|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Ka-Ping Yee |
Aligning Security and Usability. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
user authorization, security, design, Usability, interaction |
20 | Konstantin Beznosov |
On the benefits of decomposing policy engines into components. |
Adaptive and Reflective Middleware |
2004 |
DBLP DOI BibTeX RDF |
security, middleware, architecture, authorization, policy |
20 | Yi Deng 0001, Jiacun Wang, Jeffrey J. P. Tsai, Konstantin Beznosov |
An Approach for Modeling and Analysis of Security System Architectures. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
security system architecture, authorization service, formal architectural modeling, constraint patterns, access control, Petri nets, formal verification, temporal logic, Software security |
20 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
20 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
20 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Induced role hierarchies with attribute-based RBAC. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, roles, attributes, roles hierarchies, authorization rules |
20 | Sandra L. Murphy, Edward T. Lewis, Robert N. M. Watson |
Secure Active Network Prototypes. |
DANCE |
2002 |
DBLP DOI BibTeX RDF |
security, authentication, Active networks, authorization policy |
20 | Pascal Fenkam, Harald C. Gall, Mehdi Jazayeri, Christopher Krügel |
DPS : An Architectural Style for Development of Secure Software. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
Authorization and Access Control, Software Architecture, Formal Methods, Architectural Style, Alloy, Security Engineering |
20 | Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno |
An Access Control Model for Tree Data Structures. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Access Control, Security Policy, Tree Data Structures, Permission, Authorization Rule |
20 | David F. Ferraiolo, Ravi S. Sandhu, Serban I. Gavrila, D. Richard Kuhn, Ramaswamy Chandramouli |
Proposed NIST standard for role-based access control. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
security, access control, standards, Role-based access control, authorization management |
20 | Deborah A. Agarwal, Olivier Chevassut, Mary R. Thompson, Gene Tsudik |
An Integrated Solution for Secure Group Communication in Wide-Area Networks. |
ISCC |
2001 |
DBLP DOI BibTeX RDF |
group authorization and access control, Security, group communication, group key agreement |
20 | Rüdiger Grimm |
Security requirements for internet voting. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
authorization and anonymity, security requirements, blind signature, internet voting |
20 | Yi Mu 0001, Vijay Varadharajan |
Towards a Protection Model for Supporting Multiple Access Control Policies. |
Australasian Database Conference |
2000 |
DBLP DOI BibTeX RDF |
OO database, Access Control, Authorization |
20 | Ninghui Li, Benjamin N. Grosof, Joan Feigenbaum |
A Practically Implementable and Tractable Delegation Logic. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
access control, knowledge representation, logic programs, Authorization, security policies, trust management, delegation |
20 | John Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi |
Security Policy Coordination for Heterogeneous Information Systems. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
information enclaves, access control, mediators, authorization policy |
20 | Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati |
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. |
ACM Trans. Database Syst. |
1998 |
DBLP DOI BibTeX RDF |
periodic authorization, access control, temporal constraints, time management |
20 | Yun Bai 0001, Vijay Varadharajan |
A High Level Language for Conventional Access Control Models. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Policy Transformations, Formal Language, Access Control Model, Authorization Policies |
20 | Kurt Maly, Ajay Gupta 0003, Bjorn Kvande, Irwin B. Levinstein, Ravi Mukkamala, S. Nanjangud, Margrethe H. Olson, Roy Whitney, Rita Chambers |
A privilege management and enforcement system for distributed resource sharing. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
privilege management, enforcement system, distributed resource sharing, information based world, controlled access, delegated resource management, end user access, World Wide Web based interfaces, DCE based authentication, Distributed Informatics Computing and Collaborative Environments project, Internet, Internet, access control, operating system, authorization, X Windows, distributed environment, unauthorized access, data manipulation |
20 | Steve R. White, Liam Comerford |
ABYSS: An Architecture for Software Protection. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
software protection architecture, execution protection, software transfer, software back-up, loss guarding, ABYSS, a basic Yorktown security system, uniform security service, software distribution channels, use-once authorization, technical enforcement, rental software, software engineering, security of data, token, computing systems, application software |
20 | Morton M. Astrahan, Mike W. Blasgen, Donald D. Chamberlin, Kapali P. Eswaran, Jim Gray 0001, Patricia P. Griffiths, W. Frank King III, Raymond A. Lorie, Paul R. McJones, James W. Mehl, Gianfranco R. Putzolu, Irving L. Traiger, Bradford W. Wade, Vera Watson |
System R: Relational Approach to Database Management. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
System R, database, data structures, authorization, recovery, locking, relational model, index structures, nonprocedural language |
14 | Gregory Neven |
Privacy-enhanced access control in primelife. |
Digital Identity Management |
2010 |
DBLP DOI BibTeX RDF |
|
14 | Ruo-Fei Han, Hou-Xiang Wang, Yu-Hua Wang, Kai-Ling Zuo |
Membership-Based Access Control for Trust Negotiation in Open Systems. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Yahui Lu, Li Zhang |
Domain Administration of Task-role Based Access Control for Process Collaboration Environments. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Hassnaa Moustafa, Jacky Forestier, Mohamed Chaari |
Distributed authentication for services commercialization in ad hoc networks. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
authentication access controls, services commercialization using ad hoc networks, ad hoc networks |
14 | Xuewang Zhang, Yulin Zhang |
Study on an Improved Extended-RBAC Model. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Jason Crampton |
Trade-Offs in Cryptographic Implementations of Temporal Access Control. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao |
TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. |
IEEE Trans. Wirel. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
Managing the lifecycle of XACML delegation policies in federated environments. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | David J. Lutz, Patrick Mandic, Sascha Neinert, Ruth del Campo, Jürgen Jähnert |
Harmonizing service and network provisioning for federative access in a mobile environment. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Amir R. Khakpour, Maryline Laurent-Maknavicius, Hakima Chaouchi |
WATCHMAN: An Overlay Distributed AAA Architecture for Mobile Ad hoc Networks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
AAA Architecture, Security, MANET, OLSR |
14 | Katerina Stamou, Prathyusha V. Akunuri, Gabrielle Allen, Archit Kulshrestha, Daniel S. Katz |
Feature rich, enhanced grid portal for LONI. |
Mardi Gras Conference |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Im Young Jung, In Soon Cho, Heon Young Yeom |
A Cost-Effective Guarantee of Security and Scalability on HVEM DataGrid with Active Disk. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jason Crampton, Hemanth Khambhammettu |
Delegation and satisfiability in workflow systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
satisfiability, delegation, workflow management systems |
14 | Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 |
A Scalable Method for Access Control in Location-Based Broadcast Services. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ayesha Altaf, M. Younus Javed, Attiq Ahmed |
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Privcy and Key Management, security |
14 | Sang M. Park, Soon Myoung Chung |
Enhanced CAS Certificate for Metadata-Based Access Control in Grids. |
ICTAI (2) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Haoliang Zhai, Gansen Zhao, Lei Li, Jianxiong Huang |
A Role-Based Access Control Model for Complex Affairs. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Yu Zhang |
An Open Framework for Remote Electronic Elections. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Fred Spiessens, Jerry den Hartog, Sandro Etalle |
Know What You Trust. |
Formal Aspects in Security and Trust |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi |
Towards Role Based Trust Management without Distributed Searching of Credentials. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to improve OCSP validation for Grids. |
J. Supercomput. |
2007 |
DBLP DOI BibTeX RDF |
CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation |
14 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
A data outsourcing architecture combining cryptography and access control. |
CSAW |
2007 |
DBLP DOI BibTeX RDF |
outsourced architecture, access control, cryptography |
14 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Hua Wang 0002, Qing Li 0001 |
Secure and Efficient Information Sharing in Multi-university E-Learning Environments. |
ICWL |
2007 |
DBLP DOI BibTeX RDF |
security, E-Learning, Information sharing |
14 | Hua Wang 0002, Jinli Cao |
Delegating Revocations and Authorizations. |
Business Process Management Workshops |
2007 |
DBLP DOI BibTeX RDF |
RBAC, Delegation, Revocation |
14 | Gaofeng Ji, Yong Tang 0001, Fan Huang, Peng Wang, Guibin Wu |
An Access Control Model for Service Composite. |
CSCWD |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Manabu Hirano, Takeshi Okuda, Suguru Yamaguchi |
Application for a Simple Device Authentication Framework: Device Authentication Middleware Using Novel Smart Card Software. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
A Robust Single Sign-On Model Based on Multi-Agent System and PKI. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa |
A Unified Conflict Resolution Algorithm. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Hybrid Authorizations, Conflict Resolution, Access Control Models |
14 | Vincent C. Hu, David F. Ferraiolo, Karen Scarfone |
Access Control Policy Combinations for the Grid Using the Policy Machine. |
CCGRID |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Romain Laborde, Thierry Desprats |
Dealing with Stable Environmental Conditions in XACML Systems. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jani Suomalainen |
Towards FineGrained Authorizations in Small Office and Home Networks. |
ICSNC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jong Sik Moon, Im-Yeong Lee |
A Study on Ticket-Based AAA Mechanism Including Time Synchronization OTP in Ubiquitous Environment. |
ICCSA (1) |
2007 |
DBLP DOI BibTeX RDF |
OTP, Authentication, Ubiquitous, AAA, Ticket |
14 | Maurizio Colombo, Fabio Martinelli, Paolo Mori, Anna Vaccarelli |
Extending the Globus Architecture with Role-Based Trust Management. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Chunyan Song, Jianliang Xu, Shenhua Li, Mingqiang Wang |
A Role-Based Secure Workflow Model. |
GCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu |
Towards trust-aware access management for ad-hoc collaborations. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Paolina Centonze, Robert J. Flynn, Marco Pistoia |
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Salekul Islam, J. William Atwood |
Sender Access Control in IP Multicast. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Marcello Cinque, Domenico Cotroneo, Catello Di Martino, Stefano Russo 0001 |
Modeling and Assessing the Dependability ofWireless Sensor Networks. |
SRDS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Daisy Daiqin He, Jian Yang 0001 |
Security Policy Specification and Integration in Business Collaboration. |
IEEE SCC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Dominik Zalewski |
Security Enhancement of Java Remote Method Invocation. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
Access Control Policy Management Framework based on RBAC in OSGi Service Platform. |
CIT |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Rubén Barrio, Xavier Perramon, Jaime Delgado |
Use of SAML for Single Sign-On Access to Multimedia Contents in a Peer-to-Peer Network. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Minghui Zhou 0001, Hong Mei 0001 |
A Service-Oriented Trust Management Model on Application Server. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jesus Luna, Manel Medina, Oscar Manso |
Using OGRO and CertiVeR to Improve OCSP Validation for Grids. |
GPC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Yahui Lu, Li Zhang 0065, Yinbo Liu, Jiaguang Sun 0001 |
A Distributed Domain Administration of RBAC Model in Collaborative Environments. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Amir H. Chinaei, Huaxin Zhang |
Hybrid Authorizations and Conflict Resolution. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Conflict Resolution, Combined Strategies |
14 | Yanqin Zhu, Peide Qian, Yueqin Liu |
A Role-based PMI Authentication Model and its Application. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Eun-Ae Cho, Chang-Joo Moon, Dae-Ha Park, Doo-Kwon Baik |
An Effective Policy Management Framework Using RBAC model for Service Platform based on Components. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Sun Ok Yang, SungSuk Kim |
Network Mobility in MIPv6 Considering Arrival Time. |
EUC |
2006 |
DBLP DOI BibTeX RDF |
binding update, mobility type, kcredit, mean resident time, network mobility, arrival time |
14 | Fahima Cheikh, Giuseppe De Giacomo, Massimo Mecella |
Automatic web services composition in trustaware communities. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
web services, access control, trust, composition |
14 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
A Survey of Secure B2C Commerce for Multicast Services. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine |
Reducing the Dependence of SPKI/SDSI on PKI. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jing Jin, Gail-Joon Ahn, Mukesh Singhal |
ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing. |
EDBT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Ragib Hasan, Marianne Winslett |
Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Richard O. Sinnott, Jipu Jiang, John P. Watt, Oluwafemi O. Ajayi |
Shibboleth-based Access to and Usage of Grid Resources. |
GRID |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Jongil Jeong, Weehyuk Yu, Dongkyoo Shin, Dongil Shin, Kiyoung Moon, Jaeseung Lee |
Integration of Single Sign-On and Role-Based Access Control Profiles for Grid Computing. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
Grid, role-based access control, XACML, single sign-on, SAML |
14 | Anil Kumar Venkataiahgari, J. William Atwood, Mourad Debbabi |
Secure E-Commerce Transactions for Multicast Services. |
CEC/EEE |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang 0001 |
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Haibo Shen, Fan Hong |
An Attribute-Based Access Control Model for Web Services. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Web Services, XACML, Attribute-Based Access Control, Automated Trust Negotiation |
14 | Vishwas Patil, R. K. Shyamasundar |
e-coupons: An Efficient, Secure and Delegable Micro-Payment System. |
Inf. Syst. Frontiers |
2005 |
DBLP DOI BibTeX RDF |
PayWord, security, delegation, one-way hash function, micro-payment, TESLA, SPKI/SDSI |
14 | G. Geethakumari, Atul Negi, V. N. Sastry |
Dynamic Delegation Approach for Access Control in Grids. |
e-Science |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Xinwen Zhang, Yingjiu Li, Divya Nalla |
An attribute-based access matrix model. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
access matrix model, access control, decidability, safety analysis |
14 | Jiong Qiu, Chen-hua Ma, Jianwei Yin, Jinxiang Dong |
Research and Implementation of Role-Based RBAC Administration Model. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Weili Han, Junjing Zhang, Xiaobo Yao |
Context-sensitive Access Control Model and Implementation. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Marco Pistoia, Robert J. Flynn, Larry Koved, Vugranam C. Sreedhar |
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection. |
ECOOP |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Hiroaki Kamoda, Akihiro Hayakawa, Masaki Yamaoka, Shigeyuki Matsuda, Krysia Broda, Morris Sloman |
Policy Conflict Analysis Using Tableaux for On Demanc VPN Framework. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Vijayalakshmi Atluri, Janice Warner |
Supporting conditional delegation in secure workflow management systems. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
workflow, constraints, delegation |
14 | Gang Yin, Huaimin Wang, Tao Liu, Ming-Feng Chen, Dian-xi Shi |
Trust Management with Safe Privilege Propagation. |
APPT |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Andrew D. Gordon 0001 |
From Typed Process Calculi to Source-Based Security. |
SAS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Hui Lei, Gholamali C. Shoja |
A Distributed Trust Model for e-Commerce Applications. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wenbao Jiang, Chen Li 0005, Shuang Hao, Yiqi Dai |
Using Trust for Restricted Delegation in Grid Environments. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Alfred C. Weaver |
A security architecture for data privacy and security. |
ETFA |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Guillermo de Jesús Hoyos-Rivera, Roberta Lima-Gomes, Jean-Pierre Courtiat |
CoLab: A Flexible Collaborative Web Browsing Tool. |
AINA |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Peng Liu, Jian-bin Hu, Zhong Chen 0001 |
A Formal Language for Access Control Policies in Distributed Environment. |
Web Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Julien Laganier, Pascale Vicat-Blanc Primet |
HIPernet: a decentralized security infrastructure for large scale grid environments. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori, Cherri M. Pancake |
Protecting Personal Data with Various Granularities: A Logic-Based Access Control Approach. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Wesley Emeneker, Dan Stanzione |
Cluster Spanning with Virtual Environments. |
CLUSTER |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jizhong Zhao, Yong Qi, Zhaofeng Ma |
Secure Multimedia Streaming with Trusted Digital Rights Management. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 2781 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|