The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SACMAT"( http://dblp.L3S.de/Venues/SACMAT )

URL (DBLP): http://dblp.uni-trier.de/db/conf/sacmat

Publication years (Num. hits)
2001 (24) 2002 (20) 2003 (24) 2004 (20) 2005 (21) 2006 (27) 2007 (29) 2008 (23) 2009 (28) 2010 (25) 2011 (24) 2012 (29) 2013 (31) 2014 (25) 2015 (27) 2016 (23) 2017 (30) 2018 (30) 2019 (29) 2020 (26) 2021 (21) 2022 (33) 2023 (27)
Publication types (Num. hits)
inproceedings(573) proceedings(23)
Venues (Conferences, Journals, ...)
SACMAT(596)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 679 occurrences of 286 keywords

Results
Found 596 publication records. Showing 596 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Aaron Elliott, Scott Knight Start Here: Engineering Scalable Access Control Systems. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand GemRBAC-DSL: A High-level Specification Language for Role-based Access Control Policies. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park Tri-Modularization of Firewall Policies. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oyindamola Oluwatimi, Elisa Bertino An Application Restriction System for Bring-Your-Own-Device Scenarios. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Marc Hüffmeyer, Ulf Schreier Formal Comparison of an Attribute Based Access Control Language for RESTful Services with XACML. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Julien Bringer, Othmane El Omri, Constance Morel, Hervé Chabanne Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cory Thoma, Adam J. Lee, Alexandros Labrinidis PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Garfield Zhiping Wu, Frank Wm. Tompa A Space-Efficient Data Structure for Fast Access Control in ECM Systems. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jun Zhu 0002, Bill Chu, Heather Richter Lipford Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen Automated Fault Localization of XACML Policies. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wonkyu Han, Hongxin Hu, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng State-aware Network Access Management for Software-Defined Networks. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuan Cheng 0002, Khalid Zaman Bijon, Ravi S. Sandhu Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers Data-Centric Access Control for Cloud Computing. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino A Context-Aware System to Secure Enterprise Content. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1X. Sean Wang, Lujo Bauer, Florian Kerschbaum (eds.) Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016 Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianwei Niu 0001, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. Search on Bibsonomy SACMAT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jingwei Li 0001, Anna Cinzia Squicciarini, Dan Lin 0001, Shuang Liang, Chunfu Jia SecLoc: Securing Location-Sensitive Storage in the Cloud. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood Relationship-Based Access Control for an Open-Source Medical Records System. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri Generating Secure Images for CAPTCHAs through Noise Addition. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Feng Wang, Mathias Kohler, Andreas Schaad Initial Encryption of large Searchable Data Sets using Hadoop. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos E. Rubio-Medrano, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn Federated Access Management for Collaborative Network Environments: Framework and Case Study. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcos Cramer, Diego Agustín Ambrossio, Pieter Van Hertum A Logic of Trust for Reasoning about Delegation and Revocation. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu 0001, Ruiqi Bu, Minyue Ni SPA: Inviting Your Friends to Help Set Android Apps. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jonathan Shahen, Jianwei Niu 0001, Mahesh V. Tripunitara Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun Commune: Shared Ownership in an Agnostic Cloud. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anna Cinzia Squicciarini, Ting Yu 0001 Privacy and Access Control: How are These Two concepts Related? Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Masoud Narouei, Hassan Takabi Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Charles Morisset, Nicola Zannone On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marcos Cramer, Jun Pang 0001, Yang Zhang 0016 A Logical Approach to Restricting Access in Online Social Networks. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rainer Fischer A Prototype to Reduce the Amount of Accessible Information. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jun Zhu 0002, Bill Chu, Heather Richter Lipford, Tyler Thomas Mitigating Access Control Vulnerabilities through Interactive Static Analysis. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ha-Thanh Le, Cu Duy Nguyen, Lionel C. Briand, Benjamin Hourte Automated Inference of Access Control Policies for Web Applications. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nima Mousavi, Mahesh V. Tripunitara Hard Instances for Verification Problems in Access Control. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan Valued Workflow Satisfiability Problem. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Trent Jaeger Challenges in Making Access Control Sensitive to the "Right" Contexts. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee (eds.) Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015 Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Federica Paci, Nicola Zannone Preventing Information Inference in Access Control. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lionel Montrieux, Zhenjiang Hu Towards Attribute-Based Authorisation for Bidirectional Programming. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bart Preneel Post-Snowden Threat Models. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad S. Wrona A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. Search on Bibsonomy SACMAT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici Limiting access to unintentionally leaked sensitive documents using malware signatures. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lujo Bauer, Florian Kerschbaum What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wai-Kit Sze, Bhuvan Mital, R. Sekar 0001 Towards more usable information flow policies for contemporary operating systems. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrew Clement Re-thinking networked privacy, security, identity and access control in our surveillance states. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ebrahim Tarameshloo, Philip W. L. Fong Access control models for geo-social computing systems. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs An actor-based, application-aware access control evaluation framework. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gedare Bloom, Rahul Simha Hardware-enhanced distributed access enforcement for role-based access control. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Crampton, James Sellwood Path conditions and principal matching: a new approach to access control. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Silvio Ranise, Anh Tuan Truong, Alessandro Armando Scalable and precise automated analysis of administrative temporal role-based access control. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham Redaction based RDF access control language. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongxin Hu, Gail-Joon Ahn, Ziming Zhao 0001, Dejun Yang Game theoretic analysis of multiparty access control in online social networks. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger Monitor placement for large-scale systems. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard Optimized and controlled provisioning of encrypted outsourced data. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger Policy models to protect resource retrieval. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maria Leitner, Stefanie Rinderle-Ma Anomaly detection and visualization in generative RBAC models. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer User-centric identity as a service-architecture for eIDs with selective attribute disclosure. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy (eds.) 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014 Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham Towards fine grained RDF access control. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ari Juels A bodyguard of lies: the use of honey objects in information security. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wouter Kuijper, Victor Ermolaev Sorting out role based access control. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer An access control concept for novel automotive HMI systems. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Charles Morisset, Nicola Zannone Reduction of access control decisions. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Roberto Carbone, Eyasu Getahun Chekole, Silvio Ranise Attribute based access control for APIs in spring security. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sharmin Ahmed, Sylvia L. Osborn A system for risk awareness during role mining. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wai-Kit Sze, R. Sekar 0001 Comprehensive integrity protection for desktop linux. Search on Bibsonomy SACMAT The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ramadan Abdunabi, Indrakshi Ray, Robert B. France Specification and analysis of access control policies for mobile applications. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrew K. Adams, Adam J. Lee Combining social authentication and untrusted clouds for private location sharing. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, Simone Mutti On the notion of redundancy in access control policies. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara Property-testing real-world authorization systems. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jens Köhler, Jens Mittag, Hannes Hartenstein User-centric management of distributed credential repositories: balancing availability and vulnerability. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss Secure benchmarking in the cloud. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin Evolving role definitions through permission invocation patterns. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Piero A. Bonatti, Clemente Galdi, Davide Torres ERBAC: event-driven RBAC. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruixuan Li 0001, Huaqing Li 0001, Wei Wang, Xiaopu Ma, Xiwu Gu RMiner: a tool set for role mining. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Omar Chowdhury, Andreas Gampe, Jianwei Niu 0001, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia 0001, William H. Winsborough Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Detlef Sturm, Axel Kern Permission path analysis based on access intelligence. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Matteo Grasso, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona Content-based information protection and release in NATO operations. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi Sticky policies for mobile devices. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nathalie Baracaldo, James Joshi Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dominik Leibenger, Christoph Sorge A storage-efficient cryptography-based access control solution for subversion. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri Panel on granularity in access control. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mauro Conti, Jaideep Vaidya, Andreas Schaad (eds.) 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013 Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu 0001 Private data warehouse queries. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kerschbaum Searching over encrypted data in cloud systems. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu 0001 Enabling intensional access control via preference-aware query optimization. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alireza Sharifi, Mahesh V. Tripunitara Least-restrictive enforcement of the Chinese wall security policy. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dennis G. Kafura, Denis Gracanin An information flow control meta-model. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura A versatile access control implementation: secure box. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Manogna Thimma, Tsam Kai Tsui, Bo Luo HyXAC: a hybrid approach for XML access control. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peter Amthor 0001, Winfried E. Kühnhauser, Anja Pölck Heuristic safety analysis of access control models. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken A bigData platform for analytics on access control policies and logs. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken Ensuring continuous compliance through reconciling policy with usage. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jayalakshmi Balasubramaniam, Philip W. L. Fong A white-box policy analysis and its efficient implementation. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xing Xie 0002, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble Information flow control for stream processing in clouds. Search on Bibsonomy SACMAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 596 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license