Ken Moody

According to our database1, Ken Moody authored at least 49 papers between 1980 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Using Real-Time Road Traffic Data to Evaluate Congestion.
Proceedings of the Dependable and Historic Computing, 2011

2010
Relational database support for event-based middleware functionality.
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, 2010

Implementing a Practical Spatio-Temporal Composite Event Language.
Proceedings of the From Active Data Management to Event-Based Systems and More, 2010

2009
The <i>SpaTeC</i> composite event language for spatio-temporal reasoning in mobile systems.
Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, 2009

2008
Policy-Based Information Sharing in Publish/Subscribe Middleware.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Compile-Time Enforcement of Dynamic Security Policies.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Event-Driven Database Information Sharing.
Proceedings of the Sharing Data, 2008

2007
Dynamic trust domains for secure, private, technology-assisted living.
Proceedings of the The Second International Conference on Availability, 2007

2006
OASIS role-based access control for electronic health records.
IEE Proc. Softw., 2006

Transactions in Distributed Event-Based Middleware.
Proceedings of the Eighth IEEE International Conference on E-Commerce Technology (CEC 2006) / Third IEEE International Conference on Enterprise Computing, 2006

2005
Securing Publish/Subscribe for Multi-domain Systems.
Proceedings of the Middleware 2005, ACM/IFIP/USENIX, 6th International Middleware Conference, Grenoble, France, November 28, 2005

Risk Models for Trust-Based Access Control(TBAC).
Proceedings of the Trust Management, Third International Conference, 2005

Combining Trust and Risk to Reduce the Cost of Attacks.
Proceedings of the Trust Management, Third International Conference, 2005

Integrating Databases with Publish/Subscribe.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Using trust and risk in role-based access control policies.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

A Formal Model for Hierarchical Policy Contexts.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

2003
Access control and trust in the use of widely distributed services.
Softw. Pract. Exp., 2003

Policy Storage for Role-Based Access Control Systems.
Proceedings of the 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), 2003

Policy Contexts: Controlling Information Flow in Parameterised RBAC.
Proceedings of the 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 2003

SharpSpider: Spidering the Web through Web Services.
Proceedings of the 1st Latin American Web Congress (LA-WEB 2003), 2003

Credential negotiation with limited disclosure via iterative range refinement in an unordered space.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Role-based access control for publish/subscribe middleware architectures.
Proceedings of the 2nd International Workshop on Distributed Event-Based Systems, 2003

Persistent versus Dynamic Role Membership.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
A model of OASIS role-based access control and its support for active security.
ACM Trans. Inf. Syst. Secur., 2002

Toward open, secure, widely distributed services.
Commun. ACM, 2002

Meta-Policies for Distributed Role-Based Access Control Systems.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

2001
Using Association Rules to Add or Eliminate Query Constraints Automatically.
Proceedings of the 13th International Conference on Scientific and Statistical Database Management, 2001

Translating Role-Based Access Control Policy within Context.
Proceedings of the Policies for Distributed Systems and Networks, 2001

2000
Generic Support for Distributed Applications.
Computer, 2000

Event Storage and Federation Using ODMG.
Proceedings of the Persistent Object Systems, 9th International Workshop, 2000

An Architecture for Distributed OASIS Services.
Proceedings of the Middleware 2000, 2000

Coordinating Policy for Federated Applications.
Proceedings of the Data and Application Security, 2000

1998
Middleware for Digital Libraries.
D Lib Mag., 1998

Access Control in an Open Distributed Environment.
Proceedings of the Security and Privacy, 1998

Using events for the scalable federation of heterogeneous components.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

1997
Providing World Wide Access to Historical Sources.
Comput. Networks, 1997

Cobra: A new approach to IR System design.
Proceedings of the Computer-Assisted Information Retrieval (Recherche d'Information et ses Applications), 1997

1996
Wide-area information access to multimedia historical sources.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

An open architecture for secure interworking services.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

Using events to build large scale distributed applications.
Proceedings of the 7th ACM SIGOPS European Workshop: Systems Support for Worldwide Applications, 1996

1995
The design and implementation of a distributed transaction system based on atomic data types.
Distributed Syst. Eng., 1995

Data consistency in a distributed persistent object system.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

1994
Extensible Access Control for a Hierarchy of Servers.
ACM SIGOPS Oper. Syst. Rev., 1994

Modular, Extensible Storage Services through Object Interfaces.
Proceedings of the 6th ACM SIGOPS European Workshop: Matching Operating Systems to Application Needs, 1994

Concurrency.
Proceedings of the Persistent Object Systems, 1994

1991
A Multi-Service Storage Architecture.
ACM SIGOPS Oper. Syst. Rev., 1991

1988
Authentication in a distributed system during partition.
Proceedings of the 3rd ACM SIGOPS European Workshop: Autonomy or Interdependence in Distributed Systems? Cambridge, 1988

1983
The Design and Implementation of CODD.
Softw. Pract. Exp., 1983

1980
A Coroutine Mechanism for BCPL.
Softw. Pract. Exp., 1980


  Loading...