The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorization with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1978 (15) 1979-1987 (15) 1988-1990 (15) 1991-1993 (20) 1994-1995 (26) 1996 (19) 1997 (20) 1998 (24) 1999 (38) 2000 (40) 2001 (45) 2002 (90) 2003 (143) 2004 (178) 2005 (216) 2006 (242) 2007 (225) 2008 (194) 2009 (156) 2010 (91) 2011 (82) 2012 (79) 2013 (54) 2014 (51) 2015 (70) 2016 (53) 2017 (67) 2018 (73) 2019 (83) 2020 (81) 2021 (89) 2022 (94) 2023 (74) 2024 (19)
Publication types (Num. hits)
article(680) book(1) incollection(28) inproceedings(2027) phdthesis(40) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(64) CoRR(63) RFC(63) ETAA@ESORICS(34) ACM Trans. Inf. Syst. Secur.(33) ESORICS(31) ACSAC(28) CCS(26) GRID(24) DBSec(23) ETAA(22) AsiaCCS(20) CSFW(20) POLICY(20) SAC(20) ARES(19) More (+10 of total 1082)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1949 occurrences of 743 keywords

Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Ka-Ping Yee Aligning Security and Usability. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF user authorization, security, design, Usability, interaction
20Konstantin Beznosov On the benefits of decomposing policy engines into components. Search on Bibsonomy Adaptive and Reflective Middleware The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, middleware, architecture, authorization, policy
20Yi Deng 0001, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov An Approach for Modeling and Analysis of Security System Architectures. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security system architecture, authorization service, formal architectural modeling, constraint patterns, access control, Petri nets, formal verification, temporal logic, Software security
20François Siewe, Antonio Cau, Hussein Zedan A compositional framework for access control policies enforcement. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, authorization, delegation, policy composition
20David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila The role control center: features and case studies. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF administrative roles, role graph, separation of duty, role hierarchy, authorization management
20Mohammad A. Al-Kahtani, Ravi S. Sandhu Induced role hierarchies with attribute-based RBAC. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, RBAC, roles, attributes, roles hierarchies, authorization rules
20Sandra L. Murphy, Edward T. Lewis, Robert N. M. Watson Secure Active Network Prototypes. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, authentication, Active networks, authorization policy
20Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel DPS : An Architectural Style for Development of Secure Software. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Authorization and Access Control, Software Architecture, Formal Methods, Architectural Style, Alloy, Security Engineering
20Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno An Access Control Model for Tree Data Structures. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule
20David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli Proposed NIST standard for role-based access control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF security, access control, standards, Role-based access control, authorization management
20Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik An Integrated Solution for Secure Group Communication in Wide-Area Networks. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF group authorization and access control, Security, group communication, group key agreement
20Rüdiger Grimm Security requirements for internet voting. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorization and anonymity, security requirements, blind signature, internet voting
20Yi Mu 0001, Vijay Varadharajan Towards a Protection Model for Supporting Multiple Access Control Policies. Search on Bibsonomy Australasian Database Conference The full citation details ... 2000 DBLP  DOI  BibTeX  RDF OO database, Access Control, Authorization
20Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum A Practically Implementable and Tractable Delegation Logic. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF access control, knowledge representation, logic programs, Authorization, security policies, trust management, delegation
20John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi Security Policy Coordination for Heterogeneous Information Systems. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF information enclaves, access control, mediators, authorization policy
20Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF periodic authorization, access control, temporal constraints, time management
20Yun Bai 0001, Vijay Varadharajan A High Level Language for Conventional Access Control Models. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Policy Transformations, Formal Language, Access Control Model, Authorization Policies
20Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers A privilege management and enforcement system for distributed resource sharing. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation
20Steve R. White, Liam Comerford ABYSS: An Architecture for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software
20Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray 0001, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson System R: Relational Approach to Database Management. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1976 DBLP  DOI  BibTeX  RDF System R, database, data structures, authorization, recovery, locking, relational model, index structures, nonprocedural language
14Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
14Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo Membership-Based Access Control for Trust Negotiation in Open Systems. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Yahui Lu, Li Zhang Domain Administration of Task-role Based Access Control for Process Collaboration Environments. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Federica Paci, Rodolfo Ferrini, Elisa Bertino Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari Distributed authentication for services commercialization in ad hoc networks. Search on Bibsonomy Mobility Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication access controls, services commercialization using ad hoc networks, ad hoc networks
14Xuewang Zhang, Yulin Zhang Study on an Improved Extended-RBAC Model. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Jason Crampton Trade-Offs in Cryptographic Implementations of Temporal Access Control. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta Managing the lifecycle of XACML delegation policies in federated environments. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14David J. Lutz, Patrick Mandic, Sascha Neinert, Ruth del Campo, Jürgen Jähnert Harmonizing service and network provisioning for federative access in a mobile environment. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AAA Architecture, Security, MANET, OLSR
14Katerina Stamou, Prathyusha V. Akunuri, Gabrielle Allen, Archit Kulshrestha, Daniel S. Katz Feature rich, enhanced grid portal for LONI. Search on Bibsonomy Mardi Gras Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Im Young Jung, In Soon Cho, Heon Young Yeom A Cost-Effective Guarantee of Security and Scalability on HVEM DataGrid with Active Disk. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jason Crampton, Hemanth Khambhammettu Delegation and satisfiability in workflow systems. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF satisfiability, delegation, workflow management systems
14Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Scalable Method for Access Control in Location-Based Broadcast Services. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ayesha Altaf, M. Younus Javed, Attiq Ahmed Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privcy and Key Management, security
14Sang M. Park, Soon Myoung Chung Enhanced CAS Certificate for Metadata-Based Access Control in Grids. Search on Bibsonomy ICTAI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang A Role-Based Access Control Model for Complex Affairs. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Yu Zhang An Open Framework for Remote Electronic Elections. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Fred Spiessens, Jerry den Hartog, Sandro Etalle Know What You Trust. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi Towards Role Based Trust Management without Distributed Searching of Credentials. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jesus Luna, Manel Medina, Oscar Manso Using OGRO and CertiVeR to improve OCSP validation for Grids. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation
14Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati A data outsourcing architecture combining cryptography and access control. Search on Bibsonomy CSAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF outsourced architecture, access control, cryptography
14Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hua Wang 0002, Qing Li 0001 Secure and Efficient Information Sharing in Multi-university E-Learning Environments. Search on Bibsonomy ICWL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, E-Learning, Information sharing
14Hua Wang 0002, Jinli Cao Delegating Revocations and Authorizations. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RBAC, Delegation, Revocation
14Gaofeng Ji, Yong Tang 0001, Fan Huang, Peng Wang, Guibin Wu An Access Control Model for Service Composite. Search on Bibsonomy CSCWD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt A Robust Single Sign-On Model Based on Multi-Agent System and PKI. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa A Unified Conflict Resolution Algorithm. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hybrid Authorizations, Conflict Resolution, Access Control Models
14Vincent C. Hu, David F. Ferraiolo, Karen Scarfone Access Control Policy Combinations for the Grid Using the Policy Machine. Search on Bibsonomy CCGRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Romain Laborde, Thierry Desprats Dealing with Stable Environmental Conditions in XACML Systems. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jani Suomalainen Towards FineGrained Authorizations in Small Office and Home Networks. Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jong Sik Moon, Im-Yeong Lee A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OTP, Authentication, Ubiquitous, AAA, Ticket
14Maurizio Colombo, Fabio Martinelli, Paolo Mori, Anna Vaccarelli Extending the Globus Architecture with Role-Based Trust Management. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Chunyan Song, Jianliang Xu, Shenhua Li, Mingqiang Wang A Role-Based Secure Workflow Model. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu Towards trust-aware access management for ad-hoc collaborations. Search on Bibsonomy CollaborateCom The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Paolina Centonze, Robert J. Flynn, Marco Pistoia Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Salekul Islam, J. William Atwood Sender Access Control in IP Multicast. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Marcello Cinque, Domenico Cotroneo, Catello Di Martino, Stefano Russo 0001 Modeling and Assessing the Dependability ofWireless Sensor Networks. Search on Bibsonomy SRDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Daisy Daiqin He, Jian Yang 0001 Security Policy Specification and Integration in Business Collaboration. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Dominik Zalewski Security Enhancement of Java Remote Method Invocation. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik Access Control Policy Management Framework based on RBAC in OSGi Service Platform. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Rubén Barrio, Xavier Perramon, Jaime Delgado Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Minghui Zhou 0001, Hong Mei 0001 A Service-Oriented Trust Management Model on Application Server. Search on Bibsonomy ICWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jesus Luna, Manel Medina, Oscar Manso Using OGRO and CertiVeR to Improve OCSP Validation for Grids. Search on Bibsonomy GPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 A Distributed Domain Administration of RBAC Model in Collaborative Environments. Search on Bibsonomy CSCWD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Amir H. Chinaei, Huaxin Zhang Hybrid Authorizations and Conflict Resolution. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Access Control, Conflict Resolution, Combined Strategies
14Yanqin Zhu, Peide Qian, Yueqin Liu A Role-based PMI Authentication Model and its Application. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik An Effective Policy Management Framework Using RBAC model for Service Platform based on Components. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Sun Ok Yang, SungSuk Kim Network Mobility in MIPv6 Considering Arrival Time. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binding update, mobility type, kcredit, mean resident time, network mobility, arrival time
14Fahima Cheikh, Giuseppe De Giacomo, Massimo Mecella Automatic web services composition in trustaware communities. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF web services, access control, trust, composition
14Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi A Survey of Secure B2C Commerce for Multicast Services. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine Reducing the Dependence of SPKI/SDSI on PKI. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jing Jin, Gail-Joon Ahn, Mukesh Singhal ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. Search on Bibsonomy EDBT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Ragib Hasan, Marianne Winslett Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi Shibboleth-based Access to and Usage of Grid Resources. Search on Bibsonomy GRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. Search on Bibsonomy APWeb The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Grid, role-based access control, XACML, single sign-on, SAML
14Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi Secure E-Commerce Transactions for Multicast Services. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang 0001 FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Haibo Shen, Fan Hong An Attribute-Based Access Control Model for Web Services. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web Services, XACML, Attribute-Based Access Control, Automated Trust Negotiation
14Vishwas Patil, R. K. Shyamasundar e-coupons: An Efficient, Secure and Delegable Micro-Payment System. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI
14G. Geethakumari, Atul Negi, V. N. Sastry Dynamic Delegation Approach for Access Control in Grids. Search on Bibsonomy e-Science The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Xinwen Zhang, Yingjiu Li, Divya Nalla An attribute-based access matrix model. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access matrix model, access control, decidability, safety analysis
14Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong Research and Implementation of Role-Based RBAC Administration Model. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Weili Han, Junjing Zhang, Xiaobo Yao Context-sensitive Access Control Model and Implementation. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. Search on Bibsonomy ECOOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Hiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka, Shigeyuki Matsuda, Krysia Broda, Morris Sloman Policy Conflict Analysis Using Tableaux for On Demanc VPN Framework. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Vijayalakshmi Atluri, Janice Warner Supporting conditional delegation in secure workflow management systems. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF workflow, constraints, delegation
14Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi Trust Management with Safe Privilege Propagation. Search on Bibsonomy APPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Andrew D. Gordon 0001 From Typed Process Calculi to Source-Based Security. Search on Bibsonomy SAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Hui Lei, Gholamali C. Shoja A Distributed Trust Model for e-Commerce Applications. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai Using Trust for Restricted Delegation in Grid Environments. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Alfred C. Weaver A security architecture for data privacy and security. Search on Bibsonomy ETFA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat CoLab: A Flexible Collaborative Web Browsing Tool. Search on Bibsonomy AINA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Peng Liu, Jian-bin Hu, Zhong Chen 0001 A Formal Language for Access Control Policies in Distributed Environment. Search on Bibsonomy Web Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Julien Laganier, Pascale Vicat-Blanc Primet HIPernet: a decentralized security infrastructure for large scale grid environments. Search on Bibsonomy GRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Wesley Emeneker, Dan Stanzione Cluster Spanning with Virtual Environments. Search on Bibsonomy CLUSTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jizhong Zhao, Yong Qi, Zhaofeng Ma Secure Multimedia Streaming with Trusted Digital Rights Management. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 2781 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license