The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorization with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1978 (15) 1979-1987 (15) 1988-1990 (15) 1991-1993 (20) 1994-1995 (26) 1996 (19) 1997 (20) 1998 (24) 1999 (38) 2000 (40) 2001 (45) 2002 (90) 2003 (143) 2004 (178) 2005 (216) 2006 (242) 2007 (225) 2008 (194) 2009 (156) 2010 (91) 2011 (82) 2012 (79) 2013 (54) 2014 (51) 2015 (70) 2016 (53) 2017 (67) 2018 (73) 2019 (83) 2020 (81) 2021 (89) 2022 (94) 2023 (74) 2024 (19)
Publication types (Num. hits)
article(680) book(1) incollection(28) inproceedings(2027) phdthesis(40) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(64) CoRR(63) RFC(63) ETAA@ESORICS(34) ACM Trans. Inf. Syst. Secur.(33) ESORICS(31) ACSAC(28) CCS(26) GRID(24) DBSec(23) ETAA(22) AsiaCCS(20) CSFW(20) POLICY(20) SAC(20) ARES(19) More (+10 of total 1082)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1949 occurrences of 743 keywords

Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Jaehong Park, Ravi S. Sandhu The UCONABC usage control model. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, access control, trust, digital rights management, usage control
14Reen-Cheng Wang, R. I. Chen, Han-Chieh Chao AAA architecture for mobile IPv6 based on WLAN. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP/IP
14Hasan M. Jamil, Gillian Dobbie On Logical Foundations of Multilevel Secure Databases. Search on Bibsonomy J. Intell. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF MLS databases, belief assertion, inheritance and overriding, security, reasoning, deductive databases, declarative language, soundness and completeness
14Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu A simple password authentication using a polynomial. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, authentication, password
14Giacomo Cabri, Luca Ferrari 0002, Letizia Leonardi Embedding JAAS in agent roles to apply local security policies. Search on Bibsonomy PPPJ The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Java agents, local policies, authentication, roles
14Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta A Credential Conversion Service for SAML-based Scenarios. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis Delivering Attribute Certificates over GPRS. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF performance evaluation, UMTS, PKI, GPRS, attribute certificates
14Grit Denker, Son Nguyen, Andrew Ton OWL-S Semantics of Security Web Services: a Case Study. Search on Bibsonomy ESWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia Identifying Sensitive Associations in Databases for Release Control. Search on Bibsonomy Secure Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya A First Approach to Provide Anonymity in Attribute Certificates. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Konstantina Stoupa, Athena Vakali, Fang Li 0001, George Andreadis Web-based delegation using XML. Search on Bibsonomy SMC (6) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Byunggil Lee, HyunGon Kim, KyoIl Chung Design of Sub-session Based Accounting System for Different Service Level of Mobile IP Roaming User. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Vishwas Patil, R. K. Shyamasundar An Efficient, Secure and Delegable Micro-Payment System. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim Efficient Role Based Access Control Method in Wireless Environment. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Gunhee Lee, Wonil Kim, Dong-Kyoo Kim A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Hoseong Jeon, Hyunseung Choo, Jai-Ho Oh IDentification Key Based AAA Mechanism in Mobile IP Networks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Jongil Jeong, Dongkyoo Shin, Dongil Shin, Hyun-Mok Oh A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. Search on Bibsonomy EUC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Hui Liu, Minglu Li 0001 Multiparty Joint Authentication: Extending the Semantics of Single Sign-On for Grids. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 Hindering Eavesdropping via IPv6 Opportunistic Encryption. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Elhadi M. Shakshuki, Zhonghai Luo, Jing Gong, Qian Chen Multi-agent System for Security Service. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Tadashi Komori, Takamichi Saito A Secure Wireless LAN System Retaining Privacy. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Fumio Mizoguchi Talk on Activities of Security and Grid Computing Service Project. Search on Bibsonomy WETICE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Ali E. Abdallah, Etienne J. Khayat A Formal Model for Parameterized Role-Based Access Control. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Gail-Joon Ahn, Dongwan Shin, Longhua Zhang Role-Based Privilege Management Using Attribute Certificates and Delegation. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwaihara, Vilas Wuwongse, Yahiko Kambayashi A Rule-Based XML Access Control Model. Search on Bibsonomy RuleML The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Chun Ruan, Vijay Varadharajan Supporting E-consent on Health Data by Logic. Search on Bibsonomy ISMIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Hristo Koshutanski, Fabio Massacci An access control framework for business processes for web services. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF controlled disclosure, interactive access control, web services, e-business, security management, distributed systems security
14Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero Extending the SDSI / SPKI Model through Federation Webs. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Yuh-Jong Hu, Chao-Wei Tang Agent-Oriented Public Key Infrastructure for Multi-agent E-service. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Shijin Yuan, Yunfa Hu Access Control Architecture for Web Services. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Anca-Andreea Ivan, Vijay Karamcheti Using Views for Customizing Reusable Components in Component-Based Frameworks. Search on Bibsonomy HPDC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Ravi S. Sandhu, Jaehong Park Usage Control: A Vision for Next Generation Access Control. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Michiharu Kudo PBAC: Provision-based access control model. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF provisional action, security policy, Access control model
14Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati An algebra for composing access control policies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access control, logic programs, algebra, policy composition
14Larry Koved, Marco Pistoia, Aaron Kershenbaum Access rights analysis for Java. Search on Bibsonomy OOPSLA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Java security, invocation graph, security, data flow analysis, call graph, access rights
14Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 Logic-Based Reasoning on Delegatable Authorizations. Search on Bibsonomy ISMIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez Different Smartcard-Based Approaches to Physical Access Control. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang A Solution to Mobile IP Registration for AAA. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Byung Gil Lee, Hyun Gon Kim, Sung Won Sohn, Kil-Houm Park Design of an Accounting Architecture for Load and Session Managed Diameter-Based AAA Network. Search on Bibsonomy CDMA International Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Stephen T. Kent Rethinking PKI: What's Trust Got to Do with It? Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Tatyana Ryutov, B. Clifford Neuman The Specification and Enforcement of Advanced Security Policies. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Victoria Ungureanu Regulating E-Commerce through Certified Contracts. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Duminda Wijesekera, Sushil Jajodia Policy algebras for access control: the propositional case. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF policy algebra, access control, security policy, policy composition
14Armin Stranjak, Damir Kovacic, Igor Cavrak, Mario Zagar Concurrent Access to Remote Instrumentation in CORBA-Based Distributed Environment. Search on Bibsonomy ICN (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14B. Clifford Neuman Condition-Driven Integration of Security Services. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Els Van Herreweghen Non-repudiation in SET: Open Issues. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Line Pouchard, David W. Walker A Community of Agents for User Support in a Problem-Solving Environment. Search on Bibsonomy Agents Workshop on Infrastructure for Multi-Agent Systems The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Jari Veijalainen Transactions in Mobile Electronic Commerce. Search on Bibsonomy FMLDO - Selected Papers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Hasan M. Jamil Belief Reasoning in MLS Deductive Databases. Search on Bibsonomy SIGMOD Conference The full citation details ... 1999 DBLP  DOI  BibTeX  RDF MLS database, beleif assertion, inheritance and overriding, reasoning, Datalog, deductive databases, CORAL
14Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino A Unified Framework for Enforcing Multiple Access Control Policies. Search on Bibsonomy SIGMOD Conference The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Masakazu Soshi, Mamoru Maekawa The Saga Security System: A Security Architecture for Open Distributed Systems. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Elisa Bertino, Sushil Jajodia, Pierangela Samarati Supporting Multiple Access Control Policies in Database Systems. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
14Elisa Bertino, Pierangela Samarati, Sushil Jajodia High Assurance Discretionary Access Control for Object Bases. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14Elisa Bertino, Pierangela Samarati, Sushil Jajodia Authorizations in Relational Database Management Systems. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14Rafiul Ahad, James Davis 0003, Stefan Gower, Peter Lyngbæk, Andra Marynowski, Emmanuel O. Onuegbe Supporting Access Control in an Object-Oriented Database Language. Search on Bibsonomy EDBT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
13Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng A systematic literature review of authorization and access control requirements and current state of the art for different database models. Search on Bibsonomy Int. J. Web Inf. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13K. Karthika, DeviPriya Rangasamy Authorization of Aadhar data using Diffie Helman key with enhanced security concerns. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Bruno Sousa, Carolina Gonçalves FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers. Search on Bibsonomy Comput. Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Olfa Dallel, Souheil Ben Ayed, Jamel Bel Hadj Tahar Blockchain-Based Authorization Mechanism for Educational Social Internet of Things. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Siok Wah Tay, Ning Zhang 0001, Salem Aljanah A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ching-Nung Yang, Peng Li 0050, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hind Idrissi, Paolo Palmieri 0001 Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Fulin Li, Hang Hu 0015, Shixin Zhu, Jiayun Yan A fully dynamic multi-secret sharing scheme with redundant authorization. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Y. Jani, P. Raajan An efficient framework for authentication and blockchain authorization of secured healthcare information using hpcsg- rotdf-slorb and dhsk-decc. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yanan Zhao, Haiyang Yu, Yang Yang, Liang Xu, Shuyue Pan, Yilong Ren Flexible and Secure Cross-Domain Signcrypted Data Authorization in Multi-Platoon Vehicular Networks. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yi-Hua Zhou 0001, Bin Tang, Yu-Guang Yang 0001 A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Shubham Vatsal, Ayush Singh, Shabnam Tafreshi Can GPT Improve the State of Prior Authorization via Guideline Based Automated Question Answering? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks 0001, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version). Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Samuel Kofi Erskine Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Artur Philipp, Axel Küpper, Philip Raschke DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. Search on Bibsonomy ICIN The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Bharath Kumar R., Rajavelsamy R. Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI. Search on Bibsonomy CCNC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Dmytro Dosyn, Taras Batiuk A Realization of Visual Biometric Validation to Enhance Guarded and Efficient Authorization for Intellectual Systems. Search on Bibsonomy COLINS (2) The full citation details ... 2024 DBLP  BibTeX  RDF
13Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai Extension of Resource Authorization Method with SSI in Edge Computing. Search on Bibsonomy AINA (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yanan Zhao, Haiyang Yu, Yuhao Liang, Han Jiang 0003, Gintare Marine, Yilong Ren Sanitizable Cross-System Authorization for Secure Communication in Intelligent Connected Vehicle. Search on Bibsonomy IEEE Trans. Veh. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Carolina Gonçalves, Bruno Sousa, Marin Vukovic, Mario Kusek A federated authentication and authorization approach for IoT farming. Search on Bibsonomy Internet Things The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia, Guoquan Han A framework for deep neural network multiuser authorization based on channel pruning. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Garsha Rostami Role-based Access Control (RBAC) Authorization in Kubernetes. Search on Bibsonomy J. ICT Stand. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Wenjing Zhong, Jinjing Zhao, Hesuan Hu Beacon-Based Firing Control for Authorization Security in Workflows. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Wenjing Zhong, Jinjing Zhao, Hesuan Hu Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Naoki Umeda, Taiji Kimura, Naoto Yanai The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment. Search on Bibsonomy IEEE Open J. Commun. Soc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Yongxia Sun, Weijin Jiang, Ying Yang, Haoran Zhu, Yirong Jiang Multi-domain authorization and decision-making method of access control in the edge environment. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Sreelakshmi Vattaparambil Sudarsan, Olov Schelén, Ulf Bodin Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber-Physical Systems. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Louise Hickman, Cynthia L. Bennett Access Work: Laboring with Non-Innocent Authorization. Search on Bibsonomy Interactions The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Carlo Mazzocca, Nicolò Romandini, Michele Colajanni, Rebecca Montanari FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare. Search on Bibsonomy IEEE Trans. Comput. Soc. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Leslie A. Lenert, Steven R. Lane, Ramsey M. Wehbe Could an artificial intelligence approach to prior authorization be more human? Search on Bibsonomy J. Am. Medical Informatics Assoc. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jianfei Sun, Guowen Xu, Tianwei Zhang 0004, Xiaochun Cheng, Xingshuo Han, Mingjian Tang 0001 Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Uzma Mahar, Muhammad Aleem, Ehtesham Zahoor TTECCDU: a blockchain-based approach for expressive authorization management. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Ahmet Bucko, Kamer Vishi, Bujar Krasniqi, Blerim Rexha Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History. Search on Bibsonomy Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13P. Padma, S. Srinivasan DAuth - Delegated Authorization Framework for Secured Serverless Cloud Computing. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Benyuan Yang, Hesuan Hu Analysis of Authorization Constraints via Integer Linear Programming. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Hiral S. Trivedi, Sankita J. Patel Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jens Finkhäuser Capabilities for Distributed Authorization in Information-Centric Networking. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13David Ahmad Abboud, Damien Jacob Implementation of a new authorization system from monolithic solution to microservice architecture. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Richard Cardone, Smruti Padhy, Steve Black, Sean B. Cleveland, Joe Stubbs A Decentralized Authorization and Security Framework for Distributed Research Workflows. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 2781 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license