2008 |
46 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Event-Driven Database Information Sharing.
BNCOD 2008: 113-125 |
45 | EE | David M. Eyers,
Sriram Srinivasan,
Ken Moody,
Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies.
POLICY 2008: 119-126 |
44 | EE | Jatinder Singh,
Luis Vargas,
Jean Bacon,
Ken Moody:
Policy-Based Information Sharing in Publish/Subscribe Middleware.
POLICY 2008: 137-144 |
2007 |
43 | EE | Jatinder Singh,
Jean Bacon,
Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living.
ARES 2007: 27-34 |
2006 |
42 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Transactions in Distributed Event-Based Middleware.
CEC/EEE 2006: 53 |
2005 |
41 | EE | Luis Vargas,
Jean Bacon,
Ken Moody:
Integrating Databases with Publish/Subscribe.
ICDCS Workshops 2005: 392-397 |
40 | EE | Jean Bacon,
David M. Eyers,
Ken Moody,
Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems.
Middleware 2005: 1-20 |
39 | EE | Nathan Dimmock,
Jean Bacon,
David Ingram,
Ken Moody:
Risk Models for Trust-Based Access Control(TBAC).
iTrust 2005: 364-371 |
38 | EE | Daniel Cvrcek,
Ken Moody:
Combining Trust and Risk to Reduce the Cost of Attacks.
iTrust 2005: 372-383 |
2004 |
37 | EE | András Belokosztolszki,
Ken Moody,
David M. Eyers:
A Formal Model for Hierarchical Policy Contexts.
POLICY 2004: 127-136 |
36 | EE | Nathan Dimmock,
András Belokosztolszki,
David M. Eyers,
Jean Bacon,
Ken Moody:
Using trust and risk in role-based access control policies.
SACMAT 2004: 156-162 |
2003 |
35 | | Jean Bacon,
David W. Chadwick,
Alexander Otenko,
Ken Moody:
Persistent versus Dynamic Role Membership.
DBSec 2003: 344-357 |
34 | EE | András Belokosztolszki,
David M. Eyers,
Peter R. Pietzuch,
Jean Bacon,
Ken Moody:
Role-based access control for publish/subscribe middleware architectures.
DEBS 2003 |
33 | EE | David M. Eyers,
Ken Moody:
Credential negotiation with limited disclosure via iterative range refinement in an unordered space.
DEXA Workshops 2003: 427-431 |
32 | EE | Ken Moody,
Marco A. Palomino:
SharpSpider: Spidering the Web through Web Services.
LA-WEB 2003: 219-221 |
31 | EE | András Belokosztolszki,
David M. Eyers,
Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC.
POLICY 2003: 99-110 |
30 | EE | András Belokosztolszki,
David M. Eyers,
Wei Wang,
Ken Moody:
Policy Storage for Role-Based Access Control Systems.
WETICE 2003: 196-201 |
29 | | Jean Bacon,
Ken Moody,
Walt Yao:
Access control and trust in the use of widely distributed services.
Softw., Pract. Exper. 33(4): 375-394 (2003) |
2002 |
28 | EE | András Belokosztolszki,
Ken Moody:
Meta-Policies for Distributed Role-Based Access Control Systems.
POLICY 2002: 106-115 |
27 | EE | Jean Bacon,
Ken Moody,
Walt Yao:
A model of OASIS role-based access control and its support for active security.
ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002) |
26 | EE | Jean Bacon,
Ken Moody:
Toward open, secure, widely distributed services.
Commun. ACM 45(6): 59-64 (2002) |
2001 |
25 | EE | Jean Bacon,
Ken Moody,
Walt Yao:
Access Control and Trust in the Use of Widely Distributed Services.
Middleware 2001: 295-310 |
24 | EE | Jean Bacon,
Michael Lloyd,
Ken Moody:
Translating Role-Based Access Control Policy within Context.
POLICY 2001: 107-119 |
23 | EE | Walt Yao,
Ken Moody,
Jean Bacon:
A model of OASIS role-based access control and its support for active security.
SACMAT 2001: 171-181 |
22 | | Agathoniki Trigoni,
Ken Moody:
Using Association Rules to Add or Eliminate Query Constraints Automatically.
SSDBM 2001: 124-133 |
2000 |
21 | | Ken Moody:
Coordinating Policy for Federated Applications.
DBSec 2000: 127-134 |
20 | EE | John H. Hine,
Walt Yao,
Jean Bacon,
Ken Moody:
An Architecture for Distributed OASIS Services.
Middleware 2000: 104-120 |
19 | EE | Jean Bacon,
Alexis Hombrecher,
Chaoying Ma,
Ken Moody,
Walt Yao:
Event Storage and Federation Using ODMG.
POS 2000: 265-281 |
18 | | Jean Bacon,
Ken Moody,
John Bates,
Richard Hayton,
Chaoying Ma,
Andrew McNeil,
Oliver Seidel,
Mark D. Spiteri:
Generic Support for Distributed Applications.
IEEE Computer 33(3): 68-76 (2000) |
1998 |
17 | EE | John Bates,
Jean Bacon,
Ken Moody,
Mark D. Spiteri:
Using events for the scalable federation of heterogeneous components.
ACM SIGOPS European Workshop 1998: 58-65 |
16 | EE | Richard Hayton,
Jean Bacon,
Ken Moody:
Access Control in an Open Distributed Environment.
IEEE Symposium on Security and Privacy 1998: 3-14 |
1997 |
15 | | Richard Hayton,
Ken Moody:
An Open Architecture for Secure Interworking Services.
ICDCS 1997: 0- |
14 | | Tim Mills,
Ken Moody,
Kerry Rodden:
Cobra: A new approach to IR System design.
RIAO 1997: 425-450 |
13 | EE | Tim Mills,
Ken Moody,
Kerry Rodden:
Providing World Wide Access to Historical Sources.
Computer Networks 29(8-13): 1317-1325 (1997) |
1996 |
12 | EE | Richard Hayton,
Ken Moody:
An open architecture for secure interworking services.
ACM SIGOPS European Workshop 1996: 233-240 |
11 | EE | Tim Mills,
Ken Moody:
Wide-area information access to multimedia historical sources.
ACM SIGOPS European Workshop 1996: 59-66 |
10 | EE | Richard Hayton,
Jean Bacon,
John Bates,
Ken Moody:
Using events to build large scale distributed applications.
ACM SIGOPS European Workshop 1996: 9-16 |
1995 |
9 | EE | Zhixue Wu,
Ken Moody,
Jean Bacon,
Robert J. Stroud:
Data consistency in a distributed persistent object system.
HICSS (2) 1995: 635-644 |
8 | EE | Zhixue Wu,
Robert J. Stroud,
Ken Moody,
Jean Bacon:
The design and implementation of a distributed transaction system based on atomic data types.
Distributed Systems Engineering 2(1): 50- (1995) |
1994 |
7 | | Jean Bacon,
Richard Hayton,
Sai Lai Lo,
Ken Moody:
Modular, Extensible Storage Services through Object Interfaces.
ACM SIGOPS European Workshop 1994: 141-146 |
6 | EE | Ken Moody:
Concurrency.
POS 1994: 127-128 |
5 | | Jean Bacon,
Richard Hayton,
Sai Lai Lo,
Ken Moody:
Extensible Access Control for a Hierarchy of Servers.
Operating Systems Review 28(3): 4-15 (1994) |
1991 |
4 | | Jean Bacon,
Ken Moody,
Sue Thomson,
Tim Wilson:
A Multi-Service Storage Architecture.
Operating Systems Review 25(4): 47-65 (1991) |
1988 |
3 | EE | Ken Moody:
Authentication in a distributed system during partition.
ACM SIGOPS European Workshop 1988 |
1983 |
2 | | T. J. King,
Ken Moody:
The Design and Implementation of CODD.
Softw., Pract. Exper. 13(1): 67-78 (1983) |
1980 |
1 | | Ken Moody,
Martin Richards:
A Coroutine Mechanism for BCPL.
Softw., Pract. Exper. 10(10): 765-771 (1980) |