The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nataraj Nagaratnam: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nataraj Nagaratnam, Steven B. Byrne
    Resource Access Control for an Internet User Agent. [Citation Graph (0, 0)][DBLP]
    COOTS, 1997, pp:199-208 [Conf]
  2. Nataraj Nagaratnam, Doug Lea
    Secure Delegation for Distributed Object Environments. [Citation Graph (0, 0)][DBLP]
    COOTS, 1998, pp:101-116 [Conf]
  3. Nataraj Nagaratnam, Doug Lea
    Role-Based Protection and Delegation for Mobile Object Environments. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1998, pp:295- [Conf]
  4. David Del Vecchio, Marty Humphrey, Jim Basney, Nataraj Nagaratnam
    CredEx: User-Centric Credential Management for Grid and Web Services. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:149-156 [Conf]
  5. Nataraj Nagaratnam, Doug Lea
    Practical delegation for secure distributed object environments. [Citation Graph (0, 0)][DBLP]
    Distributed Systems Engineering, 1998, v:5, n:4, pp:168-178 [Journal]
  6. Maryann Hondo, Nataraj Nagaratnam, Anthony J. Nadalin
    Securing Web services. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2002, v:41, n:2, pp:228-241 [Journal]
  7. Larry Koved, Anthony J. Nadalin, Nataraj Nagaratnam, Marco Pistoia, Theodore Shrader
    Security challenges for Enterprise Java in an e-business environment. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2001, v:40, n:1, pp:130-0 [Journal]
  8. Nataraj Nagaratnam, Anthony J. Nadalin, Maryann Hondo, Michael McIntosh, Paula Austel
    Business-driven application security: From modeling to managing secure applications. [Citation Graph (0, 0)][DBLP]
    IBM Systems Journal, 2005, v:44, n:4, pp:847-868 [Journal]
  9. Alan Ganek, Anthony J. Nadalin, Nataraj Nagaratnam, Dinesh Verma
    An autonomic approach for managing security and identity management policies in enterprises. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:291-300 [Journal]

  10. Security for a Smarter Planet. [Citation Graph (, )][DBLP]


  11. Securing service-oriented applications. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002