Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet |
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
112 | Audun Jøsang, Dieter Gollmann, Richard Au |
A method for access authorisation through delegation networks. |
ACSW |
2006 |
DBLP BibTeX RDF |
|
86 | Arash Faroughi, Roozbeh Faroughi, Philipp Wieder, Wolfgang Ziegler |
Attributes and VOs: Extending the UNICORE Authorisation Capabilities. |
Euro-Par Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
86 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
UML |
86 | Richard O. Sinnott, A. J. Stell, David W. Chadwick, O. Otenko |
Experiences of Applying Advanced Grid Authorisation Infrastructures. |
EGC |
2005 |
DBLP DOI BibTeX RDF |
|
78 | Karsten Sohr, Michael Drouineaud, Gail-Joon Ahn, Martin Gogolla |
Analyzing and Managing Role-Based Access Control Policies. |
IEEE Trans. Knowl. Data Eng. |
2008 |
DBLP DOI BibTeX RDF |
Access controls, Protection mechanisms |
78 | Hongbin Zhou, Simon N. Foley |
A Logic for Analysing Subterfuge in Delegation Chains. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Changyu Dong, Giovanni Russello, Naranker Dulay |
Flexible Resolution of Authorisation Conflicts in Distributed Systems. |
DSOM |
2008 |
DBLP DOI BibTeX RDF |
|
73 | Jay Chin, Ning Zhang 0001, Aleksandra Nenadic, Li Yao, J. M. Brooke |
Towards Context Constrained Authorisation for Pervasive Grid Computing. |
COMSWARE |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Simon N. Foley, Hongbin Zhou |
Authorisation Subterfuge by Delegation in Decentralised Networks. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Wai-Ki Richard Au, Kim-Kwang Raymond Choo, Mark Looi |
A Secure Anonymous Authorisation Architecture for E-Commerce. |
EEE |
2005 |
DBLP DOI BibTeX RDF |
|
73 | Ying-Lie O |
A Life-Cycle Based Authorisation Expert Database System. |
AIMDM |
1999 |
DBLP DOI BibTeX RDF |
|
65 | David W. Chadwick |
FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
information cards, authorisation, federated identity management, X.509 certificates, CardSpace |
65 | Jonathon Tidswell, John Potter |
A graphical definition of authorization schema in the DTAC model. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
DTAC, access control, constraints, graphs, dynamic, computer security, type, roles, schema |
65 | John T. Robinson, Murthy V. Devarakonda |
Note on a Problem with Reed and Long's FBR Results. |
ACM SIGOPS Oper. Syst. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
60 | David W. Chadwick, Kaniz Fatema |
An advanced policy based authorisation infrastructure. |
Digital Identity Management |
2009 |
DBLP DOI BibTeX RDF |
application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy |
60 | A. J. Stell, Richard O. Sinnott, John P. Watt |
Comparison of Advanced Authorisation Infrastructures for Grid Computing. |
HPCS |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Richard Au, Harikrishna Vasanta, Kim-Kwang Raymond Choo, Mark Looi |
A user-centric anonymous authorisation framework in e-commerce environment. |
ICEC |
2004 |
DBLP DOI BibTeX RDF |
|
52 | Yuri Demchenko, Oscar Koeroo, Cees de Laat, Håkon Sagehaug |
Extending XACML authorisation model to support policy obligations handling in distributed application. |
MGC |
2008 |
DBLP DOI BibTeX RDF |
complex resource provisioning, generic AAA authorisation framework, policy obligations, reference model for policy obligations handling, XACML |
52 | Nilufer Tuptuk, Emil Lupu |
Risk Based Authorisation for Mobile Ad Hoc Networks. (PDF / PS) |
AIMS |
2007 |
DBLP DOI BibTeX RDF |
Mobile Ad Hoc Network, Trust, Authorisation, Bayesian Belief Networks |
52 | Ligang He, Mark Calleja, Mark Hayes, Stephen A. Jarvis |
Performance prediction for running workflows under role-based authorization mechanisms. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
47 | Xin Wang, Yanchun Zhang, Hao Shi, Jian Yang 0001 |
BPEL4RBAC: An Authorisation Specification for WS-BPEL. |
WISE |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yuri Demchenko, Alfred Wan, Mihai Cristea, Cees de Laat |
Authorisation infrastructure for on-demand network resource provisioning. |
GRID |
2008 |
DBLP DOI BibTeX RDF |
|
47 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Authorisation Scenarios in Dynamic Resource Provisioning. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Giovanni Russello, Changyu Dong, Naranker Dulay |
Authorisation and Conflict Resolution for Hierarchical Domains. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Christian Schläger, Manuel Sojer, Björn Muschall, Günther Pernul |
Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers. |
EC-Web |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Wensheng Xu, David W. Chadwick, Sassa Otenko |
Development of a Flexible PERMIS Authorisation Module for Shibboleth and Apache Server. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Simon N. Foley |
Authorisation Subterfuge by Delegation in Decentralised Networks. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge |
Specification and Validation of Authorisation Constraints Using UML and OCL. |
ESORICS |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Raffaele Giaffreda, Hannes Tschofenig, Theo Kanter, Christoph Reichert |
An Authorisation and Privacy Framework for Context-Aware Networks. |
MATA |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Ligang He, Kewei Duan, Xueguang Chen, Deqing Zou, Zongfen Han, Ali Fadavinia, Stephen A. Jarvis |
Modelling Workflow Executions under Role-Based Authorisation Control. |
IEEE SCC |
2011 |
DBLP DOI BibTeX RDF |
Modelling, Workflow, RBAC, Authorisation |
39 | Tuan-Anh Nguyen, David W. Chadwick, Bassem Nasser |
Recognition of Authority in Virtual Organisations. |
TrustBus |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Yuri Demchenko, Cees de Laat, Leon Gommans, René van Buuren |
Domain Based Access Control Model for Distributed Collaborative Applications. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Sebastian Ryszard Kruk, Slawomir Grzonkowski, Adam Gzella, Tomasz Woroniecki, Hee-Chul Choi |
D-FOAF: Distributed Identity Management with Access Rights Delegation. |
ASWC |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Bruce Christianson |
Anonymous Authentication (Transcript of Discussion). |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
34 | Andreas U. Schmidt, Nicolai Kuntze, Joerg Abendroth |
Trust for Location-Based Authorisation. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Steven Gordon |
Formal Analysis of PANA Authentication and Authorisation Protocol. |
PDCAT |
2008 |
DBLP DOI BibTeX RDF |
|
34 | Tracy McKay, James Irvine 0001 |
Authentication and Authorisation for a Personal Distributed Environment. |
VTC Spring |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Roland Erber, Christian Schläger, Günther Pernul |
Patterns for Authentication and Authorisation Infrastructures. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Christian Schläger, Thomas Nowey, José A. Montenegro |
A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Xiangpeng Zhao, Antonio Cerone, Padmanabhan Krishnan |
Verifying BPEL Workflows Under Authorisation Constraints. |
Business Process Management |
2006 |
DBLP DOI BibTeX RDF |
model-checking, Workflow, RBAC, BPEL |
34 | David W. Chadwick |
Authorisation Using Attributes from Multiple Authorities. |
WETICE |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Andreas Schaad |
Revocation of Obligation and Authorisation Policy Objects. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Christian Schläger, Günther Pernul |
Authentication and Authorisation Infrastructures in b2c e-Commerce. |
EC-Web |
2005 |
DBLP DOI BibTeX RDF |
|
34 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Richard Au, Ming Yao, Mark Looi |
Privilege Negotiation Agents for Distributed Authorisation on World Wide Web. |
IAT |
2003 |
DBLP DOI BibTeX RDF |
|
34 | Darrell Raymond |
Authorisation Requirements on a Budget. |
Requir. Eng. |
2002 |
DBLP DOI BibTeX RDF |
Authorization, Dependency analysis, Security requirements |
31 | Khaled Gaaloul, François Charoy |
Task Delegation Based Access Control Models for Workflow Systems. |
I3E |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Workflow, Delegation, Task, Authorisation |
31 | Christian Schläger, Günther Pernul |
Trust Modelling in E-Commerce through Fuzzy Cognitive Maps. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Authentication and Authorisation Infrastructures (AAIs), Trust, E-Commerce, Fuzzy Cognitive Maps |
31 | Yuri Demchenko, Frank Siebenlist, Leon Gommans, Cees T. A. M. de Laat, David L. Groep, Oscar Koeroo |
Security and dynamics in customer controlled virtual workspace organisation. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
User-controlled security model, authorisation session, complex resource provisioning, trusted computing platform, virtual workspace service, virtualisation |
31 | Vino Fernando Crescini, Yan Zhang 0003 |
PolicyUpdater: a system for dynamic access control. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Policy update, Access control, Artificial intelligence, Logic programming, Authorisation |
31 | Yuko Murayama |
Configuration Detection as a Problem of Knowledge Discovery in Computer Networks. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
configuration detection, network object existence, network object location, network configuration knowledge maintenance, scale problem, management domain partitioning, network address authorisation, network-level threats, security technique, address resolution, data mining, knowledge discovery, computer networks, configuration management, routers, inconsistency, internetworking, dynamic learning, invalidity, hosts |
31 | Nicholas Yialelis, Emil Lupu, Morris Sloman |
Role-based security for distributed object systems. |
WETICE |
1996 |
DBLP DOI BibTeX RDF |
role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents |
26 | Christian Wolter, Andreas Schaad, Christoph Meinel |
Task-based entailment constraints for basic workflow patterns. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
task-based entailment constraints, access control, workflow management, separation of duty, workflow modelling |
26 | Mark Slaymaker, David J. Power, Douglas Russell, Andrew Simpson |
On the Facilitation of Fine-Grained Access to Distributed Healthcare Data. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Aleksandra Nenadic, Ning Zhang 0001, Li Yao, Terry Morrow |
Levels of Authentication Assurance: an Investigation. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Nicholas Paul Sheppard |
On implementing mpeg-21 intellectual property management and protection. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
MPEG REL, MPEG-21 IPMP, implementation, digital rights management |
26 | Yuri Demchenko, Leon Gommans, Cees de Laat |
Using SAML and XACML for Complex Resource Provisioning in Grid Based Applications. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Aleksandra Nenadic, Ning Zhang 0001, Jay Chin, Carole A. Goble |
FAME: Adding Multi-Level Authentication to Shibboleth. |
e-Science |
2006 |
DBLP DOI BibTeX RDF |
|
26 | David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen |
Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP |
26 | Peter Lamb, Robert Power, Gavin Walker, Michael Compton |
Role-based access control for data service integration. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
access control, data integration |
26 | Daniel Cvrcek, Jan Krhovjak, Vashek Matyas |
PIN (and Chip) or Signature: Beating the Cheating? |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Partha Das Chowdhury, Bruce Christianson, James A. Malcolm |
Anonymous Context Based Role Activation Mechanism. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Vashek Matyas |
PIN (and Chip) or Signature: Beating the Cheating? |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja |
A Framework for Supporting Distributed Access Control Policies. |
ISCC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Florina Almenárez, Mildrey Carbonell, Jordi Forné, M. Francisca Hinarejos, Marc Lacoste, Andrés Marín López, José A. Montenegro |
Design of an Enhanced PKI for Ubiquitous Networks. |
DEXA Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Thomas B. Quillinan, Simon N. Foley |
Security in WebCom: addressing naming issues for a web services architecture. |
SWS |
2004 |
DBLP DOI BibTeX RDF |
distributed systems, trust management, web services security, naming |
26 | Andreas Schaad, Jonathan D. Moffett |
Delegation of Obligations. |
POLICY |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Michael C. Fairhurst, Richard M. Guest, Farzin Deravi, J. George |
Using Biometrics as an Enabling Technology in Balancing Universality and Selectivity for Management of Information Access. |
User Interfaces for All |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Martyn Fletcher |
A Database Authorization Framework for Multi-Agent Systems. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Jim J. Longstaff, Mike A. Lockyer, M. G. Thick |
A model of accountability, confidentiality and override for healthcare and other applications. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Arbër Beshiri, Anastas Mishev |
Authentication and authorisation in service-oriented grid architecture. |
Int. J. Grid Util. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Adil Merabet, Atidel Lahoulou, Ahmed Alioua |
A multi-authorisation blockchain-based access control for cloud healthcare system. |
Int. J. Intell. Eng. Informatics |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Karen Li, Awais Rashid, Anne Roudaut |
Usable Security Model for Industrial Control Systems - Authentication and Authorisation Workflow. |
EuroUSEC |
2023 |
DBLP DOI BibTeX RDF |
|
21 | Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang |
Authorisation inconsistency in IoT third-party integration. |
IET Inf. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Boyi Xu, Li Da Xu, Yuxiao Wang 0004, Hongming Cai |
A distributed dynamic authorisation method for Internet+ medical & healthcare data access based on consortium blockchain. |
Enterp. Inf. Syst. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Khizar Hameed, Ali Raza, Saurabh Garg 0001, Muhammad Bilal Amin |
A Blockchain-based Decentralised and Dynamic Authorisation Scheme for the Internet of Things. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Kheng-Leong Tan, Chi-Hung Chi, Kwok-Yan Lam |
Secure Multi-Party Delegated Authorisation For Access and Sharing of Electronic Health Records. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Minyue Jin, Gendao Li, Marc Reimann |
Team of rivals: How should original equipment manufacturers cooperate with independent remanufacturers via authorisation? |
Eur. J. Oper. Res. |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Steph Rudd, Hamish Cunningham |
Towards Lightweight Authorisation of IoT-Oriented Smart-Farms using a Self-Healing Consensus Mechanism. |
FRUCT |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo |
WiP: Metamodel for Continuous Authorisation and Usage Control. |
SACMAT |
2022 |
DBLP DOI BibTeX RDF |
|
21 | Edon Gashi, Blerim Rexha, Artan Rexhepi |
Trust establishment between OAuth 2.0 resource servers using claims-based authorisation. |
Electron. Gov. an Int. J. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Parveen Kumar Sharma, Rajiv Mahajan, Surender Kumar |
Trust-based multi-level secure routing for authentication and authorisation in WMN. |
Int. J. Adv. Intell. Paradigms |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Wenxin Li, Jingsha He, Nafei Zhu, Shuting Jin, Da Teng |
An authorisation certificate-based access control model. |
Int. J. Secur. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Aafaf Ouaddah, Badr Bellaj |
FairAccess2.0: a smart contract-based authorisation framework for enabling granular access control in IoT. |
Int. J. Inf. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Konrad M. Dryja, Milan Markovic, Peter Edwards |
FlyTrap: A Blockchain-based Proxy for Authorisation and Audit of MQTT Connections. |
IOTSMS |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris |
CAPODAZ: A containerised authorisation and policy-driven architecture using microservices. |
Ad Hoc Networks |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Pradeep Sudhakaran, Chidambaranathan Malathy |
Authorisation, attack detection and avoidance framework for IoT devices. |
IET Networks |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Brian Bockelman, Andrea Ceccanti, Ian Collier, Linda Cornwall, Thomas Dack, Jaroslav Guenther, Mario Lassnig, Maarten Litmaath, A. Paul Millar, Mischa Sallé, Hannah Short, Jeny Teheran, Romain Wartel |
WLCG Authorisation from X.509 to Tokens. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
21 | Dimitrios Kallergis, Zacharenia Garofalaki, Georgios Katsikogiannis, Christos Douligeris |
CAPODAZ: A Containerised Authorisation and Policy-driven Architecture using Microservices. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
21 | Christopher Bailey, Rogério de Lemos |
Malicious changeload for the resilience evaluation of self-adaptive authorisation infrastructures. |
Future Gener. Comput. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Xiaoshuai Zhang, Chao Liu 0012, Kok Keong Chai, Stefan Poslad |
A Challenge-Response Assisted Authorisation Scheme for Data Access in Permissioned Blockchains. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Rui Lebre, Micael Pedrosa, Marcos Gestal Pose, Carlos Costa 0001 |
A safe architecture for authorisation grant in healthcare ecosystems. |
ICHI |
2020 |
DBLP DOI BibTeX RDF |
|
21 | Ahmad Salehi Shahraki |
Dynamic Cross-Domain Authorisation Model. |
|
2020 |
DOI RDF |
|
21 | Aniruddha S. Rumale, Dinesh N. Chaudhari |
IAM with postlogin authentication for service usage authorisation in cloud computing. |
Int. J. Cloud Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Montrieux, Rogério de Lemos, Chris Bailey |
Engineering Self-adaptive Authorisation Infrastructures. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
21 | Tong Zhou 0003, Xiaofeng Li, He Zhao 0011 |
EverSSDI: blockchain-based framework for verification, authorisation and recovery of self-sovereign identity using smart contracts. |
Int. J. Comput. Appl. Technol. |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Lionel Montrieux, Rogério de Lemos, Chris Bailey |
Challenges in Engineering Self-Adaptive Authorisation Infrastructures. |
Engineering Adaptive Software Systems |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Jianxiong Shao, Yu Qin, Dengguo Feng |
Formal analysis of HMAC authorisation in the TPM2.0 specification. |
IET Inf. Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Carlos Eduardo da Silva, Thomas Diniz, Nélio Cacho, Rogério de Lemos |
Self-adaptive authorisation in OpenStack cloud platform. |
J. Internet Serv. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|