|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 319 occurrences of 179 keywords
|
|
|
Results
Found 258 publication records. Showing 258 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
A usage-based authorization framework for collaborative computing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 180-189, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, security architecture, collaborative computing, usage control, UCON |
12 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati |
Modality conflicts in semantics aware access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Proceedings of the 6th International Conference on Web Engineering, ICWE 2006, Palo Alto, California, USA, July 11-14, 2006, pp. 249-256, 2006, ACM, 1-59593-352-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
modality conflict, access control |
12 | Chi-Hung Chi, Lin Liu 0001, Xiaoyin Yu |
Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference, EUC 2006, Seoul, Korea, August 1-4, 2006, Proceedings, pp. 328-335, 2006, Springer, 3-540-36679-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Deepak Garg 0001, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter |
A Linear Logic of Authorization and Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 297-312, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Salvatore Vitabile, Giovanni Milici, S. Scolaro, Filippo Sorbello, Giovanni Pilato |
A MAS Security Framework Implementing Reputation Based Policies and Owners Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 746-752, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Xinwen Zhang, Francesco Parisi-Presicce, Ravi S. Sandhu, Jaehong Park |
Formal model and policy specification of usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 351-387, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, formal specification, security policy, usage control |
12 | Martin Wimmer 0001, Pia Ehrnlechner, Armin Fischer, Alfons Kemper |
Flexible Autorisierung in Datenbank-basierten Web Service-Föderationen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Forsch. Entwickl. ![In: Inform. Forsch. Entwickl. 20(3), pp. 167-181, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Loosely and tightly coupled systems, Service oriented architectures, Caching, Authorization |
12 | Xinwen Zhang, Yingjiu Li, Divya Nalla |
An attribute-based access matrix model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 359-363, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access matrix model, access control, decidability, safety analysis |
12 | Rick McGeer, Andreas Raab, Michael Rüger |
The Media Messenger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
C5 ![In: 3rd Conference on Creating, Connecting and Collaborating through Computing (C5 2005), January 28-29, 2005, Cambridge, MA, USA, pp. 101-107, 2005, IEEE Computer Society, 0-7695-2325-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Barbara Weber, Manfred Reichert, Werner Wild, Stefanie Rinderle |
Balancing Flexibility and Security in Adaptive Process Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems 2005: CoopIS, DOA, and ODBASE, OTM Confederated International Conferences CoopIS, DOA, and ODBASE 2005, Agia Napa, Cyprus, October 31 - November 4, 2005, Proceedings, Part I, pp. 59-76, 2005, Springer, 3-540-29736-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Xiaowei Yang 0001, David Wetherall, Thomas E. Anderson |
A DoS-limiting network architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2005 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Philadelphia, Pennsylvania, USA, August 22-26, 2005, pp. 241-252, 2005, ACM, 1-59593-009-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
internet, denial-of-service |
12 | Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar |
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP 2005 - Object-Oriented Programming, 19th European Conference, Glasgow, UK, July 25-29, 2005, Proceedings, pp. 362-386, 2005, Springer, 3-540-27992-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Wolfgang Hommel |
An Architecture for Privacy-Aware Inter-domain Identity Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Ambient Networks, 16th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2005, Barcelona, Spain, October 24-26, 2005, Proceedings, pp. 48-59, 2005, Springer, 3-540-29388-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Lin Qiao, Weitong Huang, Qi Wen, Xiaolong Fu |
An Integrated Information Retrieval Support System for Multiple Distributed Heterogeneous Cross-Lingual Information Sources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 863-872, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Shujing Wang 0001, Yan Zhang 0003 |
Specifying Distributed Authorization with Delegation Using Logic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 761-767, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Shujing Wang 0001, Yan Zhang 0003 |
A Formalization of Distributed Authorization with Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 303-315, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming |
12 | Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen |
Foundation for a Time Interval Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 406-411, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Francesco Viganò, Nicoletta Fornara, Marco Colombetti |
An Event Driven Approach to Norms in Artificial Institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS Workshops ![In: Coordination, Organizations, Institutions, and Norms in Multi-Agent Systems, AAMAS 2005 International Workshops on Agents, Norms and Institutions for Regulated Multi-Agent Systems, ANIREM 2005, and Organizations in Multi-Agent Systems, OOOP 2005, Utrecht, The Netherlands, July 25-26, 2005, Revised Selected Papers, pp. 142-154, 2005, Springer, 3-540-35173-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Francesco Viganò, Nicoletta Fornara, Marco Colombetti |
An operational approach to norms in artificial institutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: 4th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2005), July 25-29, 2005, Utrecht, The Netherlands, pp. 1289-1290, 2005, ACM, 1-59593-094-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
artificial institutions, commitments, norms, ACLs |
12 | Shujing Wang 0001, Yan Zhang 0003 |
Answer Set Programming for Distributed Authorization: The Language, Computations, and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 1191-1194, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Somchai Chatvichienchai, Chutiporn Anutariya, Mizuho Iwaihara, Vilas Wuwongse, Yahiko Kambayashi |
Towards Integration of XML Document Access and Version Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 15th International Conference, DEXA 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings, pp. 791-800, 2004, Springer, 3-540-22936-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis |
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 276-292, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu |
A logical specification for usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 1-10, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
logic specification, access control, security policy, usage control |
12 | Francesco Palmieri 0002 |
A Scalable PKI for Secure Routing in the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 882-894, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Elisa Bertino, Maria Luisa Damiani, Davide Momini |
An Access Control System for a Web Map Management Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RIDE ![In: 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), Web Services for E-Commerce and E-Government Applications, 28-29 March 2004, Boston, MA, USA, pp. 33-39, 2004, IEEE Computer Society, 0-7695-2095-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Klaus Herrmann 0001, Michael A. Jaeger |
PAYFLUX - Secure Electronic Payment in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 66-78, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Walid Rjaibi |
An introduction to multilevel secure relational database management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 2004 conference of the Centre for Advanced Studies on Collaborative research, October 5-7, 2004, Markham, Ontario, Canada, pp. 232-241, 2004, IBM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
12 | Steve Barker, Peter J. Stuckey |
Flexible access control policy specification with constraint logic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 501-546, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Role-based access control, constraint logic programming |
12 | Chun Ruan, Vijay Varadharajan |
Supporting E-consent on Health Data by Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 14th International Symposium, ISMIS 2003, Maebashi City, Japan, October 28-31, 2003, Proceedings, pp. 392-396, 2003, Springer, 3-540-20256-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | William H. Winsborough |
A Logic Programming View of Authorization in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 19th International Conference, ICLP 2003, Mumbai, India, December 9-13, 2003, Proceedings, pp. 20-46, 2003, Springer, 3-540-20642-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 12-20, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
12 | Laurent Bussard, Yves Roudier, Roger Kilian-Kehr, Stefano Crosta |
Trust and Authorization in Pervasive B2E Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 295-309, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Tianchi Ma, Shanping Li |
Secure Grid-Based Mobile Agent Platform by Instance-Oriented Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 916-923, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Xiaoguang Zhang 0003, Jian Cao 0001, Shen-sheng Zhang |
Fuzzy Synthesis Evaluation Improved Task Distribution in WfMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 927-934, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Tianchi Ma, Shanping Li |
An Instance-Oriented Security Mechanism in Grid-Based Mobile Agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2003 IEEE International Conference on Cluster Computing (CLUSTER 2003), 1-4 December 2003, Kowloon, Hong Kong, China, pp. 492-495, 2003, IEEE Computer Society, 0-7695-2066-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Grid, Mobile agent, delegation, trust model |
12 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Securing SOAP e-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(2), pp. 100-115, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access control, SOAP, E-services, Digital certificates |
12 | Elisa Bertino, Elena Ferrari |
Secure and selective dissemination of XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(3), pp. 290-331, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure distribution, XML, Access control |
12 | Sabrina De Capitani di Vimercati |
An authorization model for temporal XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 1088-1093, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
temporal XML documents, access control, transaction time, valid time |
12 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez |
Different Smartcard-Based Approaches to Physical Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 214-226, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Simon N. Foley |
Supporting Imprecise Delegation in KeyNote. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers, pp. 179-188, 2002, Springer, 3-540-20830-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Susana Montero, Ignacio Aedo, Paloma Díaz 0001 |
Generation of Personalized Web Courses Using RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AH ![In: Adaptive Hypermedia and Adaptive Web-Based Systems, Second International Conference, AH 2002, Malaga, Spain, May 29-31, 2002, Proceedings, pp. 419-423, 2002, Springer, 3-540-43737-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Gaining and maintaining confidence in operating systems security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS European Workshop ![In: Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, pp. 201-204, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Jaehong Park, Ravi S. Sandhu |
Towards usage control models: beyond traditional access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 57-64, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Yun Bai |
Towards Secure Object Oriented Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM ![In: On the Move to Meaningful Internet Systems, 2002 - DOA/CoopIS/ODBASE 2002 Confederated International Conferences DOA, CoopIS and ODBASE 2002 Irvine, California, USA, October 30 - November 1, 2002, Proceedings, pp. 1118-1131, 2002, Springer, 3-540-00106-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
object oriented database security, security policy, Intelligent systems, logical reasoning |
12 | Dongdong Li, Songlin Hu, Shuo Bai |
A Uniform Model for Authorization and Access Control in Enterprise Information Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCIS ![In: Engineering and Deployment of Cooperative Information Systems, First International Conference, EDCIS 2002, Beijing, China, September 17-20, 2002, Proceedings, pp. 180-192, 2002, Springer, 3-540-44222-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian |
Flexible support for multiple access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 26(2), pp. 214-260, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
logic programming, authorization, access control policy |
12 | Jie Dai, Jim Alves-Foss |
Certificate Based Authorization Simulation System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 25th International Computer Software and Applications Conference (COMPSAC 2001), Invigorating Software Development, 8-12 October 2001, Chicago, IL, USA, pp. 190-195, 2001, IEEE Computer Society, 0-7695-1372-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 140-156, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Ryong Lee, Yahiko Kambayashi |
Data Security for Distributed Meeting Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 11th International Conference, DEXA 2000, London, UK, September 4-8, 2000, Proceedings, pp. 274-286, 2000, Springer, 3-540-67978-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Carl A. Gunter, Trevor Jim |
Generalized Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: POPL 2000, Proceedings of the 27th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Boston, Massachusetts, USA, January 19-21, 2000, pp. 316-329, 2000, ACM, 1-58113-125-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Reto Kohlas, Ueli M. Maurer |
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 86-103, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Yun Bai 0001, Vijay Varadharajan |
Authorization in Object Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 270-280, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, formal specification, object oriented databases, inheritance, authorization policy |
12 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino |
A Unified Framework for Enforcing Multiple Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: SIGMOD 1997, Proceedings ACM SIGMOD International Conference on Management of Data, May 13-15, 1997, Tucson, Arizona, USA., pp. 474-485, 1997, ACM Press, 978-0-89791-911-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
12 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
High Assurance Discretionary Access Control for Object Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 140-150, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
12 | Christoph Lingenfelder, Sven Lorenz |
Knowledge-based security administration in a distributed environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 1993 Conference of the Centre for Advanced Studies on Collaborative Research, October 24-28, 1993, Toronto, Ontario, Canada, 2 Volumes, pp. 648-660, 1993, IBM. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
|
12 | Elisa Bertino |
A View Mechanism for Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'92, 3rd International Conference on Extending Database Technology, Vienna, Austria, March 23-27, 1992, Proceedings, pp. 136-151, 1992, Springer, 3-540-55270-7. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
12 | Steve R. White, Liam Comerford |
ABYSS: An Architecture for Software Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 619-629, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software |
12 | Diana Patterson |
The myth and realities of C.A.S.E. for documentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 7th Annual International Conference on Systems Documentation, SIGDOC 1989, Pittsburgh, Pennsylvania, USA, November 8-10, 1989, pp. 115-119, 1989, ACM, 0-89791-337-X. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #258 of 258 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3] |
|