|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | Bharat K. Bhargava, Yuhui Zhong |
Authorization Based on Evidence and Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 4th International Conference, DaWaK 2002, Aix-en-Provence, France, September 4-6, 2002, Proceedings, pp. 94-103, 2002, Springer, 3-540-44123-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 271-285, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Yves Deswarte, Noreddine Abghour, Vincent Nicomette, David Powell |
An Internet Authorization Scheme Using Smart-Card-Based Security Kernels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E-smart ![In: Smart Card Programming and Security, International Conference on Research in Smart Cards, E-smart 2001, Cannes, France, September 19-21, 2001, Proceedings, pp. 71-82, 2001, Springer, 3-540-42610-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta |
AMBAR Protocol: Access Management Based on Authorization Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 376-380, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
27 | Jeff Hayes |
Policy-based Authentication and Authorization: Secure Access to the Network Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 328-333, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Data Base System (Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1976 ACM SIGMOD International Conference on Management of Data, Washington, DC, USA, June 2-4, 1976., pp. 51, 1976, ACM, 978-1-4503-4729-7. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
27 | Juan Chen 0002, Ravi Chugh, Nikhil Swamy |
Type-preserving compilation of end-to-end verification of security enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2010, Toronto, Ontario, Canada, June 5-10, 2010, pp. 412-423, 2010, ACM, 978-1-4503-0019-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
bytecode languages, compilers, authorization, functional programming, information flow, dependent types, security type systems, mobile code security |
27 | Limin Jia 0001, Steve Zdancewic |
Encoding information flow in Aura. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 17-29, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, information flow control, declassification, security type system, authorization logic |
27 | Dimitrios Koukopoulos, Georgios D. Styliaras |
Security in collaborative multimedia art communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EATIS ![In: Proceedings of the 2009 Euro American conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, EATIS 2009, Prague, Czech Republic, June 3-5, 2009, pp. 9, 2009, 978-1-60558-398-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
authorization control, digital art project, role-based access, security, digital watermarking, collaborative environments, multimedia content, intellectual property rights |
27 | Anil L. Pereira, Vineela Muppavarapu, Soon M. Chung |
Managing Role-Based Access Control Policies for Grid Databases in OGSA-DAI Using CAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 5(1), pp. 65-81, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture - Data Access and Integration (OGSA-DAI), Grid databases, Community Authorization Service (CAS), role-based access control (RBAC), virtual organization (VO) |
27 | Jeffrey L. Hieb, James H. Graham, Sandip C. Patel |
Security Enhancements for Distributed Control Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Critical Infrastructure Protection ![In: Critical Infrastructure Protection, Post-Proceedings of the First Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA, March 19-21, 2007, pp. 133-146, 2007, Springer, 978-0-387-75461-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
DNP3, role-based authorization, RTU security, secure communication |
27 | Premchand B. Ambhore, B. B. Meshram, V. B. Waghmare |
A Implementation of Object Oriented Database Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 359-365, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
structural and dynamic, and logic-based specification, access control, Semantics, data model, database security, authorization policy |
27 | Shermann S.-M. Chan, Qing Li 0001, José A. Pino |
VideoAcM: a transitive and temporal access control mechanism for collaborative video database production applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 29(1), pp. 29-53, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Transitive and temporal access control model, Client-data access control, Data-data access control, Video database, Authorization rule |
27 | Antonia Ghiselli, Federico Stagni, Riccardo Zappi |
Review of Security Models Applied to Distributed Data Access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2006 Workshops: Parallel Processing, CoreGRID 2006, UNICORE Summit 2006, Petascale Computational Biology and Bioinformatics, Dresden, Germany, August 29-September 1, 2006, Revised Selected Papers, pp. 34-48, 2006, Springer, 978-3-540-72226-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, authentication, Grid, authorization, policy, data management, XACML, SAML, acl |
27 | David Keppler, Vipin Swarup, Sushil Jajodia |
Redirection policies for mission-based information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 210-218, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization, information sharing, data sharing, access control policy |
27 | Jeff Polakow, Christian Skalka |
Specifying distributed trust management in LolliMon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 37-46, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
27 | Ali E. Abdallah, Etienne J. Khayat |
Formal Z Specifications of Several Flat Role-Based Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEW ![In: 30th Annual IEEE / NASA Software Engineering Workshop (SEW-30 2006), 25-28 April 2006, Loyola College Graduate Center, Columbia, MD, USA, pp. 282-292, 2006, IEEE Computer Society, 0-7695-2624-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Authorization, Role-Based Access Control, Formal Models, Z specification |
27 | Walid Bagga, Stefano Crosta, Refik Molva |
Proof-Carrying Proxy Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 321-335, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Data Minimization, Authorization, Bilinear Pairings, Credentials, Proxy Certificates |
27 | Guangsen Zhang, Manish Parashar |
Dynamic Context-aware Access Control for Grid Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 101-108, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authorization and access control, Grid computing, context-aware, Grid security, pervasive applications |
27 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 135-140, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
27 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian |
Flexible support for multiple access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 26(2), pp. 214-260, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
logic programming, authorization, access control policy |
27 | Ninghui Li |
Local Names in SPKI/SDSI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 13th IEEE Computer Security Foundations Workshop, CSFW '00, Cambridge, England, UK, July 3-5, 2000, pp. 2-15, 2000, IEEE Computer Society, 0-7695-0671-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
SDSI, access control, logic programming, authorization, security policies, trust management, SPKI |
27 | David F. Ferraiolo, John F. Barkley, D. Richard Kuhn |
A Role-Based Access Control Model and Reference Implementation within a Corporate Intranet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 2(1), pp. 34-64, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Web arrows, role based access, World Wide Web, access control, RBAC, authorization management |
27 | Randy Chow, I-Lung Kao |
Modeling complex access control policies in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 5th IEEE Workshop on Future Trends of Distributed Computing Systems (FTDCS 1995), August 28-30, 1995, Chenju, Korea, Proceedings, pp. 404-411, 1995, IEEE Computer Society, 0-8186-7125-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions |
26 | Carsten Bormann |
An Authorization Information Format (AIF) for Authentication and Authorization for Constrained Environments (ACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9237, pp. 1-14, August 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Juhan Kim, Yousung Kang |
UAV arming Authorization using DIM and Flight Authorization Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTC ![In: 13th International Conference on Information and Communication Technology Convergence, ICTC 2022, Jeju Island, Korea, Republic of, October 19-21, 2022, pp. 2065-2067, 2022, IEEE, 978-1-6654-9939-2. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A. Siris, George C. Polyzos, Nikolaos Ipiotis, Stratos Keranidis |
Authentication, Authorization, and Selective Disclosure for IoT Data Sharing Using Verifiable Credentials and Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA ![In: Emerging Technologies for Authorization and Authentication - 5th International Workshop, ETAA 2022, Copenhagen, Denmark, September 30, 2022, Revised Selected Papers, pp. 88-101, 2022, Springer, 978-3-031-25466-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Nat Sakimura, John Bradley, Michael B. Jones |
The OAuth 2.0 Authorization Framework: JWT-Secured Authorization Request (JAR). ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 9101, pp. 1-25, August 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Anzo DeGiulio, Hanoom Lee, Eleanor Birrell |
"Ask App Not to Track": The Effect of Opt-In Tracking Authorization on Mobile Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA ![In: Emerging Technologies for Authorization and Authentication - 4th International Workshop, ETAA 2021, Darmstadt, Germany, October 8, 2021, Revised Selected Papers, pp. 152-167, 2021, Springer, 978-3-030-93746-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sowmya Ravidas, Priyanka Karkhanis, Yanja Dajsuren, Nicola Zannone |
An Authorization Framework for Cooperative Intelligent Transport Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA@ESORICS ![In: Emerging Technologies for Authorization and Authentication - Second International Workshop, ETAA 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings, pp. 16-34, 2019, Springer, 978-3-030-39748-7. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Nikos Fotiou, George C. Polyzos |
Authentication and Authorization for Interoperable IoT Architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETAA@ESORICS ![In: Emerging Technologies for Authorization and Authentication - First International Workshop, ETAA@ESORICS 2018, Barcelona, Spain, September 7, 2018, Proceedings, pp. 3-16, 2018, Springer, 978-3-030-04371-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Victoria Beltran, Antonio F. Skarmeta |
An overview on delegated authorization for CoAP: Authentication and authorization for Constrained Environments (ACE). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WF-IoT ![In: 3rd IEEE World Forum on Internet of Things, WF-IoT 2016, Reston, VA, USA, December 12-14, 2016, pp. 706-710, 2016, IEEE Computer Society, 978-1-5090-4130-5. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Nadeem Chaudhary, Ligang He |
Analyzing the performance impact of authorization constraints and optimizing the authorization methods for workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: 20th Annual International Conference on High Performance Computing, HiPC 2013, Bengaluru (Bangalore), Karnataka, India, December 18-21, 2013, pp. 1-9, 2013, IEEE Computer Society, 978-1-4799-0730-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Gaoyuan Pan, Yongbin Wang |
Securing RESTful WCF Services with XAuth and Service Authorization Manager - A Practical Way for User Authorization and Server Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSO ![In: Fifth International Joint Conference on Computational Sciences and Optimization, CSO 2012, Harbin, Heilongjiang, China, June 23-26, 2012, pp. 651-653, 2012, IEEE Computer Society, 978-1-4673-1365-0. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Vishav Vir Singh |
PROTEMP-Z: An XML based authorization system with provisional authorization and temporal certification support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communication, Network, and Information Security ![In: Proceedings of the Third IASTED International Conference on Communication, Network, and Information Security, October 9-11, 2006, Cambridge, MA, USA, pp. 1-6, 2006, IASTED/ACTA Press, 0-88986-636-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
26 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens |
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWS ![In: Proceedings of The 2005 International Symposium on Web Services and Applications, ISWS 2005, Las Vegas, Nevada, USA, June 27-30, 2005, pp. 35-44, 2005, CSREA Press, 1-932415-72-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
26 | Tom Beiler |
Business-Driven Enterprise Authorization - Moving Towards a Unified Authorization Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEIS (3) ![In: ICEIS 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004, pp. 67-72, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
26 | Karin Venter |
The Delegation Authorization Model: A Model For The Dynamic Delegation Of Authorization Rights In A Secure Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSA ![In: Proceedings of the ISSA 2002 Information for Security for South-Africa 2nd Annual Conference, 10-12 July 2002, Misty Hills Country Hotel, Muldersdrift, Gauteng, South Africa, pp. 1-13, 2002, ISSA, Pretoria, South Africa. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
26 | Paul F. Wilms, Bruce G. Lindsay 0001 |
A Database Authorization Mechanism Supporting Individual and Group Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DDSS ![In: Distributed Data Sharing Systems, Proceedings of the Second International Seminar on Distributed Data Sharing Systems, DDSS 1981, Amsterdam, The Netherlands, 3-5 June, 1981., pp. 273-292, 1981, North-Holland, 0-444-86374-5. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP BibTeX RDF |
|
25 | Xiuxia Tian, Xiaoling Wang, Aoying Zhou |
A Privacy Preserving Selective Authorization Enforcement Approach in Daas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERVICES ![In: World Congress on Services, SERVICES 2011, Washington, DC, USA, July 4-9, 2011, pp. 363-370, 2011, IEEE Computer Society, 978-1-4577-0879-4. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Selective authorization, Access control policy polynomial, Selective encryption, DaaS |
25 | David A. Basin, Samuel J. Burri, Günter Karjoth |
Obstruction-Free Authorization Enforcement: Aligning Security with Business Objectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 99-113, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Access control, workflow, Separation of Duty, authorization constraint |
25 | Steffen Bartsch |
Supporting Authorization Policy Modification in Agile Development of Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 495-500, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Authorization Policy Development, Policy Change Management, Agile Development, Change-Impact Analysis |
25 | Jong Sik Moon, Im-Yeong Lee, Kang Bin Yim, Sang-Gu Byeon |
An Authentication and Authorization Protocol Using Ticket in Pervasive Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 822-826, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Authentication, Authorization, Pervasive, Ticket |
25 | Joshua Schiffman, Xinwen Zhang, Simon Gibbs |
DAuth: Fine-Grained Authorization Delegation for Distributed Web Application Consumers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2010, IEEE International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010, pp. 95-102, 2010, IEEE Computer Society, 978-1-4244-8206-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Web Applications, Authorization, Distributed Applications |
25 | Haiyang Sun, Weiliang Zhao, Jian Yang 0001 |
SOAC: A Conceptual Model for Managing Service-Oriented Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010, pp. 546-553, 2010, IEEE Computer Society, 978-0-7695-4126-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Web Services, Conceptual Model, Authorization, Role Based Access Control |
25 | Fujun Feng, Junshan Li |
Trust Based Authorization and Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFITA (3) ![In: International Forum on Information Technology and Applications, IFITA 2009, Chengdu, China, 15-17 May 2009, pp. 162-165, 2009, IEEE Computer Society, 978-0-7695-3600-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, trust, authorization, rule |
25 | Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang |
Patient-centric authorization framework for sharing electronic health records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 125-134, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
electronic health records (EHRs), patient-centric authorization, selective sharing |
25 | Zhi-Hui Wang 0001, Mingchu Li, Mao-Hua Chen, Chin-Chen Chang 0001 |
A New Intelligent Authorization Agent Model in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS (1) ![In: 9th International Conference on Hybrid Intelligent Systems (HIS 2009), August 12-14, 2009, Shenyang, China, pp. 394-398, 2009, IEEE Computer Society, 978-0-7695-3745-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intelligent agent, authorization, grid security |
25 | Chun Ruan, Vijay Varadharajan |
Trust Enhanced Authorization for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 10th International Conference, EC-Web 2009, Linz, Austria, September 1-4, 2009. Proceedings, pp. 84-95, 2009, Springer, 978-3-642-03963-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
trust, mobile agent, logic programming, authorization |
25 | Samrat Mondal, Shamik Sural |
Supporting Negative Authorization in Spatiotemporal Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetCoM ![In: First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009, pp. 422-427, 2009, IEEE Computer Society, 978-0-7695-3924-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Negative Authorization, Spatiotemporal Context, Access Control, RBAC |
25 | Bo Chen, Guosun Zeng, Li Li 0008 |
Attribute Delegation Authorization Based on Subjective Trust Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NPC Workshops ![In: IFIP International Conference on Network and Parallel Computing, NPC 2008, Shanghai, China, October 18-21, 2008, Workshop Proceedings, pp. 42-49, 2008, IEEE Computer Society, 978-0-7695-3354-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
subjective trust, attribute based delegation authorization, trusted role, trust control, logic system |
25 | Judith E. Y. Rossebø, Rolv Bræk |
Using Composition Policies to Manage Authentication and Authorization Patterns and Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 597-603, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authentication and authorization, policy, service composition, service engineering |
25 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
Safety analysis of usage control authorization models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 243-254, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, safety, usage control, UCON |
25 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 190-199, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
25 | Santiago Zapata Hernandez, Antonio Fernandez Gómez-Skarmeta |
Virtual identities in authentication and authorization scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 57, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Daidalos, ID-token, PANA, RegID, VID, authentication, authorization, identity, diameter, SAML |
25 | Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita |
An authorization model for geographical maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GIS ![In: 12th ACM International Workshop on Geographic Information Systems, ACM-GIS 2004, November 12-13, 2004, Washington, DC, USA, Proceedings, pp. 82-91, 2004, ACM, 1-58113-979-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, GIS, authorization model |
25 | Michiharu Kudo, Satoshi Hada |
XML document security based on provisional authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 87-96, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
provisional authorization, security transcoding, XML, XML, access control |
25 | Ninghui Li, Joan Feigenbaum, Benjamin N. Grosof |
A Logic-based Knowledge Representation for Authorization with Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: Proceedings of the 12th IEEE Computer Security Foundations Workshop, CSFW 1999, Mordano, Italy, June 28-30, 1999, pp. 162-174, 1999, IEEE Computer Society, 0-7695-0201-6. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
non-monotonicity, conflict handling, knowledge representation, logic programs, Authorization, security policy, trust management, delegation |
25 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
An Extended Authorization Model for Relational Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 9(1), pp. 85-101, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
revocation of authorizations, security, privacy, access control, relational database, authorization, Database systems, protection |
25 | Jon A. Solworth |
Approvability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 231-242, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, authorization, separation of duty |
25 | E. B. Fernandez, J. C. Hawkins |
Determining role rights from use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Proceedings of the Second Workshop on Role-Based Access Control, RBAC 1997, Fairfax, VA, USA, November 6-7, 1997, pp. 121-125, 1997, ACM, 0-89791-985-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
object-oriented authorization, role-based-access-control, use cases, object-oriented analysis, authorization models |
21 | Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
A card requirements language enabling privacy-preserving access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 119-128, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, access control, policy languages, anonymous credentials, digital credentials |
21 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Effective Collaboration with Information Sharing in Virtual Universities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 21(6), pp. 840-853, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Ram Krishnan, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough |
Stale-safe security properties for group-based secure information sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 6th ACM Workshop on Formal Methods in Security Engineering, FMSE 2008, Alexandria, VA, USA, October 27, 2008, pp. 53-62, 2008, ACM, 978-1-60558-288-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stale attributes, information sharing, security properties |
21 | Jeffrey A. Vaughan, Limin Jia 0001, Karl Mazurak, Steve Zdancewic |
Evidence-Based Audit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 177-191, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access control, Logic, Audit, Computer Languages |
21 | Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
Security Analysis of Role-based Separation of Duty with Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 765-770, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Qi Li 0002, Mingwei Xu, Xinwen Zhang |
Access control in Group Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 380-385, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 391-403, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Fengying Wang, Lei Zhao, Caihong Li, Zhen Cheng, Qufei Zhang |
Usage Control Resource Dissemination Model Based on Fuzzy Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSKD (3) ![In: Fifth International Conference on Fuzzy Systems and Knowledge Discovery, FSKD 2008, 18-20 October 2008, Jinan, Shandong, China, Proceedings, Volume 3, pp. 454-458, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Wen-Pinn Fang, Hong-Ru Lee, Fang-Pan Line |
An novel two layer user identification method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: IEEE International Conference on Intelligence and Security Informatics, ISI 2008, Taipei, Taiwan, June 17-20, 2008, Proceedings, pp. 292-293, 2008, IEEE, 978-1-4244-2414-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Brahim Gaabab, David Binet, Jean-Marie Bonnin |
Authentication Optimization for Seamless Handovers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 829-832, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Weiqun Sun, Yanbo Han, Baohua Shan |
A Dynamic Reconciliation Service of RBAC Policies for Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: Proceedings of ICEBE 2007, IEEE International Conference on e-Business Engineering and the Workshops SOAIC 2007, SOSE 2007, SOKM 2007, 24-26 October, 2007, Hong Kong, China, pp. 589-595, 2007, IEEE Computer Society, 0-7695-3003-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Matthias Merz |
The management of users, roles, and permissions in JDOSecure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 4th International Symposium on Principles and Practice of Programming in Java, PPPJ 2006, Mannheim, Germany, August 30 - September 1, 2006, pp. 85-93, 2006, ACM, 3-939352-05-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hongxia Cai, Tao Yu, Minglun Fang |
Access Control Model of Manufacturing Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROLAMAT ![In: Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, Proceedings of PROLAMAT 2006, IFIP TC5 International Conference, June 15-17, 2006, Shanghai, China, pp. 938-943, 2006, Springer, 0-387-34402-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Role-based Access Control Model, security, Manufacturing Grid |
21 | Manuel Sánchez, Gabriel López 0001, Óscar Cánovas Reverte, Juan A. Sánchez, Antonio Fernandez Gómez-Skarmeta |
An Access Control System for Multimedia Content Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Third European PKI Workshop: Theory and Practice, EuroPKI 2006, Turin, Italy, June 19-20, 2006, Proceedings, pp. 169-183, 2006, Springer, 3-540-35151-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Sang-Min Park, Glenn S. Wasson, Marty Humphrey |
Authorizing Remote Job Execution Based on Job Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
e-Science ![In: Second International Conference on e-Science and Grid Technologies (e-Science 2006), 4-6 December 2006, Amsterdam, The Netherlands, pp. 29, 2006, IEEE Computer Society, 0-7695-2734-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Kevin Kahley, Manigandan Radhakrishnan, Jon A. Solworth |
Factoring High Level Information Flow Specifications into Low Level Access Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWIA ![In: Proceedings of the 4th IEEE International Workshop on Information Assurance (IWIA 2006), 13-14 April 2006, Egham, Surrey, UK, pp. 169-186, 2006, IEEE Computer Society, 0-7695-2564-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Michael J. Covington, Manoj R. Sastry |
A Contextual Attribute-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (2) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part II, pp. 1996-2006, 2006, Springer, 3-540-48273-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hua Wang 0002, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson 0001 |
A framework for role-based group deligation in distributed environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSC ![In: Computer Science 2006, Twenty-Nineth Australasian Computer Science Conference (ACSC2006), Hobart, Tasmania, Australia, January 16-19 2006, pp. 321-328, 2006, Australian Computer Society, 1-920682-30-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
21 | Isaac Agudo, Javier López 0001, José A. Montenegro |
Attribute Delegation Based on Ontologies and Context Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 54-66, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Xuebing Qing, Carlisle Adams |
XACML-Based Policy-Driven Access Control for Mobile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCECE ![In: Proceedings of the Canadian Conference on Electrical and Computer Engineering, CCECE 2006, May 7-10, 2006, Ottawa Congress Centre, Ottawa, Canada, pp. 643-646, 2006, IEEE, 1-4244-0038-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Da Wei, Yanheng Liu, Xuegang Yu, Xiaodong Li |
Research of Mobile IPv6 Application Based On Diameter Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 25-29, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Yuri Demchenko, Leon Gommans, Cees de Laat, Arie Taal, Alfred Wan, Olle Mulmo |
Using Workflow for Dynamic Security Context Management in Grid-based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 7th IEEE/ACM International Conference on Grid Computing (GRID 2006), September 28-29, 2006, Barcelona, Spain, Proceedings, pp. 72-79, 2006, IEEE Computer Society, 1-4244-0344-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell |
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPC ![In: Security in Pervasive Computing, Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings, pp. 134-150, 2005, Springer, 3-540-25521-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Irene Kafeza, Eleanna Kafeza, Dickson K. W. Chiu |
Legal Issues in Agents for Electronic Contracting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Jing Wu, Yi Mu 0001, Jennifer Seberry, Chun Ruan |
Access Policy Sheet for Access Control in Fine-Grained XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 1273-1282, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Vijayalakshmi Atluri, Qi Guo |
Unified Index for Mobile Object Data and Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 80-97, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino |
Efficient Integration of Fine-grained Access Control in Large-scale Grid Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2005 IEEE International Conference on Services Computing (SCC 2005), 11-15 July 2005, Orlando, FL, USA, pp. 77-86, 2005, IEEE Computer Society, 0-7695-2408-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Eric Freudenthal, Vijay Karamcheti |
DisCo: Middleware for Securely Deploying Decomposable Services in Partly Trusted Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), 24-26 March 2004, Hachioji, Tokyo, Japan, pp. 494-503, 2004, IEEE Computer Society, 0-7695-2086-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Yihui Luo, Changsheng Xie, Chengfeng Zhang |
A Security Scheme for United Storage Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 238-245, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Baoyi Wang, Shaomin Zhang |
The Research on Role-Based Access Control Mechanism for Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 729-736, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Kazuteru Matsumoto, Atsushi Hashimoto, Takaichi Yoshida |
Access Control by using Object Properties and Categorized Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 397-402, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Mohammad A. Al-Kahtani, Ravi Sandhu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 405-415, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Xin Zhao 0016, Atul Prakash 0001 |
Source Authentication in Group Communication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 14th International Workshop on Database and Expert Systems Applications (DEXA'03), September 1-5, 2003, Prague, Czech Republic, pp. 455-459, 2003, IEEE Computer Society, 0-7695-1993-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Dong-Gue Park, You-Ri Lee |
The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, 4th International Conference, EC-Web, Prague, Czech Republic, September 2-5, 2003, Proceedings, pp. 84-93, 2003, Springer, 3-540-40808-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou |
Integrated Access Control and Intrusion Detection for Web Servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 394-, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Baiyan Li, Wensheng Yao, Jinyuan You |
Modeling Trust Management System for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 899-906, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Baoyi Wang, Shaomin Zhang, Xiaodong Xia |
The Application Research of Role-Based Access Control Model in Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 1034-1037, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, Mudassir Fajandar |
A Federated Model for Secure Web-Based Videoconferencing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2003 International Symposium on Information Technology (ITCC 2003), 28-30 April 2003, Las Vegas, NV, USA, pp. 396-400, 2003, IEEE Computer Society, 0-7695-1916-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 |
Enforcing History-Based Security Policies in Mobile Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 231-234, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|