|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
34 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
A Logic Model for Temporal Authorization Delegation with Negation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 310-324, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Shiguang Ju, Zhen Yang, Chang-da Wang 0001, Dianchun Guo |
The Analysis of Authorization Mechanisms in the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 1047-1050, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Ramaswamy Chandramouli |
A Policy Validation Framework for Enterprise Authorization Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA, pp. 319-328, 2003, IEEE Computer Society, 0-7695-2041-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Altair Olivo Santin, Joni da Silva Fraga, Frank Siqueira, Emerson Ribeiro de Mello |
Federation Web: A Scheme to Compound Authorization Chains on Large-Scale Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 6-8 October 2003, Florence, Italy, pp. 66-75, 2003, IEEE Computer Society, 0-7695-1955-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
A context-related authorization and access control method based on RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 117-124, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure health care system, trust infrastructure, role based access control (RBAC) |
34 | Jie Dai, Jim Alves-Foss |
Certificate Based Authorization Simulation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 190-195, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Babu Sundaram, Barbara M. Chapman |
Policy Engine: A Framework for Authorization, Accouting Policy Specification and Evaluation in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: Grid Computing - GRID 2001, Second International Workshop, Denver, CO, USA, November 12, 2001, Proceedings, pp. 145-153, 2001, Springer, 3-540-42949-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Heiko Ludwig, Luke O'Connor, Simon Kramer 0001 |
MIERA: Method for Inter-Enterprise Role-Based Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: Electronic Commerce and Web Technologies, First International Conference, EC-Web 2000, London, UK, September 4-6, 2000, Proceedings, pp. 133-144, 2000, Springer, 3-540-67981-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
34 | G. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman |
Authorization for Metacomputing Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, HPDC '98, Chicago, Illinois, USA, July 28-31, 1998., pp. 132-139, 1998, IEEE Computer Society, 0-8186-8579-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
33 | Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang |
An Improved Role-Based Workflow Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 551-556, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization restriction, Access control, workflow, transaction, task |
33 | Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu 0001 |
Minimal Threshold Closure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 145-155, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Threshold Closure, Access Control, Authorization, Threshold Schemes |
33 | Thomas Sandholm, Kevin Lai, Jorge Andrale Ortiz, Jacob Odeberg |
Market-Based Resource Allocation using Price Prediction in a High Performance Computing Grid for Scientific Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, HPDC-15, Paris, France, June 19-23, 2006, pp. 132-143, 2006, IEEE, 1-4244-0307-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bioinformatics application, market-based resource allocation, high performance grid computing, money-transfer token, identity-based authorization, quality of service, access control, scientific application, statistical multiplexing, computational market, price prediction |
33 | Martin Wimmer 0001, Pia Ehrnlechner, Armin Fischer, Alfons Kemper |
Flexible Autorisierung in Datenbank-basierten Web Service-Föderationen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Forsch. Entwickl. ![In: Inform. Forsch. Entwickl. 20(3), pp. 167-181, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Loosely and tightly coupled systems, Service oriented architectures, Caching, Authorization |
33 | Victoria Ungureanu |
Efficient support for enterprise delegation policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 340-345, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
decentralized authorization, delegation chain, delegation policy |
33 | Isaac Agudo, Javier López 0001, José A. Montenegro |
A Representation Model of Trust Relationships with Delegation Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 116-130, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privilege Management Infrastructure (PMI), Authorization, Delegation, Graph representation, Attribute Certificate |
33 | Jason Crampton |
A reference monitor for workflow systems with constrained task execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 38-47, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
entailment constraint, workflow system, reference monitor, authorization constraint |
33 | Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana |
Semantic Access Control Model: A Formal Specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 24-43, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Formal Methods in security, Access Control, Authorization, Distributed Systems Security |
33 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou |
Integrated Access Control and Intrusion Detection for Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 841-850, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Apache Web server, Access control, intrusion detection, authorization, security policy |
33 | Alessandro Bassi, Julien Laganier |
Towards an IPv6-Based Security Framework for Distributed Storage Resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 54-64, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
IBP, authorization certificates, CBID, IPv6, IPsec, CGA, SPKI |
33 | Chooi-Tian Lee, Jack W. Harris |
Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 21st Conference on Local Computer Networks, Minneapolis, Minnesota, USA, October 13-16, 1996, pp. 116-125, 1996, IEEE Computer Society, 0-8186-7617-5. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program |
32 | Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin |
Toward practical authorization-dependent user obligation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 180-191, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RBAC, policy, accountability, obligations, authorization systems |
32 | Arlindo L. Marcon Jr., Altair Olivo Santin, Luiz A. de Paula Lima Jr., Maicon Stihler |
Policy management architecture based on provisioning model and authorization certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 1594-1598, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authorization certificates and web services security, policy provisioning, policy management |
32 | Jong Sik Moon, Deok-Gyu Lee, Im-Yeong Lee |
Device Authentication/Authorization Protocol for Home Network in Next Generation Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 760-768, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Home Network, Roaming |
32 | Limin Jia 0001, Jeffrey A. Vaughan, Karl Mazurak, Jianzhou Zhao, Luke Zarko, Joseph Schorr, Steve Zdancewic |
AURA: a programming language for authorization and audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFP ![In: Proceeding of the 13th ACM SIGPLAN international conference on Functional programming, ICFP 2008, Victoria, BC, Canada, September 20-28, 2008, pp. 27-38, 2008, ACM, 978-1-59593-919-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, type systems, audit, authorization logic |
32 | Daisy Daiqin He, Jian Yang 0001 |
Identify Authorization Control Requirement in Business Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC (2) ![In: 2008 IEEE International Conference on Services Computing (SCC 2008), 8-11 July 2008, Honolulu, Hawaii, USA, pp. 561-562, 2008, IEEE Computer Society, 978-0-7695-3283-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization control, business collaboration, collaboration, access control, security policy |
32 | Ulrich Flegel, Michael Meier 0001 |
Authorization Architectures for Privacy-Respecting Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection |
32 | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia |
Decentralized authorization and data security in web content delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 1654-1661, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
web, data integrity, authorization, content delivery networks |
32 | Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim |
Security Framework for Home Network: Authentication, Authorization, and Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD Workshops ![In: Emerging Technologies in Knowledge Discovery and Data Mining, PAKDD 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers, pp. 621-628, 2007, Springer, 978-3-540-77016-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Authentication, Access Control, Authorization, Security Policy, Home Network |
32 | Roberto Barbera, Alberto Falzone, Valeria Ardizzone, Diego Scardaci |
The GENIUS Grid Portal: Its Architecture, Improvements of Features, and New Implementations about Authentication and Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 16th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises (WETICE 2007), 18-20 June 2007, Paris, France, pp. 279-283, 2007, IEEE Computer Society, 0-7695-2879-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Grid Web Portal, Global Security Infrastructure, Virtual Organization Membership Service, User Authorization, Grid Computing, Information and Communication Technology, User Authentication, Grid Application |
32 | Jong P. Yoon |
Presto Authorization: A Bitmap Indexing Scheme for High-Speed Access Control to XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(7), pp. 971-987, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization enforcement, Information security, bitmap indexing, XML access control |
32 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
A usage-based authorization framework for collaborative computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 180-189, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, security architecture, collaborative computing, usage control, UCON |
32 | Hee-Young Lim, Young-Gab Kim, Chang-Joo Moon, Doo-Kwon Baik |
Bundle Authentication and Authorization Using XML Security in the OSGi Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 4th Annual ACIS International Conference on Computer and Information Science (ICIS 2005), 14-16 July 2005, Jeju Island, South Korea, pp. 502-507, 2005, IEEE Computer Society, 0-7695-2296-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, OSGi, Home network, XACML, XML security, XML signature |
32 | Motohiro Ichikawa, Yutaka Nakamura, Eiji Kawai, Kazutoshi Fujikawa, Hideki Sunahara |
NAS: the NAIST user authorization management system for network accesses in consideration of system administration volunteers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 33rd Annual ACM SIGUCCS Conference on User Services 2005, Monterey, CA, USA, November 6-9, 2005, pp. 118-121, 2005, ACM, 1-59593-200-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
voluntary-management, authorization, campus-network |
32 | Linda Cornwall, Jens Jensen, David P. Kelsey, Ákos Frohner, Daniel Kouril, Franck Bonnassieux, Sophie Nicoud, Károly Lörentey, Joni Hahkala, Mika Silander, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Fabio Spataro, David O'Callaghan, Olle Mulmo, Gian Luca Volpato, David L. Groep, Martijn Steenbakkers, Andrew McNab |
Authentication and Authorization Mechanisms for Multi-Domain Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 2(4), pp. 301-311, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, grid, authorization |
32 | Markus Lorch, Dennis G. Kafura |
The PRIMA Grid Authorization System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 2(3), pp. 279-298, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privilege management, access control, authorization, Grid security, enforcement |
32 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström |
Removing permissions in the flexible authorization framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 28(3), pp. 209-229, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
logic programming, authorization, Access control policy |
32 | Seung-Hyun Kim, Jong Kim 0001, Sung Je Hong, Sangwan Kim |
Workflow-based Authorization Service in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 94-100, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fine-grained authorization service, restricted delegation, Grid security |
32 | Manigandan Radhakrishnan, Jon A. Solworth |
Application security support in the operating system kernel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 201-211, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, access controls, operating systems, authorization, information flow, separation of duty |
28 | Jason Crampton, Hemanth Khambhammettu |
A Framework for Enforcing Constrained RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 195-200, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Indrajit Poddar, Germán S. Goldszmidt |
Automated deployment and Aggregated access control for SOA composite applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 833-847, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Gansen Zhao, David W. Chadwick, Sassa Otenko |
Obligations for Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 424-431, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yuping Deng, Xiaowei Guo, Xiamu Niu |
A New Design Scheme of Role-Based Access Control Based on PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICIC (3) ![In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August - 1 September 2006, Beijing, China, pp. 669-672, 2006, IEEE Computer Society, 0-7695-2616-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Wei Zhou 0006, Vinesh H. Raja, Christoph Meinel, Munir Ahmad |
Label-Based Access Control Policy Enforcement and Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA, pp. 395-400, 2006, IEEE Computer Society, 0-7695-2611-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Tomasz Haupt, Anand Kalyanasundaram, Igor Zhuk |
Architecture for a Secure Distributed Repository. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 200-206, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jin Wang, Jia Yu 0005, Daxing Li, Xi Bai 0002, Zhongtian Jia |
Combining User Authentication with Role-Based Authorazition Based on Identity-Based Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 847-857, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 388-423, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy administration, XML, role-based access control, secure interoperation |
28 | Jirí Denemark, Michal Jankowski, Ales Krenek, Ludek Matyska, Norbert Meyer, Miroslav Ruda, Pawel Wolniewicz |
Best Practices of User Account Management with Virtual Organization Based Access to Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPAM ![In: Parallel Processing and Applied Mathematics, 6th International Conference, PPAM 2005, Poznan, Poland, September 11-14, 2005, Revised Selected Papers, pp. 633-642, 2005, Springer, 3-540-34141-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Shariq Rizvi, Alberto O. Mendelzon, S. Sudarshan 0001, Prasan Roy |
Extending Query Rewriting Techniques for Fine-Grained Access Control. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pp. 551-562, 2004, ACM, 1-58113-859-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Marko Niinimäki, John White, Wim Som de Cerff, Joni Hahkala, Tapio Niemi, Mikko Pitkänen |
Using Virtual Organizations Membership System with EDG's Grid Security and Database Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 15th International Workshop on Database and Expert Systems Applications (DEXA 2004), with CD-ROM, 30 August - 3 September 2004, Zaragoza, Spain, pp. 517-522, 2004, IEEE Computer Society, 0-7695-2195-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
databases, Grid, virtual organizations |
28 | Xiaolin Zheng, Deren Chen, Zigui Wu |
Secure strategy for networked manufacturing system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (5) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 4232-4237, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Eva Rodríguez, Silvia Llorente, Jaime Delgado |
Use of Rights Expression Languages for Protecting Multimedia Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEDELMUSIC ![In: 4th International Conference on WEB Delivering of Music (WEDELMUSIC 2004), 13-15 September 2004, Barcelona, Spain, pp. 70-77, 2004, IEEE Computer Society, 0-7695-2157-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Bo Li 0005, Sheng Ge, Tianyu Wo, Dian-fu Ma |
Research and Implementation of Single Sign-On Mechanism for ASP Pattern. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 161-166, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Single Sign-on, SAML, LDAP, ASP |
28 | Beth A. Kirschner, Thomas J. Hacker, William A. Adamson, Brian D. Athey |
Walden: A Scalable Solution for Grid Account Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 5th International Workshop on Grid Computing (GRID 2004), 8 November 2004, Pittsburgh, PA, USA, Proceedings, pp. 102-109, 2004, IEEE Computer Society, 0-7695-2256-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Content-Based Authorizations for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 4th International Conference on Web Information Systems Engineering, WISE 2003, Rome, Italy, December 10-12, 2003, pp. 103-114, 2003, IEEE Computer Society, 0-7695-1999-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation |
28 | Govindan Ravindran, Muhammad Jaseemudin, Abdallah Rayhan |
A Management Framework for Service Personalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMNS ![In: Management of Multimedia on the Internet, 5th IFIP/IEEE International Conference on Management of Multimedia Networks and Services, MMNS 2002, Santa Barbara, CA, USA, October 6-9, 2002, Proceedings, pp. 276-288, 2002, Springer, 3-540-44271-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Service Personalization, Subscriber Management, Open Pluggable Edge Services, Content Services Network, Service Management, Content Network |
28 | Günter Karjoth |
An Operational Semantics of Java 2 Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 224-232, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo |
A Logical Framework for Reasoning on Data Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 175-189, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Konstantin Beznosov, Yi Deng 0001, Bob Blakley 0001, Carol C. Burt, John F. Barkley |
A Resource Access Decision Service for CORBA-Based Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 310-319, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
distributed systems, Access control, CORBA, computer security, RAD |
27 | Said Zaghloul, Admela Jukan |
Signaling rate and performance for authentication, authorization, and accounting (AAA)) systems in all-IP cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(6), pp. 2960-2971, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Jean-Noël Colin, Tien-Dung Le, David Massart |
A Federated Authorization Service for Bridging Learning Object Distribution Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWL ![In: Advances in Web Based Learning - ICWL 2009, 8th International Conference, Aachen, Germany, August 19-21, 2009. Proceedings, pp. 116-125, 2009, Springer, 978-3-642-03425-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Learning resource exchange, access control, mediation |
27 | Michele Barletta, Silvio Ranise, Luca Viganò 0001 |
Verifying the Interplay of Authorization Policies and Workflow in Service-Oriented Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 289-296, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Seon-Ho Park, Young-Ju Han, Jung-Ho Eom, Tai-Myoung Chung |
Architecture of Context-Aware Workflow Authorization Management Systems for Workflow-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management Enabling the Future Internet for Changing Business and New Computing Services, 12th Asia-Pacific Network Operations and Management Symposium, APNOMS 2009, Jeju, South Korea, September 23-25, 2009, Proceedings, pp. 375-384, 2009, Springer, 978-3-642-04491-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Adam J. Lee, Marianne Winslett |
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(2), pp. 8:1-8:33, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed proving, consistency, credentials, trust negotiation |
27 | Zemao Chen, Xiaoping Wu, Weimin Tang |
An Executable Code Authorization Model for Secure Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 292-295, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Federica Paci, Rodolfo Ferrini, Yuqing Sun 0001, Elisa Bertino |
Authorization and User Failure Resiliency for WS-BPEL Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC ![In: Service-Oriented Computing - ICSOC 2008, 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings, pp. 116-131, 2008, 978-3-540-89647-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng |
An Extended Permission-Based Delegation Authorization Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 696-699, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Oliver Boehm, Jörg Caumanns, Markus Franke, Oliver Pfaff |
Federated Authentication and Authorization: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 12th International IEEE Enterprise Distributed Object Computing Conference, ECOC 2008, 15-19 September 2008, Munich, Germany, pp. 356-362, 2008, IEEE Computer Society, 978-0-7695-3373-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Jayamsakthi Shanmugam, M. Ponnavaikko |
Improved Trust Metrics and Variance Based Authorization Model in e-Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWIC ![In: Advances in Intelligent Web Mastering, Proceedings of the 5th Atlantic Web Intelligence Conference - AWIC 2007, Fontainebleau, France, June 25 - 27, 2007, pp. 322-327, 2007, Springer, 978-3-540-72574-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Cédric Fournet, Andy Gordon 0001, Sergio Maffeis |
A Type Discipline for Authorization in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 31-48, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Yuqing Sun 0001, Bin Gong, Xiangxu Meng, Zongkai Lin |
Active Authorization Management for Multi-domain Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2007, April 26-28, 2007, Melbourne, Australia, pp. 162-167, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hisashi Naito, Shoji Kajita, Yasushi Hirano, Kenji Mase |
Multiple-Tiered Security Hierarchy for Web Applications Using Central Authentication and Authorization Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2007 International Symposium on Applications and the Internet - Workshops (SAINT 2007 Workshops), 15-19 January 2007, Hiroshima, Japan, pp. 27, 2007, IEEE Computer Society, 0-7695-2757-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 339-348, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
27 | Phillip J. Windley, Devlin Daley, Bryant Cutler, Kevin Tew |
Using reputation to augment explicit authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 72-81, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
framework, blogging, reputation, identity |
27 | Ralf Groeper, Christian Grimm, Stefan Piger, Jan Wiebelitz |
An Architecture for Authorization in Grids using Shibboleth and VOMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO-SEAA ![In: 33rd EUROMICRO Conference on Software Engineering and Advanced Applications (EUROMICRO-SEAA 2007), August 28-31, 2007, Lübeck, Germany, pp. 367-374, 2007, IEEE Computer Society, 0-7695-2977-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Moritz Y. Becker, Sebastian Nanz |
A Logic for State-Modifying Authorization Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings, pp. 203-218, 2007, Springer, 978-3-540-74834-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Feike W. Dillema, Simone Lupetti, Tage Stabell-Kulø |
A Decentralized Authorization Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 497-504, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Lars E. Olson 0001, Marianne Winslett, Gianluca Tonti, Nathan Seeley, Andrzej Uszok, Jeffrey M. Bradshaw |
Trust Negotiation as an Authorization Service forWeb Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 22nd International Conference on Data Engineering Workshops, ICDE 2006, 3-7 April 2006, Atlanta, GA, USA, pp. 21, 2006, IEEE Computer Society, 0-7695-2571-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | G. Geethakumari, Atul Negi, V. N. Sastry |
Indirect Authorization Topologies for Grid Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 186-187, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Antonio Lain, Miranda Mowbray |
Distributed Authorization Using Delegation with Acyclic Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 257-269, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Uche M. Mbanaso, G. S. Cooper, David W. Chadwick, Seth Proctor |
Privacy Preserving Trust Authorization Framework Using XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2006 International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2006), 26-29 June 2006, Buffalo, New York, USA, Proceedings, pp. 673-678, 2006, IEEE Computer Society, 0-7695-2593-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
Traust: a trust negotiation-based authorization service for open systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 39-48, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
credentials, trust negotiation, attribute-based access control |
27 | Philip Robinson, Florian Kerschbaum, Andreas Schaad |
From Business Process Choreography to Authorization Policies. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 297-309, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Sun-Moon Jo, Weon-Hee Yoo |
Design of Flexible Authorization System and Small Memory Management for XML Data Protection on the Server. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 451-458, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Chiu-Man Yu, Kam-Wing Ng |
A Mechanism to Make Authorization Decisions in Open Distributed Environments Without Complete Policy Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (4) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part IV, pp. 1007-1014, 2006, Springer, 3-540-34385-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Secure Role Activation and Authorization in the Enterprise Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 22-35, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role Activation, Role Based Access Control, Proxy Signature, Digital Credential |
27 | Raman Adaikkalavan, Sharma Chakravarthy |
Active Authorization Rules for Enforcing Role-Based Access Control and its Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE Workshops ![In: Proceedings of the 21st International Conference on Data Engineering Workshops, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 1197, 2005, IEEE Computer Society, 0-7695-2657-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Martin Wimmer 0001, Alfons Kemper |
An Authorization Framework for Sharing Data in Web Service Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, Second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005, Proceedings, pp. 47-62, 2005, Springer, 3-540-28798-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Sun-Moon Jo, Ki-Tae Kim, Hoon-Joon Kouh, Weon-Hee Yoo |
Access Authorization Policy for XML Document Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 589-598, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Qiaoming Zhu, Peifeng Li, Su Zhang, Peide Qian |
A Unified Authorization Platform Based on RBAC4WAS Model for Web Application System Integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 505-509, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Horst F. Wedde, Mario Lischka |
Modular authorization and administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(3), pp. 363-391, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Petri-Nets, Modularity, composability, work-flow |
27 | Patroklos G. Argyroudis, Donal O'Mahony |
ÆTHER: an Authorization Management Architecture for Ubiquitous Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 246-259, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Reiner Sailer, James Giles |
Pervasive Authentication Domains for Automatic Pervasive Device Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA, pp. 144-148, 2004, IEEE Computer Society, 0-7695-2106-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Sibabrata Ray, Kevin A. Kwiat, Danyang Zhang |
Energy-efficient placement/activation algorithms for authorization servers in sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28 - July 1, 2004, Alexandria, Egypt, pp. 312-317, 2004, IEEE Computer Society, 0-7803-8623-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | HyungHyo Lee, Seungyong Lee 0001, BongNam Noh |
A New Role-Based Authorization Model in a Corporate Workflow Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 701-710, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Guido Boella, Leendert W. N. van der Torre |
Permission and Authorization in Policies for Virtual Communities of Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AP2PC ![In: Agents and Peer-to-Peer Computing, Third International Workshop, AP2PC 2004, New York, NY, USA, July 19, 2004, Revised and Invited Papers, pp. 86-97, 2004, Springer, 3-540-29755-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Diego R. López, Rodrigo Castro-Rojo |
Attribute-based Interactions in a Distributed Authentication and Authorization Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 438-442, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Roberto Alfieri, Roberto Cecchini, Vincenzo Ciaschini, Luca dell'Agnello, Ákos Frohner, Alberto Gianoli, Károly Lörentey, Fabio Spataro |
VOMS, an Authorization System for Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
European Across Grids Conference ![In: Grid Computing, First European Across Grids Conference, Santiago de Compostela, Spain, February 13-14, 2003, Revised Papers, pp. 33-40, 2003, Springer, 3-540-21048-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Lujo Bauer, Michael A. Schneider, Edward W. Felten, Andrew W. Appel |
Access Control on the Web Using Proof-carrying Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 117-119, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 |
Runtime verification of authorization hook placement for the linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 225-234, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe |
Authorization Model for Summary Schemas Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: International Database Engineering & Applications Symposium, IDEAS'02, July 17-19, 2002, Edmonton, Canada, Proceedings, pp. 182-191, 2002, IEEE Computer Society, 0-7695-1638-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|