-
1
-
-
84869687610
-
-
http://www.w3.org/RDF/.
-
-
-
-
2
-
-
84869665698
-
-
http://www.w3.org/TR/rdf-sparql-query/.
-
-
-
-
3
-
-
49949098518
-
Enabling advanced and context-dependent access control in RDF stores
-
F. Abel, J. L. De Coi, N. Henze, A. W. Koesling, D. Krause, and D. Olmedilla. Enabling advanced and context-dependent access control in RDF stores. Lecture Notes In Computer Science, 2007.
-
(2007)
Lecture Notes in Computer Science
-
-
Abel, F.1
De Coi, J.L.2
Henze, N.3
Koesling, A.W.4
Krause, D.5
Olmedilla, D.6
-
8
-
-
34547260252
-
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
-
First European Semantic Web Symposium, ESWS 2004 Heraklion, Crete, Greece, May 10-12, 2004 Proceedings
-
[8] R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. Lecture Notes in Computer Science, 3053:342-356, 2004. (Pubitemid 38699485)
-
(2004)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.3053
, pp. 342-356
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
-
10
-
-
0001619596
-
Flexible Support for Multiple Access Control Policies
-
DOI 10.1145/383891.383894
-
[10] S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmanian. Flexible support for multiple access control policies. ACM Transactions on Database Systems, 25(2):214-260, 2001. (Pubitemid 33661632)
-
(2001)
ACM Transactions on Database Systems
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
12
-
-
1142268572
-
KAoS semantic policy and domain services: An application of DAML to web services-based grid architectures
-
M. Johnson, P. Chang, R. Jeffers, J. M. Bradshaw, V. W. S. and M. R. Breedy, L. Bunch, S. Kulkami, J. Lott, N. Suri, and Uszok. KAoS semantic policy and domain services: An application of DAML to web services-based grid architectures. Proceedings of the workshop on Web Services and Agent-Based Engineering, 2003.
-
(2003)
Proceedings of the Workshop on Web Services and Agent-Based Engineering
-
-
Johnson, M.1
Chang, P.2
Jeffers, R.3
Bradshaw, J.M.V.W.S.4
Breedy, M.R.5
Bunch, L.6
Kulkami, S.7
Lott, J.8
Suri, N.9
Uszok10
-
13
-
-
4344716019
-
Authorization and privacy for semantic web services
-
L. Kagal, M. Paolucci, N. Srinivasan, G. Denker, T. Finin, and K. Sycara. Authorization and privacy for semantic web services. IEEE Intelligent Systems, 19(4):50-56, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Paolucci, M.2
Srinivasan, N.3
Denker, G.4
Finin, T.5
Sycara, K.6
-
14
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
E. C. Lupu and M. Sloman. Conflicts in policy-based distributed systems management. IEEE Transactions on Software Engineering, 25(6):852-869, 1999.
-
(1999)
IEEE Transactions on Software Engineering
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
15
-
-
33748043984
-
Semantic access control for information interoperation
-
SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies
-
[15] C. Pan, P. Mitra, and P. Liu. Semantic access control for information interoperation. Proceedings of ACM Symposium on Access control models and technologies, pages 237-246, 2006. (Pubitemid 44300761)
-
(2006)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, vol.2006
, pp. 237-246
-
-
Pan, C.-C.1
Mitra, P.2
Liu, P.3
-
18
-
-
50649097954
-
SFINKS: Secure focused information, news, and knowledge sharing
-
T. Ryutov, T. Kichkaylo, R. Neches, and M. Orosz. SFINKS: Secure focused information, news, and knowledge sharing. IEEE International Conference on Technologies for Homeland Security, 2008.
-
(2008)
IEEE International Conference on Technologies for Homeland Security
-
-
Ryutov, T.1
Kichkaylo, T.2
Neches, R.3
Orosz, M.4
-
19
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
T. Y. C. Woo and S. S. Lam. Authorizations in distributed systems: A new approach. Journal of Computer Security, 2:107-136, 1993.
-
(1993)
Journal of Computer Security
, vol.2
, pp. 107-136
-
-
Woo, T.Y.C.1
Lam, S.S.2
|