|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Luigi Giuri |
Role-based Access Control in Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 91-100, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Java |
34 | Jonathan D. Moffett |
Control Principles and Role Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 63-69, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | George Coulouris, Jean Dollimore, Marcus Roberts |
Role and Task-Based Access Control in the PerDiS Groupware Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 115-121, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Ravi S. Sandhu, Venkata Bhamidipati |
An Oracle Implementation of the PRA97 Model for Permission-Role Assignment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 13-21, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
SQL, ORACLE |
34 | John F. Barkley, Anthony Cincotta |
Managing Role/Permission Relationships Using Object Access Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 73-80, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
34 | Ravi S. Sandhu |
Role Activation Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Third ACM Workshop on Role-Based Access Control, RBAC 1998, Fairfax, VA, USA, October 22-23, 1998, pp. 33-40, 1998, ACM, 1-58113-113-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
34 | Trent Jaeger, Frederique Giraud, Nayeem Islam, Jochen Liedtke |
A role-based access control model for protection domain derivation and management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 95-106, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Java |
34 | Elisa Bertino, Elena Ferrari, Vijayalakshmi Atluri |
A flexible model supporting the specification and enforcement of role-based authorization in workflow management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 1-12, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Christian Friberg, Achim Held |
Support for discretionary role based access control in ACL-oriented operating systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 83-94, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW), UNIX |
34 | Sylvia L. Osborn |
Mandatory access control and role-based access control revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 31-40, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | D. Richard Kuhn |
Mutual exclusion of roles as a means of implementing separation of duty in role-based access control systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 23-30, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Giuri, Pietro Iglio |
Role templates for content-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 153-159, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
SQL |
34 | Roshan K. Thomas |
Team-based access control (TMAC): a primitive for applying role-based access controls in collaborative environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 13-19, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | John F. Barkley |
Comparing simple role based access control models and access control lists. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 127-132, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT |
34 | Roland Awischus |
Role based access control with the security administration manager (SAM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 61-68, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | David F. Ferraiolo, John F. Barkley |
Specifying and managing role-based access control within a corporate intranet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 77-82, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
34 | Ravi S. Sandhu, Venkata Bhamidipati, Edward J. Coyne, Srinivas Ganta, Charles E. Youman |
The ARBAC97 model for role-based administration of roles: preliminary description and outline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 41-50, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
34 | LouAnna Notargiacomo |
Role-based access control in ORACLE7 and Trusted ORACLE7. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
ORACLE |
34 | Edward J. Coyne |
Role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Roshan K. Thomas |
Role-based access control and distributed object-based enterprise computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | John F. Barkley |
Implementing role-based access control using object technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
C++ |
34 | Virgil D. Gligor |
Characteristics of role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Steven A. Demurjian, T. C. Ting, M.-Y. Hu |
Role-based access control for object-oriented/C++ systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
C++ |
34 | Jeremy Epstein, Ravi S. Sandhu |
NetWare 4 as an example of role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
NetWare |
34 | Fang Chen, Ravi S. Sandhu |
Constraints for role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | David F. Ferraiolo, D. Richard Kuhn |
Future directions in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Matunda Nyanchama, Sylvia L. Osborn |
The role graph model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Luigi Giuri |
Role-based access control: a natural approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Trent Jaeger, Atul Prakash 0001 |
Requirements of role-based access control for collaborative systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis |
A policy based role framework for access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the First ACM Workshop on Role-Based Access Control, RBAC 1995, Gaithersburg, MD, USA, November 30 - December 2, 1995, 1995, ACM, 0-89791-759-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
34 | Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu |
Role mining based on weights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 65-74, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
similarity, weight, role engineering, role mining, rbac |
34 | Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan |
Fast exact and heuristic methods for role minimization problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 1-10, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
role-based access control, role mining |
34 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 12-20, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
34 | Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf |
Role mining - revealing business roles for security administration using data mining technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 179-186, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enterprise systems management, security data models, single point of administration and control, data mining, role-based access control, migration, identity management, security management, provisioning, role engineering, security administration |
34 | Mehdi Dastani, Virginia Dignum, Frank Dignum |
Role-assignment in open agent societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings, pp. 489-496, 2003, ACM, 1-58113-683-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enacting role, organization, role, norm, conflict, goal |
34 | Jason Crampton |
Administrative scope and role hierarchy operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 145-154, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
administrative scope, encapsulated range, role hierarchy operation, role-based access control |
34 | Gustaf Neumann, Mark Strembeck |
A scenario-driven role engineering process for functional RBAC roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 33-42, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role-based access control, scenarios, role engineering |
34 | Helena Holmström, Ola Henfridsson |
Customer Role Ambiguity in Community Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 170, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Product-centered communities, customer role ambiguity, enhanced customer role, community management |
34 | Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin |
Database Intrusion Detection Using Role Profiling with Role Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, pp. 33-48, 2009, Springer, 978-3-642-04218-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Role profiling, Intrusion detection, RBAC, Database security, Insider threats |
34 | James B. D. Joshi, Elisa Bertino |
Fine-grained role-based delegation in presence of the hybrid role hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 81-90, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
hybrid hierarchy, access control, delegation, role based |
34 | Jürgen Börstler |
Improving CRC-card role-play with role-play diagrams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2005, October 16-20, 2005, San Diego, CA, USA, pp. 356-364, 2005, ACM, 1-59593-193-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
scenario role-play, introductory programming |
33 | Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 5(1), pp. 65-81, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO) |
33 | Jason Crampton |
On permissions, inheritance and role hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 85-92, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
role-based access control, inheritance, mandatory access control, permissions |
33 | Jean Bacon, Ken Moody, Walt Yao |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(4), pp. 492-540, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed systems, RBAC, role-based access control, policy, service-level agreements, Certificates, OASIS |
33 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 171-181, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
33 | Georgios A. Dafoulas, Linda A. Macaulay |
Facilitating Group Formation and Role Allocation in Software Engineering Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2001 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2001), 26-29 June 2001, Beirut, Lebanon, pp. 352-359, 2001, IEEE Computer Society, 0-7695-1165-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Dynamic Role Allocation, Software Engineering, Knowledge Management, Decision-making, Cultural Differences |
33 | Emil Lupu, Morris Sloman |
A Policy Based Role Object Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 24-26 October 1997, Gold Coast, Australia, Proceedings, pp. 36-47, 1997, IEEE Computer Society, 0-8186-8031-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
management roles, role class, management policies, consistency, relationships, Distributed systems management |
33 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 237-246, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Egil P. Andersen, Trygve Reenskaug |
System Design by Composing Structures of Interacting Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP '92, European Conference on Object-Oriented Programming, Utrecht, The Netherlands, June 29 - July 3, 1992, Proceedings, pp. 133-152, 1992, Springer, 3-540-55668-0. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
O-O Design, Interaction-Oriented Design, Role Modeling, Object Composition |
32 | Hassan Takabi, James B. D. Joshi |
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 55-64, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
access control, similarity, role engineering, role mining, rbac |
32 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 318-325, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
32 | Youna Jung, Amirreza Masoumzadeh 0001, James B. D. Joshi, Minkoo Kim |
RiBAC: Role Interaction Based Access Control Model for Community Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 304-321, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Role interaction, Multiagent system, Role-based Access Control, Cooperation, Community computing |
32 | He Wang 0020, Sylvia L. Osborn |
Discretionary access control with the administrative role graph model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 151-156, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
role graph model, role-based access control, DAC |
32 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 9(4), pp. 391-420, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
role-based administration, Role-based access control, trust management, delegation |
32 | Jason Crampton |
Understanding and developing role-based administrative models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 158-167, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ARBAC97, RHA, administrative domain, administrative scope, role-based administration, role-based access control |
32 | Axel Kern, Claudia Walhorn |
Rule support for role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 130-138, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration |
32 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 126-135, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role-based administration, role-based access control, trust management, delegation |
32 | Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob |
The role-based access control system of a European bank: a case study and discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 3-9, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
control principles, dual control, number of roles, role administration, role-based access control, inheritance, separation of duties, least privilege |
32 | Victoria K. Clawson, Robert P. Bostrom |
The importance of facilitator role behaviors in different face to face group support systems environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 181-190, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
facilitator role behaviors, face-to-face group support systems, facilitation skills, successful business interactions, perceived facilitator training needs, current performance, role dimensions, groupware, training, human factors, group work, meetings |
32 | Catherine Plaisant, Ben Shneiderman |
Organization overviews and role management: inspiration for future desktop environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 4th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'95), April 20-22, 1995, Berkeley Springs, West Virginia, USA, Proceedings, pp. 14-24, 1995, IEEE Computer Society, 0-8186-7019-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
organization overviews, role management, future desktop environments, World Bank, semi-automated searches, multiple personal roles, role-centered approach, graphical user interfaces, office automation, management information systems, human resource management, personnel, bank data processing |
31 | Ramaswamy Chandramouli |
Application of XML tools for enterprise-wide RBAC implementation tasks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 11-18, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
XML |
31 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 111-119, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Trent Jaeger, Jonathon Tidswell |
Rebuttal to the NIST RBAC model proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 65-66, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 71-76, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
31 | Kang-hak Han, Junghwan Choi, Sanghyun Ryu, Hyun-Su Jang, Young Ik Eom |
Design of RBAC-based secure KAgent framework for home network applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 642-646, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile agents, role-based access control, role, home networks |
31 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 11-20, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
31 | Sylvia L. Osborn |
Information flow analysis of an RBAC system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 163-168, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role graphs, role-based access control, mandatory access control |
31 | Yu Zhang |
Modeling Role-Based Agent Team. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Canadian AI ![In: Advances in Artificial Intelligence, 20th Conference of the Canadian Society for Computational Studies of Intelligence, Canadian AI 2007, Montreal, Canada, May 28-30, 2007, Proceedings, pp. 1-13, 2007, Springer, 978-3-540-72664-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Agent teamwork, Plan, Role |
31 | Laura Vallius, Tomi Kujanpää, Tony Manninen |
Experiencing Narrative Elements Through Social Communication in Computer Based Role-Playing Game - CASE: Castle of Oulu 1651. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TIDSE ![In: Technologies for Interactive Digital Storytelling and Entertainment, Third International Conference, TIDSE 2006, Darmstadt, Germany, December 4-6, 2006., pp. 289-299, 2006, Springer, 3-540-49934-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
narrative elements, computer game, role-play |
31 | Juliana Sutanto, Chee Wei Phang, Huei Huang Kuan, Atreyi Kankanhalli, Bernard C. Y. Tan |
Vicious and Virtuous Cycles in Global Virtual Team Role Coordination. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
role coordination, roles in team work, coordination modes, Global virtual team |
31 | Sejong Oh, Ravi S. Sandhu |
A model for role administration using organization structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 155-162, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role administration, access control, RBAC |
31 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A rule-based framework for role based delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 153-162, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
access control, role, delegation, rule-based |
30 | Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong |
Research and Implementation of Role-Based RBAC Administration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Fifth International Conference on Computer and Information Technology (CIT 2005), 21-23 September 2005, Shanghai, China, pp. 746-750, 2005, IEEE Computer Society, 0-7695-2432-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
29 | Haibo Shen, Fan Hong |
A Context-Aware Role-Based Access Control Model for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 18-21 October 2005, Beijing, China, pp. 220-223, 2005, IEEE Computer Society, 0-7695-2430-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Global role, Web Services, Context, Role-Based Access Control |
29 | Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
On modeling system-centric information for role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 169-178, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attributive permissions, role-based access control, information flow, information model, role engineering |
29 | Luigi Giuri, Pietro Iglio |
A Role-Based Secure Database Design Tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 203-212, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
role based secure database design tool, database design methodologies, secure database design methodology, entity relationship conceptual data model, role based security model, analysis algorithm, potential security design mistakes, translation procedure, SQL specification, conceptual model, entity-relationship modelling |
28 | Helmut Jürgensen |
The Arduous Road of Modelling: Excerpts from Records of an Enjoyable Co-operation of Nearly 20 Years. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 83-120, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Andrzej Ehrenfeucht, Ion Petre, Grzegorz Rozenberg |
Reaction Systems: A Model of Computation Inspired by the Functioning of the Living Cell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 1-32, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Markus Holzer 0001, Martin Kutrib |
Structure and Complexity of Some Subregular Language Families. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 59-82, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Zoltán Ésik, Werner Kuich |
Solving Fixed Point Equations over Complete Semirings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 33-58, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Timothy Ng 0001, David Rappaport, Kai Salomaa |
Quasi-Distances and Weighted Finite Automata. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 135-152, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Éric Pin |
Open Problems About Regular Languages, 35 Years Later. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 153-176, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Ernst L. Leiss |
Is Complementation Evil? ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 121-134, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Arto Salomaa |
Depth of Closed Classes of Truth Functions in Many-Valued Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 203-216, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Tinus Strauss, Bruce W. Watson, Derrick G. Kourie, Loek Cleophas |
CSP for Parallelising Brzozowski's DFA Construction Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 217-244, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Andrew L. Szilard |
Programming Examples of Space-Filling Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 245-272, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Éric Pin |
The Dot-Depth Hierarchy, 45 Years Later. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Theory in Computer Science ![In: The Role of Theory in Computer Science - Essays Dedicated to Janusz Brzozowski, pp. 177-202, 2017, World Scientific, 978-981-3148-19-2. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Frank Leymann, Wolfgang Reisig, Satish R. Thatte, Wil M. P. van der Aalst (eds.) |
The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Ekkart Kindler, Björn Axenath, Vladimir A. Rubin |
AMFIBIA: A Meta-Model for the Integration of Business Process Modelling Aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst |
06291 Workshop Report: Process Mining, Monitoring Processes and Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Maja Pesic |
DecSerFlow: Towards a Truly Declarative Service Flow Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Michael Beisiegel, Kees M. van Hee, Dieter König, Christian Stahl |
A SOA-Based Architecture Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Uwe Zdun, Schahram Dustdar |
Model-Driven and Pattern-Based Integration of Process-Driven SOA Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Oliver Günther 0001, Gerrit Tamm, Frank Leymann |
Pricing Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Guadalupe Ortiz 0001, Juan Hernández 0001 |
Aspect-Oriented Techniques for Web Services: a Model-Driven Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Dominik Kuropka, Mathias Weske |
Towards a Services-Based Process Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Guadalupe Ortiz 0001, Juan Hernández 0001 |
Towards UML Modelling Extra-Functional Properties in Web Services and their Clients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Jorge Cardoso 0001 |
Approaches to Compute Workflow Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Peter Massuthe, Karsten Wolf |
An Algorithm for Matching Nondeterministic Services with Operating Guidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
28 | Wil M. P. van der Aalst, Marlon Dumas, Chun Ouyang 0001, Anne Rozinat, H. M. W. Verbeek |
Choreography Conformance Checking: An Approach based on BPEL and Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The Role of Business Processes in Service Oriented Architectures ![In: The Role of Business Processes in Service Oriented Architectures, 16.07. - 21.07.2006, 2006, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
Displaying result #101 - #200 of 44182 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|