The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ken Moody: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody
    Persistent versus Dynamic Role Membership. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:344-357 [Conf]
  2. Ken Moody
    Coordinating Policy for Federated Applications. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:127-134 [Conf]
  3. András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody
    Role-based access control for publish/subscribe middleware architectures. [Citation Graph (0, 0)][DBLP]
    DEBS, 2003, pp:- [Conf]
  4. David M. Eyers, Ken Moody
    Credential negotiation with limited disclosure via iterative range refinement in an unordered space. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:427-431 [Conf]
  5. Zhixue Wu, Ken Moody, Jean Bacon, Robert J. Stroud
    Data consistency in a distributed persistent object system. [Citation Graph (0, 0)][DBLP]
    HICSS (2), 1995, pp:635-644 [Conf]
  6. Richard Hayton, Ken Moody
    An Open Architecture for Secure Interworking Services. [Citation Graph (0, 0)][DBLP]
    ICDCS, 1997, pp:0-0 [Conf]
  7. Luis Vargas, Jean Bacon, Ken Moody
    Integrating Databases with Publish/Subscribe. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2005, pp:392-397 [Conf]
  8. Daniel Cvrcek, Ken Moody
    Combining Trust and Risk to Reduce the Cost of Attacks. [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:372-383 [Conf]
  9. Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody
    Risk Models for Trust-Based Access Control(TBAC). [Citation Graph (0, 0)][DBLP]
    iTrust, 2005, pp:364-371 [Conf]
  10. Ken Moody, Marco A. Palomino
    SharpSpider: Spidering the Web through Web Services. [Citation Graph (0, 0)][DBLP]
    LA-WEB, 2003, pp:219-221 [Conf]
  11. Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen
    Securing Publish/Subscribe for Multi-domain Systems. [Citation Graph (0, 0)][DBLP]
    Middleware, 2005, pp:1-20 [Conf]
  12. Jean Bacon, Ken Moody, Walt Yao
    Access Control and Trust in the Use of Widely Distributed Services. [Citation Graph (0, 0)][DBLP]
    Middleware, 2001, pp:295-310 [Conf]
  13. John H. Hine, Walt Yao, Jean Bacon, Ken Moody
    An Architecture for Distributed OASIS Services. [Citation Graph (0, 0)][DBLP]
    Middleware, 2000, pp:104-120 [Conf]
  14. Jean Bacon, Michael Lloyd, Ken Moody
    Translating Role-Based Access Control Policy within Context. [Citation Graph (0, 0)][DBLP]
    POLICY, 2001, pp:107-119 [Conf]
  15. András Belokosztolszki, David M. Eyers, Ken Moody
    Policy Contexts: Controlling Information Flow in Parameterised RBAC. [Citation Graph (0, 0)][DBLP]
    POLICY, 2003, pp:99-110 [Conf]
  16. András Belokosztolszki, Ken Moody
    Meta-Policies for Distributed Role-Based Access Control Systems. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:106-115 [Conf]
  17. András Belokosztolszki, Ken Moody, David M. Eyers
    A Formal Model for Hierarchical Policy Contexts. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:127-136 [Conf]
  18. Jean Bacon, Alexis Hombrecher, Chaoying Ma, Ken Moody, Walt Yao
    Event Storage and Federation Using ODMG. [Citation Graph (0, 0)][DBLP]
    POS, 2000, pp:265-281 [Conf]
  19. Ken Moody
    Concurrency. [Citation Graph (0, 0)][DBLP]
    POS, 1994, pp:127-128 [Conf]
  20. Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
    Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:156-162 [Conf]
  21. Walt Yao, Ken Moody, Jean Bacon
    A model of OASIS role-based access control and its support for active security. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:171-181 [Conf]
  22. Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody
    Modular, Extensible Storage Services through Object Interfaces. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1994, pp:141-146 [Conf]
  23. John Bates, Jean Bacon, Ken Moody, Mark D. Spiteri
    Using events for the scalable federation of heterogeneous components. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1998, pp:58-65 [Conf]
  24. Tim Mills, Ken Moody
    Wide-area information access to multimedia historical sources. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:59-66 [Conf]
  25. Richard Hayton, Jean Bacon, John Bates, Ken Moody
    Using events to build large scale distributed applications. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:9-16 [Conf]
  26. Richard Hayton, Ken Moody
    An open architecture for secure interworking services. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1996, pp:233-240 [Conf]
  27. Ken Moody
    Authentication in a distributed system during partition. [Citation Graph (0, 0)][DBLP]
    ACM SIGOPS European Workshop, 1988, pp:- [Conf]
  28. Agathoniki Trigoni, Ken Moody
    Using Association Rules to Add or Eliminate Query Constraints Automatically. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2001, pp:124-133 [Conf]
  29. Luis Vargas, Jean Bacon, Ken Moody
    Transactions in Distributed Event-Based Middleware. [Citation Graph (0, 0)][DBLP]
    CEC/EEE, 2006, pp:53- [Conf]
  30. András Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody
    Policy Storage for Role-Based Access Control Systems. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:196-201 [Conf]
  31. Jean Bacon, Ken Moody
    Toward open, secure, widely distributed services. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2002, v:45, n:6, pp:59-64 [Journal]
  32. Tim Mills, Ken Moody, Kerry Rodden
    Providing World Wide Access to Historical Sources. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 1997, v:29, n:8-13, pp:1317-1325 [Journal]
  33. Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri
    Generic Support for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2000, v:33, n:3, pp:68-76 [Journal]
  34. Zhixue Wu, Robert J. Stroud, Ken Moody, Jean Bacon
    The design and implementation of a distributed transaction system based on atomic data types. [Citation Graph (0, 0)][DBLP]
    Distributed Systems Engineering, 1995, v:2, n:1, pp:50-0 [Journal]
  35. Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody
    Extensible Access Control for a Hierarchy of Servers. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1994, v:28, n:3, pp:4-15 [Journal]
  36. Jean Bacon, Ken Moody, Sue Thomson, Tim Wilson
    A Multi-Service Storage Architecture. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 1991, v:25, n:4, pp:47-65 [Journal]
  37. Jean Bacon, Ken Moody, Walt Yao
    Access control and trust in the use of widely distributed services. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2003, v:33, n:4, pp:375-394 [Journal]
  38. T. J. King, Ken Moody
    The Design and Implementation of CODD. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1983, v:13, n:1, pp:67-78 [Journal]
  39. Ken Moody, Martin Richards
    A Coroutine Mechanism for BCPL. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 1980, v:10, n:10, pp:765-771 [Journal]
  40. Jean Bacon, Ken Moody, Walt Yao
    A model of OASIS role-based access control and its support for active security. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2002, v:5, n:4, pp:492-540 [Journal]

  41. Dynamic trust domains for secure, private, technology-assisted living. [Citation Graph (, )][DBLP]


  42. Event-Driven Database Information Sharing. [Citation Graph (, )][DBLP]


  43. The SpaTeC composite event language for spatio-temporal reasoning in mobile systems. [Citation Graph (, )][DBLP]


  44. Relational database support for event-based middleware functionality. [Citation Graph (, )][DBLP]


  45. Compile-Time Enforcement of Dynamic Security Policies. [Citation Graph (, )][DBLP]


  46. Policy-Based Information Sharing in Publish/Subscribe Middleware. [Citation Graph (, )][DBLP]


  47. Access Control in an Open Distributed Environment. [Citation Graph (, )][DBLP]


  48. Cobra: A new approach to IR System design. [Citation Graph (, )][DBLP]


Search in 7.926secs, Finished in 7.927secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002