The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Authorization with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1978 (15) 1979-1987 (15) 1988-1990 (15) 1991-1993 (20) 1994-1995 (26) 1996 (19) 1997 (20) 1998 (24) 1999 (38) 2000 (40) 2001 (45) 2002 (90) 2003 (143) 2004 (178) 2005 (216) 2006 (242) 2007 (225) 2008 (194) 2009 (156) 2010 (91) 2011 (82) 2012 (79) 2013 (54) 2014 (51) 2015 (70) 2016 (53) 2017 (67) 2018 (73) 2019 (83) 2020 (81) 2021 (89) 2022 (94) 2023 (74) 2024 (19)
Publication types (Num. hits)
article(680) book(1) incollection(28) inproceedings(2027) phdthesis(40) proceedings(5)
Venues (Conferences, Journals, ...)
SACMAT(64) CoRR(63) RFC(63) ETAA@ESORICS(34) ACM Trans. Inf. Syst. Secur.(33) ESORICS(31) ACSAC(28) CCS(26) GRID(24) DBSec(23) ETAA(22) AsiaCCS(20) CSFW(20) POLICY(20) SAC(20) ARES(19) More (+10 of total 1082)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1949 occurrences of 743 keywords

Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Bharat K. Bhargava, Yuhui Zhong Authorization Based on Evidence and Trust. Search on Bibsonomy DaWaK The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Chun Ruan, Vijay Varadharajan Resolving Conflicts in Authorization Delegations. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta AMBAR Protocol: Access Management Based on Authorization Reduction. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Jeff Hayes Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Patricia P. Griffiths, Bradford W. Wade An Authorization Mechanism for a Relational Data Base System (Abstract). Search on Bibsonomy SIGMOD Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
27Juan Chen 0002, Ravi Chugh, Nikhil Swamy Type-preserving compilation of end-to-end verification of security enforcement. Search on Bibsonomy PLDI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bytecode languages, compilers, authorization, functional programming, information flow, dependent types, security type systems, mobile code security
27Limin Jia 0001, Steve Zdancewic Encoding information flow in Aura. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, information flow control, declassification, security type system, authorization logic
27Dimitrios Koukopoulos, Georgios D. Styliaras Security in collaborative multimedia art communities. Search on Bibsonomy EATIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authorization control, digital art project, role-based access, security, digital watermarking, collaborative environments, multimedia content, intellectual property rights
27Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. Search on Bibsonomy J. Grid Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO)
27Jeffrey L. Hieb, James H. Graham, Sandip C. Patel Security Enhancements for Distributed Control Systems. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNP3, role-based authorization, RTU security, secure communication
27Premchand B. Ambhore, B. B. Meshram, V. B. Waghmare A Implementation of Object Oriented Database Security. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF structural and dynamic, and logic-based specification, access control, Semantics, data model, database security, authorization policy
27Shermann S.-M. Chan, Qing Li 0001, José A. Pino VideoAcM: a transitive and temporal access control mechanism for collaborative video database production applications. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transitive and temporal access control model, Client-data access control, Data-data access control, Video database, Authorization rule
27Antonia Ghiselli, Federico Stagni, Riccardo Zappi Review of Security Models Applied to Distributed Data Access. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, authentication, Grid, authorization, policy, data management, XACML, SAML, acl
27David Keppler, Vipin Swarup, Sushil Jajodia Redirection policies for mission-based information sharing. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorization, information sharing, data sharing, access control policy
27Jeff Polakow, Christian Skalka Specifying distributed trust management in LolliMon. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF trust management logic, distributed authorization
27Ali E. Abdallah, Etienne J. Khayat Formal Z Specifications of Several Flat Role-Based Access Control Models. Search on Bibsonomy SEW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Authorization, Role-Based Access Control, Formal Models, Z specification
27Walid Bagga, Stefano Crosta, Refik Molva Proof-Carrying Proxy Certificates. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates
27Guangsen Zhang, Manish Parashar Dynamic Context-aware Access Control for Grid Applications. Search on Bibsonomy GRID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authorization and access control, Grid computing, context-aware, Grid security, pervasive applications
27David W. Chadwick, Alexander Otenko The PERMIS X.509 role based privilege management infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates
27Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian Flexible support for multiple access control policies. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF logic programming, authorization, access control policy
27Ninghui Li Local Names in SPKI/SDSI. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF SDSI, access control, logic programming, authorization, security policies, trust management, SPKI
27David F. Ferraiolo, John F. Barkley, D. Richard Kuhn A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Web arrows, role based access, World Wide Web, access control, RBAC, authorization management
27Randy Chow, I-Lung Kao Modeling complex access control policies in distributed systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions
26Carsten Bormann An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). Search on Bibsonomy RFC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Juhan Kim, Yousung Kang UAV arming Authorization using DIM and Flight Authorization Code. Search on Bibsonomy ICTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs. Search on Bibsonomy ETAA The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Nat Sakimura, John Bradley, Michael B. Jones The OAuth 2.0 Authorization Framework: JWT-Secured Authorization Request (JAR). Search on Bibsonomy RFC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Anzo DeGiulio, Hanoom Lee, Eleanor Birrell "Ask App Not to Track": The Effect of Opt-In Tracking Authorization on Mobile Privacy. Search on Bibsonomy ETAA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone An Authorization Framework for Cooperative Intelligent Transport Systems. Search on Bibsonomy ETAA@ESORICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Nikos Fotiou, George C. Polyzos Authentication and Authorization for Interoperable IoT Architectures. Search on Bibsonomy ETAA@ESORICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Victoria Beltran, Antonio F. Skarmeta An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE). Search on Bibsonomy WF-IoT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Nadeem Chaudhary, Ligang He Analyzing the performance impact of authorization constraints and optimizing the authorization methods for workflows. Search on Bibsonomy HiPC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Gaoyuan Pan, Yongbin Wang Securing RESTful WCF Services with XAuth and Service Authorization Manager - A Practical Way for User Authorization and Server Protection. Search on Bibsonomy CSO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Vishav Vir Singh PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support. Search on Bibsonomy Communication, Network, and Information Security The full citation details ... 2006 DBLP  BibTeX  RDF
26Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. Search on Bibsonomy ISWS The full citation details ... 2005 DBLP  BibTeX  RDF
26Tom Beiler Business-Driven Enterprise Authorization - Moving Towards a Unified Authorization Architecture. Search on Bibsonomy ICEIS (3) The full citation details ... 2004 DBLP  BibTeX  RDF
26Karin Venter The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. Search on Bibsonomy ISSA The full citation details ... 2002 DBLP  BibTeX  RDF
26Paul F. Wilms, Bruce G. Lindsay 0001 A Database Authorization Mechanism Supporting Individual and Group Authorization. Search on Bibsonomy DDSS The full citation details ... 1981 DBLP  BibTeX  RDF
25Xiuxia Tian, Xiaoling Wang, Aoying Zhou A Privacy Preserving Selective Authorization Enforcement Approach in Daas. Search on Bibsonomy SERVICES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Selective authorization, Access control policy polynomial, Selective encryption, DaaS
25David A. Basin, Samuel J. Burri, Günter Karjoth Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. Search on Bibsonomy CSF The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Access control, workflow, Separation of Duty, authorization constraint
25Steffen Bartsch Supporting Authorization Policy Modification in Agile Development of Web Applications. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Authorization Policy Development, Policy Change Management, Agile Development, Change-Impact Analysis
25Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. Search on Bibsonomy AINA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Authentication, Authorization, Pervasive, Ticket
25Joshua Schiffman, Xinwen Zhang, Simon Gibbs DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Web Applications, Authorization, Distributed Applications
25Haiyang Sun, Weiliang Zhao, Jian Yang 0001 SOAC: A Conceptual Model for Managing Service-Oriented Authorization. Search on Bibsonomy IEEE SCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Web Services, Conceptual Model, Authorization, Role Based Access Control
25Fujun Feng, Junshan Li Trust Based Authorization and Access Control. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, trust, authorization, rule
25Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang Patient-centric authorization framework for sharing electronic health records. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF electronic health records (EHRs), patient-centric authorization, selective sharing
25Zhi-Hui Wang 0001, Mingchu Li, Mao-Hua Chen, Chin-Chen Chang 0001 A New Intelligent Authorization Agent Model in Grid. Search on Bibsonomy HIS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intelligent agent, authorization, grid security
25Chun Ruan, Vijay Varadharajan Trust Enhanced Authorization for Mobile Agents. Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF trust, mobile agent, logic programming, authorization
25Samrat Mondal, Shamik Sural Supporting Negative Authorization in Spatiotemporal Role Based Access Control. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Negative Authorization, Spatiotemporal Context, Access Control, RBAC
25Bo Chen, Guosun Zeng, Li Li 0008 Attribute Delegation Authorization Based on Subjective Trust Evaluation. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF subjective trust, attribute based delegation authorization, trusted role, trust control, logic system
25Judith E. Y. Rossebø, Rolv Bræk Using Composition Policies to Manage Authentication and Authorization Patterns and Services. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication and authorization, policy, service composition, service engineering
25Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce Safety analysis of usage control authorization models. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, authorization, safety, usage control, UCON
25Janice Warner, Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, work flow, authorization constraints
25Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta Virtual identities in authentication and authorization scenarios. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML
25Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita An authorization model for geographical maps. Search on Bibsonomy GIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control, GIS, authorization model
25Michiharu Kudo, Satoshi Hada XML document security based on provisional authorization. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF provisional authorization, security transcoding, XML, XML, access control
25Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof A Logic-based Knowledge Representation for Authorization with Delegation. Search on Bibsonomy CSFW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF non-monotonicity, conflict handling, knowledge representation, logic programs, Authorization, security policy, trust management, delegation
25Elisa Bertino, Pierangela Samarati, Sushil Jajodia An Extended Authorization Model for Relational Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF revocation of authorizations, security, privacy, access control, relational database, authorization, Database systems, protection
25Jon A. Solworth Approvability. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorization properties, authorization, separation of duty
25E. B. Fernandez, J. C. Hawkins Determining role rights from use cases. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 1997 DBLP  DOI  BibTeX  RDF object-oriented authorization, role-based-access-control, use cases, object-oriented analysis, authorization models
21Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer A card requirements language enabling privacy-preserving access control. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy, access control, policy languages, anonymous credentials, digital credentials
21Hua Wang 0002, Yanchun Zhang, Jinli Cao Effective Collaboration with Information Sharing in Virtual Universities. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough Stale-safe security properties for group-based secure information sharing. Search on Bibsonomy FMSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stale attributes, information sharing, security properties
21Jeffrey A. Vaughan, Limin Jia 0001, Karl Mazurak, Steve Zdancewic Evidence-Based Audit. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Access control, Logic, Audit, Computer Languages
21Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse Security Analysis of Role-based Separation of Duty with Workflows. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Qi Li 0002, Mingwei Xu, Xinwen Zhang Access control in Group Communication Systems. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong Advanced Permission-Role Relationship in Role-Based Access Control. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Fengying Wang, Lei Zhao, Caihong Li, Zhen Cheng, Qufei Zhang Usage Control Resource Dissemination Model Based on Fuzzy Logic. Search on Bibsonomy FSKD (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line An novel two layer user identification method. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Brahim Gaabab, David Binet, Jean-Marie Bonnin Authentication Optimization for Seamless Handovers. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Weiqun Sun, Yanbo Han, Baohua Shan A Dynamic Reconciliation Service of RBAC Policies for Virtual Organizations. Search on Bibsonomy ICEBE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Matthias Merz The management of users, roles, and permissions in JDOSecure. Search on Bibsonomy PPPJ The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Hongxia Cai, Tao Yu, Minglun Fang Access Control Model of Manufacturing Grid. Search on Bibsonomy PROLAMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Role-based Access Control Model, security, Manufacturing Grid
21Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio Fernandez Gómez-Skarmeta An Access Control System for Multimedia Content Distribution. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Sang-Min Park, Glenn S. Wasson, Marty Humphrey Authorizing Remote Job Execution Based on Job Properties. Search on Bibsonomy e-Science The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth Factoring High Level Information Flow Specifications into Low Level Access Controls. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Michael J. Covington, Manoj R. Sastry A Contextual Attribute-Based Access Control Model. Search on Bibsonomy OTM Workshops (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Hua Wang 0002, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson 0001 A framework for role-based group deligation in distributed environments. Search on Bibsonomy ACSC The full citation details ... 2006 DBLP  BibTeX  RDF
21Isaac Agudo, Javier López 0001, José A. Montenegro Attribute Delegation Based on Ontologies and Context Information. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Xuebing Qing, Carlisle Adams XACML-Based Policy-Driven Access Control for Mobile Environments. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Da Wei, Yanheng Liu, Xuegang Yu, Xiaodong Li Research of Mobile IPv6 Application Based On Diameter Protocol. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Yuri Demchenko, Leon Gommans, Cees de Laat, Arie Taal, Alfred Wan, Olle Mulmo Using Workflow for Dynamic Security Context Management in Grid-based Applications. Search on Bibsonomy GRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. Search on Bibsonomy SPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Irene Kafeza, Eleanna Kafeza, Dickson K. W. Chiu Legal Issues in Agents for Electronic Contracting. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Jing Wu, Yi Mu 0001, Jennifer Seberry, Chun Ruan Access Policy Sheet for Access Control in Fine-Grained XML. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Vijayalakshmi Atluri, Qi Guo Unified Index for Mobile Object Data and Authorizations. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. Search on Bibsonomy IEEE SCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Eric Freudenthal, Vijay Karamcheti DisCo: Middleware for Securely Deploying Decomposable Services in Partly Trusted Environments. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Yihui Luo, Changsheng Xie, Chengfeng Zhang A Security Scheme for United Storage Network. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Baoyi Wang, Shaomin Zhang The Research on Role-Based Access Control Mechanism for Workflow Management System. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Kazuteru Matsumoto, Atsushi Hashimoto, Takaichi Yoshida Access Control by using Object Properties and Categorized Methods. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Mohammad A. Al-Kahtani, Ravi S. Sandhu Mohammad A. Al-Kahtani, Ravi Sandhu. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Xin Zhao 0016, Atul Prakash 0001 Source Authentication in Group Communication Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Dong-Gue Park, You-Ri Lee The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. Search on Bibsonomy EC-Web The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou Integrated Access Control and Intrusion Detection for Web Servers. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Baiyan Li, Wensheng Yao, Jinyuan You Modeling Trust Management System for Grids. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Baoyi Wang, Shaomin Zhang, Xiaodong Xia The Application Research of Role-Based Access Control Model in Workflow Management System. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, Mudassir Fajandar A Federated Model for Secure Web-Based Videoconferencing. Search on Bibsonomy ITCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
21Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 Enforcing History-Based Security Policies in Mobile Agent Systems. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 2781 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license