2008 | ||
---|---|---|
46 | EE | Luis Vargas, Jean Bacon, Ken Moody: Event-Driven Database Information Sharing. BNCOD 2008: 113-125 |
45 | EE | David M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon: Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126 |
44 | EE | Jatinder Singh, Luis Vargas, Jean Bacon, Ken Moody: Policy-Based Information Sharing in Publish/Subscribe Middleware. POLICY 2008: 137-144 |
2007 | ||
43 | EE | Jatinder Singh, Jean Bacon, Ken Moody: Dynamic trust domains for secure, private, technology-assisted living. ARES 2007: 27-34 |
2006 | ||
42 | EE | Luis Vargas, Jean Bacon, Ken Moody: Transactions in Distributed Event-Based Middleware. CEC/EEE 2006: 53 |
2005 | ||
41 | EE | Luis Vargas, Jean Bacon, Ken Moody: Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005: 392-397 |
40 | EE | Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen: Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20 |
39 | EE | Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody: Risk Models for Trust-Based Access Control(TBAC). iTrust 2005: 364-371 |
38 | EE | Daniel Cvrcek, Ken Moody: Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005: 372-383 |
2004 | ||
37 | EE | András Belokosztolszki, Ken Moody, David M. Eyers: A Formal Model for Hierarchical Policy Contexts. POLICY 2004: 127-136 |
36 | EE | Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody: Using trust and risk in role-based access control policies. SACMAT 2004: 156-162 |
2003 | ||
35 | Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody: Persistent versus Dynamic Role Membership. DBSec 2003: 344-357 | |
34 | EE | András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody: Role-based access control for publish/subscribe middleware architectures. DEBS 2003 |
33 | EE | David M. Eyers, Ken Moody: Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003: 427-431 |
32 | EE | Ken Moody, Marco A. Palomino: SharpSpider: Spidering the Web through Web Services. LA-WEB 2003: 219-221 |
31 | EE | András Belokosztolszki, David M. Eyers, Ken Moody: Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003: 99-110 |
30 | EE | András Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody: Policy Storage for Role-Based Access Control Systems. WETICE 2003: 196-201 |
29 | Jean Bacon, Ken Moody, Walt Yao: Access control and trust in the use of widely distributed services. Softw., Pract. Exper. 33(4): 375-394 (2003) | |
2002 | ||
28 | EE | András Belokosztolszki, Ken Moody: Meta-Policies for Distributed Role-Based Access Control Systems. POLICY 2002: 106-115 |
27 | EE | Jean Bacon, Ken Moody, Walt Yao: A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002) |
26 | EE | Jean Bacon, Ken Moody: Toward open, secure, widely distributed services. Commun. ACM 45(6): 59-64 (2002) |
2001 | ||
25 | EE | Jean Bacon, Ken Moody, Walt Yao: Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001: 295-310 |
24 | EE | Jean Bacon, Michael Lloyd, Ken Moody: Translating Role-Based Access Control Policy within Context. POLICY 2001: 107-119 |
23 | EE | Walt Yao, Ken Moody, Jean Bacon: A model of OASIS role-based access control and its support for active security. SACMAT 2001: 171-181 |
22 | Agathoniki Trigoni, Ken Moody: Using Association Rules to Add or Eliminate Query Constraints Automatically. SSDBM 2001: 124-133 | |
2000 | ||
21 | Ken Moody: Coordinating Policy for Federated Applications. DBSec 2000: 127-134 | |
20 | EE | John H. Hine, Walt Yao, Jean Bacon, Ken Moody: An Architecture for Distributed OASIS Services. Middleware 2000: 104-120 |
19 | EE | Jean Bacon, Alexis Hombrecher, Chaoying Ma, Ken Moody, Walt Yao: Event Storage and Federation Using ODMG. POS 2000: 265-281 |
18 | Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri: Generic Support for Distributed Applications. IEEE Computer 33(3): 68-76 (2000) | |
1998 | ||
17 | EE | John Bates, Jean Bacon, Ken Moody, Mark D. Spiteri: Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998: 58-65 |
16 | EE | Richard Hayton, Jean Bacon, Ken Moody: Access Control in an Open Distributed Environment. IEEE Symposium on Security and Privacy 1998: 3-14 |
1997 | ||
15 | Richard Hayton, Ken Moody: An Open Architecture for Secure Interworking Services. ICDCS 1997: 0- | |
14 | Tim Mills, Ken Moody, Kerry Rodden: Cobra: A new approach to IR System design. RIAO 1997: 425-450 | |
13 | EE | Tim Mills, Ken Moody, Kerry Rodden: Providing World Wide Access to Historical Sources. Computer Networks 29(8-13): 1317-1325 (1997) |
1996 | ||
12 | EE | Richard Hayton, Ken Moody: An open architecture for secure interworking services. ACM SIGOPS European Workshop 1996: 233-240 |
11 | EE | Tim Mills, Ken Moody: Wide-area information access to multimedia historical sources. ACM SIGOPS European Workshop 1996: 59-66 |
10 | EE | Richard Hayton, Jean Bacon, John Bates, Ken Moody: Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996: 9-16 |
1995 | ||
9 | EE | Zhixue Wu, Ken Moody, Jean Bacon, Robert J. Stroud: Data consistency in a distributed persistent object system. HICSS (2) 1995: 635-644 |
8 | EE | Zhixue Wu, Robert J. Stroud, Ken Moody, Jean Bacon: The design and implementation of a distributed transaction system based on atomic data types. Distributed Systems Engineering 2(1): 50- (1995) |
1994 | ||
7 | Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody: Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994: 141-146 | |
6 | EE | Ken Moody: Concurrency. POS 1994: 127-128 |
5 | Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody: Extensible Access Control for a Hierarchy of Servers. Operating Systems Review 28(3): 4-15 (1994) | |
1991 | ||
4 | Jean Bacon, Ken Moody, Sue Thomson, Tim Wilson: A Multi-Service Storage Architecture. Operating Systems Review 25(4): 47-65 (1991) | |
1988 | ||
3 | EE | Ken Moody: Authentication in a distributed system during partition. ACM SIGOPS European Workshop 1988 |
1983 | ||
2 | T. J. King, Ken Moody: The Design and Implementation of CODD. Softw., Pract. Exper. 13(1): 67-78 (1983) | |
1980 | ||
1 | Ken Moody, Martin Richards: A Coroutine Mechanism for BCPL. Softw., Pract. Exper. 10(10): 765-771 (1980) |