Search the dblp DataBase
Jason Crampton :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jason Crampton On permissions, inheritance and role hierarchies. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2003, pp:85-92 [Conf ] Jason Crampton Understanding and developing role-based administrative models. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:158-167 [Conf ] M. A. C. Dekker , J. G. Cederquist , Jason Crampton , Sandro Etalle Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:383-385 [Conf ] Kaijun Tan , Jason Crampton , Carl A. Gunter The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 2004, pp:155-0 [Conf ] Jason Crampton , Keith Martin , Peter Wild On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP ] CSFW, 2006, pp:98-111 [Conf ] Jason Crampton Discretionary and Mandatory Controls for Role-Based Administration. [Citation Graph (0, 0)][DBLP ] DBSec, 2006, pp:194-208 [Conf ] Jason Crampton , Hemanth Khambhammettu Delegation in Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ESORICS, 2006, pp:174-191 [Conf ] Elisa Bertino , Jason Crampton , Federica Paci Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP ] ICWS, 2006, pp:275-284 [Conf ] Jason Crampton Administrative scope and role hierarchy operations. [Citation Graph (0, 0)][DBLP ] SACMAT, 2002, pp:145-154 [Conf ] Jason Crampton Specifying and enforcing constraints in role-based access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2003, pp:43-50 [Conf ] Jason Crampton A reference monitor for workflow systems with constrained task execution. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:38-47 [Conf ] Jason Crampton , Wing Leung , Konstantin Beznosov The secondary and approximate authorization model and its application to Bell-LaPadula policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:111-120 [Conf ] James Skene , Allan Skene , Jason Crampton , Wolfgang Emmerich The monitorability of service-level agreements for application-service provision. [Citation Graph (0, 0)][DBLP ] WOSP, 2007, pp:3-14 [Conf ] Jason Crampton , George Loizou , Greg O'Shea A Logic of Access Control. [Citation Graph (0, 0)][DBLP ] Comput. J., 2001, v:44, n:1, pp:54-66 [Journal ] Jason Crampton , George Loizou , Greg O'Shea A Logic of Access Control. [Citation Graph (0, 0)][DBLP ] Comput. J., 2001, v:44, n:2, pp:137-149 [Journal ] Allan Tucker , Jason Crampton , Stephen Swift RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms. [Citation Graph (0, 0)][DBLP ] Evolutionary Computation, 2005, v:13, n:4, pp:477-499 [Journal ] Jason Crampton , Hemanth Khambhammettu Access control in a distributed object environment using XML and roles. [Citation Graph (0, 0)][DBLP ] South African Computer Journal, 2003, v:31, n:, pp:2-8 [Journal ] Jason Crampton , George Loizou Authorisation and antichains. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2001, v:35, n:3, pp:6-15 [Journal ] Jason Crampton , George Loizou Administrative scope: A foundation for role-based administrative models. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:201-231 [Journal ] Steve Counsell , Stephen Swift , Jason Crampton The interpretation and utility of three cohesion metrics for object-oriented design. [Citation Graph (0, 0)][DBLP ] ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:2, pp:123-149 [Journal ] Allan Tucker , Stephen Swift , Jason Crampton Efficiency updates for the restricted growth function GA for grouping problems. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:1536- [Conf ] Stephen Swift , Allan Tucker , Jason Crampton , David Garway-Heath An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data. [Citation Graph (0, 0)][DBLP ] GECCO, 2007, pp:2174-2181 [Conf ] Liang Chen , Jason Crampton Inter-domain role mapping and least privilege. [Citation Graph (0, 0)][DBLP ] SACMAT, 2007, pp:157-162 [Conf ] Stephen Swift , Amy Shi , Jason Crampton , Allan Tucker ICARUS: intelligent coupon allocation for retailers using search. [Citation Graph (0, 0)][DBLP ] Congress on Evolutionary Computation, 2005, pp:182-189 [Conf ] On spatio-temporal constraints and inheritance in role-based access control. [Citation Graph (, )][DBLP ] Constructing Key Assignment Schemes from Chain Partitions. [Citation Graph (, )][DBLP ] Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP ] An Authorization Framework Resilient to Policy Evaluation Failures. [Citation Graph (, )][DBLP ] Set Covering Problems in Role-Based Access Control. [Citation Graph (, )][DBLP ] On delegation and workflow execution models. [Citation Graph (, )][DBLP ] RBAC administration in distributed systems. [Citation Graph (, )][DBLP ] Authorization recycling in RBAC systems. [Citation Graph (, )][DBLP ] Delegation and satisfiability in workflow systems. [Citation Graph (, )][DBLP ] Role Signatures for Access Control in Open Distributed Systems. [Citation Graph (, )][DBLP ] Applications of the Oriented Permission Role-Based Access Control Model. [Citation Graph (, )][DBLP ] What can identity-based cryptography offer to web services? [Citation Graph (, )][DBLP ] Applying hierarchical and role-based access control to XML documents. [Citation Graph (, )][DBLP ] A Framework for Enforcing Constrained RBAC Policies. [Citation Graph (, )][DBLP ] Trade-Offs in Cryptographic Implementations of Temporal Access Control. [Citation Graph (, )][DBLP ] Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies [Citation Graph (, )][DBLP ] Search in 0.023secs, Finished in 0.026secs