Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
9 | Anu Singh, C. R. Ramakrishnan 0001, I. V. Ramakrishnan, Scott D. Stoller, David Scott Warren |
Security policy analysis using deductive spreadsheets. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
SELinux policy, security policy analysis, vulnerability analysis |
9 | Wei Zhou 0006, Christoph Meinel |
Function-Based Authorization Constraints Specification and Enforcement. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Access control, authorization constraints, constraints specification, constraints enforcement |
9 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. |
CIT |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Bastian Preindl, Alexander Schatten |
A Near-Real-Time Behaviour Control Framework. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Hyung Chan Kim, Rudrapatna S. Ramakrishna, Wook Shin, Kouichi Sakurai |
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Hua Wang 0002, Qing Li 0001 |
Secure and Efficient Information Sharing in Multi-university E-Learning Environments. |
ICWL |
2007 |
DBLP DOI BibTeX RDF |
security, E-Learning, Information sharing |
9 | Lorenzo Cirio, Isabel F. Cruz, Roberto Tamassia |
A Role and Attribute Based Access Control System Using Semantic Web Technologies. |
OTM Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Qurban A. Memon, Shakil Akhtar, Alaa A. Aly |
Role management in adhoc networks. |
SpringSim (1) |
2007 |
DBLP BibTeX RDF |
mobile adhoc networks, wireless adhoc networks, collaboration, role based access control, group management |
9 | Terry C. House |
Client/Server Access: Satellite-ATM Connectivity Using a Knowledge Management Approach. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
9 | He Wang 0020, Sylvia L. Osborn |
Discretionary access control with the administrative role graph model. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
role graph model, role-based access control, DAC |
9 | Steve Barker |
Action-status access control. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
ASAC, access control, policies |
9 | M. A. C. Dekker, Sandro Etalle |
Refinement for Administrative Policies. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Shin-Jer Yang, Jia-Shin Chen |
A Study of Security and Performance Issues in Designing Web-based Applications. |
ICEBE |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Tomoya Enokido, Makoto Takizawa 0001 |
A Legal Information flow (LIF) scheduler for distributed systems. |
ICPADS |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt |
Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. |
PRIMA |
2007 |
DBLP DOI BibTeX RDF |
Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure |
9 | Eduardo B. Fernández |
Security Patterns and Secure Systems Design. |
LADC |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Alapan Arnab, Andrew Hutchison |
Persistent access control: a formal model for DRM. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
access control, REL, rights expression languages |
9 | Premchand B. Ambhore, B. B. Meshram, V. B. Waghmare |
A Implementation of Object Oriented Database Security. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
structural and dynamic, and logic-based specification, access control, Semantics, data model, database security, authorization policy |
9 | Hyun-Sook Cho, Bong-Hwan Lee, Kyu-Won Lee |
A Trust Management Model for PACS-Grid. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Bechara al Bouna, Richard Chbeir, Stefania Marrara |
A multimedia access control language for virtual and ambient intelligence environments. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
multiMedia, access control |
9 | Junghwa Chae |
Towards Modal Logic Formalization of Role-Based Access Control with Object Classes. |
FORTE |
2007 |
DBLP DOI BibTeX RDF |
object class hierarchy, tableaux method, Role-based access control, modal logic, object classes |
9 | John Bethencourt, Amit Sahai, Brent Waters |
Ciphertext-Policy Attribute-Based Encryption. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Deqing Zou, Laurence Tianruo Yang, Weizhong Qiang, Xueguang Chen, Zongfen Han |
An Authentication and Access Control Framework for Group Communication Systems in Grid Environment. |
AINA |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Apu Kapadia, Prasad Naldurg, Roy H. Campbell |
Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Song-hwa Chae, Wonil Kim |
Semantic Representation of RTBAC: Relationship-Based Access Control Model. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Sejong Oh |
Permission-Centric Hybrid Access Control. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
X-FEDERATE: A Policy Engineering Framework for Federated Access Management. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
software engineering, role-based access control, security management, Federated systems |
9 | Guangsen Zhang, Manish Parashar |
SESAME: Scalable, Environment Sensitive Access Management Engine. |
Clust. Comput. |
2006 |
DBLP DOI BibTeX RDF |
security, access control, context-aware, pervasive computing, role based |
9 | Xinwen Zhang, Ravi S. Sandhu, Francesco Parisi-Presicce |
Safety analysis of usage control authorization models. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
access control, authorization, safety, usage control, UCON |
9 | Yuri Demchenko, Cees de Laat, Leon Gommans, René van Buuren |
Domain Based Access Control Model for Distributed Collaborative Applications. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Aneta Poniszewska-Maranda |
Access Control Coherence of Information Systems Based on Security Constraints. |
SAFECOMP |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Ning Hu, Phillip G. Bradford, Jun Liu |
Applying role based access control and genetic algorithms to insider threat detection. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Zhenxing Luo, NuerMaimaiti Heilili, Dawei Xu, Chen Zhao 0001, Zuoquan Lin |
Web Application Security Gateway with Java Non-blocking IO. |
NGITS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Raman Adaikkalavan, Sharma Chakravarthy |
Discovery-based role activations in role-based access control. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Elisa Bertino, Jason Crampton, Federica Paci |
Access Control and Authorization Constraints for WS-BPEL. |
ICWS |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Xin Liu, Zhen Han, Chang-xiang Shen |
An Integrated Access Control Model of Distributed Database Systems. |
ICICIC (3) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | SeongKi Kim, WanJin Park, Seok Kyoo Kim, Sunil Ahn, Sangyong Han |
Integration of a Cryptographic File System and Access Control. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Lihua Yu, Gang Chen 0001, Ke Chen 0005, Jinxiang Dong |
Securely Sharing Data in Encrypted Databases. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Hao Jiang, Shengye Lu |
Access Control for Workflow Environment: The RTFW Model. |
CSCWD (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Shengye Lu, Hao Jiang |
RTFW: An Access Control Model for Workflow Environment. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Jianming Yong |
Neighbourhood-Trust Dependency Access Control for WFMS. |
CSCWD |
2006 |
DBLP DOI BibTeX RDF |
|
9 | He Wang 0020, Sylvia L. Osborn |
Delegation in the role graph model. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
role-based access control, delegation |
9 | Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki |
Integrating presence inference into trust management for ubiquitous systems. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
presence inference, trust management, ubiquitous |
9 | Hong Chen, Ninghui Li |
Constraint generation for separation of duty. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
constraints, role based access control, separation of duty |
9 | Jun-Cheol Jeon, Kee-Young Yoo |
Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. |
ICIC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Haeng-Kon Kim, Roger Y. Lee, Hae Sool Yang |
Frameworks for Secured Business Process Management Systems. |
SERA |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Kunmei Wen, Zhengding Lu, Ruixuan Li 0001, Xiaolin Sun, Zhigang Wang |
A Semantic Search Conceptual Model and Application in Security Access Control. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Jung-Sun Kim, Seungyong Lee 0001, Minsoo Kim 0002, Jae-Hyun Seo, BongNam Noh |
A Security Architecture for Adapting Multiple Access Control Models to Operating Systems. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Bechara al Bouna, Richard Chbeir |
Multimedia-based authorization and access control policy specification. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
authorization and access control, security, user model, role based access control, multimedia content |
9 | Adam Barth, Anupam Datta, John C. Mitchell, Helen Nissenbaum |
Privacy and Contextual Integrity: Framework and Applications. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Tomoya Enokido, Makoto Takizawa 0001 |
Role-Based Concurrency Control for Distributed Systems. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard |
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Aneta Poniszewska-Maranda |
Security Constraints in Access Control of Information System Using UML Language. |
WETICE |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Hua Wang 0002, Jinli Cao, David Ross |
Role-Based Delegation with Negative Authorization. |
APWeb |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi |
X-gtrbac admin: A decentralized administration model for enterprise-wide access control. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
policy administration, XML, role-based access control, secure interoperation |
9 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-Based Context-Aware Access Control Model for Web-Services. |
Distributed Parallel Databases |
2005 |
DBLP DOI BibTeX RDF |
Web services, XML, Role-Based Access Control, Trust Management |
9 | Elisa Bertino, Ravi S. Sandhu |
Database Security-Concepts, Approaches, and Challenges. |
IEEE Trans. Dependable Secur. Comput. |
2005 |
DBLP DOI BibTeX RDF |
Data confindentiality, relational and object databases, XML, data privacy |
9 | Yuri Demchenko, Leon Gommans, Cees de Laat, Bas van Oudenaarde, Andrew Tokmakoff, Martin Snijders, René van Buuren |
Security Architecture for Open Collaborative Environment. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Wensheng Xu, David W. Chadwick, Sassa Otenko |
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel |
A Framework for Composable Security Definition, Assurance, and Enforcement. |
MoDELS (Satellite Events) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Chang-Joo Moon, Woojin Paik, Young-Gab Kim, JuHum Kwon |
The Conflict Detection Between Permission Assignment Constraints in Role-Based Access Control. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Guillermo Navarro 0001, Joan Borrell |
An XML Standards Based Authorization Framework for Mobile Agents. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Mobile Agents, Authorization, XACML, SAML |
9 | Xinwen Zhang, Yingjiu Li, Divya Nalla |
An attribute-based access matrix model. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
access matrix model, access control, decidability, safety analysis |
9 | A. J. Stell, Richard O. Sinnott, John P. Watt |
Comparison of Advanced Authorisation Infrastructures for Grid Computing. |
HPCS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Chen Zhao 0001, Yang Chen, Dawei Xu, NuerMaimaiti Heilili, Zuoquan Lin |
Integrative Security Management for Web-Based Enterprise Applications. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta, Rafael MarÃn López, Óscar Cánovas Reverte |
A Network Access Control Approach Based on the AAA Architecture and Authorization Attributes. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Song Fu, Cheng-Zhong Xu 0001 |
A Coordinated Spatio-Temporal Access Control Model for Mobile Computing in Coalition Environments. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Ji-Won Byun, Elisa Bertino, Ninghui Li |
Purpose based access control of complex data for privacy protection. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
private data, role attributes, privacy, access control, management, purpose |
9 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
9 | Elisa Bertino |
Purpose Based Access Control for Privacy Protection in Database Systems. |
DASFAA |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Sye Loong Keoh, Emil Lupu |
An Efficient Access Control Model for Mobile Ad-Hoc Communities. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee 0001, Jongin Lim 0001, Kilsoo Chun |
Efficient Revocation of Security Capability in Certificateless Public Key Cryptography. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Shaomin Zhang, Baoyi Wang |
Research on a Fine-grained Access Control Mechanism for Cross-domain Grid. |
SKG |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Andrea De Lucia, Massimiliano Giordano, Giuseppe Polese, Giuseppe Scanniello, Genoveffa Tortora |
Role Based Reengineering of Web Applications. |
WSE |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Celia Li, Cungang Yang, Richard Cheung |
Key Management for Role Hierarchy in Distributed Systems. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Sejong Oh |
New Concept of Authority Range for Flexible Management of Role Hierarchy. |
WISA |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Tomoya Enokido, Makoto Takizawa 0001 |
Concurrency Control on Distributed Objects using Role Ordering (RO) Scheduler. |
WORDS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Mirko Viroli, Andrea Omicini, Alessandro Ricci |
An Organisation Infrastructure for Multi-agent Systems Based on Agent Coordination Contexts. |
AI*IA |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Guillermo Navarro 0001, Jose A. Ortega-Ruiz, Joan Ametller, Sergi Robles |
Distributed Authorization Framework for Mobile Agents. |
MATA |
2005 |
DBLP DOI BibTeX RDF |
Security, Access Control, Mobile Agents, Trust management |
9 | Terry C. House |
Client Server Access: Wired vs. Wireless LEO Satellite-ATM Connectivity; A (MS-Ro-BAC) Experiment. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Guillermo Navarro 0001, Joan Borrell, Jose A. Ortega-Ruiz, Sergi Robles |
Access control with safe role assignment for mobile agents. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
security, access control, mobile agents, SPKI |
9 | Mirko Viroli, Alessandro Ricci, Andrea Omicini |
An organisation infrastructure for Multi-Agent Systems based on Agent Coordination Contexts. |
AAMAS |
2005 |
DBLP DOI BibTeX RDF |
agent infrastructures, role-based access control, agent coordination |
9 | Shaomin Zhang, Baoyi Wang |
Research on Improved Role Hierarchy Model in Extended Organization PKI Networks. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Zhijun He 0002, Tuan Phan, Thu D. Nguyen |
Enforcing Enterprise-wide Policies Over Standard Client-Server Interactions. |
SRDS |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Kaijun Tan, Jason Crampton, Carl A. Gunter |
The Consistency of Task-Based Authorization Constraints in Workflow Systems. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Feng Xu, Guoyuan Lin, Hao Huang, Li Xie |
Role-Based Access Control System for Web Services. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Panos Periorellis, Savas Parastatidis |
Task-Based Access Control for Virtual Organizations. |
FIDJI |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
A Trust-based Context-Aware Access Control Model for Web-Services. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
Web-Services, XML, Role-Based Access Control, Trust Management |
9 | Chris Wullems, Mark Looi, Andrew J. Clark |
Towards Context-aware Security: An Authorization Architecture for Intranet Environments. |
PerCom Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
Administrative scope in the graph-based framework. |
SACMAT |
2004 |
DBLP DOI BibTeX RDF |
role-based access control, graph transformations, administration |
9 | Jianxun Liu, Lixia Sun |
The application of role-based access control in workflow management systems. |
SMC (6) |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
Efficient Role Based Access Control Method in Wireless Environment. (PDF / PS) |
PWC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | David P. Gilliam |
WETICE 2004 Ninth Enterprise Security (ES) Workshop Report. |
WETICE |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Katherine L. Morse, Ryan Brunton, J. Mark Pullen, Priscilla M. McAndrews, Andreas Tolk, James Muguira |
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation. |
DS-RT |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Ezedin Barka, Ravi S. Sandhu |
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
9 | Jae-Deok Lim, Joon-Suk Yu, Jeong-Nyeo Kim |
A study of the method of providing secure network channel among secure OSs. |
ISICT |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Mina Jeong, Jung-Ja Kim, Yonggwan Won |
A Flexible Database Security System Using Multiple Access Control Policies. |
DEXA |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Secure Interoperability between Cooperating XML Systems by Dynamic Role Translation. |
DEXA |
2003 |
DBLP DOI BibTeX RDF |
|
9 | Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum, Maas Zeeman |
Enforcing Security Policies for Distributed Objects Applications. |
Security Protocols Workshop |
2003 |
DBLP DOI BibTeX RDF |
|