Jorge Lobo
TitleCited byYear
Foundations of disjunctive logic programming
J Lobo, J Minker, A Rajasekar
The MIT Press, 1992
4621992
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010
4062010
Apolicy DESCRIPTION LANGUAGE
J Lobo
3611999
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
1742008
Method and system for supporting non-intrusive and effective voice communication among mobile users
R Bhatia, H Johansson, J Lobo, S Sharma
US Patent 7,330,721, 2008
1722008
Conflict resolution using logic programming
J Chomicki, J Lobo, S Naqvi
IEEE Transactions on Knowledge and Data Engineering 15 (1), 244-249, 2003
1552003
Weak generalized closed world assumption
A Rajasekar, J Lobo, J Minker
Journal of automated reasoning 5 (3), 293-307, 1989
1481989
Policy-based management of networked computing systems
D Agrawal, KW Lee, J Lobo
IEEE Communications Magazine 43 (10), 69-75, 2005
1392005
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1362009
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1312010
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1202009
A logic programming approach to conflict resolution in policy management
J Chomicki, J Lobo, S Naqvi
7th International Conference on Principles of Knowledge Representation and …, 2000
1152000
Policy ratification
D Agrawal, J Giles, KW Lee, J Lobo
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
1122005
An obligation model bridging access control policies and privacy policies.
Q Ni, E Bertino, J Lobo
SACMAT 8, 133-142, 2008
1112008
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases …, 2007
1112007
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1062009
Expressive policy analysis with enhanced system dynamicity
R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
892009
Policy management system
M Kohli, J Lobo, SA Naqvi, A Virmani
US Patent 7,213,068, 2007
892007
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 36, 2010
852010
An approach to evaluate policy similarity
D Lin, P Rao, E Bertino, J Lobo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
802007
The system can't perform the operation now. Try again later.
Articles 1–20