The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Keith Irwin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Keith Irwin, Ting Yu
    Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf]
  2. Keith Irwin, Ting Yu, William H. Winsborough
    On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf]
  3. Mazen Kharbutli, Keith Irwin, Yan Solihin, Jaejin Lee
    Using Prime Numbers for Cache Indexing to Eliminate Conflict Misses. [Citation Graph (0, 0)][DBLP]
    HPCA, 2004, pp:288-299 [Conf]
  4. Keith Irwin, Ting Yu
    An identifiability-based access control model for privacy protection in open systems. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:43- [Conf]
  5. Keith Irwin, Ting Yu
    Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:47-50 [Conf]
  6. Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun
    On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:555-566 [Conf]

  7. Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP]


  8. Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP]


  9. Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP]


  10. The Complexity and Application of Syntactic Pattern Recognition Using Finite Inductive Strings. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002