Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
24 | Vijay Atluri, Heechang Shin |
Geospatial Authorizations, Efficient Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of GIS ![In: Encyclopedia of GIS., pp. 730-738, 2017, Springer, 978-3-319-17884-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Chaoshun Zuo, Qingchuan Zhao, Zhiqiang Lin |
AUTHSCOPE: Towards Automatic Discovery of Vulnerable Authorizations in Online Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 799-813, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Otto Julio Ahlert Pinno, André Ricardo Abed Grégio, Luis Carlos Erpen De Bona |
ControlChain: Blockchain as a Central Enabler for Access Control Authorizations in the IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: 2017 IEEE Global Communications Conference, GLOBECOM 2017, Singapore, December 4-8, 2017, pp. 1-6, 2017, IEEE, 978-1-5090-5019-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
24 | Ussama Yakub, Vijayalakshmi Atluri, Jaideep Vaidya |
Efficient Evaluation of Authorizations for Video Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 9th International Conference on Security of Information and Networks, Newark, NJ, USA, July 20-22, 2016, pp. 16-23, 2016, ACM, 978-1-4503-4764-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Rajat Goel, Mahesh Chandra Govil, Girdhari Singh |
Security Requirements Elicitation and Modeling Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSCC ![In: Security in Computing and Communications - 4th International Symposium, SSCC 2016, Jaipur, India, September 21-24, 2016, Proceedings, pp. 239-250, 2016, Springer, 978-981-10-2737-6. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Chun Ruan |
Designing and evaluating weighted delegatable authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 27(15), pp. 3877-3891, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Qiang Zeng 0001, Mingyi Zhao, Peng Liu 0005, Poonam Yadav, Seraphin B. Calo, Jorge Lobo 0001 |
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 27(4), pp. 979-992, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Silvia Ghilezan, Svetlana Jaksic, Jovanka Pantovic, Jorge A. Pérez 0001, Hugo Torres Vieira |
A Typed Model for Dynamic Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLACES ![In: Proceedings Eighth International Workshop on Programming Language Approaches to Concurrency- and Communication-cEntric Software, PLACES 2015, London, UK, 18th April 2015., pp. 73-84, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
24 | Ana Isabel González-Tablas Ferreres, Almudena Alcaide, José María de Fuentes, José Montero-Castillo |
Privacy-preserving and accountable on-the-road prosecution of invalid vehicular mandatory authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Networks ![In: Ad Hoc Networks 11(8), pp. 2693-2709, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
24 | Dimitrios A. Baltatzis, Christos Ilioudis, George Pangalos |
A Role Engineering Framework to Support Dynamic Authorizations in Collaborative Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 21(1), pp. 12-27, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Matt Lepinski, Stephen T. Kent, Derrick Kong |
A Profile for Route Origin Authorizations (ROAs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6482, pp. 1-9, February 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Geoff Huston, George Michaelson |
Validation of Route Origination Using the Resource Certificate Public Key Infrastructure (PKI) and Route Origin Authorizations (ROAs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6483, pp. 1-8, February 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Georgios Karopoulos, Paolo Mori, Fabio Martinelli |
Continuous Authorizations in SIP with Usage Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Processing, PDP 2012, Munich, Germany, February 15-17, 2012, pp. 283-287, 2012, IEEE, 978-1-4673-0226-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Optimal workflow-aware authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012, pp. 93-102, 2012, ACM, 978-1-4503-1295-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Miguel L. Pardal, Mark Harrison, Sanjay E. Sarma, José Alves Marques |
Performance assessment of XACML authorizations for Supply Chain Traceability Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASoN ![In: Fourth International Conference on Computational Aspects of Social Networks, CASoN 2012, Sao Carlos, Brazil, November 21-23, 2012, pp. 378-383, 2012, IEEE, 978-1-4673-4793-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
24 | Dimitrios A. Baltatzis |
Dynamic authorizations for secure internet applications ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
24 | Samuel J. Burri |
Modeling and Enforcing Workflow Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2012 |
RDF |
|
24 | Sabrina De Capitani di Vimercati |
Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security (2nd Ed.) ![In: Encyclopedia of Cryptography and Security, 2nd Ed., pp. 65-68, 2011, Springer, 978-1-4419-5905-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Ana Isabel González-Tablas Ferreres, Almudena Alcaide, Guillermo Suarez-Tangil, José María de Fuentes, Israel Barroso-Perez |
POSTER Towards a Privacy - Respectful Telematic Verification System for Vehicle and Driver Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: Mobile and Ubiquitous Systems: Computing, Networking, and Services - 8th International ICST Conference, MobiQuitous 2011, Copenhagen, Denmark, December 6-9, 2011, Revised Selected Papers, pp. 224-227, 2011, Springer, 978-3-642-30972-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
24 | Miguel Ángel Latre, Francisco J. López-Pellicer, Javier Nogueras-Iso, Rubén Béjar, Pedro R. Muro-Medrano |
Facilitating E-Government Services through SDIs, an Application for Water Abstractions Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOVIS ![In: Electronic Government and the Information Systems Perspective, First International Conference, EGOVIS 2010, Bilbao, Spain, August 31 - September 2, 2010. Proceedings, pp. 108-119, 2010, Springer, 978-3-642-15171-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
24 | Jorge Fontenla González, Manuel Caeiro Rodríguez, Martín Llamas Nistal, Luis E. Anido-Rifón |
Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 28(8), pp. 843-856, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
Delegating revocations and authorizations in collaborative business environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 11(3), pp. 293-305, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Manuel Lamotte-Schubert, Christoph Weidenbach |
Analysis of Authorizations in SAP R/3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTP ![In: Proceedings of the 7th International Workshop on First-Order Theorem Proving, FTP 2009, Oslo, Norway, July 6-7, 2009., 2009, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
24 | Vijay Atluri, Heechang Shin |
Geospatial Authorizations, Efficient Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of GIS ![In: Encyclopedia of GIS., pp. 379-385, 2008, Springer, 978-0-387-30858-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 |
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 189-203, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Yun Bai 0001 |
Reasoning for Incomplete Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I, pp. 278-285, 2008, Springer, 978-3-540-85562-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
incomplete domain, formal specification, logic program, authorization |
24 | Hua Wang 0002, Jinli Cao |
Delegating Revocations and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Business Process Management Workshops ![In: Business Process Management Workshops, BPM 2007 International Workshops, BPI, BPD, CBP, ProHealth, RefMod, semantics4ws, Brisbane, Australia, September 24, 2007, Revised Selected Papers, pp. 294-305, 2007, Springer, 978-3-540-78237-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RBAC, Delegation, Revocation |
24 | Jani Suomalainen |
Towards FineGrained Authorizations in Small Office and Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France, pp. 66, 2007, IEEE Computer Society, 0-7695-2938-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Carlisle Adams |
Authorizations management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Cryptography and Security ![In: Encyclopedia of Cryptography and Security, 2005, Springer, 978-0-387-23473-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Konstantin Beznosov |
Flooding and recycling authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the New Security Paradigms Workshop 2005, Lake Arrowhead, California, USA, September 20-23, 2005, pp. 67-72, 2005, ACM, 1-59593-317-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Duen-Ren Liu, Mei-Yu Wu, Shu-Teng Lee |
Role-based authorizations for workflow systems in support of task-based separation of duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Syst. Softw. ![In: J. Syst. Softw. 73(3), pp. 375-387, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Mariemma Inmaculada Yagüe del Valle, Antonio Mana, Francisco Sánchez-Cid |
Semantic Interoperability of Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSIS ![In: Security In Information Systems, Proceedings of the 2nd International Workshop on Security In Information Systems, WOSIS 2004, In conjunction with ICEIS 2004, Porto, Portugal, April 2004, pp. 269-278, 2004, INSTICC Press, 972-8865-07-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Qi Guo |
STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain, pp. 31-47, 2004, Kluwer/Springer, 1-4020-8127-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Pietro Mazzoleni |
Uniform Indexing for Geospatial Data and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK, pp. 207-218, 2002, Kluwer, 1-4020-7541-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
24 | Sushil Jajodia, Michiharu Kudo, V. S. Subrahmanian |
Provisional Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-Commerce Security and Privacy ![In: E-Commerce Security and Privacy, pp. 133-159, 2001, Springer, 0-7923-7399-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | William A. Stubblefield, Karen S. Rogers |
The Social Life of Engineering Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Symposium on Designing Interactive Systems ![In: Proceedings of the 3rd Conference on Designing Interactive Systems: Processes, Practices, Methods, Techniques, DIS 2000, New York City, NY, USA, August 17-19, 2000, pp. 9-19, 2000, ACM, 1-58113-219-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino |
Specifying and computing hierarchies of temporal authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APPIA-GULP-PRODE ![In: 1999 Joint Conference on Declarative Programming, AGP'99, L'Aquila, Italy, September 6-9, 1999, pp. 243-258, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
24 | Yun Bai 0001, Vijay Varadharajan |
A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA, pp. 317-330, 1999, Kluwer, 0-7923-7848-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
24 | Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino |
Specifying and Computing Hierarchies of Temporal Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA, pp. 285-300, 1999, Kluwer, 0-7923-7848-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
24 | Silvana Castano, Sabrina De Capitani di Vimercati, Maria Grazia Fugini |
Automated Derivation of Global Authorizations for Database Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 5(4), pp. 271-302, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Silvana Castano, Maria Grazia Fugini |
Deriving Authorizations from Process Analysis in Legacy Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Information Security in Research and Business, Proceedings of the IFIP TC11 13th International Conference on Information Security (SEC '97), 14-16 May 1997, Copenhagen, Denmark, pp. 56-67, 1997, Chapman & Hall, 0-412-81780-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
24 | Yun Bai 0001, Vijay Varadharajan |
A Formal Security Design Approach for Transformation of Authorizations in Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIS ![In: The Third Pacific Asia Conference on Information Systems, PACIS 1997, Brisbane, Australia, April, 1-5, 1997, pp. 81, 1997, AISeL. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP BibTeX RDF |
|
24 | Pierangela Samarati, Paul Ammann, Sushil Jajodia |
Maintaining Replicated Authorizations in Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Knowl. Eng. ![In: Data Knowl. Eng. 18(1), pp. 55-84, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Jonathan Altfeld, Douglas E. Landon, Charles J. Daniels |
EASy: Expert Authorizations System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAAI/IAAI, Vol. 2 ![In: Proceedings of the Thirteenth National Conference on Artificial Intelligence and Eighth Innovative Applications of Artificial Intelligence Conference, AAAI 96, IAAI 96, Portland, Oregon, USA, August 4-8, 1996, Volume 2., pp. 1421-1432, 1996, AAAI Press / The MIT Press. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
24 | Silvana Castano |
An Approach to Deriving Global Authorizations in Federated Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Database Security Volume X, Status and Prospects, IFIP TC11 / WG11.3 Tenth International Conference on Database Security, 22-24 July 1996, Como, Italy, pp. 58-75, 1996, Chapman & Hall, 0-412-80820-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
24 | Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati |
Supporting Periodic Authorizations and Temporal Reasoning in Database Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLDB ![In: VLDB'96, Proceedings of 22th International Conference on Very Large Data Bases, September 3-6, 1996, Mumbai (Bombay), India, pp. 472-483, 1996, Morgan Kaufmann, 1-55860-382-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
|
24 | Ravi S. Sandhu, Roshan K. Thomas |
Conceptual Foundations for a Model of Task-based Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Seventh IEEE Computer Security Foundations Workshop - CSFW'94, Franconia, New Hampshire, USA, June 14-16, 1994, Proceedings, pp. 66-79, 1994, IEEE Computer Society, 0-8186-6230-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Claudio Bettini, Pierangela Samarati |
A discretionary access control model with temporal authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NSPW ![In: Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994, pp. 102-107, 1994, IEEE Computer Society Press, 0-8186-6335-9. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
24 | Thomas Y. C. Woo, Simon S. Lam |
Authorizations in Distributed Systems: A New Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Secur. ![In: J. Comput. Secur. 2(2-3), pp. 107-136, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
Authorizations in Relational Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 130-139, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Pierangela Samarati |
Research Issues in Discretionary Authorizations for Object Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security for Object-Oriented Systems ![In: Security for Object-Oriented Systems, Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993, pp. 183-199, 1993, Springer, 3-540-19877-6. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
24 | Paolo Corsini, Graziano Frosini, Lanfranco Lopriore |
Distributing and Revoking Access Authorizations on Abstract Objects: A Capability Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Pract. Exp. ![In: Softw. Pract. Exp. 14(10), pp. 931-943, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
24 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
A fine-grained access control system for XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(2), pp. 169-202, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, World Wide Web, Access control, XML documents |
24 | Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands |
Models for coalition-based access control (CBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 97-106, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, authorizations, security policy, roles, tasks, domain models, teams, coalitions |
24 | Haio Roeckle, Gerhard Schimpf, Rupert Weidinger |
Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 103-110, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
enterprise process modeling, security data models, single point of administration and control, access control, authorizations, role based access control, business processes, heterogeneous systems, security models, security management, security administration |
24 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
An Extended Authorization Model for Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 9(1), pp. 85-101, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
revocation of authorizations, security, privacy, access control, relational database, authorization, Database systems, protection |
12 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
12 | Jinwei Hu, Yan Zhang 0003, Ruixuan Li 0001, Zhengding Lu |
A logic for authorization provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 238-249, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authorization provenance, authorization, logic, provenance, authorization logic |
12 | Danfeng Yao, Roberto Tamassia |
Compact and Anonymous Role-Based Authorization Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 15:1-15:27, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, Delegation, aggregate signature |
12 | Robert Craven, Jorge Lobo 0001, Jiefei Ma, Alessandra Russo, Emil C. Lupu, Arosha K. Bandara |
Expressive policy analysis with enhanced system dynamicity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 239-250, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, authorization, policies, formal analysis |
12 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 535-542, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Min Li, Xiaoxun Sun, Hua Wang 0002, Yanchun Zhang |
Optimal Privacy-Aware Path in Hippocratic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Database Systems for Advanced Applications, 14th International Conference, DASFAA 2009, Brisbane, Australia, April 21-23, 2009. Proceedings, pp. 441-455, 2009, Springer, 978-3-642-00886-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Olivier Bertrand, Patrice Carle, Christine Choppy |
Modelling chronicle recognition for distributed simulation processing with coloured Petri nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SimuTools ![In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques for Communications, Networks and Systems, SimuTools 2009, Rome, Italy, March 2-6, 2009, pp. 42, 2009, ICST/ACM, 978-963-9799-45-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
airport simulation, chronicle recognition formal modelling, distributed simulation processing, HLA, coloured petri nets |
12 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Dynamic Enforcement of Abstract Separation of Duty Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 250-267, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Antonella Di Stefano, Giovanni Morana, Daniele Zito |
A Credentials Management System for Secure Trade in a Grid Services Marketplace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, WETICE 2009, Groningen, The Netherlands, 29 June - 1 July 2009, Proceedings, pp. 189-194, 2009, IEEE Computer Society, 978-0-7695-3683-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
12 | Henrique Lopes Cardoso, Eugénio C. Oliveira |
Flexible deadlines for directed obligations in agent-based business contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1307-1308, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
normative behavior, contract, norms, deadline |
12 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
Toward a Usage-Based Security Framework for Collaborative Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(1), pp. 3:1-3:36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, Authorization, security architecture, collaborative computing, usage control, UCON |
12 | Tsung-Yi Chen, Yuh-Min Chen, Chin-Bin Wang |
A Formal Virtual Enterprise Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part A ![In: IEEE Trans. Syst. Man Cybern. Part A 38(4), pp. 832-851, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Nicoletta Fornara, Francesco Viganò, Mario Verdicchio, Marco Colombetti |
Artificial institutions: a model of institutional reality for open multiagent systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 16(1), pp. 89-105, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Artificial institutions, Open systems, Commitments, Norms, Conventions |
12 | Lingli Deng, Yeping He, Ziyao Xu |
Separation of Duty in Trust-Based Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 370-388, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty |
12 | Federica Paci, Rodolfo Ferrini, Yuqing Sun 0001, Elisa Bertino |
Authorization and User Failure Resiliency for WS-BPEL Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2008, 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings, pp. 116-131, 2008, 978-3-540-89647-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Stéphane Onno |
A Federated Physical and Logical Access Control Enforcement Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 683-692, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control federation, logical access control, physical access control, Bell-lapadula |
12 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Preserving confidentiality of security policies in data outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 75-84, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
encryption policy, security policy protection, privacy, data outsourcing |
12 | Lingli Deng, Yeping He, Ziyao Xu |
Enforcing Separation of Duty in Ad Hoc Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1545-1552, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yoshikazu Watanabe, Hideaki Goto, Hideaki Sone |
Resource Access Control for Wireless LAN Roaming Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 281-284, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, Wireless LAN, campus network |
12 | Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert |
A general obligation model and continuity: enhanced policy enforcement engine for usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 123-132, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Manuel Caeiro, Martín Llamas Nistal, Luis E. Anido-Rifón, Jorge Fontenla González, Sergio Martín 0001, Rosario Gil 0001, Francisco García, Miguel Latorre, Manuel Castro 0001, Juan Peire |
A Generalized Proposal to Support Development and Reuse of Practical Educational Scenarios in LMSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: The 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, Cantabria, Spain, July 1-5, 2008, pp. 46-48, 2008, IEEE Computer Society, 978-0-7695-3167-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Controlled Information Sharing in Collaborative Distributed Query Processing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 303-310, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
12 | Yun Bai 0001 |
Access Control for XML Document. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: New Frontiers in Applied Artificial Intelligence, 21st International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems, IEA/AIE 2008, Wroclaw, Poland, June 18-20, 2008, Proceedings, pp. 621-630, 2008, Springer, 978-3-540-69045-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
logic based specification, XML security, authorization policy, KBS methodology |
12 | Shujing Wang 0001, Yan Zhang 0003 |
Handling distributed authorization with delegation through answer set programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(1), pp. 27-46, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access control, Knowledge representation, Authorization, Trust management, Delegation, Nonmonotonic reasoning, Answer set programming |
12 | Grigoris Antoniou, Matteo Baldoni, Piero A. Bonatti, Wolfgang Nejdl, Daniel Olmedilla |
Rule-based Policy Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management in Decentralized Systems ![In: Secure Data Management in Decentralized Systems, pp. 169-216, 2007, Springer, 978-0-387-27694-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Deriving XACML Policies from Business Process Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE Workshops ![In: Web Information Systems Engineering - WISE 2007 Workshops, WISE 2007 International Workshops, Nancy, France, December 3, 2007, Proceedings, pp. 142-153, 2007, Springer, 978-3-540-77009-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Policy Definition, Separation of Duties Business Process Modeling, eXtensible Access Control Markup Language, Integration, Enforcement |
12 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSAW ![In: Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007, pp. 63-69, 2007, ACM, 978-1-59593-890-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
12 | Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh |
A framework for decentralized access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 93-104, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
physical access control, authorization, decentralization |
12 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
An Experimental Evaluation of Multi-Key Strategies for Data Outsourcing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 385-396, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan 0001 |
Fine Grained Authorization Through Predicated Grants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 1174-1183, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Gayatri Swamynathan, Tyler Close, Sujata Banerjee, Rick McGeer |
Scalable Access Control ForWeb Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C5 ![In: Fifth International Conference on Creating, Connecting and Collaborating through Computing (C5 2007), 24-26 January 2007, Kyoto, Japan, pp. 93-98, 2007, IEEE Computer Society, 978-0-7695-2806-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Achille Peternier, Xavier Righetti, Mathieu Hopmann, Daniel Thalmann, Matteo Repetto, George Papagiannakis, Pierre Davy, Mingyu Lim, Nadia Magnenat-Thalmann, Paolo Barsocchi, Tasos Fragopoulos, Dimitrios N. Serpanos, Yiannis Gialelis, Anna Kirykou |
Chloe@University: an indoor, mobile mixed reality guidance system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2007, Newport Beach, California, USA, November 5-7, 2007, pp. 227-228, 2007, ACM, 978-1-59593-863-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
sensor networks, real-time systems, localization, mixed reality, virtual human |
12 | Christian Wolter, Andreas Schaad |
Modeling of Task-Based Authorization Constraints in BPMN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BPM ![In: Business Process Management, 5th International Conference, BPM 2007, Brisbane, Australia, September 24-28, 2007, Proceedings, pp. 64-79, 2007, Springer, 978-3-540-75182-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security in business processes, Business process modeling and analysis |
12 | Yuqing Sun 0001, Bin Gong, Xiangxu Meng, Zongkai Lin |
Active Authorization Management for Multi-domain Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 162-167, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Kwang Moon Cho |
Management of Access Control for Content Packages by Using XML Subject-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 453-457, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Steve Barker |
Action-status access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 195-204, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ASAC, access control, policies |
12 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Security Policy Enforcement in a Location Based Service Environment. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings, pp. 61-76, 2007, Springer, 978-3-540-73533-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Yuqing Sun 0001, Peng Pan, Ho-fung Leung, Bin Shi |
Ontology Based Hybrid Access Control for Automatic Interoperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 4th International Conference, ATC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 323-332, 2007, Springer, 978-3-540-73546-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Amirreza Masoumzadeh 0001, Morteza Amini, Rasool Jalili |
Conflict Detection and Resolution in Context-Aware Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 505-511, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
Safety analysis of usage control authorization models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 243-254, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, safety, usage control, UCON |
12 | Chun Ruan, Vijay Varadharajan |
Integration of Graph Based Authorization Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 16th International Symposium, ISMIS 2006, Bari, Italy, September 27-29, 2006, Proceedings, pp. 359-368, 2006, Springer, 3-540-45764-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization conflict, access control, weighted graph |
12 | Alan H. Karp |
Authorization-Based Access Control for the Services Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C5 ![In: Fourth International Conference on Creating, Connecting and Collaborating through Computing (C5 2006), 26-27 January 2006, Berkeley, California, USA, pp. 160-167, 2006, IEEE Computer Society, 0-7695-2563-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Chun Ruan, Vijay Varadharajan |
Implementing Authorization Delegations Using Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 904-913, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization delegation, access control, weighted graph |
12 | N. V. Narendra Kumar, R. K. Shyamasundar |
Specification and Realization of Access Control in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 177-193, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|