Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Steve Barker
@article{DBLP:journals/jcsc/NagulapalliHBTL20, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Amr A. Tammam and F. John Lidgey and Nabil Yassine}, title = {A High-Sensitivity and Low-Power Circuit for the Measurement of Abnormal Blood Cell Levels}, journal = {J. Circuits Syst. Comput.}, volume = {29}, number = {4}, pages = {2050061:1--2050061:14}, year = {2020}, url = {https://doi.org/10.1142/S0218126620500619}, doi = {10.1142/S0218126620500619}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHB20, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker}, title = {A {VGA} Linearity Improvement Technique for {ECG} Analog Front-End in 65nm {CMOS}}, journal = {J. Circuits Syst. Comput.}, volume = {29}, number = {7}, pages = {2050113:1--2050113:11}, year = {2020}, url = {https://doi.org/10.1142/S0218126620501133}, doi = {10.1142/S0218126620501133}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHB20a, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker}, title = {A Positive Feedback-Based Op-Amp Gain Enhancement Technique for High-Precision Applications}, journal = {J. Circuits Syst. Comput.}, volume = {29}, number = {14}, pages = {2050220:1--2050220:12}, year = {2020}, url = {https://doi.org/10.1142/S0218126620502205}, doi = {10.1142/S0218126620502205}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBR20, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and B. Naresh Kumar Reddy}, title = {A Single {BJT} 10.2 ppm/{\textdegree}C Bandgap Reference in 45nm {CMOS} Technology}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225362}, doi = {10.1109/ICCCNT49239.2020.9225362}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBR20a, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and B. Naresh Kumar Reddy}, title = {A two-stage opamp frequency Compensation technique by splitting the 2\({}^{\mbox{nd}}\) stage}, booktitle = {11th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2020, Kharagpur, India, July 1-3, 2020}, pages = {1--5}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICCCNT49239.2020.9225666}, doi = {10.1109/ICCCNT49239.2020.9225666}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBR20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHBGL19, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Pantelis Georgiou and F. J. Lidgey}, title = {A High Value, Linear and Tunable {CMOS} Pseudo-Resistor for Biomedical Applications}, journal = {J. Circuits Syst. Comput.}, volume = {28}, number = {6}, pages = {1950096:1--1950096:11}, year = {2019}, url = {https://doi.org/10.1142/S0218126619500968}, doi = {10.1142/S0218126619500968}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/HayatlehZNBYGL19, author = {Khaled Hayatleh and Saddam Zourob and Rajasekhar Nagulapalli and Steve Barker and Nabil Yassine and Pantelis Georgiou and F. J. Lidgey}, title = {A High-Performance Skin Impedance Measurement Circuit for Biomedical Applications}, journal = {J. Circuits Syst. Comput.}, volume = {28}, number = {7}, pages = {1950110:1--1950110:15}, year = {2019}, url = {https://doi.org/10.1142/S021812661950110X}, doi = {10.1142/S021812661950110X}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/HayatlehZNBYGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHBTG19, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Amr A. Tammam and Pantelis Georgiou and F. J. Lidgey}, title = {A 0.55 {V} Bandgap Reference with a 59 ppm/{\textdegree}C Temperature Coefficient}, journal = {J. Circuits Syst. Comput.}, volume = {28}, number = {7}, pages = {1950120:1--1950120:12}, year = {2019}, url = {https://doi.org/10.1142/S0218126619501202}, doi = {10.1142/S0218126619501202}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHBTY19, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Amr A. Tammam and Nabil Yassine and Bilal Yassine and Mohamed Ben{-}Esmael}, title = {A Low Noise Amplifier Suitable for Biomedical Recording Analog Front-End in 65nm {CMOS} Technology}, journal = {J. Circuits Syst. Comput.}, volume = {28}, number = {8}, pages = {1950137:1--1950137:12}, year = {2019}, url = {https://doi.org/10.1142/S0218126619501378}, doi = {10.1142/S0218126619501378}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHBYZ19, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Bilal Yassine and Saddam Zourob and Sumathi Raparthy and Nabil Yassine}, title = {A Start-up Assisted Fully Differential Folded Cascode Opamp}, journal = {J. Circuits Syst. Comput.}, volume = {28}, number = {10}, pages = {1950164:1--1950164:12}, year = {2019}, url = {https://doi.org/10.1142/S0218126619501640}, doi = {10.1142/S0218126619501640}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBRS19, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and B. Naresh Kumar Reddy and B. Seetharamulu}, title = {A Low Power Miller Compensation Technique for Two Stage Op-amp in 65nm {CMOS} Technology}, booktitle = {10th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCCNT45670.2019.8944553}, doi = {10.1109/ICCCNT45670.2019.8944553}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBRS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBRS19a, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and B. Naresh Kumar Reddy and B. Seetharamulu}, title = {A High Frequency {CMRR} improvement technique for Differential Amplifiers in 45nm {CMOS}}, booktitle = {10th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2019, Kanpur, India, July 6-8, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCCNT45670.2019.8944785}, doi = {10.1109/ICCCNT45670.2019.8944785}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBRS19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/NagulapalliHBRY18, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Sumathi Raparthy and Nabil Yassine and John Lidgey}, title = {A 0.6 {V} MOS-Only Voltage Reference for Biomedical Applications with 40 ppm/{\(\circ\)}C Temperature Drift}, journal = {J. Circuits Syst. Comput.}, volume = {27}, number = {8}, pages = {1850128:1--1850128:13}, year = {2018}, url = {https://doi.org/10.1142/S0218126618501281}, doi = {10.1142/S0218126618501281}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/NagulapalliHBRY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBZY18, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Saddam Zourob and Nabil Yassine and B. Naresh Kumar Reddy}, title = {A Technique to Reduce the Capacitor Size in Two Stage Miller Compensated Opamp}, booktitle = {9th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCNT.2018.8493494}, doi = {10.1109/ICCCNT.2018.8493494}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccnt/NagulapalliHBZY18a, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Saddam Zourob and Nabil Yassine and B. Naresh Kumar Reddy}, title = {High Performance Circuit Techniques for Nueral Front-End Design in 65nm {CMOS}}, booktitle = {9th International Conference on Computing, Communication and Networking Technologies, {ICCCNT} 2018, Bengaluru, India, July 10-12, 2018}, pages = {1--4}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCCNT.2018.8493806}, doi = {10.1109/ICCCNT.2018.8493806}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icccnt/NagulapalliHBZY18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vdat/NagulapalliHBZY18, author = {Rajasekhar Nagulapalli and Khaled Hayatleh and Steve Barker and Saddam Zourob and Nabil Yassine and B. Naresh Kumar Reddy}, editor = {S. Rajaram and N. B. Balamurugan and D. Gracia Nirmala Rani and Virendra Singh}, title = {A 31 ppm/{\textdegree} {C} Pure {CMOS} Bandgap Reference by Exploiting Beta-Multiplier}, booktitle = {{VLSI} Design and Test - 22nd International Symposium, {VDAT} 2018, Madurai, India, June 28-30, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {892}, pages = {100--108}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5950-7\_9}, doi = {10.1007/978-981-13-5950-7\_9}, timestamp = {Wed, 04 May 2022 16:21:48 +0200}, biburl = {https://dblp.org/rec/conf/vdat/NagulapalliHBZY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ro-man/BarkerICHRHF17, author = {Steve Barker and Hooshang Izadi and Nigel T. Crook and Khaled Hayatleh and Matthias Rolf and Philip Hughes and Neil Fellows}, title = {Natural head movement for {HRI} with a muscular-skeletal head and neck robot}, booktitle = {26th {IEEE} International Symposium on Robot and Human Interactive Communication, {RO-MAN} 2017, Lisbon, Portugal, August 28 - Sept. 1, 2017}, pages = {587--592}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ROMAN.2017.8172362}, doi = {10.1109/ROMAN.2017.8172362}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/ro-man/BarkerICHRHF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/robio/BarkerFHFSC15, author = {Steve Barker and Luis A. Fuente and Khaled Hayatleh and Neil Fellows and Jochen J. Steil and Nigel T. Crook}, title = {Design of a biologically inspired humanoid neck}, booktitle = {2015 {IEEE} International Conference on Robotics and Biomimetics, {ROBIO} 2015, Zhuhai, China, December 6-9, 2015}, pages = {25--30}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ROBIO.2015.7407034}, doi = {10.1109/ROBIO.2015.7407034}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/robio/BarkerFHFSC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/TerzopoulosHSLBTB14, author = {Nikolaos Terzopoulos and Khaled Hayatleh and Cristiana Sebu and F. J. Lidgey and Mohamed Ben{-}Esmael and Amr A. Tammam and Steve Barker}, title = {Analysis and Design of a High Precision-High output impedance Tissue Current Driver for Medical Applications}, journal = {J. Circuits Syst. Comput.}, volume = {23}, number = {8}, year = {2014}, url = {https://doi.org/10.1142/S021812661450114X}, doi = {10.1142/S021812661450114X}, timestamp = {Tue, 14 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/TerzopoulosHSLBTB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/logcom/BarkerBGG14, author = {Steve Barker and Guido Boella and Dov M. Gabbay and Valerio Genovese}, title = {Reasoning about delegation and revocation schemes in answer set programming}, journal = {J. Log. Comput.}, volume = {24}, number = {1}, pages = {89--116}, year = {2014}, url = {https://doi.org/10.1093/logcom/exs014}, doi = {10.1093/LOGCOM/EXS014}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/logcom/BarkerBGG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BarkerG12, author = {Steve Barker and Valerio Genovese}, title = {Access Control with Privacy Enhancements a Unified Approach}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {9}, number = {5}, pages = {670--683}, year = {2012}, url = {https://doi.org/10.1109/TDSC.2012.22}, doi = {10.1109/TDSC.2012.22}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/BarkerG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/BarkerJKKLMMS12, author = {Steve Barker and Andrew J. I. Jones and Antonis C. Kakas and Robert A. Kowalski and Alessio Lomuscio and Rob Miller and Stephen H. Muggleton and Giovanni Sartor}, editor = {Alexander Artikis and Robert Craven and Nihan Kesim Cicekli and Babak Sadighi and Kostas Stathis}, title = {The Scientific Contribution of Marek Sergot}, booktitle = {Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7360}, pages = {4--11}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29414-3\_2}, doi = {10.1007/978-3-642-29414-3\_2}, timestamp = {Sat, 30 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/BarkerJKKLMMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/Barker12, author = {Steve Barker}, editor = {Alexander Artikis and Robert Craven and Nihan Kesim Cicekli and Babak Sadighi and Kostas Stathis}, title = {Logical Approaches to Authorization Policies}, booktitle = {Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {7360}, pages = {349--373}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29414-3\_19}, doi = {10.1007/978-3-642-29414-3\_19}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/birthday/Barker12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/AucherBBGT11, author = {Guillaume Aucher and Steve Barker and Guido Boella and Valerio Genovese and Leendert W. N. van der Torre}, editor = {Yingjiu Li}, title = {Dynamics in Delegation and Revocation Schemes: {A} Logical Approach}, booktitle = {Data and Applications Security and Privacy {XXV} - 25th Annual {IFIP} {WG} 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6818}, pages = {90--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22348-8\_9}, doi = {10.1007/978-3-642-22348-8\_9}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/AucherBBGT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BarkerG11, author = {Steve Barker and Valerio Genovese}, editor = {Vijay Atluri and Claudia D{\'{\i}}az}, title = {Socially Constructed Trust for Distributed Authorization}, booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6879}, pages = {262--277}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23822-2\_15}, doi = {10.1007/978-3-642-23822-2\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BarkerG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpnmr/BarkerG11, author = {Steve Barker and Valerio Genovese}, editor = {James P. Delgrande and Wolfgang Faber}, title = {Secommunity: {A} Framework for Distributed Access Control}, booktitle = {Logic Programming and Nonmonotonic Reasoning - 11th International Conference, {LPNMR} 2011, Vancouver, Canada, May 16-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6645}, pages = {297--303}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20895-9\_34}, doi = {10.1007/978-3-642-20895-9\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/lpnmr/BarkerG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/BarkerL11, author = {Steve Barker and Gillian Lowen}, title = {{GPF:} {A} General Policy Framework}, booktitle = {{POLICY} 2011, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011}, pages = {117--120}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/POLICY.2011.31}, doi = {10.1109/POLICY.2011.31}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/BarkerL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerG10, author = {Steve Barker and Valerio Genovese}, editor = {Sara Foresti and Sushil Jajodia}, title = {A Logic of Privacy}, booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP} {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6166}, pages = {17--32}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13739-6\_2}, doi = {10.1007/978-3-642-13739-6\_2}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Barker10, author = {Steve Barker}, editor = {James B. D. Joshi and Barbara Carminati}, title = {Personalizing access control by generalizing access control}, booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings}, pages = {149--158}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1809842.1809866}, doi = {10.1145/1809842.1809866}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Barker10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sLogica/BarkerBGG09, author = {Steve Barker and Guido Boella and Dov M. Gabbay and Valerio Genovese}, title = {A Meta-model of Access Control in a Fibred Security Language}, journal = {Stud Logica}, volume = {92}, number = {3}, pages = {437--477}, year = {2009}, url = {https://doi.org/10.1007/s11225-009-9203-4}, doi = {10.1007/S11225-009-9203-4}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sLogica/BarkerBGG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Barker09, author = {Steve Barker}, editor = {Barbara Carminati and James Joshi}, title = {The next 700 access control models or a unifying meta-model?}, booktitle = {14th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2009, Stresa, Italy, June 3-5, 2009, Proceedings}, pages = {187--196}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1542207.1542238}, doi = {10.1145/1542207.1542238}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Barker09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lisp/BarkerLV08, author = {Steve Barker and Michael Leuschel and Mauricio Varea}, title = {Efficient and flexible access control via Jones-optimal logic program specialisation}, journal = {High. Order Symb. Comput.}, volume = {21}, number = {1-2}, pages = {5--35}, year = {2008}, url = {https://doi.org/10.1007/s10990-008-9030-8}, doi = {10.1007/S10990-008-9030-8}, timestamp = {Thu, 05 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lisp/BarkerLV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarkerSW08, author = {Steve Barker and Marek J. Sergot and Duminda Wijesekera}, title = {Status-Based Access Control}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {12}, number = {1}, pages = {1:1--1:47}, year = {2008}, url = {https://doi.org/10.1145/1410234.1410235}, doi = {10.1145/1410234.1410235}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerSW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker08, author = {Steve Barker}, editor = {Vijay Atluri}, title = {Dynamic Meta-level Access Control in {SQL}}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {1--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_1}, doi = {10.1007/978-3-540-70567-3\_1}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Barker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerCCLT08, author = {Steve Barker and David W. Chadwick and Jason Crampton and Emil Lupu and Bhavani Thuraisingham}, editor = {Vijay Atluri}, title = {Panel Session: What Are the Key Challenges in Distributed Security?}, booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5094}, pages = {219--221}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70567-3\_17}, doi = {10.1007/978-3-540-70567-3\_17}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerCCLT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Barker08, author = {Steve Barker}, editor = {Indrakshi Ray and Ninghui Li}, title = {Access control by action control}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {143--152}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377858}, doi = {10.1145/1377836.1377858}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Barker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BarkerBF09, author = {Steve Barker and Clara Bertolissi and Maribel Fern{\'{a}}ndez}, editor = {Daniel J. Dougherty and Santiago Escobar}, title = {Action Control by Term Rewriting}, booktitle = {Proceedings of the Third International Workshop on Security and Rewriting Techniques, SecReT@LICS/CSF 2008, Pittsburgh, PA, USA, June 22, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {234}, pages = {19--36}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.02.070}, doi = {10.1016/J.ENTCS.2009.02.070}, timestamp = {Thu, 09 Mar 2023 12:59:09 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BarkerBF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/BarkerL09, author = {Steve Barker and Gill Lowen}, editor = {Demis Ballis and Santiago Escobar}, title = {Event-oriented Web-based E-trading}, booktitle = {Proceedings of the 4th International Workshop on Automated Specification and Verification of Web Systems, {WWV} 2008, Siena, Italy, July 4, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {235}, pages = {35--53}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.03.004}, doi = {10.1016/J.ENTCS.2009.03.004}, timestamp = {Thu, 09 Mar 2023 13:11:35 +0100}, biburl = {https://dblp.org/rec/journals/entcs/BarkerL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BertolissiFB07, author = {Clara Bertolissi and Maribel Fern{\'{a}}ndez and Steve Barker}, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Dynamic Event-Based Access Control as Term Rewriting}, booktitle = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, pages = {195--210}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0\_15}, doi = {10.1007/978-3-540-73538-0\_15}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BertolissiFB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BarkerD07, author = {Steve Barker and Paul Douglas}, editor = {Jorge Cardoso and Jos{\'{e}} Cordeiro and Joaquim Filipe}, title = {Secure knowledge exchange by policy algebra and erml}, booktitle = {{ICEIS} 2007 - Proceedings of the Ninth International Conference on Enterprise Information Systems, Volume DISI, Funchal, Madeira, Portugal, June 12-16, 2007}, pages = {212--217}, year = {2007}, timestamp = {Thu, 03 Feb 2022 09:27:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BarkerD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Barker07, author = {Steve Barker}, editor = {Volkmar Lotz and Bhavani Thuraisingham}, title = {Action-status access control}, booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings}, pages = {195--204}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1266840.1266873}, doi = {10.1145/1266840.1266873}, timestamp = {Wed, 29 Jun 2022 15:37:42 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Barker07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/dbsec/2007, editor = {Steve Barker and Gail{-}Joon Ahn}, title = {Data and Applications Security XXI, 21st Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4602}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73538-0}, doi = {10.1007/978-3-540-73538-0}, isbn = {978-3-540-73533-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerF06, author = {Steve Barker and Maribel Fern{\'{a}}ndez}, editor = {Ernesto Damiani and Peng Liu}, title = {Term Rewriting for Access Control}, booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4127}, pages = {179--193}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11805588\_13}, doi = {10.1007/11805588\_13}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/DouglasB05, author = {Paul Douglas and Steve Barker}, title = {An E-learning tool for Database Administration}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {453--458}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.73}, doi = {10.1109/ITCC.2005.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/DouglasB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BarkerD05, author = {Steve Barker and Paul Douglas}, title = {An Intelligent Tutoring System for Program Semantics}, booktitle = {International Symposium on Information Technology: Coding and Computing {(ITCC} 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, {USA}}, pages = {482--487}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ITCC.2005.82}, doi = {10.1109/ITCC.2005.82}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BarkerD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker04, author = {Steve Barker}, editor = {Csilla Farkas and Pierangela Samarati}, title = {Web Resource Usage Control in {RSCLP}}, booktitle = {Research Directions in Data and Applications Security XVIII, {IFIP} {TC11/WG} 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain}, series = {{IFIP}}, volume = {144}, pages = {281--294}, publisher = {Kluwer/Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8128-6\_19}, doi = {10.1007/1-4020-8128-6\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Barker04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BarkerD04, author = {Steve Barker and Paul Douglas}, title = {An Intelligent Tutoring System for Database Transaction Processing}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {197--203}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BarkerD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclp/Barker04, author = {Steve Barker}, editor = {Bart Demoen and Vladimir Lifschitz}, title = {Labeled Logic Programs}, booktitle = {Logic Programming, 20th International Conference, {ICLP} 2004, Saint-Malo, France, September 6-10, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3132}, pages = {448--449}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27775-0\_32}, doi = {10.1007/978-3-540-27775-0\_32}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iclp/Barker04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/Barker04, author = {Steve Barker}, title = {Access Policy Specification for Web Applications}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {45--49}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286588}, doi = {10.1109/ITCC.2004.1286588}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/Barker04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/DouglasB04, author = {Paul Douglas and Steve Barker}, title = {Dependency Theory E-Learning Tool}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {151--155}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286442}, doi = {10.1109/ITCC.2004.1286442}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/DouglasB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BarkerD04, author = {Steve Barker and Paul Douglas}, title = {Protecting Federated Databases Using {A} Practical Implementation of a Formal {RBAC} Policy}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 1, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {523--527}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286510}, doi = {10.1109/ITCC.2004.1286510}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BarkerD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pepm/BarkerLV04, author = {Steve Barker and Michael Leuschel and Mauricio Varea}, editor = {Nevin Heintze and Peter Sestoft}, title = {Efficient and flexible access control via logic program specialisation}, booktitle = {Proceedings of the 2004 {ACM} {SIGPLAN} Workshop on Partial Evaluation and Semantics-based Program Manipulation, 2004, Verona, Italy, August 24-25, 2004}, pages = {190--199}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1014007.1014026}, doi = {10.1145/1014007.1014026}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pepm/BarkerLV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/BarkerS03, author = {Steve Barker and Peter J. Stuckey}, title = {Flexible access control policy specification with constraint logic programming}, journal = {{ACM} Trans. Inf. Syst. Secur.}, volume = {6}, number = {4}, pages = {501--546}, year = {2003}, url = {https://doi.org/10.1145/950191.950194}, doi = {10.1145/950191.950194}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/BarkerS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerD03, author = {Steve Barker and Paul Douglas}, editor = {Sabrina De Capitani di Vimercati and Indrakshi Ray and Indrajit Ray}, title = {{RBAC} Policy Implementation for {SQL} Databases}, booktitle = {Data and Applications Security {XVII:} Status and Prospects, {IFIP} {TC-11} {WG} 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, {USA}}, series = {{IFIP}}, volume = {142}, pages = {288--301}, publisher = {Kluwer/Springer}, year = {2003}, url = {https://doi.org/10.1007/1-4020-8070-0\_21}, doi = {10.1007/1-4020-8070-0\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/BarkerD03, author = {Steve Barker and Paul Douglas}, title = {Extended Protected Databases: {A} Practical Implementation}, booktitle = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise Information Systems, Angers, France, April 22-26, 2003}, pages = {456--459}, year = {2003}, timestamp = {Thu, 02 Feb 2017 12:57:29 +0100}, biburl = {https://dblp.org/rec/conf/iceis/BarkerD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/BarkerD03, author = {Steve Barker and Paul Douglas}, title = {An E-Learning Tool for Understanding Schedule Properties}, booktitle = {2003 International Symposium on Information Technology {(ITCC} 2003), 28-30 April 2003, Las Vegas, NV, {USA}}, pages = {53}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/ITCC.2003.1197499}, doi = {10.1109/ITCC.2003.1197499}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/BarkerD03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Barker03, author = {Steve Barker}, editor = {Vladimir Gorodetsky and Leonard J. Popyack and Victor A. Skormin}, title = {Distributed Access Control: {A} Logic-Based Approach}, booktitle = {Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, {MMM-ACNS} 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2776}, pages = {217--228}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45215-7\_18}, doi = {10.1007/978-3-540-45215-7\_18}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Barker03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dke/Barker02, author = {Steve Barker}, title = {Protecting deductive databases from unauthorized retrieval and update requests}, journal = {Data Knowl. Eng.}, volume = {43}, number = {3}, pages = {293--315}, year = {2002}, url = {https://doi.org/10.1016/S0169-023X(02)00126-X}, doi = {10.1016/S0169-023X(02)00126-X}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dke/Barker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerDF02, author = {Steve Barker and Paul Douglas and Terry Fanning}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Implementing {RBAC} Policies}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {27--36}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 07:52:21 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerDF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker02, author = {Steve Barker}, editor = {Ehud Gudes and Sujeet Shenoi}, title = {Deductive Database Security}, booktitle = {Research Directions in Data and Applications Security, {IFIP} {WG} 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, {UK}}, series = {{IFIP} Conference Proceedings}, volume = {256}, pages = {103--114}, publisher = {Kluwer}, year = {2002}, timestamp = {Wed, 27 Aug 2003 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Barker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iclp/Barker02, author = {Steve Barker}, editor = {Peter J. Stuckey}, title = {Access Control for Deductive Databases by Logic Programming}, booktitle = {Logic Programming, 18th International Conference, {ICLP} 2002, Copenhagen, Denmark, July 29 - August 1, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2401}, pages = {54--69}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45619-8\_5}, doi = {10.1007/3-540-45619-8\_5}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iclp/Barker02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/BarkerR01, author = {Steve Barker and Arnon Rosenthal}, editor = {Martin S. Olivier and David L. Spooner}, title = {Flexible Security Policies in {SQL}}, booktitle = {Database and Application Security XV, {IFIP} {TC11/WG11.3} Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada}, series = {{IFIP} Conference Proceedings}, volume = {215}, pages = {167--180}, publisher = {Kluwer}, year = {2001}, timestamp = {Tue, 07 May 2002 13:50:19 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/BarkerR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mmmacns/Barker01, author = {Steve Barker}, editor = {Vladimir I. Gorodetski and Victor A. Skormin and Leonard J. Popyack}, title = {{TRBAC:} {A} Temporal Authorization Model}, booktitle = {Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security, International Workshop {MMM-ACNS} 2001, St. Petersburg, Russia, May 21-23, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2052}, pages = {178--188}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45116-1\_19}, doi = {10.1007/3-540-45116-1\_19}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/mmmacns/Barker01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/padl/Barker01, author = {Steve Barker}, editor = {I. V. Ramakrishnan}, title = {Secure Deductive Databases}, booktitle = {Practical Aspects of Declarative Languages, Third International Symposium, {PADL} 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1990}, pages = {123--137}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45241-9\_9}, doi = {10.1007/3-540-45241-9\_9}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/padl/Barker01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cl/Barker00, author = {Steve Barker}, editor = {John W. Lloyd and Ver{\'{o}}nica Dahl and Ulrich Furbach and Manfred Kerber and Kung{-}Kiu Lau and Catuscia Palamidessi and Lu{\'{\i}}s Moniz Pereira and Yehoshua Sagiv and Peter J. Stuckey}, title = {Data Protection by Logic Programming}, booktitle = {Computational Logic - {CL} 2000, First International Conference, London, UK, 24-28 July, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1861}, pages = {1300--1314}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44957-4\_87}, doi = {10.1007/3-540-44957-4\_87}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/cl/Barker00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker00, author = {Steve Barker}, editor = {Bhavani Thuraisingham and Reind P. van de Riet and Klaus R. Dittrich and Zahir Tari}, title = {Protecting Deductive Databases from Unauthorized Retrievals}, booktitle = {Data and Application Security, Development and Directions, {IFIP} {TC11/} {WG11.3} Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000}, series = {{IFIP} Conference Proceedings}, volume = {201}, pages = {185--196}, publisher = {Kluwer}, year = {2000}, url = {https://doi.org/10.1007/0-306-47008-X\_17}, doi = {10.1007/0-306-47008-X\_17}, timestamp = {Wed, 29 Jun 2022 15:37:44 +0200}, biburl = {https://dblp.org/rec/conf/dbsec/Barker00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/Barker00, author = {Steve Barker}, title = {Information Security: {A} Logic Based Approach}, booktitle = {{ICEIS} 2000, Proceedings of the Second International Conference on Enterprise Information Systems, Stafford, UK, July 4-7, 2000}, pages = {9--14}, publisher = {{ICEIS} Secretariat, Escola Superior de Tecnologia de Set{\'{u}}bal, Portugal}, year = {2000}, timestamp = {Thu, 02 Feb 2017 12:59:58 +0100}, biburl = {https://dblp.org/rec/conf/iceis/Barker00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dbsec/Barker99, author = {Steve Barker}, editor = {Vijayalakshmi Atluri and John Hale}, title = {Temporal Authorization in the Simplified Event Calculus}, booktitle = {Research Advances in Database and Information Systems Security, {IFIP} {WG} 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {171}, pages = {271--284}, publisher = {Kluwer}, year = {1999}, timestamp = {Thu, 03 Jan 2002 11:56:17 +0100}, biburl = {https://dblp.org/rec/conf/dbsec/Barker99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icai/Barker99, author = {Steve Barker}, editor = {Hamid R. Arabnia}, title = {An Expert System for Intelligent Database Design}, booktitle = {Proceedings of the International Conference on Artificial Intelligence, {IC-AI} '99, June 28 - July 1, 1999, Las Vegas, Nevada, USA, Volume 1}, pages = {143--148}, publisher = {{CSREA} Press}, year = {1999}, timestamp = {Fri, 26 Mar 2004 13:51:06 +0100}, biburl = {https://dblp.org/rec/conf/icai/Barker99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.