|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Daniela Inclezan |
An ASP Framework for the Refinement of Authorization and Obligation Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.13190, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Artur Philipp, Axel Küpper |
DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.06919, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang 0002, Shouling Ji |
Edge Deep Learning Model Protection via Neuron Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.12397, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Erin Lanus, Charles J. Colbourn, Gail-Joon Ahn |
Guaranteeing Anonymity in Attribute-Based Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.04896, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Corey Bonnell |
Certification Authority Authorization (CAA) Processing for Email Addresses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9495, pp. 1-8, October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Torsten Lodderstedt, Justin Richer, Brian Campbell 0005 |
OAuth 2.0 Rich Authorization Requests. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9396, pp. 1-38, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Cigdem Sengul, Anthony Kirby |
Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9431, pp. 1-33, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Olaf Bergmann, John Preuß Mattsson, Göran Selander |
Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9430, pp. 1-6, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang 0038, Weiqiang Liu 0001 |
Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 53(6), pp. 7298-7309, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jianfei Sun, Guowen Xu, Tianwei Zhang 0004, Xuehuan Yang, Mamoun Alazab, Robert H. Deng |
Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 18, pp. 683-698, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Na Li |
Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(2), pp. 362, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele |
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1325, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Ehtesham Zahoor, Maryam Chaudhary, Sabina Akhtar, Olivier Perrin 0001 |
A formal approach for the identification of redundant authorization policies in Kubernetes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 135, pp. 103473, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Özlem Seker, Gökhan Dalkiliç, Umut Can Çabuk |
MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(12), pp. 5674, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Linsheng Yu, Mingxing He, Hongbin Liang, Ling Xiong, Yang Liu |
A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(3), pp. 1264, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Priyanka Mondal, Maximilian Algehed, Owen Arden |
Flow-limited authorization for consensus, replication, and secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 31(5), pp. 615-645, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Daniela Inclezan |
An ASP Framework for the Refinement of Authorization and Obligation Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theory Pract. Log. Program. ![In: Theory Pract. Log. Program. 23(4), pp. 832-847, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kai Zhang 0016, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu |
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 20(6), pp. 4621-4636, November - December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Arbër Beshiri |
Authentication and Authorization Management in SOA with the Focus on RESTful Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Eng. Knowl. Eng. ![In: Int. J. Softw. Eng. Knowl. Eng. 33(8), pp. 1293-1326, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Haotian Wang 0001, Haoang Chi, Wenjing Yang 0002, Zhipeng Lin, Mingyang Geng, Long Lan, Jing Zhang 0037, Dacheng Tao |
Domain Specified Optimization for Deployment Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCV ![In: IEEE/CVF International Conference on Computer Vision, ICCV 2023, Paris, France, October 1-6, 2023, pp. 5072-5082, 2023, IEEE, 979-8-3503-0718-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Safwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta |
Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2023, Charlotte, NC, USA, April 24-26, 2023., pp. 283-285, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake |
Continuous Group Key Agreement with Flexible Authorization and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSPA@CODASPY ![In: Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April 2023., pp. 3-13, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Abdullah Kamal, Jeremy Vidaurri, Carlos E. Rubio-Medrano |
No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiHoc ![In: Proceedings of the Twenty-fourth International Symposium on Theory, Algorithmic Foundations, and Protocol Design for Mobile Networks and Mobile Computing, MobiHoc 2023, Washington, DC, USA, October 23-26, 2023, pp. 522-527, 2023, ACM, 978-1-4503-9926-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Archana Sulebele, Sai Krishna Munnangi |
Attribute Authorization - A Novel Enhancement to API Gateways. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC (2) ![In: Service-Oriented Computing - 21st International Conference, ICSOC 2023, Rome, Italy, November 28 - December 1, 2023, Proceedings, Part II, pp. 276-290, 2023, Springer, 978-3-031-48423-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Alexandru Sorici, Adina Magda Florea |
CASHMERE: Context-based Authorization in Hypermedia Agent Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC (Posters/Demos/Industry) ![In: Proceedings of the ISWC 2023 Posters, Demos and Industry Tracks: From Novel Ideas to Industrial Practice co-located with 22nd International Semantic Web Conference (ISWC 2023), Athens, Greece, November 6-10, 2023., 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Andrea Saracino, Paolo Mori (eds.) |
Emerging Technologies for Authorization and Authentication - 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA ![Springer, 978-3-031-25466-6 The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Ioannis Stylianou, Ilias Politis, Christos Xenakis |
Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICC ![In: IEEE International Conference on Communications, ICC 2023, Rome, Italy, May 28 - June 1, 2023, pp. 5310-5315, 2023, IEEE, 978-1-5386-7462-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Maruf Farhan, Abdul Salih, Usman Butt |
Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Proceedings of the 2023 6th International Conference on Information Science and Systems, ICISS 2023, Edinburgh, United Kingdom, August 11-13, 2023, pp. 254-261, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Mariem Bouchaala, Rihab Boussada, Leïla Azouz Saïdane |
I4AS-Cloud: Identification, Authentication and Authorization As A Service Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: International Wireless Communications and Mobile Computing, IWCMC 2023, Marrakesh, Morocco, June 19-23, 2023, pp. 1460-1465, 2023, IEEE, 979-8-3503-3339-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023., pp. 442-449, 2023, SCITEPRESS, 978-989-758-666-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Rajeshwari Gadathas Krishna Babu, Aytaj Badirova, Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour |
Authorization and Interoperability in Access Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUFN ![In: Fourteenth International Conference on Ubiquitous and Future Networks, ICUFN 2023, Paris, France, July 4-7, 2023, pp. 672-674, 2023, IEEE, 979-8-3503-3538-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Feng Tian, Haoshi Zhang, Pan Wang, Xinkuan Wang |
Exploration and Application Based on Authentication, Authorization, Accounting in Home Broadband Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPC (2) ![In: Green, Pervasive, and Cloud Computing - 18th International Conference, GPC 2023, Harbin, China, September 22-24, 2023, Proceedings, Part II, pp. 285-295, 2023, Springer, 978-981-99-9895-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yong Jin, Masahiko Tomoishi |
A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 985-986, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Richard Cardone, Smruti Padhy, Steve Black, Joe Stubbs, Sean B. Cleveland |
A Decentralized Authorization and Security Framework for Distributed Research Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 47th IEEE Annual Computers, Software, and Applications Conference, COMPSAC 2023, Torino, Italy, June 26-30, 2023, pp. 741-746, 2023, IEEE, 979-8-3503-2697-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | David Hästbacka, Minh Tran, Petri Kannisto, Mikael Filppula, Pál Varga |
External Token-Based Authorization of Data-Driven Integrations and Service Compositions in MQTT 5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IECON ![In: 49th Annual Conference of the IEEE Industrial Electronics Society, IECON 2023, Singapore, October 16-19, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-3182-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Anitha Gollamudi, Stephen Chong |
Expressive Authorization Policies using Computation Principals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pp. 107-119, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Marshal Moncivais, Mustafa Al-Lail |
Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pp. 59-61, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn |
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023, pp. 79-90, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Hannes Salin |
AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IoTBDS ![In: Proceedings of the 8th International Conference on Internet of Things, Big Data and Security, IoTBDS 2023, Prague, Czech Republic, April 21-23, 2023., pp. 170-177, 2023, SCITEPRESS, 978-989-758-643-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang |
Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications, New York City, NY, USA, May 17-20, 2023, pp. 1-10, 2023, IEEE, 979-8-3503-3414-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Pawel Mielnik, Anja Myhre Hjelle, Bjarte Pollen, Krzysztof Tokarz, Marcin Fojcik |
Identification and authorization with single accelerometer data - implications from "Wearables in Arthritis" project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, Athens, Greece, 6-8 September 2023., pp. 374-383, 2023, Elsevier. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Irfan Simsek |
Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIoT ![In: 6th Conference on Cloud and Internet of Things, CIoT 2023, Lisbon, Portugal, March 20-22, 2023, pp. 47-54, 2023, IEEE, 979-8-3503-9669-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jiho Lim, Hansu Oh, Kichun Sim, Sunyoung Kim, Ki-Hyung Kim |
A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: International Conference on Information Networking, ICOIN 2023, Bangkok, Thailand, January 11-14, 2023, pp. 801-805, 2023, IEEE, 978-1-6654-6268-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Denys Shevchuk, Oleh Harasymchuk, Andrii Partyka, Nataliia Korshun |
Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS II ![In: Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), Kyiv, Ukraine, October 26, 2023 (online)., pp. 217-225, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele |
The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS (3) ![In: Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part III, pp. 222-242, 2023, Springer, 978-3-031-51478-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Olfa Dallel, Souheil Ben Ayed, Jamel Bel Hadj Tahar |
Smart Blockchain-based Authorization for Social Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: International Conference on Cyberworlds, CW 2023, Sousse, Tunisia, October 3-5, 2023, pp. 440-447, 2023, IEEE, 979-8-3503-1565-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Muhammad Sharjeel Zareen, Shahzaib Tahir, Baber Aslam |
Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIPIoT (1) ![In: Internet of Things. Advances in Information and Communication Technology - 6th IFIP International Cross-Domain Conference, IFIPIoT 2023, Denton, TX, USA, November 2-3, 2023, Proceedings, Part I, pp. 442-453, 2023, Springer, 978-3-031-45877-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Xirong Zhuang, Lan Zhang 0002, Chen Tang, Huiqi Liu, Bin Wang, Yan Zheng, Bo Ren 0002 |
DeepContract: Controllable Authorization of Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Annual Computer Security Applications Conference, ACSAC 2023, Austin, TX, USA, December 4-8, 2023, pp. 609-620, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Tom De Nies, Aad Versteden, Erika Pauwels, Johan Delaure |
Combining Public and Private Linked Data through Graph-based Authorization Profiles in the semantic.works Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QuWeDa/MEPDaW@ISWC ![In: Joint Proceedings of the QuWeDa and MEPDaW 2023: 7th Workshop on Storing, Querying and Benchmarking Knowledge Graphs and 9th Workshop on Managing the Evolution and Preservation of the Data Web co-located with 22nd International Semantic Web Conference (ISWC 2023), Athens, Greece, 6-10 November 2023., pp. 22-25, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
13 | Li Ma 0011, Qidi Lao, Wenyin Yang, Zexian Yang, Dong Yuan, Zhaoxiong Bu |
Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiSec ![In: Ubiquitous Security - Third International Conference, UbiSec 2023, Exeter, UK, November 1-3, 2023, Revised Selected Papers, pp. 348-359, 2023, Springer, 978-981-97-1273-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Syed Zain R. Rizvi |
The SUDO Framework: For Data Organization And Efficient Query Authorization For NoSQL Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
13 | Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
A systematic literature review for authorization and access control: definitions, strategies and models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Inf. Syst. ![In: Int. J. Web Inf. Syst. 18(2/3), pp. 156-180, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xiaodong Yang 0006, Jiaqi Wang, Wanting Xi, Tian Tian, Caifen Wang |
A blockchain-based keyword search scheme with dual authorization for electronic health record sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 66, pp. 103154, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Shangping Wang, Huan Li, Juanjuan Chen, Jifang Wang, Yingjuan Deng |
DAG blockchain-based lightweight authentication and authorization scheme for IoT devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Secur. Appl. ![In: J. Inf. Secur. Appl. 66, pp. 103134, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Li Zhao, Meng Sun, Binbin Yang, Junpeng Xie, Jiqiang Feng |
Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 43(3), pp. 3189-3201, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kindson Munonye, Péter Martinek |
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 21(2), pp. 223-237, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar |
Valued Authorization Policy Existence Problem: Theory and Experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Priv. Secur. ![In: ACM Trans. Priv. Secur. 25(4), pp. 28:1-28:32, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Marius Iulian Mihailescu, Stefania Loredana Nita |
A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. ![In: Cryptogr. 6(1), pp. 8, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | K. Rajesh Rao, Aditya Kolpe, Tribikram Pradhan, Bruno Bogaz Zarpelão |
An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 11(4), pp. 531-548, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Abdulghafour Mohammad |
Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cybersecur. Priv. ![In: J. Cybersecur. Priv. 2(1), pp. 107-123, March 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Feng Tian 0004, Zhenqiang Wu, Xiaolin Gui, Jianbing Ni, Xuemin Sherman Shen |
Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Cloud Comput. ![In: IEEE Trans. Cloud Comput. 10(3), pp. 1831-1847, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sarah Pearman, Ellie Young, Lorrie Faith Cranor |
User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2022(3), pp. 558-581, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | B. N. Jagdale 0001, Jagdish W. Bakal |
A novel authentication and authorization scheme in P2P networking using location-based privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Evol. Intell. ![In: Evol. Intell. 15(2), pp. 1251-1264, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tao Wang 0039, Jingyi Wang, Qiliang Yang, Bo Yang 0003, Haiyu Li, Fei Xu, Zirui Qiao |
An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(20), pp. 20666-20680, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Cheng Huang 0001, Liang Xue, Dongxiao Liu, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying |
Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(18), pp. 17194-17209, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Md. Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam |
CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(3), pp. 1667-1682, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | E. Chen 0001, Yan Zhu 0010, Zhiyuan Zhou, Shou-Yu Lee, W. Eric Wong, William Cheng-Chung Chu |
Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 9(7), pp. 5391-5409, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tanveer Ahmad, Rajiv Pandey, Mohammad Faisal |
Authorization Model for Securing Cloud SaaS Services (Netflix). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Distributed Syst. Technol. ![In: Int. J. Distributed Syst. Technol. 13(8), pp. 1-13, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jianwei Li, Xiaoming Wang 0004, Qingqing Gan, Fengling Wang |
MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 191, pp. 184-193, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Partha Sarathi Roy 0001, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto |
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Theor. Comput. Sci. ![In: Theor. Comput. Sci. 929, pp. 124-139, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hao Lin, Fei Gao 0001, Hua Zhang 0001, Zhengping Jin, Wenmin Li 0001, Qiaoyan Wen |
Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Syst. J. ![In: IEEE Syst. J. 16(1), pp. 1460-1470, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ammar Mohammad, Hasan Al-Refai, Ali Ahmad Alawneh 0001 |
Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 11(12), pp. 168, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hasan Al-Refai, Ali Ahmad Alawneh 0001 |
User Authentication and Authorization Framework in IoT Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 11(10), pp. 147, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Robbi Rahim, Manikandan Ramachandran, Prassanna Jayachandran, Hariharan Kalyanaraman, Vidhyacharan Bhaskar, Ambeshwar Kumar |
Holistic Feistel Authenticated Learning-Based Authorization for Protecting the Internet of Things from Cyber Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 127(4), pp. 3511-3532, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu |
NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM J. Emerg. Technol. Comput. Syst. ![In: ACM J. Emerg. Technol. Comput. Syst. 18(3), pp. 51:1-51:19, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Syed Noman Ali Sherazi, Ehtesham Zahoor, Sabina Akhtar, Olivier Perrin 0001 |
A blockchain based approach for the authorization policies delegation in emergency situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 33(5), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | |
OpenAPI Specification Extended Security Scheme: A method to reduce the prevalence of Broken Object Level Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.06606, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Bálint Z. Téglásy, Sokratis K. Katsikas |
A Location-Based Global Authorization Method for Underwater Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.07666, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis |
Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.00586, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang |
Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.11465, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Parth Dipakkumar Patel, Prem Trivedi |
A systematic literature review on Virtual Reality and Augmented Reality in terms of privacy, authorization and data-leaks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2212.04621, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Jaimandeep Singh, Chintan Patel, Naveen Kumar Chaudhary |
Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2208.02592, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong |
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.04980, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Francesca Palombini, Ludwig Seitz, Göran Selander, Martin Gunnarsson |
The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9203, pp. 1-28, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Karsten Meyer zu Selhausen, Daniel Fett |
OAuth 2.0 Authorization Server Issuer Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9207, pp. 1-9, March 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ludwig Seitz |
Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9201, pp. 1-11, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Ludwig Seitz, Göran Selander, Erik Wahlstroem, Samuel Erdtman, Hannes Tschofenig |
Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9200, pp. 1-72, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Stefanie Gerdes, Olaf Bergmann, Carsten Bormann, Göran Selander, Ludwig Seitz |
Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9202, pp. 1-23, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake |
Continuous Group Key Agreement with Flexible Authorization and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1768, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
13 | Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin 0001 |
A Formal Approach for the Identification of Authorization Policy Conflicts within Multi-Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 20(2), pp. 18, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Michal Trnka, Amr S. Abdelfattah, Aishwarya Shrestha, Michael Coffey, Tomás Cerný |
Systematic Review of Authentication and Authorization Advancements for the Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(4), pp. 1361, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamà, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz 0001, Christos Xenakis |
SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(17), pp. 6527, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Tiago Martins, Sergio Vidal Garcia Oliveira |
Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 22(20), pp. 8024, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Zhitang Li, Cuihua Zhang, Xiaoxu Wang, Ruxia Lyu |
The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Ind. Eng. ![In: Comput. Ind. Eng. 168, pp. 108027, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar, Qin Xin 0001, P. Mohamed Shakeel |
Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 22(4), pp. 90:1-90:20, November 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Hua Deng, Jixin Zhang, Zheng Qin 0001, Qianhong Wu, Hui Yin, Aniello Castiglione |
Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 19(5), pp. 3024-3037, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Qing Wu 0005, Taotao Lai, Leyou Zhang, Yi Mu 0001, Fatemeh Rezaeibagha |
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Archit. ![In: J. Syst. Archit. 129, pp. 102569, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati |
An authorization model for query execution in the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB J. ![In: VLDB J. 31(3), pp. 555-579, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Pieter-Jan Vrielynck, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen |
DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSec@EUROSYS ![In: EuroSec@EUROSYS 2022: Proceedings of the 15th European Workshop on Systems Security, Rennes, France, April 5-8, 2022, pp. 57-63, 2022, ACM, 978-1-4503-9255-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Giovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco |
Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetSoft ![In: 8th IEEE International Conference on Network Softwarization, NetSoft 2022, Milan, Italy, June 27 - July 1, 2022, pp. 468-473, 2022, IEEE, 978-1-6654-0694-9. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
|
|