The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for privileges with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1993-1998 (16) 1999-2000 (15) 2001 (16) 2002-2003 (41) 2004 (30) 2005 (45) 2006 (48) 2007 (54) 2008 (30) 2009 (29) 2010-2012 (17) 2013-2018 (17) 2019-2023 (10)
Publication types (Num. hits)
article(63) incollection(3) inproceedings(316) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 394 occurrences of 273 keywords

Results
Found 383 publication records. Showing 383 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
74Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle Extended privilege inheritance in RBAC. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF administrative privileges, access control, RBAC
63Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF failed accesses, Access control, role-based access control, role mining, misconfigurations
53Andreas P. Heiner, N. Asokan Secure software installation in a mobile environment. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Jean Bacon, Ken Moody, Walt Yao A model of OASIS role-based access control and its support for active security. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS
53Patricia P. Griffiths, Bradford W. Wade An Authorization Mechanism for a Relational Database System. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF data dependent authorization, protection in databases, revocation of authorization, security, privacy, access control, authorization, database systems
53Patricia P. Griffiths, Bradford W. Wade An Authorization Mechanism for a Relational Data Base System (Abstract). Search on Bibsonomy SIGMOD Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
46Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropanis Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure. Search on Bibsonomy UMAP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Daniele Gorla, Rosario Pugliese Resource Access and Mobility Control with Dynamic Privileges Acquisition. Search on Bibsonomy ICALP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Wayne A. Jansen Determining Privileges of Mobile Agents. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Runlian Zhang, Xiaoshe Dong, Xiaonian Wu A Grid Access Control Model Based on Dynamic Negotiating. Search on Bibsonomy GCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Michael Yanguo Liu, Issa Traoré Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. Search on Bibsonomy IEEE METRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans Nomad: A Security Model with Non Atomic Actions and Deadlines. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita A delegation framework for federated identity management. Search on Bibsonomy Digital Identity Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privilege, access control, role, delegation, identity federation
42Jeff Hayes Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
42John T. Robinson, Murthy V. Devarakonda Note on a Problem with Reed and Long's FBR Results. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
40Konstantin Knorr Dynamic Access Control through Petri Net Workflows. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control
40I-Lung Kao, Randy Chow An Extended Capability Architecture To Enforce Dynamic Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers
35 Authorization Administration Privileges. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
32Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato Hypervisor-based prevention of persistent rootkits. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF persistent rootkit, security, file system, hypervisor
32Naveed Ahmed 0005, Christian Damsgaard Jensen A Mechanism for Identity Delegation at Authentication Level. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Identity Delegation, Usability of Security, Nomadic User, Practical Security
32Keith Irwin, Ting Yu 0001, William H. Winsborough Enforcing security properties in task-based systems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF task-based access control, policy, security properties
32Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen Grid Authorization Management Oriented to Large-Scale Collaborative Computing. Search on Bibsonomy CSCWD (Selected papers) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li Dynamic Access Control for Multi-privileged Group Communications. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann Using Authority Certificates to Create Management Structures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Vijayalakshmi Atluri, Wei-kuang Huang An Authorization Model for Workflows. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Security, Petri nets, Workflow, Authorization
32Ronald Fagin On an Authorization Mechanism. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1978 DBLP  DOI  BibTeX  RDF security, privacy, access control, database, authorization, protection, revocation, proof of correctness
29Ivo Majetic, Ernst L. Leiss Authorization and Revocation in Object-Oriented Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF revoking, bounded propagation of privileges, inheritance, Object-oriented systems, granting
25J. K. Adarsh, V. T. Sreedevi, Deepa Thangavelusamy Product Review System With BERT for Sentiment Analysis and Implementation of Administrative Privileges on Node-RED. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Marek R. Ogiela, Urszula Ogiela Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges. Search on Bibsonomy ISSREW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. Search on Bibsonomy SecureComm The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
25Rohit Ahuja, Sraban Kumar Mohanty A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Zhan Tu, Anastasios Dimas, Mehmet Necip Kurt, Anastasia Mavrommati, Pieter J. Mosterman, Akshay Rajhans, Roberto G. Valenti A Simulator for Trading Traffic Privileges by Selfish Driving Cars. Search on Bibsonomy SpringSim The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Lanfranco Lopriore, Antonella Santone Protected pointers to specify access privileges in distributed systems. Search on Bibsonomy J. Parallel Distributed Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang 0004, Wenxin Li, Zhao Li Management of access privileges for dynamic access control. Search on Bibsonomy Clust. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie Role-Based ABAC Model for Implementing Least Privileges. Search on Bibsonomy ICSCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Hailong Liu, Bo Li 0005 Automated Classification of Attacker Privileges Based on Deep Neural Network. Search on Bibsonomy SmartCom The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Hanshu Hong, Zhixin Sun Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. Search on Bibsonomy World Wide Web The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Huasong Meng Analysing Use of High Privileges in Android Applications. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
25Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang 0017 Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. Search on Bibsonomy Inscrypt The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Xiaoyu Hu, Jie Zhou 0022, Spyridoula Gravani, John Criswell Transforming Code to Drop Dead Privileges. Search on Bibsonomy SecDev The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Shane Greenstein Insider Privileges. Search on Bibsonomy IEEE Micro The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Search on Bibsonomy Comput. Electr. Eng. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Matthew W. Sanders, Chuan Yue Automated least privileges in cloud-based web services. Search on Bibsonomy HotWeb The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu Splitting Third-Party Libraries' Privileges from Android Apps. Search on Bibsonomy ACISP (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Niek Timmers, Cristofaro Mune Escalating Privileges in Linux Using Voltage Fault Injection. Search on Bibsonomy FDTC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Satoshi Kose Toward Inclusive Public Transportation: Rights, not Privileges. Search on Bibsonomy AHFE (3) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Theofanis Karaletsos, Serge J. Belongie, Gunnar Rätsch When crowds hold privileges: Bayesian unsupervised representation learning with oracle constraints. Search on Bibsonomy ICLR (Poster) The full citation details ... 2016 DBLP  BibTeX  RDF
25Roan Simoes da Silva, Sérgio Donizetti Zorzo An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. Search on Bibsonomy CCNC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Xingwen Zhao, Hui Li 0006 Achieving dynamic privileges in secure data sharing on cloud storage. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Mariagrazia Fugini, Mahsa Teimourikia Access Control Privileges Management for Risk Areas. Search on Bibsonomy ISCRAM-med The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati Enforcing dynamic write privileges in data outsourcing. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Nardjes Bouchemal, Ramdane Maamri SPIG - Security by Privileges, Inspection and Guaranty for Ambient Agents Group. Search on Bibsonomy ICAART (2) The full citation details ... 2013 DBLP  BibTeX  RDF
25Himanshu Shukla, Vivek Singh, Young-Ho Choi, Jaeook Kwon, Cheul-Hee Hahm Enhance OS security by restricting privileges of vulnerable application. Search on Bibsonomy GCCE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Xingwen Zhao, Fangguo Zhang Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. Search on Bibsonomy Comput. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Support for Write Privileges on Outsourced Data. Search on Bibsonomy SEC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu 0001, Keith Irwin, Jianwei Niu 0001 Ensuring authorization privileges for cascading user obligations. Search on Bibsonomy SACMAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Htoo Aung Maw, Hannan Xiao, Bruce Christianson An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. Search on Bibsonomy Q2SWinet The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
25Sabrina De Capitani di Vimercati, Giovanni Livraga Privileges in SQL. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Sven Lachmund, Gregor Hengst Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Glenn Wurster, Paul C. van Oorschot A control point for reducing root abuse of file-system privileges. Search on Bibsonomy CCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Suresh Chari, Shai Halevi, Wietse Z. Venema Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
25Qussai Yaseen, Brajendra Panda Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. Search on Bibsonomy NSS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Adam Wójtowicz, Wojciech Cellary Representing User Privileges in Object-Oriented Virtual Reality Systems. Search on Bibsonomy DoCEIS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Sven Lachmund Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. Search on Bibsonomy 2010   RDF
25Tsung-Yi Chen A Multiple-Layer Knowledge Management System Framework Considering User Knowledge Privileges. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati Assessing query privileges via safe and efficient permission composition. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authorization composition, access control
25Isaac Agudo, M. Carmen Fernández Gago, Javier López 0001 Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Dan Tsafrir, Yoav Etsion, Dror G. Feitelson Secretly Monopolizing the CPU Without Superuser Privileges. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2007 DBLP  BibTeX  RDF
25Vicente Benjumea, Javier López 0001, José María Troya Linero Specification of a framework for the anonymous use of privileges. Search on Bibsonomy Telematics Informatics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Li Zhou, Chinya V. Ravishankar Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. Search on Bibsonomy ICC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25M. Francisca Hinarejos, Jordi Forné A Lightweight Delegated Privileges Revocation Scheme Based on Coding. Search on Bibsonomy IWAP The full citation details ... 2005 DBLP  BibTeX  RDF
25Arnon Rosenthal, Edward Sciore Enabling Collaborative Administration and Safety Fences: Factored Privileges in SQL Databases. Search on Bibsonomy IEEE Data Eng. Bull. The full citation details ... 2004 DBLP  BibTeX  RDF
25Theodore A. Tsiligiridis Security for Mobile Agents: Privileges and State Appraisal Mechanism. Search on Bibsonomy Neural Parallel Sci. Comput. The full citation details ... 2004 DBLP  BibTeX  RDF
25Deholo Nali, Ali Miri, Carlisle M. Adams Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. Search on Bibsonomy PST The full citation details ... 2004 DBLP  BibTeX  RDF
25Jun Kiniwa Avoiding Faulty Privileges in Fast Stabilizing Rings. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2002 DBLP  BibTeX  RDF
25Jun Kiniwa Avoiding Faulty Privileges in Self-Stabilizing Depth-First Token Passing. Search on Bibsonomy ICPADS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Peter D. Gray SUS, an Object Reference Model for Distributing UNIX Super User Privileges. Search on Bibsonomy LISA The full citation details ... 2001 DBLP  BibTeX  RDF
25Himanshu Khurana, Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Arnon Rosenthal, Edward Sciore Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. Search on Bibsonomy DBSec The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Anand R. Tripathi, Neeran M. Karnik Delegation of Privileges to Mobile Agents in Ajanta. Search on Bibsonomy International Conference on Internet Computing The full citation details ... 2000 DBLP  BibTeX  RDF
25Yuh-Min Tseng, Jinn-ke Jan A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. Search on Bibsonomy Inf. Sci. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25R. W. Baldwin Naming and Grouping Privileges to Simplify Security Management in Large Databases. Search on Bibsonomy S&P The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
25Jeffrey Picciotto, J. Wynn Privileges and their use by trusted applications. Search on Bibsonomy FJCC The full citation details ... 1987 DBLP  BibTeX  RDF
25Ernst L. Leiss, C. Jitmedha Horizontally and Vertically Bounded Propagation of Privileges. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
25Naftaly H. Minsky, Abe Lockman Ensuring Integrity by Adding Obligations to Privileges. Search on Bibsonomy ICSE The full citation details ... 1985 DBLP  BibTeX  RDF
25Naftaly H. Minsky Selective and Locally Controlled Transport of Privileges. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
25Naftaly H. Minsky On the Transport of Privileges. Search on Bibsonomy S&P The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
25Virgil D. Gligor Review and Revocation of Access Privileges Distributed Through Capabilities. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
21Hongxia Jin, Jeffery Lotspiech Broadcast Encryption for Differently Privileged. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini A location aware role and attribute based access control system. Search on Bibsonomy GIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Muntaha Alawneh, Imad M. Abbadi Sharing but Protecting Content Against Internal Leakage for Organisations. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Reginald E. Sawilla, Xinming Ou Identifying Critical Attack Assets in Dependency Attack Graphs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PageRank, eigenvector, security metric, attack graph
21Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 Efficient and Secure Search of Enterprise File Systems. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Wynand van Staden, Martin S. Olivier SQL's revoke with a view on privacy. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compound purposes, purpose binding, privacy, access control, SQL
21Barbara Carminati, Elena Ferrari, Kian-Lee Tan Specifying Access Control Policies on Data Streams. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Fernando C. Colón Osorio, Justin Whitney A stratified model for security in peer networks: a case for fine grain granularity. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21David A. Wagner 0001 Object capabilities for security. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 383 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license