Serban I. Gavrila

According to our database1, Serban I. Gavrila authored at least 21 papers between 1998 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2017

Imposing Fine-grain Next Generation Access Control over Database Queries.
Proceedings of the 2nd ACM Workshop on Attribute-Based Access Control, 2017

2016
Restricting Insider Access Through Efficient Implementation of Multi-Policy Access Control Systems.
Proceedings of the 8th ACM CCS International Workshop on Managing Insider Security Threats, 2016

2014
On the unification of access control and data services.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

2013
Enabling an Enterprise-Wide, Data-Centric Operating Environment.
Computer, 2013

2011
The Policy Machine: A novel architecture and framework for access control policy specification and enforcement.
J. Syst. Archit., 2011

2010
Specification of attribute relations for access control policies and constraints using Policy Machine.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2007
Smart Cards for mobile devices.
Int. J. Inf. Comput. Secur., 2007

A trust domain management schema for multiple grid environments.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

2005
Composing and combining policies under the policy machine.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

Administering Access Control in Dynamic Coalitions.
Proceedings of the 19th Conference on Systems Administration (LISA 2005), 2005

Proximity-Based Authentication for Mobile Devices.
Proceedings of The 2005 International Conference on Security and Management, 2005

Smart Card Authentication for Mobile Devices.
Proceedings of the 3rd Australian Information Security Management Conference, 2005

2004
A Unified Framework for Mobile Device Security.
Proceedings of the International Conference on Security and Management, 2004

2003
The role control center: features and case studies.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

Integrated Security Services for Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Security Policy Management for Handheld Devices.
Proceedings of the International Conference on Security and Management, 2003

2001
Proposed NIST standard for role-based access control.
ACM Trans. Inf. Syst. Secur., 2001

1998
Application-Oriented Security Policies and Their Composition (Position Paper).
Proceedings of the Security Protocols, 1998

On the Formal Definition of Separation-of-Duty Policies and their Composition.
Proceedings of the Security and Privacy, 1998

Formal Specification for Role Based Access Control User/Role and Role/Role Relationship Management.
Proceedings of the Third ACM Workshop on Role-Based Access Control, 1998


  Loading...