The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael J. Covington: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad
    A Context-Aware Security Architecture for Emerging Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2002, pp:249-260 [Conf]
  2. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
    SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:117-126 [Conf]
  3. Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar
    Securing Collaborative Applications. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:501-508 [Conf]
  4. Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran
    Parameterized Authentication. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2004, pp:276-292 [Conf]
  5. Michael J. Covington, Manoj R. Sastry
    A Contextual Attribute-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    OTM Workshops (2), 2006, pp:1996-2006 [Conf]
  6. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd
    Securing context-aware applications using environment roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:10-20 [Conf]
  7. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
    A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:180-189 [Conf]
  8. Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar
    Attribute-Based Authentication Model for Dynamic Mobile Environments. [Citation Graph (0, 0)][DBLP]
    SPC, 2006, pp:227-242 [Conf]
  9. Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington
    Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP]
    J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal]

  10. Patient-centric authorization framework for sharing electronic health records. [Citation Graph (, )][DBLP]


  11. Access Control Model for Sharing Composite Electronic Health Records. [Citation Graph (, )][DBLP]


  12. SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002