The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorisation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-1997 (25) 1999-2000 (34) 2001-2002 (15) 2003 (18) 2004 (22) 2005 (32) 2006 (27) 2007 (30) 2008 (23) 2009 (19) 2010-2011 (20) 2012-2014 (20) 2015-2018 (19) 2019-2021 (17) 2022-2023 (10)
Publication types (Num. hits)
article(75) incollection(1) inproceedings(246) phdthesis(9)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 497 occurrences of 312 keywords

Results
Found 331 publication records. Showing 331 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Sarath Indrakanti, Vijay Varadharajan, Rajat Kumar Todi Authorisation Service in .Net My Services. Search on Bibsonomy ICWI The full citation details ... 2003 DBLP  BibTeX  RDF
21Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi Secure Authorisation for Web Services. Search on Bibsonomy DBSec The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Alwyn Goh, David Ngo Chek Ling Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Martin S. Olivier, Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. Search on Bibsonomy Data Knowl. Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
21Jason Crampton, George Loizou Authorisation and antichains. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Jude T. Regan, Christian Damsgaard Jensen Capability File Names: Separating Authorisation From User Management in an Internet File System. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2001 DBLP  BibTeX  RDF
21Wolfgang Naraschewski Teams as types: a formal treatment of authorisation in groupware. (PDF / PS) Search on Bibsonomy 2001   RDF
21Martin S. Olivier, Ehud Gudes Wrappers - a mechanism to support state-based authorisation in Web applications. Search on Bibsonomy DBSec The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Richard Au, Mark Looi, Paul Ashley Towards a New Authorisation Paradigm for Extranets. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Marco Cremonini, Andrea Omicini, Franco Zambonelli Coordination in Context: Authentication, Authorisation and Topology in Mobile Agent Applications. Search on Bibsonomy COORDINATION The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21José Andany, Christer Bjorkendal, Fabrizio Massimo Ferrara, Jean-Raoul Scherrer, Stéphane Spahni Authorisation & Security aspects in the Middleware-based healthcare information system. Search on Bibsonomy MIE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Marie Rose Low, James A. Malcolm A Joint Authorisation Scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21Yun Bai 0001, Vijay Varadharajan Analysis and Implementation of a Formal Authorisation Policy Design Approach. Search on Bibsonomy ACISP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21P. V. McMahon SESAME V2 public key and authorisation extensions to Kerberos. Search on Bibsonomy NDSS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
18Fotios Gogoulos, Anna Antonakopoulou, Georgios V. Lioudakis, Aziz S. Mousas, Dimitra I. Kaklamani, Iakovos S. Venieris Privacy-Aware Access Control and Authorization in Passive Network Monitoring Infrastructures. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF semantic information model, privacy, access control, authorisation, passive network monitoring
18Theo Dimitrakos Common Capabilities for Service Oriented Infrastructures and Platforms: An Overview. Search on Bibsonomy ECOWS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Entitelement, Licence Management, Web Services, SOA, Grid, Service Level Agreements, Cloud, Portals, Authorisation, Virtual Organisations, Identity Federation
18Yuri Demchenko, Cees de Laat, Oscar Koeroo, David L. Groep Re-thinking Grid Security Architecture. Search on Bibsonomy eScience The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Open Grid Security Architecture, Security Context, Authorisation session, Authentication, Grids, Security models, Reference Monitor, Trusted Computing Base
18Kevin P. Twidle, Emil Lupu, Naranker Dulay, Morris Sloman Ponder2 - A Policy Environment for Autonomous Pervasive Systems. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ponder2, Self-Managed Cell, PonderTalk, Policy, Authorisation, Pervasive, Obligation
18Gideon Ranga, Stephen Flowerday Identity and access management for the distribution of social grants in South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF federated and isolated identity management architectures, identity and access management, authentication, authorisation
18Brian Shields, Owen Molloy, Gerard Lyons, Jim Duggan Using semantic rules to determine access control for web services. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OWL, authorisation, web service security, SWRL
18Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn Formal specification of role-based security policies for clinical information systems. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authorisation constraints, healthcare environments, LTL
18David O'Callaghan, Brian A. Coghlan Bridging Secure WebCom and European DataGrid Security for Multiple VOs over Multiple Grids. Search on Bibsonomy ISPDC/HeteroPar The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security, Authentication, Grid, Interoperability, Authorisation
18Peter Gutmann A Reliable, Scalable General-Purpose Certificate Store. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF general-purpose certificate store, scalability, standards, operating system, software reliability, software reliability, availability, public key cryptography, public key cryptography, PKI, error recovery, authorisation
18E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
18Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
18Michael A. Schneider, Edward W. Felten Efficient Commerce Protocols based on One-Time Pads. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad
18Ezedin Barka, Ravi S. Sandhu Framework for Role-based Delegation Models. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF role-based delegation models, authorisation
18Jeremy Epstein, L. Thomas, Eric Monteith Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software
18Reiner Sailer, Matthias Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks
18Jalal Al-Muhtadi, Manish Anand, M. Dennis Mickunas, Roy H. Campbell Secure Smart Homes using Jini and UIUC SESAME. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure smart homes, dynamically configurable consumer devices, distributed security mechanism, Tiny SESAME, distributed devices, Java, Java, access control, distributed processing, public key cryptography, public key cryptography, handheld devices, authorisation, Jini, component-based software, home automation, Kerberos, access rights, Sun Microsystems, smart devices
18André L. M. dos Santos, Richard A. Kemmerer Implementing Security Policies using the Safe Areas of Computation Approach. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks
18Victoria Ungureanu, F. Vesuna, Naftaly H. Minsky A Policy-based Access Control Mechanism for the Corporate Web. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF policy-based access control mechanism, corporate Web, security problems, management problems, corporate intranet, formal statement, policy engines, business data processing, authorisation, intranets, intranets, access control lists
18P. C. Clark, M. C. Meissner, K. O. Vance Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data
18Pablo Galiasso, Oliver Bremer, John Hale, Sujeet Shenoi, David F. Ferraiolo, Vincent C. Hu Policy Mediation for Multi-Enterprise Environments. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF policy mediation, multi-enterprise environments, uniform security services, heterogeneous information networks, access control policy management, large enterprise information networks, Policy Machine, Policy Mediation Architecture, software architecture, middleware, static analysis, business data processing, authorisation, information networks, formal techniques, software infrastructures
18John Hale, Mauricio Papa, Oliver Bremer, Rodrigo Chandia, Sujeet Shenoi Extending Java for Package based Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF package based access control, programmable security, TBAC, primitive ticket, language translation preprocessor, security service library, ticket management, Java, object-oriented programming, RBAC, MAC, source code, software libraries, syntax, authorisation, program interpreters, DAC, Java language, bytecode interpretation
18Uwe Jendricke, Daniela Gerd tom Markotten Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security mechanism usability, protection goals, personal security assistant, security functions configuration, security functionality, user identity selection, inexperienced users, security needs negotiation, Internet, user interfaces, user interface, human factors, Identity-Manager, personal computing, Internet applications, authorisation, telecommunication security
18Heejin Jang, Sangwook Kim A Self-Extension Monitoring for Security Management. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF self-extension monitoring, information security patterns, active security protection, intruder identification system, authorisation, security management, hackers, information infrastructures, computer crime, information warfare
18Petra Wohlmacher, Peter Pharow Applications in Health Care using Public-Key Certificates and Attribute Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures
18Antonio Corradi, Rebecca Montanari, Cesare Stefanelli, Emil Lupu, Morris Sloman A Flexible Access Control Service for Java Mobile Code. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF flexible access control service, Java mobile code, remote servers, distributed heterogeneous clients, foreign code execution, host node protection, code protection, sandbox model, downloaded code, source location, inter-organisational environments, expressive languages, Ponder, Java security architecture, Java, Internet, specification languages, security policies, signature, distributed programming, Internet applications, authorisation, declarative language, technology diffusion, dynamic loading
18Konstantin Knorr Dynamic Access Control through Petri Net Workflows. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control
18Samuel Patton, David Doss, William Yurcik Distributed Weakness in Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF distributed weakness, corporate VPN, routing attack, VPN tunnel endpoints, coordinated filtering, corporate firewall, network security, transport protocols, packet switching, network topology, network topology, telecommunication network routing, authorisation, IP network, telecommunication networks, telecommunication security, Internet service, virtual private networks, business communication
18Samuel Patton, Bryan Smith, David Doss, William Yurcik A Virtual Private Network Deployment Framework. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF telecommunication network planning, layered VPN planning, virtual private network deployment, VPN technology, legacy networks, interoperability, network security, firewalls, open systems, survivability, authorisation, telecommunication security, business communication, telecommunication network reliability, legacy applications
18Pieter Liefooghe, Marnix Goossens An Architecture for Seamless Access to Multicast Content. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF seamless access, multicast content, transparent access, multicast infrastructure, dynamic tunnel server location, rare-based path characterization, UMTP, dynamic congestion discovery, tunnel hand-over mechanism, session directory application, session announcements, SAP/SDP proxy location, SAP/SDP query mechanism, IP multicast packets, computer networks, transport protocols, packet switching, firewalls, network architecture, multicast communication, authorisation, network servers
18Samuel Patton, David Doss, William Yurcik Open Source Versus Commercial Firewalls: Functional Comparison. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF corporate applications, commercial firewalls, security risks, Cisco, IOS firewall feature set, Internet, Internet, open source, open source software, open systems, network operating systems, authorisation, telecommunication security, virtual private network, business communication, Linux operating system
18Joshua D. Guttman Filtering Postures: Local Enforcement for Global Policies. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF filtering postures, global policy local enforcement, global network access control, optimal service, network topology, security policy, routers, authorisation, packet filtering, prototype implementation
18Mark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong Secure Software Architectures. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure software architectures, open architectural standards, competitive success, secure system design, X/Open distributed transaction processing reference architecture, secure access control, Bell-LaPadula model, formal methods, authorisation, security properties, computer industry
18Mark Vandenwauver, René Govaerts, Joos Vandewalle How Role Based Access Control is Implemented in SESAME. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF role-based access control enforcement scheme, SESAME project, distributed heterogeneous computing environment, RACE project, ECMA, user credentials representation, demonstration applications, API, authorisation, group support system, application development
18Mats Gustafsson, Benoit Deligny, Nahid Shahmehri Using NFS to Implement Role-Based Access Control. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Linux User Space NFS Server, exported file system, access control information management, Linux 2.0 system, performance, distributed systems, role-based access control, legacy systems, authorisation, code optimization, Network File System
18Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets
18Robert N. Smith, Sourav Bhattacharya Firewall placement in a large network topology. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF firewall placement heuristics, large network topology, multi-user distributed information environment, firewall cascade, potential attack point, comprehensive security protection, end-to-end security protection, simulation, performance, network security, completeness, authorisation, operations research, cost optimization, delay minimization, sensitive data, confidence degree
18Eberhard von Faber, R. Hammelrath, F.-P. Heider The Secure Distribution of Digital Contents. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure distribution, encrypted digital contents, freely accessible distribution media, key management system, payment authorisation, casual customers, nonregistered users, software setup, contract conclusion, registration processes, content re-selling, business-to-business environment, cryptography, electronic commerce, workflow management, decryption, payment systems
18C. Cant, Simon R. Wiseman Simple Assured Bastion Hosts. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation
18J. Hoffman Implementing RBAC on a Type Enforced System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system
18Mansour Esmaili, Bala Balachandran, Reihaneh Safavi-Naini, Josef Pieprzyk Case-Based Reasoning for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF model based expert systems, case based reasoning approach, artificial intelligence, intrusion detection, authorisation
18Trent Jaeger, Atul Prakash 0001 Implementation of a discretionary access control model for script-based systems. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF discretionary access control model, script-based systems, World-wide Web browsing tool, security of data, authorisation, Mosaic, prototype system, unauthorized access
18I-Lung Kao, Randy Chow Enforcing complex security policies for commercial applications. Search on Bibsonomy COMPSAC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF complex security policy enforcement, commercial applications, complex access control policies, multilevel security model, systematic frequently-desired multilevel exception categorization, commercial sectors, classified categories, Boolean functions, exception handling, security of data, authorisation, Boolean expressions
18Sul Passicieh, John Zepper Technology transfer in Sandia's scientific areas. The engineering sciences Technology Information Environment- Systematic approach to security, privacy and appropriate access. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF engineering information systems, scientific information systems, computerized technology transfer mechanism, Sandia National Laboratories, engineering sciences, Technology Information Environment for Industry, TIE-IN, appropriate access issues, system design, security of data, technology transfer, authorisation, data privacy, electronic data interchange, privacy issues, security issues
18Randy Chow, I-Lung Kao Modeling complex access control policies in distributed systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions
18Brigitte Wirtz Stroke-based time warping for signature verification. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF stroke-based time warping, function-based signature verification, positional data, 3D nonlinear correlation, signature signals, stroke index, DP index, finite state automaton, reference strokes, dynamic programming, dynamic programming, handwriting recognition, image matching, finite automata, authorisation, correlation methods, pressure, dynamic data, dynamic signature verification
18Ke Han, Ishwar K. Sethi Signature identification via local association of features. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF signature identification, local association of features, automatic search, signature database, finite symbols, local associative indexing, performance, feature extraction, indexing, handwriting recognition, image matching, image matching, software performance evaluation, search problems, visual databases, authorisation, strings, signature verification, geometric features, spatial distribution, topologic features
18Frédéric Bauer, Brigitte Wirtz Parameter reduction and personalized parameter selection for automatic signature verification. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF parameter reduction, personalized parameter selection, automatic signature verification, reduced parameter set, function-based system, parameter estimation, statistical analysis, handwriting recognition, pattern classification, security of data, statistical methods, authorisation, linear classifier
13David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen Adding support to XACML for multi-domain user to user dynamic delegation of authority. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Delegation of authority, Credential validation service, RBAC, XACML
13Alvaro E. Arenas, Jean-Pierre Banâtre, Thierry Priol Developing Autonomic and Secure Virtual Organisations with Chemical Programming. Search on Bibsonomy SSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Guillermo Navarro-Arribas, Joaquín García-Alfaro A Policy Based Approach for the Management of Web Browser Resources to Prevent Anonymity Attacks in Tor. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Li Yao, Ning Zhang 0001 A Generic Authentication LoA Derivation Model. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Flutra Osmani, Adriaan Slabbert A scalable distributed security infrastructure for industrial control and sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF decentralized security, industrial control and sensor networks, PKI, IEEE 802.15.4, XACML
13Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blind identity-based encryption, public key encryption with keyword search, searchable encryption
13Khaled Gaaloul, François Charoy, Andreas Schaad Modelling task delegation for human-centric eGovernment workflows. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF access control, workflow, delegation, task, eGovernment
13Simon Hay, Robert K. Harle Bluetooth Tracking without Discoverability. Search on Bibsonomy LoCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Alvaro Arenas, Benjamin Aziz, Juan Bicarregui, Brian Matthews, Erica Y. Yang Modelling Security Properties in a Grid-based Operating System with Anti-Goals. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Grid, Requirement Engineering
13Maciej P. Machulak, Simon E. Parkin, Aad P. A. van Moorsel Architecting Dependable Access Control Systems for Multi-domain Computing Environments. Search on Bibsonomy WADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Liang Xiao 0002, Paul H. Lewis, Alex Gibb Developing a security protocol for a distributed decision support system in a healthcare environment. Search on Bibsonomy ICSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed decision support system, healthcare, security model
13Richard O. Sinnott, Oluwafemi O. Ajayi, Jipu Jiang, Anthony Stell, John P. Watt User-oriented Security Supporting Inter-disciplinary Life Science Research across the Grid. Search on Bibsonomy New Gener. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Epidemiological Studies, Neurological Research, Security, Grids, Clinical Trials, Shibboleth
13Yuri Demchenko, Leon Gommans, Cees de Laat Extending Role Based Access Control Model for Distributed Multidomain Applications. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Brian Shields, Owen Molloy Using Description Logic and Rules to Determine XML Access Control. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Kevin P. Twidle, Emil Lupu Ponder2 - Policy-Based Self Managed Cells. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Óscar Corcho, Pinar Alper, Paolo Missier, Sean Bechhofer, Carole A. Goble, Wei Xing Metadata Management in S-OGSA. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Tuan-Anh Nguyen, Linying Su, George Inman, David W. Chadwick Flexible and Manageable Delegation of Authority in RBAC. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Richard O. Sinnott, David W. Chadwick, Jos Koetsier, O. Otenko, John P. Watt, Tuan-Anh Nguyen Supporting Decentralized, Security Focused Dynamic Virtual Organizations across the Grid. Search on Bibsonomy e-Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Bill Eklow, Ben Bennetts New Techniques for Accessing Embedded Instrumentation: IEEE P1687 (IJTAG). Search on Bibsonomy ETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Richard O. Sinnott, Micha Bayer, A. J. Stell, Jos Koetsier Grid Infrastructures for Secure Access to and Use of Bioinformatics Data: Experiences from the BRIDGES Project. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Víctor Torres, Jaime Delgado, Silvia Llorente An Implementation of a Trusted and Secure DRM Architecture. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure content management, multimedia content protection, digital rights management systems
13Willy Weisz Towards More Flexible and Increased Security and Privacy in Grids. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Russell Lock Automated Negotiation for Service Contracts. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Lauri I. W. Pesonen, David M. Eyers, Jean Bacon A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. Search on Bibsonomy SAINT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Kevin Tham, Mark Looi, Ernest Foo Ubiquitous Authorization Scheme Based on Device Profile. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones A Compositional Event & Time-Based Policy Model. Search on Bibsonomy POLICY The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Christian Schläger, Thomas Nowey Towards a Risk Management Perspective on AAIs. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Stephen Gorton, Stephan Reiff-Marganiec Policy Support for Business-oriented Web Service Management. Search on Bibsonomy LA-WEB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Jeremy G. Frey, Sam Peppe, Mike Surridge, Ken Meacham, Simon J. Coles, Michael B. Hursthouse, Mark E. Light, Hugo R. Mills, David De Roure, Graham Smith, Ed Zaluska Grid-Enabling an Existing Instrument-Based National Service. Search on Bibsonomy e-Science The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Lauri I. W. Pesonen, Jean Bacon Secure event types in content-based, multi-domain publish/subscribe systems. Search on Bibsonomy SEM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Sye Loong Keoh, Emil Lupu An Efficient Access Control Model for Mobile Ad-Hoc Communities. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Richard O. Sinnott, A. J. Stell, John P. Watt Experiences in teaching grid computing to advanced level students. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Adrian Paschke, Martin Bichler SLA Representation, Management and Enforcement. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Richard M. Guest, Michael C. Fairhurst, Claus Vielhauer Towards a Flexible Framework for Open Source Software for Handwritten Signature Analysis. Search on Bibsonomy GfKl The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Jaime Delgado, Jose Prados, Eva Rodríguez Profiles for Interoperability between MPEG-21 REL and OMA DRM. Search on Bibsonomy CEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Gansen Zhao, David W. Chadwick Evolving Messaging Systems for Secure Role Based Messaging. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Diego R. López, Chelo Malagon, Licia Florio TACAR: a Simple and Fast Way for Building Trust among PKIs. Search on Bibsonomy EuroPKI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF trust link, trust anchor, policy, Certificate, repository
13Sathish Rajasekhar, Ibrahim Khalil, Zahir Tari A Scalable and Roboust QoS Architecture for WiFi P2P Networks. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Simon N. Foley, Thomas B. Quillinan, Maeve O'Connor, Barry P. Mulcahy, John P. Morrison A Framework for Heterogeneous Middleware Security. Search on Bibsonomy IPDPS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TrustManagement, Security, Web Services, Middleware, Interoperability, Role Based Access Control
Displaying result #201 - #300 of 331 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license