The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorization with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1978 (15) 1979-1987 (15) 1988-1990 (15) 1991-1993 (20) 1994-1995 (26) 1996 (19) 1997 (20) 1998 (24) 1999 (38) 2000 (40) 2001 (45) 2002 (90) 2003 (143) 2004 (178) 2005 (216) 2006 (242) 2007 (225) 2008 (194) 2009 (156) 2010 (91) 2011 (82) 2012 (79) 2013 (54) 2014 (51) 2015 (70) 2016 (53) 2017 (67) 2018 (73) 2019 (83) 2020 (81) 2021 (89) 2022 (94) 2023 (74) 2024 (19)
Publication types (Num. hits)
article(680) book(1) incollection(28) inproceedings(2027) phdthesis(40) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(64) CoRR(63) RFC(63) ETAA@ESORICS(34) ACM Trans. Inf. Syst. Secur.(33) ESORICS(31) ACSAC(28) CCS(26) GRID(24) DBSec(23) ETAA(22) AsiaCCS(20) CSFW(20) POLICY(20) SAC(20) ARES(19) More (+10 of total 1082)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1949 occurrences of 743 keywords

Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Daniela Inclezan An ASP Framework for the Refinement of Authorization and Obligation Policies. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Artur Philipp, Axel Küpper DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jinyin Chen, Haibin Zheng, Tao Liu, Rongchang Li, Yao Cheng, Xuhong Zhang 0002, Shouling Ji Edge Deep Learning Model Protection via Neuron Authorization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Erin Lanus, Charles J. Colbourn, Gail-Joon Ahn Guaranteeing Anonymity in Attribute-Based Authorization. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Corey Bonnell Certification Authority Authorization (CAA) Processing for Email Addresses. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Torsten Lodderstedt, Justin Richer, Brian Campbell 0005 OAuth 2.0 Rich Authorization Requests. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Cigdem Sengul, Anthony Kirby Message Queuing Telemetry Transport (MQTT) and Transport Layer Security (TLS) Profile of Authentication and Authorization for Constrained Environments (ACE) Framework. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Olaf Bergmann, John Preuß Mattsson, Göran Selander Extension of the Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE) to Transport Layer Security (TLS). Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Mingfu Xue, Yinghao Wu, Yushu Zhang, Jian Wang 0038, Weiqiang Liu 0001 Dataset authorization control: protect the intellectual property of dataset via reversible feature space adversarial examples. Search on Bibsonomy Appl. Intell. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jianfei Sun, Guowen Xu, Tianwei Zhang 0004, Xuehuan Yang, Mamoun Alazab, Robert H. Deng Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Na Li Efficient Equality Test on Identity-Based Ciphertexts Supporting Flexible Authorization. Search on Bibsonomy Entropy The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
13Ehtesham Zahoor, Maryam Chaudhary, Sabina Akhtar, Olivier Perrin 0001 A formal approach for the identification of redundant authorization policies in Kubernetes. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Özlem Seker, Gökhan Dalkiliç, Umut Can Çabuk MARAS: Mutual Authentication and Role-Based Authorization Scheme for Lightweight Internet of Things Applications. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Linsheng Yu, Mingxing He, Hongbin Liang, Ling Xiong, Yang Liu A Blockchain-Based Authentication and Authorization Scheme for Distributed Mobile Cloud Computing Services. Search on Bibsonomy Sensors The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Priyanka Mondal, Maximilian Algehed, Owen Arden Flow-limited authorization for consensus, replication, and secret sharing. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Daniela Inclezan An ASP Framework for the Refinement of Authorization and Obligation Policies. Search on Bibsonomy Theory Pract. Log. Program. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kai Zhang 0016, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Arbër Beshiri Authentication and Authorization Management in SOA with the Focus on RESTful Services. Search on Bibsonomy Int. J. Softw. Eng. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Haotian Wang 0001, Haoang Chi, Wenjing Yang 0002, Zhipeng Lin, Mingyang Geng, Long Lan, Jing Zhang 0037, Dacheng Tao Domain Specified Optimization for Deployment Authorization. Search on Bibsonomy ICCV The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Safwa Ameer, Ram Krishnan, Ravi S. Sandhu, Maanak Gupta Utilizing The DLBAC Approach Toward a ZT Score-based Authorization for IoT Systems. Search on Bibsonomy CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake Continuous Group Key Agreement with Flexible Authorization and Its Applications. Search on Bibsonomy IWSPA@CODASPY The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Abdullah Kamal, Jeremy Vidaurri, Carlos E. Rubio-Medrano No-Fly-Zone: Regulating Drone Fly-Overs Via Government and User-Controlled Authorization Zones. Search on Bibsonomy MobiHoc The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Archana Sulebele, Sai Krishna Munnangi Attribute Authorization - A Novel Enhancement to API Gateways. Search on Bibsonomy ICSOC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Alexandru Sorici, Adina Magda Florea CASHMERE: Context-based Authorization in Hypermedia Agent Environments. Search on Bibsonomy ISWC (Posters/Demos/Industry) The full citation details ... 2023 DBLP  BibTeX  RDF
13Andrea Saracino, Paolo Mori (eds.) Emerging Technologies for Authorization and Authentication - 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers Search on Bibsonomy ETAA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Ioannis Stylianou, Ilias Politis, Christos Xenakis Enhancing 3GPP CAPIF Authentication and Authorization Across Mobile Operators Using OpenID Connect and Single Sign-On. Search on Bibsonomy ICC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Maruf Farhan, Abdul Salih, Usman Butt Enhancing Secure Access and Authorization in Healthcare IoT through an Innovative Framework: Integrating OAuth, DIDs, and VCs. Search on Bibsonomy ICISS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Mariem Bouchaala, Rihab Boussada, Leïla Azouz Saïdane I4AS-Cloud: Identification, Authentication and Authorization As A Service Cloud Computing. Search on Bibsonomy IWCMC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-Independent Enforcement. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Rajeshwari Gadathas Krishna Babu, Aytaj Badirova, Faraz Fatemi Moghaddam, Philipp Wieder, Ramin Yahyapour Authorization and Interoperability in Access Control Systems. Search on Bibsonomy ICUFN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Feng Tian, Haoshi Zhang, Pan Wang, Xinkuan Wang Exploration and Application Based on Authentication, Authorization, Accounting in Home Broadband Scenario. Search on Bibsonomy GPC (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Yong Jin, Masahiko Tomoishi A Named-Entity-based TTP-free Authentication and Authorization Architecture for IoT Systems. Search on Bibsonomy COMPSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Richard Cardone, Smruti Padhy, Steve Black, Joe Stubbs, Sean B. Cleveland A Decentralized Authorization and Security Framework for Distributed Research Workflows. Search on Bibsonomy COMPSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13David Hästbacka, Minh Tran, Petri Kannisto, Mikael Filppula, Pál Varga External Token-Based Authorization of Data-Driven Integrations and Service Compositions in MQTT 5. Search on Bibsonomy IECON The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Anitha Gollamudi, Stephen Chong Expressive Authorization Policies using Computation Principals. Search on Bibsonomy SACMAT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Marshal Moncivais, Mustafa Al-Lail Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices. Search on Bibsonomy SACMAT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. Search on Bibsonomy SACMAT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Hannes Salin AccA: A Decentralized and Accumulator-Based Authentication and Authorization Architecture for Autonomous IoT in Connected Infrastructures. Search on Bibsonomy IoTBDS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. Search on Bibsonomy INFOCOM The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Pawel Mielnik, Anja Myhre Hjelle, Bjarte Pollen, Krzysztof Tokarz, Marcin Fojcik Identification and authorization with single accelerometer data - implications from "Wearables in Arthritis" project. Search on Bibsonomy KES The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Irfan Simsek Zero-Knowledge and Identity-Based Authentication, Authorization, Access Control, and Key Exchange for Publish/Subscribe in Internet of Things. Search on Bibsonomy CIoT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Jiho Lim, Hansu Oh, Kichun Sim, Sunyoung Kim, Ki-Hyung Kim A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC). Search on Bibsonomy ICOIN The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Denys Shevchuk, Oleh Harasymchuk, Andrii Partyka, Nataliia Korshun Designing Secured Services for Authentication, Authorization, and Accounting of Users (short paper). Search on Bibsonomy CPITS II The full citation details ... 2023 DBLP  BibTeX  RDF
13Florian Helmschmidt, Pedram Hosseyni, Ralf Küsters, Klaas Pruiksma, Clara Waldmann, Tim Würtele The Grant Negotiation and Authorization Protocol: Attacking, Fixing, and Verifying an Emerging Standard. Search on Bibsonomy ESORICS (3) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Olfa Dallel, Souheil Ben Ayed, Jamel Bel Hadj Tahar Smart Blockchain-based Authorization for Social Internet of Things. Search on Bibsonomy CW The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Muhammad Sharjeel Zareen, Shahzaib Tahir, Baber Aslam Authentication and Authorization of IoT Edge Devices Using Artificial Intelligence. Search on Bibsonomy IFIPIoT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Xirong Zhuang, Lan Zhang 0002, Chen Tang, Huiqi Liu, Bin Wang, Yan Zheng, Bo Ren 0002 DeepContract: Controllable Authorization of Deep Learning Models. Search on Bibsonomy ACSAC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Tom De Nies, Aad Versteden, Erika Pauwels, Johan Delaure Combining Public and Private Linked Data through Graph-based Authorization Profiles in the semantic.works Framework. Search on Bibsonomy QuWeDa/MEPDaW@ISWC The full citation details ... 2023 DBLP  BibTeX  RDF
13Li Ma 0011, Qidi Lao, Wenyin Yang, Zexian Yang, Dong Yuan, Zhaoxiong Bu Research on Authorization Model of Attribute Access Control Based on Knowledge Graph. Search on Bibsonomy UbiSec The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
13Syed Zain R. Rizvi The SUDO Framework: For Data Organization And Efficient Query Authorization For NoSQL Databases. Search on Bibsonomy 2023   RDF
13Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng A systematic literature review for authorization and access control: definitions, strategies and models. Search on Bibsonomy Int. J. Web Inf. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xiaodong Yang 0006, Jiaqi Wang, Wanting Xi, Tian Tian, Caifen Wang A blockchain-based keyword search scheme with dual authorization for electronic health record sharing. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Shangping Wang, Huan Li, Juanjuan Chen, Jifang Wang, Yingjuan Deng DAG blockchain-based lightweight authentication and authorization scheme for IoT devices. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Li Zhao, Meng Sun, Binbin Yang, Junpeng Xie, Jiqiang Feng Zero trust access authorization and control of network boundary based on cloud sea big data fuzzy clustering. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kindson Munonye, Péter Martinek Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar Valued Authorization Policy Existence Problem: Theory and Experiments. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Marius Iulian Mihailescu, Stefania Loredana Nita A Searchable Encryption Scheme with Biometric Authentication and Authorization for Cloud Environments. Search on Bibsonomy Cryptogr. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13K. Rajesh Rao, Aditya Kolpe, Tribikram Pradhan, Bruno Bogaz Zarpelão An Efficient Solution to User Authorization Query Problem in RBAC Systems Using Hierarchical Clustering. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Abdulghafour Mohammad Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Feng Tian 0004, Zhenqiang Wu, Xiaolin Gui, Jianbing Ni, Xuemin Sherman Shen Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sarah Pearman, Ellie Young, Lorrie Faith Cranor User-friendly yet rarely read: A case study on the redesign of an online HIPAA authorization. Search on Bibsonomy Proc. Priv. Enhancing Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13B. N. Jagdale 0001, Jagdish W. Bakal A novel authentication and authorization scheme in P2P networking using location-based privacy. Search on Bibsonomy Evol. Intell. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Tao Wang 0039, Jingyi Wang, Qiliang Yang, Bo Yang 0003, Haiyu Li, Fei Xu, Zirui Qiao An Efficient Verifiable Searchable Encryption Scheme With Aggregating Authorization for Blockchain-Enabled IoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Cheng Huang 0001, Liang Xue, Dongxiao Liu, Xuemin Shen, Weihua Zhuang, Rob Sun, Bidi Ying Blockchain-Assisted Transparent Cross-Domain Authorization and Authentication for Smart City. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Md. Mahmud Hossain, Golam Kayas, Yasser Karim, Ragib Hasan, Jamie Payton, S. M. Riazul Islam CATComp: A Compression-Aware Authorization Protocol for Resource-Efficient Communications in IoT Networks. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13E. Chen 0001, Yan Zhu 0010, Zhiyuan Zhou, Shou-Yu Lee, W. Eric Wong, William Cheng-Chung Chu Policychain: A Decentralized Authorization Service With Script-Driven Policy on Blockchain for Internet of Things. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Tanveer Ahmad, Rajiv Pandey, Mohammad Faisal Authorization Model for Securing Cloud SaaS Services (Netflix). Search on Bibsonomy Int. J. Distributed Syst. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jianwei Li, Xiaoming Wang 0004, Qingqing Gan, Fengling Wang MFPSE: Multi-user Forward Private Searchable Encryption with dynamic authorization in cloud computing. Search on Bibsonomy Comput. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Partha Sarathi Roy 0001, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hao Lin, Fei Gao 0001, Hua Zhang 0001, Zhengping Jin, Wenmin Li 0001, Qiaoyan Wen Public Key Encryption With Equality Test Supporting Flexible Designated Authorization in Cloud Storage. Search on Bibsonomy IEEE Syst. J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ammar Mohammad, Hasan Al-Refai, Ali Ahmad Alawneh 0001 Correction: Mohammad et al. User Authentication and Authorization Framework in IoT Protocols. Computers 2022, 11, 147. Search on Bibsonomy Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hasan Al-Refai, Ali Ahmad Alawneh 0001 User Authentication and Authorization Framework in IoT Protocols. Search on Bibsonomy Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Robbi Rahim, Manikandan Ramachandran, Prassanna Jayachandran, Hariharan Kalyanaraman, Vidhyacharan Bhaskar, Ambeshwar Kumar Holistic Feistel Authenticated Learning-Based Authorization for Protecting the Internet of Things from Cyber Attacks. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu NN-Lock: A Lightweight Authorization to Prevent IP Threats of Deep Learning Models. Search on Bibsonomy ACM J. Emerg. Technol. Comput. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Syed Noman Ali Sherazi, Ehtesham Zahoor, Sabina Akhtar, Olivier Perrin 0001 A blockchain based approach for the authorization policies delegation in emergency situations. Search on Bibsonomy Trans. Emerg. Telecommun. Technol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13 OpenAPI Specification Extended Security Scheme: A method to reduce the prevalence of Broken Object Level Authorization. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Bálint Z. Téglásy, Sokratis K. Katsikas A Location-Based Global Authorization Method for Underwater Security. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis Authentication, Authorization, and Selective Disclosure for IoT data sharing using Verifiable Credentials and Zero-Knowledge Proofs. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Tolga O. Atalay, Sudip Maitra, Dragoslav Stojadinovic, Angelos Stavrou, Haining Wang Securing 5G OpenRAN with a Scalable Authorization Framework for xApps. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Parth Dipakkumar Patel, Prem Trivedi A systematic literature review on Virtual Reality and Augmented Reality in terms of privacy, authorization and data-leaks. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Jaimandeep Singh, Chintan Patel, Naveen Kumar Chaudhary Design Considerations and Architecture for a Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Francesca Palombini, Ludwig Seitz, Göran Selander, Martin Gunnarsson The Object Security for Constrained RESTful Environments (OSCORE) Profile of the Authentication and Authorization for Constrained Environments (ACE) Framework. Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Karsten Meyer zu Selhausen, Daniel Fett OAuth 2.0 Authorization Server Issuer Identification. Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ludwig Seitz Additional OAuth Parameters for Authentication and Authorization for Constrained Environments (ACE). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Ludwig Seitz, Göran Selander, Erik Wahlstroem, Samuel Erdtman, Hannes Tschofenig Authentication and Authorization for Constrained Environments Using the OAuth 2.0 Framework (ACE-OAuth). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Stefanie Gerdes, Olaf Bergmann, Carsten Bormann, Göran Selander, Ludwig Seitz Datagram Transport Layer Security (DTLS) Profile for Authentication and Authorization for Constrained Environments (ACE). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Kaisei Kajita, Keita Emura, Kazuto Ogawa, Ryo Nojima, Go Ohtake Continuous Group Key Agreement with Flexible Authorization and Its Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
13Ehtesham Zahoor, Asim Ikram, Sabina Akhtar, Olivier Perrin 0001 A Formal Approach for the Identification of Authorization Policy Conflicts within Multi-Cloud Environments. Search on Bibsonomy J. Grid Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Michal Trnka, Amr S. Abdelfattah, Aishwarya Shrestha, Michael Coffey, Tomás Cerný Systematic Review of Authentication and Authorization Advancements for the Internet of Things. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13George Suciu, Aristeidis Farao, Giorgio Bernardinetti, Ivan Palamà, Mari-Anais Sachian, Alexandru Vulpe, Marius-Constantin Vochin, Pavel Muresan, Michail Bampatsikos, Antonio Muñoz 0001, Christos Xenakis SAMGRID: Security Authorization and Monitoring Module Based on SealedGRID Platform. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Tiago Martins, Sergio Vidal Garcia Oliveira Enhanced Modbus/TCP Security Protocol: Authentication and Authorization Functions Supported. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Zhitang Li, Cuihua Zhang, Xiaoxu Wang, Ruxia Lyu The optimal integration strategy and authorization mechanism of AI chip with the architecture design capacity. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Gunasekaran Manogaran, Bharat S. Rawal, Vijayalakshmi Saravanan, Priyan Malarvizhi Kumar, Qin Xin 0001, P. Mohamed Shakeel Token-Based Authorization and Authentication for Secure Internet of Vehicles Communication. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Hua Deng, Jixin Zhang, Zheng Qin 0001, Qianhong Wu, Hui Yin, Aniello Castiglione Policy-Based Broadcast Access Authorization for Flexible Data Sharing in Clouds. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Qing Wu 0005, Taotao Lai, Leyou Zhang, Yi Mu 0001, Fatemeh Rezaeibagha Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati An authorization model for query execution in the cloud. Search on Bibsonomy VLDB J. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Pieter-Jan Vrielynck, Emad Heydari Beni, Kristof Jannes, Bert Lagaisse, Wouter Joosen DeFIRED: decentralized authorization with receiver-revocable and refutable delegations. Search on Bibsonomy EuroSec@EUROSYS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Giovanni Grieco, Domenico Striccoli, Giuseppe Piro, Raffaele Bolla, Gennaro Boggia, Luigi Alfredo Grieco Authentication and Authorization in Cyber-Security Frameworks: a Novel Approach for Securing Digital Service Chains. Search on Bibsonomy NetSoft The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 2781 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license