The SCEAS System
Navigation Menu

Search the dblp DataBase


Jason Crampton: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jason Crampton
    On permissions, inheritance and role hierarchies. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2003, pp:85-92 [Conf]
  2. Jason Crampton
    Understanding and developing role-based administrative models. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:158-167 [Conf]
  3. M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle
    Extended privilege inheritance in RBAC. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:383-385 [Conf]
  4. Kaijun Tan, Jason Crampton, Carl A. Gunter
    The Consistency of Task-Based Authorization Constraints in Workflow Systems. [Citation Graph (0, 0)][DBLP]
    CSFW, 2004, pp:155-0 [Conf]
  5. Jason Crampton, Keith Martin, Peter Wild
    On Key Assignment for Hierarchical Access Control. [Citation Graph (0, 0)][DBLP]
    CSFW, 2006, pp:98-111 [Conf]
  6. Jason Crampton
    Discretionary and Mandatory Controls for Role-Based Administration. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:194-208 [Conf]
  7. Jason Crampton, Hemanth Khambhammettu
    Delegation in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2006, pp:174-191 [Conf]
  8. Elisa Bertino, Jason Crampton, Federica Paci
    Access Control and Authorization Constraints for WS-BPEL. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:275-284 [Conf]
  9. Jason Crampton
    Administrative scope and role hierarchy operations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:145-154 [Conf]
  10. Jason Crampton
    Specifying and enforcing constraints in role-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:43-50 [Conf]
  11. Jason Crampton
    A reference monitor for workflow systems with constrained task execution. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:38-47 [Conf]
  12. Jason Crampton, Wing Leung, Konstantin Beznosov
    The secondary and approximate authorization model and its application to Bell-LaPadula policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:111-120 [Conf]
  13. James Skene, Allan Skene, Jason Crampton, Wolfgang Emmerich
    The monitorability of service-level agreements for application-service provision. [Citation Graph (0, 0)][DBLP]
    WOSP, 2007, pp:3-14 [Conf]
  14. Jason Crampton, George Loizou, Greg O'Shea
    A Logic of Access Control. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2001, v:44, n:1, pp:54-66 [Journal]
  15. Jason Crampton, George Loizou, Greg O'Shea
    A Logic of Access Control. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2001, v:44, n:2, pp:137-149 [Journal]
  16. Allan Tucker, Jason Crampton, Stephen Swift
    RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    Evolutionary Computation, 2005, v:13, n:4, pp:477-499 [Journal]
  17. Jason Crampton, Hemanth Khambhammettu
    Access control in a distributed object environment using XML and roles. [Citation Graph (0, 0)][DBLP]
    South African Computer Journal, 2003, v:31, n:, pp:2-8 [Journal]
  18. Jason Crampton, George Loizou
    Authorisation and antichains. [Citation Graph (0, 0)][DBLP]
    Operating Systems Review, 2001, v:35, n:3, pp:6-15 [Journal]
  19. Jason Crampton, George Loizou
    Administrative scope: A foundation for role-based administrative models. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:2, pp:201-231 [Journal]
  20. Steve Counsell, Stephen Swift, Jason Crampton
    The interpretation and utility of three cohesion metrics for object-oriented design. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Softw. Eng. Methodol., 2006, v:15, n:2, pp:123-149 [Journal]
  21. Allan Tucker, Stephen Swift, Jason Crampton
    Efficiency updates for the restricted growth function GA for grouping problems. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:1536- [Conf]
  22. Stephen Swift, Allan Tucker, Jason Crampton, David Garway-Heath
    An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:2174-2181 [Conf]
  23. Liang Chen, Jason Crampton
    Inter-domain role mapping and least privilege. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:157-162 [Conf]
  24. Stephen Swift, Amy Shi, Jason Crampton, Allan Tucker
    ICARUS: intelligent coupon allocation for retailers using search. [Citation Graph (0, 0)][DBLP]
    Congress on Evolutionary Computation, 2005, pp:182-189 [Conf]

  25. On spatio-temporal constraints and inheritance in role-based access control. [Citation Graph (, )][DBLP]

  26. Constructing Key Assignment Schemes from Chain Partitions. [Citation Graph (, )][DBLP]

  27. Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]

  28. An Authorization Framework Resilient to Policy Evaluation Failures. [Citation Graph (, )][DBLP]

  29. Set Covering Problems in Role-Based Access Control. [Citation Graph (, )][DBLP]

  30. On delegation and workflow execution models. [Citation Graph (, )][DBLP]

  31. RBAC administration in distributed systems. [Citation Graph (, )][DBLP]

  32. Authorization recycling in RBAC systems. [Citation Graph (, )][DBLP]

  33. Delegation and satisfiability in workflow systems. [Citation Graph (, )][DBLP]

  34. Role Signatures for Access Control in Open Distributed Systems. [Citation Graph (, )][DBLP]

  35. Applications of the Oriented Permission Role-Based Access Control Model. [Citation Graph (, )][DBLP]

  36. What can identity-based cryptography offer to web services? [Citation Graph (, )][DBLP]

  37. Applying hierarchical and role-based access control to XML documents. [Citation Graph (, )][DBLP]

  38. A Framework for Enforcing Constrained RBAC Policies. [Citation Graph (, )][DBLP]

  39. Trade-Offs in Cryptographic Implementations of Temporal Access Control. [Citation Graph (, )][DBLP]

  40. Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies [Citation Graph (, )][DBLP]

Search in 0.023secs, Finished in 0.026secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002