Search the dblp DataBase
Keith Irwin :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Keith Irwin , Ting Yu Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf ] Keith Irwin , Ting Yu , William H. Winsborough On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf ] Mazen Kharbutli , Keith Irwin , Yan Solihin , Jaejin Lee Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses. [Citation Graph (0, 0)][DBLP ] HPCA, 2004, pp:288-299 [Conf ] Keith Irwin , Ting Yu An identifiability-based access control model for privacy protection in open systems. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:43- [Conf ] Keith Irwin , Ting Yu Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:47-50 [Conf ] Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , Ji-Won Byun On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:555-566 [Conf ] Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP ] Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP ] Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP ] The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs