default search action
BibTeX records: Moritz Y. Becker
@inproceedings{DBLP:conf/stm/SultanaBK13, author = {Nik Sultana and Moritz Y. Becker and Markulf Kohlweiss}, editor = {Rafael Accorsi and Silvio Ranise}, title = {Selective Disclosure in Datalog-Based Trust Management}, booktitle = {Security and Trust Management - 9th International Workshop, {STM} 2013, Egham, UK, September 12-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8203}, pages = {160--175}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41098-7\_11}, doi = {10.1007/978-3-642-41098-7\_11}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stm/SultanaBK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Becker12, author = {Moritz Y. Becker}, title = {Information flow in trust management systems}, journal = {J. Comput. Secur.}, volume = {20}, number = {6}, pages = {677--708}, year = {2012}, url = {https://doi.org/10.3233/JCS-2012-0443}, doi = {10.3233/JCS-2012-0443}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Becker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/BeckerRS12, author = {Moritz Y. Becker and Alessandra Russo and Nik Sultana}, title = {Foundations of Logic-Based Trust Management}, booktitle = {{IEEE} Symposium on Security and Privacy, {SP} 2012, 21-23 May 2012, San Francisco, California, {USA}}, pages = {161--175}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/SP.2012.20}, doi = {10.1109/SP.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/BeckerRS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/BeckerK11, author = {Moritz Y. Becker and Masoud Koleini}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {Opacity Analysis in Trust Management Systems}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {229--245}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_16}, doi = {10.1007/978-3-642-24861-0\_16}, timestamp = {Tue, 20 Aug 2024 07:54:44 +0200}, biburl = {https://dblp.org/rec/conf/isw/BeckerK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ruleml/BeckerM11, author = {Moritz Y. Becker and Jason F. Mackay}, editor = {Frank Olken and Monica Palmirani and Davide Sottara}, title = {Relaxed Safeness in Datalog-Based Policies}, booktitle = {Rule-Based Modeling and Computing on the Semantic Web, 5th International Symposium, RuleML 2011- America, Ft. Lauderdale, FL, Florida, USA, November 3-5, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7018}, pages = {49--57}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24908-2\_11}, doi = {10.1007/978-3-642-24908-2\_11}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/ruleml/BeckerM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/BeckerFG10, author = {Moritz Y. Becker and C{\'{e}}dric Fournet and Andrew D. Gordon}, title = {SecPAL: Design and semantics of a decentralized authorization language}, journal = {J. Comput. Secur.}, volume = {18}, number = {4}, pages = {619--665}, year = {2010}, url = {https://doi.org/10.3233/JCS-2009-0364}, doi = {10.3233/JCS-2009-0364}, timestamp = {Mon, 14 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/BeckerFG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BeckerN10, author = {Moritz Y. Becker and Sebastian Nanz}, title = {A logic for state-modifying authorization policies}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {13}, number = {3}, pages = {20:1--20:28}, year = {2010}, url = {https://doi.org/10.1145/1805974.1805976}, doi = {10.1145/1805974.1805976}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BeckerN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Becker10, author = {Moritz Y. Becker}, title = {Information Flow in Credential Systems}, booktitle = {Proceedings of the 23rd {IEEE} Computer Security Foundations Symposium, {CSF} 2010, Edinburgh, United Kingdom, July 17-19, 2010}, pages = {171--185}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/CSF.2010.19}, doi = {10.1109/CSF.2010.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Becker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/BeckerMB10, author = {Moritz Y. Becker and Alexander Malkis and Laurent Bussard}, editor = {Somesh Jha and Anish Mathuria}, title = {A Practical Generic Privacy Language}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {125--139}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_10}, doi = {10.1007/978-3-642-17714-9\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/iciss/BeckerMB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/Becker09, author = {Moritz Y. Becker}, title = {Specification and Analysis of Dynamic Authorisation Policies}, booktitle = {Proceedings of the 22nd {IEEE} Computer Security Foundations Symposium, {CSF} 2009, Port Jefferson, New York, USA, July 8-10, 2009}, pages = {203--217}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSF.2009.14}, doi = {10.1109/CSF.2009.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/Becker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BeckerMD09, author = {Moritz Y. Becker and Jason F. Mackay and Blair Dillaway}, title = {Abductive Authorization Credential Gathering}, booktitle = {{POLICY} 2009, {IEEE} International Symposium on Policies for Distributed Systems and Networks, London, UK, 20-22 July 2009}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/POLICY.2009.23}, doi = {10.1109/POLICY.2009.23}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BeckerMD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/BeckerN08, author = {Moritz Y. Becker and Sebastian Nanz}, editor = {Paul Hudak and David Scott Warren}, title = {The Role of Abduction in Declarative Authorization Policies}, booktitle = {Practical Aspects of Declarative Languages, 10th International Symposium, {PADL} 2008, San Francisco, CA, USA, January 7-8, 2008}, series = {Lecture Notes in Computer Science}, volume = {4902}, pages = {84--99}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-77442-6\_7}, doi = {10.1007/978-3-540-77442-6\_7}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/padl/BeckerN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijmi/Becker07, author = {Moritz Y. Becker}, title = {Information governance in NHS's NPfIT: {A} case for policy specification}, journal = {Int. J. Medical Informatics}, volume = {76}, number = {5-6}, pages = {432--437}, year = {2007}, url = {https://doi.org/10.1016/j.ijmedinf.2006.09.008}, doi = {10.1016/J.IJMEDINF.2006.09.008}, timestamp = {Fri, 21 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijmi/Becker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BeckerFG07, author = {Moritz Y. Becker and C{\'{e}}dric Fournet and Andrew D. Gordon}, title = {Design and Semantics of a Decentralized Authorization Language}, booktitle = {20th {IEEE} Computer Security Foundations Symposium, {CSF} 2007, 6-8 July 2007, Venice, Italy}, pages = {3--15}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/CSF.2007.18}, doi = {10.1109/CSF.2007.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BeckerFG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BeckerN07, author = {Moritz Y. Becker and Sebastian Nanz}, editor = {Joachim Biskup and Javier L{\'{o}}pez}, title = {A Logic for State-Modifying Authorization Policies}, booktitle = {Computer Security - {ESORICS} 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4734}, pages = {203--218}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74835-9\_14}, doi = {10.1007/978-3-540-74835-9\_14}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BeckerN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/BeckerS04, author = {Moritz Y. Becker and Peter Sewell}, title = {Cassandra: Flexible Trust Management, Applied to Electronic Health Records}, booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004), 28-30 June 2004, Pacific Grove, CA, {USA}}, pages = {139--154}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.ieeecomputersociety.org/10.1109/CSFW.2004.7}, doi = {10.1109/CSFW.2004.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/BeckerS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BeckerS04, author = {Moritz Y. Becker and Peter Sewell}, title = {Cassandra: Distributed Access Control Policies with Tunable Expressiveness}, booktitle = {5th {IEEE} International Workshop on Policies for Distributed Systems and Networks {(POLICY} 2004), 7-9 June 2004, Yorktown Heights, NY, {USA}}, pages = {159--168}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/POLICY.2004.1309162}, doi = {10.1109/POLICY.2004.1309162}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BeckerS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/BeckerR01, author = {Moritz Y. Becker and Isabel Rojas}, title = {A graph layout algorithm for drawing metabolic pathways}, journal = {Bioinform.}, volume = {17}, number = {5}, pages = {461--467}, year = {2001}, url = {https://doi.org/10.1093/bioinformatics/17.5.461}, doi = {10.1093/BIOINFORMATICS/17.5.461}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/BeckerR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.