The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for privilege with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1994 (15) 1995-1999 (17) 2000-2001 (23) 2002 (19) 2003 (35) 2004 (38) 2005 (39) 2006 (33) 2007 (63) 2008 (38) 2009 (23) 2010 (17) 2011-2012 (26) 2013 (17) 2014 (17) 2015 (22) 2016 (20) 2017 (23) 2018 (29) 2019 (27) 2020 (25) 2021 (25) 2022 (24) 2023 (37) 2024 (5)
Publication types (Num. hits)
article(168) incollection(3) inproceedings(475) phdthesis(11)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 345 occurrences of 237 keywords

Results
Found 657 publication records. Showing 657 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
167Bin Liang, Heng Liu, Wenchang Shi, Yanjun Wu Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
102Sara Motiee, Kirstie Hawkey, Konstantin Beznosov Do windows users follow the principle of least privilege?: investigating user account control practices. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF least privilege principle, least privilege user account, user account control, usable security
89Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, key management, pairwise key, Least privilege, key revocation
89Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privilege, wireless sensor networks, mobile sinks
71Makoto Hatakeyama, Shigeyoshi Shima Privilege federation between different user profiles for service federation. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privilege management, access control, identity federation
62Hyuk-Jang Park, Sung-Bae Cho An Effective HMM-Based Intrusion Detection System with Privilege Change Event Modeling. Search on Bibsonomy PRICAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
60Akshay Krishnamurthy, Adrian Mettler, David A. Wagner 0001 Fine-grained privilege separation for web applications. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF object-capabilities, privilege separation, web applications
60Liang Chen, Jason Crampton Inter-domain role mapping and least privilege. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IDRM, RBAC, least privilege
55Gang Yin, Huaimin Wang, Dian-xi Shi, Haiya Gu Towards More Controllable and Practical Delegation. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Koen Buyens Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege Violations. Search on Bibsonomy 2012   RDF
51Chenggong Lv, Jun Wang 0059, Lu Liu, Weijia You The Separation of Duty with Privilege Calculus. Search on Bibsonomy RSKT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle Extended privilege inheritance in RBAC. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF administrative privileges, access control, RBAC
51Dhananjay Bapat, Kevin R. B. Butler, Patrick D. McDaniel Towards Automated Privilege Separation. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Baowen Zhang, William Zhu 0001, Zhi Xue Mining Privilege Escalation Paths for Network Vulnerability Analysis. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49David W. Chadwick, Alexander Otenko The PERMIS X.509 role based privilege management infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates
44Wei She, Bhavani Thuraisingham, I-Ling Yen Delegation-Based Security Model for Web Services. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin Towards a Times-Based Usage Control Model. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Times-based Usage Control, TUCON, Access Control, Authorization, Usage Control
44Hang Li, Xiyang Liu, Ping Chen Octopus Architecture: A New Attempt to Achieve Reliable OS. Search on Bibsonomy WICSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Tao Zhang, Mingzeng Hu, Xiao-chun Yun, Yongzheng Zhang 0002 Computer Vulnerability Evaluation Using Fault Tree Analysis. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
44Amit Purohit, Vishnu Navda, Tzi-cker Chiueh Tracing the Root of "Rootable" Processes. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Timothy E. Levin, Cynthia E. Irvine, Clark Weissman, Thuy D. Nguyen Analysis of three multilevel security architectures. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF partitioning kernel, principle of least privilege, architecture, multilevel security, security kernel, separation kernel
42Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. Search on Bibsonomy PRIMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure
42Arnon Rosenthal, Edward Sciore Abstracting and Refining Authorization in SQL. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SQL Authorization, Privilege Inference, Views
42Sung-Bae Cho, Sang-Jun Han Two Sophisticated Techniques to Improve HMM-Based Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF privilege flow, combining multiple models, hidden Markov model, anomaly detection
42Byoungcheon Lee, Kwangjo Kim Self-certified Signatures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure
40Koen Buyens, Bart De Win, Wouter Joosen Identifying and Resolving Least Privilege Violations in Software Architectures. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Yan Wenfei, Feng Xiaoyu, Zhou Jin Use Castle IoC to Implement Privilege Service. Search on Bibsonomy CSSE (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Paul Z. Kolano Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiport protocols, security, grids, Firewalls, high performance networking, network access control
40Michael Yanguo Liu, Issa Traoré Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. Search on Bibsonomy IEEE METRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi Trust Management with Safe Privilege Propagation. Search on Bibsonomy APPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Youna Jung, Eenjun Hwang A Flexible Privilege Management Scheme for Role Graph Model. Search on Bibsonomy PARA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Gail-Joon Ahn, Dongwan Shin, Longhua Zhang Role-Based Privilege Management Using Attribute Certificates and Delegation. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Richard Au, Ming Yao, Mark Looi Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Philip W. L. Fong Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Principle of Privilege Attenuation, completeness of static analysis, access control, soundness, Sybil attacks, social network systems
38Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson An authentication model for delegation, attribution and least privilege. Search on Bibsonomy PETRA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege
38Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers A privilege management and enforcement system for distributed resource sharing. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation
35Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan A fast user actual privilege reasoning framework based on privilege dependency graph reduction. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
35Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto Additional kernel observer: privilege escalation attack prevention mechanism focusing on system call privilege changes. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
35Toshihiro Yamauchi, Yohei Akao, Ryota Yoshitani, Yuichi Nakamura 0005, Masaki Hashimoto Additional Kernel Observer to Prevent Privilege Escalation Attacks by Focusing on System Call Privilege Changes. Search on Bibsonomy DSC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
35Ching-Nung Yang, Jung-Kuo Liao, Daoshun Wang New privilege-based visual cryptography with arbitrary privilege levels. Search on Bibsonomy J. Vis. Commun. Image Represent. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
35Maxwell N. Krohn, Petros Efstathopoulos, Cliff Frey, M. Frans Kaashoek, Eddie Kohler, David Mazières, Robert Tappan Morris, Michelle Osborne, Steve Vandebogart, David Ziegler Make Least Privilege a Right (Not a Privilege). Search on Bibsonomy HotOS The full citation details ... 2005 DBLP  BibTeX  RDF
33Donggang Liu Efficient and Distributed Access Control for Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33David A. Wagner 0001 Object capabilities for security. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann Using Authority Certificates to Create Management Structures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
33Wayne A. Jansen Determining Privileges of Mobile Agents. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Sara Motiee, Kirstie Hawkey, Konstantin Beznosov Investigating user account control practices. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF user account control, usable security, least privilege
31Thuy D. Nguyen, Timothy E. Levin, Cynthia E. Irvine High Robustness Requirements in a Common Criteria Protection Profile. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF high robustness, common criteria, dynamic configuration, least privilege, separation kernel
31Isaac Agudo, Javier López 0001, José A. Montenegro A Representation Model of Trust Relationships with Delegation Extensions. Search on Bibsonomy iTrust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Privilege Management Infrastructure (PMI), Authorization, Delegation, Graph representation, Attribute Certificate
31Markus Lorch, Dennis G. Kafura The PRIMA Grid Authorization System. Search on Bibsonomy J. Grid Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privilege management, access control, authorization, Grid security, enforcement
31Winfried E. Kühnhauser Root Kits: an operating systems viewpoint. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF error exploitation, error proliferation, kernel abstractions, mandatory and discretionary access control, privilege proliferation, secure program execution, reference monitor, trusted computing base, security domains, secure booting
31Javier López 0001, Antonio Mana, Ernesto Pimentel 0001, José M. Troya, Mariemma Inmaculada Yagüe del Valle Access Control Infrastructure for Digital Objects. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure content distribution, XML metadata, Privilege Management Infrastructure, Distributed systems security
31Rodolphe Ortalo, Yves Deswarte, Mohamed Kaâniche Experimenting with Quantitative Evaluation Tools for Monitoring Operational Security. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF operational vulnerabilities, privilege graph, quantitative evaluation, Security assessment
29Christoph Sturm, Ela Hunt, Marc H. Scholl Distributed Privilege Enforcement in PACS. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Mehran Ahsant, Jim Basney, S. Lennart Johnsson Dynamic, context-aware, least-privilege grid delegation. Search on Bibsonomy GRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Kemal Bicakci, Nazife Baykal A New Design of Privilege Management Infrastructure with Binding Signature Semantics. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF binding signature semantics, digital signature, revocation, attribute certificate, PMI
29Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot Discretionary Overriding of Access Control in the Privilege Calculus. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Dong-Gue Park, You-Ri Lee The RBAC Based Privilege Management for Authorization of Wireless Networks. Search on Bibsonomy WAIM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Dong-Gue Park, You-Ri Lee The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Markus Lorch, David Bruce Adams, Dennis G. Kafura, M. S. R. Koneni, A. Rathi, Sumit Shah The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. Search on Bibsonomy GRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
29Marc Dacier, Yves Deswarte Privilege Graph: an Extension to the Typed Access Matrix Model. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22Neal H. Walfield, Paul T. Stanton, John Linwood Griffin, Randal C. Burns Practical protection for personal storage in the cloud. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web services, access control, data management, cloud
22Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi Secure in-VM monitoring using hardware virtualization. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel integrity, virtual machines, malware, secure monitoring
22Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt A-COLD: Access Control of Web OLAP over Multi-data Warehouse. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Lars E. Olson 0001, Carl A. Gunter, William R. Cook, Marianne Winslett Implementing Reflective Access Control in SQL. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Yanjiang Yang, Yingjiu Li, Jian Weng 0001, Jianying Zhou 0001, Feng Bao 0001 Self-enforcing Private Inference Control. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF self-enforcing, database, Inference control
22Lars E. Olson 0001, Carl A. Gunter, P. Madhusudan A formal framework for reflective database access control policies. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal safety verification, reflective database access control, transaction datalog, fine-grained access control
22Nan Dun, Kenjiro Taura, Akinori Yonezawa GMount: Build your grid file system on the fly. Search on Bibsonomy GRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jodie P. Boyer, Ragib Hasan, Lars E. Olson 0001, Nikita Borisov, Carl A. Gunter, David Raila Improving multi-tier security using redundant authentication. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Building Automation Systems, authentication
22M. A. C. Dekker, Sandro Etalle Refinement for Administrative Policies. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Feng Chen 0004, Shaoyun Li, Hongji Yang Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Paolina Centonze, Robert J. Flynn, Marco Pistoia Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Mark Aiken, Manuel Fähndrich, Chris Hawblitzel, Galen C. Hunt, James R. Larus Deconstructing process isolation. Search on Bibsonomy Memory System Performance and Correctness The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware isolated process (HIP), hardware protection domain, software isolated process (SIP), singularity
22Daisuke Hara, Yasuichi Nakayama Secure and High-Performance Web Server System for Shared Hosting Service. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Shaomin Zhang, Xiaoyan Liang, Baoyi Wang Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Xuhui Ao, Naftaly H. Minsky Regulated Delegation in Distributed Systems. Search on Bibsonomy POLICY The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Yen-Cheng Chen, Lo-Yao Yeh An Efficient Authentication and Access Control Scheme Using Smart Cards. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen Grid Authorization Management Oriented to Large-Scale Collaborative Computing. Search on Bibsonomy CSCWD (Selected papers) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Security Policies to Mitigate Insider Threat in the Document Control Domain. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Hirotake Abe, Kazuhiko Kato Security Policy Descriptions Through the Use of Control Structure of a Target Program. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Mina Jeong, Jung-Ja Kim, Yonggwan Won A Flexible Database Security System Using Multiple Access Control Policies. Search on Bibsonomy DEXA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Toshiyuki Maeda, Akinori Yonezawa Kernel Mode Linux: Toward an Operating System Protected by a Type Theory. Search on Bibsonomy ASIAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Frédéric Cuppens, Alexandre Miège Modelling Contexts in the Or-BAC Model. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Robert P. Goldman A Stochastic Model for Intrusions. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Calvin Ko, Timothy Redmond Noninterference and Intrusion Detection. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Jean Bacon, Ken Moody, Walt Yao Access Control and Trust in the Use of Widely Distributed Services. Search on Bibsonomy Middleware The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
22Joffroy Beauquier, Ajoy Kumar Datta, Maria Gradinariu, Frédéric Magniette Self-Stabilizing Local Mutual Exclusion and Daemon Refinement. Search on Bibsonomy DISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Local mutual exclusion, unfair daemon, transformer, self-stabilization
22Matunda Nyanchama, Sylvia L. Osborn The Role Graph Model and Conflict of Interest. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF role graphs, role-based security, conflict of interest
22Nittida Nuansri, Samar Singh, Tharam S. Dillon A Process State-Transition Analysis and Its Application to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
22Marjan Jurecic, Herbert Bunz Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22G. Octo Barnett History of the development of medical information systems at the Laboratory of Computer Science at Massachusetts General Hospital. Search on Bibsonomy History of Medical Informatics The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
22Ronald Fagin On an Authorization Mechanism. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1978 DBLP  DOI  BibTeX  RDF security, privacy, access control, database, authorization, protection, revocation, proof of correctness
20Yang Zhang 0015, Junliang Chen Universal Identity Management Model Based on Anonymous Credentials. Search on Bibsonomy IEEE SCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management
20Katelin Bailey, Apu Kapadia, Linden Vongsathorn, Sean W. Smith TwoKind authentication: protecting private information in untrustworthy environments. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF principle of least privilege, authenticators, passwords
20Lei Xia, Wei Huang, Hao Huang A Compositional Multiple Policies Operating System Security Model. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple policy views, integrity assurance, confidentiality assurance, security model, separation of duties, least privilege
20Paolo Giorgini, Fabio Massacci, John Mylopoulos, Nicola Zannone Requirements engineering for trust management: model, methodology, and reasoning. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Agent-oriented software, Trust models for business and organizations, Verification and validation of software, Privilege management, Requirements Engineering, Security Engineering
20Jun Kiniwa How to Improve Safety under Convergence Using Stable Storage. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF false privilege, vulnerability under convergence, self-stabilization, Mutual exclusion, stable storage
20Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert NETRA: : seeing through access control. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privilege escalation, vulnerability reports, static analysis
Displaying result #1 - #100 of 657 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license