117 papers found
Refreshing results…
Relationships, Paths and Principal Matching: A New Approach to Access Control
On the Workflow Satisfiability Problem with Class-Independent Constraints
Relationship-Based Access Control for OpenMRS
Cryptographic Tools for Cloud Environments
Obligations in PTaCL
Relationship-Based Access Control for an Open-Source Medical Records System
Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies
Valued Workflow Satisfiability Problem
Implementation of the pattern-backtracking FPT algorithm and experimental data set for the WSP with class-independent constraints
Access Control in Publicly Verifiable Outsourced Computation
Revocation in Publicly Verifiable Outsourced Computation
Cryptographic Enforcement of Information Flow Policies without Public Information
Attribute-Based Encryption for Access Control Using Elementary Operations
Publicly Verifiable Outsourced Computation with a Key Distribution Centre
Path Conditions and Principal Matching: A New Approach to Access Control
Monotonicity and Completeness in Attribute-Based Access Control
Caching and Auditing in the RPPM Model
Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints
Policy templates for relationship-based access control
A personal tribute to Steve Barker
Missing publications? Read more about our data sources.