Jorge Lobo
TitleCited byYear
Foundations of disjunctive logic programming
J Lobo, J Minker, A Rajasekar
The MIT Press, 1992
4611992
Privacy-aware role-based access control
Q Ni, E Bertino, J Lobo, C Brodie, CM Karat, J Karat, A Trombeta
ACM Transactions on Information and System Security (TISSEC) 13 (3), 24, 2010
3932010
Apolicy DESCRIPTION LANGUAGE
J Lobo
3561999
Mining roles with semantic meanings
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
Proceedings of the 13th ACM symposium on Access control models and …, 2008
1692008
Method and system for supporting non-intrusive and effective voice communication among mobile users
R Bhatia, H Johansson, J Lobo, S Sharma
US Patent 7,330,721, 2008
1692008
Conflict resolution using logic programming
J Chomicki, J Lobo, S Naqvi
IEEE Transactions on Knowledge and Data Engineering 15 (1), 244-249, 2003
1542003
Weak generalized closed world assumption
A Rajasekar, J Lobo, J Minker
Journal of automated reasoning 5 (3), 293-307, 1989
1471989
Policy-based management of networked computing systems
D Agrawal, KW Lee, J Lobo
IEEE Communications Magazine 43 (10), 69-75, 2005
1382005
Evaluating role mining algorithms
I Molloy, N Li, T Li, Z Mao, Q Wang, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1312009
Risk-based access control systems built on fuzzy inferences
Q Ni, E Bertino, J Lobo
Proceedings of the 5th ACM Symposium on Information, Computer and …, 2010
1262010
Access control policy combining: theory meets practice
N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1152009
A logic programming approach to conflict resolution in policy management
J Chomicki, J Lobo, S Naqvi
7th International Conference on Principles of Knowledge Representation and …, 2000
1142000
On the correctness criteria of fine-grained access control in relational databases
Q Wang, T Yu, N Li, J Lobo, E Bertino, K Irwin, JW Byun
Proceedings of the 33rd international conference on Very large data bases …, 2007
1082007
Policy ratification
D Agrawal, J Giles, KW Lee, J Lobo
Sixth IEEE International Workshop on Policies for Distributed Systems and …, 2005
1082005
An obligation model bridging access control policies and privacy policies.
Q Ni, E Bertino, J Lobo
SACMAT 8, 133-142, 2008
1072008
An algebra for fine-grained integration of XACML policies
P Rao, D Lin, E Bertino, N Li, J Lobo
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1052009
Policy management system
M Kohli, J Lobo, SA Naqvi, A Virmani
US Patent 7,213,068, 2007
902007
Expressive policy analysis with enhanced system dynamicity
R Craven, J Lobo, J Ma, A Russo, E Lupu, A Bandara
Proceedings of the 4th International Symposium on Information, Computer, and …, 2009
882009
Mining roles with multiple objectives
I Molloy, H Chen, T Li, Q Wang, N Li, E Bertino, S Calo, J Lobo
ACM Transactions on Information and System Security (TISSEC) 13 (4), 36, 2010
802010
An approach to evaluate policy similarity
D Lin, P Rao, E Bertino, J Lobo
Proceedings of the 12th ACM symposium on Access control models and …, 2007
782007
The system can't perform the operation now. Try again later.
Articles 1–20