|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 936 occurrences of 345 keywords
|
|
|
Results
Found 1029 publication records. Showing 1029 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | LouAnna Notargiacomo |
Role-based access control in ORACLE7 and Trusted ORACLE7. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
ORACLE |
17 | Edward J. Coyne |
Role engineering. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Roshan K. Thomas |
Role-based access control and distributed object-based enterprise computing. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Yahya Y. Al-Salqan, V. Juggy Jagannathan, Tad Davis, Nich Zhang, Y. V. Ramana Reddy |
Security and confidentiality in health care informatics. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | John F. Barkley |
Implementing role-based access control using object technology. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
C++ |
17 | Virgil D. Gligor |
Characteristics of role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Steven A. Demurjian, T. C. Ting, M.-Y. Hu |
Role-based access control for object-oriented/C++ systems. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
C++ |
17 | Jeremy Epstein, Ravi S. Sandhu |
NetWare 4 as an example of role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
NetWare |
17 | Fang Chen, Ravi S. Sandhu |
Constraints for role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu |
Workshop summary. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | David F. Ferraiolo, D. Richard Kuhn |
Future directions in role-based access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Edward J. Coyne, Charles E. Youman |
Workshop discussion. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Matunda Nyanchama, Sylvia L. Osborn |
The role graph model. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Ravi S. Sandhu |
Roles versus groups. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Luigi Giuri |
Role-based access control: a natural approach. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Trent Jaeger, Atul Prakash 0001 |
Requirements of role-based access control for collaborative systems. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Emil Lupu, Damian A. Marriott, Morris Sloman, Nicholas Yialelis |
A policy based role framework for access control. |
ACM Workshop on Role-Based Access Control |
1995 |
DBLP DOI BibTeX RDF |
|
15 | Steffen Kunz, Benjamin Fabian, Daniel Marx 0001, Sebastian Müller 0001 |
Engineering Policies for Secure Interorganizational Information Flow. |
EDOCW |
2011 |
DBLP DOI BibTeX RDF |
Interorganizational Processes, RBAC, Access Control Policies |
15 | Ligang He, Kewei Duan, Xueguang Chen, Deqing Zou, Zongfen Han, Ali Fadavinia, Stephen A. Jarvis |
Modelling Workflow Executions under Role-Based Authorisation Control. |
IEEE SCC |
2011 |
DBLP DOI BibTeX RDF |
Modelling, Workflow, RBAC, Authorisation |
15 | Dizza Beimel, Mor Peleg |
The Context and the SitBAC Models for Privacy Preservation—An Experimental Comparison of Model Comprehension and Synthesis. |
IEEE Trans. Knowl. Data Eng. |
2010 |
DBLP DOI BibTeX RDF |
SitBAC, ontology, access control, Knowledge representation, conceptual model, authorization, RBAC |
15 | Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin |
Toward practical authorization-dependent user obligation systems. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
RBAC, policy, accountability, obligations, authorization systems |
15 | Christopher Alm, Roland Illig |
Translating High-Level Authorization Constraints to XACML. |
SERVICES |
2010 |
DBLP DOI BibTeX RDF |
OPL, RBAC, Translation, XACML, Separation of Duty |
15 | Ezedin E. Barka, Yasser Gadallah |
A role-based protocol for secure multicast communications in mobile ad hoc networks. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
MANET, access control, RBAC, multicast communications, multicast security |
15 | Alan H. Karp, Jun Li 0008 |
Solving the Transitive Access Problem for the Services Oriented Architecture. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
PBAC, ABAC, ZBAC, web services, SOA, access control, RBAC |
15 | Mario Frank 0001, Joachim M. Buhmann, David A. Basin |
On the definition of role mining. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
15 | Yu-Cheng Hsiao, Gwan-Hwan Hwang |
Implementing the Chinese Wall Security Model in Workflow Management Systems. |
ISPA |
2010 |
DBLP DOI BibTeX RDF |
Workflow management system (WfMS), Chinese wall security model (CWSM), Role-based access control (RBAC) |
15 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding support to XACML for multi-domain user to user dynamic delegation of authority. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Delegation of authority, Credential validation service, RBAC, XACML |
15 | Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck |
Extending Role-Based Access Control for Business Usage. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Access Control, RBAC, Business Process Modelling, Roles, Identity Management, Business-IT Alignment |
15 | Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari |
Generation of Role Based Access Control Security Policies for Java Collaborative Applications. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
java, RBAC, collaborative applications |
15 | Mario Frank 0001, Andreas P. Streich, David A. Basin, Joachim M. Buhmann |
A probabilistic approach to hybrid role mining. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
business meaning, hybrid role mining, machine learning, role mining, rbac |
15 | Ezedin E. Barka, Emad Eldin Mohamed |
Securing hierarchical multicast communications using roles. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
access control, RBAC, multicast communications, multicast security |
15 | Min Xu, Duminda Wijesekera |
A role-based XACML administration and delegation profile and its enforcement architecture. |
SWS |
2009 |
DBLP DOI BibTeX RDF |
arbac, access control, authorization, delegation, xacml, web service security, administration, rbac |
15 | Samrat Mondal, Shamik Sural |
Supporting Negative Authorization in Spatiotemporal Role Based Access Control. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Negative Authorization, Spatiotemporal Context, Access Control, RBAC |
15 | Zhiyi Wang, Zheng Wang, Jiaxi Luo |
Application of Organization Model Based on LDAP Directory Server to Workflow Management System. |
PACIIA (2) |
2008 |
DBLP DOI BibTeX RDF |
RBAC, workflow management system, LDAP, organization model |
15 | Sun K. Yoo, Jun Choe, Do Yoon Kim |
Agent Based Architecture for Secure Access from Multiple Hospitals. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
Integrated Access Control, Web Service, RBAC, XML Security |
15 | Mayank Keshariya, Ray Hunt |
A new architecture for performance-based policy management in heterogeneous wireless networks. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
ABC (always best connected), PBM (policy-based management), RBAC (role-based access control), mapping translators, policy semantic and syntax analysis, vertical handoff |
15 | Xingang Wang, Dengguo Feng, Zhen Xu, Honggang Hu |
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
Secure Policy Interoperation, RBAC, Multi-Domain |
15 | Thang Tran, Kai Daniel, Christian Wietfeld |
Secure and Reliable Communication Infrastructure for a Distributed IT-Federation. |
Mobile Response |
2008 |
DBLP DOI BibTeX RDF |
IT-Federation, Authentication, Authorization, Role Based Access Control (RBAC), Single Sign-On (SSO) |
15 | Subhendu Aich, Shamik Sural, Arun K. Majumdar |
Spatiotemporal Connectives for Security Policy in the Presence of Location Hierarchy. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
Spatiotemporal event, Policy connectives, Location hierarchy, RBAC |
15 | Ying Liu, Jean Bacon |
A Practical Synthesis of Dynamic Role Settings in Telecare Services. |
ICDS |
2007 |
DBLP DOI BibTeX RDF |
Role Provisioning, Dynamic Trust, Role Context, Dynamic Access, RBAC, e-Service, Telecare, Meta-synthesis |
15 | Jianwei Yue, Hongchun Cai, Luyao Chen, Wei Zhuang |
Study on Authorization Management Model of One-stop Office System. |
CCTA |
2007 |
DBLP DOI BibTeX RDF |
one-stop office system, RBAC, authorization management |
15 | Liang Chen, Jason Crampton |
Inter-domain role mapping and least privilege. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
IDRM, RBAC, least privilege |
15 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo |
The role mining problem: finding a minimal descriptive set of roles. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
15 | Stijn Goedertier, Christophe Mues, Jan Vanthienen |
Specifying Process-Aware Access Control Rules in SBVR. |
RuleML |
2007 |
DBLP DOI BibTeX RDF |
access control, RBAC, BPM, defeasible logic, SBVR |
15 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
RoleMiner: mining roles using subset enumeration. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
15 | Maria Luisa Damiani, Elisa Bertino |
Architectural issues for a location-aware role-based access control system. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
location-based services, RBAC, roles, spatial context |
15 | Hyun-Dong Lee, Kiyeal Lee, Mokdong Chung |
Enterprise Application Framework for Constructing Secure RFID Application. |
ICHIT |
2006 |
DBLP DOI BibTeX RDF |
Security, RFID, RBAC, Application Framework |
15 | Vugranam C. Sreedhar |
Data-centric security: role analysis and role typestates. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
role analysis, role escape analysis, role typestates, RBAC |
15 | Steven J. Greenwald |
E-Prime for security: a new security paradigm. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
Clark-Wilson, E-Prime, Sapir-Whorf hypothesis, disaster planning, enterprise security policy, general semantics, incident handling, informal security policy modeling, organizational security policy, principle of linguistic relativity, security life cycle, software life cycle SP800-12, user awareness, user centered security, user support and operations, modeling, formal methods, planning, RBAC, role-based access control, risk management, information assurance, security engineering, life cycle, spam detection, user training, security policy modeling, program management |
15 | Maarten Rits, Benjamin De Boe, Andreas Schaad |
XacT: a bridge between resource management and access control in multi-layered applications. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
workflow security, aspect oriented programming, role-based access control (RBAC) |
15 | Li Yang 0001, Raimund K. Ege, Huiqun Yu |
Mediation security specification and enforcement for heterogeneous databases. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
security, XML, RBAC, mediation |
15 | Anour F. A. Dafa-Alla, Eun Hee Kim, Keun Ho Ryu, Yong Jun Heo |
PRBAC: An Extended Role Based Access Control for Privacy Preserving Data Mining. |
ACIS-ICIS |
2005 |
DBLP DOI BibTeX RDF |
RBAC, Privacy preserving data mining |
15 | Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander |
Verifiable composition of access control and application features. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
modeling, UML, verification, RBAC |
15 | Jacques Wainer, Fábio de Lima Bezerra, Paulo Barthelmess |
Tucupi: a flexible workflow system based on overridable constraints. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
fexibility, workflow, constraints, RBAC |
15 | Roberto Tamassia, Danfeng Yao, William H. Winsborough |
Role-based cascaded delegation. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
access control, RBAC, trust management, delegation |
15 | David A. Basin, Jürgen Doser, Torsten Lodderstedt |
Model driven security for process-oriented systems. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
UML, RBAC, model driven architecture, metamodeling, security engineering |
15 | Axel Kern, Andreas Schaad, Jonathan D. Moffett |
An administration concept for the enterprise role-based access control model. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
SAM Jupiter, administrative role-based access control (ARBAC), automated identity management, enterprise role-based access control (ERBAC), enterprise roles, security provisioning, role-based access control (RBAC), scopes, security administration |
15 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
15 | Nathan N. Vuong, Geoffrey S. Smith, Yi Deng 0001 |
Managing security policies in a distributed environment using eXtensible markup language (XML). |
SAC |
2001 |
DBLP DOI BibTeX RDF |
managing security policies, Java, XML, XML, RBAC, meta-language, distributed authorization |
15 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
9 | Ehab Al-Shaer |
Automated management of network access control from design to enforcement. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
|
9 | Hua Wang 0002, Yanchun Zhang, Jinli Cao |
Effective Collaboration with Information Sharing in Virtual Universities. |
IEEE Trans. Knowl. Data Eng. |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Shaomin Zhang, Haiyan Zhang, Baoyi Wang |
Study on Centralized Authorization Model Supporting Multiple Access Control Models. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Mehran Ahsant, Jim Basney |
Workflows in Dynamic and Restricted Delegation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Ravi Mukkamala, Vishnu Kamisetty, Pawankumar Yedugani |
Detecting and Resolving Misconfigurations in Role-Based Access Control (Short Paper). |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
failed accesses, Access control, role-based access control, role mining, misconfigurations |
9 | Christoph Sturm, Ela Hunt, Marc H. Scholl |
Distributed Privilege Enforcement in PACS. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
Reaction Policy Model Based on Dynamic Organizations and Threat Context. (PDF / PS) |
DBSec |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Manachai Toahchoodee, Xing Xie 0002, Indrakshi Ray |
Towards Trustworthy Delegation in Role-Based Access Control Model. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Teo Poh Kuang, Hamidah Ibrahim |
Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. |
iiWAS |
2009 |
DBLP DOI BibTeX RDF |
conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning |
9 | Ji-Won Byun, Ninghui Li |
Purpose based access control for privacy protection in relational database systems. |
VLDB J. |
2008 |
DBLP DOI BibTeX RDF |
Private data management, Privacy, Access control, Purpose |
9 | Tomoya Enokido, Makoto Takizawa 0001 |
Preventing Illegal Information Flow Based on Role-Based Access Control Model. |
NBiS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Na Zhao 0003, Min Chen 0009, Shu-Ching Chen, Mei-Ling Shyu |
MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems. |
ISORC |
2008 |
DBLP DOI BibTeX RDF |
Role-based Access Control, distributed multimedia systems |
9 | Lillian Røstad, Øystein Nytrø |
Personalized access control for a personally controlled health record. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
access control |
9 | Lingli Deng, Yeping He, Ziyao Xu |
Separation of Duty in Trust-Based Collaboration. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Secure Collaboration, Statically Mutual Exclusive Roles, Role-Based Access Control, Separation of Duty |
9 | Sharma Chakravarthy, Raman Adaikkalavan |
Events and streams: harnessing and unleashing their synergy! |
DEBS |
2008 |
DBLP DOI BibTeX RDF |
expressive pattern search, monitoring applications, information security, complex event processing, data stream processing |
9 | Fujun Feng, Chuang Lin 0002, Dongsheng Peng, Junshan Li |
A Trust and Context Based Access Control Model for Distributed Systems. |
HPCC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Fachao Deng, An'an Luo, Yaokun Zhang, Zhen Chen, Xuehai Peng, Xin Jiang, Dongsheng Peng |
TNC-UTM: A Holistic Solution to Secure Enterprise Networks. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Xiyuan Chen, Ouyang Yang, Miaoliang Zhu, Yan He 0001 |
Semantic-Aware Access Control for Grid Application. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Lingli Deng, Yeping He, Ziyao Xu |
Enforcing Separation of Duty in Ad Hoc Collaboration. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Michael Decker |
Requirements for a location-based access control model. |
MoMM |
2008 |
DBLP DOI BibTeX RDF |
mobile computing, access control, location-based services, security model |
9 | Qun Ni, Elisa Bertino, Jorge Lobo 0001 |
An obligation model bridging access control policies and privacy policies. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
privacy, role based access control, policy, obligation |
9 | Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan |
Fast exact and heuristic methods for role minimization problems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
role-based access control, role mining |
9 | Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini |
A location aware role and attribute based access control system. |
GIS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Pingping Zhang, Shiguang Ju, Weihe Chen |
A Location-Based Secure Spatial Audit Policy Model. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Hui Xie, Bin Zhang 0015, Dianyou Hu |
A Role-Based Dynamic Authorization Model and Its Implementation in PMI. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Zhikun Zhang, Jianguo Xiao, Hanyi Li, Youping Geng |
An Extended Permission-Based Delegation Authorization Model. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Diao Mingguang, Xue Tao, Pan Wenyong |
Design of Universal Authority Management Model of Online Teaching System. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Tejeddine Mouelhi, Franck Fleurey, Benoit Baudry, Yves Le Traon |
A Model-Based Framework for Security Policy Specification, Deployment and Testing. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
Model-driven engineering methodology, Security, Metamodeling |
9 | Lijun Yu, Robert B. France, Indrakshi Ray |
Scenario-Based Static Analysis of UML Class Models. |
MoDELS |
2008 |
DBLP DOI BibTeX RDF |
Behavioral Properties, UML, Snapshot, Model Analysis |
9 | Akhil Kumar 0001, Rong Liu |
A Rule-Based Framework Using Role Patterns for Business Process Compliance. |
RuleML |
2008 |
DBLP DOI BibTeX RDF |
generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies |
9 | Isabel F. Cruz, Rigel Gjomemo, Benjamin Lin, Mirko Orsini |
A Constraint and Attribute Based Security Framework for Dynamic Role Assignment in Collaborative Environments. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Semantic Web, role-based access control, reasoning, dynamic environments, collaborative applications |
9 | Youna Jung, Amirreza Masoumzadeh 0001, James B. D. Joshi, Minkoo Kim |
RiBAC: Role Interaction Based Access Control Model for Community Computing. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Role interaction, Multiagent system, Role-based Access Control, Cooperation, Community computing |
9 | Dana Al Kukhun, Florence Sèdes |
Adaptive Solutions for Access Control within Pervasive Healthcare Systems. |
ICOST |
2008 |
DBLP DOI BibTeX RDF |
adaptation, Access control, pervasive computing, XACML |
9 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Stefanie Rinderle-Ma, Manfred Reichert |
Managing the Life Cycle of Access Rules in CEOSIS. |
EDOC |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Masakazu Maruoka, Alireza Goudarzi Nemati, Valbona Barolli, Tomoya Enokido, Makoto Takizawa 0001 |
Making Societies in Peer-to-Peer (P2P) Overlay Networks. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Xinwen Zhang, Qi Li 0002, Jean-Pierre Seifert, Mingwei Xu |
Flexible Authorization with Decentralized Access Control Model for Grid Computing. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jungin Kim, Bhavani Thuraisingham |
Design of Secure CAMIN Application System Based on Dependable and Secure TMO and RT-UCON. |
ISORC |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #801 - #900 of 1029 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|