| Year | Rank | Type | Title / Venue / Authors |
|---|---|---|---|
| 2025 | J | jnl |
Computer
|
| 2019 | — | conf |
IFIP Int. Conf. Digital Forensics
|
| 2018 | — | conf |
From Database to Cyber Security
|
| 2016 | — | conf |
ABAC@CODASPY
|
| 2014 | — | ch. |
Secure Cloud Computing
|
| 2010 | B | conf |
DBSec
|
| 2010 | J | jnl |
ACM Crossroads
|
| 2009 | J | jnl |
IEEE Secur. Priv.
|
| 2008 | — | conf |
POLICY
|
| 2007 | J | jnl |
IEEE Secur. Priv.
|
| 2006 | J | jnl |
IEEE Secur. Priv.
|
| 2005 | A | conf |
ACSAC
|
| 2005 | — | conf |
POLICY
|
| 2004 | — | conf |
HICSS
|
| 2004 | C | conf |
ICEC
|
| 2004 | — | conf |
CCCT (2)
|
| 2003 | A | conf |
ACSAC
|
| 2003 | C | conf |
SACMAT
|
| 2001 | A | conf |
ACSAC
|
| 2001 | J | jnl |
ACM Trans. Inf. Syst. Secur.
|
| 2000 | — | conf |
ACM Workshop on Role-Based Access Control
|