dblp.uni-trier.dewww.uni-trier.de

David M. Eyers

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
22EEJean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch: Access control in publish/subscribe systems. DEBS 2008: 23-34
21EEDavid Evans, David M. Eyers: Deontic logic for modelling data flow and use compliance. MPAC 2008: 19-24
20EEJatinder Singh, David M. Eyers, Jean Bacon: Credential management in event-driven healthcare systems. Middleware (Companion) 2008: 48-53
19EEJatinder Singh, David M. Eyers, Jean Bacon: Controlling historical information dissemination in publish/subscribe. Middleware Security 2008: 34-39
18EEDavid M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon: Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126
2007
17EELauri I. W. Pesonen, David M. Eyers, Jean Bacon: Encryption-enforced access control in dynamic multi-domain publish/subscribe networks. DEBS 2007: 104-115
16EEPeter R. Pietzuch, David M. Eyers, Samuel Kounev, Brian Shand: Towards a common API for publish/subscribe. DEBS 2007: 152-157
15EELauri I. W. Pesonen, David M. Eyers, Jean Bacon: Access Control in Decentralised Publish/Subscribe Systems. JNW 2(2): 57-67 (2007)
2006
14EELauri I. W. Pesonen, David M. Eyers, Jean Bacon: A Capability-Based Access Control Architecture for Multi-Domain Publish/Subscribe Systems. SAINT 2006: 222-228
2005
13EEJean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen: Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20
2004
12EEAndrás Belokosztolszki, Ken Moody, David M. Eyers: A Formal Model for Hierarchical Policy Contexts. POLICY 2004: 127-136
11EESteve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong: An architecture for supporting vicarious learning in a distributed environment. SAC 2004: 963-970
10EENathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody: Using trust and risk in role-based access control policies. SACMAT 2004: 156-162
2003
9EEDavid M. Eyers: 'Ambiguous Live' - Exploring Collaborative, Dynamic Control of MIDI Sequencers. CMMR 2003: 54-63
8EEAndrás Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody: Role-based access control for publish/subscribe middleware architectures. DEBS 2003
7EEDavid M. Eyers, Ken Moody: Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003: 427-431
6EEAndrás Belokosztolszki, David M. Eyers, Ken Moody: Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003: 99-110
5EEAndrás Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody: Policy Storage for Role-Based Access Control Systems. WETICE 2003: 196-201
2002
4EEAlan S. Abrahams, David M. Eyers, Jean Bacon: An asynchronous rule-based approach for business process automation using obligations. ACM SIGPLAN Workshop on Rule-Based Programming 2002: 93-103
3EEDavid M. Eyers, John Shepherd, Raymond K. Wong: PoX: Merging Prolog and XML databases. ADCS 2002
2 András Belokosztolszki, David M. Eyers: Shielding RBAC Infrastructures from Cyberterrorism. DBSec 2002: 3-14
1EEAlan S. Abrahams, David M. Eyers, Jean Bacon: A Coverage-Determination Mechanism for Checking Business Contracts against Organizational Policies. TES 2002: 97-106

Coauthor Index

1Alan S. Abrahams [1] [4]
2Jean Bacon [1] [4] [8] [10] [11] [13] [14] [15] [17] [18] [19] [20] [22]
3András Belokosztolszki [2] [5] [6] [8] [10] [12]
4Nathan Dimmock [10]
5David Evans [21]
6Xiaofeng Gong [11]
7Samuel Kounev [16]
8Helen Lowe [11]
9Ken Moody [5] [6] [7] [8] [10] [12] [13] [18]
10Steve Neely [11]
11Julian Newman [11]
12Lauri I. W. Pesonen [13] [14] [15] [17]
13Peter R. Pietzuch [8] [16] [22]
14Brian Shand [16]
15John Shepherd [3]
16Jatinder Singh [19] [20] [22]
17Sriram Srinivasan [18]
18Wei Wang [5]
19Raymond K. Wong [3]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)