The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Babak Sadighi Firozabadi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Babak Sadighi Firozabadi, Leendert W. N. van der Torre
    Formal Models of Control Systems. [Citation Graph (0, 0)][DBLP]
    ECAI, 1998, pp:317-318 [Conf]
  2. Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot
    Discretionary Overriding of Access Control in the Privilege Calculus. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:219-232 [Conf]
  3. Babak Sadighi Firozabadi, Marek J. Sergot
    Revocation Schemes for Delegated Authorities. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:210-213 [Conf]
  4. Babak Sadighi Firozabadi, Marek J. Sergot, Anna Cinzia Squicciarini, Elisa Bertino
    A Framework for Contractual Resource Sharing in Coalitions. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:117-126 [Conf]
  5. Olav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam
    Constrained Delegation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2002, pp:131-0 [Conf]
  6. Babak Sadighi Firozabadi
    Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:146-150 [Conf]
  7. Babak Sadighi Firozabadi, Marek J. Sergot
    Contractual Access Control. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2002, pp:96-103 [Conf]
  8. Babak Sadighi Firozabadi, Marek J. Sergot
    Power and Permission in Security Systems. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 1999, pp:48-59 [Conf]
  9. Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann
    Using Authority Certificates to Create Management Structures. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2001, pp:134-145 [Conf]
  10. Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot
    Towards a Mechanism for Discretionary Overriding of Access Control. [Citation Graph (0, 0)][DBLP]
    Security Protocols Workshop, 2004, pp:312-319 [Conf]
  11. Cristiano Castelfranchi, Rino Falcone, Babak Sadighi Firozabadi, Yao-Hua Tan
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Applied Artificial Intelligence, 2000, v:14, n:9, pp:863-865 [Journal]
  12. Cristiano Castelfranchi, Rino Falcone, Babak Sadighi Firozabadi, Yao-Hua Tan
    Guest Editorial. [Citation Graph (0, 0)][DBLP]
    Applied Artificial Intelligence, 2000, v:14, n:8, pp:763-768 [Journal]
  13. Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Babak Sadighi Firozabadi, Olle Mulmo
    Policy administration control and delegation using XACML and Delegent. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:49-54 [Conf]
  14. Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi
    A Classification of Delegation Schemes for Attribute Authority. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:158-169 [Conf]
  15. Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi
    Overriding of Access Control in XACML. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:87-95 [Conf]

Search in 0.009secs, Finished in 0.010secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002