dblp.uni-trier.dewww.uni-trier.de

Ken Moody

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
46EELuis Vargas, Jean Bacon, Ken Moody: Event-Driven Database Information Sharing. BNCOD 2008: 113-125
45EEDavid M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon: Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126
44EEJatinder Singh, Luis Vargas, Jean Bacon, Ken Moody: Policy-Based Information Sharing in Publish/Subscribe Middleware. POLICY 2008: 137-144
2007
43EEJatinder Singh, Jean Bacon, Ken Moody: Dynamic trust domains for secure, private, technology-assisted living. ARES 2007: 27-34
2006
42EELuis Vargas, Jean Bacon, Ken Moody: Transactions in Distributed Event-Based Middleware. CEC/EEE 2006: 53
2005
41EELuis Vargas, Jean Bacon, Ken Moody: Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005: 392-397
40EEJean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen: Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20
39EENathan Dimmock, Jean Bacon, David Ingram, Ken Moody: Risk Models for Trust-Based Access Control(TBAC). iTrust 2005: 364-371
38EEDaniel Cvrcek, Ken Moody: Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005: 372-383
2004
37EEAndrás Belokosztolszki, Ken Moody, David M. Eyers: A Formal Model for Hierarchical Policy Contexts. POLICY 2004: 127-136
36EENathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody: Using trust and risk in role-based access control policies. SACMAT 2004: 156-162
2003
35 Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody: Persistent versus Dynamic Role Membership. DBSec 2003: 344-357
34EEAndrás Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody: Role-based access control for publish/subscribe middleware architectures. DEBS 2003
33EEDavid M. Eyers, Ken Moody: Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003: 427-431
32EEKen Moody, Marco A. Palomino: SharpSpider: Spidering the Web through Web Services. LA-WEB 2003: 219-221
31EEAndrás Belokosztolszki, David M. Eyers, Ken Moody: Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003: 99-110
30EEAndrás Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody: Policy Storage for Role-Based Access Control Systems. WETICE 2003: 196-201
29 Jean Bacon, Ken Moody, Walt Yao: Access control and trust in the use of widely distributed services. Softw., Pract. Exper. 33(4): 375-394 (2003)
2002
28EEAndrás Belokosztolszki, Ken Moody: Meta-Policies for Distributed Role-Based Access Control Systems. POLICY 2002: 106-115
27EEJean Bacon, Ken Moody, Walt Yao: A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002)
26EEJean Bacon, Ken Moody: Toward open, secure, widely distributed services. Commun. ACM 45(6): 59-64 (2002)
2001
25EEJean Bacon, Ken Moody, Walt Yao: Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001: 295-310
24EEJean Bacon, Michael Lloyd, Ken Moody: Translating Role-Based Access Control Policy within Context. POLICY 2001: 107-119
23EEWalt Yao, Ken Moody, Jean Bacon: A model of OASIS role-based access control and its support for active security. SACMAT 2001: 171-181
22 Agathoniki Trigoni, Ken Moody: Using Association Rules to Add or Eliminate Query Constraints Automatically. SSDBM 2001: 124-133
2000
21 Ken Moody: Coordinating Policy for Federated Applications. DBSec 2000: 127-134
20EEJohn H. Hine, Walt Yao, Jean Bacon, Ken Moody: An Architecture for Distributed OASIS Services. Middleware 2000: 104-120
19EEJean Bacon, Alexis Hombrecher, Chaoying Ma, Ken Moody, Walt Yao: Event Storage and Federation Using ODMG. POS 2000: 265-281
18 Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri: Generic Support for Distributed Applications. IEEE Computer 33(3): 68-76 (2000)
1998
17EEJohn Bates, Jean Bacon, Ken Moody, Mark D. Spiteri: Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998: 58-65
16EERichard Hayton, Jean Bacon, Ken Moody: Access Control in an Open Distributed Environment. IEEE Symposium on Security and Privacy 1998: 3-14
1997
15 Richard Hayton, Ken Moody: An Open Architecture for Secure Interworking Services. ICDCS 1997: 0-
14 Tim Mills, Ken Moody, Kerry Rodden: Cobra: A new approach to IR System design. RIAO 1997: 425-450
13EETim Mills, Ken Moody, Kerry Rodden: Providing World Wide Access to Historical Sources. Computer Networks 29(8-13): 1317-1325 (1997)
1996
12EERichard Hayton, Ken Moody: An open architecture for secure interworking services. ACM SIGOPS European Workshop 1996: 233-240
11EETim Mills, Ken Moody: Wide-area information access to multimedia historical sources. ACM SIGOPS European Workshop 1996: 59-66
10EERichard Hayton, Jean Bacon, John Bates, Ken Moody: Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996: 9-16
1995
9EEZhixue Wu, Ken Moody, Jean Bacon, Robert J. Stroud: Data consistency in a distributed persistent object system. HICSS (2) 1995: 635-644
8EEZhixue Wu, Robert J. Stroud, Ken Moody, Jean Bacon: The design and implementation of a distributed transaction system based on atomic data types. Distributed Systems Engineering 2(1): 50- (1995)
1994
7 Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody: Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994: 141-146
6EEKen Moody: Concurrency. POS 1994: 127-128
5 Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody: Extensible Access Control for a Hierarchy of Servers. Operating Systems Review 28(3): 4-15 (1994)
1991
4 Jean Bacon, Ken Moody, Sue Thomson, Tim Wilson: A Multi-Service Storage Architecture. Operating Systems Review 25(4): 47-65 (1991)
1988
3EEKen Moody: Authentication in a distributed system during partition. ACM SIGOPS European Workshop 1988
1983
2 T. J. King, Ken Moody: The Design and Implementation of CODD. Softw., Pract. Exper. 13(1): 67-78 (1983)
1980
1 Ken Moody, Martin Richards: A Coroutine Mechanism for BCPL. Softw., Pract. Exper. 10(10): 765-771 (1980)

Coauthor Index

1Jean Bacon [4] [5] [7] [8] [9] [10] [16] [17] [18] [19] [20] [23] [24] [25] [26] [27] [29] [34] [35] [36] [39] [40] [41] [42] [43] [44] [45] [46]
2John Bates [10] [17] [18]
3András Belokosztolszki [28] [30] [31] [34] [36] [37]
4David W. Chadwick [35]
5Daniel Cvrcek [38]
6Nathan Dimmock [36] [39]
7David M. Eyers [30] [31] [33] [34] [36] [37] [40] [45]
8Richard Hayton [5] [7] [10] [12] [15] [16] [18]
9John H. Hine [20]
10Alexis Hombrecher [19]
11David Ingram [39]
12T. J. King [2]
13Michael Lloyd [24]
14Sai Lai Lo [5] [7]
15Chaoying Ma [18] [19]
16Andrew McNeil [18]
17Tim Mills [11] [13] [14]
18Sassa Otenko (Alexander Otenko) [35]
19Marco A. Palomino [32]
20Lauri I. W. Pesonen [40]
21Peter R. Pietzuch [34]
22Martin Richards [1]
23Kerry Rodden [13] [14]
24Oliver Seidel [18]
25Jatinder Singh [43] [44]
26Mark D. Spiteri [17] [18]
27Sriram Srinivasan [45]
28Robert J. Stroud [8] [9]
29Sue Thomson [4]
30Agathoniki Trigoni (Niki Trigoni) [22]
31Luis Vargas [41] [42] [44] [46]
32Wei Wang [30]
33Tim Wilson [4]
34Zhixue Wu [8] [9]
35Walt Yao [19] [20] [23] [25] [27] [29]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)