|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
91 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings, pp. 143-144, 2011, ACM, 978-1-4503-0688-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
90 | Chiu-Man Yu, Kam-Wing Ng |
A Heterogeneous Authorization Policy Management Mechanism for Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 381-386, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Xuanwu Zhou, Yang Su, Ping Wei 0005 |
Further Study on Proxy Authorization and Its Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (2) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 2, pp. 1701-1718, 2009, Springer, 978-3-642-02468-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Proxy authorization, multi-party authorization, multicast communi-cation, forward security, BAN logic |
78 | Jinwei Hu, Yan Zhang 0003, Ruixuan Li 0001, Zhengding Lu |
A logic for authorization provenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 238-249, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
authorization provenance, authorization, logic, provenance, authorization logic |
77 | Pierangela Samarati, Paul Ammann, Sushil Jajodia |
Propagation of Authorizations in Distributed Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 136-147, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
76 | Fausto Rabitti, Elisa Bertino, Won Kim 0001, Darrell Woelk |
A Model of Authorization for Next-Generation Database Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 16(1), pp. 88-131, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
semantic database, object-oriented database |
74 | Shujing Wang 0001, Yan Zhang 0003 |
A Formalization of Distributed Authorization with Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 303-315, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming |
74 | Thomas Ziebermayr, Stefan Probst |
Web Service Authorization Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 614-621, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Web Service, Framework, Authorization, Service |
74 | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 414-426, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Secure commercial applications, Access Control, Authorization, Distributed system security |
73 | Apurva Mohan, Douglas M. Blough |
An attribute-based authorization policy framework with dynamic conflict resolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 37-50, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
attribute-based authorization, conflict resolution, authorization policy |
69 | Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan 0001 |
Fine Grained Authorization Through Predicated Grants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, The Marmara Hotel, Istanbul, Turkey, April 15-20, 2007, pp. 1174-1183, 2007, IEEE Computer Society, 1-4244-0802-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: International Collaboration and Cross-Fertilization, 7th International Conference on Asian Digital Libraries, ICADL 2004, Shanghai, China, December 13-17, 2004, Proceedings, pp. 643, 2004, Springer, 3-540-24030-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Ramaswamy Chandramouli |
A Framework for Multiple Authorization Types in a Healthcare Application System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 137-148, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Jaehoon Kim, Kangsoo Jung, Seog Park |
An Introduction to Authorization Conflict Problem in RDF Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, KES 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part II, pp. 583-592, 2008, Springer, 978-3-540-85564-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
knowledge security, RDF data, authorization conflict, Semantic Web, access control |
67 | HyunGon Kim, ByeongKyun Oh |
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 9th IFIP TC-6 TC-11 International Conference, CMS 2005, Salzburg, Austria, September 19-21, 2005, Proceedings, pp. 250-260, 2005, Springer, 3-540-28791-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
prepaid, authorization, Mobile IPv6, Mobile node |
67 | Fabio Casati, Silvana Castano, Maria Grazia Fugini |
Managing Workflow Authorization Constraints through Active Database Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 3(3), pp. 319-338, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
workflows, authorizations, roles, active databases, triggers, authorization constraints |
67 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 18th International Conference, SAFECOMP'99, Toulouse, France, September, 1999, Proceedings, pp. 375-384, 1999, Springer, 3-540-66488-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
67 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 44-64, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
62 | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe |
Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings, pp. 267-281, 2006, Springer, 3-540-36796-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Weide Zhang, David Del Vecchio, Glenn S. Wasson, Marty Humphrey |
Integrating Legacy Authorization Systems into the Grid: A Case Study Leveraging AzMan and ADAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (1) ![In: Computational Science - ICCS 2006, 6th International Conference, Reading, UK, May 28-31, 2006, Proceedings, Part I, pp. 681-688, 2006, Springer, 3-540-34379-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Changqin Huang, Guanghua Song, Yao Zheng, Deren Chen |
An Authorization Architecture Oriented to Engineering and Scientific Computation in Grid Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004, Proceedings, pp. 461-472, 2004, Springer, 3-540-23003-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(4), pp. 566-588, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
60 | Hristo Koshutanski, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(4), pp. 291-314, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Trust negotiation, Grid security, Behavioral control |
60 | Guoheng Wei, Xueguang Zhou, Huanguo Zhang |
A Trusted Computing Model Based on Code Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 495-499, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
code authorization, virtual security units, informaion information, trusted computing |
60 | Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu |
Authorization recycling in RBAC systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 63-72, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization recycling, access control, RBAC, SAAM |
60 | Steffen Bartsch, Karsten Sohr, Carsten Bormann |
Supporting Agile Development of Authorization Rules for SME Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 461-471, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Agile Security Engineering, SME Applications, End-User Development, DSL, Authorization Policy |
60 | Shujing Wang 0001, Yan Zhang 0003 |
Handling distributed authorization with delegation through answer set programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(1), pp. 27-46, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access control, Knowledge representation, Authorization, Trust management, Delegation, Nonmonotonic reasoning, Answer set programming |
60 | Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
A type discipline for authorization policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Program. Lang. Syst. ![In: ACM Trans. Program. Lang. Syst. 29(5), pp. 25, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authorization, type systems, process calculus, spi calculus |
60 | Wei Zhou 0006, Christoph Meinel |
Function-Based Authorization Constraints Specification and Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 119-124, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access control, authorization constraints, constraints specification, constraints enforcement |
60 | Jiangnan Qiu, Jiang Tian, Yanzhang Wang |
A Research on the Authorization Model Based on Organizational Management in E-Gov. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONFENIS (1) ![In: Research and Practical Issues of Enterprise Information Systems II, Volume 1, IFIP TC 8 WG 8.9 International Conference on Research and Practical Issues of Enterprise Information Systems (CONFENIS 2007), October 14-16, 2007, Beijing, China, pp. 415-424, 2007, Springer, 978-0-387-75901-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Organization management, Inter-organizational systems, Authorization model |
60 | Jason Crampton, Wing Leung, Konstantin Beznosov |
The secondary and approximate authorization model and its application to Bell-LaPadula policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings, pp. 111-120, 2006, ACM, 1-59593-353-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bell-LaPadula model, authorization recycling, access control, SAAM |
60 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens |
Authorization Service for Web Services and its Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: Proceedings of the IEEE International Conference on Web Services (ICWS'04), June 6-9, 2004, San Diego, California, USA, pp. 774-777, 2004, IEEE Computer Society, 0-7695-2167-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security, Web Services, Access Control, Authorization |
60 | Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AWCC ![In: Content Computing, Advanced Workshop on Content Computing, AWCC 2004, ZhenJiang, JiangSu, China, November 15-17, 2004, Proceedings, pp. 182-193, 2004, Springer, 3-540-23898-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Grid organization tools, Authorization service, Virtual organization |
60 | Feng Li, Junzhou Luo, Yinying Yang, Ye Zhu, Teng Ma |
A Dynamic Grid Authorization Mechanism with Result Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 867-870, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Security Contract, Dynamic Authorization, Trust, Grid, Negotiation |
60 | Chun Ruan, Vijay Varadharajan |
A formal graph based framework for supporting authorization delegations and conflict resolutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 1(4), pp. 211-222, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Conflict resolution |
57 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 1(3), pp. 242-255, 1976. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
data dependent authorization, protection in databases, revocation of authorization, security, privacy, access control, authorization, database systems |
56 | Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn |
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 257-266, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Hannah K. Lee |
Unraveling decentralized authorization for multi-domain collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Proceedings of the 3rd International Conference on Collaborative Computing: Networking, Applications and Worksharing, White Plains, New York, USA, November 12-15, 2007, pp. 33-40, 2007, IEEE Computer Society / ICST, 1-4244-1317-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Jie Song 0001, Daling Wang, Yubin Bao, Ge Yu 0001, Wen Qi |
Mining Purpose-Based Authorization Strategies in Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM Workshops ![In: Advances in Web and Network Technologies, and Information Management, APWeb/WAIM 2007 International Workshops: DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Huang Shan, China, June 16-18, 2007, Proceedings, pp. 86-98, 2007, Springer, 978-3-540-72908-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Weider D. Yu, Ellora Nayak |
ARSL: A Language for Authorization Rule Specification in Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 26-29 June 2006, Cagliari, Sardinia, Italy, pp. 54-62, 2006, IEEE Computer Society, 0-7695-2588-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Vinod Ganapathy, Trent Jaeger, Somesh Jha |
Automatic placement of authorization hooks in the linux security modules framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 330-339, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
LSM, hook placement, static analysis, SELinux |
55 | Hai Jin 0001, Weizhong Qiang, Xuanhua Shi, Deqing Zou |
A Novel Authorization Mechanism for Service-Oriented Virtual Organization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 382-391, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Shujing Wang 0001, Yan Zhang 0003 |
Specifying Distributed Authorization with Delegation Using Logic Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 761-767, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Markus Lorch, Dennis G. Kafura, Ian Fisk, Kate Keahey, Gabriele Carcassi, Timothy Freeman 0001, Timur Peremutov, Abhishek Singh Rana |
Authorization and account management in the Open Science Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 6th IEEE/ACM International Conference on Grid Computing (GRID 2005), November 13-14, 2005, Seattle, Washington, USA, Proceedings, pp. 17-24, 2005, IEEE Computer Society, 0-7803-9493-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li 0001, Ping Ren |
XML Based X.509 Authorization in CERNET Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 325-332, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Chun Ruan, Vijay Varadharajan |
Decentralized Temporal Authorization Administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 14th International Conference, DEXA 2003, Prague, Czech Republic, September 1-5, 2003, Proceedings, pp. 917-926, 2003, Springer, 3-540-40806-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Fausto Rabitti, Darrell Woelk, Won Kim 0001 |
A Model of Authorization for Object-Oriented and Semantic Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'88, Proceedings of the International Conference on Extending Database Technology, Venice, Italy, March 14-18, 1988, pp. 231-250, 1988, Springer, 3-540-19074-0. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
54 | Lujo Bauer, Limin Jia 0001, Michael K. Reiter, David Swasey |
xDomain: cross-border proofs of access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 43-52, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
logic-based access control, trust management, distributed authorization |
54 | Andrew Fritz, Jehan-François Pâris |
Maille authorization - a distributed, redundant authorization protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative secondary authorization recycling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPDC ![In: Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 25-29 June 2007, Monterey, California, USA, pp. 65-74, 2007, ACM, 978-1-59593-673-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CSAR, authorization recycling, cooperation, SAAM |
53 | Justin Burruss, Thomas W. Fredian, Mary R. Thompson |
ROAM: An Authorization Manager for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Grid Comput. ![In: J. Grid Comput. 4(4), pp. 413-423, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
FusionGrid, Grid computing, authorization, Globus, Grid security |
53 | Chun Ruan, Vijay Varadharajan |
Implementing Authorization Delegations Using Graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 17th International Conference, DEXA 2006, Kraków, Poland, September 4-8, 2006, Proceedings, pp. 904-913, 2006, Springer, 3-540-37871-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization delegation, access control, weighted graph |
53 | Bechara al Bouna, Richard Chbeir |
Multimedia-based authorization and access control policy specification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 61-68, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization and access control, security, user model, role based access control, multimedia content |
53 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Risk assessment in distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005, pp. 33-42, 2005, ACM, 1-59593-231-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
53 | Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza |
Supporting the legal identities of contracting agents with an agent authorization platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 721-728, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract |
53 | Yun Bai 0001 |
A New Approach for Conflict Resolution of Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 290-296, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
prioritized logic programming, formal specification, conflict resolution, authorization rule |
53 | Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari |
A Content-Based Authorization Model for Digital Libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 14(2), pp. 296-315, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, digital libraries, authorization |
53 | Zoltán Miklós 0001 |
A Decentralized Authorization Mechanism for E-Business Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 13th International Workshop on Database and Expert Systems Applications (DEXA 2002), 2-6 September 2002, Aix-en-Provence, France, pp. 446-450, 2002, IEEE Computer Society, 0-7695-1668-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
authorization, trust management, assurance |
53 | Horst F. Wedde, Mario Lischka |
Modular authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 97-105, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
modularity, authorization, role-based access control, conflicts, composability, violations |
53 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
A Flexible Authorization Mechanism for Relational Data Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 17(2), pp. 101-140, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control mechanism, group management support, relational database, authorization, access control policy, data management system |
53 | Yun Bai 0001, Vijay Varadharajan |
Authorization in Object Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 270-280, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
security, formal specification, object oriented databases, inheritance, authorization policy |
53 | Vincent Nicomette, Yves Deswarte |
An Authorization Scheme For Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 21-30, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
multilevel security policy, authorization, delegation, object model, protection, access rights |
53 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta |
A Model of Authorization for Object-Oriented Databases based on Object Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DOOD ![In: Deductive and Object-Oriented Databases, Fourth International Conference, DOOD'95, Singapore, December 4-7, 1995, Proceedings, pp. 503-520, 1995, Springer, 3-540-60608-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Discretionary Security, View Mechanism, View Hierarchy, Access View, Implication Rules, Access Control, Authorization System |
53 | Marc Lacoste, Tahar Jarboui, Ruan He |
A component-based policy-neutral architecture for kernel-level access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 64(1-2), pp. 121-146, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Policy-neutral authorization, Access control, Operating systems, Authorization, Flexibility, Security kernels, Component-based architectures |
52 | Kumar Avijit, Anupam Datta, Robert Harper 0001 |
Distributed programming with distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLDI ![In: Proceedings of TLDI 2010: 2010 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Madrid, Spain, January 23, 2010, pp. 27-38, 2010, ACM, 978-1-60558-891-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
phase distinction, proof-carrying authorization, distributed programming, logical frameworks, authorization logic |
52 | Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill |
Context-sensitive authorization in interaction patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobility Conference ![In: Proceedings of the 6th International Conference on Mobile Technology, Applications, and Systems, Mobility Conference 2009, Nice, France, September 2-4, 2009, 2009, ACM, 978-1-60558-536-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
context-sensitive authorization, dynamic authorization, access control, context-awareness |
52 | Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung |
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 3(2), pp. 156-166, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture-Data Access and Integration (OGSA-DAI), Grid database services, fine-grain authorization, Community Authorization Service (CAS), role-based access control (RBAC) |
52 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
An Authorization Model for Federated Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings, pp. 99-117, 1996, Springer, 3-540-61770-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
authorization administration, authorization autonomy, access control, Federated systems |
50 | Richard Au, Mark Looi, Paul Ashley |
Cross-domain one-shot authorization using smart cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000., pp. 220-227, 2000, ACM, 1-58113-203-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
authorization scheme, authorization server, one-shot authorization token, access control, smart card |
48 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora |
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 222-237, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Hui Xie, Bin Zhang 0015, Dianyou Hu |
A Role-Based Dynamic Authorization Model and Its Implementation in PMI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 661-664, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Charles C. Zhang, Marianne Winslett |
Distributed Authorization by Multiparty Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 282-299, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Georg Treu, Florian Fuchs 0001, Christiane Dargatz |
Implicit Authorization for Accessing Location Data in a Social Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 263-272, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Valerio Venturi, Morris Riedel, A. Shiraz Memon, M. Shahbaz Memon, Federico Stagni, Bernd Schuller, Daniel Mallmann, Bastian Tweddell, Alberto Gianoli, Sven van den Berghe, David F. Snelling, Achim Streit |
Using SAML-Based VOMS for Authorization within Web Services-Based UNICORE Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2007 Workshops: Parallel Processing, HPPC 2007, UNICORE Summit 2007, and VHPC 2007, Rennes, France, August 28-31, 2007, Revised Selected Papers, pp. 112-120, 2007, Springer, 978-3-540-78472-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Huaji Shi, Xibin Zhao |
Implementation Issues of Authorization Mechanisms in Grid Computing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSE ![In: The 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), May 27-28, 2006, Shanghai, China, in conjunction with ICSE 2006, pp. 76-80, 2006, IEEE Computer Society, 0-7695-2726-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Young-Chul Shim |
Distributed Processing of Context-Aware Authorization in Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part II, pp. 125-134, 2006, Springer, 3-540-34072-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
A Type Discipline for Authorization Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESOP ![In: Programming Languages and Systems, 14th European Symposium on Programming, ESOP 2005, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2005, Edinburgh, UK, April 4-8, 2005, Proceedings, pp. 141-156, 2005, Springer, 3-540-25435-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Sarath Indrakanti, Vijay Varadharajan |
An Authorization Architecture for Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 222-236, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang |
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science (3) ![In: Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part III, pp. 229-236, 2005, Springer, 3-540-26044-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Authorization Translation for XML Document Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
World Wide Web ![In: World Wide Web 7(1), pp. 111-138, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML access control models, authorizations, database security, XML documents, document transformation |
48 | Chang-Joo Moon, Hoh Peter In |
Inconsistency Detection of Authorization Policies in Distributed Component Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 39-50, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: 3rd International Conference on Web Information Systems Engineering, WISE 2002, Singapore, December 12-14, 2002, Proceedings, pp. 301-312, 2002, IEEE Computer Society, 0-7695-1766-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Dongdong Li, Songlin Hu, Shuo Bai |
A Uniform Model for Authorization and Access Control in Enterprise Information Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCIS ![In: Engineering and Deployment of Cooperative Information Systems, First International Conference, EDCIS 2002, Beijing, China, September 17-20, 2002, Proceedings, pp. 180-192, 2002, Springer, 3-540-44222-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Lavanya Ramakrishnan, Helen Rehn, Jay Alameda, Rachana Ananthakrishnan, Madhusudhan Govindaraju, Aleksander Slominski, Kay Connelly, Von Welch, Dennis Gannon, Randall Bramley, Shawn D. Hampton |
An Authorization Framework for a Grid Based Component Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: Grid Computing - GRID 2002, Third International Workshop, Baltimore, MD, USA, November 18, 2002, Proceedings, pp. 169-180, 2002, Springer, 3-540-00133-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Rolf Oppliger |
Authorization Methods for E-Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SRDS ![In: The Eighteenth Symposium on Reliable Distributed Systems, SRDS 1999, Lausanne, Switzerland, October 19-22, 1999, Proceedings, pp. 366-371, 1999, IEEE Computer Society, 0-7695-0290-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
48 | Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
An Authorization Model and Its Formal Semantics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 127-142, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Haiyang Sun, Jian Yang 0001, Xin Wang, Yanchun Zhang |
A Verification Mechanism for Secured Message Processing in Business Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb/WAIM ![In: Advances in Data and Web Management, Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings, pp. 480-491, 2009, Springer, 978-3-642-00671-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Role Authorization, Reliability Verification, Secured Message Processing, Hierarchical Colored Petri Net |
47 | Felix Wortmann, Robert Winter 0001 |
Vorgehensmodelle für die rollenbasierte Autorisierung in heterogenen Systemlandschaften. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirtschaftsinf. ![In: Wirtschaftsinf. 49(6), pp. 439-447, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access Control, Architecture, Integration, Authorization, Roles |
47 | Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis G. Kafura, Sumit Shah |
First experiences using XACML for access control in distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XML Security ![In: Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, pp. 25-37, 2003, ACM, 1-58113-777-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control decision, access control enforcement, authorization, policy language, distributed system security, policy management |
47 | Alexander Binun, Ehud Gudes |
Policy and State Based Secure Wrapper and Its Application to Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LA-WEB ![In: 1st Latin American Web Congress (LA-WEB 2003), Empowering Our Web, 10-12 November 2003, Sanitago, Chile, pp. 14-26, 2003, IEEE Computer Society, 0-7695-2058-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
state-based fine-grained authorization, Security, mobile agents |
46 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Authorization in trust management: Features and foundations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 40(3), pp. 9:1-9:48, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
trust management systems, Distributed authorization |
46 | Moritz Y. Becker, Sebastian Nanz |
The Role of Abduction in Declarative Authorization Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, 10th International Symposium, PADL 2008, San Francisco, CA, USA, January 7-8, 2008., pp. 84-99, 2008, Springer, 978-3-540-77441-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
authorization language, access control, Datalog, abduction |
46 | Henry DeYoung, Deepak Garg 0001, Frank Pfenning |
An Authorization Logic With Explicit Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 21st IEEE Computer Security Foundations Symposium, CSF 2008, Pittsburgh, Pennsylvania, USA, 23-25 June 2008, pp. 133-145, 2008, IEEE Computer Society, 978-0-7695-3182-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Explicit Time, Hybrid Logic, Authorization Logic |
46 | Weider D. Yu, Ellora Nayak |
An Algorithmic Approach to Authorization Rules Conflict Resolution in Software Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 32-35, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
access control, authorization, security policy, conflict resolution, software security |
46 | Jianwei Yue, Hongchun Cai, Luyao Chen, Wei Zhuang |
Study on Authorization Management Model of One-stop Office System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCTA ![In: Computer And Computing Technologies In Agriculture, Volume II, First IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture (CCTA 2007), Wuyishan, China, August 18-20, 2007, pp. 925-931, 2007, Springer, 978-0-387-77252-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
one-stop office system, RBAC, authorization management |
46 | Hannah K. Lee, Heiko Luedemann |
lightweight decentralized authorization model for inter-domain collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 4th ACM Workshop On Secure Web Services, SWS 2007, Fairfax, VA, USA, November 2, 2007, pp. 83-89, 2007, ACM, 978-1-59593-892-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
dRBAC, inter-domain collaborations, e-government, XACML, authorization policy |
46 | Chun Ruan, Vijay Varadharajan |
Integration of Graph Based Authorization Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMIS ![In: Foundations of Intelligent Systems, 16th International Symposium, ISMIS 2006, Bari, Italy, September 27-29, 2006, Proceedings, pp. 359-368, 2006, Springer, 3-540-45764-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authorization conflict, access control, weighted graph |
46 | Qi Xie, Dayou Liu, Haibo Yu 0002 |
Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RSKT ![In: Rough Sets and Knowledge Technology, First International Conference, RSKT 2006, Chongqing, China, July 24-26, 2006, Proceedings, pp. 604-609, 2006, Springer, 3-540-36297-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RB-RBAC, attribute expression, seniority level, Description Logic, authorization rule |
46 | Song Han 0004, Geoff Skinner, Vidyasagar M. Potdar, Elizabeth Chang 0001 |
A framework of authentication and authorization for e-health services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SWS ![In: Proceedings of the 3rd ACM Workshop On Secure Web Services, SWS 2006, Alexandria, VA, USA, November 3, 2006, pp. 105-106, 2006, ACM, 1-59593-546-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, authentication, authorization, e-health, personal data |
46 | Marianne Winslett, Charles C. Zhang, Piero A. Bonatti |
PeerAccess: a logic for distributed authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 168-179, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
logical signature, proof hints, release policies, P2P systems, distributed authorization, sticky policies |
Displaying result #1 - #100 of 2781 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|