-
1
-
-
78650410062
-
-
A Project10X Special Report, Wilshire Conferences, Inc
-
' Semantic wave-part 1 ', Technical Report, 2006, A Project10X Special Report, Wilshire Conferences, Inc.
-
(2006)
Semantic Wave-part 1, Technical Report
-
-
-
3
-
-
33750124112
-
-
Lena, F., Bhavani, T., (IOS Press, Hershey, PA, USA)
-
Weitzner, D.J., Hendler, J., Berners-Lee, T., and Connolly, D.: ' Creating a policy-aware web: discretionary, rule-based access for the World Wide Web ', Lena, F., Bhavani, T., Web and information security, (IOS Press, Hershey, PA, USA, 2004)
-
(2004)
Creating A Policy-aware Web: Discretionary, Rule-based Access for the World Wide Web, Web and Information Security
-
-
Weitzner, D.J.1
Hendler, J.2
Berners-Lee, T.3
Connolly, D.4
-
4
-
-
3142523600
-
A propositional policy algebra for access control
-
10.1145/762476.762481 1094-9224
-
Wijesekera, D., and Jajodia, S.: ' A propositional policy algebra for access control ', ACM Trans. Inf. Syst. Secur., 2003, 6, (2), p. 286-325 10.1145/762476.762481 1094-9224
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.2
, pp. 286-325
-
-
Wijesekera, D.1
Jajodia, S.2
-
5
-
-
11044225422
-
A policy-based approach to security for the semantic web
-
Florida, USA, October
-
Kagal, L., Finin, T., and Joshi, A.: ' A policy-based approach to security for the semantic web ', Proc. Second Int. Semantic Web Conf. (ISWC03), Sanibel Island, Florida, USA, October, 2003
-
(2003)
Proc. Second Int. Semantic Web Conf. (ISWC03), Sanibel Island
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
6
-
-
4344696700
-
KAoS policy management for semantic web services
-
1541-1672
-
Uszok, A., Bradshaw, J.M., and Johnson, M.: et al. ' KAoS policy management for semantic web services ', IEEE Intell. Syst., 2004, 19, (4), p. 32-41 1541-1672
-
(2004)
IEEE Intell. Syst.
, vol.19
, Issue.4
, pp. 32-41
-
-
Uszok, A.1
Bradshaw, J.M.2
Johnson, M.3
-
7
-
-
51849130014
-
New developments in ontology-based policy management: Increasing the practicality and comprehensiveness of KAoS
-
Palisades, NY, USA
-
Uszok, A., Bradshaw, J.M., and Lott, J.: et al. ' New developments in ontology-based policy management: increasing the practicality and comprehensiveness of KAoS ', Proc. IEEE Workshop on Policies for Distributed Systems and Networks (Policy'08), Palisades, NY, USA, 2008, p. 145-152
-
(2008)
Proc. IEEE Workshop on Policies for Distributed Systems and Networks (Policy'08)
, pp. 145-152
-
-
Uszok, A.1
Bradshaw, J.M.2
Lott, J.3
-
9
-
-
3543150771
-
Concept-level access control for the semantic web
-
New York, NY, USA
-
Qin, L., and Atluri, V.: ' Concept-level access control for the semantic web ', Proc. 2003 ACM Workshop on XML Security (XMLSEC'03), New York, NY, USA, 2003, p. 94-103
-
(2003)
Proc. 2003 ACM Workshop on XML Security (XMLSEC'03)
, pp. 94-103
-
-
Qin, L.1
Atluri, V.2
-
10
-
-
52249110791
-
SBAC: A semantic based access control model
-
Linkping, Sweden
-
Javanmardi, S., Amini, M., Jalili, R., and GanjiSaffar, Y.: ' SBAC: a semantic based access control model ', Proc. 11th Nordic Workshop on Secure IT-systems (NordSec2006), Linkping, Sweden, 2006, p. 157-168
-
(2006)
Proc. 11th Nordic Workshop on Secure IT-systems (NordSec2006)
, pp. 157-168
-
-
Javanmardi, S.1
Amini, M.2
Jalili, R.3
Ganjisaffar, Y.4
-
11
-
-
33750703611
-
Using semantic web technologies for policy management on the web
-
Boston, MA, USA
-
Kagal, L., Berners-Lee, T., Connolly, D., and Weitzner, D.: ' Using semantic web technologies for policy management on the web ', Proc. 21st National Conf. on Artificial Intelligence (AAAI06), Boston, MA, USA, 2006
-
(2006)
Proc. 21st National Conf. on Artificial Intelligence (AAAI06)
-
-
Kagal, L.1
Berners-Lee, T.2
Connolly, D.3
Weitzner, D.4
-
12
-
-
1142269204
-
DAML reality check: A case study of KAoS domain and policy services
-
Sanibel Island, Florida
-
Uszok, A., Bradshaw, J., and Hayes, P.: et al. ' DAML reality check: a case study of KAoS domain and policy services ', Proc. Int. Semantic Web Conf. (ISWC 03), Sanibel Island, Florida, 2003
-
(2003)
Proc. Int. Semantic Web Conf. (ISWC 03)
-
-
Uszok, A.1
Bradshaw, J.2
Hayes, P.3
-
13
-
-
78650389481
-
-
Technical, NSC-09-01, Sharif University of Technology, Sharif Network Security Center, Department of Computer Engineering, available at
-
2: logical language family for policy specification and inference ', Technical, NSC-09-01, Sharif University of Technology, Sharif Network Security Center, Department of Computer Engineering, 2009, available at http://ce.sharif.edu/~m-amini/publications/reports/madl2family.pdf
-
(2009)
2: Logical Language Family for Policy Specification and Inference
-
-
-
14
-
-
84887853842
-
A community authorization service for group collaboration
-
Monterey, CA, USA
-
Pearlman, L., Welch, V., Foster, I., Kesselman, C., and Tuecke, S.: ' A community authorization service for group collaboration ', Proc. Third IEEE Int. Workshop on Policies for Distributed Systems and Networks (Policy'02), Monterey, CA, USA, 2002, p. 50-59
-
(2002)
Proc. Third IEEE Int. Workshop on Policies for Distributed Systems and Networks (Policy'02)
, pp. 50-59
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
-
15
-
-
33751047889
-
Semantics-aware privacy and access control: Motivation and preliminary results
-
Ancona, Italy
-
Damiani, E., De Capitani di Vimercati, S., Fugazza, C., and Samarati, P.: ' Semantics-aware privacy and access control: motivation and preliminary results ', Proc. First Italian Semantic Web Workshop: Semantic Web Applications an Presepectives (SWAP04), Ancona, Italy, 2004
-
(2004)
Proc. First Italian Semantic Web Workshop: Semantic Web Applications An Presepectives (SWAP04)
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Fugazza, C.3
Samarati, P.4
-
16
-
-
62949114652
-
Supporting attribute-based access control in authorization and authentication infrastructures with ontologies
-
1000-9825
-
Priebe, T., Dobmeier, W., Schlager, C., and Kamprath, N.: ' Supporting attribute-based access control in authorization and authentication infrastructures with ontologies ', J. Softw., 2007, 2, (1), p. 27-38 1000-9825
-
(2007)
J. Softw.
, vol.2
, Issue.1
, pp. 27-38
-
-
Priebe, T.1
Dobmeier, W.2
Schlager, C.3
Kamprath, N.4
-
17
-
-
70350132503
-
An access control model for protecting semantic web resources
-
Athens, GA, USA
-
Javanmardi, S., Amini, M., and Jalili, R.: ' An access control model for protecting semantic web resources ', Proc. Second Int. Semantic Web Policy Workshop (SWPW'06) 2006, Athens, GA, USA, 2006, p. 32-46
-
(2006)
Proc. Second Int. Semantic Web Policy Workshop (SWPW'06) 2006
, pp. 32-46
-
-
Javanmardi, S.1
Amini, M.2
Jalili, R.3
-
18
-
-
84942767213
-
Applying the semantic web layers to access control
-
Prague, Czech Republic
-
Yague, M.I., Mana, A., Lopez, J., and Troya, J.M.: ' Applying the semantic web layers to access control ', Proc. 14th Int. Workshop on Database and Expert Systems Applications (DEXA'03), Prague, Czech Republic, 2003, p. 622-626
-
(2003)
Proc. 14th Int. Workshop on Database and Expert Systems Applications (DEXA'03)
, pp. 622-626
-
-
Yague, M.I.1
Mana, A.2
Lopez, J.3
Troya, J.M.4
-
19
-
-
33646047759
-
Semantic access control model: A formal specification
-
Milan, Italy
-
Yague, M., del Mar Gallardo, M., and Mana, A.: ' Semantic access control model: a formal specification ', Proc. Tenth European Symp. on Research in Computer Security (ESORICS'05), (LNCS, 3679), Milan, Italy, 2005, p. 24-43
-
(2005)
Proc. Tenth European Symp. on Research in Computer Security (ESORICS'05), (LNCS, 3679)
, pp. 24-43
-
-
Yague, M.1
Del Mar Gallardo, M.2
Mana, A.3
-
21
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
Kagal, L., Finin, T., and Joshi, A.: ' Trust-based security in pervasive computing environments ', IEEE Comput., 2001, 34, (12), p. 154-157
-
(2001)
IEEE Comput.
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
22
-
-
11044223672
-
Access-control language for multidomain environments
-
10.1109/MIC.2004.53 1089-7801
-
Joshi, J.B.D., Bhatti, R., Bertino, E., and Ghafoor, A.: ' Access-control language for multidomain environments ', IEEE Internet Comput., 2004, 8, (6), p. 40-50 10.1109/MIC.2004.53 1089-7801
-
(2004)
IEEE Internet Comput.
, vol.8
, Issue.6
, pp. 40-50
-
-
Joshi, J.B.D.1
Bhatti, R.2
Bertino, E.3
Ghafoor, A.4
-
23
-
-
38449085573
-
Domain based access control model for distributed collaborative applications
-
Amsterdam, Netherlands
-
Demchenko, Y., de Laat, C., Gommans, L., and van Buuren, R.: ' Domain based access control model for distributed collaborative applications ', Proc. Second IEEE Int. Conf. on e-Science and Grid Computing, Amsterdam, Netherlands, 2006
-
(2006)
Proc. Second IEEE Int. Conf. on E-Science and Grid Computing
-
-
Demchenko, Y.1
De Laat, C.2
Gommans, L.3
Van Buuren, R.4
-
24
-
-
47849100993
-
A request-driven role mapping for secure interoperation in multi-domain environment
-
Dalian, China
-
Tang, Z., Li, R., and Lu, Z.: ' A request-driven role mapping for secure interoperation in multi-domain environment ', Proc. IFIP Int. Conf. on Network and Parallel Computing Workshops (NPC 2007), Dalian, China, 2007, p. 83-90
-
(2007)
Proc. IFIP Int. Conf. on Network and Parallel Computing Workshops (NPC 2007)
, pp. 83-90
-
-
Tang, Z.1
Li, R.2
Lu, Z.3
-
25
-
-
66149172248
-
A calculus for composite authorities' policy derivation in shared domains of pervasive computing environments
-
Bangladesh
-
Amini, M., and Jalili, R.: ' A calculus for composite authorities' policy derivation in shared domains of pervasive computing environments ', Proc. IEEE Int. Workshop on Internet and Distributed Computing Systems (IDCS'08), Bangladesh, 2008, p. 21-28
-
(2008)
Proc. IEEE Int. Workshop on Internet and Distributed Computing Systems (IDCS'08)
, pp. 21-28
-
-
Amini, M.1
Jalili, R.2
-
26
-
-
0345829056
-
Provisions and obligations in policy rule management
-
10.1023/A:1025711105609
-
Bettini, C., Jajodia, S., Sean Wang, X., and Wijesekera, D.: ' Provisions and obligations in policy rule management ', J. Netw. Syst. Manag., 2003, 11, (3), p. 351-372 10.1023/A:1025711105609
-
(2003)
J. Netw. Syst. Manag.
, vol.11
, Issue.3
, pp. 351-372
-
-
Bettini, C.1
Jajodia, S.2
Sean Wang, X.3
Wijesekera, D.4
-
27
-
-
34748868971
-
Specifying and enforcing high-level semantic obligation policies
-
Bologna, Italy
-
Liu, Z., Ranganathan, A., and Riabov, A.: ' Specifying and enforcing high-level semantic obligation policies ', Proc. Eigth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY'07), Bologna, Italy, 2007, p. 119-128
-
(2007)
Proc. Eigth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY'07)
, pp. 119-128
-
-
Liu, Z.1
Ranganathan, A.2
Riabov, A.3
-
28
-
-
26844561996
-
Specification of access control and certification policies for semantic web services
-
Copenhagen, (LNCS, 3590)
-
Agarwal, S., and Sprick, B.: ' Specification of access control and certification policies for semantic web services ', Proc. Sixth Int. Conf. on Electronic Commerce and Web Technologies (EC-Web 05), Copenhagen, 2005, p. 348-357, (LNCS, 3590)
-
(2005)
Proc. Sixth Int. Conf. on Electronic Commerce and Web Technologies (EC-Web 05)
, pp. 348-357
-
-
Agarwal, S.1
Sprick, B.2
-
29
-
-
79952798740
-
Using subject-and object-specific attributes for access control in web-based knowledge management systems
-
Amherst, NY, USA
-
Stermsek, G., Strembeck, M., and Neumann, G.: ' Using subject-and object-specific attributes for access control in web-based knowledge management systems ', Proc. Workshop on Secure Knowledge Management (SKM'04), Amherst, NY, USA, 2004
-
(2004)
Proc. Workshop on Secure Knowledge Management (SKM'04)
-
-
Stermsek, G.1
Strembeck, M.2
Neumann, G.3
-
30
-
-
35248854573
-
Context-aware provisional access control
-
Kolkata, India, (LNCS, 4332)
-
Masoumzadeh, A., Amini, M., and Jalili, R.: ' Context-aware provisional access control ', Proc. Second Int. Conf. on Information Systems Security (ICISS'06), Kolkata, India, 2006, p. 132-146, (LNCS, 4332)
-
(2006)
Proc. Second Int. Conf. on Information Systems Security (ICISS'06)
, pp. 132-146
-
-
Masoumzadeh, A.1
Amini, M.2
Jalili, R.3
-
31
-
-
50249151921
-
A context-aware access control model for pervasive computing environments
-
Jeju Island, Korea
-
Emami, S.S., Amini, M., and Zokaei, S.: ' A context-aware access control model for pervasive computing environments ', Proc. IEEE Int. Conf. on Intelligent Pervasive Computing (IPC 2007), Jeju Island, Korea, 2007, p. 51-56
-
(2007)
Proc. IEEE Int. Conf. on Intelligent Pervasive Computing (IPC 2007)
, pp. 51-56
-
-
Emami, S.S.1
Amini, M.2
Zokaei, S.3
-
32
-
-
37149051976
-
KAoS policy and domain services: Toward a description-logic approach to policy representation, deconiction, and enforcement
-
Washington, DC, USA
-
Uszok, A., Bradshaw, J., and Jeffers, R.: et al. ' KAoS policy and domain services: toward a description-logic approach to policy representation, deconiction, and enforcement ', Proc. Fourth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY'03), Washington, DC, USA, 2003, p. 93
-
(2003)
Proc. Fourth IEEE Int. Workshop on Policies for Distributed Systems and Networks (POLICY'03)
, pp. 93
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
-
33
-
-
0033333334
-
Conflicts in policy-based distributed systems management
-
0098-5589
-
Lupu, E.C., and Sloman, M.: ' Conflicts in policy-based distributed systems management ', IEEE Trans. Softw. Eng., 1999, 25, (6), p. 852-869 0098-5589
-
(1999)
IEEE Trans. Softw. Eng.
, vol.25
, Issue.6
, pp. 852-869
-
-
Lupu, E.C.1
Sloman, M.2
-
36
-
-
35048813491
-
OWL-S semantics of security web services: A case study
-
Heraklion, Greece
-
Denker, G., Nguyen, S., and Ton, A.: ' OWL-S semantics of security web services: a case study ', Proc. First European Semantic Web Symp., Heraklion, Greece, 2004, p. 240-253
-
(2004)
Proc. First European Semantic Web Symp.
, pp. 240-253
-
-
Denker, G.1
Nguyen, S.2
Ton, A.3
-
37
-
-
70350647453
-
A semantic-based access control mechanism using semantic technologies
-
Gazimagusa, North Cyprus
-
Ehsan, M.A., Amini, M., and Jalili, R.: ' A semantic-based access control mechanism using semantic technologies ', Proc. Second Int. Conf. on Security of Information and Networks (SIN 2009), Gazimagusa, North Cyprus, 2009
-
(2009)
Proc. Second Int. Conf. on Security of Information and Networks (SIN 2009)
-
-
Ehsan, M.A.1
Amini, M.2
Jalili, R.3
-
38
-
-
78650405229
-
-
(Springer-Verlag)
-
Wu, Z., and Chen, H.: ' Semantic grid: model, methodology, and applications, ', Advanced topics in science and technology in China, (Springer-Verlag, 2008))
-
(2008)
Semantic Grid: Model, Methodology, and Applications, Advanced Topics in Science and Technology in China
-
-
Wu, Z.1
Chen, H.2
-
40
-
-
33744984347
-
An overview of S-OGSA: A reference semantic grid architecture
-
Corcho, O., Alper, P., Kotsiopoulos, I., Missier, P., Bechhofer, S., and Goble, C.: ' An overview of S-OGSA: a reference semantic grid architecture ', Web Semantics: Sci., Servi. Agents World Wide Web, 2006, 4, (2), p. 102-115
-
(2006)
Web Semantics: Sci., Servi. Agents World Wide Web
, vol.4
, Issue.2
, pp. 102-115
-
-
Corcho, O.1
Alper, P.2
Kotsiopoulos, I.3
Missier, P.4
Bechhofer, S.5
Goble, C.6
-
41
-
-
67650561404
-
Towards the semantic grid: A state of the art survey of semantic web services and their applicability to collaborative design, engineering, and procurement
-
Murphy, M.J., Dick, M., and Fischer, T.: ' Towards the semantic grid: a state of the art survey of semantic web services and their applicability to collaborative design, engineering, and procurement ', J. Commun. IIMA, 2008, 8, (3), p. 11-24
-
(2008)
J. Commun. IIMA
, vol.8
, Issue.3
, pp. 11-24
-
-
Murphy, M.J.1
Dick, M.2
Fischer, T.3
-
43
-
-
71749119397
-
A semantic grid oriented to E-tourism
-
Beijing, China, (LNCS, 5931)
-
Zhang, X.M.: ' A semantic grid oriented to E-tourism ', Proc. First Int. Conf. on Cloud Computing, Beijing, China, 2009, p. 485-496, (LNCS, 5931)
-
(2009)
Proc. First Int. Conf. on Cloud Computing
, pp. 485-496
-
-
Zhang, X.M.1
-
44
-
-
0035455653
-
The anatomy of the grid: Enabling scalable virtual organizations
-
1078-3482
-
Foster, I., Kesselman, C., and Tuecke, S.: ' The anatomy of the grid: enabling scalable virtual organizations ', Int. J. High Perform. Comput. Appl., 2001, 15, (3), p. 200-222 1078-3482
-
(2001)
Int. J. High Perform. Comput. Appl.
, vol.15
, Issue.3
, pp. 200-222
-
-
Foster, I.1
Kesselman, C.2
Tuecke, S.3
-
46
-
-
0003727420
-
-
(Cambridge University Press, New York, NY, USA)
-
Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., and Patel-Schneider, P.F.: ' The description logic handbook: theory, implementation, and applications ', (Cambridge University Press, New York, NY, USA, 2003)
-
(2003)
The Description Logic Handbook: Theory, Implementation, and Applications
-
-
Baader, F.1
Calvanese, D.2
McGuinness, D.L.3
Nardi, D.4
Patel-Schneider, P.F.5
-
47
-
-
35248860215
-
Conflict detection and resolution in a context-aware authorization system
-
Niagara Falls, Canada
-
Masoumzadeh, A., Amini, M., and Jalili, R.: ' Conflict detection and resolution in a context-aware authorization system ', Proc. Third IEEE Symp. on Security in Networks and Distributed Systems (SSNDS'07), Niagara Falls, Canada, 2007, p. 505-511
-
(2007)
Proc. Third IEEE Symp. on Security in Networks and Distributed Systems (SSNDS'07)
, pp. 505-511
-
-
Masoumzadeh, A.1
Amini, M.2
Jalili, R.3
-
48
-
-
77957040589
-
-
PhD, Queen Mary and Westfield College, University of London
-
Johnson, R.: ' Parallel analytic tableaux systems ', 1996, PhD, Queen Mary and Westfield College, University of London
-
(1996)
Parallel Analytic Tableaux Systems
-
-
Johnson, R.1
-
49
-
-
38349014259
-
Parallelizing tableaux-based description logic reasoning
-
Vilamoura, Portugal, (LNCS, 4806)
-
Liebig, T., and Müller, F.: ' Parallelizing tableaux-based description logic reasoning ', Proc. Int. Workshops on the Move to Meaningful Internet Systems (OTM'07), Vilamoura, Portugal, 2007, p. 1135-1144, (LNCS, 4806)
-
(2007)
Proc. Int. Workshops on the Move to Meaningful Internet Systems (OTM'07)
, pp. 1135-1144
-
-
Liebig, T.1
Müller, F.2
|