|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1949 occurrences of 743 keywords
|
|
|
Results
Found 2781 publication records. Showing 2781 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
91 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
90 | Chiu-Man Yu, Kam-Wing Ng |
A Heterogeneous Authorization Policy Management Mechanism for Grid Environments. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Xuanwu Zhou, Yang Su, Ping Wei 0005 |
Further Study on Proxy Authorization and Its Scheme. |
Complex (2) |
2009 |
DBLP DOI BibTeX RDF |
Proxy authorization, multi-party authorization, multicast communi-cation, forward security, BAN logic |
78 | Jinwei Hu, Yan Zhang 0003, Ruixuan Li 0001, Zhengding Lu |
A logic for authorization provenance. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
authorization provenance, authorization, logic, provenance, authorization logic |
77 | Pierangela Samarati, Paul Ammann, Sushil Jajodia |
Propagation of Authorizations in Distributed Database Systems. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
76 | Fausto Rabitti, Elisa Bertino, Won Kim 0001, Darrell Woelk |
A Model of Authorization for Next-Generation Database Systems. |
ACM Trans. Database Syst. |
1991 |
DBLP DOI BibTeX RDF |
semantic database, object-oriented database |
74 | Shujing Wang 0001, Yan Zhang 0003 |
A Formalization of Distributed Authorization with Delegation. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
Access control, knowledge representation, authorization, trust management, delegation, nonmonotonic reasoning, answer set programming |
74 | Thomas Ziebermayr, Stefan Probst |
Web Service Authorization Framework. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
Security, Web Service, Framework, Authorization, Service |
74 | Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Secure commercial applications, Access Control, Authorization, Distributed system security |
73 | Apurva Mohan, Douglas M. Blough |
An attribute-based authorization policy framework with dynamic conflict resolution. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
attribute-based authorization, conflict resolution, authorization policy |
69 | Surajit Chaudhuri, Tanmoy Dutta, S. Sudarshan 0001 |
Fine Grained Authorization Through Predicated Grants. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Lin Chen 0020, Xiaoqin Huang, Jinyuan You |
Certificate-Based Authentication and Authorization Architecture in Digital Library. |
ICADL |
2004 |
DBLP DOI BibTeX RDF |
|
69 | Ramaswamy Chandramouli |
A Framework for Multiple Authorization Types in a Healthcare Application System. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
67 | Jaehoon Kim, Kangsoo Jung, Seog Park |
An Introduction to Authorization Conflict Problem in RDF Access Control. |
KES (2) |
2008 |
DBLP DOI BibTeX RDF |
knowledge security, RDF data, authorization conflict, Semantic Web, access control |
67 | HyunGon Kim, ByeongKyun Oh |
Implementation of Credit-Control Authorization with Embedded Mobile IPv6 Authentication. |
Communications and Multimedia Security |
2005 |
DBLP DOI BibTeX RDF |
prepaid, authorization, Mobile IPv6, Mobile node |
67 | Fabio Casati, Silvana Castano, Maria Grazia Fugini |
Managing Workflow Authorization Constraints through Active Database Technology. |
Inf. Syst. Frontiers |
2001 |
DBLP DOI BibTeX RDF |
workflows, authorizations, roles, active databases, triggers, authorization constraints |
67 | Yun Bai 0001, Vijay Varadharajan |
On Formal Languages for Sequences of Authorization Transformations. |
SAFECOMP |
1999 |
DBLP DOI BibTeX RDF |
Policy Transformation, Formal language, Default logic, Authorization Policies |
67 | Vijayalakshmi Atluri, Wei-kuang Huang |
An Authorization Model for Workflows. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
Security, Petri nets, Workflow, Authorization |
62 | Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe |
Authrule: A Generic Rule-Based Authorization Module. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Weide Zhang, David Del Vecchio, Glenn S. Wasson, Marty Humphrey |
Integrating Legacy Authorization Systems into the Grid: A Case Study Leveraging AzMan and ADAM. |
International Conference on Computational Science (1) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Changqin Huang, Guanghua Song, Yao Zheng, Deren Chen |
An Authorization Architecture Oriented to Engineering and Scientific Computation in Grid Environments. |
Asia-Pacific Computer Systems Architecture Conference |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Mary R. Thompson, Abdelilah Essiari, Srilekha Mudumbai |
Certificate-based authorization policy in a PKI environment. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
XML, Public key infrastructure, digital certificates |
60 | Hristo Koshutanski, Aliaksandr Lazouski, Fabio Martinelli, Paolo Mori |
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Trust negotiation, Grid security, Behavioral control |
60 | Guoheng Wei, Xueguang Zhou, Huanguo Zhang |
A Trusted Computing Model Based on Code Authorization. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
code authorization, virtual security units, informaion information, trusted computing |
60 | Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu |
Authorization recycling in RBAC systems. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
authorization recycling, access control, RBAC, SAAM |
60 | Steffen Bartsch, Karsten Sohr, Carsten Bormann |
Supporting Agile Development of Authorization Rules for SME Applications. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
Agile Security Engineering, SME Applications, End-User Development, DSL, Authorization Policy |
60 | Shujing Wang 0001, Yan Zhang 0003 |
Handling distributed authorization with delegation through answer set programming. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Access control, Knowledge representation, Authorization, Trust management, Delegation, Nonmonotonic reasoning, Answer set programming |
60 | Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
A type discipline for authorization policies. |
ACM Trans. Program. Lang. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Authorization, type systems, process calculus, spi calculus |
60 | Wei Zhou 0006, Christoph Meinel |
Function-Based Authorization Constraints Specification and Enforcement. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Access control, authorization constraints, constraints specification, constraints enforcement |
60 | Jiangnan Qiu, Jiang Tian, Yanzhang Wang |
A Research on the Authorization Model Based on Organizational Management in E-Gov. |
CONFENIS (1) |
2007 |
DBLP DOI BibTeX RDF |
Organization management, Inter-organizational systems, Authorization model |
60 | Jason Crampton, Wing Leung, Konstantin Beznosov |
The secondary and approximate authorization model and its application to Bell-LaPadula policies. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
Bell-LaPadula model, authorization recycling, access control, SAAM |
60 | Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens |
Authorization Service for Web Services and its Implementation. |
ICWS |
2004 |
DBLP DOI BibTeX RDF |
Security, Web Services, Access Control, Authorization |
60 | Jian-Ping Yong, Kwok-Yan Lam, Siu Leung Chung, Ming Gu 0001, Jia-Guang Sun 0001 |
Enhancing the Scalability of the Community Authorization Service for Virtual Organizations. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
Grid organization tools, Authorization service, Virtual organization |
60 | Feng Li, Junzhou Luo, Yinying Yang, Ye Zhu, Teng Ma |
A Dynamic Grid Authorization Mechanism with Result Feedback. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
Security Contract, Dynamic Authorization, Trust, Grid, Negotiation |
60 | Chun Ruan, Vijay Varadharajan |
A formal graph based framework for supporting authorization delegations and conflict resolutions. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Access control, Authorization, Conflict resolution |
57 | Patricia P. Griffiths, Bradford W. Wade |
An Authorization Mechanism for a Relational Database System. |
ACM Trans. Database Syst. |
1976 |
DBLP DOI BibTeX RDF |
data dependent authorization, protection in databases, revocation of authorization, security, privacy, access control, authorization, database systems |
56 | Karsten Sohr, Tanveer Mustafa, Xinyu Bao, Gail-Joon Ahn |
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Hannah K. Lee |
Unraveling decentralized authorization for multi-domain collaborations. |
CollaborateCom |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Jie Song 0001, Daling Wang, Yubin Bao, Ge Yu 0001, Wen Qi |
Mining Purpose-Based Authorization Strategies in Database System. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Weider D. Yu, Ellora Nayak |
ARSL: A Language for Authorization Rule Specification in Software Security. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
55 | Vinod Ganapathy, Trent Jaeger, Somesh Jha |
Automatic placement of authorization hooks in the linux security modules framework. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
LSM, hook placement, static analysis, SELinux |
55 | Hai Jin 0001, Weizhong Qiang, Xuanhua Shi, Deqing Zou |
A Novel Authorization Mechanism for Service-Oriented Virtual Organization. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Shujing Wang 0001, Yan Zhang 0003 |
Specifying Distributed Authorization with Delegation Using Logic Programming. |
KES (2) |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Markus Lorch, Dennis G. Kafura, Ian Fisk, Kate Keahey, Gabriele Carcassi, Timothy Freeman 0001, Timur Peremutov, Abhishek Singh Rana |
Authorization and account management in the Open Science Grid. |
GRID |
2005 |
DBLP DOI BibTeX RDF |
|
55 | Wu Liu, Jianping Wu, Hai-Xin Duan, Xing Li 0001, Ping Ren |
XML Based X.509 Authorization in CERNET Grid. |
GCC |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Chun Ruan, Vijay Varadharajan |
Decentralized Temporal Authorization Administration. |
DEXA |
2003 |
DBLP DOI BibTeX RDF |
|
55 | Fausto Rabitti, Darrell Woelk, Won Kim 0001 |
A Model of Authorization for Object-Oriented and Semantic Databases. |
EDBT |
1988 |
DBLP DOI BibTeX RDF |
|
54 | Lujo Bauer, Limin Jia 0001, Michael K. Reiter, David Swasey |
xDomain: cross-border proofs of access. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
logic-based access control, trust management, distributed authorization |
54 | Andrew Fritz, Jehan-François Pâris |
Maille authorization - a distributed, redundant authorization protocol. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
53 | Qiang Wei, Matei Ripeanu, Konstantin Beznosov |
Cooperative secondary authorization recycling. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
CSAR, authorization recycling, cooperation, SAAM |
53 | Justin Burruss, Thomas W. Fredian, Mary R. Thompson |
ROAM: An Authorization Manager for Grids. |
J. Grid Comput. |
2006 |
DBLP DOI BibTeX RDF |
FusionGrid, Grid computing, authorization, Globus, Grid security |
53 | Chun Ruan, Vijay Varadharajan |
Implementing Authorization Delegations Using Graph. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
authorization delegation, access control, weighted graph |
53 | Bechara al Bouna, Richard Chbeir |
Multimedia-based authorization and access control policy specification. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
authorization and access control, security, user model, role based access control, multimedia content |
53 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Risk assessment in distributed authorization. |
FMSE |
2005 |
DBLP DOI BibTeX RDF |
trust management logic, distributed authorization |
53 | Dickson K. W. Chiu, Changjie Wang, Ho-fung Leung, Irene Kafeza, Eleanna Kafeza |
Supporting the legal identities of contracting agents with an agent authorization platform. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
agent certificate, legal identity, intelligent agents, authorization, PKI, e-contract |
53 | Yun Bai 0001 |
A New Approach for Conflict Resolution of Authorization. |
KES (1) |
2005 |
DBLP DOI BibTeX RDF |
prioritized logic programming, formal specification, conflict resolution, authorization rule |
53 | Nabil R. Adam, Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari |
A Content-Based Authorization Model for Digital Libraries. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
access control, digital libraries, authorization |
53 | Zoltán Miklós 0001 |
A Decentralized Authorization Mechanism for E-Business Applications. |
DEXA Workshops |
2002 |
DBLP DOI BibTeX RDF |
authorization, trust management, assurance |
53 | Horst F. Wedde, Mario Lischka |
Modular authorization. |
SACMAT |
2001 |
DBLP DOI BibTeX RDF |
modularity, authorization, role-based access control, conflicts, composability, violations |
53 | Elisa Bertino, Sushil Jajodia, Pierangela Samarati |
A Flexible Authorization Mechanism for Relational Data Management Systems. |
ACM Trans. Inf. Syst. |
1999 |
DBLP DOI BibTeX RDF |
access control mechanism, group management support, relational database, authorization, access control policy, data management system |
53 | Yun Bai 0001, Vijay Varadharajan |
Authorization in Object Oriented Databases. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
security, formal specification, object oriented databases, inheritance, authorization policy |
53 | Vincent Nicomette, Yves Deswarte |
An Authorization Scheme For Distributed Object Systems. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
multilevel security policy, authorization, delegation, object model, protection, access rights |
53 | Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta |
A Model of Authorization for Object-Oriented Databases based on Object Views. |
DOOD |
1995 |
DBLP DOI BibTeX RDF |
Discretionary Security, View Mechanism, View Hierarchy, Access View, Implication Rules, Access Control, Authorization System |
53 | Marc Lacoste, Tahar Jarboui, Ruan He |
A component-based policy-neutral architecture for kernel-level access control. |
Ann. des Télécommunications |
2009 |
DBLP DOI BibTeX RDF |
Policy-neutral authorization, Access control, Operating systems, Authorization, Flexibility, Security kernels, Component-based architectures |
52 | Kumar Avijit, Anupam Datta, Robert Harper 0001 |
Distributed programming with distributed authorization. |
TLDI |
2010 |
DBLP DOI BibTeX RDF |
phase distinction, proof-carrying authorization, distributed programming, logical frameworks, authorization logic |
52 | Vincent Hourdin, Jean-Yves Tigli, Stephane Lavirotte, Gaëtan Rey, Michel Riveill |
Context-sensitive authorization in interaction patterns. |
Mobility Conference |
2009 |
DBLP DOI BibTeX RDF |
context-sensitive authorization, dynamic authorization, access control, context-awareness |
52 | Anil L. Pereira, Vineela Muppavarapu, Soon Myoung Chung |
Role-Based Access Control for Grid Database Services Using the Community Authorization Service. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Open Grid Services Architecture-Data Access and Integration (OGSA-DAI), Grid database services, fine-grain authorization, Community Authorization Service (CAS), role-based access control (RBAC) |
52 | Sabrina De Capitani di Vimercati, Pierangela Samarati |
An Authorization Model for Federated Systems. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
authorization administration, authorization autonomy, access control, Federated systems |
50 | Richard Au, Mark Looi, Paul Ashley |
Cross-domain one-shot authorization using smart cards. |
CCS |
2000 |
DBLP DOI BibTeX RDF |
authorization scheme, authorization server, one-shot authorization token, access control, smart card |
48 | Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora |
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Hui Xie, Bin Zhang 0015, Dianyou Hu |
A Role-Based Dynamic Authorization Model and Its Implementation in PMI. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Charles C. Zhang, Marianne Winslett |
Distributed Authorization by Multiparty Trust Negotiation. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Georg Treu, Florian Fuchs 0001, Christiane Dargatz |
Implicit Authorization for Accessing Location Data in a Social Context. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Valerio Venturi, Morris Riedel, A. Shiraz Memon, M. Shahbaz Memon, Federico Stagni, Bernd Schuller, Daniel Mallmann, Bastian Tweddell, Alberto Gianoli, Sven van den Berghe, David F. Snelling, Achim Streit |
Using SAML-Based VOMS for Authorization within Web Services-Based UNICORE Grids. |
Euro-Par Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Huaji Shi, Xibin Zhao |
Implementation Issues of Authorization Mechanisms in Grid Computing Systems. |
SOSE |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Young-Chul Shim |
Distributed Processing of Context-Aware Authorization in Ubiquitous Computing Environments. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis |
A Type Discipline for Authorization Policies. |
ESOP |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Sarath Indrakanti, Vijay Varadharajan |
An Authorization Architecture for Web Services. |
DBSec |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Yuanbo Guo, Jianfeng Ma 0001, Yadi Wang |
An Intrusion-Resilient Authorization and Authentication Framework for Grid Computing Infrastructure. |
International Conference on Computational Science (3) |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi |
Authorization Translation for XML Document Transformation. |
World Wide Web |
2004 |
DBLP DOI BibTeX RDF |
XML access control models, authorizations, database security, XML documents, document transformation |
48 | Chang-Joo Moon, Hoh Peter In |
Inconsistency Detection of Authorization Policies in Distributed Component Environment. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. |
WISE |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Dongdong Li, Songlin Hu, Shuo Bai |
A Uniform Model for Authorization and Access Control in Enterprise Information Platform. |
EDCIS |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Lavanya Ramakrishnan, Helen Rehn, Jay Alameda, Rachana Ananthakrishnan, Madhusudhan Govindaraju, Aleksander Slominski, Kay Connelly, Von Welch, Dennis Gannon, Randall Bramley, Shawn D. Hampton |
An Authorization Framework for a Grid Based Component Architecture. |
GRID |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Rolf Oppliger |
Authorization Methods for E-Commerce Applications. |
SRDS |
1999 |
DBLP DOI BibTeX RDF |
|
48 | Elisa Bertino, Francesco Buccafurri, Elena Ferrari, Pasquale Rullo |
An Authorization Model and Its Formal Semantics. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
|
47 | Haiyang Sun, Jian Yang 0001, Xin Wang, Yanchun Zhang |
A Verification Mechanism for Secured Message Processing in Business Collaboration. |
APWeb/WAIM |
2009 |
DBLP DOI BibTeX RDF |
Role Authorization, Reliability Verification, Secured Message Processing, Hierarchical Colored Petri Net |
47 | Felix Wortmann, Robert Winter 0001 |
Vorgehensmodelle für die rollenbasierte Autorisierung in heterogenen Systemlandschaften. |
Wirtschaftsinf. |
2007 |
DBLP DOI BibTeX RDF |
Access Control, Architecture, Integration, Authorization, Roles |
47 | Markus Lorch, Seth Proctor, Rebekah Lepro, Dennis G. Kafura, Sumit Shah |
First experiences using XACML for access control in distributed systems. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
access control decision, access control enforcement, authorization, policy language, distributed system security, policy management |
47 | Alexander Binun, Ehud Gudes |
Policy and State Based Secure Wrapper and Its Application to Mobile Agents. |
LA-WEB |
2003 |
DBLP DOI BibTeX RDF |
state-based fine-grained authorization, Security, mobile agents |
46 | Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang |
Authorization in trust management: Features and foundations. |
ACM Comput. Surv. |
2008 |
DBLP DOI BibTeX RDF |
trust management systems, Distributed authorization |
46 | Moritz Y. Becker, Sebastian Nanz |
The Role of Abduction in Declarative Authorization Policies. |
PADL |
2008 |
DBLP DOI BibTeX RDF |
authorization language, access control, Datalog, abduction |
46 | Henry DeYoung, Deepak Garg 0001, Frank Pfenning |
An Authorization Logic With Explicit Time. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Explicit Time, Hybrid Logic, Authorization Logic |
46 | Weider D. Yu, Ellora Nayak |
An Algorithmic Approach to Authorization Rules Conflict Resolution in Software Security. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
access control, authorization, security policy, conflict resolution, software security |
46 | Jianwei Yue, Hongchun Cai, Luyao Chen, Wei Zhuang |
Study on Authorization Management Model of One-stop Office System. |
CCTA |
2007 |
DBLP DOI BibTeX RDF |
one-stop office system, RBAC, authorization management |
46 | Hannah K. Lee, Heiko Luedemann |
lightweight decentralized authorization model for inter-domain collaborations. |
SWS |
2007 |
DBLP DOI BibTeX RDF |
dRBAC, inter-domain collaborations, e-government, XACML, authorization policy |
46 | Chun Ruan, Vijay Varadharajan |
Integration of Graph Based Authorization Policies. |
ISMIS |
2006 |
DBLP DOI BibTeX RDF |
authorization conflict, access control, weighted graph |
46 | Qi Xie, Dayou Liu, Haibo Yu 0002 |
Using Description Logic to Determine Seniority Among RB-RBAC Authorization Rules. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
RB-RBAC, attribute expression, seniority level, Description Logic, authorization rule |
46 | Song Han 0004, Geoff Skinner, Vidyasagar M. Potdar, Elizabeth Chang 0001 |
A framework of authentication and authorization for e-health services. |
SWS |
2006 |
DBLP DOI BibTeX RDF |
privacy, authentication, authorization, e-health, personal data |
46 | Marianne Winslett, Charles C. Zhang, Piero A. Bonatti |
PeerAccess: a logic for distributed authorization. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
logical signature, proof hints, release policies, P2P systems, distributed authorization, sticky policies |
Displaying result #1 - #100 of 2781 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|