The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steve Barker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steve Barker
    Data Protection by Logic Programming. [Citation Graph (0, 0)][DBLP]
    Computational Logic, 2000, pp:1300-1314 [Conf]
  2. Steve Barker
    Protecting Deductive Databases from Unauthorized Retrievals. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:185-196 [Conf]
  3. Steve Barker
    Deductive Database Security. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:103-114 [Conf]
  4. Steve Barker
    Web Resource Usage Control in RSCLP. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:281-294 [Conf]
  5. Steve Barker
    Temporal Authorization in the Simplified Event Calculus. [Citation Graph (0, 0)][DBLP]
    DBSec, 1999, pp:271-284 [Conf]
  6. Steve Barker, Paul Douglas
    RBAC Policy Implementation for SQL Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2003, pp:288-301 [Conf]
  7. Steve Barker, Paul Douglas, Terry Fanning
    Implementing RBAC Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:27-36 [Conf]
  8. Steve Barker, Maribel Fernández
    Term Rewriting for Access Control. [Citation Graph (0, 0)][DBLP]
    DBSec, 2006, pp:179-193 [Conf]
  9. Steve Barker, Arnon Rosenthal
    Flexible Security Policies in SQL. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:167-180 [Conf]
  10. Steve Barker
    An Expert System for Intelligent Database Design. [Citation Graph (0, 0)][DBLP]
    IC-AI, 1999, pp:143-148 [Conf]
  11. Steve Barker
    Information Security: A Logic Based Approach. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2000, pp:9-14 [Conf]
  12. Steve Barker, Paul Douglas
    Extended Protected Databases: A Practical Implementation. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:456-459 [Conf]
  13. Steve Barker, Paul Douglas
    An Intelligent Tutoring System for Database Transaction Processing. [Citation Graph (0, 0)][DBLP]
    ICEIS (2), 2004, pp:197-203 [Conf]
  14. Steve Barker
    Access Control for Deductive Databases by Logic Programming. [Citation Graph (0, 0)][DBLP]
    ICLP, 2002, pp:54-69 [Conf]
  15. Steve Barker
    Labeled Logic Programs. [Citation Graph (0, 0)][DBLP]
    ICLP, 2004, pp:448-449 [Conf]
  16. Steve Barker
    Access Policy Specification for Web Applications. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:45-49 [Conf]
  17. Steve Barker, Paul Douglas
    An E-Learning Tool for Understanding Schedule Properties. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:53-0 [Conf]
  18. Steve Barker, Paul Douglas
    Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:523-527 [Conf]
  19. Steve Barker, Paul Douglas
    An Intelligent Tutoring System for Program Semantics. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:482-487 [Conf]
  20. Paul Douglas, Steve Barker
    Dependency Theory E-Learning Tool. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:151-155 [Conf]
  21. Paul Douglas, Steve Barker
    An E-learning tool for Database Administration. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2005, pp:453-458 [Conf]
  22. Steve Barker
    TRBAC: A Temporal Authorization Model. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2001, pp:178-188 [Conf]
  23. Steve Barker
    Distributed Access Control: A Logic-Based Approach. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2003, pp:217-228 [Conf]
  24. Steve Barker
    Secure Deductive Databases. [Citation Graph (0, 0)][DBLP]
    PADL, 2001, pp:123-137 [Conf]
  25. Steve Barker, Michael Leuschel, Mauricio Varea
    Efficient and flexible access control via logic program specialisation. [Citation Graph (0, 0)][DBLP]
    PEPM, 2004, pp:190-199 [Conf]
  26. Steve Barker
    Protecting deductive databases from unauthorized retrieval and update requests. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:43, n:3, pp:293-315 [Journal]
  27. Steve Barker, Peter J. Stuckey
    Flexible access control policy specification with constraint logic programming. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:4, pp:501-546 [Journal]
  28. Clara Bertolissi, Maribel Fernández, Steve Barker
    Dynamic Event-Based Access Control as Term Rewriting. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:195-210 [Conf]
  29. Steve Barker, Paul Douglas
    Secure knowledge exchange by policy algebra and erml. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2007, pp:212-217 [Conf]
  30. Steve Barker
    Action-status access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:195-204 [Conf]

  31. Dynamic Meta-level Access Control in SQL. [Citation Graph (, )][DBLP]


  32. Panel Session: What Are the Key Challenges in Distributed Security?. [Citation Graph (, )][DBLP]


  33. A Logic of Privacy. [Citation Graph (, )][DBLP]


  34. Access control by action control. [Citation Graph (, )][DBLP]


  35. The next 700 access control models or a unifying meta-model? [Citation Graph (, )][DBLP]


  36. Personalizing access control by generalizing access control. [Citation Graph (, )][DBLP]


  37. Action Control by Term Rewriting. [Citation Graph (, )][DBLP]


  38. Event-oriented Web-based E-trading. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002