The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Morteza Amini: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Conflict Detection and Resolution in Context-Aware Authorization. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:505-511 [Conf]
  2. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Context-Aware Provisional Access Control. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:132-146 [Conf]
  3. Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
    Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:192-203 [Conf]
  4. Morteza Amini, Rasool Jalili, Hamid Reza Shahriari
    RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2006, v:25, n:6, pp:459-468 [Journal]
  5. Hassan Takabi, Morteza Amini, Rasool Jalili
    Trust-Based User-Role Assignment in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    AICCSA, 2007, pp:807-814 [Conf]

  6. PTO: A Trust Ontology for Pervasive Environments. [Citation Graph (, )][DBLP]


  7. Handling Context in a Semantic-Based Access Control Framework. [Citation Graph (, )][DBLP]


  8. A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  9. Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. [Citation Graph (, )][DBLP]


  10. A Logic for Multi-domain Authorization Considering Administrators. [Citation Graph (, )][DBLP]


  11. A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. [Citation Graph (, )][DBLP]


  12. A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. [Citation Graph (, )][DBLP]


  13. Trust Inference in Web-Based Social Networks Using Resistive Networks. [Citation Graph (, )][DBLP]


  14. Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  15. Enhancing Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]


  16. A semantic-based access control mechanism using semantic technologies. [Citation Graph (, )][DBLP]


  17. A Context-Aware Access Control Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP]


  18. A Semantic aware Access Control model with real time constraints on history of accesses. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002