|
Conferences in DBLP
- Nicola Zannone, Sushil Jajodia, Duminda Wijesekera
Creating Objects in the Flexible Authorization Framework. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:1-14 [Conf]
- Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani M. Thuraisingham
Detection and Resolution of Anomalies in Firewall Policy Rules. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:15-29 [Conf]
- Joachim Biskup, Lena Wiese
On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:30-43 [Conf]
- Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz
Consolidating the Access Control of Composite Applications and Workflows. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:44-59 [Conf]
- Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan
Authenticating Multi-dimensional Query Results in Data Publishing. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:60-73 [Conf]
- Julien Lafaye, David Gross-Amblard
XML Streams Watermarking. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:74-88 [Conf]
- Einar Mykletun, Gene Tsudik
Aggregation Queries in the Database-As-a-Service Model. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:89-103 [Conf]
- Nataliya Rassadko
Policy Classes and Query Rewriting Algorithm for XML Security Views. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:104-118 [Conf]
- Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia
Interactive Analysis of Attack Graphs Using Relational Queries. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:119-132 [Conf]
- Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
Notarized Federated Identity Management for Web Services. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:133-147 [Conf]
- Noa Tuval, Ehud Gudes
Resolving Information Flow Conflicts in RBAC Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:148-162 [Conf]
- Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann
Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:163-178 [Conf]
- Steve Barker, Maribel Fernández
Term Rewriting for Access Control. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:179-193 [Conf]
- Jason Crampton
Discretionary and Mandatory Controls for Role-Based Administration. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:194-208 [Conf]
- Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:209-223 [Conf]
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati
Enhancing User Privacy Through Data Handling Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:224-236 [Conf]
- Vijayalakshmi Atluri, Heechang Shin
Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:237-251 [Conf]
- Indrajit Ray, Sudip Chakraborty
A Framework for Flexible Access Control in Digital Library Systems. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:252-266 [Conf]
- Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe
Authrule: A Generic Rule-Based Authorization Module. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:267-281 [Conf]
- Geri Georg, Siv Hilde Houmb, Indrakshi Ray
Aspect-Oriented Risk Driven Development of Secure Applications. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:282-296 [Conf]
- Philip Robinson, Florian Kerschbaum, Andreas Schaad
From Business Process Choreography to Authorization Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:297-309 [Conf]
- Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu
Information Theoretical Analysis of Two-Party Secret Computation. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:310-317 [Conf]
|