Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Kun Peng |
Verifiable Secret Sharing with Comprehensive and Efficient Public Verification. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meixing Le, Krishna Kant 0001, Sushil Jajodia |
Cooperative Data Access in Multi-cloud Environments. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya |
An Optimization Model for the Extended Role Mining Problem. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Song Luo, Zhong Chen 0001 |
A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Nakeisha Schimke, Mary Kuehler, John Hale |
Preserving Privacy in Structural Neuroimages. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert W. N. van der Torre |
Dynamics in Delegation and Revocation Schemes: A Logical Approach. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuliya Kopylova, Csilla Farkas, Wenyuan Xu |
Accurate Accident Reconstruction in VANET. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hao Lei, Dengguo Feng |
Selective Disclosure on Encrypted Documents. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keith B. Frikken, Boyang Li 0002 |
Private Database Search with Sublinear Query Time. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup |
History-Dependent Inference Control of Queries by Dynamic Policy Adaption. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Mohammad Shahriar Rahman |
Privacy-Preserving Data Mining: A Game-Theoretic Approach. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yuan Hong, Jaideep Vaidya, Haibing Lu |
Efficient Distributed Linear Programming with Limited Disclosure. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Wei Jiang, Bharath K. Samanthula |
N-Gram Based Secure Similar Document Detection. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez |
Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raman Adaikkalavan, Indrakshi Ray, Xing Xie 0002 |
Multilevel Secure Data Stream Processing. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefano Paraboschi |
Integrated Management of Security Policies. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ahmet Erhan Nergiz, Chris Clifton |
Query Processing in Private Data Outsourcing Using Anonymization. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongxin Hu, Gail-Joon Ahn |
Multiparty Authorization Framework for Data Sharing in Online Social Networks. (PDF / PS) |
DBSec |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Angela Bonifati, Ruilin Liu, Wendy Hui Wang |
Distributed and Secure Access Control in P2P Databases. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin |
Enforcing Request Integrity in Web Applications. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens, Stephane Morucci |
fQuery: SPARQL Query Rewriting to Enforce Data Confidentiality. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham |
Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Hyun Sung Kim 0001, Jian-bin Hu, Zhong Chen 0001 |
When ABE Meets RSS. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alex Hai Wang |
Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
A Secure RFID Ticket System for Public Transport. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
Evaluating the Risk of Adopting RBAC Roles. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker |
PriMan : A Privacy-Preserving Identity Framework. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Suratose Tritilanunt |
Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Amril Syalim, Takashi Nishide, Kouichi Sakurai |
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu |
A Labelling System for Derived Data Control. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hasan Qunoo, Mark Ryan 0001 |
Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar |
Secure Location Verification - A Security Analysis of GPS Signal Authentication. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Marina Blanton, Mehrdad Aliasgari |
Secure Outsourcing of DNA Searching via Finite Automata. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray |
Using Trust-Based Information Aggregation for Predicting Security Level of Systems. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Aarthi Nagarajan, Vijay Varadharajan |
Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu |
Role Mining in the Presence of Noise. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner |
Efficient Inference Control for Open Relational Queries. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker, Valerio Genovese |
A Logic of Privacy. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi |
An Access Control Model for Web Databases. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton, Rosli Daud, Keith M. Martin |
Constructing Key Assignment Schemes from Chain Partitions. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco |
Query Racing: Fast Completeness Certification of Query Results. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
On the Identification of Property Based Generalizations in Microdata Anonymization. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Chandramouli |
Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zutao Zhu, Wenliang Du |
Understanding Privacy Risk of Publishing Decision Trees. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jan Zibuschka, Matthias Herbert, Heiko Rossnagel |
Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sara Foresti, Sushil Jajodia (eds.) |
Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi |
Generalizing PIR for Practical Private Retrieval of Public Data. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu, Mine Altunay |
Mining Likely Properties of Access Control Policies via Association Rule Mining. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Yermek Nugmanov, Brajendra Panda, Yi Hu |
Analysis of Data Dependency Based Intrusion Detection System. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
Database intrusion detection, semantic analyzer, response strategy, cost analysis |
1 | Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu |
PAES: Policy-Based Authority Evaluation Scheme. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Lars E. Olson 0001, Carl A. Gunter, William R. Cook, Marianne Winslett |
Implementing Reflective Access Control in SQL. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Joachim Biskup, Jens Seiler, Torben Weibert |
Controlled Query Evaluation and Inference-Free View Updates. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, William M. Fitzgerald |
An Approach to Security Policy Configuration Using Semantic Threat Graphs. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi |
Using Edit Automata for Rewriting-Based Security Enforcement. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
program rewriting, security properties, Execution monitoring, edit automata |
1 | Bechara al Bouna, Richard Chbeir |
Detecting Inference Channels in Private Multimedia Data via Social Networks. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
Inference Channels, Multimedia, Access Control |
1 | Olivier Sarrouy, Eric Totel, Bernard Jouga |
Building an Application Data Behavior Model for Intrusion Detection. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ehud Gudes, Jaideep Vaidya (eds.) |
Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Yang, Mohammad Zulkernine |
Secure Method Calls by Instrumenting Bytecode with Aspects. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
code security, aspects, Bytecode instrumentation |
1 | Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe |
Privacy-Preserving Telemonitoring for eHealth. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stephen R. Tate, Roopa Vishwanathan |
Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Heechang Shin, Vijayalakshmi Atluri |
Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray |
A Trust-Based Access Control Model for Pervasive Computing Applications. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn |
Towards System Integrity Protection with Graph-Based Policy Analysis. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Solomon Berhe, Steven A. Demurjian, Thomas Agresta |
Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein |
Methods for Computing Trust and Reputation While Preserving Privacy. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Pawel Jurczyk, Li Xiong 0001 |
Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wolter Pieters, Qiang Tang 0001 |
Data Is Key: Introducing the Data-Based Access Control Paradigm. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
data-based access control, de-perimeterisation, secret sharing, secure sketches |
1 | Keith B. Frikken |
Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
DNA matching, Cryptography, Privacy-Preserving Protocols |
1 | Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
Reaction Policy Model Based on Dynamic Organizations and Threat Context. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Barbara Carminati, Elena Ferrari |
Privacy-Aware Collaborative Access Control in Web-Based Social Networks. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Privacy-preserving data management, Web-based Social Networks, Collaborative access control |
1 | Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang |
Protecting the Publishing Identity in Multiple Tuples. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Identity, Privacy preservation, Data publishing |
1 | Daryl Walleck, Yingjiu Li, Shouhuai Xu |
Empirical Analysis of Certificate Revocation Lists. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
public key infrastructure, empirical analysis, certificate revocation |
1 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora |
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi |
Towards Automation of Testing High-Level Security Properties. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Dynamic Analysis, Data Dependency, Test Data Generation, Control Flow Analysis, Security Testing |
1 | Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam |
Secure Construction of Contingency Tables from Distributed Data. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Nayot Poolsappasit, Rinku Dewri |
An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Atluri (eds.) |
Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Lei Zhang 0004, Lingyu Wang 0001, Sushil Jajodia, Alexander Brodsky 0001 |
Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe |
A Privacy-Preserving Ticketing System. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Electronic Identity cards, Security, Privacy, Anonymity, Ticketing |
1 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Analysis of Windows Vista Disk Encryption Algorithm. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Disk encryption, Windows Vista disk encryption algorithm |
1 | Steve Barker |
Dynamic Meta-level Access Control in SQL. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Manachai Toahchoodee, Indrakshi Ray |
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Alex Roichman, Ehud Gudes |
DIWeDa - Detecting Intrusions in Web Databases. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
web database security, database vulnerability, SQL content classification, Intrusion detection |
1 | Anoop Singhal |
Web Services Security: Techniques and Challenges (Extended Abstract). (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
Securing Workflows with XACML, RDF and BPEL. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Muntaha Alawneh, Imad M. Abbadi |
Sharing but Protecting Content Against Internal Leakage for Organisations. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Ross J. Anderson |
Security, Functionality and Scale? (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati |
Regulating Exceptions in Healthcare Using Policy Spaces. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil |
Using New Tools for Certificate Repositories Generation in MANETs. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
Public-key management, MANETs |
1 | Changyu Dong, Giovanni Russello, Naranker Dulay |
Shared and Searchable Encrypted Data for Untrusted Servers. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham |
Panel Session: What Are the Key Challenges in Distributed Security?. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Di Ma, Gene Tsudik |
A New Approach to Secure Logging. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
secure logging, forward secure stream integrity, MACs, signatures, truncation attack |
1 | Lingyu Wang 0001, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia |
An Attack Graph-Based Probabilistic Security Metric. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Angela Cristina Duta, Ken Barker 0001 |
P4A: A New Privacy Model for XML. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
privacy statement, flexible privacy policy, privacy map, privacy preference |
1 | Shouhuai Xu, Ravi S. Sandhu |
A Scalable and Secure Cryptographic Service. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
cryptographic service, compromise detection, compromise confinement, security, scalability, availability |
1 | Giuseppe Di Battista, Bernardo Palazzi |
Authenticated Relational Tables and Authenticated Skip Lists. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
Authenticated Relational Table, Authenticated Skip List, Authenticated query |
1 | Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin |
Towards a Times-Based Usage Control Model. (PDF / PS) |
DBSec |
2007 |
DBLP DOI BibTeX RDF |
Times-based Usage Control, TUCON, Access Control, Authorization, Usage Control |