|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Ka-Ping Yee |
Aligning Security and Usability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 48-55, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
user authorization, security, design, Usability, interaction |
20 | Konstantin Beznosov |
On the benefits of decomposing policy engines into components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adaptive and Reflective Middleware ![In: Proceedings of the 3rd Workshop on Adaptive and Reflective Middleware, ARM 2003, Toronto, Ontario, Canada, October 19, 2004, pp. 183-188, 2004, ACM, 1-58113-949-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, middleware, architecture, authorization, policy |
20 | Yi Deng 0001, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov |
An Approach for Modeling and Analysis of Security System Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 15(5), pp. 1099-1119, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security system architecture, authorization service, formal architectural modeling, constraint patterns, access control, Petri nets, formal verification, temporal logic, Software security |
20 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003, pp. 32-42, 2003, ACM, 1-58113-781-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
20 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 12-20, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
20 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Induced role hierarchies with attribute-based RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 142-148, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, roles, attributes, roles hierarchies, authorization rules |
20 | Sandra L. Murphy, Edward T. Lewis, Robert N. M. Watson |
Secure Active Network Prototypes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DANCE ![In: 2002 DARPA Active Networks Conference and Exposition (DANCE 2002), 29-31 May 2002, San Francisco, CA, USA, pp. 166-181, 2002, IEEE Computer Society, 0-7695-1564-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, authentication, Active networks, authorization policy |
20 | Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel |
DPS : An Architectural Style for Development of Secure Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 180-198, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Authorization and Access Control, Software Architecture, Formal Methods, Architectural Style, Alloy, Security Engineering |
20 | Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno |
An Access Control Model for Tree Data Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 117-135, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule |
20 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli |
Proposed NIST standard for role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(3), pp. 224-274, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
security, access control, standards, Role-based access control, authorization management |
20 | Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik |
An Integrated Solution for Secure Group Communication in Wide-Area Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 3-5 July 2001, Hammamet, Tunisia, pp. 22-28, 2001, IEEE Computer Society, 0-7695-1177-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
group authorization and access control, Security, group communication, group key agreement |
20 | Rüdiger Grimm |
Security requirements for internet voting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 4th workshop on Multimedia & Security: New Challenges, MM&Sec 2001, Ottawa, Ontario, Canada, October 5, 2001, pp. 56-59, 2001, ACM, 1-58113-393-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authorization and anonymity, security requirements, blind signature, internet voting |
20 | Yi Mu 0001, Vijay Varadharajan |
Towards a Protection Model for Supporting Multiple Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australasian Database Conference ![In: Australasian Database Conference, ADC 2000, Canberra, Australia, January 31 - February 3, 2000, pp. 107-114, 2000, IEEE Computer Society, 0-7695-0528-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
OO database, Access Control, Authorization |
20 | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum |
A Practically Implementable and Tractable Delegation Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 27-42, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
access control, knowledge representation, logic programs, Authorization, security policies, trust management, delegation |
20 | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi |
Security Policy Coordination for Heterogeneous Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 219-228, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
information enclaves, access control, mediators, authorization policy |
20 | Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati |
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 23(3), pp. 231-285, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
periodic authorization, access control, temporal constraints, time management |
20 | Yun Bai 0001, Vijay Varadharajan |
A High Level Language for Conventional Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 273-283, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Policy Transformations, Formal Language, Access Control Model, Authorization Policies |
20 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 106-111, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
20 | Steve R. White, Liam Comerford |
ABYSS: An Architecture for Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 619-629, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software |
20 | Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray 0001, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson |
System R: Relational Approach to Database Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(2), pp. 97-137, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
System R, database, data structures, authorization, recovery, locking, relational model, index structures, nonprocedural language |
14 | Gregory Neven |
Privacy-enhanced access control in primelife. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 6th Workshop on Digital Identity Management, Chicago, Illinois, USA, October 8, 2010, pp. 1-2, 2010, ACM, 978-1-4503-0090-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo |
Membership-Based Access Control for Trust Negotiation in Open Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 189-192, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Yahui Lu, Li Zhang |
Domain Administration of Task-role Based Access Control for Process Collaboration Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 643-647, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 535-542, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari |
Distributed authentication for services commercialization in ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2009, Nice, France, September 2-4, 2009, 2009, ACM, 978-1-60558-536-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authentication access controls, services commercialization using ad hoc networks, ad hoc networks |
14 | Xuewang Zhang, Yulin Zhang |
Study on an Improved Extended-RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 640-643, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jason Crampton |
Trade-Offs in Cryptographic Implementations of Temporal Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NordSec ![In: Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings, pp. 72-87, 2009, Springer, 978-3-642-04765-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(4), pp. 1389-1399, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Managing the lifecycle of XACML delegation policies in federated environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 717-721, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | David J. Lutz, Patrick Mandic, Sascha Neinert, Ruth del Campo, Jürgen Jähnert |
Harmonizing service and network provisioning for federative access in a mobile environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, NOMS 2008, 7-11 April 2008, Salvador, Bahia, Brazil, pp. 843-846, 2008, IEEE, 978-1-4244-2066-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi |
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 144-152, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AAA Architecture, Security, MANET, OLSR |
14 | Katerina Stamou, Prathyusha V. Akunuri, Gabrielle Allen, Archit Kulshrestha, Daniel S. Katz |
Feature rich, enhanced grid portal for LONI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mardi Gras Conference ![In: Proceedings of the 15th ACM Mardi Gras conference: From lightweight mash-ups to lambda grids: Understanding the spectrum of distributed computing requirements, applications, tools, infrastructures, interoperability, and the incremental adoption of key capabilities, Baton Rouge, Louisiana, USA, January 29 - February 3, 2008, pp. 28, 2008, ACM, 978-1-59593-835-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Im Young Jung, In Soon Cho, Heon Young Yeom |
A Cost-Effective Guarantee of Security and Scalability on HVEM DataGrid with Active Disk. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 409-416, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jason Crampton, Hemanth Khambhammettu |
Delegation and satisfiability in workflow systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 31-40, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
satisfiability, delegation, workflow management systems |
14 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Scalable Method for Access Control in Location-Based Broadcast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 256-260, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ayesha Altaf, M. Younus Javed, Attiq Ahmed |
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 335-339, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privcy and Key Management, security |
14 | Sang M. Park, Soon Myoung Chung |
Enhanced CAS Certificate for Metadata-Based Access Control in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI (2) ![In: 20th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2008), November 3-5, 2008, Dayton, Ohio, USA, Volume 2, pp. 323-329, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang |
A Role-Based Access Control Model for Complex Affairs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 646-650, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Yu Zhang |
An Open Framework for Remote Electronic Elections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 304-316, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Fred Spiessens, Jerry den Hartog, Sandro Etalle |
Know What You Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 5th International Workshop, FAST 2008, Malaga, Spain, October 9-10, 2008, Revised Selected Papers, pp. 129-142, 2008, Springer. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 222-237, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to improve OCSP validation for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 42(3), pp. 253-266, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation |
14 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 63-69, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
14 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 733-738, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Hua Wang 0002, Qing Li 0001 |
Secure and Efficient Information Sharing in Multi-university E-Learning Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2007, 6th International Conference, Edinburgh, UK, August 15-17, 2007, Revised Papers, pp. 542-553, 2007, Springer, 978-3-540-78138-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, E-Learning, Information sharing |
14 | Hua Wang 0002, Jinli Cao |
Delegating Revocations and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers, pp. 294-305, 2007, Springer, 978-3-540-78237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RBAC, Delegation, Revocation |
14 | Gaofeng Ji, Yong Tang 0001, Fan Huang, Peng Wang, Guibin Wu |
An Access Control Model for Service Composite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 852-857, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 31, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A Robust Single Sign-On Model Based on Multi-Agent System and PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France, pp. 101, 2007, IEEE Computer Society, 978-0-7695-2805-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa |
A Unified Conflict Resolution Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hybrid Authorizations, Conflict Resolution, Access Control Models |
14 | Vincent C. Hu, David F. Ferraiolo, Karen Scarfone |
Access Control Policy Combinations for the Grid Using the Policy Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 14-17 May 2007, Rio de Janeiro, Brazil, pp. 225-232, 2007, IEEE Computer Society, 0-7695-2833-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Romain Laborde, Thierry Desprats |
Dealing with Stable Environmental Conditions in XACML Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 63, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jani Suomalainen |
Towards FineGrained Authorizations in Small Office and Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 66, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jong Sik Moon, Im-Yeong Lee |
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 666-677, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
OTP, Authentication, Ubiquitous, AAA, Ticket |
14 | Maurizio Colombo, Fabio Martinelli, Paolo Mori, Anna Vaccarelli |
Extending the Globus Architecture with Role-Based Trust Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCAST ![In: Computer Aided Systems Theory - EUROCAST 2007, 11th International Conference on Computer Aided Systems Theory, Las Palmas de Gran Canaria, Spain, February 12-16, 2007, Revised Selected Papers, pp. 448-456, 2007, Springer, 978-3-540-75866-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Chunyan Song, Jianliang Xu, Shenhua Li, Mingqiang Wang |
A Role-Based Secure Workflow Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 764-774, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu |
Towards trust-aware access management for ad-hoc collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 41-48, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Paolina Centonze, Robert J. Flynn, Marco Pistoia |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA, pp. 292-303, 2007, IEEE Computer Society, 0-7695-3060-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Salekul Islam, J. William Atwood |
Sender Access Control in IP Multicast. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 79-86, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Marcello Cinque, Domenico Cotroneo, Catello Di Martino, Stefano Russo 0001 |
Modeling and Assessing the Dependability ofWireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), Beijing, China, October 10-12, 2007, pp. 33-44, 2007, IEEE Computer Society, 0-7695-2995-X. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Daisy Daiqin He, Jian Yang 0001 |
Security Policy Specification and Integration in Business Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 20-27, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Dominik Zalewski |
Security Enhancement of Java Remote Method Invocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DepCoS-RELCOMEX ![In: 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland, pp. 223-231, 2006, IEEE Computer Society, 0-7695-2565-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
Access Control Policy Management Framework based on RBAC in OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Sixth International Conference on Computer and Information Technology (CIT 2006), 20-22 September 2006, Seoul, Korea, pp. 161, 2006, IEEE Computer Society, 0-7695-2687-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Rubén Barrio, Xavier Perramon, Jaime Delgado |
Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 342-351, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Minghui Zhou 0001, Hong Mei 0001 |
A Service-Oriented Trust Management Model on Application Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: 2006 IEEE International Conference on Web Services (ICWS 2006), 18-22 September 2006, Chicago, Illinois, USA, pp. 170-177, 2006, IEEE Computer Society, 0-7695-2669-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to Improve OCSP Validation for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC ![In: Advances in Grid and Pervasive Computing, First International Conference, GPC 2006, Taichung, Taiwan, May 3-5, 2006, Proceedings, pp. 12-21, 2006, Springer, 3-540-33809-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
A Distributed Domain Administration of RBAC Model in Collaborative Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 935-940, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Amir H. Chinaei, Huaxin Zhang |
Hybrid Authorizations and Conflict Resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, September 10-11, 2006, Proceedings, pp. 131-145, 2006, Springer, 978-3-540-38984-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Conflict Resolution, Combined Strategies |
14 | Yanqin Zhu, Peide Qian, Yueqin Liu |
A Role-based PMI Authentication Model and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA, pp. 407-412, 2006, IEEE Computer Society, 0-7695-2611-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Fourth International Conference on Software Engineering, Research, Management and Applications (SERA 2006), 9-11 August 2006, Seattle, Washington, USA, pp. 281-288, 2006, IEEE Computer Society, 0-7695-2656-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Sun Ok Yang, SungSuk Kim |
Network Mobility in MIPv6 Considering Arrival Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 610-619, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
binding update, mobility type, kcredit, mean resident time, network mobility, arrival time |
14 | Fahima Cheikh, Giuseppe De Giacomo, Massimo Mecella |
Automatic web services composition in trustaware communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 43-52, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
web services, access control, trust, composition |
14 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
A Survey of Secure B2C Commerce for Multicast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 288-293, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 156-173, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jing Jin, Gail-Joon Ahn, Mukesh Singhal |
ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT Workshops ![In: Current Trends in Database Technology - EDBT 2006, EDBT 2006 Workshops PhD, DataX, IIDB, IIHA, ICSNW, QLQP, PIM, PaRMA, and Reactivity on the Web, Munich, Germany, March 26-31, 2006, Revised Selected Papers, pp. 724-740, 2006, Springer, 3-540-46788-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Ragib Hasan, Marianne Winslett |
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 516-521, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi |
Shibboleth-based Access to and Usage of Grid Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 136-143, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee |
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb ![In: Frontiers of WWW Research and Development - APWeb 2006, 8th Asia-Pacific Web Conference, Harbin, China, January 16-18, 2006, Proceedings, pp. 880-885, 2006, Springer, 3-540-31142-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Grid, role-based access control, XACML, single sign-on, SAML |
14 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC/EEE ![In: Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, E-Commerce and E-Services (EEE 2006) and Workshops, 26-29 June 2006, Palo Alto, California, USA, pp. 18, 2006, IEEE Computer Society, 0-7695-2511-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang 0001 |
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 132-141, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Haibo Shen, Fan Hong |
An Attribute-Based Access Control Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 74-79, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Web Services, XACML, Attribute-Based Access Control, Automated Trust Negotiation |
14 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 7(4-5), pp. 371-389, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
14 | G. Geethakumari, Atul Negi, V. N. Sastry |
Dynamic Delegation Approach for Access Control in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 387-394, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Xinwen Zhang, Yingjiu Li, Divya Nalla |
An attribute-based access matrix model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 359-363, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access matrix model, access control, decidability, safety analysis |
14 | Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong |
Research and Implementation of Role-Based RBAC Administration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 746-750, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Weili Han, Junjing Zhang, Xiaobo Yao |
Context-sensitive Access Control Model and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 757-763, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar |
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2005 - Object-Oriented Programming, 19th European Conference, Glasgow, UK, July 25-29, 2005, Proceedings, pp. 362-386, 2005, Springer, 3-540-27992-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Hiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka, Shigeyuki Matsuda, Krysia Broda, Morris Sloman |
Policy Conflict Analysis Using Tableaux for On Demanc VPN Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2005 International Conference on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 13-16 June 2005, Taormina, Italy, Proceedings, pp. 565-569, 2005, IEEE Computer Society, 0-7695-2342-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Vijayalakshmi Atluri, Janice Warner |
Supporting conditional delegation in secure workflow management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 49-58, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
workflow, constraints, delegation |
14 | Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi |
Trust Management with Safe Privilege Propagation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPT ![In: Advanced Parallel Processing Technologies, 6th International Workshop, APPT 2005, Hong Kong, China, October 27-28, 2005, Proceedings, pp. 174-183, 2005, Springer, 3-540-29639-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Andrew D. Gordon 0001 |
From Typed Process Calculi to Source-Based Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 12th International Symposium, SAS 2005, London, UK, September 7-9, 2005, Proceedings, pp. 2, 2005, Springer, 3-540-28584-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Hui Lei, Gholamali C. Shoja |
A Distributed Trust Model for e-Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 290-293, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai |
Using Trust for Restricted Delegation in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 293-301, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Alfred C. Weaver |
A security architecture for data privacy and security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 10th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2005, September 19-22, 2005, Catania, Italy, 2005, IEEE, 0-7803-9401-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat |
CoLab: A Flexible Collaborative Web Browsing Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 501-506, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Peng Liu, Jian-bin Hu, Zhong Chen 0001 |
A Formal Language for Access Control Policies in Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence ![In: 2005 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2005), 19-22 September 2005, Compiegne, France, pp. 766-769, 2005, IEEE Computer Society, 0-7695-2415-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Julien Laganier, Pascale Vicat-Blanc Primet |
HIPernet: a decentralized security infrastructure for large scale grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 140-147, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake |
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 548-553, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wesley Emeneker, Dan Stanzione |
Cluster Spanning with Virtual Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26 - 30, 2005, Boston, Massachusetts, USA, pp. 1, 2005, IEEE Computer Society, 0-7803-9485-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jizhong Zhao, Yong Qi, Zhaofeng Ma |
Secure Multimedia Streaming with Trusted Digital Rights Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 15-17 November 2005, Sydney, Australia, Proceedings, pp. 817-821, 2005, IEEE Computer Society, 0-7695-2421-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|