Welcome to D
SIGMOD 2005
PODS 2005
SIGMOD-RECOR
CIDR 2005
CIKM 2005
COMAD 2005
CVDB 2005
DaMoN 2005
Data Enginee
DEBS05
DMSN 2005
DOLAP 2005
GIR 2005
GIS 2005
Hypertext 20
ICDE 2005
ICDM 2005
IHIS 2005
IQIS 2005
JCDL 2005
KRAS 2005
MDM 2005
MIR 2005
MobiDE 2005
P2PIR 2005
RIDE 2005
SBBD 2005
SIGIR 2005
SIGIR-FORUM
SIGKDD 2005
SIGKDD-EXP
SSDBM 2005
TIME 2005
TKDE 2005
TODS 2005
VLDB 2005
VLDBJ 2005
WebDB 2005
WIDM 2005
About DiSC 2
Editorial Bo
Acknowledgem
DiSC'06 Site
Search DiSC'
<<<Author Index>>>
Copyright No

Ken Moody

Papers on DiSC'06


Integrating Databases with Publish/Subscribe

Publications


Note: Links lead to the DBLP on the Web.

Ken Moody

Luis Vargas , Jean Bacon , Ken Moody: Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005 : 392-397

Jean Bacon , David M. Eyers , Ken Moody, Lauri I. W. Pesonen : Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005 : 1-20

Nathan Dimmock , Jean Bacon , David Ingram , Ken Moody: Risk Models for Trust-Based Access Control(TBAC). iTrust 2005 : 364-371

Daniel Cvrcek , Ken Moody: Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005 : 372-383

András Belokosztolszki , Ken Moody, David M. Eyers : A Formal Model for Hierarchical Policy Contexts. POLICY 2004 : 127-136

Nathan Dimmock , András Belokosztolszki , David M. Eyers , Jean Bacon , Ken Moody: Using trust and risk in role-based access control policies. SACMAT 2004 : 156-162

Jean Bacon , David W. Chadwick , Alexander Otenko , Ken Moody: Persistent versus Dynamic Role Membership. DBSec 2003 : 344-357

András Belokosztolszki , David M. Eyers , Peter R. Pietzuch , Jean Bacon , Ken Moody: Role-based access control for publish/subscribe middleware architectures. DEBS 2003

David M. Eyers , Ken Moody: Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003 : 427-431

Ken Moody, Marco A. Palomino : SharpSpider: Spidering the Web through Web Services. LA-WEB 2003 : 219-221

András Belokosztolszki , David M. Eyers , Ken Moody: Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003 : 99-110

András Belokosztolszki , David M. Eyers , Wei Wang , Ken Moody: Policy Storage for Role-Based Access Control Systems. WETICE 2003 : 196-201

Jean Bacon , Ken Moody, Walt Yao : Access control and trust in the use of widely distributed services. Softw., Pract. Exper. 33 (4): 375-394 (2003)

András Belokosztolszki , Ken Moody: Meta-Policies for Distributed Role-Based Access Control Systems. POLICY 2002 : 106-115

Jean Bacon , Ken Moody, Walt Yao : A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5 (4): 492-540 (2002)

Jean Bacon , Ken Moody: Toward open, secure, widely distributed services. Commun. ACM 45 (6): 59-64 (2002)

Jean Bacon , Ken Moody, Walt Yao : Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001 : 295-310

Jean Bacon , Michael Lloyd , Ken Moody: Translating Role-Based Access Control Policy within Context. POLICY 2001 : 107-119

Walt Yao , Ken Moody, Jean Bacon : A model of OASIS role-based access control and its support for active security. SACMAT 2001 : 171-181

Agathoniki Trigoni , Ken Moody: Using Association Rules to Add or Eliminate Query Constraints Automatically. SSDBM 2001 : 124-133

Ken Moody: Coordinating Policy for Federated Applications. DBSec 2000 : 127-134

John H. Hine , Walt Yao , Jean Bacon , Ken Moody: An Architecture for Distributed OASIS Services. Middleware 2000 : 104-120

Jean Bacon , Alexis Hombrecher , Chaoying Ma , Ken Moody, Walt Yao : Event Storage and Federation Using ODMG. POS 2000 : 265-281

Jean Bacon , Ken Moody, John Bates , Richard Hayton , Chaoying Ma , Andrew McNeil , Oliver Seidel , Mark Spiteri : Generic Support for Distributed Applications. IEEE Computer 33 (3): 68-76 (2000)

John Bates , Jean Bacon , Ken Moody, Mark Spiteri : Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998 : 58-65

Richard Hayton , Ken Moody: An Open Architecture for Secure Interworking Services. ICDCS 1997 : 0-

Tim Mills , Ken Moody, Kerry Rodden : Providing World Wide Access to Historical Sources. Computer Networks 29 (8-13): 1317-1325 (1997)

Richard Hayton , Ken Moody: An open architecture for secure interworking services. ACM SIGOPS European Workshop 1996 : 233-240

Tim Mills , Ken Moody: Wide-area information access to multimedia historical sources. ACM SIGOPS European Workshop 1996 : 59-66

Richard Hayton , Jean Bacon , John Bates , Ken Moody: Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996 : 9-16

Zhixue Wu , Ken Moody, Jean Bacon , Robert J. Stroud : Data consistency in a distributed persistent object system. HICSS (2) 1995 : 635-644

Zhixue Wu , Robert J. Stroud , Ken Moody, Jean Bacon : The design and implementation of a distributed transaction system based on atomic data types. Distributed Systems Engineering 2 (1): 50- (1995)

Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody: Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994 : 141-146

Ken Moody: Concurrency. POS 1994 : 127-128

Jean Bacon , Richard Hayton , Sai Lai Lo , Ken Moody: Extensible Access Control for a Hierarchy of Servers. Operating Systems Review 28 (3): 4-15 (1994)

Jean Bacon , Ken Moody, Sue Thomson , Tim Wilson : A Multi-Service Storage Architecture. Operating Systems Review 25 (4): 47-65 (1991)

Ken Moody: Authentication in a distributed system during partition. ACM SIGOPS European Workshop 1988

T. J. King , Ken Moody: The Design and Implementation of CODD. Softw., Pract. Exper. 13 (1): 67-78 (1983)

Ken Moody, Martin Richards : A Coroutine Mechanism for BCPL. Softw., Pract. Exper. 10 (10): 765-771 (1980)

1 [ 4 ] [ 5 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 27 ] [ 32 ] [ 33 ] [ 34 ] [ 37 ] [ 38 ] [ 39 ]

2 [ 10 ] [ 15 ] [ 16 ]

3 [ 26 ] [ 28 ] [ 29 ] [ 32 ] [ 34 ] [ 35 ]

4 [ 33 ]

5 [ 36 ]

6 [ 34 ] [ 37 ]

7 [ 28 ] [ 29 ] [ 31 ] [ 32 ] [ 34 ] [ 35 ] [ 38 ]

8 [ 5 ] [ 7 ] [ 10 ] [ 12 ] [ 14 ] [ 16 ]

9 [ 18 ]

10 [ 17 ]

11 [ 37 ]

12 [ 2 ]

13 [ 22 ]

14 [ 5 ] [ 7 ]

15 [ 16 ] [ 17 ]

16 [ 16 ]

17 [ 11 ] [ 13 ]

18 [ 33 ]

19 [ 30 ]

20 [ 38 ]

21 [ 32 ]

22 [ 1 ]

23 [ 13 ]

24 [ 16 ]

25 [ 15 ] [ 16 ]

26 [ 8 ] [ 9 ]

27 [ 4 ]

28 [ 20 ]

29 [ 39 ]

30 [ 28 ]

31 [ 4 ]

32 [ 8 ] [ 9 ]

33 [ 17 ] [ 18 ] [ 21 ] [ 23 ] [ 25 ] [ 27 ]




©2006 Association for Computing Machinery