|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
21 | Axel Mönkeberg, René Rakete |
Three for one: role-based access-control management in rapidly changing heterogeneous environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 83-88, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
21 | George I. Davida, Yair Frankel, Brian J. Matt |
On Enabling Secure Applications Through Off-Line Biometric Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 148-157, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Iris Sheauyin Chu, Marianne Winslett |
Minipage Locking Support for Object-Oriented Page-Server DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29 - December 2, 1994, pp. 171-178, 1994, ACM. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
20 | |
Authorization Administration Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 180, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | |
Authorization Policy Languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 180, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | |
Authorization Administration Privileges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 180, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | |
Authorization Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Encyclopedia of Database Systems ![In: Encyclopedia of Database Systems, pp. 180, 2009, Springer US, 978-0-387-35544-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Shaomin Zhang, Haiyan Zhang, Baoyi Wang |
Study on Centralized Authorization Model Supporting Multiple Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 769-772, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li |
An efficient framework for user authorization queries in RBAC systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 23-32, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
constraints, role based access control |
20 | Avik Chaudhuri, Deepak Garg 0001 |
PCAL: Language Support for Proof-Carrying Authorization Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 184-199, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Alessandro Armando, Enrico Giunchiglia, Serena Elisa Ponta |
Formal Specification and Automatic Analysis of Business Processes under Authorization Constraints: An Action-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings, pp. 63-72, 2009, Springer, 978-3-642-03747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sok-Ian Sou, Yi-Bing Lin, Jeu-Yih Jeng |
Reducing Credit Re-authorization Cost in UMTS Online Charging System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 7(9), pp. 3629-3635, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Tomislav Grgic, Vedran Huskic, Maja Matijasevic |
Resource Authorization in IMS with Known Multimedia Service Adaptation Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Directions in Intelligent Interactive Multimedia ![In: New Directions in Intelligent Interactive Multimedia, pp. 293-302, 2008, Springer, 978-3-540-68126-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Runlian Zhang, Xiaonian Wu, Xiaoshe Dong, Shangyuan Guan |
An Authorization Mechanism Based on Privilege Negotiation Policy in Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: 10th IEEE International Conference on High Performance Computing and Communications, HPCC 2008, 25-27 Sept. 2008, Dalian, China, pp. 720-727, 2008, IEEE Computer Society, 978-0-7695-3352-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Michael Gelfond, Jorge Lobo 0001 |
Authorization and Obligation Policies in Dynamic Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 24th International Conference, ICLP 2008, Udine, Italy, December 9-13 2008, Proceedings, pp. 22-36, 2008, Springer, 978-3-540-89981-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Peng Zhang, Yanzhang Wang, Wang Dong, Dong Yanjie, Ning Wang 0021 |
Study on the Authorization Management Model Based on Organization in E-government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Web Intelligence/IAT Workshops ![In: Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, 9-12 December 2008, Sydney, NSW, Australia, pp. 227-230, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Liu Peng, Zong Rui, Liu Sizuo |
A New Model for Authentication and Authorization across Heterogeneous Trust-Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 789-792, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yue Zhang 0002, James B. D. Joshi |
Temporal UAS: Supporting Efficient RBAC Authorization in Presence of the Temporal Role Hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 264-271, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Morris Riedel, Wolfgang Frings, Sonja Habbinga, Thomas Eickermann, Daniel Mallmann, Achim Streit, Felix Wolf 0001, Thomas Lippert, Andreas Ernst, Rainer Spurzem |
Extending the collaborative online visualization and steering framework for computational Grids with attribute-based authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 9th IEEE/ACM International Conference on Grid Computing (Grid 2008), Tsukuba, Japan, September 29 - October 1, 2008, pp. 104-111, 2008, IEEE Computer Society, 978-1-4244-2578-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Xinwen Zhang, Qi Li 0002, Jean-Pierre Seifert, Mingwei Xu |
Flexible Authorization with Decentralized Access Control Model for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 156-165, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Christoph Becker 0003, Sebastian Staamann, Ralf Salomon |
Security Analysis of the Utilization of Corba Object References as Authorization Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 7-9 May 2007, Santorini Island, Greece, pp. 196-203, 2007, IEEE Computer Society, 0-7695-2765-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Christian Grimm, Ralf Groeper, Siegfried Makedanz, Hans Pfeiffenberger, Peter Gietz, Martin Haase, Michael Schiffers, Wolfgang Ziegler |
Trust Issues in Shibboleth-Enabled Federated Grid Authentication and Authorization Infrastructures Supporting Multiple Grid Middleware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
eScience ![In: Third International Conference on e-Science and Grid Computing, e-Science 2007, 10-13 December 2007, Bangalore, India, pp. 569-576, 2007, IEEE Computer Society, 0-7695-3064-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Moritz Y. Becker, Cédric Fournet, Andrew D. Gordon 0001 |
Design and Semantics of a Decentralized Authorization Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 3-15, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Sok-Ian Sou |
Performance analysis of credit re-authorization schemes in UMTS online charging system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the International Conference on Wireless Communications and Mobile Computing, IWCMC 2007, Honolulu, Hawaii, USA, August 12-16, 2007, pp. 55-60, 2007, ACM, 978-1-59593-695-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
credit reservation, online charging, streaming services, telecommunications |
20 | Anya Kim, Amitabh Khashnobish, Myong H. Kang |
An Architecture for Web Services Authentication and Authorization in a Maritime Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 451-456, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ionut Constandache, Daniel Olmedilla, Frank Siebenlist |
Policy-Driven Negotiation for Authorization in the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 13-15 June 2007, Bologna, Italy, pp. 211-220, 2007, IEEE Computer Society, 0-7695-2767-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Daisy Daiqin He, Jian Yang 0001 |
A Policy Driven Authorization Control Framework for Business Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCW ![In: 2007 IEEE International Conference on Services Computing - Workshops (SCW 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 17-24, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Adam J. Lee, Marianne Winslett |
Safety and consistency in policy-based authorization systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 124-133, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
distributed proving, consistency, credentials, trust negotiation |
20 | Christian Emig, Heiko Schandua, Sebastian Abeck |
SOA-Aware Authorization Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEA ![In: Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28 - November 2, 2006, Papeete, Tahiti, French Polynesia, pp. 62, 2006, IEEE Computer Society, 0-7695-2703-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Deepak Garg 0001, Frank Pfenning |
Non-Interference in Constructive Authorization Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 283-296, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Judith E. Y. Rossebø, Rolv Bræk |
Towards a Framework of Authentication and Authorization Patterns for Ensuring Availability in Service Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 206-215, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | NuerMaimaiti Heilili, Yang Chen, Chen Zhao 0001, Zhenxing Luo, Zuoquan Lin |
An OWL-Based Approach for RBAC with Negative Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSEM ![In: Knowledge Science, Engineering and Management, First International Conference, KSEM 2006, Guilin, China, August 5-8, 2006, Proceedings, pp. 164-175, 2006, Springer, 3-540-37033-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
Traust: A Trust Negotiation Based Authorization Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings, pp. 458-462, 2006, Springer, 3-540-34295-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Siqing Du, James B. D. Joshi |
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 228-236, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
multidomain, role based access control, hierarchy, secure interoperation, role mapping |
20 | Timothy Fraser, Nick L. Petroni Jr., William A. Arbaugh |
Applying flow-sensitive CQUAL to verify MINIX authorization check placement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2006 Workshop on Programming Languages and Analysis for Security, PLAS 2006, Ottawa, Ontario, Canada, June 10, 2006, pp. 3-6, 2006, ACM, 1-59593-374-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
CQUAL, static analysis, type qualifiers, MINIX |
20 | Devrim Unal, M. Ufuk Çaglayan |
Theorem proving for modeling and conflict checking of authorization policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCN ![In: Proceedings of the International Symposium on Computer Networks, ISCN 2006, June 16-18, 2006, Istanbul, Turkey, pp. 146-151, 2006, IEEE. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Kyo Chul Kang, Jaejoon Lee, Byungkil Kim, Moonzoo Kim, Chang-woo Seo, Seung-lyeol Yu |
Re-engineering a Credit Card Authorization System for Maintainability and Reusability of Components - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSR ![In: Reuse of Off-the-Shelf Components, 9th International Conference on Software Reuse, ICSR 2006, Turin, Italy, June 12-15, 2006, Proceedings, pp. 156-169, 2006, Springer, 3-540-34606-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Hung-Hsu Tsai, Kuo-Chun Wang, Chi-Chih Liu |
Robust Watermarking in Wavelet Domain Using Rank Order and Genetic Algorithm for Image Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 2031-2038, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Deepak Garg 0001, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter |
A Linear Logic of Authorization and Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings, pp. 297-312, 2006, Springer, 3-540-44601-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Li Yang 0001, Joseph M. Kizza, Raimund K. Ege |
A Flexible Context-Aware Authorization Framework for Mediation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI ![In: Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings, pp. 684-685, 2006, Springer, 3-540-34478-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, access control, constraints, Mediation |
20 | Dong Seong Kim 0001, Taek-Hyun Shin, Byungil Lee, Jong Sou Park |
Access Control and Authorization for Security of RFID Multi-domain Using SAML and XACML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 887-893, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li 0001 |
The Authorization Service in Dynamic Trust Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 564-567, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Corinne MacDonald, Eldon A. Gunn |
Analysis of production authorization card schemes using simulation and neural network metamodels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, pp. 16, 2005, IEEE Computer Society, 0-7803-9519-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
20 | Richard W. C. Lui, Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Supporting Efficient Authorization in Delegation with Supervision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 240-244, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Hyunjoon Jung, Hyuck Han, Hyungsoo Jung 0001, Heon Young Yeom |
Flexible Authentication and Authorization Architecture for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 34th International Conference on Parallel Processing Workshops (ICPP 2005 Workshops), 14-17 June 2005, Oslo, Norway, pp. 61-77, 2005, IEEE Computer Society, 0-7695-2381-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Hyunjoon Jung, Hyuck Han, Hyungsoo Jung 0001, Heon Young Yeom |
Dynamic and Fine-Grained Authentication and Authorization Architecture for Grid Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part III, pp. 179-186, 2005, Springer, 3-540-26044-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Matheus |
Authorization for digital rights management in the geospatial domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the Fifth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, November 7, 2005, pp. 55-64, 2005, ACM, 1-59593-230-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
geoXACML, access control, DRM, geospatial |
20 | Yuanbo Guo, Jianfeng Ma 0001 |
A Study on the Secure and Intrusion-Tolerant Authorization and Authentication System Applied to the Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 38th Hawaii International Conference on System Sciences (HICSS-38 2005), CD-ROM / Abstracts Proceedings, 3-6 January 2005, Big Island, HI, USA, 2005, IEEE Computer Society, 0-7695-2268-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Hai Jin 0001, Chuanjiang Yi, Song Wu 0001, Li Qi, Deqing Zou |
Uniform Authorization Management in ChinaGrid Support Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 223-231, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Rajeev Gupta, Manish Bhide |
A Generic XACML Based Declarative Authorization Scheme for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings, pp. 44-63, 2005, Springer, 3-540-28963-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Heping Hu, Hanbing Yao |
A Scheme for Authentication and Authorization in a Grid Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 383-387, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Rainer Huber, Norbert Jordan |
An Experimental Study of a Business Domain Independent Application Level and Internet Access Authentication and Authorization Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMB ![In: 2005 International Conference on Mobile Business (ICMB 2005), 11-13 July 2005, Sydney, Australia, pp. 35-41, 2005, IEEE Computer Society, 0-7695-2367-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Shujing Wang 0001, Yan Zhang 0003 |
Answer Set Programming for Distributed Authorization: The Language, Computations, and Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2005: Advances in Artificial Intelligence, 18th Australian Joint Conference on Artificial Intelligence, Sydney, Australia, December 5-9, 2005, Proceedings, pp. 1191-1194, 2005, Springer, 3-540-30462-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nathan Whitehead, Martín Abadi, George C. Necula |
By Reason and Authority: A System for Authorization of Proof-Carrying Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 28-30 June 2004, Pacific Grove, CA, USA, pp. 236-250, 2004, IEEE Computer Society, 0-7695-2169-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Carlos Rabadão, Edmundo Monteiro |
Authentication, Authorization, Admission, and Accounting for QoS Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECUMN ![In: Universal Multiservice Networks: Third European Conference, ECUMN 2004, Porto, Portugal, October 25-27, 2004. Proceedings, pp. 440-449, 2004, Springer, 3-540-23551-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Chris Wullems, Mark Looi, Andrew J. Clark |
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 14-17 March 2004, Orlando, FL, USA, pp. 132-137, 2004, IEEE Computer Society, 0-7695-2106-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Rosario Gennaro, Darren Leigh, Ravi Sundaram, William S. Yerazunis |
Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 276-292, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Seungyong Lee 0001, Yongmin Kim 0005, BongNam Noh, HyungHyo Lee |
A New Authorization Model for Workflow Management System Using the RPI-RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2004, 4th International Conference, Kraków, Poland, June 6-9, 2004, Proceedings, Part I, pp. 639-643, 2004, Springer, 3-540-22114-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Hristo Koshutanski, Fabio Massacci |
A System for Interactive Authorization for Business Processes for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWE ![In: Web Engineering - 4th International Conference, ICWE 2004, Munich, Germany, July 26-30, 2004, Proceedings, pp. 521-525, 2004, Springer, 3-540-22511-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Michael Conrad, Thomas Fuhrmann, Marcus Schöller, Martina Zitterbart |
Secure Service Signaling and Fast Authorization in Programmable Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, IFIP TC6 6th International Working Conference, IWAN 2004, Lawrence, KS, USA, October 27-29, 2004. Revised Papers, pp. 66-77, 2004, Springer, 978-3-540-71499-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Flexible Service Platforms, Secure Signaling, Programmable Networks |
20 | Shiping Chen 0003, Duminda Wijesekera, Sushil Jajodia |
Incorporating Dynamic Constraints in the Flexible Authorization Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 1-16, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Shi-Kuo Chang, Giuseppe Polese, Maurizio Cibelli, Roshan K. Thomas |
Visual Authorization Modeling in E-commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Multim. ![In: IEEE Multim. 10(1), pp. 44-54, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Qingfeng Chen, Chengqi Zhang, Shichao Zhang 0001 |
Verifying the Payment Authorization in SET Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 914-918, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Markus Lorch, David Bruce Adams, Dennis G. Kafura, M. S. R. Koneni, A. Rathi, Sumit Shah |
The PRIMA System for Privilege Management, Authorization and Enforcement in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 4th International Workshop on Grid Computing (GRID 2003), 17 November 2003, Phoenix, AZ, USA, Proceedings, pp. 109-116, 2003, IEEE Computer Society, 0-7695-2026-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Sabrina De Capitani di Vimercati |
An authorization model for temporal XML documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), March 10-14, 2002, Madrid, Spain, pp. 1088-1093, 2002, ACM, 1-58113-445-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
temporal XML documents, access control, transaction time, valid time |
20 | Prakash Reddy, Venky Krishnan, Kan Zhang, Devaraj Das |
Authentication and Authorization of Mobile Clients in Public Data Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 115-128, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | William A. Adamson, Olga Kornievskaia |
A Practical Distributed Authorization System for GARA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 314-324, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter |
E-P3P privacy policies and privacy authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002, Washington, DC, USA, November 21, 2002, pp. 103-109, 2002, ACM, 1-58113-633-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
E-P3P, privacy policies, privacy manager |
20 | Marcelo Bagnulo, Bernardo Alarcos, María Calderón, Marifeli Sedano |
Providing Authentication & Authorization Mechanisms for Active Service Charging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QofIS ![In: From QoS Provisioning to QoS Charging, Third COST 263 International Workshop on Quality of Future Internet Services, QofIS 2002, and Second International Workshop on Internet Charging and QoS Technologies, ICQT 2002, Zurich, Switzerland, October 16-18, 2002, Proceedings, pp. 337-346, 2002, Springer, 3-540-44356-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Katarzyna Keahey, Von Welch |
Fine-Grain Authorization for Resource Management in the Grid Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: Grid Computing - GRID 2002, Third International Workshop, Baltimore, MD, USA, November 18, 2002, Proceedings, pp. 199-206, 2002, Springer, 3-540-00133-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia |
An authorization model for a public key management service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(4), pp. 453-482, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, Access control, public key infrastructure |
20 | Vijayanand Bharadwaj, Ravi Raman, Y. V. Ramana Reddy, Sumitra Reddy |
Empowering Mobile Healthcare Providers via a Patient Benefits Authorization Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 73-80, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Gail-Joon Ahn, Michael E. Shin |
Role-Based Authorization Constraints Specification Using Object Constraint Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 20-22 June 2001, Cambridge, MA, USA, pp. 157-162, 2001, IEEE Computer Society, 0-7695-1269-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Tatyana Ryutov, B. Clifford Neuman |
The Set and Function Approach to Modeling Authorization in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop MMM-ACNS 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings, pp. 189-206, 2001, Springer, 3-540-42103-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Charlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers |
User Authentication and Authorization in the Java(tm) Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 285-290, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Hiroyuki Seki, Yasunori Ishihara, Minoru Ito |
Authorization Analysis of Queries in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOOD ![In: Deductive and Object-Oriented Databases, Fourth International Conference, DOOD'95, Singapore, December 4-7, 1995, Proceedings, pp. 521-538, 1995, Springer, 3-540-60608-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Elisa Bertino, Claudio Bettini, Pierangela Samarati |
A Temporal Authorization Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 126-135, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
20 | Ebrima N. Ceesay, Coimbatore Chandersekaran, William R. Simpson |
An authentication model for delegation, attribution and least privilege. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PETRA ![In: Proceedings of the 3rd International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2010, Samos, Greece, June 23-25, 2010, 2010, ACM, 978-1-4503-0071-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
WS-*, security assertion markup language (SAML), authentication, authorization, delegation, public key infrastructure, attribution, credentialing, least privilege |
20 | Erik Rissanen, David Brossard, Adriaan Slabbert |
Distributed Access Control Management - A XACML-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 639-640, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, SOA, access control, authorization, XACML |
20 | Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch |
A Flexible Access Control Model for Distributed Collaborative Editors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 6th VLDB Workshop, SDM 2009, Lyon, France, August 28, 2009. Proceedings, pp. 89-106, 2009, Springer, 978-3-642-04218-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Secure Data Management, Authorization and Access Control, Collaborative Editing Systems |
20 | Mahdi Sharifi, Homa Movahednejad, Sayed Gholam Hassan Tabatabaei, Suhaimi Ibrahim |
An effective access control approach to support web service security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 529-535, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
web service, authentication, interoperability, authorization |
20 | Danfeng Yao, Keith B. Frikken, Mikhail J. Atallah, Roberto Tamassia |
Private Information: To Reveal or not to Reveal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(1), pp. 6:1-6:27, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization, policies, secure multi-party computation |
20 | Michael Backes 0001, Catalin Hritcu, Matteo Maffei |
Type-checking zero-knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 357-370, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
type systems, language-based security, authorization policies, zero-knowledge protocols |
20 | Yun Bai 0001 |
Reasoning for Incomplete Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part I, pp. 278-285, 2008, Springer, 978-3-540-85562-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
incomplete domain, formal specification, logic program, authorization |
20 | Philip Inglesant, Martina Angela Sasse, David W. Chadwick, Lei Lei Shi |
Expressions of expertness: the virtuous circle of natural language for access control policy specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008, pp. 77-88, 2008, ACM, 978-1-60558-276-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, Grid computing, authorization, RBAC, observations, qualitative methods, controlled natural language |
20 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: 8th IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2008), 19-22 May 2008, Lyon, France, pp. 114-121, 2008, IEEE Computer Society, 978-0-7695-3156-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
20 | Mohammad M. R. Chowdhury, Sarfraz Alam, Josef Noll |
Policy based access for home contents and services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 310-316, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization, policy, reasoning, rule |
20 | Dengguo Feng, Chuankun Wu |
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. China ![In: Frontiers Comput. Sci. China 1(4), pp. 385-396, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication and authorization, cryptography, network security, cryptanalysis |
20 | Angelos D. Keromytis, Jonathan M. Smith |
Requirements for scalable access control and security management architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Internet Techn. ![In: ACM Trans. Internet Techn. 7(2), pp. 8, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
distributed systems, access control, authorization, security policy, trust management, delegation, credentials, Large-scale systems |
20 | Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh |
A framework for decentralized access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 93-104, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
physical access control, authorization, decentralization |
20 | Helder Gomes, João Paulo da Silva Cunha, André Zúquete |
Authentication Architecture for eHealth Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1583-1600, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
role-based authorization, Authentication, certificates, PKI, eHealth |
20 | Katerina Stamou, Fredrik Hedman, Anthony Iliopoulos |
Extending UNICORE 5 Authentication Model by Supporting Proxy Certificate Profile Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 104-111, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RFC 3280, authentication, grid, interoperability, authorization, X.509, UNICORE, proxy certificates |
20 | Nicolas Sklavos 0001, Spyros G. Denazis, Odysseas G. Koufopavlou |
AAA and mobile networks: security aspects and architectural efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiMedia ![In: Proceedings of the 3rd International Conference on Mobile Multimedia Communications, MobiMedia 2007, Nafpaktos, Greece, August 27-29, 2007, pp. 45, 2007, ICST, 978-963-06-2670-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authentication, networks security, authorization, accounting, AAA |
20 | Hyoungshick Kim, S. Jae Oh |
Self-authorized Public Key Management for Home Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 425-434, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
authorization, home network, identity-based encryption, public key, security framework |
20 | Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang Wook Kim |
Security Technologies Based on Home Gateway for Making Smart Home Secure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Emerging Directions in Embedded and Ubiquitous Computing, EUC 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings, pp. 124-135, 2007, Springer, 978-3-540-77089-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security, Authentication, Access Control, Authorization, Security Policy, Smart Home, Home Network |
20 | Carla Merkle Westphall, Joni da Silva Fraga |
Mandatory and Discretionary Policies for CORBA Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Netw. Syst. Manag. ![In: J. Netw. Syst. Manag. 13(3), pp. 309-328, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CORBAsec, authorization, Security policies, common criteria, security evaluation |
20 | Walid Bagga, Refik Molva |
Policy-Based Cryptography and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 72-87, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Privacy, Authorization, Policy, Credentials, ID-based Cryptography |
20 | Mauro Brunato, Danilo Severina |
WilmaGate: a new open access gateway for hotspot management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMASH ![In: Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, WMASH 2005, Cologne, Germany, September 2, 2005, pp. 56-64, 2005, ACM, 1-59593-143-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access gateways, open access networks, wireless networks, authentication, authorization |
20 | Jinpeng Huai, Yu Zhang, Xianxian Li, Yunhao Liu 0001 |
Distributed Access Control in CROWN Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP ![In: 34th International Conference on Parallel Processing (ICPP 2005), 14-17 June 2005, Oslo, Norway, pp. 435-442, 2005, IEEE Computer Society, 0-7695-2380-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
CROWN group, distributed delegation authorization, voting, attribute-based access control |
20 | Habtamu Abie, Pål Spilling, Bent Foyn |
A distributed digital rights management model for secure information-distribution systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 3(2), pp. 113-128, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Self-protecting Objects, Privacy enforcement, Authentication, Authorization, Digital rights management |
Displaying result #401 - #500 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|