SIGMOD '87 Proceedings of the 1987 ACM SIGMOD international conference on Management of data
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Executive Briefing: Advances in Concurrency Control and Transaction Processing
Executive Briefing: Advances in Concurrency Control and Transaction Processing
Enforcing well-formed and partially-formed transactions for Unix
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Multilateral security a concept and examples for balanced security
Proceedings of the 2000 workshop on New security paradigms
A new dimension in access control: studying maintenance engineering across organizational boundaries
CSCW '02 Proceedings of the 2002 ACM conference on Computer supported cooperative work
Moving from the design of usable security technologies to the design of useful secure applications
Proceedings of the 2002 workshop on New security paradigms
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
DIS '04 Proceedings of the 5th conference on Designing interactive systems: processes, practices, methods, and techniques
A study of preferences for sharing and privacy
CHI '05 Extended Abstracts on Human Factors in Computing Systems
NSPW '05 Proceedings of the 2005 workshop on New security paradigms
Enforcing well-formed and partially-formed transactions for Unix
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Physical Access Control for Captured RFID Data
IEEE Pervasive Computing
Physical, Social, and Experiential Knowledge in Pervasive Computing Environments
IEEE Pervasive Computing
End-user privacy in human-computer interaction
Foundations and Trends in Human-Computer Interaction
Extending access control models with break-glass
Proceedings of the 14th ACM symposium on Access control models and technologies
Computer-supported access control
ACM Transactions on Computer-Human Interaction (TOCHI)
A Flexible Access Control Model for Distributed Collaborative Editors
SDM '09 Proceedings of the 6th VLDB Workshop on Secure Data Management
Securing medical records on smart phones
Proceedings of the first ACM workshop on Security and privacy in medical and home-care systems
Laissez-faire file sharing: access control designed for individuals at the endpoints
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
A calculus for the qualitative risk assessment of policy override authorization
Proceedings of the 3rd international conference on Security of information and networks
Distributed data usage control for web applications: a social network implementation
Proceedings of the first ACM conference on Data and application security and privacy
Rumpole: a flexible break-glass access control model
Proceedings of the 16th ACM symposium on Access control models and technologies
Quantifying the quality of web authentication mechanisms: a usability perspective
Journal of Web Engineering
Managing Information Access in Data-Rich Enterprises with Escalation and Incentives
International Journal of Electronic Commerce
Towards a mechanism for discretionary overriding of access control
SP'04 Proceedings of the 12th international conference on Security Protocols
Deriving implementation-level policies for usage control enforcement
Proceedings of the second ACM conference on Data and Application Security and Privacy
UbiComp'05 Proceedings of the 7th international conference on Ubiquitous Computing
Protecting privacy during peer-to-peer exchange of medical documents
Information Systems Frontiers
On the Prevention of Fraud and Privacy Exposure in Process Information Flow
INFORMS Journal on Computing
Access control hygiene and the empathy gap in medical IT
HealthSec'12 Proceedings of the 3rd USENIX conference on Health Security and Privacy
Enhancing optimistic access controls with usage control
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Usage control in service-oriented architectures
TrustBus'07 Proceedings of the 4th international conference on Trust, Privacy and Security in Digital Business
Data usage control enforcement in distributed systems
Proceedings of the third ACM conference on Data and application security and privacy
Generic support for RBAC break-glass policies in process-aware information systems
Proceedings of the 28th Annual ACM Symposium on Applied Computing
CAAC -- An Adaptive and Proactive Access Control Approach for Emergencies in Smart Infrastructures
ACM Transactions on Autonomous and Adaptive Systems (TAAS) - Special Section on Best Papers from SEAMS 2012
Hi-index | 0.00 |