Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Jaehong Park, Ravi S. Sandhu |
The UCONABC usage control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(1), pp. 128-174, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, trust, digital rights management, usage control |
14 | Reen-Cheng Wang, R. I. Chen, Han-Chieh Chao |
AAA architecture for mobile IPv6 based on WLAN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 14(5), pp. 305-313, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
TCP/IP |
14 | Hasan M. Jamil, Gillian Dobbie |
On Logical Foundations of Multilevel Secure Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 23(3), pp. 271-294, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
MLS databases, belief assertion, inheritance and overriding, security, reasoning, deductive databases, declarative language, soundness and completeness |
14 | Horng-Twu Liaw, Shiou-Wei Fan, Wei-Chen Wu |
A simple password authentication using a polynomial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 74-79, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security, authentication, password |
14 | Giacomo Cabri, Luca Ferrari 0002, Letizia Leonardi |
Embedding JAAS in agent roles to apply local security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPPJ ![In: Proceedings of the 3rd International Symposium on Principles and Practice of Programming in Java, PPPJ 2004, Las Vegas, Nevada, USA, June 16-18, 2004, pp. 135-140, 2004, ACM, 1-59593-171-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Java agents, local policies, authentication, roles |
14 | Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta |
A Credential Conversion Service for SAML-based Scenarios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 297-305, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Georgios Kambourakis, Angelos N. Rouskas, Stefanos Gritzalis |
Delivering Attribute Certificates over GPRS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1166-1170, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance evaluation, UMTS, PKI, GPRS, attribute certificates |
14 | Grit Denker, Son Nguyen, Andrew Ton |
OWL-S Semantics of Security Web Services: a Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESWS ![In: The Semantic Web: Research and Applications, First European Semantic Web Symposium, ESWS 2004, Heraklion, Crete, Greece, May 10-12, 2004, Proceedings, pp. 240-253, 2004, Springer, 3-540-21999-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia |
Identifying Sensitive Associations in Databases for Release Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 187-201, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Vicente Benjumea, Javier López 0001, José A. Montenegro, José M. Troya |
A First Approach to Provide Anonymity in Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 402-415, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Konstantina Stoupa, Athena Vakali, Fang Li 0001, George Andreadis |
Web-based delegation using XML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (6) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 5189-5194, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Byunggil Lee, HyunGon Kim, KyoIl Chung |
Design of Sub-session Based Accounting System for Different Service Level of Mobile IP Roaming User. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT ![In: Telecommunications and Networking - ICT 2004, 11th International Conference on Telecommunications, Fortaleza, Brazil, August 1-6, 2004, Proceedings, pp. 171-182, 2004, Springer, 3-540-22571-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Vishwas Patil, R. K. Shyamasundar |
An Efficient, Secure and Delegable Micro-Payment System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 394-404, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
Efficient Role Based Access Control Method in Wireless Environment. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP TC6 9th International Conference, PWC 2004, Delft, The Netherlands, September 21-23, 2004, Proceedings, pp. 431-439, 2004, Springer, 3-540-23162-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Gunhee Lee, Wonil Kim, Dong-Kyoo Kim |
A Novel Method to Support User's Consent in Usage Control for Stable Trust in E-business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part III, pp. 906-914, 2004, Springer, 3-540-22057-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Hoseong Jeon, Hyunseung Choo, Jai-Ho Oh |
IDentification Key Based AAA Mechanism in Mobile IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 765-775, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Jongil Jeong, Dongkyoo Shin, Dongil Shin, Hyun-Mok Oh |
A Study on the XML-Based Single Sign-On System Supporting Mobile and Ubiquitous Service Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing, International Conference EUC 2004, Aizu-Wakamatsu City, Japan, August 25-27, 2004, Proceedings, pp. 903-913, 2004, Springer, 3-540-22906-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 343-350, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Hui Liu, Minglu Li 0001 |
Multiparty Joint Authentication: Extending the Semantics of Single Sign-On for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC Workshops ![In: Grid and Cooperative Computing - GCC 2004 Workshops: GCC 2004 International Workshops, IGKG, SGT, GISS, AAC-GEVO, and VVS, Wuhan, China, October 21-24, 2004. Proceedings, pp. 358-365, 2004, Springer, 3-540-23578-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 |
Hindering Eavesdropping via IPv6 Opportunistic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 309-321, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Elhadi M. Shakshuki, Zhonghai Luo, Jing Gong, Qian Chen |
Multi-agent System for Security Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 303-308, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Tadashi Komori, Takamichi Saito |
A Secure Wireless LAN System Retaining Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (2) ![In: 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 29-31 March 2004, Fukuoka, Japan, pp. 370-375, 2004, IEEE Computer Society, 0-7695-2051-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Fumio Mizoguchi |
Talk on Activities of Security and Grid Computing Service Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises, 14-16 June 2004, Modena, Italy, pp. 198, 2004, IEEE Computer Society, 0-7695-2183-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France, pp. 233-246, 2004, Springer, 0-387-24050-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Gail-Joon Ahn, Dongwan Shin, Longhua Zhang |
Role-Based Privilege Management Using Attribute Certificates and Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 100-109, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwaihara, Vilas Wuwongse, Yahiko Kambayashi |
A Rule-Based XML Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RuleML ![In: Rules and Rule Markup Languages for the Semantic Web, Second International Workshop, RuleML 2003, Sanibel Island, FL, USA, October 20, 2003, Proceedings, pp. 35-48, 2003, Springer, 3-540-20361-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Chun Ruan, Vijay Varadharajan |
Supporting E-consent on Health Data by Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 14th International Symposium, ISMIS 2003, Maebashi City, Japan, October 28-31, 2003, Proceedings, pp. 392-396, 2003, Springer, 3-540-20256-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum |
A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June - 3 July 2003, Kiris-Kemer, Turkey, pp. 225-231, 2003, IEEE Computer Society, 0-7695-1961-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Hristo Koshutanski, Fabio Massacci |
An access control framework for business processes for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 15-24, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
controlled disclosure, interactive access control, web services, e-business, security management, distributed systems security |
14 | Altair Olivo Santin, Joni da Silva Fraga, Carlos Maziero |
Extending the SDSI / SPKI Model through Federation Webs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security - Advanced Techniques for Network and Data Protection, 7th IFIP TC-6 TC-11 International Conference, CMS 2003, Torino, Italy, October 2-3, 2003, Proceedings, pp. 132-145, 2003, Springer, 3-540-20185-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Yuh-Jong Hu, Chao-Wei Tang |
Agent-Oriented Public Key Infrastructure for Multi-agent E-service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES ![In: Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, KES 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part I, pp. 1215-1221, 2003, Springer, 3-540-40803-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Shijin Yuan, Yunfa Hu |
Access Control Architecture for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (1) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part I, pp. 1004-1007, 2003, Springer, 3-540-21988-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Anca-Andreea Ivan, Vijay Karamcheti |
Using Views for Customizing Reusable Components in Component-Based Frameworks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: 12th International Symposium on High-Performance Distributed Computing (HPDC-12 2003), 22-24 June 2003, Seattle, WA, USA, pp. 194-204, 2003, IEEE Computer Society, 0-7695-1965-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Ravi S. Sandhu, Jaehong Park |
Usage Control: A Vision for Next Generation Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 17-31, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Michiharu Kudo |
PBAC: Provision-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(2), pp. 116-130, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
provisional action, security policy, Access control model |
14 | Piero A. Bonatti, Sabrina De Capitani di Vimercati, Pierangela Samarati |
An algebra for composing access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(1), pp. 1-35, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access control, logic programs, algebra, policy composition |
14 | Larry Koved, Marco Pistoia, Aaron Kershenbaum |
Access rights analysis for Java. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 2002 ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages and Applications, OOPSLA 2002, Seattle, Washington, USA, November 4-8, 2002., pp. 359-372, 2002, ACM, 1-58113-471-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Java security, invocation graph, security, data flow analysis, call graph, access rights |
14 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
Logic-Based Reasoning on Delegatable Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 13th International Symposium, ISMIS 2002, Lyon, France, June 27-29, 2002, Proceedings, pp. 185-193, 2002, Springer, 3-540-43785-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez |
Different Smartcard-Based Approaches to Physical Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfraSec ![In: Infrastructure Security, International Conference, InfraSec 2002 Bristol, UK, October 1-3, 2002, Proceedings, pp. 214-226, 2002, Springer, 3-540-44309-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Chou Chen Yang, Min-Shiang Hwang, Jian Wei Li, Ting Yi Chang |
A Solution to Mobile IP Registration for AAA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDMA International Conference ![In: Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers, pp. 329-337, 2002, Springer, 3-540-00732-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Byung Gil Lee, Hyun Gon Kim, Sung Won Sohn, Kil-Houm Park |
Design of an Accounting Architecture for Load and Session Managed Diameter-Based AAA Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CDMA International Conference ![In: Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers, pp. 338-348, 2002, Springer, 3-540-00732-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Ed Dawson, Javier López 0001, José A. Montenegro, Eiji Okamoto |
A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 136-149, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Stephen T. Kent |
Rethinking PKI: What's Trust Got to Do with It? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 398-399, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Tatyana Ryutov, B. Clifford Neuman |
The Specification and Enforcement of Advanced Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 128-138, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Victoria Ungureanu |
Regulating E-Commerce through Certified Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA, pp. 35-43, 2002, IEEE Computer Society, 0-7695-1828-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Duminda Wijesekera, Sushil Jajodia |
Policy algebras for access control: the propositional case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 38-47, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
policy algebra, access control, security policy, policy composition |
14 | Armin Stranjak, Damir Kovacic, Igor Cavrak, Mario Zagar |
Concurrent Access to Remote Instrumentation in CORBA-Based Distributed Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN (2) ![In: Networking - ICN 2001, First International Conference, Colmar, France, July 9-13, 2001 Proceedings, Part 2, pp. 399-408, 2001, Springer, 3-540-42303-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | B. Clifford Neuman |
Condition-Driven Integration of Security Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 176, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Els Van Herreweghen |
Non-repudiation in SET: Open Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 4th International Conference, FC 2000 Anguilla, British West Indies, February 20-24, 2000, Proceedings, pp. 140-156, 2000, Springer, 3-540-42700-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Line Pouchard, David W. Walker |
A Community of Agents for User Support in a Problem-Solving Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agents Workshop on Infrastructure for Multi-Agent Systems ![In: Infrastructure for Agents, Multi-Agent Systems, and Scalable Multi-Agent Systems, International Workshop on Infrastructure for Multi-Agent Systems, Barcelona, Spain, June 3-7, 2000, Revised Papers, pp. 192-198, 2000, Springer, 3-540-42315-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
14 | Jari Veijalainen |
Transactions in Mobile Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMLDO - Selected Papers ![In: Transactions and Database Dynamics, Eight International Workshop on Foundations of Models and Languages for Data and Objects, Schloß Dagstuhl, Germany, September 27-30, 1999, Selected Papers, pp. 203-224, 1999, Springer, 3-540-67201-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
14 | Hasan M. Jamil |
Belief Reasoning in MLS Deductive Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: SIGMOD 1999, Proceedings ACM SIGMOD International Conference on Management of Data, June 1-3, 1999, Philadelphia, Pennsylvania, USA., pp. 109-120, 1999, ACM Press, 1-58113-084-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
MLS database, beleif assertion, inheritance and overriding, reasoning, Datalog, deductive databases, CORAL |
14 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino |
A Unified Framework for Enforcing Multiple Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: SIGMOD 1997, Proceedings ACM SIGMOD International Conference on Management of Data, May 13-15, 1997, Tucson, Arizona, USA., pp. 474-485, 1997, ACM Press, 978-0-89791-911-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Masakazu Soshi, Mamoru Maekawa |
The Saga Security System: A Security Architecture for Open Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FTDCS ![In: 6th IEEE Workshop on Future Trends of Distributed Computer Systems (FTDCS '97), 29-31 October 1997, Tunis, Tunisia, Proceedings, pp. 53-58, 1997, IEEE Computer Society, 0-8186-8153-5. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
14 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
Supporting Multiple Access Control Policies in Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1996 IEEE Symposium on Security and Privacy, May 6-8, 1996, Oakland, CA, USA, pp. 94-107, 1996, IEEE Computer Society, 0-8186-7417-2. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
High Assurance Discretionary Access Control for Object Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 140-150, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Elisa Bertino, Pierangela Samarati, Sushil Jajodia |
Authorizations in Relational Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 130-139, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
14 | Rafiul Ahad, James Davis 0003, Stefan Gower, Peter Lyngbæk, Andra Marynowski, Emmanuel O. Onuegbe |
Supporting Access Control in an Object-Oriented Database Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'92, 3rd International Conference on Extending Database Technology, Vienna, Austria, March 23-27, 1992, Proceedings, pp. 184-200, 1992, Springer, 3-540-55270-7. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
13 | Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
A systematic literature review of authorization and access control requirements and current state of the art for different database models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Web Inf. Syst. ![In: Int. J. Web Inf. Syst. 20(1), pp. 1-23, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | K. Karthika, DeviPriya Rangasamy |
Authorization of Aadhar data using Diffie Helman key with enhanced security concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 46(4), pp. 8639-8658, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Bruno Sousa, Carolina Gonçalves |
FedAAA-SDN: Federated Authentication, Authorization and Accounting in SDN controllers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 239, pp. 110130, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Olfa Dallel, Souheil Ben Ayed, Jamel Bel Hadj Tahar |
Blockchain-Based Authorization Mechanism for Educational Social Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 42888-42907, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Siok Wah Tay, Ning Zhang 0001, Salem Aljanah |
A Problem Analysis of Smart Home Automation: Toward Secure and Usable Communication-Based Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 18103-18121, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ching-Nung Yang, Peng Li 0050, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong |
A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(6), pp. 10325-10335, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hind Idrissi, Paolo Palmieri 0001 |
Agent-based blockchain model for robust authentication and authorization in IoT-based healthcare systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 80(5), pp. 6622-6660, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fulin Li, Hang Hu 0015, Shixin Zhu, Jiayun Yan |
A fully dynamic multi-secret sharing scheme with redundant authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 16(1), pp. 3-20, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Y. Jani, P. Raajan |
An efficient framework for authentication and blockchain authorization of secured healthcare information using hpcsg- rotdf-slorb and dhsk-decc. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(15), pp. 45471-45489, May 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yanan Zhao, Haiyang Yu, Yang Yang, Liang Xu, Shuyue Pan, Yilong Ren |
Flexible and Secure Cross-Domain Signcrypted Data Authorization in Multi-Platoon Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 25(3), pp. 3166-3176, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yi-Hua Zhou 0001, Bin Tang, Yu-Guang Yang 0001 |
A lattice-based searchable encryption scheme with multi-user authorization for the certificateless cloud computing environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 35(4), April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Shubham Vatsal, Ayush Singh, Shabnam Tafreshi |
Can GPT Improve the State of Prior Authorization via Guideline Based Automated Question Answering? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.18419, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Joseph W. Cutler, Craig Disselkoen, Aaron Eline, Shaobo He, Kyle Headley, Michael Hicks 0001, Kesha Hietala, Eleftherios Ioannidis, John H. Kastner, Anwar Mamat, Darin McAdams, Matt McCutchen, Neha Rungta, Emina Torlak, Andrew Wells |
Cedar: A New Language for Expressive, Fast, Safe, and Analyzable Authorization (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.04651, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Samuel Kofi Erskine |
Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 24(7), pp. 2090, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhiwei Chen, Lunzhi Deng, Yu Ruan, Shuai Feng, Tao Wang, Bo Wang |
Certificateless Broadcast Encryption with Authorization Suitable for Storing Personal Health Records. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(2), pp. 617-631, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Artur Philipp, Axel Küpper, Philip Raschke |
DAXiot: A Decentralized Authentication and Authorization Scheme for Dynamic IoT Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIN ![In: 27th Conference on Innovation in Clouds, Internet and Networks, ICIN 2024, Paris, France, March 11-14, 2024, pp. 1-7, 2024, IEEE, 979-8-3503-9376-7. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Bharath Kumar R., Rajavelsamy R. |
Beyond Tokens: Distributed, De-Centralized, Local Authorization Framework for Beyond 5GC SBI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCNC ![In: 21st IEEE Consumer Communications & Networking Conference, CCNC 2024, Las Vegas, NV, USA, January 6-9, 2024, pp. 121-126, 2024, IEEE, 979-8-3503-0457-2. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Dmytro Dosyn, Taras Batiuk |
A Realization of Visual Biometric Validation to Enhance Guarded and Efficient Authorization for Intellectual Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLINS (2) ![In: Proceedings of the 8th International Conference on Computational Linguistics and Intelligent Systems. Volume II: Modeling, Optimization, and Controlling in Information and Technology Systems Workshop (MOCITSW-CoLInS 2024), Lviv, Ukraine, April 12-13, 2024., pp. 247-268, 2024, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
13 | Ryu Watanabe, Ayumu Kubota, Jun Kurihara, Kouichi Sakurai |
Extension of Resource Authorization Method with SSI in Edge Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (6) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 6, pp. 385-394, 2024, Springer, 978-3-031-57941-7. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yanan Zhao, Haiyang Yu, Yuhao Liang, Han Jiang 0003, Gintare Marine, Yilong Ren |
Sanitizable Cross-System Authorization for Secure Communication in Intelligent Connected Vehicle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(11), pp. 15002-15013, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Carolina Gonçalves, Bruno Sousa, Marin Vukovic, Mario Kusek |
A federated authentication and authorization approach for IoT farming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Things ![In: Internet Things 22, pp. 100785, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Linna Wang, Yunfei Song, Yujia Zhu, Daoxun Xia, Guoquan Han |
A framework for deep neural network multiuser authorization based on channel pruning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 35(21), 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Garsha Rostami |
Role-based Access Control (RBAC) Authorization in Kubernetes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. ICT Stand. ![In: J. ICT Stand. 11(3), pp. 237-260, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Wenjing Zhong, Jinjing Zhao, Hesuan Hu |
Beacon-Based Firing Control for Authorization Security in Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 72(4), pp. 1594-1609, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Wenjing Zhong, Jinjing Zhao, Hesuan Hu |
Unified Implementation and Simplification for Task-Based Authorization Security in Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 16(5), pp. 3796-3811, September - October 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Naoki Umeda, Taiji Kimura, Naoto Yanai |
The Juice Is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Open J. Commun. Soc. ![In: IEEE Open J. Commun. Soc. 4, pp. 269-306, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Yongxia Sun, Weijin Jiang, Ying Yang, Haoran Zhu, Yirong Jiang |
Multi-domain authorization and decision-making method of access control in the edge environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Networks ![In: Comput. Networks 228, pp. 109721, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Fei Tong, Xing Chen, Cheng Huang, Yujian Zhang, Xuemin Shen |
Blockchain-Assisted Secure Intra/Inter-Domain Authorization and Authentication for Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(9, May 1), pp. 7761-7773, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Sreelakshmi Vattaparambil Sudarsan, Olov Schelén, Ulf Bodin |
Multilevel Subgranting by Power of Attorney and OAuth Authorization Server in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(17), pp. 15266-15282, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Louise Hickman, Cynthia L. Bennett |
Access Work: Laboring with Non-Innocent Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Interactions ![In: Interactions 30(4), pp. 60-64, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Carlo Mazzocca, Nicolò Romandini, Michele Colajanni, Rebecca Montanari |
FRAMH: A Federated Learning Risk-Based Authorization Middleware for Healthcare. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Soc. Syst. ![In: IEEE Trans. Comput. Soc. Syst. 10(4), pp. 1679-1690, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Leslie A. Lenert, Steven R. Lane, Ramsey M. Wehbe |
Could an artificial intelligence approach to prior authorization be more human? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Am. Medical Informatics Assoc. ![In: J. Am. Medical Informatics Assoc. 30(5), pp. 989-994, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jianfei Sun, Guowen Xu, Tianwei Zhang 0004, Xiaochun Cheng, Xingshuo Han, Mingjian Tang 0001 |
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Intell. Transp. Syst. ![In: IEEE Trans. Intell. Transp. Syst. 24(7), pp. 7527-7540, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Uzma Mahar, Muhammad Aleem, Ehtesham Zahoor |
TTECCDU: a blockchain-based approach for expressive authorization management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 9, pp. e1212, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Ahmet Bucko, Kamer Vishi, Bujar Krasniqi, Blerim Rexha |
Enhancing JWT Authentication and Authorization in Web Applications Based on User Behavior History. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 12(4), pp. 78, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | P. Padma, S. Srinivasan |
DAuth - Delegated Authorization Framework for Secured Serverless Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Pers. Commun. ![In: Wirel. Pers. Commun. 129(3), pp. 1563-1583, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Benyuan Yang, Hesuan Hu |
Analysis of Authorization Constraints via Integer Linear Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 35(3), pp. 2258-2271, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Hiral S. Trivedi, Sankita J. Patel |
Key-aggregate searchable encryption with multi-user authorization and keyword untraceability for distributed IoT healthcare systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Emerg. Telecommun. Technol. ![In: Trans. Emerg. Telecommun. Technol. 34(4), April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Jens Finkhäuser |
Capabilities for Distributed Authorization in Information-Centric Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2308.04140, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef Küng |
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.12819, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | David Ahmad Abboud, Damien Jacob |
Implementation of a new authorization system from monolithic solution to microservice architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.05994, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
13 | Richard Cardone, Smruti Padhy, Steve Black, Sean B. Cleveland, Joe Stubbs |
A Decentralized Authorization and Security Framework for Distributed Research Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.08557, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|