Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan |
An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
71 | M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
Extended privilege inheritance in RBAC. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
administrative privileges, access control, RBAC |
63 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
53 | Andreas P. Heiner, N. Asokan |
Secure software installation in a mobile environment. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
53 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Database System. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
data dependent authorization, protection in databases, revocation of authorization, security, privacy, access control, authorization, database systems |
53 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Data Base System (Abstract). |
SIGMOD Conference |
1976 |
DBLP DOI BibTeX RDF |
|
46 | Demetris Kyriacou, Hugh C. Davis, Thanassis Tiropanis |
Evaluating Three Scrutability and Three Privacy User Privileges for a Scrutable User Modelling Infrastructure. |
UMAP |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Daniele Gorla, Rosario Pugliese |
Resource Access and Mobility Control with Dynamic Privileges Acquisition. |
ICALP |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Wayne A. Jansen |
Determining Privileges of Mobile Agents. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Runlian Zhang, Xiaoshe Dong, Xiaonian Wu |
A Grid Access Control Model Based on Dynamic Negotiating. |
GCC |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Michael Yanguo Liu, Issa Traoré |
Measurement Framework for Software Privilege Protection Based on User Interaction Analysis. |
IEEE METRICS |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans |
Nomad: A Security Model with Non Atomic Actions and Deadlines. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
42 | Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita |
A delegation framework for federated identity management. |
Digital Identity Management |
2005 |
DBLP DOI BibTeX RDF |
privilege, access control, role, delegation, identity federation |
42 | Jeff Hayes |
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
|
42 | John T. Robinson, Murthy V. Devarakonda |
Note on a Problem with Reed and Long's FBR Results. |
ACM SIGOPS Oper. Syst. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
40 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
40 | I-Lung Kao, Randy Chow |
An Extended Capability Architecture To Enforce Dynamic Access Control Policies. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers |
35 | |
Authorization Administration Privileges. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Yosuke Chubachi, Takahiro Shinagawa, Kazuhiko Kato |
Hypervisor-based prevention of persistent rootkits. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
persistent rootkit, security, file system, hypervisor |
32 | Naveed Ahmed 0005, Christian Damsgaard Jensen |
A Mechanism for Identity Delegation at Authentication Level. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Identity Delegation, Usability of Security, Nomadic User, Practical Security |
32 | Keith Irwin, Ting Yu 0001, William H. Winsborough |
Enforcing security properties in task-based systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
task-based access control, policy, security properties |
32 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. |
CSCWD (Selected papers) |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li |
Dynamic Access Control for Multi-privileged Group Communications. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
|
32 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
32 | Ronald Fagin |
On an Authorization Mechanism. |
ACM Trans. Database Syst. |
1978 |
DBLP DOI BibTeX RDF |
security, privacy, access control, database, authorization, protection, revocation, proof of correctness |
29 | Ivo Majetic, Ernst L. Leiss |
Authorization and Revocation in Object-Oriented Databases. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
revoking, bounded propagation of privileges, inheritance, Object-oriented systems, granting |
25 | J. K. Adarsh, V. T. Sreedevi, Deepa Thangavelusamy |
Product Review System With BERT for Sentiment Analysis and Implementation of Administrative Privileges on Node-RED. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Marek R. Ogiela, Urszula Ogiela |
Knowledge-Based Approach for Unlocking Divided Secrets in Threshold Schemes with Privileges. |
ISSREW |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Shohei Kakei, Yoshiaki Shiraishi, Shoichi Saito |
Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers. |
SecureComm |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Rohit Ahuja, Sraban Kumar Mohanty |
A Scalable Attribute-Based Access Control Scheme with Flexible Delegation cum Sharing of Access Privileges for Cloud Storage. |
IEEE Trans. Cloud Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Zhan Tu, Anastasios Dimas, Mehmet Necip Kurt, Anastasia Mavrommati, Pieter J. Mosterman, Akshay Rajhans, Roberto G. Valenti |
A Simulator for Trading Traffic Privileges by Selfish Driving Cars. |
SpringSim |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Lanfranco Lopriore, Antonella Santone |
Protected pointers to specify access privileges in distributed systems. |
J. Parallel Distributed Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Nafei Zhu, Fangbo Cai, Jingsha He, Yixuan Zhang 0004, Wenxin Li, Zhao Li |
Management of access privileges for dynamic access control. |
Clust. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Suyeol Lee, Junsik Seo, Jaehyun Nam, Seungwon Shin |
Poster: TCLP: Enforcing Least Privileges to Prevent Containers from Kernel Vulnerabilities. |
CCS |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Muhammad Umar Aftab, Zhiguang Qin, Syed Falahuddin Quadri, Zakria, Arslan Javed, Xuyun Nie |
Role-Based ABAC Model for Implementing Least Privileges. |
ICSCA |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hailong Liu, Bo Li 0005 |
Automated Classification of Attacker Privileges Based on Deep Neural Network. |
SmartCom |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hanshu Hong, Zhixin Sun |
Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT. |
World Wide Web |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Huasong Meng |
Analysing Use of High Privileges in Android Applications. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
25 | Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang 0017 |
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. |
Inscrypt |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Xiaoyu Hu, Jie Zhou 0022, Spyridoula Gravani, John Criswell |
Transforming Code to Drop Dead Privileges. |
SecDev |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Shane Greenstein |
Insider Privileges. |
IEEE Micro |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Rohit Ahuja, Sraban Kumar Mohanty, Kouichi Sakurai |
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. |
Comput. Electr. Eng. |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Matthew W. Sanders, Chuan Yue |
Automated least privileges in cloud-based web services. |
HotWeb |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Jiawei Zhan, Quan Zhou, Xiaozhuo Gu, Yuewu Wang, Yingjiao Niu |
Splitting Third-Party Libraries' Privileges from Android Apps. |
ACISP (2) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Niek Timmers, Cristofaro Mune |
Escalating Privileges in Linux Using Voltage Fault Injection. |
FDTC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Satoshi Kose |
Toward Inclusive Public Transportation: Rights, not Privileges. |
AHFE (3) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Theofanis Karaletsos, Serge J. Belongie, Gunnar Rätsch |
When crowds hold privileges: Bayesian unsupervised representation learning with oracle constraints. |
ICLR (Poster) |
2016 |
DBLP BibTeX RDF |
|
25 | Roan Simoes da Silva, Sérgio Donizetti Zorzo |
An access control mechanism to ensure privacy in named data networking using attribute-based encryption with immediate revocation of privileges. |
CCNC |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Xingwen Zhao, Hui Li 0006 |
Achieving dynamic privileges in secure data sharing on cloud storage. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Mariagrazia Fugini, Mahsa Teimourikia |
Access Control Privileges Management for Risk Areas. |
ISCRAM-med |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
Enforcing dynamic write privileges in data outsourcing. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Nardjes Bouchemal, Ramdane Maamri |
SPIG - Security by Privileges, Inspection and Guaranty for Ambient Agents Group. |
ICAART (2) |
2013 |
DBLP BibTeX RDF |
|
25 | Himanshu Shukla, Vivek Singh, Young-Ho Choi, Jaeook Kwon, Cheul-Hee Hahm |
Enhance OS security by restricting privileges of vulnerable application. |
GCCE |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Xingwen Zhao, Fangguo Zhang |
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. |
Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Support for Write Privileges on Outsourced Data. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu 0001, Keith Irwin, Jianwei Niu 0001 |
Ensuring authorization privileges for cascading user obligations. |
SACMAT |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Htoo Aung Maw, Hannan Xiao, Bruce Christianson |
An adaptive access control model with privileges overriding and behaviour monitoring in wireless sensor networks. |
Q2SWinet |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Giovanni Livraga |
Privileges in SQL. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Sven Lachmund, Gregor Hengst |
Auto-generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. |
Trans. Comput. Sci. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Glenn Wurster, Paul C. van Oorschot |
A control point for reducing root abuse of file-system privileges. |
CCS |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Suresh Chari, Shai Halevi, Wietse Z. Venema |
Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. |
NDSS |
2010 |
DBLP BibTeX RDF |
|
25 | Qussai Yaseen, Brajendra Panda |
Organizing Access Privileges: Maximizing the Availability and Mitigating the Threat of Insiders' Knowledgebase. |
NSS |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Adam Wójtowicz, Wojciech Cellary |
Representing User Privileges in Object-Oriented Virtual Reality Systems. |
DoCEIS |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Sven Lachmund |
Auto-Generation of Least Privileges Access Control Policies for Applications Supported by User Input Recognition. |
|
2010 |
RDF |
|
25 | Tsung-Yi Chen |
A Multiple-Layer Knowledge Management System Framework Considering User Knowledge Privileges. |
Int. J. Softw. Eng. Knowl. Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Assessing query privileges via safe and efficient permission composition. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
authorization composition, access control |
25 | Isaac Agudo, M. Carmen Fernández Gago, Javier López 0001 |
Delegating Privileges over Finite Resources: A Quota Based Delegation Approach. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Dan Tsafrir, Yoav Etsion, Dror G. Feitelson |
Secretly Monopolizing the CPU Without Superuser Privileges. |
USENIX Security Symposium |
2007 |
DBLP BibTeX RDF |
|
25 | Vicente Benjumea, Javier López 0001, José María Troya Linero |
Specification of a framework for the anonymous use of privileges. |
Telematics Informatics |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Li Zhou, Chinya V. Ravishankar |
Dynamic Merkle Trees for Verifying Privileges in Sensor Networks. |
ICC |
2006 |
DBLP DOI BibTeX RDF |
|
25 | M. Francisca Hinarejos, Jordi Forné |
A Lightweight Delegated Privileges Revocation Scheme Based on Coding. |
IWAP |
2005 |
DBLP BibTeX RDF |
|
25 | Arnon Rosenthal, Edward Sciore |
Enabling Collaborative Administration and Safety Fences: Factored Privileges in SQL Databases. |
IEEE Data Eng. Bull. |
2004 |
DBLP BibTeX RDF |
|
25 | Theodore A. Tsiligiridis |
Security for Mobile Agents: Privileges and State Appraisal Mechanism. |
Neural Parallel Sci. Comput. |
2004 |
DBLP BibTeX RDF |
|
25 | Deholo Nali, Ali Miri, Carlisle M. Adams |
Efficient Revocation of Dynamic Security Privileges in Hierarchically Structured Communities. |
PST |
2004 |
DBLP BibTeX RDF |
|
25 | Jun Kiniwa |
Avoiding Faulty Privileges in Fast Stabilizing Rings. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2002 |
DBLP BibTeX RDF |
|
25 | Jun Kiniwa |
Avoiding Faulty Privileges in Self-Stabilizing Depth-First Token Passing. |
ICPADS |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Peter D. Gray |
SUS, an Object Reference Model for Distributing UNIX Super User Privileges. |
LISA |
2001 |
DBLP BibTeX RDF |
|
25 | Himanshu Khurana, Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed with PKI Certificates. |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Arnon Rosenthal, Edward Sciore |
Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. |
DBSec |
2000 |
DBLP DOI BibTeX RDF |
|
25 | Anand R. Tripathi, Neeran M. Karnik |
Delegation of Privileges to Mobile Agents in Ajanta. |
International Conference on Internet Computing |
2000 |
DBLP BibTeX RDF |
|
25 | Yuh-Min Tseng, Jinn-ke Jan |
A Scheme and Concept for Limited Inheritance of Privileges in a User Hierarchy. |
Inf. Sci. |
1998 |
DBLP DOI BibTeX RDF |
|
25 | R. W. Baldwin |
Naming and Grouping Privileges to Simplify Security Management in Large Databases. |
S&P |
1990 |
DBLP DOI BibTeX RDF |
|
25 | Jeffrey Picciotto, J. Wynn |
Privileges and their use by trusted applications. |
FJCC |
1987 |
DBLP BibTeX RDF |
|
25 | Ernst L. Leiss, C. Jitmedha |
Horizontally and Vertically Bounded Propagation of Privileges. |
Inf. Process. Lett. |
1986 |
DBLP DOI BibTeX RDF |
|
25 | Naftaly H. Minsky, Abe Lockman |
Ensuring Integrity by Adding Obligations to Privileges. |
ICSE |
1985 |
DBLP BibTeX RDF |
|
25 | Naftaly H. Minsky |
Selective and Locally Controlled Transport of Privileges. |
ACM Trans. Program. Lang. Syst. |
1984 |
DBLP DOI BibTeX RDF |
|
25 | Naftaly H. Minsky |
On the Transport of Privileges. |
S&P |
1981 |
DBLP DOI BibTeX RDF |
|
25 | Virgil D. Gligor |
Review and Revocation of Access Privileges Distributed Through Capabilities. |
IEEE Trans. Software Eng. |
1979 |
DBLP DOI BibTeX RDF |
|
21 | Hongxia Jin, Jeffery Lotspiech |
Broadcast Encryption for Differently Privileged. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini |
A location aware role and attribute based access control system. |
GIS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Muntaha Alawneh, Imad M. Abbadi |
Sharing but Protecting Content Against Internal Leakage for Organisations. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Reginald E. Sawilla, Xinming Ou |
Identifying Critical Attack Assets in Dependency Attack Graphs. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
PageRank, eigenvector, security metric, attack graph |
21 | Aameek Singh, Mudhakar Srivatsa, Ling Liu 0001 |
Efficient and Secure Search of Enterprise File Systems. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Wynand van Staden, Martin S. Olivier |
SQL's revoke with a view on privacy. |
SAICSIT |
2007 |
DBLP DOI BibTeX RDF |
compound purposes, purpose binding, privacy, access control, SQL |
21 | Barbara Carminati, Elena Ferrari, Kian-Lee Tan |
Specifying Access Control Policies on Data Streams. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Fernando C. Colón Osorio, Justin Whitney |
A stratified model for security in peer networks: a case for fine grain granularity. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | David A. Wagner 0001 |
Object capabilities for security. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
|