Computers and Privacy: A Survey
ACM Computing Surveys (CSUR)
Third Generation Computer Systems
ACM Computing Surveys (CSUR)
An operating system based on the concept of a supervisory computer
Communications of the ACM
A hardware architecture for implementing protection rings
Communications of the ACM
Protection in an information processing utility
Communications of the ACM
Programming semantics for multiprogrammed computations
Communications of the ACM
Time Sharing Computer Systems
The HITAC5020 time sharing system
ACM '69 Proceedings of the 1969 24th national conference
CONTROLLED INFORMATION SHARING IN A COMPUTER UTILITY
CONTROLLED INFORMATION SHARING IN A COMPUTER UTILITY
SOSP '69 Proceedings of the second symposium on Operating systems principles
Address mapping and the control of access in an interactive computer
AFIPS '67 (Spring) Proceedings of the April 18-20, 1967, spring joint computer conference
AFIPS '69 (Fall) Proceedings of the November 18-20, 1969, fall joint computer conference
Untransferable rights in a client-independent server environment
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Secure databases: protection against user influence
ACM Transactions on Database Systems (TODS)
MIERA: Method for Inter-Enterprise Role-Based Authorization
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Modelling Security Policies in Hypermedia and Web-Based Applications
Web Engineering, Software Engineering and Web Application Development
Managing user relationships in hierarchies for information system security
Decision Support Systems
Formal Models of Capability-Based Protection Systems
IEEE Transactions on Computers
Capability Based Tagged Architectures
IEEE Transactions on Computers
Operating systems principles and undergraduate computer science curricula
AFIPS '72 (Spring) Proceedings of the May 16-18, 1972, spring joint computer conference
AFIPS '72 (Fall, part I) Proceedings of the December 5-7, 1972, fall joint computer conference, part I
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
The application of cryptography for data base security
AFIPS '76 Proceedings of the June 7-10, 1976, national computer conference and exposition
Verifiable secure operating system software
AFIPS '74 Proceedings of the May 6-10, 1974, national computer conference and exposition
Resiliency Policies in Access Control
ACM Transactions on Information and System Security (TISSEC)
A conceptual framework for Group-Centric secure information sharing
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
IBM Systems Journal
Data base security: requirements, policies, and models
IBM Systems Journal
Towards a times-based usage control model
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
On flexible modeling of history-based access control policies for XML documents
KES'07/WIRN'07 Proceedings of the 11th international conference, KES 2007 and XVII Italian workshop on neural networks conference on Knowledge-based intelligent information and engineering systems: Part III
A system architecture for history-based access control for XML documents
ICICS'07 Proceedings of the 9th international conference on Information and communications security
A privacy preservation model for facebook-style social network systems
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
The long quest for universal information access
Communications of the ACM
Filter-based access control model: exploring a more usable database management
Proceedings of the 4th Symposium on Computer Human Interaction for the Management of Information Technology
Group-centric models for secure and agile information sharing
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
An empirical assessment of approaches to distributed enforcement in role-based access control (RBAC)
Proceedings of the first ACM conference on Data and application security and privacy
Relationship-based access control: protection model and policy language
Proceedings of the first ACM conference on Data and application security and privacy
Concerning "Modeling" of computer security
SP'88 Proceedings of the 1988 IEEE conference on Security and privacy
A file protection system based on a trapdoor one-way hash function
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
An authorization scheme for version control systems
Proceedings of the 16th ACM symposium on Access control models and technologies
Automatic error finding in access-control policies
Proceedings of the 18th ACM conference on Computer and communications security
Counterfactually reasoning about security
Proceedings of the 4th international conference on Security of information and networks
User-managed access control for health care systems
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Access control requirements for preventing insider threats
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
A formal privacy system and its application to location based services
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
The structure of authority: why security is not a separable concern
MOZ'04 Proceedings of the Second international conference on Multiparadigm Programming in Mozart/Oz
Foundation for a time interval access control model
MMM-ACNS'05 Proceedings of the Third international conference on Mathematical Methods, Models, and Architectures for Computer Network Security
Towards access control model engineering
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Graceful privilege reduction in RFID security
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Dependable and Historic Computing
Interprocess communications in functionally distributed systems
Computer Communications
Information systems security: Scope, state-of-the-art, and evaluation of techniques
International Journal of Information Management: The Journal for Information Professionals
The authorization leap from rights to attributes: maturation or chaos?
Proceedings of the 17th ACM symposium on Access Control Models and Technologies
Enhancing directory virtualization to detect insider activity
Security and Communication Networks
From MDM to DB2: a case study of security enforcement migration
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Leveraging "choice" to automate authorization hook placement
Proceedings of the 2012 ACM conference on Computer and communications security
Information Systems and e-Business Management
Hi-index | 0.02 |