Æȷοì
Jorge Lobo
Á¦¸ñ
Àοë
Àοë
¿¬µµ
Foundations of disjunctive logic programming
J Lobo, J Minker, A Rajasekar
The MIT Press, 1992
4981992
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
4942010
Apolicy DESCRIPTION LANGUAGE
J Lobo
4151999
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and ¡¦, 2008
2292008
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and ¡¦, 2009
1832009
Conflict resolution using logic programming
J Chomicki, J Lobo, S Naqvi
IEEE Transactions on knowledge and data engineering 15 (1), 244-249, 2003
1802003
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and ¡¦, 2010
1772010
Method and system for supporting non-intrusive and effective voice communication among mobile users
R Bhatia, H Johansson, J Lobo, S Sharma
US Patent 7,330,721, 2008
1732008
Optimizing resource allocation for virtualized network functions in a cloud center using genetic algorithms
W Rankothge, F Le, A Russo, J Lobo
IEEE Transactions on Network and Service Management 14 (2), 343-356, 2017
1672017
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and ¡¦, 2009
1602009
Policy-based management of networked computing systems
D Agrawal, KW Lee, J Lobo
IEEE Communications Magazine 43 (10), 69-75, 2005
1532005
Weak generalized closed world assumption
A Rajasekar, J Lobo, J Minker
Journal of automated reasoning 5 (3), 293-307, 1989
1371989
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases ¡¦, 2007
1342007
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and ¡¦, 2009
1312009
An obligation model bridging access control policies and privacy policies
Q Ni, E Bertino, J Lobo
Proceedings of the 13th ACM symposium on Access control models and ¡¦, 2008
1262008
Policy ratification
D Agrawal, J Giles, KW Lee, J Lobo
Sixth IEEE International Workshop on Policies for Distributed Systems and ¡¦, 2005
1252005
A logic programming approach to conflict resolution in policy management
J Chomicki, J Lobo, SA Naqvi
Proceedings of the Seventh International Conference on Principles of ¡¦, 2000
1222000
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 1-35, 2010
1212010
Expressive policy analysis with enhanced system dynamicity
R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara
Proceedings of the 4th International Symposium on Information, Computer, and ¡¦, 2009
1082009
Towards Making Network Function Virtualization a Cloud Computing Service
W Rankothge, J Ma, F Le, AM Russo, J Lobo
Integrated Network Management (IM), 2015 IFIP/IEEE International Symposium ¡¦, 2015
1072015
ÇöÀç ½Ã½ºÅÛÀÌ ÀÛµ¿µÇÁö ¾Ê½À´Ï´Ù. ³ªÁß¿¡ ´Ù½Ã ½ÃµµÇØ ÁÖ¼¼¿ä.
ÇмúÀÚ·á 1–20