关注
Aya Mohamed
标题
引用次数
引用次数
年份
A systematic literature review for authorization and access control: definitions, strategies and models
AKYS Mohamed, D Auer, D Hofer, J Küng
International journal of web information systems 18 (2/3), 156-180, 2022
272022
Extended authorization policy for graph-structured data
A Mohamed, D Auer, D Hofer, J Küng
SN Computer Science 2 (5), 351, 2021
122021
Extending authorization capabilities of object relational/graph mappers by request manipulation
D Hofer, S Nadschläger, A Mohamed, J Küng
International Conference on Database and Expert Systems Applications, 71-83, 2022
82022
A systematic literature review of authorization and access control requirements and current state of the art for different database models
AKYS Mohamed, D Auer, D Hofer, J Küng
International Journal of Web Information Systems 20 (1), 1-23, 2024
52024
Authorization policy extension for graph databases
A Mohamed, D Auer, D Hofer, J Küng
Future Data and Security Engineering: 7th International Conference, FDSE …, 2020
52020
Extended xacml language and architecture for access control in graph-structured data
A Mohamed, D Auer, D Hofer, J Küng
The 23rd International Conference on Information Integration and Web …, 2021
42021
Authorization strategies and classification of access control models
A Mohamed, D Auer, D Hofer, J Küng
Future Data and Security Engineering: 8th International Conference, FDSE …, 2021
42021
An intermediate representation for rewriting cypher queries
D Hofer, A Mohamed, S Nadschläger, D Auer
International Conference on Database and Expert Systems Applications, 86-90, 2023
32023
Authorization and access control for different database models: Requirements and current state of the art
A Mohamed, D Auer, D Hofer, J Küng
International Conference on Future Data and Security Engineering, 225-239, 2022
32022
A study on time models in graph databases for security log analysis
D Hofer, M Jäger, AKYS Mohamed, J Küng
International Journal of Web Information Systems 17 (5), 427-448, 2021
32021
On applying graph database time models for security log analysis
D Hofer, M Jäger, A Mohamed, J Küng
Future Data and Security Engineering: 7th International Conference, FDSE …, 2020
32020
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement
A Mohamed, D Auer, D Hofer, J Küng
arXiv preprint arXiv:2306.12819, 2023
22023
Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control
D Hofer, A Mohamed, D Auer, S Nadschläger, J Küng
International Conference on Database and Expert Systems Applications, 431-436, 2023
12023
Modifying neo4j’s object graph mapper queries for access control
D Hofer, A Mohamed, J Küng
International Conference on Information Integration and Web, 421-426, 2022
12022
Comparison of Access Control Approaches for Graph-Structured Data
A Mohamed, D Auer, D Hofer, J Kueng
arXiv preprint arXiv:2405.20762, 2024
2024
Fine-grained Dynamic Authorization and Access Control in the Context of Graph-Structured Data/submitted by Aya Khaled Youssef Sayed Mohamed
AKYS Mohamed
2024
系统目前无法执行此操作,请稍后再试。
文章 1–16