The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase access control (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1977 (15) 1978-1981 (16) 1982-1984 (16) 1985-1986 (17) 1987-1988 (27) 1989-1990 (40) 1991 (18) 1992 (32) 1993 (29) 1994 (39) 1995 (57) 1996 (67) 1997 (89) 1998 (78) 1999 (122) 2000 (175) 2001 (213) 2002 (283) 2003 (378) 2004 (513) 2005 (734) 2006 (825) 2007 (881) 2008 (915) 2009 (708) 2010 (475) 2011 (487) 2012 (436) 2013 (433) 2014 (405) 2015 (443) 2016 (463) 2017 (504) 2018 (485) 2019 (248)
Publication types (Num. hits)
article(2899) book(8) incollection(127) inproceedings(7487) phdthesis(119) proceedings(26)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7557 occurrences of 2177 keywords

Results
Found 10666 publication records. Showing 10666 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
218Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
84Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer Configuring role-based access control to enforce mandatory and discretionary access control policies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF lattice-based access control, role-based access control, mandatory access control, discretionary access control
77Shermann S.-M. Chan, Qing Li 0001, José A. Pino VideoAcM: a transitive and temporal access control mechanism for collaborative video database production applications. Search on Bibsonomy Multimedia Tools Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Transitive and temporal access control model, Client-data access control, Data-data access control, Video database, Authorization rule
71David F. Ferraiolo, Vijay Atluri A meta model for access control: why is it needed and is it even possible to achieve? Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71Nan Zhang 0003, Mark Ryan 0001, Dimitar P. Guelev Evaluating Access Control Policies Through Model Checking. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control policy language, model checking, verification, access control, access control model, access control policy
69I-Lung Kao, Randy Chow An Extended Capability Architecture To Enforce Dynamic Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers
64Chooi-Tian Lee, Jack W. Harris Designing a Virtual Access Control Configuration Protocol for Implementation over ISDN and Shared-Media Networks. Search on Bibsonomy LCN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF virtual access control configuration protocol, shared-media networks, corporate environment, trade-secret information protection, secure network, secure communication environment, encryption mechanisms, user password authentication, user-interface based access control, network interface based access control, authentication security mechanisms, virtual dedicated-media network system, dynamic security access authorization, token-based access security control, dedicated-media communication, network session-layer protocol, operating systems, WAN, LAN, application programs, ISDN, ISDN, security program
62Trent Jaeger, Jonathon Tidswell Practical safety in flexible access control models. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
61Stéphane Onno A Federated Physical and Logical Access Control Enforcement Model. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control federation, logical access control, physical access control, Bell-lapadula
58Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
57Trent Jaeger, Atul Prakash, Jochen Liedtke, Nayeem Islam Flexible Control of Downloaded Executable Content. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF autorization machanisms, authentication, role-based access control, collaborative systems, access control models
56Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada XML access control using static analysis. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF value-based access control, view schema, XML, Access control, static analysis, query optimization, XPath, XQuery, schema, automaton
55Ty van den Akker, Quinn Snell, Mark J. Clement The YGuard access control model: set-based access control. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF XSet, XWeb, YGuard, XML, XML, WEB, set, access control model, access control list
55Chi-Chun Pan, Prasenjit Mitra, Peng Liu 0005 Semantic access control for information interoperation. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, interoperation, mediator, semantic heterogeneity
55Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets
55Kevin Kane, James C. Browne On classifying access control implementations for distributed systems. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF classification, distributed systems, access control, analysis, taxonomies
54Sudip Chakraborty, Indrajit Ray TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, trust, RBAC
53Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram Access control in practice: pain points. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pain points, access control
53Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough, Bhavani M. Thuraisingham ROWLBAC: representing role based access control in OWL. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ontology, semantic web, RBAC, OWL, access control model
52Gang Huang 0001, Lianshan Sun An Access Control Framework for Reflective Middleware. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, J2EE, reflective middleware
52Rafae Bhatti, Elisa Bertino, Arif Ghafoor A Trust-Based Context-Aware Access Control Model for Web-Services. Search on Bibsonomy Distributed and Parallel Databases The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web services, XML, Role-Based Access Control, Trust Management
51Mahesh V. Tripunitara, Ninghui Li Comparing the expressive power of access control models. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF augmented typed access matrix, state-matching reduction, typed access matrix, role-based access control, reduction, expressive power, discretionary access control
51Axel Kern, Andreas Schaad, Jonathan D. Moffett An administration concept for the enterprise role-based access control model. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SAM Jupiter, administrative role-based access control (ARBAC), automated identity management, enterprise role-based access control (ERBAC), enterprise roles, security provisioning, role-based access control (RBAC), scopes, security administration
50Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca A logical framework for reasoning about access control models. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Access control framework, access control models analysis, logic programming, Datalog
50Steve Barker The next 700 access control models or a unifying meta-model? Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control models, access control policies
50Oscar García Morchon, Klaus Wehrle Modular context-aware access control for medical sensor networks. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, access control, medical sensor network
50Barbara Carminati, Elena Ferrari AC-XML documents: improving the performance of a web access control module. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XML, access control, web
49Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea A user study of policy creation in a flexible access-control system. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF discresionary access control, policy creation, access control, smartphones, distributed access control
49Lianshan Sun, Gang Huang 0001, Yanchun Sun, Hui Song, Hong Mei An Approach for Generation of J2EE Access Control Configurations from Requirements Specification. Search on Bibsonomy QSIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Access Control Configurations, Security, Role-Based Access Control, Model Transformation, J2EE
49Axel Mönkeberg, René Rakete Three for one: role-based access-control management in rapidly changing heterogeneous environments. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Ehab Al-Shaer Automated management of network access control from design to enforcement. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
48Xiang Cao, Lee Iverson Intentional access management: making access control usable for end-users. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intentional access management, usability, access control, WebDAV
48Axel Kern, Claudia Walhorn Rule support for role-based access control. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration
47Elisa Bertino, Jianping Fan 0001, Elena Ferrari, Mohand-Said Hacid, Ahmed K. Elmagarmid, Xingquan Zhu A hierarchical access control model for video database systems. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Video database models, indexing schemes, access control
47Xiaoning Ma, Zhiyong Feng, Chao Xu 0003, Jiafang Wang A Trust-Based Access Control with Feedback. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, trust, feedback
46Mina Jeong, Jung-Ja Kim, Yonggwan Won A Flexible Database Security System Using Multiple Access Control Policies. Search on Bibsonomy DEXA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie Security Patterns for Physical Access Control Systems. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF physical access control, security, access control, software patterns, intelligent buildings
46David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn Composing and combining policies under the policy machine. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, role based access control, separation of duty, multi-level security
46Jason Crampton Applying hierarchical and role-based access control to XML documents. Search on Bibsonomy SWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML, role-based access control, encryption, hierarchical access control
45Gunnar Stevens, Volker Wulf Computer-supported access control. Search on Bibsonomy ACM Trans. Comput.-Hum. Interact. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF computer supported cooperative work field, Access control, ethnomethodology, coordination mechanism, study, critical design
45Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert A meta model for authorisations in application security systems and their integration into RBAC administration. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF automated identity management, enterprise role-based access control (ERBAC), enterprise roles, sam jupiter, security provisioning, role-based access control (RBAC), application security, security administration
44Naizhen Qi, Michiharu Kudo, Jussi Myllymaki, Hamid Pirahesh A function-based access control model for XML databases. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule functions, access control, expressiveness, XML database, fine-grained access control
44Jaehong Park, Ravi S. Sandhu Towards usage control models: beyond traditional access control. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Jung-Hwa Chae, Nematollaah Shiri Description Logic Framework for Access Control and Security in Object-Oriented Systems. Search on Bibsonomy RSFDGrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Role-based access control, description logic, object-oriented system, access control List
44Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards Policy management using access control spaces. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
43Diana K. Smetters, Nathan Good How users use access control. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF usability, access control, file sharing
43Leon Pan, Chang N. Zhang A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. Search on Bibsonomy TOMCCAP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multilayer access control, secure object, secure permission, secure user, security criterion
43Rafae Bhatti, Elisa Bertino, Arif Ghafoor A Trust-based Context-Aware Access Control Model for Web-Services. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web-Services, XML, Role-Based Access Control, Trust Management
43Achim D. Brucker, Helmut Petritsch Extending access control models with break-glass. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF break-glass, model-driven secuirty, access-control, disaster management
43Haio Roeckle, Gerhard Schimpf, Rupert Weidinger Process-oriented approach for role-finding to implement role-based security administration in a large industrial organization. Search on Bibsonomy ACM Workshop on Role-Based Access Control The full citation details ... 2000 DBLP  DOI  BibTeX  RDF enterprise process modeling, security data models, single point of administration and control, access control, authorizations, role based access control, business processes, heterogeneous systems, security models, security management, security administration
43Corinne S. Irwin, Dennis C. Taylor Identity, credential, and access management at NASA, from Zachman to attributes. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS)
43Steve Barker, Marek J. Sergot, Duminda Wijesekera Status-Based Access Control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed security, status-based access control, logic, algebras
42José Bringel Filho, Hervé Martin QACBAC: an owner-centric QoC-aware context-based access control model for pervasive environments. Search on Bibsonomy SPRINGL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed systems, access control, context-aware, quality of context, pervasive computing environment
42Peter Lamb, Robert Power, Gavin Walker, Michael Compton Role-based access control for data service integration. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, data integration
42Makoto Murata, Akihiko Tozawa, Michiharu Kudo, Satoshi Hada XML access control using static analysis. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF XML, access control, static analysis, query optimization, XPath, XQuery, schema, automaton
42Yogesh Karandikar, Xukai Zou, Yuan-Shun Dai Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Access Control, Dynamic Conferencing, Access Control, Key Management, Secure Group Communication
42Konstantin Knorr Dynamic Access Control through Petri Net Workflows. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Petri net workflows, access control matrix, privileges, data misuse, Petri nets, information systems, information systems, authorisation, workflow management software, protection mechanism, dynamic access control
42Lillian Røstad, Øystein Nytrø Personalized access control for a personally controlled health record. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control
42Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Context-Awareness, Integrity, Confidentiality, Mandatory Access Control
42Tae-Hum Lim, Sang-Uk Shin Intelligent Access Control Mechanism for Ubiquitous Applications. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ubiquitous application, neural network algorithm, access control, context aware, role based
42Chung-Hwan Lim, Seog Park, Sang Hyuk Son Access control of XML documents considering update operations. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, XML document, XML update
42Yun Bai 0001, Vijay Varadharajan A High Level Language for Conventional Access Control Models. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Policy Transformations, Formal Language, Access Control Model, Authorization Policies
42Gregory Leighton, Denilson Barbosa Access control policy translation and verification within heterogeneous data federations. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF access control, relational databases, xml, xacml
42Barbara Carminati, Elena Ferrari, Kian-Lee Tan Enforcing access control over data streams. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, access control, data stream
42Jaehong Park, Ravi S. Sandhu The UCONABC usage control model. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, access control, trust, digital rights management, usage control
41Kazuya Odagiri, Nao Tanoue, Rihito Yaegashi, Masaharu Tadauchi, Naohiro Ishii New Access Control on DACS Scheme. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access control DACS Scheme Packet filtering
41Haibo Shen A Semantic-Aware Attribute-Based Access Control Model for Web Services. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ontology, Web Services, XACML, Attribute-Based Access Control, Semantic Web Technologies
41Shu Chen, Yu Zhang, Wade Trappe Inverting sensor networks and actuating the environment for spatio-temporal access control. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, localization
41Michael M. Swift, Anne Hopkins, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Shannon Chan, Mario Goertzel, Gregory Jensenworth Improving the granularity of access control for Windows 2000. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Microsoft Windows 2000, active directory, Microsoft Windows (OS), Windows NT, Access control lists
40Fei Zhu, Qiang Lv ACEAC: A Novel Access Control Model for Cooperative Editing with Workflow. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cooperative editing, access control, CSCW, workflow
40Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas Flexible team-based access control using contexts. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF active security, access control, contexts, teams
40Xuhui Ao, Naftaly H. Minsky On the role of roles: from role-based to role-sensitive access control. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction
40Steve Barker Personalizing access control by generalizing access control. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrity, privacy policies, access control models
40Hung Le Xuan, Nguyen Ngoc Diep, Yonil Zhung, Sungyoung Lee, Young-Koo Lee A Flexible and Scalable Access Control for Ubiquitous Computing Environments. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Vineela Muppavarapu, Soon Myoung Chung Fine-Grain Access Control Using Shibboleth for the Storage Resource Broker. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Storage Resource Broker (SRB), Data Grid, virtual organization (VO), Shibboleth, fine-grain access control
40Jae-Gil Lee 0001, Kyu-Young Whang, Wook-Shin Han, Il-Yeol Song The dynamic predicate: integrating access control with query processing in XML databases. Search on Bibsonomy VLDB J. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy/security, Access control, Query processing, XML databases
40Angelos D. Keromytis, Jonathan M. Smith Requirements for scalable access control and security management architectures. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed systems, access control, authorization, security policy, trust management, delegation, credentials, Large-scale systems
40Stijn Goedertier, Christophe Mues, Jan Vanthienen Specifying Process-Aware Access Control Rules in SBVR. Search on Bibsonomy RuleML The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, RBAC, BPM, defeasible logic, SBVR
40Alapan Arnab, Andrew Hutchison Persistent access control: a formal model for DRM. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, REL, rights expression languages
40Hristo Koshutanski, Fabio Massacci An access control framework for business processes for web services. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF controlled disclosure, interactive access control, web services, e-business, security management, distributed systems security
40Refik Molva, Yves Roudier A Distributed Access Control Model for Java. Search on Bibsonomy ESORICS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Java, distribution, capabilities, access control model, SPKI
40Alex Roichman, Ehud Gudes Fine-grained access control to web databases. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF database vulnerability, parameterized view, rolling key, web database security, access control, session key
40Anthony Harrington, Christian Damsgaard Jensen Cryptographic access control in a distributed file system. Search on Bibsonomy SACMAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, cryptography, network file systems
40Mikhail J. Atallah, Marina Blanton, Keith B. Frikken Efficient techniques for realizing geo-spatial access control. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF geo-spatial access control, key assignment and derivation, key management
40Fengjun Li, Bo Luo, Peng Liu 0005, Dongwon Lee 0001, Prasenjit Mitra, Wang-Chien Lee, Chao-Hsien Chu In-broker Access Control: Towards Efficient End-to-End Performance of Information Brokerage Systems. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Ravi S. Sandhu, Xinwen Zhang Peer-to-peer access control architecture using trusted computing technology. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, trusted computing, security architecture, policy enforcement
39Vineela Muppavarapu, Soon Myoung Chung Semantic-Based Access Control for Grid Data Resources in Open Grid Services Architecture - Data Access and Integration (OGSA-DAI). Search on Bibsonomy ICTAI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Gregory Saunders, Michael Hitchens, Vijay Varadharajan Role-Based Access Control and the Access Control Matrix. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Lars E. Olson 0001, Carl A. Gunter, P. Madhusudan A formal framework for reflective database access control policies. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF formal safety verification, reflective database access control, transaction datalog, fine-grained access control
39Irini Fundulaki, Sebastian Maneth Formalizing XML access control for update operations. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XML updates, XML access control
39Bogdan Cautis Distributed access control: a privacy-conscious approach. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XML, privacy, access control, digital signatures, semi-structured data, relational data
39Mahesh V. Tripunitara, Bogdan Carbunar Efficient access enforcement in distributed role-based access control (RBAC) deployments. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, efficiency, bloom filter, enforcement
39Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia A Flexible and Distributed Architecture to Enforce Dynamic Access Control. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Sofia K. Tzelepi, Dimitrios K. Koukopoulos, George Pangalos A flexible content and context-based access control model for multimedia medical image database systems. Search on Bibsonomy MM&Sec The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
39Luc Bouganim, François Dang Ngoc, Philippe Pucheral Dynamic access-control policies on XML encrypted data. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ubiquitous data management, Access-control, smartcard, data confidentiality
39Duminda Wijesekera, Sushil Jajodia A propositional policy algebra for access control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF policy algebra, Access control, security policy, policy composition
39Bechara al Bouna, Richard Chbeir Multimedia-based authorization and access control policy specification. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorization and access control, security, user model, role based access control, multimedia content
39Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth Improving the granularity of access control in Windows NT. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Microsoft Windows NT, access control lists, Windows 2000
38Ajay Chander, John C. Mitchell, Drew Dean A State-Transition Model of Trust Management and Access Control. Search on Bibsonomy CSFW The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
38Ninghui Li, John C. Mitchell, William H. Winsborough Design of a Role-Based Trust-Management Framework. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates
Displaying result #1 - #100 of 10666 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license