|
Search the dblp DataBase
Steve Barker:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Steve Barker
Data Protection by Logic Programming. [Citation Graph (0, 0)][DBLP] Computational Logic, 2000, pp:1300-1314 [Conf]
- Steve Barker
Protecting Deductive Databases from Unauthorized Retrievals. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:185-196 [Conf]
- Steve Barker
Deductive Database Security. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:103-114 [Conf]
- Steve Barker
Web Resource Usage Control in RSCLP. [Citation Graph (0, 0)][DBLP] DBSec, 2004, pp:281-294 [Conf]
- Steve Barker
Temporal Authorization in the Simplified Event Calculus. [Citation Graph (0, 0)][DBLP] DBSec, 1999, pp:271-284 [Conf]
- Steve Barker, Paul Douglas
RBAC Policy Implementation for SQL Databases. [Citation Graph (0, 0)][DBLP] DBSec, 2003, pp:288-301 [Conf]
- Steve Barker, Paul Douglas, Terry Fanning
Implementing RBAC Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2002, pp:27-36 [Conf]
- Steve Barker, Maribel Fernández
Term Rewriting for Access Control. [Citation Graph (0, 0)][DBLP] DBSec, 2006, pp:179-193 [Conf]
- Steve Barker, Arnon Rosenthal
Flexible Security Policies in SQL. [Citation Graph (0, 0)][DBLP] DBSec, 2001, pp:167-180 [Conf]
- Steve Barker
An Expert System for Intelligent Database Design. [Citation Graph (0, 0)][DBLP] IC-AI, 1999, pp:143-148 [Conf]
- Steve Barker
Information Security: A Logic Based Approach. [Citation Graph (0, 0)][DBLP] ICEIS, 2000, pp:9-14 [Conf]
- Steve Barker, Paul Douglas
Extended Protected Databases: A Practical Implementation. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2003, pp:456-459 [Conf]
- Steve Barker, Paul Douglas
An Intelligent Tutoring System for Database Transaction Processing. [Citation Graph (0, 0)][DBLP] ICEIS (2), 2004, pp:197-203 [Conf]
- Steve Barker
Access Control for Deductive Databases by Logic Programming. [Citation Graph (0, 0)][DBLP] ICLP, 2002, pp:54-69 [Conf]
- Steve Barker
Labeled Logic Programs. [Citation Graph (0, 0)][DBLP] ICLP, 2004, pp:448-449 [Conf]
- Steve Barker
Access Policy Specification for Web Applications. [Citation Graph (0, 0)][DBLP] ITCC (2), 2004, pp:45-49 [Conf]
- Steve Barker, Paul Douglas
An E-Learning Tool for Understanding Schedule Properties. [Citation Graph (0, 0)][DBLP] ITCC, 2003, pp:53-0 [Conf]
- Steve Barker, Paul Douglas
Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:523-527 [Conf]
- Steve Barker, Paul Douglas
An Intelligent Tutoring System for Program Semantics. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:482-487 [Conf]
- Paul Douglas, Steve Barker
Dependency Theory E-Learning Tool. [Citation Graph (0, 0)][DBLP] ITCC (1), 2004, pp:151-155 [Conf]
- Paul Douglas, Steve Barker
An E-learning tool for Database Administration. [Citation Graph (0, 0)][DBLP] ITCC (1), 2005, pp:453-458 [Conf]
- Steve Barker
TRBAC: A Temporal Authorization Model. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2001, pp:178-188 [Conf]
- Steve Barker
Distributed Access Control: A Logic-Based Approach. [Citation Graph (0, 0)][DBLP] MMM-ACNS, 2003, pp:217-228 [Conf]
- Steve Barker
Secure Deductive Databases. [Citation Graph (0, 0)][DBLP] PADL, 2001, pp:123-137 [Conf]
- Steve Barker, Michael Leuschel, Mauricio Varea
Efficient and flexible access control via logic program specialisation. [Citation Graph (0, 0)][DBLP] PEPM, 2004, pp:190-199 [Conf]
- Steve Barker
Protecting deductive databases from unauthorized retrieval and update requests. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 2002, v:43, n:3, pp:293-315 [Journal]
- Steve Barker, Peter J. Stuckey
Flexible access control policy specification with constraint logic programming. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:501-546 [Journal]
- Clara Bertolissi, Maribel Fernández, Steve Barker
Dynamic Event-Based Access Control as Term Rewriting. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:195-210 [Conf]
- Steve Barker, Paul Douglas
Secure knowledge exchange by policy algebra and erml. [Citation Graph (0, 0)][DBLP] ICEIS (1), 2007, pp:212-217 [Conf]
- Steve Barker
Action-status access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:195-204 [Conf]
Dynamic Meta-level Access Control in SQL. [Citation Graph (, )][DBLP]
Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]
A Logic of Privacy. [Citation Graph (, )][DBLP]
Access control by action control. [Citation Graph (, )][DBLP]
The next 700 access control models or a unifying meta-model? [Citation Graph (, )][DBLP]
Personalizing access control by generalizing access control. [Citation Graph (, )][DBLP]
Action Control by Term Rewriting. [Citation Graph (, )][DBLP]
Event-oriented Web-based E-trading. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.005secs
|