|
Search the dblp DataBase
Michael J. Covington:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad
A Context-Aware Security Architecture for Emerging Applications. [Citation Graph (0, 0)][DBLP] ACSAC, 2002, pp:249-260 [Conf]
- Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu
SecureBus: towards application-transparent trusted computing with mandatory access control. [Citation Graph (0, 0)][DBLP] ASIACCS, 2007, pp:117-126 [Conf]
- Manoj B. Sastry, Michael J. Covington, Deepak J. Manohar
Securing Collaborative Applications. [Citation Graph (0, 0)][DBLP] Security and Management, 2006, pp:501-508 [Conf]
- Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran
Parameterized Authentication. [Citation Graph (0, 0)][DBLP] ESORICS, 2004, pp:276-292 [Conf]
- Michael J. Covington, Manoj R. Sastry
A Contextual Attribute-Based Access Control Model. [Citation Graph (0, 0)][DBLP] OTM Workshops (2), 2006, pp:1996-2006 [Conf]
- Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd
Securing context-aware applications using environment roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2001, pp:10-20 [Conf]
- Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2006, pp:180-189 [Conf]
- Michael J. Covington, Manoj R. Sastry, Deepak J. Manohar
Attribute-Based Authentication Model for Dynamic Mobile Environments. [Citation Graph (0, 0)][DBLP] SPC, 2006, pp:227-242 [Conf]
- Ravi S. Sandhu, Xinwen Zhang, Kumar Ranganathan, Michael J. Covington
Client-side access control enforcement using trusted computing and PEI models. [Citation Graph (0, 0)][DBLP] J. High Speed Networks, 2006, v:15, n:3, pp:229-245 [Journal]
Patient-centric authorization framework for sharing electronic health records. [Citation Graph (, )][DBLP]
Access Control Model for Sharing Composite Electronic Health Records. [Citation Graph (, )][DBLP]
SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|