|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 345 occurrences of 237 keywords
|
|
|
Results
Found 657 publication records. Showing 657 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
167 | Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu |
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 109-120, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
102 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Do windows users follow the principle of least privilege?: investigating user account control practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
least privilege principle, least privilege user account, user account control, usable security |
89 | Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao |
Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Sens. Networks ![In: ACM Trans. Sens. Networks 4(4), pp. 23:1-23:34, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor networks, key management, pairwise key, Least privilege, key revocation |
89 | Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao |
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the 6th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2005, Urbana-Champaign, IL, USA, May 25-27, 2005, pp. 378-389, 2005, ACM, 1-59593-004-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privilege, wireless sensor networks, mobile sinks |
71 | Makoto Hatakeyama, Shigeyoshi Shima |
Privilege federation between different user profiles for service federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 4th Workshop on Digital Identity Management, Alexandria, VA, USA, October 31, 2008, pp. 41-50, 2008, ACM, 978-1-60558-294-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privilege management, access control, identity federation |
62 | Hyuk-Jang Park, Sung-Bae Cho |
An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2002: Trends in Artificial Intelligence, 7th Pacific Rim International Conference on Artificial Intelligence, Tokyo, Japan, August 18-22, 2002, Proceedings, pp. 617-618, 2002, Springer, 3-540-44038-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Akshay Krishnamurthy, Adrian Mettler, David A. Wagner 0001 |
Fine-grained privilege separation for web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 551-560, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
object-capabilities, privilege separation, web applications |
60 | Liang Chen, Jason Crampton |
Inter-domain role mapping and least privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 157-162, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IDRM, RBAC, least privilege |
55 | Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu |
Towards More Controllable and Practical Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 245-258, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Koen Buyens |
Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege Violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
51 | Chenggong Lv, Jun Wang 0059, Lu Liu, Weijia You |
The Separation of Duty with Privilege Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, Third International Conference, RSKT 2008, Chengdu, China, May 17-19, 2008. Proceedings, pp. 410-417, 2008, Springer, 978-3-540-79720-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
51 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 383-385, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
51 | Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel |
Towards Automated Privilege Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 272-276, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Baowen Zhang, William Zhu 0001, Zhi Xue |
Mining Privilege Escalation Paths for Network Vulnerability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (4) ![In: Fourth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2007, 24-27 August 2007, Haikou, Hainan, China, Proceedings, Volume 4, pp. 56-60, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 135-140, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
44 | Wei She, Bhavani Thuraisingham, I-Ling Yen |
Delegation-Based Security Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 82-91, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin |
Towards a Times-Based Usage Control Model. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 227-242, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Times-based Usage Control, TUCON, Access Control, Authorization, Usage Control |
44 | Hang Li, Xiyang Liu, Ping Chen |
Octopus Architecture: A New Attempt to Achieve Reliable OS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WICSA ![In: Fifth Working IEEE / IFIP Conference on Software Architecture (WICSA 2005), 6-10 November 2005, Pittsburgh, Pennsylvania, USA, pp. 197-198, 2005, IEEE Computer Society, 0-7695-2548-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 |
Computer Vulnerability Evaluation Using Fault Tree Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 302-313, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Amit Purohit, Vishnu Navda, Tzi-cker Chiueh |
Tracing the Root of "Rootable" Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 284-303, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen |
Analysis of three multilevel security architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 37-46, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
partitioning kernel, principle of least privilege, architecture, multilevel security, security kernel, separation kernel |
42 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 339-348, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
42 | Arnon Rosenthal, Edward Sciore |
Abstracting and Refining Authorization in SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 148-162, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SQL Authorization, Privilege Inference, Views |
42 | Sung-Bae Cho, Sang-Jun Han |
Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 6th International Symposium, RAID 2003, Pittsburgh, PA, USA, September 8-10, 2003, Proceedings, pp. 207-219, 2003, Springer, 3-540-40878-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
privilege flow, combining multiple models, hidden Markov model, anomaly detection |
42 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 199-214, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
40 | Koen Buyens, Bart De Win, Wouter Joosen |
Identifying and Resolving Least Privilege Violations in Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 232-239, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Yan Wenfei, Feng Xiaoyu, Zhou Jin |
Use Castle IoC to Implement Privilege Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (2) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 2: Software Engineering, December 12-14, 2008, Wuhan, China, pp. 468-471, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Paul Z. Kolano |
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 38-54, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiport protocols, security, grids, Firewalls, high performance networking, network access control |
40 | Michael Yanguo Liu, Issa Traoré |
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 11th IEEE International Symposium on Software Metrics (METRICS 2005), 19-22 September 2005, Como Italy, pp. 10, 2005, IEEE Computer Society, 0-7695-2371-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi |
Trust Management with Safe Privilege Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 6th International Workshop, APPT 2005, Hong Kong, China, October 27-28, 2005, Proceedings, pp. 174-183, 2005, Springer, 3-540-29639-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Youna Jung, Eenjun Hwang |
A Flexible Privilege Management Scheme for Role Graph Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PARA ![In: Applied Parallel Computing, State of the Art in Scientific Computing, 7th International Workshop, PARA 2004, Lyngby, Denmark, June 20-23, 2004, Revised Selected Papers, pp. 983-991, 2004, Springer, 3-540-29067-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Gail-Joon Ahn, Dongwan Shin, Longhua Zhang |
Role-Based Privilege Management Using Attribute Certificates and Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 100-109, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Richard Au, Ming Yao, Mark Looi |
Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: 2003 IEEE/WIC International Conference on Intelligent Agent Technology (IAT 2003), 13-17 October 2003, Halifax, Canada, pp. 519-522, 2003, IEEE Computer Society, 0-7695-1931-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
38 | Philip W. L. Fong |
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 32nd IEEE Symposium on Security and Privacy, SP 2011, 22-25 May 2011, Berkeley, California, USA, pp. 263-278, 2011, IEEE Computer Society, 978-1-4577-0147-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Principle of Privilege Attenuation, completeness of static analysis, access control, soundness, Sybil attacks, social network systems |
38 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
38 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 106-111, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
35 | Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan |
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(3), pp. 505-517, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
35 | Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto |
Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 20(4), pp. 461-473, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
35 | Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto |
Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: IEEE Conference on Dependable and Secure Computing, DSC 2018, Kaohsiung, Taiwan, December 10-13, 2018, pp. 1-8, 2018, IEEE, 978-1-5386-5790-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
35 | Ching-Nung Yang, Jung-Kuo Liao, Daoshun Wang |
New privilege-based visual cryptography with arbitrary privilege levels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Vis. Commun. Image Represent. ![In: J. Vis. Commun. Image Represent. 42, pp. 121-131, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Maxwell N. Krohn, Petros Efstathopoulos, Cliff Frey, M. Frans Kaashoek, Eddie Kohler, David Mazières, Robert Tappan Morris, Michelle Osborne, Steve Vandebogart, David Ziegler |
Make Least Privilege a Right (Not a Privilege). ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotOS ![In: Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, June 12-15, 2005, Santa Fe, New Mexico, USA, 2005, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
33 | Donggang Liu |
Efficient and Distributed Access Control for Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCOSS ![In: Distributed Computing in Sensor Systems, Third IEEE International Conference, DCOSS 2007, Santa Fe, NM, USA, June 18-20, 2007, Proceedings, pp. 21-35, 2007, Springer, 978-3-540-73089-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | David A. Wagner 0001 |
Object capabilities for security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 1-2, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 134-145, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
33 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 149-158, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
31 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Investigating user account control practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4129-4134, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
user account control, usable security, least privilege |
31 | Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine |
High Robustness Requirements in a Common Criteria Protection Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 66-78, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
high robustness, common criteria, dynamic configuration, least privilege, separation kernel |
31 | Isaac Agudo, Javier López 0001, José A. Montenegro |
A Representation Model of Trust Relationships with Delegation Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 116-130, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privilege Management Infrastructure (PMI), Authorization, Delegation, Graph representation, Attribute Certificate |
31 | Markus Lorch, Dennis G. Kafura |
The PRIMA Grid Authorization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 2(3), pp. 279-298, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privilege management, access control, authorization, Grid security, enforcement |
31 | Winfried E. Kühnhauser |
Root Kits: an operating systems viewpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(1), pp. 12-23, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
error exploitation, error proliferation, kernel abstractions, mandatory and discretionary access control, privilege proliferation, secure program execution, reference monitor, trusted computing base, security domains, secure booting |
31 | Javier López 0001, Antonio Mana, Ernesto Pimentel 0001, José M. Troya, Mariemma Inmaculada Yagüe del Valle |
Access Control Infrastructure for Digital Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 399-410, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure content distribution, XML metadata, Privilege Management Infrastructure, Distributed systems security |
31 | Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche |
Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 25(5), pp. 633-650, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment |
29 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 142-158, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan |
An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, 25-27 Sept. 2008, Dalian, China, pp. 720-727, 2008, IEEE Computer Society, 978-0-7695-3352-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Mehran Ahsant, Jim Basney, S. Lennart Johnsson |
Dynamic, context-aware, least-privilege grid delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), September 19-21, 2007, Austin, Texas, USA, Proceedings, pp. 209-216, 2007, IEEE Computer Society, 1-4244-1560-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Kemal Bicakci, Nazife Baykal |
A New Design of Privilege Management Infrastructure with Binding Signature Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 306-313, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
binding signature semantics, digital signature, revocation, attribute certificate, PMI |
29 | Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot |
Discretionary Overriding of Access Control in the Privilege Calculus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 219-232, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Gue Park, You-Ri Lee |
The RBAC Based Privilege Management for Authorization of Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 4th International Conference, WAIM 2003, Chengdu, China, August 17-19, 2003, Proceedings, pp. 314-326, 2003, Springer, 3-540-40715-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Dong-Gue Park, You-Ri Lee |
The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 84-93, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Markus Lorch, David Bruce Adams, Dennis G. Kafura, M. S. R. Koneni, A. Rathi, Sumit Shah |
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 109-116, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto |
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 136-149, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Robert K. Cunningham, Craig S. Stevenson |
Accurately Detecting Source Code of Attacks That Increase Privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Recent Advances in Intrusion Detection ![In: Recent Advances in Intrusion Detection, 4th International Symposium, RAID 2001 Davis, CA, USA, October 10-12, 2001, Proceedings, pp. 104-116, 2001, Springer, 3-540-42702-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Machine Learning, Intrusion Detection, Malicious Code |
29 | Marc Dacier, Yves Deswarte |
Privilege Graph: an Extension to the Typed Access Matrix Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings, pp. 319-334, 1994, Springer, 3-540-58618-0. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
22 | Neal H. Walfield, Paul T. Stanton, John Linwood Griffin, Randal C. Burns |
Practical protection for personal storage in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROSEC ![In: Proceedings of the Third European Workshop on System Security, EUROSEC 2010, Paris, France, April 13, 2010, pp. 8-14, 2010, ACM, 978-1-4503-0059-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
web services, access control, data management, cloud |
22 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 477-487, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
22 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A-COLD: Access Control of Web OLAP over Multi-data Warehouse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 469-474, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Lars E. Olson 0001, Carl A. Gunter, William R. Cook, Marianne Winslett |
Implementing Reflective Access Control in SQL. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings, pp. 17-32, 2009, Springer, 978-3-642-03006-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 |
Self-enforcing Private Inference Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 260-274, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
self-enforcing, database, Inference control |
22 | Lars E. Olson 0001, Carl A. Gunter, P. Madhusudan |
A formal framework for reflective database access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 289-298, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
formal safety verification, reflective database access control, transaction datalog, fine-grained access control |
22 | Nan Dun, Kenjiro Taura, Akinori Yonezawa |
GMount: Build your grid file system on the fly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29 - October 1, 2008, pp. 328-333, 2008, IEEE Computer Society, 978-1-4244-2578-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila |
Improving multi-tier security using redundant authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 54-62, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Building Automation Systems, authentication |
22 | M. A. C. Dekker, Sandro Etalle |
Refinement for Administrative Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 33-46, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Feng Chen 0004, Shaoyun Li, Hongji Yang |
Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 483-488, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Paolina Centonze, Robert J. Flynn, Marco Pistoia |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 292-303, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Galen C. Hunt, James R. Larus |
Deconstructing process isolation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Memory System Performance and Correctness ![In: Proceedings of the 2006 workshop on Memory System Performance and Correctness, San Jose, California, USA, October 11, 2006, pp. 1-10, 2006, ACM, 1-59593-578-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hardware isolated process (HIP), hardware protection domain, software isolated process (SIP), singularity |
22 | Daisuke Hara, Yasuichi Nakayama |
Secure and High-Performance Web Server System for Shared Hosting Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (1) ![In: 12th International Conference on Parallel and Distributed Systems, ICPADS 2006, Minneapolis, Minnesota, USA, July 12-15, 2006, pp. 161-168, 2006, IEEE Computer Society, 0-7695-2612-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Shaomin Zhang, Xiaoyan Liang, Baoyi Wang |
Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SKG ![In: 2006 International Conference on Semantics, Knowledge and Grid (SKG 2006), 1-3 November 2006, Guilin, China, pp. 69, 2006, IEEE Computer Society, 0-7695-2673-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Xuhui Ao, Naftaly H. Minsky |
Regulated Delegation in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 215-226, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Yen-Cheng Chen, Lo-Yao Yeh |
An Efficient Authentication and Access Control Scheme Using Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 78-82, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected papers) ![In: Computer Supported Cooperative Work in Design I, 8th International Conference, CSCWD 2004, Xiamen, China, May 26-28, 2004, Revised Selected Papers, pp. 55-66, 2004, Springer, 3-540-29400-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 304-313, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hirotake Abe, Kazuhiko Kato |
Security Policy Descriptions Through the Use of Control Structure of a Target Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSS ![In: Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers, pp. 242-261, 2003, Springer, 3-540-23635-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Mina Jeong, Jung-Ja Kim, Yonggwan Won |
A Flexible Database Security System Using Multiple Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 14th International Conference, DEXA 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 876-885, 2003, Springer, 3-540-40806-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Toshiyuki Maeda, Akinori Yonezawa |
Kernel Mode Linux: Toward an Operating System Protected by a Type Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computing Science - ASIAN 2003 Programming Languages and Distributed Computation, 8th Asian Computing Science Conference, Mumbai, India, December 10-14, 2003, Proceedings, pp. 3-17, 2003, Springer, 3-540-20632-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Frédéric Cuppens, Alexandre Miège |
Modelling Contexts in the Or-BAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 416-425, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Robert P. Goldman |
A Stochastic Model for Intrusions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 5th International Symposium, RAID 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 199-218, 2002, Springer, 3-540-00020-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Calvin Ko, Timothy Redmond |
Noninterference and Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2002 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 12-15, 2002, pp. 177-187, 2002, IEEE Computer Society, 0-7695-1543-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Jean Bacon, Ken Moody, Walt Yao |
Access Control and Trust in the Use of Widely Distributed Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware ![In: Middleware 2001, IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Germany, November 12-16, 2001, Proceedings, pp. 295-310, 2001, Springer, 3-540-42800-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Joffroy Beauquier, Ajoy Kumar Datta, Maria Gradinariu, Frédéric Magniette |
Self-Stabilizing Local Mutual Exclusion and Daemon Refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 14th International Conference, DISC 2000, Toledo, Spain, October 4-6, 2000, Proceedings, pp. 223-237, 2000, Springer, 3-540-41143-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Local mutual exclusion, unfair daemon, transformer, self-stabilization |
22 | Matunda Nyanchama, Sylvia L. Osborn |
The Role Graph Model and Conflict of Interest. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(1), pp. 3-33, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
role graphs, role-based security, conflict of interest |
22 | Nittida Nuansri, Samar Singh, Tharam S. Dillon |
A Process State-Transition Analysis and Its Application to Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 378-387, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Marjan Jurecic, Herbert Bunz |
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 30-38, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
22 | G. Octo Barnett |
History of the development of medical information systems at the Laboratory of Computer Science at Massachusetts General Hospital. ![Search on Bibsonomy](Pics/bibsonomy.png) |
History of Medical Informatics ![In: Proceedings of the ACM Conference on History of Medical Informatics, Bethesda, Maryland, USA, November 5-6, 1987, pp. 43-49, 1987, ACM, 0-89791-248-9. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
22 | Ronald Fagin |
On an Authorization Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 3(3), pp. 310-319, 1978. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
security, privacy, access control, database, authorization, protection, revocation, proof of correctness |
20 | Yang Zhang 0015, Junliang Chen |
Universal Identity Management Model Based on Anonymous Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010, pp. 305-312, 2010, IEEE Computer Society, 978-0-7695-4126-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management |
20 | Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith |
TwoKind authentication: protecting private information in untrustworthy environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 39-44, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
principle of least privilege, authenticators, passwords |
20 | Lei Xia, Wei Huang, Hao Huang |
A Compositional Multiple Policies Operating System Security Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 291-302, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege |
20 | Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone |
Requirements engineering for trust management: model, methodology, and reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 5(4), pp. 257-274, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Agent-oriented software, Trust models for business and organizations, Verification and validation of software, Privilege management, Requirements Engineering, Security Engineering |
20 | Jun Kiniwa |
How to Improve Safety under Convergence Using Stable Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 17(4), pp. 389-398, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
false privilege, vulnerability under convergence, self-stabilization, Mutual exclusion, stable storage |
20 | Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert |
NETRA: : seeing through access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006, pp. 55-66, 2006, ACM, 1-59593-550-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privilege escalation, vulnerability reports, static analysis |
Displaying result #1 - #100 of 657 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|