Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan |
An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, 25-27 Sept. 2008, Dalian, China, pp. 720-727, 2008, IEEE Computer Society, 978-0-7695-3352-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 383-385, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
63 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 318-325, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
53 | Andreas P. Heiner, N. Asokan |
Secure software installation in a mobile environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, Pittsburgh, Pennsylvania, USA, July 18-20, 2007, pp. 155-156, 2007, ACM, 978-1-59593-801-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 492-540, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
53 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(3), pp. 242-255, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
data dependent authorization, protection in databases, revocation of authorization, security, privacy, access control, authorization, database systems |
53 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Data Base System (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1976 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, June 2-4, 1976., pp. 51, 1976, ACM, 978-1-4503-4729-7. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
46 | Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropanis |
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UMAP ![In: User Modeling, Adaptation, and Personalization, 17th International Conference, UMAP 2009, formerly UM and AH, Trento, Italy, June 22-26, 2009. Proceedings, pp. 428-434, 2009, Springer, 978-3-642-02246-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Daniele Gorla, Rosario Pugliese |
Resource Access and Mobility Control with Dynamic Privileges Acquisition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 30th International Colloquium, ICALP 2003, Eindhoven, The Netherlands, June 30 - July 4, 2003. Proceedings, pp. 119-132, 2003, Springer, 3-540-40493-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 149-158, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Runlian Zhang, Xiaoshe Dong, Xiaonian Wu |
A Grid Access Control Model Based on Dynamic Negotiating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2006, 5th International Conference, Changsha, Hunan, China, 21-23 October 2006, Proceedings, pp. 408-412, 2006, IEEE Computer Society, 0-7695-2694-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Michael Yanguo Liu, Issa Traoré |
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 11th IEEE International Symposium on Software Metrics (METRICS 2005), 19-22 September 2005, Como Italy, pp. 10, 2005, IEEE Computer Society, 0-7695-2371-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans |
Nomad: A Security Model with Non Atomic Actions and Deadlines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 18th IEEE Computer Security Foundations Workshop, (CSFW-18 2005), 20-22 June 2005, Aix-en-Provence, France, pp. 186-196, 2005, IEEE Computer Society, 0-7695-2340-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita |
A delegation framework for federated identity management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax, VA, USA, November 11, 2005, pp. 94-103, 2005, ACM, 1-59593-232-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
privilege, access control, role, delegation, identity federation |
42 | Jeff Hayes |
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 328-333, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
42 | John T. Robinson, Murthy V. Devarakonda |
Note on a Problem with Reed and Long's FBR Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 31(1), pp. 3-4, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
40 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 159-167, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
40 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 148-157, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
35 | |
Authorization Administration Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 180, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 113-124, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 214-220, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
32 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
A Mechanism for Identity Delegation at Authentication Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 148-162, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Identity Delegation, Usability of Security, Nomadic User, Practical Security |
32 | Keith Irwin, Ting Yu 0001, William H. Winsborough |
Enforcing security properties in task-based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 41-50, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
task-based access control, policy, security properties |
32 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected papers) ![In: Computer Supported Cooperative Work in Design I, 8th International Conference, CSCWD 2004, Xiamen, China, May 26-28, 2004, Revised Selected Papers, pp. 55-66, 2004, Springer, 3-540-29400-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li |
Dynamic Access Control for Multi-privileged Group Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 508-519, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 9th International Workshop, Cambridge, UK, April 25-27, 2001, Revised Papers, pp. 134-145, 2001, Springer, 3-540-44263-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 44-64, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
32 | Ronald Fagin |
On an Authorization Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 3(3), pp. 310-319, 1978. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
security, privacy, access control, database, authorization, protection, revocation, proof of correctness |
29 | Ivo Majetic, Ernst L. Leiss |
Authorization and Revocation in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 9(4), pp. 668-672, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
revoking, bounded propagation of privileges, inheritance, Object-oriented systems, granting |
25 | J. K. Adarsh, V. T. Sreedevi, Deepa Thangavelusamy |
Product Review System With BERT for Sentiment Analysis and Implementation of Administrative Privileges on Node-RED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 65968-65976, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Marek R. Ogiela, Urszula Ogiela |
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSREW ![In: 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023 - Workshops, Florence, Italy, October 9-12, 2023, pp. 39-40, 2023, IEEE, 979-8-3503-1956-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito |
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecureComm ![In: Security and Privacy in Communication Networks - 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings, pp. 290-308, 2022, Springer, 978-3-031-25537-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rohit Ahuja, Sraban Kumar Mohanty |
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 8(1), pp. 32-44, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Zhan Tu, Anastasios Dimas, Mehmet Necip Kurt, Anastasia Mavrommati, Pieter J. Mosterman, Akshay Rajhans, Roberto G. Valenti |
A Simulator for Trading Traffic Privileges by Selfish Driving Cars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Spring Simulation Conference, SpringSim 2020, Fairfax, VA, USA, May 18-21, 2020, pp. 1-12, 2020, IEEE, 978-1-56555-370-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Lanfranco Lopriore, Antonella Santone |
Protected pointers to specify access privileges in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Parallel Distributed Comput. ![In: J. Parallel Distributed Comput. 126, pp. 1-12, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang 0004, Wenxin Li, Zhao Li |
Management of access privileges for dynamic access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Clust. Comput. ![In: Clust. Comput. 22(Supplement), pp. 8899-8917, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin |
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019., pp. 2665-2667, 2019, ACM, 978-1-4503-6747-9. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie |
Role-Based ABAC Model for Implementing Least Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSCA ![In: Proceedings of the 8th International Conference on Software and Computer Applications, ICSCA '19, Penang, Malaysia, February 19-21, 2019, pp. 467-471, 2019, ACM, 978-1-4503-6573-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hailong Liu, Bo Li 0005 |
Automated Classification of Attacker Privileges Based on Deep Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SmartCom ![In: Smart Computing and Communication - 4th International Conference, SmartCom 2019, Birmingham, UK, October 11-13, 2019, Proceedings, pp. 180-189, 2019, Springer, 978-3-030-34138-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hanshu Hong, Zhixin Sun |
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 21(3), pp. 595-607, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Huasong Meng |
Analysing Use of High Privileges in Android Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1804.04605, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang 0017 |
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 14th International Conference, Inscrypt 2018, Fuzhou, China, December 14-17, 2018, Revised Selected Papers, pp. 349-369, 2018, Springer, 978-3-030-14233-9. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Xiaoyu Hu, Jie Zhou 0022, Spyridoula Gravani, John Criswell |
Transforming Code to Drop Dead Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SecDev ![In: 2018 IEEE Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018, pp. 45-52, 2018, IEEE Computer Society, 978-1-5386-7662-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shane Greenstein |
Insider Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 37(5), pp. 70-72, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai |
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 57, pp. 241-256, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Matthew W. Sanders, Chuan Yue |
Automated least privileges in cloud-based web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HotWeb ![In: Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, HotWeb 2017, San Jose / Silicon Valley, CA, USA, October 12 - 14, 2017, pp. 3:1-3:6, 2017, ACM, 978-1-4503-5527-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu |
Splitting Third-Party Libraries' Privileges from Android Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP (2) ![In: Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II, pp. 80-94, 2017, Springer, 978-3-319-59869-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Niek Timmers, Cristofaro Mune |
Escalating Privileges in Linux Using Voltage Fault Injection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: 2017 Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2017, Taipei, Taiwan, September 25, 2017, pp. 1-8, 2017, IEEE Computer Society, 978-1-5386-2948-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Satoshi Kose |
Toward Inclusive Public Transportation: Rights, not Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AHFE (3) ![In: Advances in Design for Inclusion - Proceedings of the AHFE 2017 International Conference on Design for Inclusion, July 17-21, 2017, The Westin Bonaventure Hotel, Los Angeles, California, USA, pp. 344-350, 2017, Springer, 978-3-319-60596-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Theofanis Karaletsos, Serge J. Belongie, Gunnar Rätsch |
When crowds hold privileges: Bayesian unsupervised representation learning with oracle constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLR (Poster) ![In: 4th International Conference on Learning Representations, ICLR 2016, San Juan, Puerto Rico, May 2-4, 2016, Conference Track Proceedings, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Roan Simoes da Silva, Sérgio Donizetti Zorzo |
An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 12th Annual IEEE Consumer Communications and Networking Conference, CCNC 2015, Las Vegas, NV, USA, January 9-12, 2015, pp. 128-133, 2015, IEEE, 978-1-4799-6390-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Xingwen Zhao, Hui Li 0006 |
Achieving dynamic privileges in secure data sharing on cloud storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 7(11), pp. 2211-2224, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Mariagrazia Fugini, Mahsa Teimourikia |
Access Control Privileges Management for Risk Areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCRAM-med ![In: Information Systems for Crisis Response and Management in Mediterranean Countries - First International Conference, ISCRAM-med 2014, Toulouse, France, October 15-17, 2014. Proceedings, pp. 98-111, 2014, Springer, 978-3-319-11817-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
Enforcing dynamic write privileges in data outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 39, pp. 47-63, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Nardjes Bouchemal, Ramdane Maamri |
SPIG - Security by Privileges, Inspection and Guaranty for Ambient Agents Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAART (2) ![In: ICAART 2013 - Proceedings of the 5th International Conference on Agents and Artificial Intelligence, Volume 2, Barcelona, Spain, 15-18 February, 2013, pp. 318-323, 2013, SciTePress, 978-989-8565-39-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Himanshu Shukla, Vivek Singh, Young-Ho Choi, Jaeook Kwon, Cheul-Hee Hahm |
Enhance OS security by restricting privileges of vulnerable application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCCE ![In: IEEE 2nd Global Conference on Consumer Electronics, GCCE 2013, Tokyo, Japan, 1-4 October 2013, pp. 207-211, 2013, IEEE. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Xingwen Zhao, Fangguo Zhang |
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 31(1), pp. 59-69, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Support for Write Privileges on Outsourced Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings, pp. 199-210, 2012, Springer, 978-3-642-30435-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu 0001, Keith Irwin, Jianwei Niu 0001 |
Ensuring authorization privileges for cascading user obligations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012, pp. 33-44, 2012, ACM, 978-1-4503-1295-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Htoo Aung Maw, Hannan Xiao, Bruce Christianson |
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Q2SWinet ![In: Q2SWinet'12, Proceedings of the Eighth ACM Symposium on QoS and Security for Wireless and Mobile Networks, Paphos, Cyprus, October 24-25, 2012, pp. 81-84, 2012, ACM, 978-1-4503-1619-4. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Giovanni Livraga |
Privileges in SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 976-977, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Sven Lachmund, Gregor Hengst |
Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science XI - Special Issue on Security in Computing, Part II, pp. 17-38, 2010, Springer, 978-3-642-17696-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Glenn Wurster, Paul C. van Oorschot |
A control point for reducing root abuse of file-system privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, pp. 224-236, 2010, ACM, 978-1-4503-0245-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Suresh Chari, Shai Halevi, Wietse Z. Venema |
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010, 2010, The Internet Society. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Qussai Yaseen, Brajendra Panda |
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Fourth International Conference on Network and System Security, NSS 2010, Melbourne, Victoria, Australia, September 1-3, 2010, pp. 312-317, 2010, IEEE Computer Society, 978-1-4244-8484-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Adam Wójtowicz, Wojciech Cellary |
Representing User Privileges in Object-Oriented Virtual Reality Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DoCEIS ![In: Emerging Trends in Technological Innovation, First IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2010, Costa de Caparica, Portugal, February 22-24, 2010. Proceedings, pp. 52-61, 2010, Springer, 978-3-642-11627-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Sven Lachmund |
Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2010 |
RDF |
|
25 | Tsung-Yi Chen |
A Multiple-Layer Knowledge Management System Framework Considering User Knowledge Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 19(3), pp. 361-387, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Assessing query privileges via safe and efficient permission composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 311-322, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization composition, access control |
25 | Isaac Agudo, M. Carmen Fernández Gago, Javier López 0001 |
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 302-315, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
Secretly Monopolizing the CPU Without Superuser Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: Proceedings of the 16th USENIX Security Symposium, Boston, MA, USA, August 6-10, 2007, 2007, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
25 | Vicente Benjumea, Javier López 0001, José María Troya Linero |
Specification of a framework for the anonymous use of privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telematics Informatics ![In: Telematics Informatics 23(3), pp. 179-195, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Li Zhou, Chinya V. Ravishankar |
Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: Proceedings of IEEE International Conference on Communications, ICC 2006, Istanbul, Turkey, 11-15 June 2006, pp. 2276-2282, 2006, IEEE, 1-4244-0355-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
25 | M. Francisca Hinarejos, Jordi Forné |
A Lightweight Delegated Privileges Revocation Scheme Based on Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAP ![In: Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005, pp. 207-221, 2005, IOS Press, 978-1-58603-550-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | Arnon Rosenthal, Edward Sciore |
Enabling Collaborative Administration and Safety Fences: Factored Privileges in SQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Data Eng. Bull. ![In: IEEE Data Eng. Bull. 27(1), pp. 42-47, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
25 | Theodore A. Tsiligiridis |
Security for Mobile Agents: Privileges and State Appraisal Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Parallel Sci. Comput. ![In: Neural Parallel Sci. Comput. 12(2), pp. 153-162, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
25 | Deholo Nali, Ali Miri, Carlisle M. Adams |
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Second Annual Conference on Privacy, Security and Trust, October 13-15, 2004, Wu Centre, University of New Brunswick, Fredericton, New Brunswick, Canada, Proceedings, pp. 219-223, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
25 | Jun Kiniwa |
Avoiding Faulty Privileges in Fast Stabilizing Rings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5), pp. 949-956, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
25 | Jun Kiniwa |
Avoiding Faulty Privileges in Self-Stabilizing Depth-First Token Passing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: Eigth International Conference on Parallel and Distributed Systems, ICPADS 2001, KyongJu City, Korea, June 26-29, 2001, pp. 390-397, 2001, IEEE Computer Society, 0-7695-1153-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Peter D. Gray |
SUS, an Object Reference Model for Distributing UNIX Super User Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 15th Conference on Systems Administration (LISA 2001), San Diego, California, USA, December 2-7, 2001, pp. 15-18, 2001, USENIX, 1-880446-05-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
25 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 100-112, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Arnon Rosenthal, Edward Sciore |
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000, pp. 209-220, 2000, Kluwer, 0-7923-7514-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Anand R. Tripathi, Neeran M. Karnik |
Delegation of Privileges to Mobile Agents in Ajanta. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Internet Computing ![In: Proceedings of the International Conference on Internet Computing, IC'2000, Las Vegas, Nevada, USA, June 26-29, 2000, pp. 379-386, 2000, CSREA Press, 1-892512-65-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
|
25 | Yuh-Min Tseng, Jinn-ke Jan |
A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 112(1-4), pp. 199-211, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
25 | R. W. Baldwin |
Naming and Grouping Privileges to Simplify Security Management in Large Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Proceedings of the 1990 IEEE Symposium on Security and Privacy, Oakland, California, USA, May 7-9, 1990, pp. 116-132, 1990, IEEE Computer Society, 0-8186-2060-9. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey Picciotto, J. Wynn |
Privileges and their use by trusted applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FJCC ![In: Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, pp. 411-420, 1987, ACM, 0-8186-0811-0. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP BibTeX RDF |
|
25 | Ernst L. Leiss, C. Jitmedha |
Horizontally and Vertically Bounded Propagation of Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Process. Lett. ![In: Inf. Process. Lett. 22(6), pp. 319-327, 1986. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
25 | Naftaly H. Minsky, Abe Lockman |
Ensuring Integrity by Adding Obligations to Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings, 8th International Conference on Software Engineering, London, UK, August 28-30, 1985., pp. 92-102, 1985, IEEE Computer Society, 0-8186-0620-7. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP BibTeX RDF |
|
25 | Naftaly H. Minsky |
Selective and Locally Controlled Transport of Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 6(4), pp. 573-602, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
25 | Naftaly H. Minsky |
On the Transport of Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1981 IEEE Symposium on Security and Privacy, Oakland, CA, USA, April 27-29, 1981, pp. 41-48, 1981, IEEE Computer Society, 0-8186-0345-3. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
|
25 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed Through Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 5(6), pp. 575-586, 1979. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
21 | Hongxia Jin, Jeffery Lotspiech |
Broadcast Encryption for Differently Privileged. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 283-293, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini |
A location aware role and attribute based access control system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 16th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, ACM-GIS 2008, November 5-7, 2008, Irvine, California, USA, Proceedings, pp. 84, 2008, ACM, 978-1-60558-323-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Muntaha Alawneh, Imad M. Abbadi |
Sharing but Protecting Content Against Internal Leakage for Organisations. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 238-253, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Reginald E. Sawilla, Xinming Ou |
Identifying Critical Attack Assets in Dependency Attack Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 18-34, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PageRank, eigenvector, security metric, attack graph |
21 | Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 |
Efficient and Secure Search of Enterprise File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2007 IEEE International Conference on Web Services (ICWS 2007), July 9-13, 2007, Salt Lake City, Utah, USA, pp. 18-25, 2007, IEEE Computer Society, 0-7695-2924-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Wynand van Staden, Martin S. Olivier |
SQL's revoke with a view on privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007, pp. 181-188, 2007, ACM, 978-1-59593-775-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
compound purposes, purpose binding, privacy, access control, SQL |
21 | Barbara Carminati, Elena Ferrari, Kian-Lee Tan |
Specifying Access Control Policies on Data Streams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 410-421, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Fernando C. Colón Osorio, Justin Whitney |
A stratified model for security in peer networks: a case for fine grain granularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | David A. Wagner 0001 |
Object capabilities for security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 1-2, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|