The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for permissions with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1982-1998 (18) 1999-2000 (18) 2001 (20) 2002 (25) 2003 (41) 2004 (42) 2005 (50) 2006 (53) 2007 (59) 2008 (64) 2009 (43) 2010 (16) 2011 (16) 2012 (25) 2013 (24) 2014 (18) 2015 (23) 2016 (23) 2017 (25) 2018 (29) 2019 (22) 2020 (20) 2021 (31) 2022 (25) 2023 (19) 2024 (2)
Publication types (Num. hits)
article(155) data(2) incollection(5) inproceedings(576) phdthesis(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 519 occurrences of 282 keywords

Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Milo M. K. Martin, Mark D. Hill, David A. Wood 0001 Token Coherence: Decoupling Performance and Correctness. Search on Bibsonomy ISCA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Arun Kumar 0002, Neeran M. Karnik, Girish Chafle Context sensitivity in role-based access control. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Deirdre K. Mulligan, Aaron J. Burstein Implementing Copyright Limitations in Rights Expression Languages. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez Different Smartcard-Based Approaches to Physical Access Control. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Babak Sadighi Firozabadi, Marek J. Sergot Contractual Access Control. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith Sub-operating systems: a new approach to application security. Search on Bibsonomy ACM SIGOPS European Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Gustaf Neumann, Mark Strembeck A scenario-driven role engineering process for functional RBAC roles. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF role-based access control, scenarios, role engineering
10Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy Multi-level Secure Multicast: The Rethinking of Secure Locks. Search on Bibsonomy ICPP Workshops The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Massimo Merro, Vladimiro Sassone Typing and Subtyping Mobility in Boxed Ambients. Search on Bibsonomy CONCUR The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Won Bo Shim, Seog Park Web Document Access Control Using Two-Layered Storage Structures with RBAC Server. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Yinglian Xie, David R. O'Hallaron, Michael K. Reiter A Secure Distributed Search System. Search on Bibsonomy HPDC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Babak Sadighi Firozabadi, Marek J. Sergot Revocation Schemes for Delegated Authorities. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Matthias Nickles, Michael Rovatsos, Gerhard Weiß 0001 A Schema for Specifying Computational Autonomy. Search on Bibsonomy ESAW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Babu Sundaram, Barbara M. Chapman XML-Based Policy Engine Framework for Usage Policy Management in Grids. Search on Bibsonomy GRID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Daniel J. Sorin, Milo M. K. Martin, Mark D. Hill, David A. Wood 0001 SafetyNet: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery. Search on Bibsonomy ISCA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF multiprocessor, availability, shared memory
10Mohammad A. Al-Kahtani, Ravi S. Sandhu A Model for Attribute-Based User-Role Assignment. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Matthew Schmid, Frank Hill, Anup K. Ghosh Protecting Data from Malicious Software. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
10Christopher Pinchak, Paul Lu, Mark Goldenberg Practical Heterogeneous Placeholder Scheduling in Overlay Metacomputers: Early Experiences. Search on Bibsonomy JSSPP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF metascheduler, placeholders, overlay metacomputers, metaqueue, scheduling, load balancing, computational grids, metacomputing
10James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford Digital Government Security Infrastructure Design Challenges. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10David G. Leeper A Long-Term View of Short-Range Wireless. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Jeremy Wyant Applicability of Public Key Cryptosystems to Digital Rights Management Applications. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF
10Ian H. Witten, David Bainbridge 0001, Stefan J. Boddie Power to the people: end-user building of digital library collections. Search on Bibsonomy JCDL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann Using Authority Certificates to Create Management Structures. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos Modelling Security Policies in Hypermedia and Web-Based Applications. Search on Bibsonomy Web Engineering The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata Security verification of programs with stack inspection. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Java, Java, access control, stack inspection, security verification
10Jonathon Tidswell, John Potter A graphical definition of authorization schema in the DTAC model. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF DTAC, access control, constraints, graphs, dynamic, computer security, type, roles, schema
10Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas Flexible team-based access control using contexts. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF active security, access control, contexts, teams
10Najam Perwaiz Structured management of role-permission relationships. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos A flexible content and context-based access control model for multimedia medical image database systems. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Benjamin C. Pierce, Jerome Vouillon Unison: A File Synchronizer and Its Specification. Search on Bibsonomy TACS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Paul C. Attie, Nancy A. Lynch Dynamic Input/Output Automata: A Formal Model for Dynamic Systems. Search on Bibsonomy CONCUR The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Antonio Corradi, Naranker Dulay, Rebecca Montanari, Cesare Stefanelli Policy-Driven Management of Agent Systems. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Babu Sundaram, Barbara M. Chapman Policy Engine: A Framework for Authorization, Accouting Policy Specification and Evaluation in Grids. Search on Bibsonomy GRID The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
10Marco Cremonini, Andrea Omicini, Franco Zambonelli Ruling Agent Motion in Structured Environments. Search on Bibsonomy HPCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Steve Barker Data Protection by Logic Programming. Search on Bibsonomy Computational Logic The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Thomas Gebhardt, Thomas Hildmann 0001 Enabling technologies for role based online decision engines. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Trent Jaeger, Jonathon Tidswell Rebuttal to the NIST RBAC model proposal. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
10Ying-Lie O A Life-Cycle Based Authorisation Expert Database System. Search on Bibsonomy AIMDM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10HyungHyo Lee, BongNam Noh An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF access control, integrity, RBAC, security model, separation of duty
10Leendert W. N. van der Torre Violation Contexts and Deontic Independence. Search on Bibsonomy CONTEXT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Edward C. Cheng An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Trent Jaeger, Tony Michailidis, Roy Rada Access Control in a Virtual University. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
10Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati Exception-Based Information Flow Control in Object-Oriented Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF condifentiality, object-oriented databases and systems, access control, information flow control
10Prasun Dewan, Honghai Shen Controlling Access in Multiuser Interfaces. Search on Bibsonomy ACM Trans. Comput. Hum. Interact. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF security, privacy, collaboration, access control, computer-supported cooperative work, groupware, user interface management systems, structure editors
10S. D. Lang, L. J. Mao A Comparison of Two Torus-Based K-Coteries. Search on Bibsonomy ICPADS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Marcelo Finger Computational Solutions for Structural Constraints. Search on Bibsonomy LACL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
10Frank Dignum, Hans Weigand Modelling Communication between Cooperative Systems Search on Bibsonomy CAiSE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
10J. Ray Scott Library information access client. Search on Bibsonomy CHI Conference Companion The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
10Nicholas P. Carter, Stephen W. Keckler, William J. Dally Hardware Support for Fast Capability-based Addressing. Search on Bibsonomy ASPLOS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
10Ronald M. Lee Bureaucracies as Deontic Systems. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
10A. J. I. Jones On the Relationship Between Permission and Obligation. Search on Bibsonomy ICAIL The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #751 of 751 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license