexity of Microsoft Windows NT®file system permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Comput. Appl. ![In: J. Netw. Comput. Appl. 22(2), pp. 119-131, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Nels E. Beckman, Kevin Bierhoff, Jonathan Aldrich |
Verifying correct usage of atomic blocks and typestate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-23, 2008, Nashville, TN, USA, pp. 227-244, 2008, ACM, 978-1-60558-215-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
transactional memory, permissions, typestate |
32 | Michael Sonntag, Maria Wimmer 0001 |
Legal Aspects of One-Stop Government: The Case of Applying for a Building Permission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, Second International Conference, EGOV 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 385-392, 2003, Springer, 3-540-40845-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
one-stop government, electronic proceedings, building permissions, e-government |
32 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
32 | Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou |
Ponder: Realising Enterprise Viewpoint Concepts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 25-28 September 2000, Makuhari, Japan, Proceedings, pp. 66-75, 2000, IEEE Computer Society, 0-7695-0865-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
distributed object enterprise concepts, enterprise viewpoint concepts, Ponder language, prohibitions, nested communities, mobile telecommunication network, specification, declarative language, permissions, obligations, business communication, language constructs |
29 | Mohammad Nauman, Sohail Khan, Xinwen Zhang |
Apex: extending Android permission model and enforcement with user-defined runtime constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 328-332, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
policy framework, constraints, Android, mobile platforms |
29 | Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia |
Effective Visualization of File System Access-Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 5th International Workshop on Visualization for Computer Security, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings, pp. 18-25, 2008, Springer, 978-3-540-85931-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Juan Manuel Crespo, Gustavo Betarte, Carlos Luna 0001 |
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TYPES ![In: Types for Proofs and Programs, International Conference, TYPES 2008, Torino, Italy, March 26-29, 2008, Revised Selected Papers, pp. 49-63, 2008, Springer, 978-3-642-02443-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, Access control models, formal proofs |
29 | Paul El Khoury, Emmanuel Coquery, Mohand-Said Hacid |
Consistency checking of role assignments in inter-organizational collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2008, November 4, 2008, Irvine, California, USA, Proceedings, pp. 82-88, 2008, ACM. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
bridge rules, role based access control, description logic, roles, inter-organizational |
29 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 391-403, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann |
Permission Set Mining: Discovering Practical and Useful Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 247-256, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 237-246, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Byeong-Mo Chang |
Static check analysis for Java stack inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGPLAN Notices ![In: ACM SIGPLAN Notices 41(3), pp. 40-48, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, Java, Java, static analysis, stack inspection |
29 | Romuald Thion, Stéphane Coulondre |
Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS ![In: Conceptual Structures: Inspiration and Application, 14th International Conference on Conceptual Structures, ICCS 2006, Aalborg, Denmark, July 16-21, 2006, Proceedings, pp. 427-440, 2006, Springer, 3-540-35893-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Noa Tuval, Ehud Gudes |
Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 148-162, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role graph consistency, canonical groups, Role based access control |
29 | Aizhong Lin, Erik Vullings, James Dalziel |
A Trust-based Access Control Model for Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing Workshops - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 557-564, 2006, IEEE Computer Society, 0-7695-2695-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Antonio Corradi, Rebecca Montanari, Daniela Tibaldi |
Context-Based Access Control for Ubiquitous Service Provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 28th International Computer Software and Applications Conference (COMPSAC 2004), Design and Assessment of Trustworthy Software-Based Systems, 27-30 September 2004, Hong Kong, China, Proceedings, pp. 444-451, 2004, IEEE Computer Society, 0-7695-2209-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 343-350, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Anindya Banerjee 0001, David A. Naumann |
History-Based Access Control and Secure Information Flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASSIS ![In: Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers, pp. 27-48, 2004, Springer, 3-540-24287-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 125-133, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell |
Access Control for Active Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 343-352, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Emmett Witchel, Josh Cates, Krste Asanovic |
Mondrian memory protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 10th International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS-X), San Jose, California, USA, October 5-9, 2002., pp. 304-316, 2002, ACM Press, 1-58113-574-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Pete Epstein, Ravi S. Sandhu |
Engineering of Role/Permission Assignments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 127-136, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Ravi S. Sandhu, Qamar Munawer |
The ARBAC99 Model for Administration of Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 229-238, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Yang Zhao, John Boyland |
Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 20th Australian Software Engineering Conference (ASWEC 2009), 14-17 April 2009, Gold Cost, Australia, pp. 277-286, 2009, IEEE Computer Society, 978-0-7695-3599-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Stijn Goedertier, Jan Vanthienen |
Designing Compliant Business Processes with Obligations and Permissions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2006 International Workshops, BPD, BPI, ENEI, GPWW, DPM, semantics4ws, Vienna, Austria, September 4-7, 2006, Proceedings, pp. 5-14, 2006, Springer, 3-540-38444-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Travis D. Breaux, Annie I. Antón |
Analyzing Goal Semantics for Rights, Permissions, and Obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RE ![In: 13th IEEE International Conference on Requirements Engineering (RE 2005), 29 August - 2 September 2005, Paris, France, pp. 177-188, 2005, IEEE Computer Society, 0-7695-2425-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Philippe Balbiani |
A formal examination of roles and permissions in access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 96, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Lalana Kagal, Timothy W. Finin |
Modeling Communicative Behavior Using Permissions and Obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AC ![In: Agent Communication, International Workshop on Agent Communication, AC 2004, New York, NY, USA, July 19, 2004, Revised Selected and Invited Papers, pp. 120-133, 2004, Springer, 3-540-25015-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil |
Adding Attributes to Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(6), pp. 79-81, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Dynamic roles, Adding and managing attributes, Controlling permissions, Role-based access control, attribute based access control |
22 | Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Zachary Sparks |
Typestate-oriented programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 1015-1022, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
programming language, objects, types, states, permissions, typestate, paradigms |
22 | Kevin Bierhoff |
Checking API protocol compliance in java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 23rd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2008, October 19-13, 2007, Nashville, TN, USA, pp. 915-916, 2008, ACM, 978-1-60558-220-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
permissions, typestate |
22 | Sebastian Höhn, Jan Jürjens |
Rubacon: automated support for model-based compliance engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 875-878, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
user permissions, access control, security analysis |
22 | Rose K. Shumba |
Teaching hands-on Linux host computer security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Educ. Resour. Comput. ![In: ACM J. Educ. Resour. Comput. 6(3), pp. 5, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
file integrity, file permissions, host security exercises, user accounts, cryptography, Computer security |
22 | John Tang Boyland, William Retert |
Connecting effects and uniqueness with adoption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2005, Long Beach, California, USA, January 12-14, 2005, pp. 283-295, 2005, ACM, 1-58113-830-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
adoption, ownership, uniqueness, permissions |
22 | Neelakantan R. Krishnaswami, Jonathan Aldrich |
Permission-based ownership: encapsulating state in higher-order typed languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 96-106, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
modularity, lambda calculus, type theory, state, domains, ownership types, permissions, system f |
22 | Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
On modeling system-centric information for role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 169-178, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attributive permissions, role-based access control, information flow, information model, role engineering |
20 | Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita |
Capability-based delegation model in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 109-118, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
capability-based access control, delegation, rbac |
20 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara |
Resiliency Policies in Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(4), pp. 20:1-20:34, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerant, Access control, policy design |
20 | Wamberto Weber Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman |
Normative conflict resolution in multi-agent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 19(2), pp. 124-152, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Detection and resolution of normative conflicts, Norms |
20 | Jan Camenisch, Maria Dubovitskaya, Gregory Neven |
Oblivious transfer with access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 131-140, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy, oblivious transfer, anonymous credentials |
20 | Puneet Gupta, Scott D. Stoller |
Verification of Security Policy Enforcement in Enterprise Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 202-213, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Anas Abou El Kalam, Philippe Balbiani |
A Policy Language for Modelling Recommendations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 176-189, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Frithjof Dau, Martin Knechtel |
Access Policy Design Supported by FCA Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS ![In: Conceptual Structures: Leveraging Semantic Technologies, 17th International Conference on Conceptual Structures, ICCS 2009, Moscow, Russia, July 26-31, 2009. Proceedings, pp. 141-154, 2009, Springer, 978-3-642-03078-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby |
Modular string-sensitive permission analysis with demand-driven precision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Proceedings, pp. 177-187, 2009, IEEE, 978-1-4244-3452-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | K. Rustan M. Leino, Peter Müller 0001, Jan Smans |
Verification of Concurrent Programs with Chalice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FOSAD ![In: Foundations of Security Analysis and Design V, FOSAD 2007/2008/2009 Tutorial Lectures, pp. 195-222, 2009, Springer, 978-3-642-03828-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 11-20, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
20 | Vijay Atluri |
Panel on role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 61-62, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
20 | Pierre Parrend, Stéphane Frénot |
Component-Based Access Control: Secure Software Composition through Static Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SC@ETAPS ![In: Software Composition - 7th International Symposium, SC@ETAPS 2008, Budapest, Hungary, March 29-30, 2008. Proceedings, pp. 68-83, 2008, Springer, 978-3-540-78788-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yang Zhao, John Boyland |
A Fundamental Permission Interpretation for Ownership Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TASE ![In: Second IEEE/IFIP International Symposium on Theoretical Aspects of Software Engineering, TASE 2008, June 17-19, 2008, Nanjing, China, pp. 65-72, 2008, IEEE Computer Society, 978-0-7695-3249-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ownership, Permission |
20 | Ruth Breu, Gerhard Popp, Muhammad Alam |
Model based development of access policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 9(5-6), pp. 457-470, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 125-130, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mika Koganeyama, Naoshi Tabuchi, Takaaki Tateishi |
Reducing Unnecessary Conservativeness in Access Rights Analysis with String Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5-7 December 2007, Nagoya, Japan, pp. 438-445, 2007, IEEE Computer Society, 0-7695-3057-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Lilong Han, Qingtang Liu, Zongkai Yang |
Role-based Administration of User-role Assignment and Its Oracle Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 437-444, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee |
Activity-based Access Control Model to Hospital Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTCSA ![In: 13th IEEE International Conference on Embedded and Real-Time Computing Systems and Applications (RTCSA 2007), 21-24 August 2007, Daegu, Korea, pp. 488-496, 2007, IEEE Computer Society, 0-7695-2975-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Martin J. Kollingbaum, Wamberto Weber Vasconcelos, Andrés García-Camino, Timothy J. Norman |
Managing Conflict Resolution in Norm-Regulated Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agents World VIII, 8th International Workshop, ESAW 2007, Athens, Greece, October 22-24, 2007, Revised Selected Papers, pp. 55-71, 2007, Springer, 978-3-540-87653-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Andrés García-Camino, Juan A. Rodríguez-Aguilar, Wamberto Weber Vasconcelos |
A Distributed Architecture for Norm Management in Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COIN ![In: Coordination, Organizations, Institutions, and Norms in Agent Systems III, COIN 2007, International Workshops COIN@AAMAS 2007, Honolulu, HI, USA, May 14, 2007, COIN@MALLOW 2007, Durham, UK, September 3-4, 2007, Revised Selected Papers, pp. 275-286, 2007, Springer, 978-3-540-79002-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Manigandan Radhakrishnan, Jon A. Solworth |
Application security support in the operating system kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 201-211, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, access controls, operating systems, authorization, information flow, separation of duty |
20 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
Resiliency policies in access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 113-123, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerant, access control, policy design |
20 | Frode Hansen, Vladimir A. Oleshchuk |
Location-based Security Framework for use of Handheld Devices in Medical Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy, pp. 565-569, 2006, IEEE Computer Society, 0-7695-2520-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 751 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|