dblp.uni-trier.dewww.uni-trier.de

Jason Crampton

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2008
36EELiang Chen, Jason Crampton: On spatio-temporal constraints and inheritance in role-based access control. ASIACCS 2008: 205-216
35EESteve Barker, David Chadwick, Jason Crampton, Emil Lupu, Bhavani M. Thuraisingham: Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221
34EEJason Crampton, Hemanth Khambhammettu: On delegation and workflow execution models. SAC 2008: 2137-2144
33EEJason Crampton, Hemanth Khambhammettu: Delegation and satisfiability in workflow systems. SACMAT 2008: 31-40
32EEQiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu: Authorization recycling in RBAC systems. SACMAT 2008: 63-72
31EEM. A. C. Dekker, Jason Crampton, Sandro Etalle: RBAC administration in distributed systems. SACMAT 2008: 93-102
30EEJason Crampton, Hoon Wei Lim: Role Signatures for Access Control in Open Distributed Systems. SEC 2008: 205-220
29EEJason Crampton, Hemanth Khambhammettu: Delegation in role-based access control. Int. J. Inf. Sec. 7(2): 123-136 (2008)
28EEFederica Paci, Elisa Bertino, Jason Crampton: An Access-Control Framework for WS-BPEL. Int. J. Web Service Res. 5(3): 20-43 (2008)
2007
27EEM. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle: Extended privilege inheritance in RBAC. ASIACCS 2007: 383-385
26EEAllan Tucker, Stephen Swift, Jason Crampton: Efficiency updates for the restricted growth function GA for grouping problems. GECCO 2007: 1536
25EEStephen Swift, Allan Tucker, Jason Crampton, David Garway-Heath: An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data. GECCO 2007: 2174-2181
24EELiang Chen, Jason Crampton: Applications of the Oriented Permission Role-Based Access Control Model. IPCCC 2007: 387-394
23EELiang Chen, Jason Crampton: Inter-domain role mapping and least privilege. SACMAT 2007: 157-162
22EEJason Crampton, Hoon Wei Lim, Kenneth G. Paterson: What can identity-based cryptography offer to web services? SWS 2007: 26-36
21EEJames Skene, Allan Skene, Jason Crampton, Wolfgang Emmerich: The monitorability of service-level agreements for application-service provision. WOSP 2007: 3-14
2006
20EEJason Crampton, Keith M. Martin, Peter R. Wild: On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111
19EEJason Crampton: Discretionary and Mandatory Controls for Role-Based Administration. DBSec 2006: 194-208
18EEJason Crampton, Hemanth Khambhammettu: Delegation in Role-Based Access Control. ESORICS 2006: 174-191
17EEElisa Bertino, Jason Crampton, Federica Paci: Access Control and Authorization Constraints for WS-BPEL. ICWS 2006: 275-284
16EEJason Crampton, Wing Leung, Konstantin Beznosov: The secondary and approximate authorization model and its application to Bell-LaPadula policies. SACMAT 2006: 111-120
15EESteve Counsell, Stephen Swift, Jason Crampton: The interpretation and utility of three cohesion metrics for object-oriented design. ACM Trans. Softw. Eng. Methodol. 15(2): 123-149 (2006)
2005
14EEJason Crampton: Understanding and developing role-based administrative models. ACM Conference on Computer and Communications Security 2005: 158-167
13EEStephen Swift, Amy Shi, Jason Crampton, Allan Tucker: ICARUS: intelligent coupon allocation for retailers using search. Congress on Evolutionary Computation 2005: 182-189
12EEJason Crampton: A reference monitor for workflow systems with constrained task execution. SACMAT 2005: 38-47
11EEAllan Tucker, Jason Crampton, Stephen Swift: RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms. Evolutionary Computation 13(4): 477-499 (2005)
2004
10EEKaijun Tan, Jason Crampton, Carl A. Gunter: The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155-
9EEJason Crampton: Applying hierarchical and role-based access control to XML documents. SWS 2004: 37-46
2003
8EEJason Crampton: On permissions, inheritance and role hierarchies. ACM Conference on Computer and Communications Security 2003: 85-92
7EEJason Crampton: Specifying and enforcing constraints in role-based access control. SACMAT 2003: 43-50
6EEJason Crampton, George Loizou: Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur. 6(2): 201-231 (2003)
5 Jason Crampton, Hemanth Khambhammettu: Access control in a distributed object environment using XML and roles. South African Computer Journal 31: 2-8 (2003)
2002
4EEJason Crampton: Administrative scope and role hierarchy operations. SACMAT 2002: 145-154
2001
3EEJason Crampton, George Loizou, Greg O'Shea: A Logic of Access Control. Comput. J. 44(1): 54-66 (2001)
2EEJason Crampton, George Loizou, Greg O'Shea: A Logic of Access Control. Comput. J. 44(2): 137-149 (2001)
1 Jason Crampton, George Loizou: Authorisation and antichains. Operating Systems Review 35(3): 6-15 (2001)

Coauthor Index

1Steve Barker [35]
2Elisa Bertino [17] [28]
3Konstantin Beznosov [16] [32]
4J. G. Cederquist (Jan Cederquist) [27]
5David Chadwick [35]
6Liang Chen [23] [24] [36]
7Steve Counsell [15]
8M. A. C. Dekker [27] [31]
9Wolfgang Emmerich [21]
10Sandro Etalle [27] [31]
11David Garway-Heath [25]
12Carl A. Gunter [10]
13Hemanth Khambhammettu [5] [18] [29] [33] [34]
14Wing Leung [16]
15Hoon Wei Lim [22] [30]
16George Loizou [1] [2] [3] [6]
17Emil C. Lupu (Emil Lupu) [35]
18Keith M. Martin [20]
19Greg O'Shea [2] [3]
20Federica Paci [17] [28]
21Kenneth G. Paterson [22]
22Matei Ripeanu [32]
23Amy Shi [13]
24Allan Skene [21]
25James Skene [21]
26Stephen Swift [11] [13] [15] [25] [26]
27Kaijun Tan [10]
28Bhavani M. Thuraisingham [35]
29Allan Tucker [11] [13] [25] [26]
30Qiang Wei [32]
31Peter R. Wild [20]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)