A systematic literature review for authorization and access control: definitions, strategies and models AKYS Mohamed, D Auer, D Hofer, J Küng International journal of web information systems 18 (2/3), 156-180, 2022 | 27 | 2022 |
Extended authorization policy for graph-structured data A Mohamed, D Auer, D Hofer, J Küng SN Computer Science 2 (5), 351, 2021 | 12 | 2021 |
Extending authorization capabilities of object relational/graph mappers by request manipulation D Hofer, S Nadschläger, A Mohamed, J Küng International Conference on Database and Expert Systems Applications, 71-83, 2022 | 8 | 2022 |
A systematic literature review of authorization and access control requirements and current state of the art for different database models AKYS Mohamed, D Auer, D Hofer, J Küng International Journal of Web Information Systems 20 (1), 1-23, 2024 | 5 | 2024 |
Authorization policy extension for graph databases A Mohamed, D Auer, D Hofer, J Küng Future Data and Security Engineering: 7th International Conference, FDSE …, 2020 | 5 | 2020 |
Extended xacml language and architecture for access control in graph-structured data A Mohamed, D Auer, D Hofer, J Küng The 23rd International Conference on Information Integration and Web …, 2021 | 4 | 2021 |
Authorization strategies and classification of access control models A Mohamed, D Auer, D Hofer, J Küng Future Data and Security Engineering: 8th International Conference, FDSE …, 2021 | 4 | 2021 |
An intermediate representation for rewriting cypher queries D Hofer, A Mohamed, S Nadschläger, D Auer International Conference on Database and Expert Systems Applications, 86-90, 2023 | 3 | 2023 |
Authorization and access control for different database models: Requirements and current state of the art A Mohamed, D Auer, D Hofer, J Küng International Conference on Future Data and Security Engineering, 225-239, 2022 | 3 | 2022 |
A study on time models in graph databases for security log analysis D Hofer, M Jäger, AKYS Mohamed, J Küng International Journal of Web Information Systems 17 (5), 427-448, 2021 | 3 | 2021 |
On applying graph database time models for security log analysis D Hofer, M Jäger, A Mohamed, J Küng Future Data and Security Engineering: 7th International Conference, FDSE …, 2020 | 3 | 2020 |
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement A Mohamed, D Auer, D Hofer, J Küng arXiv preprint arXiv:2306.12819, 2023 | 2 | 2023 |
Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control D Hofer, A Mohamed, D Auer, S Nadschläger, J Küng International Conference on Database and Expert Systems Applications, 431-436, 2023 | 1 | 2023 |
Modifying neo4j’s object graph mapper queries for access control D Hofer, A Mohamed, J Küng International Conference on Information Integration and Web, 421-426, 2022 | 1 | 2022 |
Comparison of Access Control Approaches for Graph-Structured Data A Mohamed, D Auer, D Hofer, J Kueng arXiv preprint arXiv:2405.20762, 2024 | | 2024 |
Fine-grained Dynamic Authorization and Access Control in the Context of Graph-Structured Data/submitted by Aya Khaled Youssef Sayed Mohamed AKYS Mohamed | | 2024 |