2009 |
38 | EE | Steve Barker,
Clara Bertolissi,
Maribel Fernández:
Action Control by Term Rewriting.
Electr. Notes Theor. Comput. Sci. 234: 19-36 (2009) |
37 | EE | Steve Barker,
Gill Lowen:
Event-oriented Web-based E-trading.
Electr. Notes Theor. Comput. Sci. 235: 35-53 (2009) |
2008 |
36 | EE | Steve Barker:
Dynamic Meta-level Access Control in SQL.
DBSec 2008: 1-16 |
35 | EE | Steve Barker,
David Chadwick,
Jason Crampton,
Emil Lupu,
Bhavani M. Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?.
DBSec 2008: 219-221 |
34 | EE | Steve Barker:
Access control by action control.
SACMAT 2008: 143-152 |
33 | EE | Steve Barker,
Marek J. Sergot,
Duminda Wijesekera:
Status-Based Access Control.
ACM Trans. Inf. Syst. Secur. 12(1): (2008) |
32 | EE | Steve Barker,
Michael Leuschel,
Mauricio Varea:
Efficient and flexible access control via Jones-optimal logic program specialisation.
Higher-Order and Symbolic Computation 21(1-2): 5-35 (2008) |
2007 |
31 | | Steve Barker,
Gail-Joon Ahn:
Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings
Springer 2007 |
30 | EE | Clara Bertolissi,
Maribel Fernández,
Steve Barker:
Dynamic Event-Based Access Control as Term Rewriting.
DBSec 2007: 195-210 |
29 | | Steve Barker,
Paul Douglas:
Secure knowledge exchange by policy algebra and erml.
ICEIS (1) 2007: 212-217 |
28 | EE | Steve Barker:
Action-status access control.
SACMAT 2007: 195-204 |
2006 |
27 | EE | Steve Barker,
Maribel Fernández:
Term Rewriting for Access Control.
DBSec 2006: 179-193 |
2005 |
26 | EE | Paul Douglas,
Steve Barker:
An E-learning tool for Database Administration.
ITCC (1) 2005: 453-458 |
25 | EE | Steve Barker,
Paul Douglas:
An Intelligent Tutoring System for Program Semantics.
ITCC (1) 2005: 482-487 |
2004 |
24 | | Steve Barker:
Web Resource Usage Control in RSCLP.
DBSec 2004: 281-294 |
23 | | Steve Barker,
Paul Douglas:
An Intelligent Tutoring System for Database Transaction Processing.
ICEIS (2) 2004: 197-203 |
22 | EE | Steve Barker:
Labeled Logic Programs.
ICLP 2004: 448-449 |
21 | EE | Paul Douglas,
Steve Barker:
Dependency Theory E-Learning Tool.
ITCC (1) 2004: 151-155 |
20 | EE | Steve Barker,
Paul Douglas:
Protecting Federated Databases Using A Practical Implementation of a Formal RBAC Policy.
ITCC (1) 2004: 523-527 |
19 | EE | Steve Barker:
Access Policy Specification for Web Applications.
ITCC (2) 2004: 45-49 |
18 | EE | Steve Barker,
Michael Leuschel,
Mauricio Varea:
Efficient and flexible access control via logic program specialisation.
PEPM 2004: 190-199 |
2003 |
17 | | Steve Barker,
Paul Douglas:
RBAC Policy Implementation for SQL Databases.
DBSec 2003: 288-301 |
16 | | Steve Barker,
Paul Douglas:
Extended Protected Databases: A Practical Implementation.
ICEIS (1) 2003: 456-459 |
15 | EE | Steve Barker,
Paul Douglas:
An E-Learning Tool for Understanding Schedule Properties.
ITCC 2003: 53- |
14 | EE | Steve Barker:
Distributed Access Control: A Logic-Based Approach.
MMM-ACNS 2003: 217-228 |
13 | EE | Steve Barker,
Peter J. Stuckey:
Flexible access control policy specification with constraint logic programming.
ACM Trans. Inf. Syst. Secur. 6(4): 501-546 (2003) |
2002 |
12 | | Steve Barker:
Deductive Database Security.
DBSec 2002: 103-114 |
11 | | Steve Barker,
Paul Douglas,
Terry Fanning:
Implementing RBAC Policies.
DBSec 2002: 27-36 |
10 | EE | Steve Barker:
Access Control for Deductive Databases by Logic Programming.
ICLP 2002: 54-69 |
9 | EE | Steve Barker:
Protecting deductive databases from unauthorized retrieval and update requests.
Data Knowl. Eng. 43(3): 293-315 (2002) |
2001 |
8 | | Steve Barker,
Arnon Rosenthal:
Flexible Security Policies in SQL.
DBSec 2001: 167-180 |
7 | EE | Steve Barker:
TRBAC: A Temporal Authorization Model.
MMM-ACNS 2001: 178-188 |
6 | EE | Steve Barker:
Secure Deductive Databases.
PADL 2001: 123-137 |
2000 |
5 | EE | Steve Barker:
Data Protection by Logic Programming.
Computational Logic 2000: 1300-1314 |
4 | | Steve Barker:
Protecting Deductive Databases from Unauthorized Retrievals.
DBSec 2000: 185-196 |
3 | | Steve Barker:
Information Security: A Logic Based Approach.
ICEIS 2000: 9-14 |
1999 |
2 | | Steve Barker:
Temporal Authorization in the Simplified Event Calculus.
DBSec 1999: 271-284 |
1 | | Steve Barker:
An Expert System for Intelligent Database Design.
IC-AI 1999: 143-148 |