Follow
Jorge Lobo
Title
Cited by
Cited by
Year
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
5042010
Foundations of disjunctive logic programming
J Lobo, J Minker, A Rajasekar
The MIT Press, 1992
5021992
Apolicy DESCRIPTION LANGUAGE
J Lobo
4181999
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
2352008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1892009
Conflict resolution using logic programming
J Chomicki, J Lobo, S Naqvi
IEEE Transactions on knowledge and data engineering 15 (1), 244-249, 2003
1812003
Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms
W Rankothge, F Le, A Russo, J Lobo
IEEE Transactions on Network and Service Management 14 (2), 343-356, 2017
1802017
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1792010
Method and system for supporting non-intrusive and effective voice communication among mobile users
R Bhatia, H Johansson, J Lobo, S Sharma
US Patent 7,330,721, 2008
1732008
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1622009
Policy-based management of networked computing systems
D Agrawal, KW Lee, J Lobo
IEEE Communications Magazine 43 (10), 69-75, 2005
1532005
Weak generalized closed world assumption
A Rajasekar, J Lobo, J Minker
Journal of automated reasoning 5 (3), 293-307, 1989
1391989
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases …, 2007
1342007
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1312009
An obligation model bridging access control policies and privacy policies
Q Ni, E Bertino, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
1302008
Policy ratification
D Agrawal, J Giles, KW Lee, J Lobo
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
1282005
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1252010
A logic programming approach to conflict resolution in policy management
J Chomicki, J Lobo, SA Naqvi
Proceedings of the Seventh International Conference on Principles of …, 2000
1222000
Expressive policy analysis with enhanced system dynamicity
R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
1112009
Towards Making Network Function Virtualization a Cloud Computing Service
W Rankothge, J Ma, F Le, AM Russo, J Lobo
Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium …, 2015
1082015
The system can't perform the operation now. Try again later.
Articles 1–20