The SCEAS System
Navigation Menu

Conferences in DBLP

(sws)
2009 (conf/sws/2009)


  1. Toward WS-certificate. [Citation Graph (, )][DBLP]


  2. Efficient character-level taint tracking for Java. [Citation Graph (, )][DBLP]


  3. A pattern-driven security advisor for service-oriented architectures. [Citation Graph (, )][DBLP]


  4. An architecture for specification and enforcement of temporal access control constraints using OWL. [Citation Graph (, )][DBLP]


  5. The curse of namespaces in the domain of XML signature. [Citation Graph (, )][DBLP]


  6. Deductive policies with XACML. [Citation Graph (, )][DBLP]


  7. Extending the similarity-based XML multicast approach with digital signatures. [Citation Graph (, )][DBLP]


  8. A role-based XACML administration and delegation profile and its enforcement architecture. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002