关注
Farzad Salim
Farzad Salim
Splunk (Cisco Company)
在 splunk.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Graph theoretic representation of building information models for access control applications
N Skandhakumar, F Salim, R Drogemuller, JF Reid, E Dawson
Automation in Construction 68, 44-51, 2016
442016
Location constraints in digital rights management
A Muhlbauer, R Safavi-Naini, F Salim, NP Sheppard, M Surminen
Computer Communications 31 (6), 1173-1180, 2008
362008
An approach to access control under uncertainty
F Salim, J Reid, E Dawson, U Dulleck
Availability, Reliability and Security (ARES), 2011 Sixth International …, 2011
352011
A policy model for access control using building information models
N Skandhakumar, J Reid, F Salim, E Dawson
International Journal of Critical Infrastructure Protection 23, 1-10, 2018
242018
Enforcing privacy policies using a digital rights management system
F Salim, NP Sheppard, R Safavi-Naini
Proceedings of the 7th international conference on Privacy enhancing …, 2007
24*2007
Towards executable specification: combining i* and AgentSpeak (L).
F Salim, C Chang, A Krishna, A Ghose
Proceedings of the 17th International Conference on Software Engineering and …, 2005
202005
Budget-aware Role Based Access Control
F Salim, J Reid, U Dulleck, E Dawson
Computers & Security 35, 37–50, 2013
182013
Towards authorisation models for secure information sharing: A survey and research agenda
F Salim, JF Reid, E Dawson
ISeCure, The ISC International Journal of Information Security 2 (2), 69-87, 2010
182010
An authorization framework using building information models
N Skandhakumar, J Reid, E Dawson, R Drogemuller, F Salim
The Computer Journal, 2012
172012
Towards a game theoretic authorisation model
F Salim, J Reid, U Dulleck, E Dawson
Decision and Game Theory for Security (GameSec), 208-219, 2010
152010
An administrative model for UCON
F Salim, J Reid, E Dawson
Proceedings of the Eighth Australasian Conference on Information Security …, 2010
15*2010
Physical access control administration using building information models
N Skandhakumar, F Salim, J Reid, E Dawson
Cyberspace Safety and Security: 4th International Symposium, CSS 2012 …, 2012
142012
A rights management approach to securing data distribution in coalitions
F Salim, NP Sheppard, R Safavi-Naini
Network and System Security (NSS), 2010 4th International Conference on, 560-567, 2010
112010
Approaches to access control under uncertainty
F Salim
Queensland University of Technology, 2012
82012
BP-XACML an authorisation policy language for business processes
K Alissa, J Reid, E Dawson, F Salim
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
72015
Hybrid Modeling Using I* and Agentspeak (L) Agents in Agent Oriented Software Engineering.
A Dasgupta, F Salim, A Krishna, AK Ghose
ICEIS (3), 420-425, 2006
62006
Optimal budget allocation in budget-based access control
F Salim, U Dulleck, JF Reid, E Dawson
The 6th International Conference on Availability, Reliability and Security, 2011
42011
Co-evolution of i* and AgentSpeak (L) agents in agent oriented software engineering
A Dasgupta, F Salim, A Krishna, AK Ghose
Proceedings of the Fourth International Workshop on Agent-Oriented …, 2005
22005
Detecting and resolving redundancies in EP3P policies
F Salim
Faculty of Computer Science and Software Engineering, University of Wollongong, 2006
12006
PAIS Access Control Model Characteristics Analysis
K Alissa, F Salim, J Reid, E Dawson
2018 1st International Conference on Computer Applications & Information …, 2018
2018
系统目前无法执行此操作,请稍后再试。
文章 1–20