Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Mikael Linden, Michal Procházka, Ilkka Lappalainen, Dominik Bucik, Pavel Vyskocil, Martin Kuba, Sami Silén, Peter Belmann, Alexander Sczyrba, Steven J. Newhouse, Ludek Matyska, Tommi H. Nyrönen |
Common ELIXIR Service for Researcher Authentication and Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
F1000Research ![In: F1000Research 7, pp. 1199, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Mart Wetzels, Idowu Ayoola, Sander Bogers, Peter Peters 0002, Wei Chen 0015, Loe M. G. Feijs |
Consume: A privacy-preserving authorisation and authentication service for connecting with health and wellbeing APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pervasive Mob. Comput. ![In: Pervasive Mob. Comput. 43, pp. 20-26, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Subhashis Banerjee |
Authorisation and access control architecture as a framework for data and privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1801.05313, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
21 | Ramandeep Kaur, Patricia Morreale |
User-centred design and assessment of a prescription prior authorisation processing system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Electron. Heal. ![In: Int. J. Electron. Heal. 10(3), pp. 131-159, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Christopher Michael Bailey, Rogério de Lemos |
Evaluating Self-Adaptive Authorisation Infrastructures Through Gamification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2018, Luxembourg City, Luxembourg, June 25-28, 2018, pp. 502-513, 2018, IEEE Computer Society, 978-1-5386-5596-2. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Nesrine Kaaniche, Sana Belguith, Giovanni Russello |
EMA-LAB: Efficient Multi Authorisation Level Attribute Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSS ![In: Network and System Security - 12th International Conference, NSS 2018, Hong Kong, China, August 27-29, 2018, Proceedings, pp. 187-201, 2018, Springer, 978-3-030-02743-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Dominik Ziegler 0001, Bernd Prünster, Alexander Marsalek, Christian Kollmann |
Spoof-of-Work - Evaluating Device Authorisation in Mobile Mining Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE (2) ![In: Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, Portugal, July 26-28, 2018., pp. 546-553, 2018, SciTePress, 978-989-758-319-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Robert Carroll, Sreeram V. Ramagopalan, Javier Cid-Ruzafa, Dimitra Lambrelli, Laura McDonald |
An analysis of characteristics of post-authorisation studies registered on the ENCePP EU PAS Register. ![Search on Bibsonomy](Pics/bibsonomy.png) |
F1000Research ![In: F1000Research 6, pp. 1447-, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Zongmin Cui, Hong Zhu 0003, Jie Shi, Lianhua Chi, Ke Yan |
Efficient authorisation update on cloud data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Grid Serv. ![In: Int. J. Web Grid Serv. 12(2), pp. 109-141, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | A. Biancini, L. Florio, M. Haase, Markus Hardt, M. Jankowski, Jens Jensen, C. Kanellopoulos, N. Liampotis, Slavek Licehammer, S. Memon, N. van Dijk, Stefan Paetow, Michal Prochazka, Mischa Sallé, P. Solagna, Uros Stevanovic, D. Vaghetti |
AARC: First draft of the Blueprint Architecture for Authentication and Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1611.07832, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
21 | Chitra Javali, Girish Revadigar, Daniel Pletea, Sanjay Jha 0001 |
Demo abstract: Location fingerprint evidence and authorisation using WiFi channel characteristics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2016 IEEE International Conference on Pervasive Computing and Communication Workshops, PerCom Workshops 2016, Sydney, Australia, March 14-18, 2016, pp. 1-3, 2016, IEEE Computer Society, 978-1-5090-1941-0. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
21 | Yves Ledru, Akram Idani, Jérémy Milhau, Nafees Qamar, Régine Laleau, Jean-Luc Richier, Mohamed-Amine Labiadh |
Validation of IS Security Policies Featuring Authorisation Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Syst. Model. Des. ![In: Int. J. Inf. Syst. Model. Des. 6(1), pp. 24-46, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Yki Kortesniemi, Timo Kiravuo, Mikko Särelä, Hannu H. Kari |
Chain reduction of authorisation certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 10(2), pp. 107-123, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Montrieux, Zhenjiang Hu |
Towards Attribute-Based Authorisation for Bidirectional Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015, pp. 185-196, 2015, ACM, 978-1-4503-3556-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim |
BP-XACML an Authorisation Policy Language for Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 307-325, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
ECA rules for controlling authorisation plan to satisfy dynamic constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: 13th Annual Conference on Privacy, Security and Trust, PST 2015, Izmir, Turkey, July 21-23, 2015, pp. 133-138, 2015, IEEE Computer Society, 978-1-4673-7828-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
21 | Christopher Michael Bailey |
Self-adaptive authorisation infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
RDF |
|
21 | Simeon Veloudis, Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos |
A formal framework to support dynamic authorisation in collaborative environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Sci. Eng. ![In: Int. J. Comput. Sci. Eng. 9(4), pp. 278-291, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Utharn Buranasaksee, Kriengkrai Porkaew, Umaporn Supasitthimethee |
Ticket model: a generalised model for internet-based three-party authorisation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 8(4), pp. 159-168, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Aarthi Nagarajan, Vijay Varadharajan, Nathan Tarr |
Trust enhanced distributed authorisation for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Syst. Sci. ![In: J. Comput. Syst. Sci. 80(5), pp. 916-934, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Shamal Faily, John Lyle, Ivan Flechais, Andrea S. Atzeni, Cesare Cameroni, Hans I. Myrhaug, Ayse Göker, Robert Kleinfeld |
Authorisation in Context: Incorporating Context-Sensitivity into an Access Control Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCS HCI ![In: BCS-HCI 2014 Proceedings of the 28th International BCS Human Computer Interaction Conference, Southport, UK, 9-12 September 2014, 2014, British Computer Society. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
21 | Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog |
Integration of Data-Minimising Authentication into Authorisation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trust and Trustworthy Computing - 7th International Conference, TRUST 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings, pp. 179-187, 2014, Springer, 978-3-319-08592-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Noël Colin, Minh Tien Hoang |
Authentication and Authorisation for Widget-based Applications in a Loosely-coupled Web eLearning Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEBIST (1) ![In: WEBIST 2014 - Proceedings of the 10th International Conference on Web Information Systems and Technologies, Volume 1, Barcelona, Spain, 3-5 April, 2014, pp. 17-26, 2014, SciTePress, 978-989-758-023-9. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Griesmayer, Charles Morisset |
Automated Certification of Authorisation Policy Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1306.4624, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
21 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 440-443, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Meriam Jemel, Nadia Ben Azzouna, Khaled Ghédira |
A novel approach for dynamic authorisation planning in constrained workflow systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: The 6th International Conference on Security of Information and Networks, SIN '13, Aksaray, Turkey, November 26-28, 2013, pp. 388-391, 2013, ACM, 978-1-4503-2498-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Aarthi Krishna, Vijay Varadharajan, Nathan Tarr |
On the Design of a Trust Enhanced Distributed Authorisation Architecture for Service Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom/ISPA/IUCC ![In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on Ubiquitous Computing and Communications, IUCC-2013, Melbourne, Australia, July 16-18, 2013, pp. 517-524, 2013, IEEE Computer Society, 978-0-7695-5022-0. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Andreas Griesmayer, Charles Morisset |
Automated Certification of Authorisation Policy Resistance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings, pp. 574-591, 2013, Springer, 978-3-642-40202-9. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Kaniz Fatema |
Adding privacy protection to policy based authorisation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
21 | Jasone Astorga, Eduardo Jacob, Maider Huarte, Marivi Higuero |
Ladon1: end-to-end authorisation support for resource-deprived environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 6(2), pp. 93-101, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Qiang Tang 0001 |
Public key encryption schemes supporting equality test with authorisation of different granularity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Appl. Cryptogr. ![In: Int. J. Appl. Cryptogr. 2(4), pp. 304-321, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Nils Ulltveit-Moe, Vladimir A. Oleshchuk |
Decision-cache based XACML authorisation and anonymisation for XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Stand. Interfaces ![In: Comput. Stand. Interfaces 34(6), pp. 527-534, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | David W. Chadwick, Kaniz Fatema |
A privacy preserving authorisation system for the cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Syst. Sci. ![In: J. Comput. Syst. Sci. 78(5), pp. 1359-1373, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Christian Neuhaus, Martin von Löwis, Andreas Polze |
A Dependable and Secure Authorisation Service in the Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLOSER ![In: CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18 - 21 April, 2012, pp. 568-573, 2012, SciTePress, 978-989-8565-05-1. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
21 | Markus Anwander, Torsten Braun, Almerima Jamakovic, Thomas Staub |
Authentication and authorisation mechanisms in support of secure access to WMN resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, San Francisco, CA, USA, June 25-28, 2012, pp. 1-6, 2012, IEEE Computer Society, 978-1-4673-1238-7. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
21 | Derrick Newton |
Business Process Access Control (BPAC) : workflow-based authorisation for complex systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
21 | Massimiliano Masi |
On authentication and authorisation issues in e-health systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
21 | Alireza Pirayesh Sabzevar, João Pedro Sousa |
Authentication, authorisation and auditing for ubiquitous computing: a survey and vision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Space Based Situated Comput. ![In: Int. J. Space Based Situated Comput. 1(1), pp. 59-67, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Ire Ogunsina, Sarah N. Lim Choi Keung, Lei Zhao, Gavin Langford, Edward Tyler, Theodoros N. Arvanitis |
Modelling a User Authorisation and Data Access Framework for Multi-specialty Research Systems in Secondary Health Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eHealth ![In: Electronic Healthcare - 4th International Conference, eHealth 2011, Málaga, Spain, November 21-23, 2011, Revised Selected Papers, pp. 105-108, 2011, Springer, 978-3-642-29261-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | John P. Watt, Richard O. Sinnott, George Inman, David W. Chadwick |
Federated Authentication and Authorisation in the Social Science Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011, pp. 541-548, 2011, IEEE Computer Society, 978-1-4577-0979-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Dominik Wojtczak |
Trust Metrics for the SPKI/SDSI Authorisation Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATVA ![In: Automated Technology for Verification and Analysis, 9th International Symposium, ATVA 2011, Taipei, Taiwan, October 11-14, 2011. Proceedings, pp. 168-182, 2011, Springer, 978-3-642-24371-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Sean Policarpio, Yun Bai 0001 |
An Implementation of $\mathcal{A}^{xml(T)}$ : An Answer Set Programming Based Formal Language of Authorisation for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WiMo/CoNeCo ![In: Recent Trends in Wireless and Mobile Networks - Third International Conferences, WiMo 2011 and CoNeCo 2011, Ankara, Turkey, June 26-28, 2011. Proceedings, pp. 378-387, 2011, Springer, 978-3-642-21936-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Aarthi Krishna, Vijay Varadharajan |
A Hybrid Trust Model for Authorisation Using Trusted Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, Changsha, China, 16-18 November, 2011, pp. 288-295, 2011, IEEE Computer Society, 978-1-4577-2135-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
21 | Morteza Amini, Rasool Jalili |
Multi-level authorisation model and framework for distributed semantic-aware environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 4(4), pp. 301-321, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | José M. Alcaraz Calero, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
Towards an authorisation model for distributed systems based on the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 4(4), pp. 411-421, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Christian Wolter, Christoph Meinel |
An approach to capture authorisation requirements in business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Requir. Eng. ![In: Requir. Eng. 15(4), pp. 359-373, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Yihong Zhou, Dapeng Wu 0001, Scott Nettles |
On the architecture of Authentication, Authorisation, and Accounting for real-time secondary market services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Wirel. Mob. Comput. ![In: Int. J. Wirel. Mob. Comput. 4(3), pp. 240-248, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Valentina Casola, Jesus Luna, Antonino Mazzeo, Manel Medina, Massimiliano Rak, Jetzabel M. Serna |
An interoperability system for authentication and authorisation in VANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Auton. Adapt. Commun. Syst. ![In: Int. J. Auton. Adapt. Commun. Syst. 3(2), pp. 115-135, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Jay Chin, Ning Zhang 0001, Aleksandra Nenadic, Omaima Bamasak |
A context-constrained authorisation (CoCoA) framework for pervasive grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 16(6), pp. 1541-1556, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Abdullah Mohammed Almuhaideb, Phu Dung Le, Bala Srinivasan 0002 |
Passport/Visa: Authentication and Authorisation Tokens for Ubiquitous Wireless Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: Mobile and Ubiquitous Systems: Computing, Networking, and Services - 7th International ICST Conference, MobiQuitous 2010, Sydney, Australia, December 6-9, 2010, Revised Selected Papers, pp. 224-236, 2010, Springer, 978-3-642-29153-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Farzad Salim, Jason Reid, Uwe Dulleck, Ed Dawson |
Towards a Game Theoretic Authorisation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GameSec ![In: Decision and Game Theory for Security - First International Conference, GameSec 2010, Berlin, Germany, November 22-23, 2010. Proceedings, pp. 208-219, 2010, Springer, 978-3-642-17196-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Khaled Gaaloul, Ehtesham Zahoor, François Charoy, Claude Godart |
Dynamic Authorisation Policies for Event-Based Task Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CAiSE ![In: Advanced Information Systems Engineering, 22nd International Conference, CAiSE 2010, Hammamet, Tunisia, June 7-9, 2010. Proceedings, pp. 135-149, 2010, Springer, 978-3-642-13093-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Clara Bertolissi, Maribel Fernández |
Category-Based Authorisation Models: Operational Semantics and Expressive Power. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESSoS ![In: Engineering Secure Software and Systems, Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings, pp. 140-156, 2010, Springer, 978-3-642-11746-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Gina Kounga, Marco Casassa Mont, Pete Bramhall |
Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings, pp. 153-164, 2010, Springer, 978-3-642-15151-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
21 | Tsung-Yi Chen, Yuh-Min Chen, Chin-Bin Wang, Hui-Chuan Chu |
Flexible authorisation in dynamic e-business environments using an organisation structure-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Integr. Manuf. ![In: Int. J. Comput. Integr. Manuf. 22(3), pp. 225-244, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Moritz Y. Becker |
Specification and Analysis of Dynamic Authorisation Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 22nd IEEE Computer Security Foundations Symposium, CSF 2009, Port Jefferson, New York, USA, July 8-10, 2009, pp. 203-217, 2009, IEEE Computer Society, 978-0-7695-3712-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, authorization, policy analysis |
21 | Yuri Demchenko, Cees de Laat, Thierry Denys, Christian Toinard |
Authorisation session management in on-demand resource provisioning in collaborative applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CTS ![In: 2009 International Symposium on Collaborative Technologies and Systems, CTS 2009, Baltimore, Maryland, USA, May 18-22, 2009, pp. 201-208, 2009, IEEE Computer Society, 978-1-4244-4584-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Roel Peeters, Markulf Kohlweiss, Bart Preneel |
Threshold Things That Think: Authorisation for Resharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iNetSeC ![In: iNetSec 2009 - Open Research Problems in Network Security - IFIP WG 11.4 International Workshop, Zurich, Switzerland, April 23-24, 2009, Revised Selected Papers, pp. 111-124, 2009, Springer, 978-3-642-05436-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yuri Demchenko, Mihai Cristea, Cees de Laat, Evangelos Haleplidis |
Authorisation Infrastructure for On-Demand Grid and Network Resource Provisioning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GridNets ![In: Networks for Grid Applications - Third International ICST Conference, GridNets 2009, Athens, Greece, September 8-9, 2009, Revised Selected Papers, pp. 9-18, 2009, Springer, 978-3-642-11732-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Yuri Demchenko, Mihai Cristea, Cees de Laat |
XACML Policy Profile for Multidomain Network Resource Provisioning and Supporting Authorisation Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2009, IEEE International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009, pp. 98-101, 2009, IEEE Computer Society, 978-0-7695-3742-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Liqun Chen 0002, Mark Ryan 0001 |
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers, pp. 201-216, 2009, Springer, 978-3-642-12458-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Hyunjoon Jung, Hyuck Han, Hyungsoo Jung 0001, Heon Young Yeom |
Dynamic and fine-grained authentication and authorisation for grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Crit. Infrastructures ![In: Int. J. Crit. Infrastructures 4(3), pp. 308-318, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Markus Lorch, Dennis G. Kafura, Ian Fisk, Kate Keahey, Timothy Freeman 0001, Abhishek Singh Rana, Frank Würthwein |
Authorisation and identity mapping services for the Open Science Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Netw. ![In: Int. J. High Perform. Comput. Netw. 5(3), pp. 144-155, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Miroslav Milinovic, Mijo Derek, Dubravko Penezic, Denis Stancer, Dubravko Voncina |
On evolution of an authentication and authorisation infrastructure in academic and research community: AAI@EduHr - From RADIUS hierarchy to an AAI federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITI ![In: Proceedings of the ITI 2008 30th International Conference on Information Technology Interfaces, Dubrovnik, Croatia, June 23-26, 2008, pp. 159-162, 2008, IEEE, 978-953-7138-12-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Anna Carreras, Jaime Delgado |
A New Type of Contextual Information Based on the Adaptation Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WIAMIS ![In: Ninth International Workshop on Image Analysis for Multimedia Interactive Services, WIAMIS 2008, Klagenfurt, Austria, May 7-9, 2008, pp. 147-150, 2008, IEEE Computer Society, 978-0-7695-3130-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Colin Higgs |
Authorisation and Delegation in the Machination Configuration System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: Proceedings of the 22nd Large Installation System Administration Conference, LISA 2008, November 9-14, 2008, San Diego, CA, USA, pp. 191-199, 2008, USENIX Association, 978-1-931971-63-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
21 | Gerlinde Knetsch |
REACh - Workflows and Software Tools for the Process of Registration, Evaluation, Authorisation and Restriction of European Chemicals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EnviroInfo ![In: Environmental Informatics and Industrial Ecology: Proceedings of the 22nd International Conference for Environmental Protection, EnviroInfo 2008, Lüneburg, Germany, September 10-12, 2008, pp. 495-500, 2008, Shaker Verlag, Aachen, 978-3-8322-7313-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
21 | Matthias Olden |
Biometric authentication and authorisation infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
21 | Christian Schläger |
Attribute based infrastructures for authentication and authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2008 |
RDF |
|
21 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Gabriel López 0001, Manuel Sánchez |
Deploying authorisation mechanisms for federated services in eduroam (DAMe). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Res. ![In: Internet Res. 17(5), pp. 479-494, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth |
Trust for Location-based Authorisation ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/0712.2231, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Erik Vullings, James Dalziel, Markus Buchhorn |
Secure Federated Authentication and Authorisation to GRID Portal Applications using SAML and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Res. Pract. Inf. Technol. ![In: J. Res. Pract. Inf. Technol. 39(2), pp. 101-114, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Christian Schläger, Thomas Nowey |
On the effects of authentication and authorisation infrastructures on e-commerce activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 22(5), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Vijayalakshmi Atluri, Soon Ae Chun |
A geotemporal role-based authorisation system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 1(1/2), pp. 143-168, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Sarath Indrakanti, Vijay Varadharajan, Ritesh Agarwal |
On the design, implementation and application of an authorisation architecture for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Comput. Secur. ![In: Int. J. Inf. Comput. Secur. 1(1/2), pp. 64-108, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Mihai-Lucian Cristea, Leon Gommans, Li Xu, Herbert Bos |
The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet, 6th International IFIP-TC6 Networking Conference, Atlanta, GA, USA, May 14-18, 2007, Proceedings, pp. 945-957, 2007, Springer, 978-3-540-72605-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Christian Schläger, Monika Ganslmayer |
Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 230-237, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jacob Andersen, Jakob E. Bardram |
BLIG: A New Approach for Sensor Identification, Grouping, and Authorisation in Body Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BSN ![In: 4th International Workshop on Wearable and Implantable Body Sensor Networks, BSN 2007, March 26-28, 2007, RWTH Aachen University, Germany, pp. 223-229, 2007, Springer, 978-3-540-70993-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Christian Schläger, Torsten Priebe, Manuel Liewald, Günther Pernul |
Enabling Attribute-based Access Control in Authentication and Authorisation Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bled eConference ![In: 20th Bled eConference: eMergence: Merging and Emerging Technologies, Processes, and Institutions, Bled, Slovenia, June 3-6, 2007, pp. 3, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
21 | Shamimabi Paurobally |
Negotiation for Authorisation in Virtual Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFIPTM ![In: Trust Management - Proceedings of IFIPTM 2007: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, July 30- August 2, 2007, Moncton, New Brunswick, Canada, pp. 107-122, 2007, Springer, 978-0-387-73654-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Jim J. Longstaff, Mike A. Lockyer, A. Howitt |
Functionality and implementation issues for complex authorisation models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEE Proc. Softw. ![In: IEE Proc. Softw. 153(1), pp. 7-15, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Margaret Jackson, Marita Shelly |
Black Hats and White Hats: Authorisation of Copyright Infringement in Australia and the United States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 14(1), pp. 28-46, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Emil Hudomalj, Avgust Jauk |
Authentication and authorisation infrastructure for the mobility of users of academic libraries: An overview of developments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Program ![In: Program 40(1), pp. 63-73, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Mohamed Shehab, Elisa Bertino, Arif Ghafoor |
Workflow authorisation in mediator-free environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Secur. Networks ![In: Int. J. Secur. Networks 1(1/2), pp. 2-12, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | David W. Chadwick |
Authorisation in Grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. Tech. Rep. ![In: Inf. Secur. Tech. Rep. 10(1), pp. 33-40, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Thomas B. Quillinan, Simon N. Foley |
Synchronisation in Trust Management Using Push Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STM ![In: Proceedings of the First International Workshop on Security and Trust Management, STM 2005, Milan, Italy, September 15, 2005, pp. 143-158, 2005, Elsevier. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Ludwig Seitz, Johan Montagnat, Jean-Marc Pierson, Didier Oriol, Diane Lingrand |
Authentication and Authorisation Prototype on the μgrid for Medical Data Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HealthGrid ![In: From Grid to Healthgrid - Proceedings of Healthgrid 2005, Oxford, UK, 7-9 April 2005, pp. 222-233, 2005, IOS Press, 978-1-58603-510-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
21 | Jim J. Longstaff, Mike A. Lockyer, Tony Howitt, Ian Elcoate, Paul Massey |
A general model of authorisation for complex computing applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICETE ![In: ICETE 2005 - Proceedings of the Second International Conference on e-Business and Telecommunication Networks, Reading, UK, October 3-7, 2005, pp. 74-79, 2005, INSTICC Press, 972-8865-32-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
21 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Nick Antonopoulos, James Heather, Roger M. A. Peel |
Programmable Agents for Generic Distributed Authorisation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Internet Computing ![In: Proceedings of The 2005 International Conference on Internet Computing, ICOMP 2005, Las Vegas, Nevada, USA, June 27-30, 2005, pp. 174-180, 2005, CSREA Press, 1-932415-69-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
21 | Richard E. Scott, Penny A. Jennett, Maryann Yeo |
Access and authorisation in a Glocal e-Health Policy context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 73(3), pp. 259-266, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Bernd Blobel |
Authorisation and access control for electronic health record systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Medical Informatics ![In: Int. J. Medical Informatics 73(3), pp. 251-257, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Sibabrata Ray, Danyang Zhang, Kevin A. Kwiat |
Energy-efficient distributed authorisation server (DAS) placement for sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. High Perform. Comput. Netw. ![In: Int. J. High Perform. Comput. Netw. 1(4), pp. 193-202, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Nick Antonopoulos, Tatjana Bitzakidis, Roger M. A. Peel |
ASAM: An Automated System for Authorisation Data Change Management in GRID Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security and Management ![In: Proceedings of the International Conference on Security and Management, SAM '04, June 21-24, 2004, Las Vegas, Nevada, USA, pp. 341-347, 2004, CSREA Press, 1-932415-37-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
21 | Vino Fernando Crescini, Yan Zhang, Weiyuan Wang |
Web server authorisation with the policyupdater access control system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2004, Madrid, Spain, 2 Volumes, pp. 945-948, 2004, IADIS, 972-99353-0-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
21 | Dorgham Sisalem, Jiri Kuthan |
Authentication and Authorisation for Integrated SIP Services in Heterogeneous Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004, pp. 88-98, 2004, INSTICC Press, 972-8865-07-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
21 | David W. Chadwick, Sassa Otenko, Von Welch |
Using SAML to Link the Globus Toolkit to the Permis Authorisation Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Sept. 15-18, 2004, Windermere, The Lake District, United Kingdom, pp. 251-261, 2004, Springer, 978-0-387-24485-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Ben Mankin |
The formalisation of authorisation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2004 |
RDF |
|
21 | Erik Rissanen |
Server based application level authorisation for Rotor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEE Proc. Softw. ![In: IEE Proc. Softw. 150(5), pp. 291-295, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADC ![In: Database Technologies 2003, Proceedings of the 14th Australasian Database Conference, ADC 2003, Adelaide, South Australia, February 2003, pp. 125-133, 2003, Australian Computer Society, 0-909-92595-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|