Search the dblp DataBase
Ken Moody :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jean Bacon , David W. Chadwick , Alexander Otenko , Ken Moody Persistent versus Dynamic Role Membership. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:344-357 [Conf ] Ken Moody Coordinating Policy for Federated Applications. [Citation Graph (0, 0)][DBLP ] DBSec, 2000, pp:127-134 [Conf ] András Belokosztolszki , David M. Eyers , Peter R. Pietzuch , Jean Bacon , Ken Moody Role-based access control for publish/subscribe middleware architectures. [Citation Graph (0, 0)][DBLP ] DEBS, 2003, pp:- [Conf ] David M. Eyers , Ken Moody Credential negotiation with limited disclosure via iterative range refinement in an unordered space. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:427-431 [Conf ] Zhixue Wu , Ken Moody , Jean Bacon , Robert J. Stroud Data consistency in a distributed persistent object system. [Citation Graph (0, 0)][DBLP ] HICSS (2), 1995, pp:635-644 [Conf ] Richard Hayton , Ken Moody An Open Architecture for Secure Interworking Services. [Citation Graph (0, 0)][DBLP ] ICDCS, 1997, pp:0-0 [Conf ] Luis Vargas , Jean Bacon , Ken Moody Integrating Databases with Publish/Subscribe. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2005, pp:392-397 [Conf ] Daniel Cvrcek , Ken Moody Combining Trust and Risk to Reduce the Cost of Attacks. [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:372-383 [Conf ] Nathan Dimmock , Jean Bacon , David Ingram , Ken Moody Risk Models for Trust-Based Access Control(TBAC). [Citation Graph (0, 0)][DBLP ] iTrust, 2005, pp:364-371 [Conf ] Ken Moody , Marco A. Palomino SharpSpider: Spidering the Web through Web Services. [Citation Graph (0, 0)][DBLP ] LA-WEB, 2003, pp:219-221 [Conf ] Jean Bacon , David M. Eyers , Ken Moody , Lauri I. W. Pesonen Securing Publish/Subscribe for Multi-domain Systems. [Citation Graph (0, 0)][DBLP ] Middleware, 2005, pp:1-20 [Conf ] Jean Bacon , Ken Moody , Walt Yao Access Control and Trust in the Use of Widely Distributed Services. [Citation Graph (0, 0)][DBLP ] Middleware, 2001, pp:295-310 [Conf ] John H. Hine , Walt Yao , Jean Bacon , Ken Moody An Architecture for Distributed OASIS Services. [Citation Graph (0, 0)][DBLP ] Middleware, 2000, pp:104-120 [Conf ] Jean Bacon , Michael Lloyd , Ken Moody Translating Role-Based Access Control Policy within Context. [Citation Graph (0, 0)][DBLP ] POLICY, 2001, pp:107-119 [Conf ] András Belokosztolszki , David M. Eyers , Ken Moody Policy Contexts: Controlling Information Flow in Parameterised RBAC. [Citation Graph (0, 0)][DBLP ] POLICY, 2003, pp:99-110 [Conf ] András Belokosztolszki , Ken Moody Meta-Policies for Distributed Role-Based Access Control Systems. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:106-115 [Conf ] András Belokosztolszki , Ken Moody , David M. Eyers A Formal Model for Hierarchical Policy Contexts. [Citation Graph (0, 0)][DBLP ] POLICY, 2004, pp:127-136 [Conf ] Jean Bacon , Alexis Hombrecher , Chaoying Ma , Ken Moody , Walt Yao Event Storage and Federation Using ODMG. [Citation Graph (0, 0)][DBLP ] POS, 2000, pp:265-281 [Conf ] Ken Moody Concurrency. [Citation Graph (0, 0)][DBLP ] POS, 1994, pp:127-128 [Conf ] Nathan Dimmock , András Belokosztolszki , David M. Eyers , Jean Bacon , Ken Moody Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2004, pp:156-162 [Conf ] Walt Yao , Ken Moody , Jean Bacon A model of OASIS role-based access control and its support for active security. [Citation Graph (0, 0)][DBLP ] SACMAT, 2001, pp:171-181 [Conf ] Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody Modular, Extensible Storage Services through Object Interfaces. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1994, pp:141-146 [Conf ] John Bates , Jean Bacon , Ken Moody , Mark D. Spiteri Using events for the scalable federation of heterogeneous components. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1998, pp:58-65 [Conf ] Tim Mills , Ken Moody Wide-area information access to multimedia historical sources. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:59-66 [Conf ] Richard Hayton , Jean Bacon , John Bates , Ken Moody Using events to build large scale distributed applications. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:9-16 [Conf ] Richard Hayton , Ken Moody An open architecture for secure interworking services. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1996, pp:233-240 [Conf ] Ken Moody Authentication in a distributed system during partition. [Citation Graph (0, 0)][DBLP ] ACM SIGOPS European Workshop, 1988, pp:- [Conf ] Agathoniki Trigoni , Ken Moody Using Association Rules to Add or Eliminate Query Constraints Automatically. [Citation Graph (0, 0)][DBLP ] SSDBM, 2001, pp:124-133 [Conf ] Luis Vargas , Jean Bacon , Ken Moody Transactions in Distributed Event-Based Middleware. [Citation Graph (0, 0)][DBLP ] CEC/EEE, 2006, pp:53- [Conf ] András Belokosztolszki , David M. Eyers , Wei Wang , Ken Moody Policy Storage for Role-Based Access Control Systems. [Citation Graph (0, 0)][DBLP ] WETICE, 2003, pp:196-201 [Conf ] Jean Bacon , Ken Moody Toward open, secure, widely distributed services. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2002, v:45, n:6, pp:59-64 [Journal ] Tim Mills , Ken Moody , Kerry Rodden Providing World Wide Access to Historical Sources. [Citation Graph (0, 0)][DBLP ] Computer Networks, 1997, v:29, n:8-13, pp:1317-1325 [Journal ] Jean Bacon , Ken Moody , John Bates , Richard Hayton , Chaoying Ma , Andrew McNeil , Oliver Seidel , Mark D. Spiteri Generic Support for Distributed Applications. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2000, v:33, n:3, pp:68-76 [Journal ] Zhixue Wu , Robert J. Stroud , Ken Moody , Jean Bacon The design and implementation of a distributed transaction system based on atomic data types. [Citation Graph (0, 0)][DBLP ] Distributed Systems Engineering, 1995, v:2, n:1, pp:50-0 [Journal ] Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody Extensible Access Control for a Hierarchy of Servers. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1994, v:28, n:3, pp:4-15 [Journal ] Jean Bacon , Ken Moody , Sue Thomson , Tim Wilson A Multi-Service Storage Architecture. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1991, v:25, n:4, pp:47-65 [Journal ] Jean Bacon , Ken Moody , Walt Yao Access control and trust in the use of widely distributed services. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 2003, v:33, n:4, pp:375-394 [Journal ] T. J. King , Ken Moody The Design and Implementation of CODD. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1983, v:13, n:1, pp:67-78 [Journal ] Ken Moody , Martin Richards A Coroutine Mechanism for BCPL. [Citation Graph (0, 0)][DBLP ] Softw., Pract. Exper., 1980, v:10, n:10, pp:765-771 [Journal ] Jean Bacon , Ken Moody , Walt Yao A model of OASIS role-based access control and its support for active security. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2002, v:5, n:4, pp:492-540 [Journal ] Dynamic trust domains for secure, private, technology-assisted living. [Citation Graph (, )][DBLP ] Event-Driven Database Information Sharing. [Citation Graph (, )][DBLP ] The SpaTeC composite event language for spatio-temporal reasoning in mobile systems. [Citation Graph (, )][DBLP ] Relational database support for event-based middleware functionality. [Citation Graph (, )][DBLP ] Compile-Time Enforcement of Dynamic Security Policies. [Citation Graph (, )][DBLP ] Policy-Based Information Sharing in Publish/Subscribe Middleware. [Citation Graph (, )][DBLP ] Access Control in an Open Distributed Environment. [Citation Graph (, )][DBLP ] Cobra: A new approach to IR System design. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.455secs