![]() ![]() ![]() | ![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]() |
Note: Links lead to the DBLP on the Web. Ken Moody Luis Vargas , Jean Bacon , Ken Moody: Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005 : 392-397 Jean Bacon , David M. Eyers , Ken Moody, Lauri I. W. Pesonen : Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005 : 1-20 Nathan Dimmock , Jean Bacon , David Ingram , Ken Moody: Risk Models for Trust-Based Access Control(TBAC). iTrust 2005 : 364-371 Daniel Cvrcek , Ken Moody: Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005 : 372-383 András Belokosztolszki , Ken Moody, David M. Eyers : A Formal Model for Hierarchical Policy Contexts. POLICY 2004 : 127-136 Nathan Dimmock , András Belokosztolszki , David M. Eyers , Jean Bacon , Ken Moody: Using trust and risk in role-based access control policies. SACMAT 2004 : 156-162 Jean Bacon , David W. Chadwick , Alexander Otenko , Ken Moody: Persistent versus Dynamic Role Membership. DBSec 2003 : 344-357 András Belokosztolszki , David M. Eyers , Peter R. Pietzuch , Jean Bacon , Ken Moody: Role-based access control for publish/subscribe middleware architectures. DEBS 2003 David M. Eyers , Ken Moody: Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003 : 427-431 Ken Moody, Marco A. Palomino : SharpSpider: Spidering the Web through Web Services. LA-WEB 2003 : 219-221 András Belokosztolszki , David M. Eyers , Ken Moody: Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003 : 99-110 András Belokosztolszki , David M. Eyers , Wei Wang , Ken Moody: Policy Storage for Role-Based Access Control Systems. WETICE 2003 : 196-201 Jean Bacon , Ken Moody, Walt Yao : Access control and trust in the use of widely distributed services. Softw., Pract. Exper. 33 (4): 375-394 (2003) András Belokosztolszki , Ken Moody: Meta-Policies for Distributed Role-Based Access Control Systems. POLICY 2002 : 106-115 Jean Bacon , Ken Moody, Walt Yao : A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5 (4): 492-540 (2002) Jean Bacon , Ken Moody: Toward open, secure, widely distributed services. Commun. ACM 45 (6): 59-64 (2002) Jean Bacon , Ken Moody, Walt Yao : Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001 : 295-310 Jean Bacon , Michael Lloyd , Ken Moody: Translating Role-Based Access Control Policy within Context. POLICY 2001 : 107-119 Walt Yao , Ken Moody, Jean Bacon : A model of OASIS role-based access control and its support for active security. SACMAT 2001 : 171-181 Agathoniki Trigoni , Ken Moody: Using Association Rules to Add or Eliminate Query Constraints Automatically. SSDBM 2001 : 124-133 Ken Moody: Coordinating Policy for Federated Applications. DBSec 2000 : 127-134 John H. Hine , Walt Yao , Jean Bacon , Ken Moody: An Architecture for Distributed OASIS Services. Middleware 2000 : 104-120 Jean Bacon , Alexis Hombrecher , Chaoying Ma , Ken Moody, Walt Yao : Event Storage and Federation Using ODMG. POS 2000 : 265-281 Jean Bacon , Ken Moody, John Bates , Richard Hayton , Chaoying Ma , Andrew McNeil , Oliver Seidel , Mark Spiteri : Generic Support for Distributed Applications. IEEE Computer 33 (3): 68-76 (2000) John Bates , Jean Bacon , Ken Moody, Mark Spiteri : Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998 : 58-65 Richard Hayton , Ken Moody: An Open Architecture for Secure Interworking Services. ICDCS 1997 : 0- Tim Mills , Ken Moody, Kerry Rodden : Providing World Wide Access to Historical Sources. Computer Networks 29 (8-13): 1317-1325 (1997) Richard Hayton , Ken Moody: An open architecture for secure interworking services. ACM SIGOPS European Workshop 1996 : 233-240 Tim Mills , Ken Moody: Wide-area information access to multimedia historical sources. ACM SIGOPS European Workshop 1996 : 59-66 Richard Hayton , Jean Bacon , John Bates , Ken Moody: Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996 : 9-16 Zhixue Wu , Ken Moody, Jean Bacon , Robert J. Stroud : Data consistency in a distributed persistent object system. HICSS (2) 1995 : 635-644 Zhixue Wu , Robert J. Stroud , Ken Moody, Jean Bacon : The design and implementation of a distributed transaction system based on atomic data types. Distributed Systems Engineering 2 (1): 50- (1995) Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody: Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994 : 141-146 Ken Moody: Concurrency. POS 1994 : 127-128 Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody: Extensible Access Control for a Hierarchy of Servers. Operating Systems Review 28 (3): 4-15 (1994) Jean Bacon , Ken Moody, Sue Thomson , Tim Wilson : A Multi-Service Storage Architecture. Operating Systems Review 25 (4): 47-65 (1991) Ken Moody: Authentication in a distributed system during partition. ACM SIGOPS European Workshop 1988 T. J. King , Ken Moody: The Design and Implementation of CODD. Softw., Pract. Exper. 13 (1): 67-78 (1983) Ken Moody, Martin Richards : A Coroutine Mechanism for BCPL. Softw., Pract. Exper. 10 (10): 765-771 (1980) 1 [ 4 ] [ 5 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 27 ] [ 32 ] [ 33 ] [ 34 ] [ 37 ] [ 38 ] [ 39 ] 2 [ 10 ] [ 15 ] [ 16 ] 3 [ 26 ] [ 28 ] [ 29 ] [ 32 ] [ 34 ] [ 35 ] 4 [ 33 ] 5 [ 36 ] 6 [ 34 ] [ 37 ] 7 [ 28 ] [ 29 ] [ 31 ] [ 32 ] [ 34 ] [ 35 ] [ 38 ] 8 [ 5 ] [ 7 ] [ 10 ] [ 12 ] [ 14 ] [ 16 ] 9 [ 18 ] 10 [ 17 ] 11 [ 37 ] 12 [ 2 ] 13 [ 22 ] 14 [ 5 ] [ 7 ] 15 [ 16 ] [ 17 ] 16 [ 16 ] 17 [ 11 ] [ 13 ] 18 [ 33 ] 19 [ 30 ] 20 [ 38 ] 21 [ 32 ] 22 [ 1 ] 23 [ 13 ] 24 [ 16 ] 25 [ 15 ] [ 16 ] 26 [ 8 ] [ 9 ] 27 [ 4 ] 28 [ 20 ] 29 [ 39 ] 30 [ 28 ] 31 [ 4 ] 32 [ 8 ] [ 9 ] 33 [ 17 ] [ 18 ] [ 21 ] [ 23 ] [ 25 ] [ 27 ] ![]() ©2006 Association for Computing Machinery |