dblp.uni-trier.dewww.uni-trier.de

Tatyana Ryutov

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
10EETatyana Ryutov: A Socio-cognitive Approach to Modeling Policies in Open Environments. POLICY 2007: 29-38
2005
9EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control for grids. GRID 2005: 55-62
8EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control. SACMAT 2005: 139-146
2003
7EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim: Dynamic Authorization and Intrusion Response in Distributed Systems. DISCEX (1) 2003: 50-61
6EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou: Integrated Access Control and Intrusion Detection for Web Servers. ICDCS 2003: 394-
5EETatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim, Li Zhou: Integrated Access Control and Intrusion Detection for Web Servers. IEEE Trans. Parallel Distrib. Syst. 14(9): 841-850 (2003)
2002
4EETatyana Ryutov, B. Clifford Neuman: The Specification and Enforcement of Advanced Security Policies. POLICY 2002: 128-138
2001
3EETatyana Ryutov, B. Clifford Neuman: The Set and Function Approach to Modeling Authorization in Distributed Systems. MMM-ACNS 2001: 189-206
1999
2 Tatyana Ryutov, G. Gheorghiu, B. Clifford Neuman: An authorization framework for metacomputing applications. Cluster Computing 2(2): 165-175 (1999)
1998
1EEG. Gheorghiu, Tatyana Ryutov, B. Clifford Neuman: Authorization for Metacomputing Applications. HPDC 1998: 132-139

Coauthor Index

1Noria Foukia [9]
2G. Gheorghiu [1] [2]
3Dong-Ho Kim [5] [6] [7]
4Travis Leithead [8] [9]
5B. Clifford Neuman [1] [2] [3] [4] [5] [6] [7] [8] [9]
6Kent E. Seamons [8] [9]
7Li Zhou [5] [6] [8] [9]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)