|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
13 | Cene Bavec, Mirko Vintar |
What Matters in the Development of the E-Government in the EU? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EGOV ![In: Electronic Government, 6th International Conference, EGOV 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 424-435, 2007, Springer, 978-3-540-74443-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
eGovernment policies, Cross-national comparative studies, Societal aspects of eGovernment, The role of eGovenment in development, European Union |
13 | Tae-Hum Lim, Sang-Uk Shin |
Intelligent Access Control Mechanism for Ubiquitous Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 955-960, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ubiquitous application, neural network algorithm, access control, context aware, role based |
13 | Mohamed Mahdi Malik, Jean Royauté |
A Predicate Database for Assisting the Design of a Lexicon-Grammar of Predicative Nouns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LTC ![In: Human Language Technology. Challenges of the Information Society, Third Language and Technology Conference, LTC 2007, Poznan, Poland, October 5-7, 2007, Revised Selected Papers, pp. 312-324, 2007, Springer, 978-3-642-04234-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Predicate noun phrase, Lexicon-grammar, Argument role, Nominal and verbal constructions, Database, Nominalization |
13 | Le Yang 0003, Yongsun Choi |
A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design IV, 11th International Conference, CSCWD 2007, Melbourne, Australia, April 26-28, 2007. Revised Selected Papers, pp. 488-497, 2007, Springer, 978-3-540-92718-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Workflow Authorization Model, Role-based Access Control, Workflow System |
13 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 339-348, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
13 | Masayuki Okamoto, Hideo Umeki |
Toward Video Bookmarking Search: Search-Target Inference from TVWatching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSC ![In: Proceedings of the First IEEE International Conference on Semantic Computing (ICSC 2007), September 17-19, 2007, Irvine, California, USA, pp. 605-614, 2007, IEEE Computer Society, 0-7695-2997-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Keyword Inference, Semantic Role Analysis, Japanese Closed Captions, Named Entity Recognition |
13 | Guillermo Jiménez-Díaz, Mercedes Gómez-Albarrán, Pedro A. González-Calero |
Pass the Ball: Game-Based Learning of Software Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2007, 6th International Conference, Shanghai, China, September 15-17, 2007, Proceedings, pp. 49-54, 2007, Springer, 978-3-540-74872-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
object-oriented design, Game-based learning, role-play |
13 | Eric Gouardères, Yon Dourisboure, Guy Gouardères, Mansour Saber |
The ARS Model: Virtual Learning Communities with P2PAgents on the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada, pp. 73, 2007, IEEE Computer Society, 0-7695-2881-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Peer-to-Peer Agents, e-Portfolio, Grid, Role Models, Virtual Learning Communities |
13 | Kursat Kursat Ozenc, James P. Brommer, Bong-keum Jeong, Nina Shih, Karen Au, John Zimmerman |
Reverse alarm clock: a research through design example of designing for the self. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DPPI ![In: Proceedings of the 2007 International Conference on Designing Pleasurable Products and Interfaces, 2007, Helsinki, Finland, August 22-25, 2007, pp. 392-406, 2007, ACM, 978-1-59593-942-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
alarm clock, bedtime, designing for the self, material possession attachment, children, time, clock, consumer behavior, parents, social role, wakeup |
13 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
X-FEDERATE: A Policy Engineering Framework for Federated Access Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(5), pp. 330-346, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software engineering, role-based access control, security management, Federated systems |
13 | David A. Basin, Jürgen Doser, Torsten Lodderstedt |
Model driven security: From UML models to access control infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 15(1), pp. 39-91, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Unified Modeling Language, Role-Based Access Control, Model Driven Architecture, metamodeling, Object Constraint Language, security engineering |
13 | Hongxia Cai, Tao Yu, Minglun Fang |
Access Control Model of Manufacturing Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROLAMAT ![In: Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, Proceedings of PROLAMAT 2006, IFIP TC5 International Conference, June 15-17, 2006, Shanghai, China, pp. 938-943, 2006, Springer, 0-387-34402-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Role-based Access Control Model, security, Manufacturing Grid |
13 | Bechara al Bouna, Richard Chbeir |
Multimedia-based authorization and access control policy specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 61-68, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization and access control, security, user model, role based access control, multimedia content |
13 | Prateek Sarkar |
Document image analysis for digital libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWRIDL ![In: Proceedings of the International Workshop on Research Issues in Digital Libraries, IWRIDL 2006, in association with ACM SIGIR, Kolkata, India, December 12 - 15, 2006, pp. 12, 2006, ACM, 1-59593-608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
UpLib, document image classification, functional role labeling, image layer separation, perceptual document analysis, robust OCR, ubitext, document processing, personal digital library, DICE |
13 | Rafae Bhatti, Khalid Moidu, Arif Ghafoor |
Policy-based security management for federated healthcare databases (or RHIOs). ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIKM ![In: Proceedings of the International Workshop on Healthcare Information and Knowledge Management, HIKM 2006, Arlington, Virginia, USA, November 11, 2006, pp. 41-48, 2006, ACM, 1-59593-528-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
federated healthcare architecture, privacy and disclosure policy, role based access control |
13 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 8(4), pp. 388-423, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy administration, XML, role-based access control, secure interoperation |
13 | Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou |
EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 18(2), pp. 115-145, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security, role based access control, business process |
13 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-Based Context-Aware Access Control Model for Web-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 18(1), pp. 83-105, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Web services, XML, Role-Based Access Control, Trust Management |
13 | Suroop Mohan Chandran, James B. D. Joshi |
LoT-RBAC: A Location and Time-Based RBAC Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2005, 6th International Conference on Web Information Systems Engineering, New York, NY, USA, November 20-22, 2005, Proceedings, pp. 361-375, 2005, Springer, 3-540-30017-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
location based access, role based access, temporal constraint |
13 | Michelle L. Kaarst-Brown, Indira R. Guzman |
Who is "the IT workforce"?: challenges facing policy makers, educators, management, and research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2005 ACM SIGMIS CPR conference on Computer personnel research 2005, Atlanta, Georgia, USA, April 14-16, 2005, pp. 1-8, 2005, ACM, 1-59593-011-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IT identify, role of IT professionals, IT professional |
13 | David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
Composing and combining policies under the policy machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 11-20, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, role based access control, separation of duty, multi-level security |
13 | Hanna Strömberg, Valtteri Pirttilä, Veikko Ikonen |
Interactive scenarios-building ubiquitous computing concepts in the spirit of participatory design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 8(3-4), pp. 200-207, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Scenario building, Participatory design, Role-playing, Improvisation |
13 | Mark Strembeck, Gustaf Neumann |
An integrated approach to engineer and enforce context constraints in RBAC environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(3), pp. 392-427, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Context-dependent access control, constraints engineering, context constraints, role-based access control |
13 | Octavian Andrei Dragoi, James P. Black |
Discovering Services Is Not Enough. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Distributed Syst. Online ![In: IEEE Distributed Syst. Online 5(8), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ubiquitous computing, role-based access control, service discovery |
13 | Steve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong |
An architecture for supporting vicarious learning in a distributed environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 963-970, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role-based access control, policy, OASIS |
13 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-based Context-Aware Access Control Model for Web-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 184-191, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Web-Services, XML, Role-Based Access Control, Trust Management |
13 | Shu-Ching Chen, Mei-Ling Shyu, Na Zhao 0003 |
SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004, pp. 432-435, 2004, ACM, 1-58113-893-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML, role-based access control (RBAC), object-relational databases, multimedia security |
13 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
Administrative scope in the graph-based framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 97-104, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role-based access control, graph transformations, administration |
13 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 6th International Conference on Electronic Commerce, ICEC 2004, Delft, The Netherlands, October 25-27, 2004, pp. 490-499, 2004, ACM, 1-58113-930-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
13 | Chek Yang Foo, Elina M. I. Koivisto |
Defining grief play in MMORPGs: player and developer perceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, 2004, Singapore, June 3-5, 2004, pp. 245-250, 2004, ACM, 1-58113-882-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
greed play, grief play, harassment, power imposition, scamming, avatars, game design, MMORPG, role-play |
13 | Steve Barker, Peter J. Stuckey |
Flexible access control policy specification with constraint logic programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 501-546, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Role-based access control, constraint logic programming |
13 | James Odell, H. Van Dyke Parunak, Mitchell Fleischer |
Modeling agent organizations using roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 2(2), pp. 76-81, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Agent, Role, Active object |
13 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Content-Based Authorizations for XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 4th International Conference on Web Information Systems Engineering, WISE 2003, Rome, Italy, December 10-12, 2003, pp. 103-114, 2003, IEEE Computer Society, 0-7695-1999-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation |
13 | Barry G. Silverman, Michael Johns, Ransom Weaver, Joshua Mosley |
Authoring Edutainment Stories for Online Players (AESOP): Introducing Gameplay into Interactive Dramas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Virtual Storytelling ![In: Virtual Storytelling; Using Virtual Reality Technologies for Storytelling, Second International Conference, ICVS 2003, Toulouse, France, November 20-21, 2003, Proceedings, pp. 65-73, 2003, Springer, 3-540-20535-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
videogame generator, stealth learning, agent ap- proach, training, interactive drama, role-playing games |
13 | Sachin Abhyankar, Rishi Toshniwal, Carlos Cordeiro 0001, Dharma P. Agrawal |
On the application of traffic engineering over bluetooth ad hoc networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSWiM ![In: Proceedings of the 6th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, MSWiM 2003, San Diego, CA, USA, September 19, 2003, pp. 116-123, 2003, ACM. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
piconet partitioning, role switching, performance evaluation, bluetooth, traffic engineering |
13 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
A graph-based formalism for RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 5(3), pp. 332-365, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Access control in information systems, decentralized administration, permission management, role-based access control, correctness, graph transformations |
13 | Ian Beeson, Stewart Green, Jin Sa, Alan Sully |
Linking Business Processes and Information Systems Provision in a Dynamic Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 4(3), pp. 317-329, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role activity diagrams, business process, process modelling, information system development, information systems architecture |
13 | Tu Bao Ho, Trong Dung Nguyen, DucDung Nguyen |
Visualization support for a user-centered KDD process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, July 23-26, 2002, Edmonton, Alberta, Canada, pp. 519-524, 2002, ACM, 1-58113-567-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
the user's active role, model selection, data and knowledge visualization, knowledge discovery process |
13 | Trent Jaeger, Jonathon Tidswell |
Practical safety in flexible access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(2), pp. 158-190, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
13 | Mahdi Hannoun, Olivier Boissier, Jaime Simão Sichman, Claudette Sayettat |
MOISE: An Organizational Model for Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IBERAMIA-SBIA ![In: Advances in Artificial Intelligence, International Joint Conference, 7th Ibero-American Conference on AI, 15th Brazilian Symposium on AI, IBERAMIA-SBIA 2000, Atibaia, SP, Brazil, November 19-22, 2000, Proceedings, pp. 156-165, 2000, Springer, 3-540-41276-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Organizational link, Multi-Agent System, Group, Organization, Role |
13 | Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid |
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 2-14, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Authentication, logic programming, role based access control, key management, trust management, public key certificates, X.509 |
13 | Pierre Bieber, D. Raujol, Pierre Siron |
Security Architecture for Federated Cooperative Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 208-216, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
federated cooperative information systems, role-based policy, software architecture, interoperability, CORBA, distributed databases, case study, open systems, security of data, security architecture, distributed object management, commercial off the shelf components |
13 | Shelby Abraham, Keith Duddy, Michael Lawley, Zoran Milosevic, Kerry Raymond, Andrew Wood |
Mapping Enterprise Events to the CORBA Notification Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 25-28 September 2000, Makuhari, Japan, Proceedings, pp. 124-134, 2000, IEEE Computer Society, 0-7695-0865-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
enterprise event mapping, CORBA notification service, enterprise modelling choices, role based modelling concepts, expressive business event model, expressive enterprise models, business context, modelling concepts, UML Profile for Enterprise Distributed Object Computing, business event model, high level enterprise models, business processes, business data processing, automated tools |
13 | Franz Witzeling |
Demo CD "Relationship", a Demonstration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 1035, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Interface man - multimedia, cyber-office, cyber doctor, role game, search for human synergy, problem-solving and co-operation between partners and in teams, relationship between virtual reality, real life, senso-mental-identity |
13 | Kari Kivisto |
Roles of Developers as Part of a Software Process Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), January 5-8, 1999, Maui, Hawaii, USA, 1999, IEEE Computer Society, 0-7695-0001-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
object orientation, Process model, role, team, client/server architecture |
13 | Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien |
Napoleon: A Recipe for Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 134-142, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
workflow, role-based access control, security policy, distributed system security |
13 | J. Hoffman |
Implementing RBAC on a Type Enforced System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 158-163, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system |
13 | Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne |
Domain and Type Enforcement Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 122-132, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP |
13 | António Rito Silva, Teresa Gonçalves, Francisco Assis Rosa, Arne-Jørgen Berre, Jan Øyvind Aagedal |
Organization, Information System and Distribution Modeling: An Integrated Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 1st International Enterprise Distributed Object Computing Conference (EDOC '97), 24-26 October 1997, Gold Coast, Australia, Proceedings, pp. 57-, 1997, IEEE Computer Society, 0-8186-8031-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Information Systems, Distribution, Enterprise Modeling, Role Modeling |
13 | G. Osguthorpe, B. Steele, A. Houldcroft |
A method for developing CSCW systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 5th Workshop on Enabling Technologies, Infrastructure for Collaborative Enterprises (WET-ICE'96), June 19-21, 1996, Stanford, CA, USA, Proceedings, pp. 214-219, 1996, IEEE Computer Society, 0-8186-7445-8. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
CSCW systems development, organizational views, business view, group view, role view, application view, system view, organizational structure model, British health authority, modeling, computer supported cooperative work, requirements engineering, groupware, process model, information model, operations research, SODA, groupware systems |
13 | Christoph Bussler, Stefan Jablonski |
Policy resolution for workflow management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (4) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 831-840, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
policy resolution, work assignment, arbitrary role models, groupware, business data processing, workflow management systems, office automation, cooperative information systems, organization models |
13 | Timo Käkölä |
Fostering organizational learning with embedded application systems: the XTEND2 prototype. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 199-208, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
embedded application systems, XTEND2 prototype, computerized tasks, embedded systems approach, extended support systems, coordinating role, unexpected breakdowns, Embedded Application Systems, commercial implementations, real-time systems, learning (artificial intelligence), information systems, information systems, organizational learning, software systems |
13 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber |
Authentication in Distributed Systems: Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 10(4), pp. 265-310, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
loading programs, path name, principal, speaks for, group, role, delegation, key distribution, interprocess communication, certification authority, trusted computing base, secure channel |
13 | Carlo Blundo, Stelvio Cimato |
A simple role mining algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 1958-1962, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Frances Paulisch, Peter Zimmerer |
A role-based qualification and certification program for software architects: an experience report from Siemens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (2) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 2, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 21-27, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
software engineering, software architecture, education, testing, training, curriculum, certification |
13 | Ryohei Ueha, Hang T. T. Pham, Hiroaki Hirai, Fumio Miyazaki |
A simple control design for human-robot coordination based on the knowledge of dynamical role division. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 3051-3056, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Matthew Curland, Terry A. Halpin, Kurt Stirewalt |
A Role Calculus for ORM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops ![In: On the Move to Meaningful Internet Systems: OTM 2009 Workshops, Confederated International Workshops and Posters, ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009, Vilamoura, Portugal, November 1-6, 2009. Proceedings, pp. 692-703, 2009, Springer, 978-3-642-05289-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Federica Paci, Rodolfo Ferrini, Elisa Bertino |
Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 535-542, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Jun Zhu, Yong Tang 0001, Jianguo Li, Hai Liu 0006 |
A role hierarchical group awareness model and its time possibility analysis based fuzzy time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, CSCWD 2009, April 22-24, 2009, Santiago, Chile, pp. 38-43, 2009, IEEE, 978-1-4244-3534-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Baingio Pinna, Marco Elio Tabacchi |
A Fuzzy Approach to the Role of Symmetry in Shape Formation: The Illusion of the Scalene Triangle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WILF ![In: Fuzzy Logic and Applications, 8th International Workshop, WILF 2009, Palermo, Italy, June 9-12, 2009, Proceedings, pp. 197-204, 2009, Springer, 978-3-642-02281-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fuzzy operators, shape formation, perception, symmetry |
13 | Dong-Hyun Lee, Jong-Hwan Kim 0001 |
Motivation and Context-Based Multi-Robot Architecture for Dynamic Task, Role and Behavior Selections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FIRA ![In: Advances in Robotics, FIRA RoboWorld Congress 2009, Incheon, Korea, August 16-20, 2009. Proceedings, pp. 161-170, 2009, Springer, 978-3-642-03982-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-robot coordination, probabilistic behavior selection, team strategy |
13 | Anne Sullivan |
Gender-inclusive quest design in massively multiplayer online role-playing games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDG ![In: Proceedings of the 4th International Conference on Foundations of Digital Games, FDG 2009, Orlando, Florida, USA, April 26-30, 2009, pp. 354-356, 2009, ACM, 978-1-60558-437-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello |
Leveraging Lattices to Improve Role Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 333-347, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Wang Xiaoqing, Gu Tianyang, Guo Yong, Zheng Yanxing, Zong Jianjian |
An Efficient Algorithm of Role Mapping across Security Domains in Data-Sharing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: The Ninth International Conference on Web-Age Information Management, WAIM 2008, July 20-22, 2008, Zhangjiajie, China, pp. 606-611, 2008, IEEE Computer Society, 978-0-7695-3185-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Zhijiao Xiao, Zhong Ming 0001, Jianfei Yin |
Role-Oriented Workflow Modeling Based on Object Petri Net. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 837-843, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Samrat Mondal, Shamik Sural |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 140-147, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Temporal RBAC, Model Checking, Verification, Timed Automata, CTL |
13 | Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang |
An Improved Role-Based Workflow Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fifth International Conference on Information Technology: New Generations (ITNG 2008), 7-8 April 2008, Las Vegas, Nevada, USA, pp. 551-556, 2008, IEEE Computer Society, 978-0-7695-3099-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization restriction, Access control, workflow, transaction, task |
13 | Pilu Crescenzi, Miriam Di Ianni, Federico Greco, Gianluca Rossi, Paola Vocca |
Making Role Assignment Feasible: A Polynomial-Time Algorithm for Computing Ecological Colorings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WG ![In: Graph-Theoretic Concepts in Computer Science, 34th International Workshop, WG 2008, Durham, UK, June 30 - July 2, 2008. Revised Papers, pp. 90-100, 2008, 978-3-540-92247-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Ildar Farkhatdinov, Jee-Hwan Ryu |
A Study on the Role of Force Feedback for Teleoperation of Industrial Overhead Crane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroHaptics ![In: Haptics: Perception, Devices and Scenarios, 6th International Conference, EuroHaptics 2008, Madrid, Spain, June 10-13, 2008, Proceedings, pp. 796-805, 2008, Springer, 978-3-540-69056-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Industrial crane, force feedback, haptic interface, teleoperation |
13 | Sebastian Rudolph, Markus Krötzsch, Pascal Hitzler |
Cheap Boolean Role Constructors for Description Logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JELIA ![In: Logics in Artificial Intelligence, 11th European Conference, JELIA 2008, Dresden, Germany, September 28 - October 1, 2008. Proceedings, pp. 362-374, 2008, Springer, 978-3-540-87802-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Tomoya Enokido, Makoto Takizawa 0001 |
Role Based Access Control in Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 24-29, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Qi Li 0002, Mingwei Xu, Xinwen Zhang |
Towards a Group-Based RBAC Model and Decentralized User-Role Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 17-20 June 2008, Beijing, China, pp. 441-446, 2008, IEEE Computer Society, 978-0-7695-3173-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Songfang Huang, Steve Renals |
Modeling Topic and Role Information in Meetings Using the Hierarchical Dirichlet Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MLMI ![In: Machine Learning for Multimodal Interaction, 5th International Workshop, MLMI 2008, Utrecht, The Netherlands, September 8-10, 2008. Proceedings, pp. 214-225, 2008, Springer, 978-3-540-85852-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Ilaria Liccardi, Asma Ounnas, Reena Pau, Elizabeth Massey, Päivi Kinnunen, Sarah Lewthwaite, Marie-Anne Midy, Chandan Sarkar |
The role of social networks in students' learning experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 39(4), pp. 224-237, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
student experience, social network, computer science education, higher education, learning process |
13 | Alessandro Vinciarelli |
Speakers Role Recognition in Multiparty Audio Recordings Using Social Network Analysis and Duration Distribution Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Multim. ![In: IEEE Trans. Multim. 9(6), pp. 1215-1226, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Mina Ryoke, Andrzej P. Wierzbicki |
Gaming and Role Playing as Tools for Creativity Training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creative Environments ![In: Creative Environments: Issues of Creativity Support for the Knowledge Civilization Age, pp. 255-280, 2007, Springer, 978-3-540-71466-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the First International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2007, October 14-20, 2007, Valencia, Spain, pp. 216-221, 2007, IEEE Computer Society, 0-7695-2989-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 125-130, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | NorolHamiza Zamzuri, WanAdilah WanAdnan |
The Role of Cognitive Styles in Groupware Acceptance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. HCI Applications and Services, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part IV, pp. 835-845, 2007, Springer, 978-3-540-73109-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: Seventh International Conference on Computer and Information Technology (CIT 2007), October 16-19, 2007, University of Aizu, Fukushima, Japan, pp. 733-738, 2007, IEEE Computer Society, 978-0-7695-2983-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Matti Mäntymäki |
The role of post-adoption phase trust in B2C e-service loyalty: towards a more comprehensive picture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (2) ![In: Integration and Innovation Orient to E-Society, Volume 2, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 142-152, 2007, Springer, 978-0-387-75493-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Katsumi Morikawa, Katsuhiko Takahashi |
Analysis of the Human Role in Planning and Scheduling via System Dynamics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APMS ![In: Advances in Production Management Systems, International IFIP TC 5, WG 5.7 Conference on Advances in Production Management Systems (APMS 2007), September 17-19, Linköping, Sweden, pp. 297-304, 2007, Springer, 978-0-387-74156-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
scheduling, Planning, system dynamics, human |
13 | Jing Qiu, Lejian Liao |
Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (3) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 517-521, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Daniel Qi Chen, David S. Preston |
Understanding CIO Role Effectiveness: The Antecedents and Consequents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 237, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Myrna Flores, Claudio Roberto Boër, Charles Huber, Adrian Plüss, Roger Schoch, Michel Pouly |
The Role Of Universities Developing New Collaborative Environments; Analysing The Virtuelle Fabrik, Swiss Microtech And The Tenet Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Enterprises and Collaborative Networks ![In: Establishing The Foundation of Collaborative Networks, IFIP TC 5 Working Group 5.5 Eighth IFIP Working Conference on Virtual Enterprises, September 10-12, 2007, Guimarães, Portugal, pp. 123-134, 2007, Springer, 978-0-387-73797-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Feng Chen 0004, Shaoyun Li, Hongji Yang |
Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2007, London, UK, 15-17 April 2007, pp. 483-488, 2007, IEEE, 1-4244-1076-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Maulin Patel, S. Venkatesan 0001, Doug Weiner |
Role Assignment for Data Aggregation in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (2) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 2, May 21-23, 2007, Niagara Falls, Canada, pp. 390-395, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Daniele Pighin, Alessandro Moschitti |
A Tree Kernel-Based Shallow Semantic Parser for Thematic Role Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI*IA ![In: AI*IA 2007: Artificial Intelligence and Human-Oriented Computing, 10th Congress of the Italian Association for Artificial Intelligence, Rome, Italy, September 10-13, 2007, Proceedings, pp. 350-361, 2007, Springer, 978-3-540-74781-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Bastin Tony Roy Savarimuthu, Stephen Cranefield, Maryam Purvis, Martin K. Purvis |
Role Model Based Mechanism for Norm Emergence in Artificial Agent Societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COIN ![In: Coordination, Organizations, Institutions, and Norms in Agent Systems III, COIN 2007, International Workshops COIN@AAMAS 2007, Honolulu, HI, USA, May 14, 2007, COIN@MALLOW 2007, Durham, UK, September 3-4, 2007, Revised Selected Papers, pp. 203-217, 2007, Springer, 978-3-540-79002-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Milan Petkovic, Claudine Conrado, Malik Hammoutène |
Cryptographically Enforced Personalized Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 364-376, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Prasanna H. Bammigatti, P. R. Rao |
GenericWA-RBAC: Role Based Access Control Model for Web Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 237-240, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Youhei Tanaka, Tomoya Enokido, Makoto Takizawa 0001 |
Role-Based Serializability for Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 801-811, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Matthias Merz, Markus Aleksy |
Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 449-458, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 |
Policy Analysis for Administrative Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 124-138, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely |
lambda-RBAC: Programming with Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP (2) ![In: Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II, pp. 456-467, 2006, Springer, 3-540-35907-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Akio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani |
Dynamic Role Assignment Protocol for Pervasive Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 588-589, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Chetan Shiva Shankar, Roy H. Campbell |
Managing Pervasive Systems using Role-based Obligation Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy, pp. 373-377, 2006, IEEE Computer Society, 0-7695-2520-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Yanqin Zhu, Peide Qian, Yueqin Liu |
A Role-based PMI Authentication Model and its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Seventh International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2006), 19-20 June 2006, Las Vegas, Nevada, USA, pp. 407-412, 2006, IEEE Computer Society, 0-7695-2611-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Peter Lamb, Robert Power, Gavin Walker, Michael Compton |
Role-based access control for data service integration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 3-12, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, data integration |
13 | Tomoya Enokido, Makoto Takizawa 0001 |
Concurrency Control in Multi-Role Association. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 4-7 July 2006, Lisboa, Portugal, pp. 45, 2006, IEEE Computer Society, 0-7695-2541-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 44182 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|