|
Journals in DBLP
- Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati
A comparison of modeling strategies in defining XML-based access control languages. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Paolo Ceravolo
Extracting role hierarchies from authentication data flows. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Giles Hogben
The formation of software agreements between autonomous agents. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon
Trustworthiness and CCCI metrics in P2P communication. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Ling Feng, Willem Jonker
Preparations for encrypted XML metadata querying. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Ernesto Damiani
Special issue: Semantics-Aware Techniques for Security. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Robert Tolksdorf, Christian Bizer, Rainer Eckstein, Ralf Heese
Trustable B2C markets on the semantic web. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Ernesto Damiani
Semantics-aware techniques for security. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Naren Kodali, Csilla Farkas, Duminda Wijesekera
Specifying multimedia access control using RDF. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
- Frédéric Cuppens, Alexandre Miège
AdOrBAC: an administration model for Or-BAC. [Citation Graph (0, 0)][DBLP] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
|