|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Bharat K. Bhargava, Yuhui Zhong |
Authorization Based on Evidence and Trust. |
DaWaK |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell |
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Hayes |
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Data Base System (Abstract). |
SIGMOD Conference |
1976 |
DBLP DOI BibTeX RDF |
|
27 | Juan Chen 0002, Ravi Chugh, Nikhil Swamy |
Type-preserving compilation of end-to-end verification of security enforcement. |
PLDI |
2010 |
DBLP DOI BibTeX RDF |
bytecode languages, compilers, authorization, functional programming, information flow, dependent types, security type systems, mobile code security |
27 | Limin Jia 0001, Steve Zdancewic |
Encoding information flow in Aura. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
access control, information flow control, declassification, security type system, authorization logic |
27 | Dimitrios Koukopoulos, Georgios D. Styliaras |
Security in collaborative multimedia art communities. |
EATIS |
2009 |
DBLP DOI BibTeX RDF |
authorization control, digital art project, role-based access, security, digital watermarking, collaborative environments, multimedia content, intellectual property rights |
27 | Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. |
J. Grid Comput. |
2007 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO) |
27 | Jeffrey L. Hieb, James H. Graham, Sandip C. Patel |
Security Enhancements for Distributed Control Systems. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
DNP3, role-based authorization, RTU security, secure communication |
27 | Premchand B. Ambhore, B. B. Meshram, V. B. Waghmare |
A Implementation of Object Oriented Database Security. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
structural and dynamic, and logic-based specification, access control, Semantics, data model, database security, authorization policy |
27 | Shermann S.-M. Chan, Qing Li 0001, José A. Pino |
VideoAcM: a transitive and temporal access control mechanism for collaborative video database production applications. |
Multim. Tools Appl. |
2006 |
DBLP DOI BibTeX RDF |
Transitive and temporal access control model, Client-data access control, Data-data access control, Video database, Authorization rule |
27 | Antonia Ghiselli, Federico Stagni, Riccardo Zappi |
Review of Security Models Applied to Distributed Data Access. |
Euro-Par Workshops |
2006 |
DBLP DOI BibTeX RDF |
security, authentication, Grid, authorization, policy, data management, XACML, SAML, acl |
27 | David Keppler, Vipin Swarup, Sushil Jajodia |
Redirection policies for mission-based information sharing. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
authorization, information sharing, data sharing, access control policy |
27 | Jeff Polakow, Christian Skalka |
Specifying distributed trust management in LolliMon. |
PLAS |
2006 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
27 | Ali E. Abdallah, Etienne J. Khayat |
Formal Z Specifications of Several Flat Role-Based Access Control Models. |
SEW |
2006 |
DBLP DOI BibTeX RDF |
Authorization, Role-Based Access Control, Formal Models, Z specification |
27 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
27 | Guangsen Zhang, Manish Parashar |
Dynamic Context-aware Access Control for Grid Applications. |
GRID |
2003 |
DBLP DOI BibTeX RDF |
authorization and access control, Grid computing, context-aware, Grid security, pervasive applications |
27 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
27 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian |
Flexible support for multiple access control policies. |
ACM Trans. Database Syst. |
2001 |
DBLP DOI BibTeX RDF |
logic programming, authorization, access control policy |
27 | Ninghui Li |
Local Names in SPKI/SDSI. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
27 | David F. Ferraiolo, John F. Barkley, D. Richard Kuhn |
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
Web arrows, role based access, World Wide Web, access control, RBAC, authorization management |
27 | Randy Chow, I-Lung Kao |
Modeling complex access control policies in distributed systems. |
FTDCS |
1995 |
DBLP DOI BibTeX RDF |
access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions |
26 | Carsten Bormann |
An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). |
RFC |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Juhan Kim, Yousung Kang |
UAV arming Authorization using DIM and Flight Authorization Code. |
ICTC |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis |
Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs. |
ETAA |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Nat Sakimura, John Bradley, Michael B. Jones |
The OAuth 2.0 Authorization Framework: JWT-Secured Authorization Request (JAR). |
RFC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Anzo DeGiulio, Hanoom Lee, Eleanor Birrell |
"Ask App Not to Track": The Effect of Opt-In Tracking Authorization on Mobile Privacy. |
ETAA |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone |
An Authorization Framework for Cooperative Intelligent Transport Systems. |
ETAA@ESORICS |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Nikos Fotiou, George C. Polyzos |
Authentication and Authorization for Interoperable IoT Architectures. |
ETAA@ESORICS |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Victoria Beltran, Antonio F. Skarmeta |
An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE). |
WF-IoT |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Nadeem Chaudhary, Ligang He |
Analyzing the performance impact of authorization constraints and optimizing the authorization methods for workflows. |
HiPC |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Gaoyuan Pan, Yongbin Wang |
Securing RESTful WCF Services with XAuth and Service Authorization Manager - A Practical Way for User Authorization and Server Protection. |
CSO |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Vishav Vir Singh |
PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support. |
Communication, Network, and Information Security |
2006 |
DBLP BibTeX RDF |
|
26 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens |
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. |
ISWS |
2005 |
DBLP BibTeX RDF |
|
26 | Tom Beiler |
Business-Driven Enterprise Authorization - Moving Towards a Unified Authorization Architecture. |
ICEIS (3) |
2004 |
DBLP BibTeX RDF |
|
26 | Karin Venter |
The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. |
ISSA |
2002 |
DBLP BibTeX RDF |
|
26 | Paul F. Wilms, Bruce G. Lindsay 0001 |
A Database Authorization Mechanism Supporting Individual and Group Authorization. |
DDSS |
1981 |
DBLP BibTeX RDF |
|
25 | Xiuxia Tian, Xiaoling Wang, Aoying Zhou |
A Privacy Preserving Selective Authorization Enforcement Approach in Daas. |
SERVICES |
2011 |
DBLP DOI BibTeX RDF |
Selective authorization, Access control policy polynomial, Selective encryption, DaaS |
25 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. |
CSF |
2011 |
DBLP DOI BibTeX RDF |
Access control, workflow, Separation of Duty, authorization constraint |
25 | Steffen Bartsch |
Supporting Authorization Policy Modification in Agile Development of Web Applications. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Authorization Policy Development, Policy Change Management, Agile Development, Change-Impact Analysis |
25 | Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon |
An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Pervasive, Ticket |
25 | Joshua Schiffman, Xinwen Zhang, Simon Gibbs |
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. |
POLICY |
2010 |
DBLP DOI BibTeX RDF |
Web Applications, Authorization, Distributed Applications |
25 | Haiyang Sun, Weiliang Zhao, Jian Yang 0001 |
SOAC: A Conceptual Model for Managing Service-Oriented Authorization. |
IEEE SCC |
2010 |
DBLP DOI BibTeX RDF |
Web Services, Conceptual Model, Authorization, Role Based Access Control |
25 | Fujun Feng, Junshan Li |
Trust Based Authorization and Access Control. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
access control, trust, authorization, rule |
25 | Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang |
Patient-centric authorization framework for sharing electronic health records. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
electronic health records (EHRs), patient-centric authorization, selective sharing |
25 | Zhi-Hui Wang 0001, Mingchu Li, Mao-Hua Chen, Chin-Chen Chang 0001 |
A New Intelligent Authorization Agent Model in Grid. |
HIS (1) |
2009 |
DBLP DOI BibTeX RDF |
intelligent agent, authorization, grid security |
25 | Chun Ruan, Vijay Varadharajan |
Trust Enhanced Authorization for Mobile Agents. |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
trust, mobile agent, logic programming, authorization |
25 | Samrat Mondal, Shamik Sural |
Supporting Negative Authorization in Spatiotemporal Role Based Access Control. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Negative Authorization, Spatiotemporal Context, Access Control, RBAC |
25 | Bo Chen, Guosun Zeng, Li Li 0008 |
Attribute Delegation Authorization Based on Subjective Trust Evaluation. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
subjective trust, attribute based delegation authorization, trusted role, trust control, logic system |
25 | Judith E. Y. Rossebø, Rolv Bræk |
Using Composition Policies to Manage Authentication and Authorization Patterns and Services. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
authentication and authorization, policy, service composition, service engineering |
25 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
Safety analysis of usage control authorization models. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, safety, usage control, UCON |
25 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
25 | Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Virtual identities in authentication and authorization scenarios. |
PST |
2006 |
DBLP DOI BibTeX RDF |
Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML |
25 | Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita |
An authorization model for geographical maps. |
GIS |
2004 |
DBLP DOI BibTeX RDF |
access control, GIS, authorization model |
25 | Michiharu Kudo, Satoshi Hada |
XML document security based on provisional authorization. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
provisional authorization, security transcoding, XML, XML, access control |
25 | Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof |
A Logic-based Knowledge Representation for Authorization with Delegation. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
non-monotonicity, conflict handling, knowledge representation, logic programs, Authorization, security policy, trust management, delegation |
25 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
An Extended Authorization Model for Relational Databases. |
IEEE Trans. Knowl. Data Eng. |
1997 |
DBLP DOI BibTeX RDF |
revocation of authorizations, security, privacy, access control, relational database, authorization, Database systems, protection |
25 | Jon A. Solworth |
Approvability. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, authorization, separation of duty |
25 | E. B. Fernandez, J. C. Hawkins |
Determining role rights from use cases. |
ACM Workshop on Role-Based Access Control |
1997 |
DBLP DOI BibTeX RDF |
object-oriented authorization, role-based-access-control, use cases, object-oriented analysis, authorization models |
21 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
21 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Effective Collaboration with Information Sharing in Virtual Universities. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough |
Stale-safe security properties for group-based secure information sharing. |
FMSE |
2008 |
DBLP DOI BibTeX RDF |
stale attributes, information sharing, security properties |
21 | Jeffrey A. Vaughan, Limin Jia 0001, Karl Mazurak, Steve Zdancewic |
Evidence-Based Audit. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Access control, Logic, Audit, Computer Languages |
21 | Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
Security Analysis of Role-based Separation of Duty with Workflows. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Qi Li 0002, Mingwei Xu, Xinwen Zhang |
Access control in Group Communication Systems. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Fengying Wang, Lei Zhao, Caihong Li, Zhen Cheng, Qufei Zhang |
Usage Control Resource Dissemination Model Based on Fuzzy Logic. |
FSKD (3) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line |
An novel two layer user identification method. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Brahim Gaabab, David Binet, Jean-Marie Bonnin |
Authentication Optimization for Seamless Handovers. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Weiqun Sun, Yanbo Han, Baohua Shan |
A Dynamic Reconciliation Service of RBAC Policies for Virtual Organizations. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Matthias Merz |
The management of users, roles, and permissions in JDOSecure. |
PPPJ |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hongxia Cai, Tao Yu, Minglun Fang |
Access Control Model of Manufacturing Grid. |
PROLAMAT |
2006 |
DBLP DOI BibTeX RDF |
Role-based Access Control Model, security, Manufacturing Grid |
21 | Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio Fernandez Gómez-Skarmeta |
An Access Control System for Multimedia Content Distribution. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Sang-Min Park, Glenn S. Wasson, Marty Humphrey |
Authorizing Remote Job Execution Based on Job Properties. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth |
Factoring High Level Information Flow Specifications into Low Level Access Controls. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Michael J. Covington, Manoj R. Sastry |
A Contextual Attribute-Based Access Control Model. |
OTM Workshops (2) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hua Wang 0002, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson 0001 |
A framework for role-based group deligation in distributed environments. |
ACSC |
2006 |
DBLP BibTeX RDF |
|
21 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Attribute Delegation Based on Ontologies and Context Information. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Xuebing Qing, Carlisle Adams |
XACML-Based Policy-Driven Access Control for Mobile Environments. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Da Wei, Yanheng Liu, Xuegang Yu, Xiaodong Li |
Research of Mobile IPv6 Application Based On Diameter Protocol. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yuri Demchenko, Leon Gommans, Cees de Laat, Arie Taal, Alfred Wan, Olle Mulmo |
Using Workflow for Dynamic Security Context Management in Grid-based Applications. |
GRID |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell |
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Irene Kafeza, Eleanna Kafeza, Dickson K. W. Chiu |
Legal Issues in Agents for Electronic Contracting. |
HICSS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jing Wu, Yi Mu 0001, Jennifer Seberry, Chun Ruan |
Access Policy Sheet for Access Control in Fine-Grained XML. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Vijayalakshmi Atluri, Qi Guo |
Unified Index for Mobile Object Data and Authorizations. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino |
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. |
IEEE SCC |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Eric Freudenthal, Vijay Karamcheti |
DisCo: Middleware for Securely Deploying Decomposable Services in Partly Trusted Environments. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Yihui Luo, Changsheng Xie, Chengfeng Zhang |
A Security Scheme for United Storage Network. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Baoyi Wang, Shaomin Zhang |
The Research on Role-Based Access Control Mechanism for Workflow Management System. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Kazuteru Matsumoto, Atsushi Hashimoto, Takaichi Yoshida |
Access Control by using Object Properties and Categorized Methods. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Mohammad A. Al-Kahtani, Ravi Sandhu. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Xin Zhao 0016, Atul Prakash 0001 |
Source Authentication in Group Communication Systems. |
DEXA Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Dong-Gue Park, You-Ri Lee |
The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. |
EC-Web |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou |
Integrated Access Control and Intrusion Detection for Web Servers. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Baiyan Li, Wensheng Yao, Jinyuan You |
Modeling Trust Management System for Grids. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Baoyi Wang, Shaomin Zhang, Xiaodong Xia |
The Application Research of Role-Based Access Control Model in Workflow Management System. |
GCC (2) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, Mudassir Fajandar |
A Federated Model for Secure Web-Based Videoconferencing. |
ITCC |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 |
Enforcing History-Based Security Policies in Mobile Agent Systems. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|