The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Janice Warner: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jaideep Vaidya, Vijayalakshmi Atluri, Janice Warner
    RoleMiner: mining roles using subset enumeration. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:144-153 [Conf]
  2. Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari
    A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:209-223 [Conf]
  3. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:252-266 [Conf]
  4. Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Robert Grossman, Vandana Pursnani Janeja, Janice Warner
    Secure interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP]
    DG.O, 2006, pp:124-125 [Conf]
  5. Nabil R. Adam, Vijayalakshmi Atluri, Rey Koslowski, Vandana Pursnani Janeja, Janice Warner, Aabhas V. Paliwal
    Agency interoperation for effective data mining in border control and homeland security applications. [Citation Graph (0, 0)][DBLP]
    DG.O, 2005, pp:285-286 [Conf]
  6. Vijayalakshmi Atluri, Janice Warner
    Automatic Enforcement of Access Control Policies Among Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    ICDCIT, 2004, pp:369-378 [Conf]
  7. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:134-147 [Conf]
  8. Vijayalakshmi Atluri, Janice Warner
    Supporting conditional delegation in secure workflow management systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:49-58 [Conf]
  9. Janice Warner, Vijayalakshmi Atluri
    Inter-instance authorization constraints for secure workflow management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:190-199 [Conf]
  10. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
    Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:235-244 [Conf]

  11. A citizen privacy protection model for e-government mashup services. [Citation Graph (, )][DBLP]


  12. Semantic and pragmatic annotation for government information discovery, sharing and collaboration. [Citation Graph (, )][DBLP]


  13. Social networking -- technology, tools, and applications: a hands-on tutorial to make the most of the conference. [Citation Graph (, )][DBLP]


  14. Semantic Annotation and Search for Deep Web Services. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002