Volgen
Jorge Lobo
Titel
Geciteerd door
Geciteerd door
Jaar
Foundations of disjunctive logic programming
J Lobo, J Minker, A Rajasekar
The MIT Press, 1992
4781992
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
4712010
Apolicy DESCRIPTION LANGUAGE
J Lobo
4021999
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2182008
Conflict resolution using logic programming
J Chomicki, J Lobo, S Naqvi
IEEE Transactions on knowledge and data engineering 15 (1), 244-249, 2003
1802003
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1792009
Method and system for supporting non-intrusive and effective voice communication among mobile users
R Bhatia, H Johansson, J Lobo, S Sharma
US Patent 7,330,721, 2008
1722008
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1662010
Policy-based management of networked computing systems
D Agrawal, KW Lee, J Lobo
IEEE Communications Magazine 43 (10), 69-75, 2005
1472005
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1452009
Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms
W Rankothge, F Le, A Russo, J Lobo
IEEE Transactions on Network and Service Management 14 (2), 343-356, 2017
1352017
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases …, 2007
1302007
Weak generalized closed world assumption
A Rajasekar, J Lobo, J Minker
Journal of automated reasoning 5 (3), 293-307, 1989
1281989
An obligation model bridging access control policies and privacy policies
Q Ni, E Bertino, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
1262008
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1252009
Policy ratification
D Agrawal, J Giles, KW Lee, J Lobo
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
1192005
A logic programming approach to conflict resolution in policy management
J Chomicki, J Lobo, S Naqvi
7th International Conference on Principles of Knowledge Representation and …, 2000
1182000
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1082010
Expressive policy analysis with enhanced system dynamicity
R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1042009
Towards Making Network Function Virtualization a Cloud Computing Service
W Rankothge, J Ma, F Le, AM Russo, J Lobo
Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium …, 2015
1032015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20