|
Search the dblp DataBase
Michael Hitchens:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael Hitchens, Rajan Shankaran, Vijay Varadharajan
Securing the Ad-Hoc On-demand Distance Vector Protocol. [Citation Graph (0, 0)][DBLP] ISCA PDCS, 2004, pp:353-360 [Conf]
- Michael Hitchens, Vijay Varadharajan, Gregory Saunders
Policy Administration Domains. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:286-302 [Conf]
- Gregory Saunders, Michael Hitchens, Vijay Varadharajan
An Analysis of Access Control Models. [Citation Graph (0, 0)][DBLP] ACISP, 1999, pp:281-293 [Conf]
- Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
Security Issues in Asynchronous Transfer Mode. [Citation Graph (0, 0)][DBLP] ACISP, 1997, pp:76-89 [Conf]
- Michael Hitchens, Vijay Varadharajan
esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. [Citation Graph (0, 0)][DBLP] ACSAC, 1996, pp:105-116 [Conf]
- John Rosenberg, Michael Hitchens
Linguistic Support for Persistent Modules and Capabilities. [Citation Graph (0, 16)][DBLP] DBPL, 1993, pp:32-49 [Conf]
- Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi
Secure Authorisation for Web Services. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:163-175 [Conf]
- Michael Hollins, John Rosenberg, Michael Hitchens
Subtyping and Protection in Persistent Programming Languages. [Citation Graph (0, 0)][DBLP] HICSS (1), 1997, pp:543-0 [Conf]
- Huu Tran, Michael Hitchens, Vijay Varadharajan, Paul Andrew Watters
A Trust based Access Control Framework for P2P File-Sharing Systems. [Citation Graph (0, 0)][DBLP] HICSS, 2005, pp:- [Conf]
- Michael Hitchens, John Rosenberg
A Three-level Object-Based Model. [Citation Graph (0, 0)][DBLP] ICCL, 1994, pp:148-158 [Conf]
- Simon Chong, Paul Andrew Watters, Michael Hitchens
Automated Physical Storage Provision Using a Peer-to-Peer Distributed File System. [Citation Graph (0, 0)][DBLP] ICDE Workshops, 2005, pp:1214- [Conf]
- Michael Hitchens, Vijay Varadharajan
RBAC for XML Document Stores. [Citation Graph (0, 0)][DBLP] ICICS, 2001, pp:131-143 [Conf]
- Michael Hitchens, Vijay Varadharajan
Issues in the Design of a Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP] ICICS, 1999, pp:22-38 [Conf]
- Gregory Saunders, Michael Hitchens, Vijay Varadharajan
Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP] ICICS, 2003, pp:145-157 [Conf]
- Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
A Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP] ICPADS, 2001, pp:297-304 [Conf]
- Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
Authorization Service for Web Services and its Implementation. [Citation Graph (0, 0)][DBLP] ICWS, 2004, pp:774-777 [Conf]
- Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. [Citation Graph (0, 0)][DBLP] ISWS, 2005, pp:35-44 [Conf]
- Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Secure Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP] LCN, 2001, pp:296-323 [Conf]
- Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Secure Multicast Extensions for Mobile Networks. [Citation Graph (0, 0)][DBLP] LCN, 1999, pp:106-116 [Conf]
- Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
Security services and public key infrastructure for ATM networks. [Citation Graph (0, 0)][DBLP] LCN, 1997, pp:253-263 [Conf]
- Michael Hitchens, Vijay Varadharajan, Gregory Saunders
Security Policy Management in Distributed Systems. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2002, pp:290-294 [Conf]
- Rajan Shankaran, Vijay Varadharajan, Michael Hitchens
Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. [Citation Graph (0, 0)][DBLP] IASTED PDCS, 2002, pp:851-856 [Conf]
- Michael Hitchens, Vijay Varadharajan
Tower: A Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP] POLICY, 2001, pp:88-106 [Conf]
- Michael Hitchens, Vijay Varadharajan
Elements of a Language for Role-Based Access Control. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:371-380 [Conf]
- Michael Hitchens, Judy Kay, Bob Kummerfeld, Ajay Brar
Secure Identity Management for Pseudo-Anonymous Service Access. [Citation Graph (0, 0)][DBLP] SPC, 2005, pp:48-55 [Conf]
- Anders Tychsen, Michael Hitchens
Ghost Worlds - Time and Consequence in MMORPGs. [Citation Graph (0, 0)][DBLP] TIDSE, 2006, pp:300-311 [Conf]
- Anders Tychsen, Jonas Heide Smith, Michael Hitchens, Susana Pajares Tosca
Communication in Multi-player Role Playing Games - The Effect of Medium. [Citation Graph (0, 0)][DBLP] TIDSE, 2006, pp:277-288 [Conf]
- Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens
Architectural Framework for Web Services Authorization. [Citation Graph (0, 0)][DBLP] WSMDEIS, 2005, pp:75-84 [Conf]
- Michael Hitchens, Andrew Firmage
The Design of a Flexible Class Library Management System. [Citation Graph (0, 0)][DBLP] TOOLS (24), 1997, pp:60-69 [Conf]
- Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
Security for cluster based ad hoc networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 2004, v:27, n:5, pp:488-501 [Journal]
- Vijay Varadharajan, Rajan Shankaran, Michael Hitchens
On the design of secure ATM networks. [Citation Graph (0, 0)][DBLP] Computer Communications, 1999, v:22, n:15-16, pp:1512-1525 [Journal]
- Michael Richmond, Michael Hitchens
A New Process Migration Algorithm. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 1997, v:31, n:1, pp:31-42 [Journal]
- Gregory Saunders, Michael Hitchens, Vijay Varadharajan
Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP] Operating Systems Review, 2001, v:35, n:4, pp:6-20 [Journal]
ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. [Citation Graph (, )][DBLP]
Trust management for trusted computing platforms in web services. [Citation Graph (, )][DBLP]
Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]
On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. [Citation Graph (, )][DBLP]
Critical Issues in Trust Management for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]
Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. [Citation Graph (, )][DBLP]
Verbal Communication of Story Facilitators in Multi-player Role-Playing Games. [Citation Graph (, )][DBLP]
Motivations for play in computer role-playing games. [Citation Graph (, )][DBLP]
Property Based Attestation and Trusted Computing: Analysis and Challenges. [Citation Graph (, )][DBLP]
Character play: the use of game characters in multi-player role-playing games across platforms. [Citation Graph (, )][DBLP]
Group play: determining factors on the gaming experience in multiplayer role-playing games. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.007secs
|