|
Search the dblp DataBase
Rasool Jalili:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
Conflict Detection and Resolution in Context-Aware Authorization. [Citation Graph (0, 0)][DBLP] AINA Workshops (1), 2007, pp:505-511 [Conf]
- Sarah Javanmardi, Hadi Hemmati, Rasool Jalili
An Access Control Framework for Pervasive Computing Environments. [Citation Graph (0, 0)][DBLP] PSC, 2006, pp:97-103 [Conf]
- Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
Improved User Identity Confidentiality for UMTS Mobile Networks. [Citation Graph (0, 0)][DBLP] ECUMN, 2007, pp:401-409 [Conf]
- Rasool Jalili, Mohsen Rezvani
Specification and Verification of Security Policies in Firewalls. [Citation Graph (0, 0)][DBLP] EurAsia-ICT, 2002, pp:154-163 [Conf]
- Rasool Jalili, Frans A. Henskens
Using directed graphs to describe entity dependency in stable distributed persistent stores. [Citation Graph (0, 0)][DBLP] HICSS (2), 1995, pp:665-674 [Conf]
- Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili, Reza Zakeri, Ali Reza Omidian
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG). [Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:256-268 [Conf]
- Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
Context-Aware Provisional Access Control. [Citation Graph (0, 0)][DBLP] ICISS, 2006, pp:132-146 [Conf]
- Reza Zakeri, Rasool Jalili, Hamid Reza Shahriari, Hassan Abolhassani
Using Description Logics for Network Vulnerability Analysis. [Citation Graph (0, 0)][DBLP] ICN/ICONS/MCL, 2006, pp:78- [Conf]
- Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari
Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. [Citation Graph (0, 0)][DBLP] ISPEC, 2005, pp:192-203 [Conf]
- Frans A. Henskens, D. M. Koch, Rasool Jalili, John Rosenberg
Hardware Support for Stability in a Persistent Architecture. [Citation Graph (0, 0)][DBLP] POS, 1994, pp:387-399 [Conf]
- Behnam Sattarzadeh, Mahdi Asadpour, Rasool Jalili
Security Enhancement for a Low Computation Cost User Authentication Scheme. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:5-8 [Conf]
- Morteza Amini, Rasool Jalili, Hamid Reza Shahriari
RT-UNNID: A practical solution to real-time network-based intrusion detection using unsupervised neural networks. [Citation Graph (0, 0)][DBLP] Computers & Security, 2006, v:25, n:6, pp:459-468 [Journal]
- Mahdi Niamanesh, Nafiseh Fekrazad Nobakht, Rasool Jalili, Faranak Heydarian Dehkordi
On Validity Assurance of Dynamic Reconfiguration for Component-based Programs. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2006, v:159, n:, pp:227-239 [Journal]
- Hassan Takabi, Morteza Amini, Rasool Jalili
Trust-Based User-Role Assignment in Role-Based Access Control. [Citation Graph (0, 0)][DBLP] AICCSA, 2007, pp:807-814 [Conf]
- Mahdi Niamanesh, Rasool Jalili
A Dynamic-Reconfigurable Architecture for Protocol Stacks of Networked Systems. [Citation Graph (0, 0)][DBLP] COMPSAC (1), 2007, pp:609-612 [Conf]
- Mahdi Niamanesh, Rasool Jalili
Formalizing Compatibility and Substitutability in Communication Protocols Using I/O-Constraint Automata. [Citation Graph (0, 0)][DBLP] FSEN, 2007, pp:49-64 [Conf]
- Mahdi Niamanesh, Sirwah Sabetghadam, Reza Yousefzadeh Rahaghi, Rasool Jalili
Design and Implementation of a Dynamic-Reconfigurable Architecture for Protocol Stack. [Citation Graph (0, 0)][DBLP] FSEN, 2007, pp:396-403 [Conf]
- Mohammad Ebrahim Rafiei, Mohsen Taherian, Hamid Mousavi, Ali Movaghar, Rasool Jalili
Vulnerability Analysis in VGBPS Using Prolog. [Citation Graph (0, 0)][DBLP] FSEN, 2007, pp:404-411 [Conf]
An Architecture for a Context-aware Service Broker in Ubiquitous Computing Environments. [Citation Graph (, )][DBLP]
PTO: A Trust Ontology for Pervasive Environments. [Citation Graph (, )][DBLP]
Handling Context in a Semantic-Based Access Control Framework. [Citation Graph (, )][DBLP]
Self-reconfiguration in Highly Available Pervasive Computing Systems. [Citation Graph (, )][DBLP]
A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. [Citation Graph (, )][DBLP]
A Formalism for Recongurability Analysis in Distributed Non-Blocking Components. [Citation Graph (, )][DBLP]
Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. [Citation Graph (, )][DBLP]
A Logic for Multi-domain Authorization Considering Administrators. [Citation Graph (, )][DBLP]
A Temporal Description Logic Based Access Control Model for Expressing History Constrained Policies in Semantic Web. [Citation Graph (, )][DBLP]
A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. [Citation Graph (, )][DBLP]
Trust Inference in Web-Based Social Networks Using Resistive Networks. [Citation Graph (, )][DBLP]
Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]
Enhancing Role-Based Access Control Model through Fuzzy Relations. [Citation Graph (, )][DBLP]
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. [Citation Graph (, )][DBLP]
A semantic-based access control mechanism using semantic technologies. [Citation Graph (, )][DBLP]
FLMAP: A fast lightweight mutual authentication protocol for RFID systems. [Citation Graph (, )][DBLP]
A Semantic aware Access Control model with real time constraints on history of accesses. [Citation Graph (, )][DBLP]
Vulnerability Take Grant (VTG): An efficient approach to analyze network vulnerabilities. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.306secs
|