The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for authorizations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1994 (15) 1995-1997 (16) 1998-2000 (17) 2001-2002 (29) 2003 (17) 2004 (22) 2005 (26) 2006 (18) 2007 (25) 2008 (19) 2009 (15) 2010-2013 (15) 2015-2019 (17) 2021-2024 (7)
Publication types (Num. hits)
article(55) incollection(6) inproceedings(195) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 319 occurrences of 179 keywords

Results
Found 258 publication records. Showing 258 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu A usage-based authorization framework for collaborative computing systems. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, authorization, security architecture, collaborative computing, usage control, UCON
12Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati Modality conflicts in semantics aware access control. Search on Bibsonomy ICWE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF modality conflict, access control
12Chi-Hung Chi, Lin Liu 0001, Xiaoyin Yu Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Deepak Garg 0001, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter A Linear Logic of Authorization and Knowledge. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Salvatore Vitabile, Giovanni Milici, S. Scolaro, Filippo Sorbello, Giovanni Pilato A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park Formal model and policy specification of usage control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access control, formal specification, security policy, usage control
12Martin Wimmer 0001, Pia Ehrnlechner, Armin Fischer, Alfons Kemper Flexible Autorisierung in Datenbank-basierten Web Service-Föderationen. Search on Bibsonomy Inform. Forsch. Entwickl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Loosely and tightly coupled systems, Service oriented architectures, Caching, Authorization
12Xinwen Zhang, Yingjiu Li, Divya Nalla An attribute-based access matrix model. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access matrix model, access control, decidability, safety analysis
12Rick McGeer, Andreas Raab, Michael Rüger The Media Messenger. Search on Bibsonomy C5 The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Barbara Weber, Manfred Reichert, Werner Wild, Stefanie Rinderle Balancing Flexibility and Security in Adaptive Process Management Systems. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson A DoS-limiting network architecture. Search on Bibsonomy SIGCOMM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF internet, denial-of-service
12Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. Search on Bibsonomy ECOOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Wolfgang Hommel An Architecture for Privacy-Aware Inter-domain Identity Management. Search on Bibsonomy DSOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Lin Qiao, Weitong Huang, Qi Wen, Xiaolong Fu An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Shujing Wang 0001, Yan Zhang 0003 Specifying Distributed Authorization with Delegation Using Logic Programming. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Shujing Wang 0001, Yan Zhang 0003 A Formalization of Distributed Authorization with Delegation. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming
12Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen Foundation for a Time Interval Access Control Model. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Francesco Viganò, Nicoletta Fornara, Marco Colombetti An Event Driven Approach to Norms in Artificial Institutions. Search on Bibsonomy AAMAS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Francesco Viganò, Nicoletta Fornara, Marco Colombetti An operational approach to norms in artificial institutions. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF artificial institutions, commitments, norms, ACLs
12Shujing Wang 0001, Yan Zhang 0003 Answer Set Programming for Distributed Authorization: The Language, Computations, and Application. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Somchai Chatvichienchai, Chutiporn Anutariya, Mizuho Iwaihara, Vilas Wuwongse, Yahiko Kambayashi Towards Integration of XML Document Access and Version Control. Search on Bibsonomy DEXA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu A logical specification for usage control. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF logic specification, access control, security policy, usage control
12Francesco Palmieri 0002 A Scalable PKI for Secure Routing in the Internet. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Elisa Bertino, Maria Luisa Damiani, Davide Momini An Access Control System for a Web Map Management Service. Search on Bibsonomy RIDE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Klaus Herrmann 0001, Michael A. Jaeger PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Walid Rjaibi An introduction to multilevel secure relational database management systems. Search on Bibsonomy CASCON The full citation details ... 2004 DBLP  BibTeX  RDF
12Steve Barker, Peter J. Stuckey Flexible access control policy specification with constraint logic programming. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Role-based access control, constraint logic programming
12Chun Ruan, Vijay Varadharajan Supporting E-consent on Health Data by Logic. Search on Bibsonomy ISMIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12William H. Winsborough A Logic Programming View of Authorization in Distributed Systems. Search on Bibsonomy ICLP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila The role control center: features and case studies. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF administrative roles, role graph, separation of duty, role hierarchy, authorization management
12Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta Trust and Authorization in Pervasive B2E Scenarios. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Tianchi Ma, Shanping Li Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Xiaoguang Zhang 0003, Jian Cao 0001, Shen-sheng Zhang Fuzzy Synthesis Evaluation Improved Task Distribution in WfMS. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Tianchi Ma, Shanping Li An Instance-Oriented Security Mechanism in Grid-Based Mobile Agent System. Search on Bibsonomy CLUSTER The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Grid, Mobile agent, delegation, trust model
12Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati Securing SOAP e-services. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access control, SOAP, E-services, Digital certificates
12Elisa Bertino, Elena Ferrari Secure and selective dissemination of XML documents. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secure distribution, XML, Access control
12Sabrina De Capitani di Vimercati An authorization model for temporal XML documents. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF temporal XML documents, access control, transaction time, valid time
12Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez Different Smartcard-Based Approaches to Physical Access Control. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Simon N. Foley Supporting Imprecise Delegation in KeyNote. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Susana Montero, Ignacio Aedo, Paloma Díaz 0001 Generation of Personalized Web Courses Using RBAC. Search on Bibsonomy AH The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 Gaining and maintaining confidence in operating systems security. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Jaehong Park, Ravi S. Sandhu Towards usage control models: beyond traditional access control. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Yun Bai Towards Secure Object Oriented Database Systems. Search on Bibsonomy OTM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF object oriented database security, security policy, Intelligent systems, logical reasoning
12Dongdong Li, Songlin Hu, Shuo Bai A Uniform Model for Authorization and Access Control in Enterprise Information Platform. Search on Bibsonomy EDCIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian Flexible support for multiple access control policies. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF logic programming, authorization, access control policy
12Jie Dai, Jim Alves-Foss Certificate Based Authorization Simulation System. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Els Van Herreweghen Non-repudiation in SET: Open Issues. Search on Bibsonomy Financial Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Ryong Lee, Yahiko Kambayashi Data Security for Distributed Meeting Systems. Search on Bibsonomy DEXA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Carl A. Gunter, Trevor Jim Generalized Certificate Revocation. Search on Bibsonomy POPL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
12Reto Kohlas, Ueli M. Maurer Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
12Yun Bai 0001, Vijay Varadharajan Authorization in Object Oriented Databases. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF security, formal specification, object oriented databases, inheritance, authorization policy
12Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino A Unified Framework for Enforcing Multiple Access Control Policies. Search on Bibsonomy SIGMOD Conference The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
12Elisa Bertino, Pierangela Samarati, Sushil Jajodia High Assurance Discretionary Access Control for Object Bases. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
12Christoph Lingenfelder, Sven Lorenz Knowledge-based security administration in a distributed environment. Search on Bibsonomy CASCON The full citation details ... 1993 DBLP  BibTeX  RDF
12Elisa Bertino A View Mechanism for Object-Oriented Databases. Search on Bibsonomy EDBT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
12Steve R. White, Liam Comerford ABYSS: An Architecture for Software Protection. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software
12Diana Patterson The myth and realities of C.A.S.E. for documentation. Search on Bibsonomy SIGDOC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #258 of 258 (100 per page; Change: )
Pages: [<<][1][2][3]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license