Graph theoretic representation of building information models for access control applications N Skandhakumar, F Salim, R Drogemuller, JF Reid, E Dawson Automation in Construction 68, 44-51, 2016 | 44 | 2016 |
Location constraints in digital rights management A Muhlbauer, R Safavi-Naini, F Salim, NP Sheppard, M Surminen Computer Communications 31 (6), 1173-1180, 2008 | 36 | 2008 |
An approach to access control under uncertainty F Salim, J Reid, E Dawson, U Dulleck Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011 | 35 | 2011 |
A policy model for access control using building information models N Skandhakumar, J Reid, F Salim, E Dawson International Journal of Critical Infrastructure Protection 23, 1-10, 2018 | 24 | 2018 |
Enforcing privacy policies using a digital rights management system F Salim, NP Sheppard, R Safavi-Naini Proceedings of the 7th international conference on Privacy enhancing …, 2007 | 24* | 2007 |
Towards executable specification: combining i* and AgentSpeak (L). F Salim, C Chang, A Krishna, A Ghose Proceedings of the 17th International Conference on Software Engineering and …, 2005 | 20 | 2005 |
Budget-aware Role Based Access Control F Salim, J Reid, U Dulleck, E Dawson Computers & Security 35, 37–50, 2013 | 18 | 2013 |
Towards authorisation models for secure information sharing: A survey and research agenda F Salim, JF Reid, E Dawson ISeCure, The ISC International Journal of Information Security 2 (2), 69-87, 2010 | 18 | 2010 |
An authorization framework using building information models N Skandhakumar, J Reid, E Dawson, R Drogemuller, F Salim The Computer Journal, 2012 | 17 | 2012 |
Towards a game theoretic authorisation model F Salim, J Reid, U Dulleck, E Dawson Decision and Game Theory for Security (GameSec), 208-219, 2010 | 15 | 2010 |
An administrative model for UCON F Salim, J Reid, E Dawson Proceedings of the Eighth Australasian Conference on Information Security …, 2010 | 15* | 2010 |
Physical access control administration using building information models N Skandhakumar, F Salim, J Reid, E Dawson Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012 | 14 | 2012 |
A rights management approach to securing data distribution in coalitions F Salim, NP Sheppard, R Safavi-Naini Network and System Security (NSS), 2010 4th International Conference on, 560-567, 2010 | 11 | 2010 |
Approaches to access control under uncertainty F Salim Queensland University of Technology, 2012 | 8 | 2012 |
BP-XACML an authorisation policy language for business processes K Alissa, J Reid, E Dawson, F Salim Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 7 | 2015 |
Hybrid Modeling Using I* and Agentspeak (L) Agents in Agent Oriented Software Engineering. A Dasgupta, F Salim, A Krishna, AK Ghose ICEIS (3), 420-425, 2006 | 6 | 2006 |
Optimal budget allocation in budget-based access control F Salim, U Dulleck, JF Reid, E Dawson The 6th International Conference on Availability, Reliability and Security, 2011 | 4 | 2011 |
Co-evolution of i* and AgentSpeak (L) agents in agent oriented software engineering A Dasgupta, F Salim, A Krishna, AK Ghose Proceedings of the Fourth International Workshop on Agent-Oriented …, 2005 | 2 | 2005 |
Detecting and resolving redundancies in EP3P policies F Salim Faculty of Computer Science and Software Engineering, University of Wollongong, 2006 | 1 | 2006 |
PAIS Access Control Model Characteristics Analysis K Alissa, F Salim, J Reid, E Dawson 2018 1st International Conference on Computer Applications & Information …, 2018 | | 2018 |