|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 519 occurrences of 282 keywords
|
|
|
Results
Found 751 publication records. Showing 751 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
98 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
88 | Xiaopu Ma, Ruixuan Li 0001, Zhengding Lu |
Role mining based on weights. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
similarity, weight, role engineering, role mining, rbac |
71 | Kevin Bierhoff, Jonathan Aldrich |
Modular typestate checking of aliased objects. |
OOPSLA |
2007 |
DBLP DOI BibTeX RDF |
linear logic, aliasing, permissions, typestates, behavioral subtyping |
70 | Jason Crampton |
On permissions, inheritance and role hierarchies. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
role-based access control, inheritance, mandatory access control, permissions |
69 | Franz Kollmann |
Realizing fine-granular Read andWrite Rights on Tree Structured Documents. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
67 | Gleb Naumovich |
A conservative algorithm for computing the flow of permissions in Java programs. |
ISSTA |
2002 |
DBLP DOI BibTeX RDF |
security, java, verification, static analysis, data flow analysis |
61 | Guido Boella, Leendert W. N. van der Torre |
Institutions with a hierarchy of authorities in distributed dynamic environments. |
Artif. Intell. Law |
2008 |
DBLP DOI BibTeX RDF |
Institutions, Permissions, Normative systems |
59 | Vikhyath Rao, Trent Jaeger |
Dynamic mandatory access control for multiple stakeholders. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
mobile phones, selinux, distributed access control |
57 | John Boyland |
Checking Interference with Fractional Permissions. |
SAS |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Robert W. Reeder, Lujo Bauer, Lorrie Faith Cranor, Michael K. Reiter, Kelli Bacon, Keisha How, Heather Strong |
Expandable grids for visualizing and authoring computer security policies. |
CHI |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, file permissions, security, visualization, privacy |
51 | Kevin Bierhoff, Jonathan Aldrich |
PLURAL: checking protocol compliance under aliasing. |
ICSE Companion |
2008 |
DBLP DOI BibTeX RDF |
annotations, aliasing, permissions, typestate |
50 | Sven Stork, Paulo Marques, Jonathan Aldrich |
Concurrency by default: using permissions to express dataflow in stateful programs. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
access permissions, concurrency, programming language, dataflow |
50 | Lalana Kagal, Tim Finin |
Modeling conversation policies using permissions and obligations. |
Auton. Agents Multi Agent Syst. |
2007 |
DBLP DOI BibTeX RDF |
Conversation policy, Conversation specifications, Speech act ontology, Agent communication, Permissions, Obligations, Ontology languages |
49 | Jan Jürjens, Jörg Schreck, Yijun Yu |
Automated Analysis of Permission-Based Security Using UMLsec. |
FASE |
2008 |
DBLP DOI BibTeX RDF |
|
49 | Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner |
RoleMiner: mining roles using subset enumeration. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
49 | Kun Wang, Zhenguo Ding, Lihua Zhou |
Efficient Access Control in Wireless Network. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Jan Jürjens, Markus Lehrhuber, Guido Wimmel |
Model-Based Design and Analysis of Permission-Based Security. |
ICECCS |
2005 |
DBLP DOI BibTeX RDF |
|
48 | Yang Zhao, Ligong Yu, Jia Bei |
Assure Parallel Interference Patterns in Multithreaded Programs with Permissions. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Matthias Merz |
The management of users, roles, and permissions in JDOSecure. |
PPPJ |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Richard Bornat, Cristiano Calcagno, Peter W. O'Hearn, Matthew J. Parkinson |
Permission accounting in separation logic. |
POPL |
2005 |
DBLP DOI BibTeX RDF |
concurrency, logic, separation, permissions |
40 | Nels E. Beckman |
Verifying correct usage of atomic blocks using access permissions. |
OOPSLA Companion |
2008 |
DBLP DOI BibTeX RDF |
transactional memory, permissions, typestate |
39 | Thomas P. Jensen |
Certificates of Resource Usage on Mobile Telephones. |
ISoLA |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Guido Boella, Leendert W. N. van der Torre |
A Logical Architecture of a Normative System. |
DEON |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
39 | Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan |
A Task-Oriented Access Control Model for WfMS. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Dirk Schwartmann |
An Attributable Role-Based Access Control for Healthcare. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
39 | John A. Trono |
Comments on "Tagged Semaphores". |
ACM SIGOPS Oper. Syst. Rev. |
2000 |
DBLP DOI BibTeX RDF |
|
38 | Matthias Merz, Markus Aleksy |
Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. |
DEXA |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Muhammad Alam, Ruth Breu, Michael Hafner |
Modeling permissions in a (U/X)ML world. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Souhila Kaci, Leendert W. N. van der Torre |
Permissions and Uncontrollable Propositions in DSDL3: Non-monotonicity and Algorithms. |
DEON |
2006 |
DBLP DOI BibTeX RDF |
|
38 | Guido Boella, Leendert W. N. van der Torre |
An architecture of a normative system: counts-as conditionals, obligations and permissions. |
AAMAS |
2006 |
DBLP DOI BibTeX RDF |
MAS theory, normative multi-agent systems, normative systems |
38 | Dong-Gue Park, You-Ri Lee |
A Flexible Role-Based Delegation Model Using Characteristics of Permissions. |
DEXA |
2005 |
DBLP DOI BibTeX RDF |
|
38 | Till Schümmer, Jörg M. Haake, Anja Haake |
A Metaphor and User Interface for Managing Access Permissions in Shared Workspace Systems. |
From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments |
2005 |
DBLP DOI BibTeX RDF |
access control, CSCW, virtual environments, Shared workspaces, group formation |
38 | Sameer Patil, Jennifer Lai |
Who gets to know what when: configuring privacy permissions in an awareness application. |
CHI |
2005 |
DBLP DOI BibTeX RDF |
contextual communication, permission structures, privacy, awareness, context-aware computing, information disclosure |
38 | Duminda Wijesekera, Sushil Jajodia, Francesco Parisi-Presicce, Åsa Hagström |
Removing permissions in the flexible authorization framework. |
ACM Trans. Database Syst. |
2003 |
DBLP DOI BibTeX RDF |
logic programming, authorization, Access control policy |
36 | Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid |
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Mohammad Tahaei, Ruba Abu-Salma, Awais Rashid |
Stuck in the Permissions With You: Developer & End-User Perspectives on App Permissions & Their Privacy Ramifications. |
CHI |
2023 |
DBLP DOI BibTeX RDF |
|
36 | Quang Do, Ben Martini, Kim-Kwang Raymond Choo |
Enforcing File System Permissions on Android External Storage: Android File System Permissions (AFP) Prototype and ownCloud. |
TrustCom |
2014 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Heule, K. Rustan M. Leino, Peter Müller 0001, Alexander J. Summers |
Abstract Read Permissions: Fractional Permissions without the Fractions. |
VMCAI |
2013 |
DBLP DOI BibTeX RDF |
|
36 | Romain Bardou |
Verification of Pointer Programs Using Regions and Permissions. (Vérification de programmes avec pointeurs à l'aide de régions et de permissions). |
|
2011 |
RDF |
|
36 | K. Hanner, Rudolf Hörmanseder |
Managing Windows NT®file system permissions - A security tool to master the complexity of Microsoft Windows NT®file system permissions. |
J. Netw. Comput. Appl. |
1999 |
DBLP DOI BibTeX RDF |
|
32 | Nels E. Beckman, Kevin Bierhoff, Jonathan Aldrich |
Verifying correct usage of atomic blocks and typestate. |
OOPSLA |
2008 |
DBLP DOI BibTeX RDF |
transactional memory, permissions, typestate |
32 | Michael Sonntag, Maria Wimmer 0001 |
Legal Aspects of One-Stop Government: The Case of Applying for a Building Permission. |
EGOV |
2003 |
DBLP DOI BibTeX RDF |
one-stop government, electronic proceedings, building permissions, e-government |
32 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
32 | Emil Lupu, Morris Sloman, Naranker Dulay, Nicodemos Damianou |
Ponder: Realising Enterprise Viewpoint Concepts. |
EDOC |
2000 |
DBLP DOI BibTeX RDF |
distributed object enterprise concepts, enterprise viewpoint concepts, Ponder language, prohibitions, nested communities, mobile telecommunication network, specification, declarative language, permissions, obligations, business communication, language constructs |
29 | Mohammad Nauman, Sohail Khan, Xinwen Zhang |
Apex: extending Android permission model and enforcement with user-defined runtime constraints. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
policy framework, constraints, Android, mobile platforms |
29 | Alexander Heitzmann, Bernardo Palazzi, Charalampos Papamanthou, Roberto Tamassia |
Effective Visualization of File System Access-Control. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Juan Manuel Crespo, Gustavo Betarte, Carlos Luna 0001 |
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices. |
TYPES |
2008 |
DBLP DOI BibTeX RDF |
mobile devices, Access control models, formal proofs |
29 | Paul El Khoury, Emmanuel Coquery, Mohand-Said Hacid |
Consistency checking of role assignments in inter-organizational collaboration. |
SPRINGL |
2008 |
DBLP DOI BibTeX RDF |
bridge rules, role based access control, description logic, roles, inter-organizational |
29 | Min Li, Hua Wang 0002, Ashley W. Plank, Jianming Yong |
Advanced Permission-Role Relationship in Role-Based Access Control. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann |
Permission Set Mining: Discovering Practical and Useful Roles. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri |
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
29 | Byeong-Mo Chang |
Static check analysis for Java stack inspection. |
ACM SIGPLAN Notices |
2006 |
DBLP DOI BibTeX RDF |
security, Java, Java, static analysis, stack inspection |
29 | Romuald Thion, Stéphane Coulondre |
Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs. |
ICCS |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Noa Tuval, Ehud Gudes |
Resolving Information Flow Conflicts in RBAC Systems. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
role graph consistency, canonical groups, Role based access control |
29 | Aizhong Lin, Erik Vullings, James Dalziel |
A Trust-based Access Control Model for Virtual Organizations. |
GCC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Antonio Corradi, Rebecca Montanari, Daniela Tibaldi |
Context-Based Access Control for Ubiquitous Service Provisioning. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Lunwei Wang, Lifeng Wei, Xiangke Liao, Huaimin Wang |
AT-RBAC: An Authentication Trustworthiness-Based RBAC Model. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Anindya Banerjee 0001, David A. Naumann |
History-Based Access Control and Secure Information Flow. |
CASSIS |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell |
Access Control for Active Spaces. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Emmett Witchel, Josh Cates, Krste Asanovic |
Mondrian memory protection. |
ASPLOS |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Pete Epstein, Ravi S. Sandhu |
Engineering of Role/Permission Assignments. |
ACSAC |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Ravi S. Sandhu, Qamar Munawer |
The ARBAC99 Model for Administration of Roles. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Yang Zhao, John Boyland |
Assuring Lock Usage in Multithreaded Programs with Fractional Permissions. |
Australian Software Engineering Conference |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Stijn Goedertier, Jan Vanthienen |
Designing Compliant Business Processes with Obligations and Permissions. |
Business Process Management Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Travis D. Breaux, Annie I. Antón |
Analyzing Goal Semantics for Rights, Permissions, and Obligations. |
RE |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Philippe Balbiani |
A formal examination of roles and permissions in access control. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Lalana Kagal, Timothy W. Finin |
Modeling Communicative Behavior Using Permissions and Obligations. |
AC |
2004 |
DBLP DOI BibTeX RDF |
|
22 | D. Richard Kuhn, Edward J. Coyne, Timothy R. Weil |
Adding Attributes to Role-Based Access Control. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Dynamic roles, Adding and managing attributes, Controlling permissions, Role-based access control, attribute based access control |
22 | Jonathan Aldrich, Joshua Sunshine, Darpan Saini, Zachary Sparks |
Typestate-oriented programming. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
programming language, objects, types, states, permissions, typestate, paradigms |
22 | Kevin Bierhoff |
Checking API protocol compliance in java. |
OOPSLA Companion |
2008 |
DBLP DOI BibTeX RDF |
permissions, typestate |
22 | Sebastian Höhn, Jan Jürjens |
Rubacon: automated support for model-based compliance engineering. |
ICSE |
2008 |
DBLP DOI BibTeX RDF |
user permissions, access control, security analysis |
22 | Rose K. Shumba |
Teaching hands-on Linux host computer security. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
file integrity, file permissions, host security exercises, user accounts, cryptography, Computer security |
22 | John Tang Boyland, William Retert |
Connecting effects and uniqueness with adoption. |
POPL |
2005 |
DBLP DOI BibTeX RDF |
adoption, ownership, uniqueness, permissions |
22 | Neelakantan R. Krishnaswami, Jonathan Aldrich |
Permission-based ownership: encapsulating state in higher-order typed languages. |
PLDI |
2005 |
DBLP DOI BibTeX RDF |
modularity, lambda calculus, type theory, state, domains, ownership types, permissions, system f |
22 | Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
On modeling system-centric information for role engineering. |
SACMAT |
2003 |
DBLP DOI BibTeX RDF |
attributive permissions, role-based access control, information flow, information model, role engineering |
20 | Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita |
Capability-based delegation model in RBAC. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
capability-based access control, delegation, rbac |
20 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara |
Resiliency Policies in Access Control. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerant, Access control, policy design |
20 | Wamberto Weber Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman |
Normative conflict resolution in multi-agent systems. |
Auton. Agents Multi Agent Syst. |
2009 |
DBLP DOI BibTeX RDF |
Detection and resolution of normative conflicts, Norms |
20 | Jan Camenisch, Maria Dubovitskaya, Gregory Neven |
Oblivious transfer with access control. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
privacy, oblivious transfer, anonymous credentials |
20 | Puneet Gupta, Scott D. Stoller |
Verification of Security Policy Enforcement in Enterprise Systems. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Anas Abou El Kalam, Philippe Balbiani |
A Policy Language for Modelling Recommendations. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Frithjof Dau, Martin Knechtel |
Access Policy Design Supported by FCA Methods. |
ICCS |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Emmanuel Geay, Marco Pistoia, Takaaki Tateishi, Barbara G. Ryder, Julian Dolby |
Modular string-sensitive permission analysis with demand-driven precision. |
ICSE |
2009 |
DBLP DOI BibTeX RDF |
|
20 | K. Rustan M. Leino, Peter Müller 0001, Jan Smans |
Verification of Concurrent Programs with Chalice. |
FOSAD |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
Migrating to optimal RBAC with minimal perturbation. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
20 | Vijay Atluri |
Panel on role engineering. |
SACMAT |
2008 |
DBLP DOI BibTeX RDF |
RBAC, role engineering, role mining |
20 | Pierre Parrend, Stéphane Frénot |
Component-Based Access Control: Secure Software Composition through Static Analysis. |
SC@ETAPS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Yang Zhao, John Boyland |
A Fundamental Permission Interpretation for Ownership Types. |
TASE |
2008 |
DBLP DOI BibTeX RDF |
Ownership, Permission |
20 | Ruth Breu, Gerhard Popp, Muhammad Alam |
Model based development of access policies. |
Int. J. Softw. Tools Technol. Transf. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hassan Takabi, Morteza Amini, Rasool Jalili |
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Mika Koganeyama, Naoshi Tabuchi, Takaaki Tateishi |
Reducing Unnecessary Conservativeness in Access Rights Analysis with String Analysis. |
APSEC |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Lilong Han, Qingtang Liu, Zongkai Yang |
Role-based Administration of User-role Assignment and Its Oracle Implementation. |
I3E (2) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Le Xuan Hung, Sungyoung Lee, Young-Koo Lee, Heejo Lee |
Activity-based Access Control Model to Hospital Information. |
RTCSA |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Martin J. Kollingbaum, Wamberto Weber Vasconcelos, Andrés García-Camino, Timothy J. Norman |
Managing Conflict Resolution in Norm-Regulated Environments. |
ESAW |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Andrés García-Camino, Juan A. Rodríguez-Aguilar, Wamberto Weber Vasconcelos |
A Distributed Architecture for Norm Management in Multi-Agent Systems. |
COIN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Manigandan Radhakrishnan, Jon A. Solworth |
Application security support in the operating system kernel. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
authorization properties, access controls, operating systems, authorization, information flow, separation of duty |
20 | Ninghui Li, Mahesh V. Tripunitara, Qihua Wang |
Resiliency policies in access control. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
fault-tolerant, access control, policy design |
20 | Frode Hansen, Vladimir A. Oleshchuk |
Location-based Security Framework for use of Handheld Devices in Medical Information Systems. |
PerCom Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 751 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ >>] |
|