|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
46 | Guillermo Navarro 0001, Joan Borrell |
An XML Standards Based Authorization Framework for Mobile Agents. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Mobile Agents, Authorization, XACML, SAML |
46 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Consistency analysis of authorization hook placement in the Linux security modules framework. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, access control models |
46 | Yuanbo Guo, Jianfeng Ma 0001 |
An intrusion-tolerant authorization and authentication scheme in distributed environments. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
authorization and authentication, intrusion-tolerant, verifiable secret sharing |
46 | Arnon Rosenthal, Edward Sciore |
Abstracting and Refining Authorization in SQL. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
SQL Authorization, Privilege Inference, Views |
46 | Christian Skalka, Xiaoyang Sean Wang |
Trust but verify: authorization for web services. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
access control logic, web services, distributed authorization |
46 | Byung Joon Kim, Sung Je Hong, Jong Kim 0001 |
Ticket-based fine-grained authorization service in the dynamic VO environment. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
fine-grained authorization, grid, VO, virtual organization, XML security |
46 | Vijayalakshmi Atluri, Avigdor Gal |
An authorization model for temporal and derived data: securing information portals. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
authorization administration, Access control, temporal data, derived data |
46 | Gail-Joon Ahn, Ravi S. Sandhu |
Role-based authorization constraints specification. |
ACM Trans. Inf. Syst. Secur. |
2000 |
DBLP DOI BibTeX RDF |
role-based access control, access control models, authorization constraints, constraints specification |
46 | Günter Karjoth |
Authorization in CORBA Security. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
object access control, CORBA, authorization, distributed object systems |
45 | Seung-Hyun Kim, Kyong Hoon Kim, Jong Kim 0001, Sung Je Hong, Sangwan Kim |
Workflow-Based Authorization Service in the Grid. |
J. Grid Comput. |
2004 |
DBLP DOI BibTeX RDF |
fine-grained authorization service, restricted delegation, workflow-based authorization, Grid security |
41 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative Secondary Authorization Recycling. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson |
Package-Role Based Authorization Control Model for Wireless Network Services. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
41 | Julio Cesar Royer, Roberto Willrich, Michel Diaz |
User Profile-Based Authorization Policies for Network QoS Services. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
QoS, Policies, User Profile |
41 | Haiyang Sun, Xin Wang, Jian Yang 0001, Yanchun Zhang |
Authorization Policy Based Business Collaboration Reliability Verification. |
ICSOC |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Zeinab Iranmanesh, Morteza Amini, Rasool Jalili |
A Logic for Multi-domain Authorization Considering Administrators. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Hany F. El Yamany, Miriam A. M. Capretz |
An authorization model for Web Services within SOA. |
ICDIM |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Mohsen Rouached, Claude Godart |
Reasoning about Events to Specify Authorization Policies forWeb Services Composition. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Christian Wolter, Andreas Schaad |
Modeling of Task-Based Authorization Constraints in BPMN. |
BPM |
2007 |
DBLP DOI BibTeX RDF |
Security in business processes, Business process modeling and analysis |
41 | Bo Lang, Ian T. Foster, Frank Siebenlist, Rachana Ananthakrishnan, Timothy Freeman 0001 |
A Multipolicy Authorization Framework for Grid Security. |
NCA |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Elisa Bertino, Jason Crampton, Federica Paci |
Access Control and Authorization Constraints for WS-BPEL. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Graphical Representation of Authorization Policies for Weighted Credentials. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Hyang-Chang Choi, Seungyong Lee 0001, HyungHyo Lee |
Design and Implementation of a Policy-Based Privacy Authorization System. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Hua Wang 0002, Jinli Cao, David Ross |
Role-Based Delegation with Negative Authorization. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Yaron Kanza, Alberto O. Mendelzon, Renée J. Miller, Zheng Zhang 0002 |
Authorization-Transparent Access Control for XML Under the Non-Truman Model. |
EDBT |
2006 |
DBLP DOI BibTeX RDF |
|
41 | Robert Steele, Will Tao |
An Architecture for Unifying Web Services Authentication and Authorization. |
ICSOC |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Vijay Varadharajan |
Authorization and Trust Enhanced Security for Distributed Applications. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Rafael Marín López, Óscar Cánovas Reverte |
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Kazuhiro Minami, David Kotz |
Secure Context-Sensitive Authorization. |
PerCom |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Torsten Braun, Hahnsang Kim |
Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
41 | Vijayalakshmi Atluri, Soon Ae Chun |
An Authorization Model for Geospatial Data. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
security, access control, Geospatial databases |
41 | Yunliang Jiang, Bei Shui Liao, Yong Liu 0007, Jun Hu |
An Agent-Enabled Content-Explicit Authorization Model for OGSA-Compliant Grid. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Gang Yin, Meng Teng, Huaimin Wang, Yan Jia 0001, Dian-xi Shi |
An Authorization Framework Based on Constrained Delegation. |
ISPA |
2004 |
DBLP DOI BibTeX RDF |
|
41 | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum |
Delegation logic: A logic-based approach to distributed authorization. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
Delegation Logic, Access control, logic programs, trust management, distributed system security |
41 | William H. Winsborough |
A Logic Programming View of Authorization in Distributed Systems. |
ICLP |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim |
Dynamic Authorization and Intrusion Response in Distributed Systems. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Elena Ferrari, Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Ugo Capuozzo |
An authorization system for digital libraries. |
VLDB J. |
2002 |
DBLP DOI BibTeX RDF |
Access control, Digital libraries, Credentials |
41 | Günter Karjoth |
The Authorization Service of Tivoli Policy Director. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
41 | Mary Ellen Zurko, Richard T. Simon, Tom Sanfilippo |
A User-Centered, Modular Authorization Service Built on an RBAC Foundation. |
S&P |
1999 |
DBLP DOI BibTeX RDF |
|
41 | Eduardo B. Fernández, Rita C. Summers, Charles D. Coleman |
An Authorization Model for a Shared Data Base. |
SIGMOD Conference |
1975 |
DBLP DOI BibTeX RDF |
|
40 | Le Yang 0003, Yongsun Choi |
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
Workflow Authorization Model, Role-based Access Control, Workflow System |
40 | Chun Ruan, Vijay Varadharajan |
Data Protection in Distributed Database Systems. |
ISMIS |
2005 |
DBLP DOI BibTeX RDF |
distributed database, authorization |
40 | Günter Karjoth |
Access control with IBM Tivoli access manager. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
WWW security, Access control, Web servers, authorization management |
40 | C. Joncheng Kuo, Polar Humenn |
Dynamically authorized role-based access control for secure distributed computation. |
XML Security |
2002 |
DBLP DOI BibTeX RDF |
XML-based security assertions, authorization domain, CORBA, Role-based access control, attribute certificates |
40 | Emil Lupu, Morris Sloman |
Conflicts in Policy-Based Distributed Systems Management. |
IEEE Trans. Software Eng. |
1999 |
DBLP DOI BibTeX RDF |
Obligation policy, meta-policy, management roles, conflict resolution, authorization policy, policy conflict |
40 | John G. Brainard |
SecurSight: An Architecture for Secure Information Access. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
authentication, architecture, authorization, PKI |
40 | Radha Jagadeesan |
From Authorization Logics to Types for Authorization. |
APLAS |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Ladislav Huraj, Vladimír Siládi |
Authorization through trust chains in ad hoc grids. |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
certificate chain, authorization, delegation, ad hoc grid |
39 | Ali Nasrat Haidar, Ali E. Abdallah |
Weaving Authentication and Authorization Requirements into the Functional Model of a System Using Z Promotion. |
ISoLA |
2008 |
DBLP DOI BibTeX RDF |
Weaving Security into Functional Models, Z Promotion, Authentication, Authorization, Security Requirements, Z specification |
39 | Yuri Gurevich, Itay Neeman |
DKAL: Distributed-Knowledge Authorization Language. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Datalog with constraints, existential fixed-point logic, infon, security, access control, authorization, Datalog, information leakage, distributed knowledge |
39 | Yue Zhang 0002, James B. D. Joshi |
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
hybrid hierarchy, authorization, RBAC, administration, role mapping |
39 | Miranda Mowbray, Antonio Lain |
Dominator-tree analysis for distributed authorization. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
access control, dominator tree, distributed authorization |
39 | Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, Robert Tappan Morris, M. Frans Kaashoek |
Alpaca: extensible authorization for distributed services. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
security, cryptography, authorization, theorem-proving, logic |
39 | Hyungkyu Lee, Jongwook Han, Kyoil Chung |
Security Architecture for Authentication and Authorization in the Intelligent and Ubiquitous Home Network. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public Key mechanism, Symmetric Key Mechanism, Multi-home roaming, Authentication, Authorization, Certificate, Home network |
39 | Yun Bai 0001, Yan Zhang 0003, Vijay Varadharajan |
On the sequence of authorization policy transformations. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Policy transformations, Formal language, Default logic, Authorization policy |
39 | Chun Ruan, Vijay Varadharajan |
An Authorization Model for E-consent Requirement in a Health Care Application. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
e-consent, access control, Authorization, security management |
39 | Patrick D. McDaniel |
On context in authorization policy. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
policy-oriented programming, distributed systems, context, authorization, policy, security requirements |
39 | Kan Zhang, Tim Kindberg |
An authorization infrastructure for nomadic computing. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, ubiquitous computing, access control, authorization, nomadic computing |
39 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri |
The Specification and Enforcement of Authorization Constraints in Workflow Management Systems. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
role and user planning, access control, authorization constraints |
39 | Ronald Fagin |
On an Authorization Mechanism. |
ACM Trans. Database Syst. |
1978 |
DBLP DOI BibTeX RDF |
security, privacy, access control, database, authorization, protection, revocation, proof of correctness |
35 | Chun Ruan, Vijay Varadharajan |
Reasoning on Weighted Delegatable Authorizations. |
DEXA |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mathias Kohler, Christian Liesegang, Andreas Schaad |
Classification Model for Access Control Constraints. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Deqing Zou, Jong Hyuk Park, Tai-Hoon Kim, Xueguang Chen |
Integrating Attribute and Status Constraint into the RBAC Model for Access Control in Ubiquitous Systems. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Somesh Jha, Stefan Schwoon, Hao Wang, Thomas W. Reps |
Weighted Pushdown Systems and Trust-Management Systems. |
TACAS |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Gabriel López Millán, Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Sassa Otenko, David W. Chadwick |
A Heterogeneous Network Access Service Based on PERMIS and SAML. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen |
Distributed Access Control for Grid Environments Using Trust Management Approach. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Grid, Trust Management, VO |
35 | Martin Wimmer 0001, Daniela Eberhardt, Pia Ehrnlechner, Alfons Kemper |
Reliable and Adaptable Security Engineering for Database-Web Services. |
ICWE |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens |
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
The Traust Authorization Service. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
credentials, trust negotiation, Attribute-based access control |
34 | Arnar Birgisson, Mohan Dhawan, Úlfar Erlingsson, Vinod Ganapathy, Liviu Iftode |
Enforcing authorization policies using transactional memory introspection. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
transactional memory, reference monitors |
34 | Jaehoon Kim, Kangsoo Jung, Seog Park |
An RDF triple based access authorization specification considering subsumption relationships. |
ICDE Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely |
Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract). |
ESOP |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon 0001 |
Code-Carrying Authorization. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Ragib Hasan, Marianne Winslett, Richard M. Conlan, Brian Slesinsky, Nandakumar Ramani |
Please Permit Me: Stateless Delegated Authorization in Mashups. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Chuanjiang Yi, Hai Jin 0001, Sheng Di |
A Composite-Service Authorization Prediction Platform for Grid Environment. |
CDVE |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Rafae Bhatti, Daniel Sanz, Elisa Bertino, Arif Ghafoor |
A Policy-Based Authorization Framework for Web Services: Integrating XGTRBAC and WS-Policy. |
ICWS |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Lilong Han, Qingtang Liu, Zongkai Yang |
Authorization Constraints Specification of RBAC. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
RCL2000, DSOD, Constraints, RBAC, SOD |
34 | Marianne Winslett |
Policy-Driven Distributed Authorization: Status and Prospects. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Ming Guo, Yong Zhu, Yuheng Hu, Weishuai Yang |
SOGA: Fine-Grained Authorization for Self-Organizing Grid. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Mohsen Rouached, Claude Godart |
Securing Web Service Compositions: Formalizing Authorization Policies Using Event Calculus. |
ICSOC |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Vinod Ganapathy, Trent Jaeger, Somesh Jha |
Retrofitting Legacy Code for Authorization Policy Enforcement. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Candido Rodriguez, Ajay Daryanani, Diego R. López, Jose M. Macias |
AA-RR: working with authentication and authorization infrastructures. |
PST |
2006 |
DBLP DOI BibTeX RDF |
privacy, software testing, identification, computer network security |
34 | Jesus Luna, Manel Medina, Oscar Manso |
Towards a Unified Authentication and Authorization Infrastructure for Grid Services: Implementing an Enhanced OCSP Service Provider into GT4. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Weizhong Qiang, Hai Jin 0001, Xuanhua Shi, Deqing Zou |
Joint Management of Authorization for Dynamic Virtual Organization. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Ana Elisa P. Goulart, Randal T. Abler |
On the Interaction of SIP and Admission Control: An Inter-domain Call Authorization Model for Internet Multimedia Applications. |
IPOM |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Tseno Tsenov, Hannes Tschofenig |
Quality of Service Authentication, Authorization and Accounting. |
IWQoS |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Patroklos G. Argyroudis, Donal O'Mahony |
Towards Flexible Authorization Management. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Zheng Zhang 0002, Alberto O. Mendelzon |
Authorization Views and Conditional Query Containment. |
ICDT |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Sanna Liimatainen |
Usability of Decentralized Authorization Systems - A Comparative Study. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Justin Burruss |
The resource oriented authorization manager (ROAM). |
HPDC |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Derek Feichtinger, Andreas J. Peters |
Authorization of data access in distributed storage systems. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Naren Kodali, Csilla Farkas, Duminda Wijesekera |
An authorization model for multimedia digital libraries. |
Int. J. Digit. Libr. |
2004 |
DBLP DOI BibTeX RDF |
Access control, Digital library, Semantics, Metadata, Continuous media |
34 | Kaijun Tan, Jason Crampton, Carl A. Gunter |
The Consistency of Task-Based Authorization Constraints in Workflow Systems. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Changqin Huang, Zhiting Zhu, Xianqing Wang, Deren Chen |
Grid Authorization Management Oriented to Large-Scale Collaborative Computing. |
CSCWD (Selected papers) |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Hai Yu, Ee-Peng Lim |
LTAM: A Location-Temporal Authorization Model. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Chun Ruan, Vijay Varadharajan |
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Stefan Schwoon, Somesh Jha, Thomas W. Reps, Stuart G. Stubblebine |
On Generalized Authorization Problems. |
CSFW |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Dong-Gue Park, You-Ri Lee |
The RBAC Based Privilege Management for Authorization of Wireless Networks. |
WAIM |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Sampo Sovio, N. Asokan, Kaisa Nyberg |
Defining Authorization Domains Using Virtual Devices. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|