|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 497 occurrences of 312 keywords
|
|
|
Results
Found 331 publication records. Showing 331 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi |
Authorisation Service in .Net My Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2003, ICWI 2003, Algarve, Portugal, November 5-8, 2003, pp. 1115-1118, 2003, IADIS, 972-98947-1-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
21 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi |
Secure Authorisation for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA, pp. 163-175, 2003, Kluwer/Springer, 1-4020-8069-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Alwyn Goh, David Ngo Chek Ling |
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 27-39, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Martin S. Olivier, Ehud Gudes |
Wrappers - a mechanism to support state-based authorisation in Web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Knowl. Eng. ![In: Data Knowl. Eng. 43(3), pp. 281-292, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
21 | Jason Crampton, George Loizou |
Authorisation and antichains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 35(3), pp. 6-15, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Jude T. Regan, Christian Damsgaard Jensen |
Capability File Names: Separating Authorisation From User Management in an Internet File System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 10th USENIX Security Symposium, August 13-17, 2001, Washington, D.C., USA, 2001, USENIX. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
21 | Wolfgang Naraschewski |
Teams as types: a formal treatment of authorisation in groupware. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2001 |
RDF |
|
21 | Martin S. Olivier, Ehud Gudes |
Wrappers - a mechanism to support state-based authorisation in Web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000, pp. 149-160, 2000, Kluwer, 0-7923-7514-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Richard Au, Mark Looi, Paul Ashley |
Towards a New Authorisation Paradigm for Extranets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, pp. 18-29, 2000, Springer, 3-540-67742-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Marco Cremonini, Andrea Omicini, Franco Zambonelli |
Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COORDINATION ![In: Coordination Languages and Models, Third International Conference, COORDINATION '99, Amsterdam, The Netherlands, April 26-28, 1999, Proceedings, pp. 416, 1999, Springer, 3-540-65836-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | José Andany, Christer Bjorkendal, Fabrizio Massimo Ferrara, Jean-Raoul Scherrer, Stéphane Spahni |
Authorisation & Security aspects in the Middleware-based healthcare information system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MIE ![In: Medical Informatics Europe '99, Proceedings, Ljubljana, Slovenia, pp. 315-320, 1999, IOS Press, 978-0-9673355-1-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
21 | Marie Rose Low, James A. Malcolm |
A Joint Authorisation Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 31(1), pp. 88-96, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | Yun Bai 0001, Vijay Varadharajan |
Analysis and Implementation of a Formal Authorisation Policy Design Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings, pp. 14-25, 1997, Springer, 3-540-63232-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
21 | P. V. McMahon |
SESAME V2 public key and authorisation extensions to Kerberos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NDSS ![In: 1995 Symposium on Network and Distributed System Security, (S)NDSS '95, San Diego, California, USA, February 16-17, 1995, pp. 114-131, 1995, IEEE Computer Society, 0-8186-7027-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Fotios Gogoulos, Anna Antonakopoulou, Georgios V. Lioudakis, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris |
Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1114-1121, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
semantic information model, privacy, access control, authorisation, passive network monitoring |
18 | Theo Dimitrakos |
Common Capabilities for Service Oriented Infrastructures and Platforms: An Overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOWS ![In: 8th IEEE European Conference on Web Services (ECOWS 2010), 1-3 December 2010, Ayia Napa, Cyprus, pp. 181-188, 2010, IEEE Computer Society, 978-1-4244-9397-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Entitelement, Licence Management, Web Services, SOA, Grid, Service Level Agreements, Cloud, Portals, Authorisation, Virtual Organisations, Identity Federation |
18 | Yuri Demchenko, Cees de Laat, Oscar Koeroo, David L. Groep |
Re-thinking Grid Security Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Fourth International Conference on e-Science, e-Science 2008, 7-12 December 2008, Indianapolis, IN, USA, pp. 79-86, 2008, IEEE Computer Society, 978-1-4244-3380-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Open Grid Security Architecture, Security Context, Authorisation session, Authentication, Grids, Security models, Reference Monitor, Trusted Computing Base |
18 | Kevin P. Twidle, Emil Lupu, Naranker Dulay, Morris Sloman |
Ponder2 - A Policy Environment for Autonomous Pervasive Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2-4 June 2008, Palisades, New York, USA, pp. 245-246, 2008, IEEE Computer Society, 978-0-7695-3133-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ponder2, Self-Managed Cell, PonderTalk, Policy, Authorisation, Pervasive, Obligation |
18 | Gideon Ranga, Stephen Flowerday |
Identity and access management for the distribution of social grants in South Africa. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAICSIT ![In: Proceedings of the 2007 Annual Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, SAICSIT 2007, Port Elizabeth, South Africa, October 2-3, 2007, pp. 125-131, 2007, ACM, 978-1-59593-775-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
federated and isolated identity management architectures, identity and access management, authentication, authorisation |
18 | Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan |
Using semantic rules to determine access control for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 913-914, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
OWL, authorisation, web service security, SWRL |
18 | Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn |
Formal specification of role-based security policies for clinical information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 332-339, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
authorisation constraints, healthcare environments, LTL |
18 | David O'Callaghan, Brian A. Coghlan |
Bridging Secure WebCom and European DataGrid Security for Multiple VOs over Multiple Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC/HeteroPar ![In: 3rd International Symposium on Parallel and Distributed Computing (ISPDC 2004), 3rd International Workshop on Algorithms, Models and Tools for Parallel Computing on Heterogenous Networks (HeteroPar 2004), 5-7 July 2004, Cork, Ireland, pp. 225-231, 2004, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Authentication, Grid, Interoperability, Authorisation |
18 | Peter Gutmann |
A Reliable, Scalable General-Purpose Certificate Store. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 278-287, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
general-purpose certificate store, scalability, standards, operating system, software reliability, software reliability, availability, public key cryptography, public key cryptography, PKI, error recovery, authorisation |
18 | E. Strother |
Denial of Service Protection - The Nozzle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 32-41, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource |
18 | Murat Aydos, Tugrul Yanik, Çetin Kaya Koç |
An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 401-410, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications |
18 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 317-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
18 | Ezedin Barka, Ravi S. Sandhu |
Framework for Role-based Delegation Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 168-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
role-based delegation models, authorisation |
18 | Jeremy Epstein, L. Thomas, Eric Monteith |
Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 236-245, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software |
18 | Reiner Sailer, Matthias Kabatnik |
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 373-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks |
18 | Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell |
Secure Smart Homes using Jini and UIUC SESAME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 77-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices |
18 | André L. M. dos Santos, Richard A. Kemmerer |
Implementing Security Policies using the Safe Areas of Computation Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 90-99, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks |
18 | Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky |
A Policy-based Access Control Mechanism for the Corporate Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 150-158, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
policy-based access control mechanism, corporate Web, security problems, management problems, corporate intranet, formal statement, policy engines, business data processing, authorisation, intranets, intranets, access control lists |
18 | P. C. Clark, M. C. Meissner, K. O. Vance |
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 217-223, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data |
18 | Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu |
Policy Mediation for Multi-Enterprise Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 100-106, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
policy mediation, multi-enterprise environments, uniform security services, heterogeneous information networks, access control policy management, large enterprise information networks, Policy Machine, Policy Mediation Architecture, software architecture, middleware, static analysis, business data processing, authorisation, information networks, formal techniques, software infrastructures |
18 | John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi |
Extending Java for Package based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 67-76, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation |
18 | Uwe Jendricke, Daniela Gerd tom Markotten |
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 344-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security |
18 | Heejin Jang, Sangwook Kim |
A Self-Extension Monitoring for Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 196-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare |
18 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
18 | Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman |
A Flexible Access Control Service for Java Mobile Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 356-365, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading |
18 | Konstantin Knorr |
Dynamic Access Control through Petri Net Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 159-167, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control |
18 | Samuel Patton, David Doss, William Yurcik |
Distributed Weakness in Virtual Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 96-97, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
distributed weakness, corporate VPN, routing attack, VPN tunnel endpoints, coordinated filtering, corporate firewall, network security, transport protocols, packet switching, network topology, network topology, telecommunication network routing, authorisation, IP network, telecommunication networks, telecommunication security, Internet service, virtual private networks, business communication |
18 | Samuel Patton, Bryan Smith, David Doss, William Yurcik |
A Virtual Private Network Deployment Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 225-226, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
telecommunication network planning, layered VPN planning, virtual private network deployment, VPN technology, legacy networks, interoperability, network security, firewalls, open systems, survivability, authorisation, telecommunication security, business communication, telecommunication network reliability, legacy applications |
18 | Pieter Liefooghe, Marnix Goossens |
An Architecture for Seamless Access to Multicast Content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 488-494, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
seamless access, multicast content, transparent access, multicast infrastructure, dynamic tunnel server location, rare-based path characterization, UMTP, dynamic congestion discovery, tunnel hand-over mechanism, session directory application, session announcements, SAP/SDP proxy location, SAP/SDP query mechanism, IP multicast packets, computer networks, transport protocols, packet switching, firewalls, network architecture, multicast communication, authorisation, network servers |
18 | Samuel Patton, David Doss, William Yurcik |
Open Source Versus Commercial Firewalls: Functional Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 223-224, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system |
18 | Joshua D. Guttman |
Filtering Postures: Local Enforcement for Global Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 120-129, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation |
18 | Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong |
Secure Software Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 84-93, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry |
18 | Mark Vandenwauver, René Govaerts, Joos Vandewalle |
How Role Based Access Control is Implemented in SESAME. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 293-298, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
role-based access control enforcement scheme, SESAME project, distributed heterogeneous computing environment, RACE project, ECMA, user credentials representation, demonstration applications, API, authorisation, group support system, application development |
18 | Mats Gustafsson, Benoit Deligny, Nahid Shahmehri |
Using NFS to Implement Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 299-304, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Linux User Space NFS Server, exported file system, access control information management, Linux 2.0 system, performance, distributed systems, role-based access control, legacy systems, authorisation, code optimization, Network File System |
18 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 285-292, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
18 | Robert N. Smith, Sourav Bhattacharya |
Firewall placement in a large network topology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 40-45, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree |
18 | Eberhard von Faber, R. Hammelrath, F.-P. Heider |
The Secure Distribution of Digital Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 16-, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems |
18 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 24-33, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
18 | J. Hoffman |
Implementing RBAC on a Type Enforced System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 158-163, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
18 | Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk |
Case-Based Reasoning for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 214-223, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation |
18 | Trent Jaeger, Atul Prakash 0001 |
Implementation of a discretionary access control model for script-based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: The Eighth IEEE Computer Security Foundations Workshop (CSFW '95), March 13-15, 1995, Kenmare, County Kerry, Ireland, pp. 70-84, 1995, IEEE Computer Society, 0-8186-7033-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
discretionary access control model, script-based systems, World-wide Web browsing tool, security of data, authorisation, Mosaic, prototype system, unauthorized access |
18 | I-Lung Kao, Randy Chow |
Enforcing complex security policies for commercial applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 19th International Computer Software and Applications Conference (COMPSAC'95), August 9-11, 1995, Dallas, Texas, USA, pp. 402-408, 1995, IEEE Computer Society, 0-8186-7119-X. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
complex security policy enforcement, commercial applications, complex access control policies, multilevel security model, systematic frequently-desired multilevel exception categorization, commercial sectors, classified categories, Boolean functions, exception handling, security of data, authorisation, Boolean expressions |
18 | Sul Passicieh, John Zepper |
Technology transfer in Sandia's scientific areas. The engineering sciences Technology Information Environment- Systematic approach to security, privacy and appropriate access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 689-699, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
engineering information systems, scientific information systems, computerized technology transfer mechanism, Sandia National Laboratories, engineering sciences, Technology Information Environment for Industry, TIE-IN, appropriate access issues, system design, security of data, technology transfer, authorisation, data privacy, electronic data interchange, privacy issues, security issues |
18 | Randy Chow, I-Lung Kao |
Modeling complex access control policies in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 404-411, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions |
18 | Brigitte Wirtz |
Stroke-based time warping for signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 179-182, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
stroke-based time warping, function-based signature verification, positional data, 3D nonlinear correlation, signature signals, stroke index, DP index, finite state automaton, reference strokes, dynamic programming, dynamic programming, handwriting recognition, image matching, finite automata, authorisation, correlation methods, pressure, dynamic data, dynamic signature verification |
18 | Ke Han, Ishwar K. Sethi |
Signature identification via local association of features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 187-190, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
signature identification, local association of features, automatic search, signature database, finite symbols, local associative indexing, performance, feature extraction, indexing, handwriting recognition, image matching, image matching, software performance evaluation, search problems, visual databases, authorisation, strings, signature verification, geometric features, spatial distribution, topologic features |
18 | Frédéric Bauer, Brigitte Wirtz |
Parameter reduction and personalized parameter selection for automatic signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 183-186, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
parameter reduction, personalized parameter selection, automatic signature verification, reduced parameter set, function-based system, parameter estimation, statistical analysis, handwriting recognition, pattern classification, security of data, statistical methods, authorisation, linear classifier |
13 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding support to XACML for multi-domain user to user dynamic delegation of authority. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(2), pp. 137-152, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Delegation of authority, Credential validation service, RBAC, XACML |
13 | Alvaro E. Arenas, Jean-Pierre Banâtre, Thierry Priol |
Developing Autonomic and Secure Virtual Organisations with Chemical Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 75-89, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Guillermo Navarro-Arribas, Joaquín García-Alfaro |
A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 164-175, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Li Yao, Ning Zhang 0001 |
A Generic Authentication LoA Derivation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 98-108, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Flutra Osmani, Adriaan Slabbert |
A scalable distributed security infrastructure for industrial control and sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, IWCMC 2009, Leipzig, Germany, June 21-24, 2009, pp. 84-89, 2009, ACM, 978-1-60558-569-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
decentralized security, industrial control and sensor networks, PKI, IEEE 802.15.4, XACML |
13 | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy |
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 196-214, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blind identity-based encryption, public key encryption with keyword search, searchable encryption |
13 | Khaled Gaaloul, François Charoy, Andreas Schaad |
Modelling task delegation for human-centric eGovernment workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 79-87, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
access control, workflow, delegation, task, eGovernment |
13 | Simon Hay, Robert K. Harle |
Bluetooth Tracking without Discoverability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LoCA ![In: Location and Context Awareness, 4th International Symposium, LoCA 2009, Tokyo, Japan, May 7-8, 2009, Proceedings, pp. 120-137, 2009, Springer, 978-3-642-01720-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang |
Modelling Security Properties in a Grid-based Operating System with Anti-Goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1429-1436, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Grid, Requirement Engineering |
13 | Maciej P. Machulak, Simon E. Parkin, Aad P. A. van Moorsel |
Architecting Dependable Access Control Systems for Multi-domain Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WADS ![In: Architecting Dependable Systems VI, pp. 49-75, 2008, Springer, 978-3-642-10247-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Liang Xiao 0002, Paul H. Lewis, Alex Gibb |
Developing a security protocol for a distributed decision support system in a healthcare environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 30th International Conference on Software Engineering (ICSE 2008), Leipzig, Germany, May 10-18, 2008, pp. 673-682, 2008, ACM, 978-1-60558-079-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed decision support system, healthcare, security model |
13 | Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang, Anthony Stell, John P. Watt |
User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Gener. Comput. ![In: New Gener. Comput. 25(4), pp. 339-354, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Epidemiological Studies, Neurological Research, Security, Grids, Clinical Trials, Shibboleth |
13 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Extending Role Based Access Control Model for Distributed Multidomain Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 301-312, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Brian Shields, Owen Molloy |
Using Description Logic and Rules to Determine XML Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 718-724, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Kevin P. Twidle, Emil Lupu |
Ponder2 - Policy-Based Self Managed Cells. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
AIMS ![In: Inter-Domain Management, First International Conference on Autonomous Infrastructure, Management and Security, AIMS 2007, Oslo, Norway, June 21-22, 2007, Proceedings, pp. 230, 2007, Springer, 978-3-540-72985-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Óscar Corcho, Pinar Alper, Paolo Missier, Sean Bechhofer, Carole A. Goble, Wei Xing |
Metadata Management in S-OGSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (2) ![In: Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27 - 30, 2007, Proceedings, Part II, pp. 712-719, 2007, Springer, 978-3-540-72585-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick |
Flexible and Manageable Delegation of Authority in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 453-458, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Richard O. Sinnott, David W. Chadwick, Jos Koetsier, O. Otenko, John P. Watt, Tuan-Anh Nguyen |
Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 22, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Bill Eklow, Ben Bennetts |
New Techniques for Accessing Embedded Instrumentation: IEEE P1687 (IJTAG). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETS ![In: 11th European Test Symposium, ETS 2006, Southhampton, UK, May 21-24, 2006, pp. 253-254, 2006, IEEE Computer Society, 0-7695-2566-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier |
Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 950-957, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Víctor Torres, Jaime Delgado, Silvia Llorente |
An Implementation of a Trusted and Secure DRM Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 312-321, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secure content management, multimedia content protection, digital rights management systems |
13 | Willy Weisz |
Towards More Flexible and Increased Security and Privacy in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2006 Workshops: Parallel Processing, CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Dresden, Germany, August 29-September 1, 2006, Revised Selected Papers, pp. 205-214, 2006, Springer, 978-3-540-72226-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Russell Lock |
Automated Negotiation for Service Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: 30th Annual International Computer Software and Applications Conference, COMPSAC 2006, Chicago, Illinois, USA, September 17-21, 2006. Volume 2, pp. 127-134, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Lauri I. W. Pesonen, David M. Eyers, Jean Bacon |
A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2006 International Symposium on Applications and the Internet (SAINT 2006), 23-27 January 2006, Phoenix, Arizona, USA, pp. 222-228, 2006, IEEE Computer Society, 0-7695-2508-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Kevin Tham, Mark Looi, Ernest Foo |
Ubiquitous Authorization Scheme Based on Device Profile. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 312-321, 2006, Springer, 3-540-36850-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones |
A Compositional Event & Time-Based Policy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 5-7 June 2006, London, Ontario, Canada, pp. 173-182, 2006, IEEE Computer Society, 0-7695-2598-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Christian Schläger, Thomas Nowey |
Towards a Risk Management Perspective on AAIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, Third International Conference, TrustBus 2006, Krakow, Poland, September 4-8, 2006, Proceedings, pp. 41-50, 2006, Springer, 3-540-37750-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Stephen Gorton, Stephan Reiff-Marganiec |
Policy Support for Business-oriented Web Service Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LA-WEB ![In: Fourth Latin American Web Congress (LA-Web 2006), 25-27 October 2006, Cholula, Puebla, Mexico, pp. 199-202, 2006, IEEE Computer Society, 0-7695-2693-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meacham, Simon J. Coles, Michael B. Hursthouse, Mark E. Light, Hugo R. Mills, David De Roure, Graham Smith, Ed Zaluska |
Grid-Enabling an Existing Instrument-Based National Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: First International Conference on e-Science and Grid Technologies (e-Science 2005), 5-8 December 2005, Melbourne, Australia, pp. 570-577, 2005, IEEE Computer Society, 0-7695-2448-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Lauri I. W. Pesonen, Jean Bacon |
Secure event types in content-based, multi-domain publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEM ![In: Proceedings of the 5th International Workshop on Software Engineering and Middleware, SEM 2005, Lisbon, Portugal, September 5-6, 2005, pp. 98-105, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Sye Loong Keoh, Emil Lupu |
An Efficient Access Control Model for Mobile Ad-Hoc Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 210-224, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Richard O. Sinnott, A. J. Stell, John P. Watt |
Experiences in teaching grid computing to advanced level students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 5th International Symposium on Cluster Computing and the Grid (CCGrid 2005), 9-12 May, 2005, Cardiff, UK, pp. 51-58, 2005, IEEE Computer Society, 0-7803-9074-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Adrian Paschke, Martin Bichler |
SLA Representation, Management and Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March - 1 April 2005, Hong Kong, China, pp. 158-163, 2005, IEEE Computer Society, 0-7695-2274-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Richard M. Guest, Michael C. Fairhurst, Claus Vielhauer |
Towards a Flexible Framework for Open Source Software for Handwritten Signature Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GfKl ![In: From Data and Information Analysis to Knowledge Engineering, Proceedings of the 29th Annual Conference of the Gesellschaft für Klassifikation e.V., University of Magdeburg, March 9-11, 2005, pp. 622-629, 2005, Springer, 978-3-540-31313-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Jaime Delgado, Jose Prados, Eva Rodríguez |
Profiles for Interoperability between MPEG-21 REL and OMA DRM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEC ![In: 7th IEEE International Conference on E-Commerce Technology (CEC 2005), 19-22 July 2005, München, Germany, pp. 518-521, 2005, IEEE Computer Society, 0-7695-2277-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Gansen Zhao, David W. Chadwick |
Evolving Messaging Systems for Secure Role Based Messaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 16-20 June 2005, Shanghai, China, pp. 216-223, 2005, IEEE Computer Society, 0-7695-2284-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Diego R. López, Chelo Malagon, Licia Florio |
TACAR: a Simple and Fast Way for Building Trust among PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 173-179, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust link, trust anchor, policy, Certificate, repository |
13 | Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari |
A Scalable and Roboust QoS Architecture for WiFi P2P Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 65-74, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
13 | Simon N. Foley, Thomas B. Quillinan, Maeve O'Connor, Barry P. Mulcahy, John P. Morrison |
A Framework for Heterogeneous Middleware Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), CD-ROM / Abstracts Proceedings, 26-30 April 2004, Santa Fe, New Mexico, USA, 2004, IEEE Computer Society, 0-7695-2132-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TrustManagement, Security, Web Services, Middleware, Interoperability, Role Based Access Control |
Displaying result #201 - #300 of 331 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ >>] |
|