The SCEAS System
Navigation Menu

Search the dblp DataBase


Joerg Abendroth: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Joerg Abendroth
    Aktive Strategien zur Schutzzielverletzungserkennung durch eine kontrollierte Machtteilung in der Zugriffskontrollarchitektur. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2004, pp:99-112 [Conf]
  2. Joerg Abendroth, Christian Damsgaard Jensen
    A Unified Security Framework for Networked Applications. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:351-357 [Conf]
  3. Joerg Abendroth, Christian Damsgaard Jensen
    Partial outsourcing: a new paradigm for access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:134-141 [Conf]

  4. A Formal P3P Semantics for Composite Services. [Citation Graph (, )][DBLP]

  5. A Mechanism for Requesting Hierarchical documetns in XACML. [Citation Graph (, )][DBLP]

  6. Trust for Location-Based Authorisation. [Citation Graph (, )][DBLP]

  7. Trust for Location-based Authorisation [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002