Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
120 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Content-Based Authorizations for XML Documents. |
WISE |
2003 |
DBLP DOI BibTeX RDF |
Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation |
108 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Authorization Translation for XML Document Transformation. |
World Wide Web |
2004 |
DBLP DOI BibTeX RDF |
XML access control models, authorizations, database security, XML documents, document transformation |
97 | Vijayalakshmi Atluri, Qi Guo |
Unified Index for Mobile Object Data and Authorizations. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Sudsanguan Ngamsuriyaroj, Ali R. Hurson, Thomas F. Keefe |
Authorization Model for Summary Schemas Model. |
IDEAS |
2002 |
DBLP DOI BibTeX RDF |
|
72 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Towards Translating Authorizations for Transformed XML Documents. |
WISE |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Yun Bai 0001, Yan Zhang 0003, Vijay Varadharajan |
On the sequence of authorization policy transformations. |
Int. J. Inf. Sec. |
2005 |
DBLP DOI BibTeX RDF |
Policy transformations, Formal language, Default logic, Authorization policy |
60 | Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
An Authorization Model and Its Formal Semantics. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
60 | Sylvia B. Encheva, Sharil Tumin |
Positive and Negative Authorizations to Access Protected Web Resources. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
positive and negative authorization, Collaboration |
60 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian |
A Logical Language for Expressing Authorizations. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
secuity policy, Access control, authorization |
60 | Dulce Domingos, António Rito Silva, Pedro Veiga |
Authorization and Access Control in Adaptive Workflows. |
ESORICS |
2003 |
DBLP DOI BibTeX RDF |
adaptive authorizations, Access control, adaptive workflow |
60 | Pierangela Samarati, Michael K. Reiter, Sushil Jajodia |
An authorization model for a public key management service. |
ACM Trans. Inf. Syst. Secur. |
2001 |
DBLP DOI BibTeX RDF |
authorizations specification and enforcement, Access control, public key infrastructure |
60 | Elena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia |
Providing flexibility in information flow control for object oriented systems. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
information flow control flexibility, exception specification, waivers, invoke-waivers, reply-waivers, information transmission, security specifications, safe information flows, access control, object-oriented programming, authorizations, transaction, object oriented systems, interaction modes |
48 | Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
Assessing query privileges via safe and efficient permission composition. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
authorization composition, access control |
48 | Béatrice Finance, Saïda Medjdoub, Philippe Pucheral |
The case for access control on XML relationships. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
XML relationship, need-to-know and consent principles, data confidentiality, XML access control |
48 | Elisa Bertino, Claudio Bettini, Elena Ferrari, Pierangela Samarati |
An Access Control Model Supporting Periodicity Constraints and Temporal Reasoning. |
ACM Trans. Database Syst. |
1998 |
DBLP DOI BibTeX RDF |
periodic authorization, access control, temporal constraints, time management |
48 | Elisa Bertino, Claudio Bettini, Pierangela Samarati |
A Temporal Authorization Model. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
48 | Fausto Rabitti, Darrell Woelk, Won Kim 0001 |
A Model of Authorization for Object-Oriented and Semantic Databases. |
EDBT |
1988 |
DBLP DOI BibTeX RDF |
|
48 | Chun Ruan, Vijay Varadharajan |
Reasoning on Weighted Delegatable Authorizations. |
DEXA |
2009 |
DBLP DOI BibTeX RDF |
|
48 | Wolfgang Dobmeier, Günther Pernul |
Towards Privacy-Aware Handling of Authorizations. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Amir H. Chinaei, Huaxin Zhang |
Hybrid Authorizations and Conflict Resolution. |
Secure Data Management |
2006 |
DBLP DOI BibTeX RDF |
Access Control, Conflict Resolution, Combined Strategies |
48 | Along Lin |
A Knowledge-Based Approach to Internet Authorizations. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Amir H. Chinaei, Hamid R. Chinaei, Frank Wm. Tompa |
A Unified Conflict Resolution Algorithm. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
Hybrid Authorizations, Conflict Resolution, Access Control Models |
48 | Fabio Casati, Silvana Castano, Maria Grazia Fugini |
Managing Workflow Authorization Constraints through Active Database Technology. |
Inf. Syst. Frontiers |
2001 |
DBLP DOI BibTeX RDF |
workflows, authorizations, roles, active databases, triggers, authorization constraints |
48 | Marta Teresa Acevedo, David Fillingham, John Lucas Nicolettos |
Enterprise Security Applications of Partition Rule Based Access Control (PRBAC). |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
enterprise security applications, partition rule-based access control, electronically managed information, information misuse, economic well-being, military access control needs, business enterprise access control needs, PRBAC, information sensitivity, individual authorizations, user-defined security policy, data security labels, user public-key certificates, authorisation, information loss, global markets |
36 | Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu 0001, Keith Irwin |
Toward practical authorization-dependent user obligation systems. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
RBAC, policy, accountability, obligations, authorization systems |
36 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative Secondary Authorization Recycling. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Sylvia B. Encheva, Sharil Tumin |
Belnap's Logic in Sharing Protected Web Resources. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
positive and negative authorization, Collaboration |
36 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative secondary authorization recycling. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
CSAR, authorization recycling, cooperation, SAAM |
36 | Jason Crampton, Wing Leung, Konstantin Beznosov |
The secondary and approximate authorization model and its application to Bell-LaPadula policies. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
Bell-LaPadula model, authorization recycling, access control, SAAM |
36 | Vijayalakshmi Atluri, Soon Ae Chun |
An Authorization Model for Geospatial Data. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
security, access control, Geospatial databases |
36 | Indrakshi Ray, Marianna Muller |
Using Schemas to Simplify Access Control for XML Documents. |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Hai Yu, Ee-Peng Lim |
LTAM: A Location-Temporal Authorization Model. |
Secure Data Management |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
A formal graph based framework for supporting authorization delegations and conflict resolutions. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Conflict resolution |
36 | Sampo Sovio, N. Asokan, Kaisa Nyberg |
Defining Authorization Domains Using Virtual Devices. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
A Logic Model for Temporal Authorization Delegation with Negation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Antony Edwards, Trent Jaeger, Xiaolan Zhang 0001 |
Runtime verification of authorization hook placement for the linux security modules framework. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan |
Resolving Conflicts in Authorization Delegations. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Ramaswamy Chandramouli |
A Framework for Multiple Authorization Types in a Healthcare Application System. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
A Flexible Authorization Mechanism for Relational Data Management Systems. |
ACM Trans. Inf. Syst. |
1999 |
DBLP DOI BibTeX RDF |
access control mechanism, group management support, relational database, authorization, access control policy, data management system |
36 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
36 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
An Authorization Model for Federated Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
authorization administration, authorization autonomy, access control, Federated systems |
36 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
Supporting Multiple Access Control Policies in Database Systems. |
S&P |
1996 |
DBLP DOI BibTeX RDF |
|
36 | Hiroyuki Seki, Yasunori Ishihara, Minoru Ito |
Authorization Analysis of Queries in Object-Oriented Databases. |
DOOD |
1995 |
DBLP DOI BibTeX RDF |
|
36 | Francis B. Afinidad, Timothy E. Levin, Cynthia E. Irvine, Thuy D. Nguyen |
A Model for Temporal Interval Authorizations. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Adam J. Lee, Jodie P. Boyer, Chris Drexelius, Prasad Naldurg, Raquel L. Hill, Roy H. Campbell |
Supporting Dynamically Changing Authorizations in Pervasive Communication Systems. |
SPC |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Laurent Bussard, Refik Molva |
One-Time Capabilities for Authorizations without Trust. |
PerCom |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Ghita Kouadri Mostéfaoui, Patrick Brézillon |
A Generic Framework for Context-Based Distributed Authorizations. |
CONTEXT |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Chun Ruan, Vijay Varadharajan, Yan Zhang 0003 |
Logic-Based Reasoning on Delegatable Authorizations. |
ISMIS |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Translating Access Authorizations for Transformed XML Documents. |
DEXA |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Pierangela Samarati, Paul Ammann, Sushil Jajodia |
Propagation of Authorizations in Distributed Database Systems. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
36 | Néjib Moalla, Abdelaziz Bouras, Gilles Neubert, Yacine Ouzrout |
Toward Data Compliance in Vaccine Industry: Interoperability to Align Business and Information Systems. |
ICEIS (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
Vaccine industry, Marketing Authorizations, Interoperability, ERP, Compliance, health Information Systems |
36 | Michael A. Schneider, Edward W. Felten |
Efficient Commerce Protocols based on One-Time Pads. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
credit transactions, commerce protocol, face-to-face credit card authorizations, transaction outcome agreement, OTPMAC function, one-time identifier, cryptographic pseudo-random number generators, cryptographic MAC functions, security, cryptography, protocols, anonymity, transaction processing, codes, random number generation, business data processing, authorisation, message authentication, message authentication code, one-time pad |
24 | Ram Krishnan, Ravi S. Sandhu, Jianwei Niu 0001, William H. Winsborough |
A conceptual framework for Group-Centric secure information sharing. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
models, access control, information sharing |
24 | Abdessamad Imine, Asma Cherif 0001, Michaël Rusinowitch |
A Flexible Access Control Model for Distributed Collaborative Editors. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
Secure Data Management, Authorization and Access Control, Collaborative Editing Systems |
24 | Yuan Hong, Shuo Lu, Qian Liu, Lingyu Wang 0001, Rachida Dssouli |
Preserving Privacy in E-health Systems Using Hippocratic Databases. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mohamed Layouni, Maki Yoshida, Shingo Okamura |
Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jae-Gil Lee 0001, Kyu-Young Whang, Wook-Shin Han, Il-Yeol Song |
The dynamic predicate: integrating access control with query processing in XML databases. |
VLDB J. |
2007 |
DBLP DOI BibTeX RDF |
Privacy/security, Access control, Query processing, XML databases |
24 | Ulrich Flegel, Michael Meier 0001 |
Authorization Architectures for Privacy-Respecting Surveillance. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
privacy, Architecture, intrusion detection, authorization, surveillance, pseudonym, misuse detection |
24 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Hierarchical hippocratic databases with minimal disclosure for virtual organizations. |
VLDB J. |
2006 |
DBLP DOI BibTeX RDF |
Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection |
24 | Andreas K. Mattas, Ioannis Mavridis, Iason Pagkalos |
A Paradigm for Dynamic and Decentralized Administration of Access Control in Workflow Applications. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Heechang Shin |
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Philip Robinson, Florian Kerschbaum, Andreas Schaad |
From Business Process Choreography to Authorization Policies. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou |
EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. |
Distributed Parallel Databases |
2005 |
DBLP DOI BibTeX RDF |
security, role based access control, business process |
24 | Guillermo Navarro 0001, Joan Borrell |
An XML Standards Based Authorization Framework for Mobile Agents. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
Access Control, Mobile Agents, Authorization, XACML, SAML |
24 | Chun Ruan, Vijay Varadharajan |
Data Protection in Distributed Database Systems. |
ISMIS |
2005 |
DBLP DOI BibTeX RDF |
distributed database, authorization |
24 | Nicola Zannone, Sushil Jajodia, Fabio Massacci, Duminda Wijesekera |
Maintaining privacy on derived objects. |
WPES |
2005 |
DBLP DOI BibTeX RDF |
access control, information flow, data protection |
24 | Fabio Massacci, John Mylopoulos, Nicola Zannone |
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Consistency analysis of authorization hook placement in the Linux security modules framework. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, access control models |
24 | Jaehong Park, Ravi S. Sandhu |
The UCONABC usage control model. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
privacy, access control, trust, digital rights management, usage control |
24 | Alberto Belussi, Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Andrea Nucita |
An authorization model for geographical maps. |
GIS |
2004 |
DBLP DOI BibTeX RDF |
access control, GIS, authorization model |
24 | Ramaswamy Chandramouli |
Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning |
24 | Chi-Hung Chi, Xiao-Yan Yu, Wenjie Zhang, Chen (Cherie) Ding, Weng-Fai Wong |
Data Integrity Framework and Language Support for Active Web Intermediaries. |
WCW |
2004 |
DBLP DOI BibTeX RDF |
Web Intermediaries, Data Integrity, Content Adaptation, Content Delivery |
24 | Ali E. Abdallah, Etienne J. Khayat |
A Formal Model for Parameterized Role-Based Access Control. |
Formal Aspects in Security and Trust |
2004 |
DBLP DOI BibTeX RDF |
|
24 | François Siewe, Antonio Cau, Hussein Zedan |
A compositional framework for access control policies enforcement. |
FMSE |
2003 |
DBLP DOI BibTeX RDF |
access control, authorization, delegation, policy composition |
24 | Li Qin, Vijayalakshmi Atluri |
Concept-level access control for the Semantic Web. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
ontology, Semantic Web, access control, concept, propagation |
24 | Shijin Yuan, Yunfa Hu |
Access Control Architecture for Web Services. |
GCC (1) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Vijayalakshmi Atluri, Avigdor Gal |
An authorization model for temporal and derived data: securing information portals. |
ACM Trans. Inf. Syst. Secur. |
2002 |
DBLP DOI BibTeX RDF |
authorization administration, Access control, temporal data, derived data |
24 | Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari |
A Content-Based Authorization Model for Digital Libraries. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
access control, digital libraries, authorization |
24 | Piero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
A Component-Based Architecture for Secure Data Publication. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Elena Ferrari, Francesco Buccafurri, Pasquale Rullo |
A Logical Framework for Reasoning on Data Access Control Policies. |
CSFW |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Sabrina De Capitani di Vimercati, Elena Ferrari, Pierangela Samarati |
Exception-Based Information Flow Control in Object-Oriented Systems. |
ACM Trans. Inf. Syst. Secur. |
1998 |
DBLP DOI BibTeX RDF |
condifentiality, object-oriented databases and systems, access control, information flow control |
24 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
24 | J. Ray Scott |
Library information access client. |
CHI Conference Companion |
1994 |
DBLP DOI BibTeX RDF |
|
24 | Usman Gohar, Michael C. Hunter, Agnieszka Marczak-Czajka, Robyn R. Lutz, Myra B. Cohen, Jane Cleland-Huang |
Towards Engineering Fair and Equitable Software Systems for Managing Low-Altitude Airspace Authorizations. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
24 | Zhiwei Yan, Randy Bush, Guanggang Geng, Ties de Kock, Jiankang Yao |
Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes. |
RFC |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Alexandru Sorici, Adina Magda Florea |
Towards Context-Based Authorizations for Interactions in Hypermedia-Driven Agent Environments - The CASHMERE Framework. |
EMAS |
2023 |
DBLP DOI BibTeX RDF |
|
24 | Matt Davison 0002, Ken King, Trevor Miller |
Blockin: Multi-Chain Sign-In Standard with Micro-Authorizations. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
24 | Padmavathi Iyer, Amirreza Masoumzadeh 0001, Paliath Narendran |
On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models. |
Comput. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
24 | Luca Ferretti, Francesco Longo 0001, Giovanni Merlino, Michele Colajanni, Antonio Puliafito, Nachiket Tapas |
Verifiable and auditable authorizations for smart industries and industrial Internet-of-Things. |
J. Inf. Secur. Appl. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Haibing Lu, Xi Chen 0014, Qi Liu, Michele Samorani, Guojie Song, Yanjiang Yang |
Stochastic Workflow Authorizations With Queueing Constraints. |
IEEE Trans. Dependable Secur. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
24 | Wei Sun 0026, Shiwei Wei, Huaping Guo, Hongbing Liu |
Role-Mining Optimization with Separation-of-Duty Constraints and Security Detections for Authorizations. |
Future Internet |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Junjie Zhao, Chuanxu Wang, Lang Xu |
Decision for pricing, service, and recycling of closed-loop supply chains considering different remanufacturing roles and technology authorizations. |
Comput. Ind. Eng. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Ivan Prokic, Jovanka Pantovic, Hugo Torres Vieira |
A calculus for modeling floating authorizations. |
J. Log. Algebraic Methods Program. |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Zeyad A. Al-Odat, Eman Al-qtiemat, Samee Khan |
A Big Data Storage Scheme Based on Distributed Storage Locations and Multiple Authorizations. |
BigDataSecurity/HPSC/IDS |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm |
Mutual Authorizations: Semantics and Integration Issues. |
SACMAT |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Smriti Bhatt, Lo'ai Tawalbeh, Pankaj Chhetri, Paras Bhatt |
Authorizations in Cloud-Based Internet of Things: Current Trends and Use Cases. |
FMEC |
2019 |
DBLP DOI BibTeX RDF |
|
24 | Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira |
A Calculus for Modeling Floating Authorizations. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
24 | Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Gerardo Pelosi, Pierangela Samarati |
Enforcing authorizations while protecting access confidentiality. |
J. Comput. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
24 | Jovanka Pantovic, Ivan Prokic, Hugo Torres Vieira |
A Calculus for Modeling Floating Authorizations. |
FORTE |
2018 |
DBLP DOI BibTeX RDF |
|