dblp.uni-trier.dewww.uni-trier.de

Steve Barker

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
38EESteve Barker, Clara Bertolissi, Maribel Fernández: Action Control by Term Rewriting. Electr. Notes Theor. Comput. Sci. 234: 19-36 (2009)
37EESteve Barker, Gill Lowen: Event-oriented Web-based E-trading. Electr. Notes Theor. Comput. Sci. 235: 35-53 (2009)
2008
36EESteve Barker: Dynamic Meta-level Access Control in SQL. DBSec 2008: 1-16
35EESteve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani M. Thuraisingham: Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221
34EESteve Barker: Access control by action control. SACMAT 2008: 143-152
33EESteve Barker, Marek J. Sergot, Duminda Wijesekera: Status-Based Access Control. ACM Trans. Inf. Syst. Secur. 12(1): (2008)
32EESteve Barker, Michael Leuschel, Mauricio Varea: Efficient and flexible access control via Jones-optimal logic program specialisation. Higher-Order and Symbolic Computation 21(1-2): 5-35 (2008)
2007
31 Steve Barker, Gail-Joon Ahn: Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings Springer 2007
30EEClara Bertolissi, Maribel Fernández, Steve Barker: Dynamic Event-Based Access Control as Term Rewriting. DBSec 2007: 195-210
29 Steve Barker, Paul Douglas: Secure knowledge exchange by policy algebra and erml. ICEIS (1) 2007: 212-217
28EESteve Barker: Action-status access control. SACMAT 2007: 195-204
2006
27EESteve Barker, Maribel Fernández: Term Rewriting for Access Control. DBSec 2006: 179-193
2005
26EEPaul Douglas, Steve Barker: An E-learning tool for Database Administration. ITCC (1) 2005: 453-458
25EESteve Barker, Paul Douglas: An Intelligent Tutoring System for Program Semantics. ITCC (1) 2005: 482-487
2004
24 Steve Barker: Web Resource Usage Control in RSCLP. DBSec 2004: 281-294
23 Steve Barker, Paul Douglas: An Intelligent Tutoring System for Database Transaction Processing. ICEIS (2) 2004: 197-203
22EESteve Barker: Labeled Logic Programs. ICLP 2004: 448-449
21EEPaul Douglas, Steve Barker: Dependency Theory E-Learning Tool. ITCC (1) 2004: 151-155
20EESteve Barker, Paul Douglas: Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy. ITCC (1) 2004: 523-527
19EESteve Barker: Access Policy Specification for Web Applications. ITCC (2) 2004: 45-49
18EESteve Barker, Michael Leuschel, Mauricio Varea: Efficient and flexible access control via logic program specialisation. PEPM 2004: 190-199
2003
17 Steve Barker, Paul Douglas: RBAC Policy Implementation for SQL Databases. DBSec 2003: 288-301
16 Steve Barker, Paul Douglas: Extended Protected Databases: A Practical Implementation. ICEIS (1) 2003: 456-459
15EESteve Barker, Paul Douglas: An E-Learning Tool for Understanding Schedule Properties. ITCC 2003: 53-
14EESteve Barker: Distributed Access Control: A Logic-Based Approach. MMM-ACNS 2003: 217-228
13EESteve Barker, Peter J. Stuckey: Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur. 6(4): 501-546 (2003)
2002
12 Steve Barker: Deductive Database Security. DBSec 2002: 103-114
11 Steve Barker, Paul Douglas, Terry Fanning: Implementing RBAC Policies. DBSec 2002: 27-36
10EESteve Barker: Access Control for Deductive Databases by Logic Programming. ICLP 2002: 54-69
9EESteve Barker: Protecting deductive databases from unauthorized retrieval and update requests. Data Knowl. Eng. 43(3): 293-315 (2002)
2001
8 Steve Barker, Arnon Rosenthal: Flexible Security Policies in SQL. DBSec 2001: 167-180
7EESteve Barker: TRBAC: A Temporal Authorization Model. MMM-ACNS 2001: 178-188
6EESteve Barker: Secure Deductive Databases. PADL 2001: 123-137
2000
5EESteve Barker: Data Protection by Logic Programming. Computational Logic 2000: 1300-1314
4 Steve Barker: Protecting Deductive Databases from Unauthorized Retrievals. DBSec 2000: 185-196
3 Steve Barker: Information Security: A Logic Based Approach. ICEIS 2000: 9-14
1999
2 Steve Barker: Temporal Authorization in the Simplified Event Calculus. DBSec 1999: 271-284
1 Steve Barker: An Expert System for Intelligent Database Design. IC-AI 1999: 143-148

Coauthor Index

1Gail-Joon Ahn [31]
2Clara Bertolissi [30] [38]
3David Chadwick [35]
4Jason Crampton [35]
5Paul Douglas [11] [15] [16] [17] [20] [21] [23] [25] [26] [29]
6Terry Fanning [11]
7Maribel Fernández [27] [30] [38]
8Michael Leuschel [18] [32]
9Gill Lowen [37]
10Emil C. Lupu (Emil Lupu) [35]
11Arnon Rosenthal (Arnie Rosenthal) [8]
12Marek J. Sergot [33]
13Peter J. Stuckey [13]
14Bhavani M. Thuraisingham [35]
15Mauricio Varea [18] [32]
16Duminda Wijesekera [33]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)