|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 519 occurrences of 282 keywords
|
|
|
Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Milo M. K. Martin, Mark D. Hill, David A. Wood 0001 |
Token Coherence: Decoupling Performance and Correctness. |
ISCA |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Arun Kumar 0002, Neeran M. Karnik, Girish Chafle |
Context sensitivity in role-based access control. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Deirdre K. Mulligan, Aaron J. Burstein |
Implementing Copyright Limitations in Rights Expression Languages. |
Digital Rights Management Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Óscar Cánovas Reverte, Antonio Fernandez Gómez-Skarmeta, Humberto Martínez Barberá, Gregorio Martínez Pérez |
Different Smartcard-Based Approaches to Physical Access Control. |
InfraSec |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Babak Sadighi Firozabadi, Marek J. Sergot |
Contractual Access Control. |
Security Protocols Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Sotiris Ioannidis, Steven M. Bellovin, Jonathan M. Smith |
Sub-operating systems: a new approach to application security. |
ACM SIGOPS European Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Gustaf Neumann, Mark Strembeck |
A scenario-driven role engineering process for functional RBAC roles. |
SACMAT |
2002 |
DBLP DOI BibTeX RDF |
role-based access control, scenarios, role engineering |
10 | Oskar Scheikl, Jonathan Lane, Robert Boyer, Mohamed Eltoweissy |
Multi-level Secure Multicast: The Rethinking of Secure Locks. |
ICPP Workshops |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Massimo Merro, Vladimiro Sassone |
Typing and Subtyping Mobility in Boxed Ambients. |
CONCUR |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Won Bo Shim, Seog Park |
Web Document Access Control Using Two-Layered Storage Structures with RBAC Server. |
EurAsia-ICT |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Yinglian Xie, David R. O'Hallaron, Michael K. Reiter |
A Secure Distributed Search System. |
HPDC |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Babak Sadighi Firozabadi, Marek J. Sergot |
Revocation Schemes for Delegated Authorities. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Matthias Nickles, Michael Rovatsos, Gerhard Weiß 0001 |
A Schema for Specifying Computational Autonomy. |
ESAW |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Babu Sundaram, Barbara M. Chapman |
XML-Based Policy Engine Framework for Usage Policy Management in Grids. |
GRID |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Daniel J. Sorin, Milo M. K. Martin, Mark D. Hill, David A. Wood 0001 |
SafetyNet: Improving the Availability of Shared Memory Multiprocessors with Global Checkpoint/Recovery. |
ISCA |
2002 |
DBLP DOI BibTeX RDF |
multiprocessor, availability, shared memory |
10 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
A Model for Attribute-Based User-Role Assignment. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Matthew Schmid, Frank Hill, Anup K. Ghosh |
Protecting Data from Malicious Software. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
10 | Christopher Pinchak, Paul Lu, Mark Goldenberg |
Practical Heterogeneous Placeholder Scheduling in Overlay Metacomputers: Early Experiences. |
JSSPP |
2002 |
DBLP DOI BibTeX RDF |
metascheduler, placeholders, overlay metacomputers, metaqueue, scheduling, load balancing, computational grids, metacomputing |
10 | James Joshi, Arif Ghafoor, Walid G. Aref, Eugene H. Spafford |
Digital Government Security Infrastructure Design Challenges. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
10 | David G. Leeper |
A Long-Term View of Short-Range Wireless. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Jeremy Wyant |
Applicability of Public Key Cryptosystems to Digital Rights Management Applications. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
|
10 | Ian H. Witten, David Bainbridge 0001, Stefan J. Boddie |
Power to the people: end-user building of digital library collections. |
JCDL |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann |
Using Authority Certificates to Create Management Structures. |
Security Protocols Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos |
Modelling Security Policies in Hypermedia and Web-Based Applications. |
Web Engineering |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata |
Security verification of programs with stack inspection. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
Java, Java, access control, stack inspection, security verification |
10 | Jonathon Tidswell, John Potter |
A graphical definition of authorization schema in the DTAC model. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
DTAC, access control, constraints, graphs, dynamic, computer security, type, roles, schema |
10 | Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas |
Flexible team-based access control using contexts. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
active security, access control, contexts, teams |
10 | Najam Perwaiz |
Structured management of role-permission relationships. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos |
A flexible content and context-based access control model for multimedia medical image database systems. |
MM&Sec |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Benjamin C. Pierce, Jerome Vouillon |
Unison: A File Synchronizer and Its Specification. |
TACS |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Paul C. Attie, Nancy A. Lynch |
Dynamic Input/Output Automata: A Formal Model for Dynamic Systems. |
CONCUR |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Antonio Corradi, Naranker Dulay, Rebecca Montanari, Cesare Stefanelli |
Policy-Driven Management of Agent Systems. |
POLICY |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Babu Sundaram, Barbara M. Chapman |
Policy Engine: A Framework for Authorization, Accouting Policy Specification and Evaluation in Grids. |
GRID |
2001 |
DBLP DOI BibTeX RDF |
|
10 | Marco Cremonini, Andrea Omicini, Franco Zambonelli |
Ruling Agent Motion in Structured Environments. |
HPCN |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Steve Barker |
Data Protection by Logic Programming. |
Computational Logic |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Thomas Gebhardt, Thomas Hildmann 0001 |
Enabling technologies for role based online decision engines. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Trent Jaeger, Jonathon Tidswell |
Rebuttal to the NIST RBAC model proposal. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
10 | Ying-Lie O |
A Life-Cycle Based Authorisation Expert Database System. |
AIMDM |
1999 |
DBLP DOI BibTeX RDF |
|
10 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. |
ICPP Workshops |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
10 | Leendert W. N. van der Torre |
Violation Contexts and Deontic Independence. |
CONTEXT |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Edward C. Cheng |
An Object-Oriented Organizational Model to Support Dynamic Role-based Access Control in Electronic Commerce Applications. |
HICSS |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Trent Jaeger, Tony Michailidis, Roy Rada |
Access Control in a Virtual University. |
WETICE |
1999 |
DBLP DOI BibTeX RDF |
|
10 | Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati |
Exception-Based Information Flow Control in Object-Oriented Systems. |
ACM Trans. Inf. Syst. Secur. |
1998 |
DBLP DOI BibTeX RDF |
condifentiality, object-oriented databases and systems, access control, information flow control |
10 | Prasun Dewan, Honghai Shen |
Controlling Access in Multiuser Interfaces. |
ACM Trans. Comput. Hum. Interact. |
1998 |
DBLP DOI BibTeX RDF |
security, privacy, collaboration, access control, computer-supported cooperative work, groupware, user interface management systems, structure editors |
10 | S. D. Lang, L. J. Mao |
A Comparison of Two Torus-Based K-Coteries. |
ICPADS |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Marcelo Finger |
Computational Solutions for Structural Constraints. |
LACL |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Frank Dignum, Hans Weigand |
Modelling Communication between Cooperative Systems |
CAiSE |
1995 |
DBLP DOI BibTeX RDF |
|
10 | J. Ray Scott |
Library information access client. |
CHI Conference Companion |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Nicholas P. Carter, Stephen W. Keckler, William J. Dally |
Hardware Support for Fast Capability-based Addressing. |
ASPLOS |
1994 |
DBLP DOI BibTeX RDF |
|
10 | Ronald M. Lee |
Bureaucracies as Deontic Systems. |
ACM Trans. Inf. Syst. |
1988 |
DBLP DOI BibTeX RDF |
|
10 | A. J. I. Jones |
On the Relationship Between Permission and Obligation. |
ICAIL |
1987 |
DBLP DOI BibTeX RDF |
|
Displaying result #701 - #751 of 751 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8] |
|