Janice Warner

According to our database1, Janice Warner authored at least 22 papers between 2004 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Book Review: Interoperability in Digital Public Services and Administration: Bridging E-Government and E-Business, by Yannis Charalabidis.
Inf. Polity, 2011

Next steps in e-government crowdsourcing.
Proceedings of the 12th Annual International Conference on Digital Government Research, 2011

2010
Role Engineering via Prioritized Subset Enumeration.
IEEE Trans. Dependable Secur. Comput., 2010

Finding information in an era of abundance: Towards a collaborative tagging environment in government.
Inf. Polity, 2010

2009
Privacy protection in government mashups.
Inf. Polity, 2009

Secure RFID systems for supply chain applications.
Int. J. Electron. Bus., 2009

Semantic and pragmatic annotation for government information discovery, sharing and collaboration.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

Social networking -- technology, tools, and applications: a hands-on tutorial to make the most of the conference.
Proceedings of the 10th Annual International Conference on Digital Government Research, 2009

2008
Security for Workflow Systems.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Semantic Annotation and Search for Deep Web Services.
Proceedings of the 10th IEEE International Conference on E-Commerce Technology (CEC 2008) / 5th IEEE International Conference on Enterprise Computing, 2008

A citizen privacy protection model for e-government mashup services.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

2007
Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

2006
Inter-instance authorization constraints for secure workflow management.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Secure interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach.
Proceedings of the Data and Applications Security XX, 2006

RoleMiner: mining roles using subset enumeration.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Supporting conditional delegation in secure workflow management systems.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies.
Proceedings of the Information Systems Security, First International Conference, 2005

Agency interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Data and Applications Security XIX, 2005

2004
A Distributed Service Registry for Resource Sharing Among Ad-Hoc Dynamic Coalitions.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004

Automatic Enforcement of Access Control Policies Among Dynamic Coalitions.
Proceedings of the Distributed Computing and Internet Technology, 2004


  Loading...