OBAC: towards agent-based identification and classification of roles, objects, permissions (ROP) in distributed environment
暂无分享,去创建一个
Awais Ahmad | Adeel Anjum | Abid Khan | Imran Ahmed | Shahid Hussain | Mansoor Ahmed | Muhammad Imran | Sidra Aslam
[1] Jun Xie,et al. A Workflow-based RBAC Model for Web Services in Multiple Autonomous Domains , 2013, J. Networks.
[2] Awais Ahmad,et al. Smartbuddy: defining human behaviors using big data analytics in social internet of things , 2016, IEEE Wireless Communications.
[3] Assad Abbas,et al. Evaluation and Analysis of Bio-Inspired Optimization Techniques for Bill Estimation in Fog Computing , 2018 .
[4] Riichiro Mizoguchi,et al. Fundamental Consideration of Role Concepts for Ontology Evaluation , 2006, EON@WWW.
[5] C. Chandrasekar,et al. Representation of multiple domain role based access control using FCA , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[6] Awais Ahmad,et al. An efficient divide-and-conquer approach for big data analytics in machine-to-machine communication , 2016, Neurocomputing.
[7] Wei-Tek Tsai,et al. Role-Based Access-Control Using Reference Ontology in Clouds , 2011, 2011 Tenth International Symposium on Autonomous Decentralized Systems.
[8] Darsana P. Josyula,et al. An Overview of Data Privacy in Multi-Agent Learning Systems , 2013 .
[9] Arun Kumar Sangaiah,et al. PCCA: Position Confidentiality Conserving Algorithm for Content-Protection in e-Governance Services and Applications , 2018, IEEE Transactions on Emerging Topics in Computational Intelligence.
[10] Chen Zhao,et al. An OWL-Based Approach for RBAC with Negative Authorization , 2006, KSEM.
[11] Jorge Lobo,et al. Conditional Privacy-Aware Role Based Access Control , 2007, ESORICS.
[12] Arun Kumar Sangaiah,et al. MIFIM - Middleware solution for service centric anomaly in future internet models , 2017, Future Gener. Comput. Syst..
[13] Qiu Jiong,et al. Detecting and resolving constraint conflicts in role-based access control , 2011, 2011 International Conference on Electrical and Control Engineering.
[14] Awais Ahmad,et al. Smart cyber society: Integration of capillary devices with high usability based on Cyber-Physical System , 2016, Future Gener. Comput. Syst..
[15] R. Charanya,et al. A Review on Access Control Issues in EHealth Application in Cloud Computing , 2016 .
[16] Ricardo Choren,et al. Using agents and ontologies for application development on the semantic web , 2010, Journal of the Brazilian Computer Society.
[17] Awais Ahmad,et al. Towards ontology-based multilingual URL filtering: a big data problem , 2018, The Journal of Supercomputing.
[18] Awais Ahmad,et al. Socio-cyber network: The potential of cyber-physical system to define human behaviors using big data analytics , 2019, Future Gener. Comput. Syst..
[19] Jorge Lobo,et al. Privacy-Aware Role-Based Access Control , 2007, IEEE Security & Privacy.
[20] C. Chandrasekar,et al. Inter-domain role based access control using ontology , 2015, 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI).
[21] Ernesto Damiani,et al. E-Auctions for Multi-Cloud Service Provisioning , 2014, 2014 IEEE International Conference on Services Computing.
[22] Rajiv Ramnath,et al. Using ontology-based methods for implementing role-based access control in cooperative systems , 2012, SAC '12.
[23] Arun Kumar Sangaiah,et al. Search space-based multi-objective optimization evolutionary algorithm , 2017, Comput. Electr. Eng..
[24] Awais Ahmad,et al. Toward modeling and optimization of features selection in Big Data based social Internet of Things , 2017, Future Gener. Comput. Syst..
[25] Ernesto Damiani,et al. Security Certification of Composite Services: A Test-Based Approach , 2013, 2013 IEEE 20th International Conference on Web Services.
[26] Saeed Parsa,et al. Survey on access control models , 2010, 2010 2nd International Conference on Future Computer and Communication.
[27] Arun Kumar Sangaiah,et al. ESCAPE: Effective Scalable Clustering Approach for Parallel Execution of Continuous Position-Based Queries in Position Monitoring Applications , 2017, IEEE Transactions on Sustainable Computing.
[28] Riichiro Mizoguchi,et al. A Model of Derived Roles , 2012, EKAW.
[29] Maurizio Lenzerini,et al. Using Ontologies for Semantic Data Integration , 2018, A Comprehensive Guide Through the Italian Database Research.
[30] Ernesto Damiani,et al. Fine-Grained Modeling of Web Services for Test-Based Security Certification , 2011, 2011 IEEE International Conference on Services Computing.
[31] Karim Hadjar. University Ontology: A Case Study at Ahlia University , 2016 .
[32] M. Aramudhan,et al. Ontology based Access Control Model for Healthcare System in Cloud Computing , 2015 .
[33] Marek R. Ogiela,et al. Multimedia tools and applications , 2005, Multimedia Tools and Applications.
[34] Fernando Silva Parreiras,et al. Role-Based Access Control for Model-Driven Web Applications , 2012, ICWE.
[35] R. H. Goudar,et al. Authentication and authorization: Domain specific Role Based Access Control using Ontology , 2013, 2013 7th International Conference on Intelligent Systems and Control (ISCO).
[36] Awais Ahmad,et al. Defining Human Behaviors Using Big Data Analytics in Social Internet of Things , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).