default search action
Babak Sadighi Firozabadi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2012
- [e1]Alexander Artikis, Robert Craven, Nihan Kesim Cicekli, Babak Sadighi, Kostas Stathis:
Logic Programs, Norms and Action - Essays in Honor of Marek J. Sergot on the Occasion of His 60th Birthday. Lecture Notes in Computer Science 7360, Springer 2012, ISBN 978-3-642-29413-6 [contents] - 2010
- [c15]Mohsen Saffarian, Babak Sadighi:
Owner-Based Role-Based Access Control OB-RBAC. ARES 2010: 236-241
2000 – 2009
- 2008
- [j4]Ludwig Seitz, Göran Selander, Erik Rissanen, Cao Ling, Babak Sadighi:
Decentralized Access Control Management for Network Configuration. J. Netw. Syst. Manag. 16(3): 303-316 (2008) - [c14]Andreas Sjöholm, Ludwig Seitz, Babak Sadighi:
Secure communication for ad-hoc, federated groups. IDtrust 2008: 48-58 - 2007
- [c13]Ja'far Alqatawna, Erik Rissanen, Babak Sadighi Firozabadi:
Overriding of Access Control in XACML. POLICY 2007: 87-95 - 2006
- [c12]Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi:
A Classification of Delegation Schemes for Attribute Authority. Formal Aspects in Security and Trust 2006: 158-169 - 2005
- [c11]Ludwig Seitz, Erik Rissanen, Thomas Sandholm, Babak Sadighi Firozabadi, Olle Mulmo:
Policy administration control and delegation using XACML and Delegent. GRID 2005: 49-54 - 2004
- [c10]Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot:
Discretionary Overriding of Access Control in the Privilege Calculus. Formal Aspects in Security and Trust 2004: 219-232 - [c9]Babak Sadighi Firozabadi, Marek J. Sergot, Anna Cinzia Squicciarini, Elisa Bertino:
A Framework for Contractual Resource Sharing in Coalitions. POLICY 2004: 117-126 - [c8]Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot:
Towards a Mechanism for Discretionary Overriding of Access Control. Security Protocols Workshop 2004: 312-319 - 2002
- [c7]Babak Sadighi Firozabadi, Marek J. Sergot:
Revocation Schemes for Delegated Authorities. POLICY 2002: 210-213 - [c6]Olav L. Bandmann, Babak Sadighi Firozabadi, Mads Dam:
Constrained Delegation. S&P 2002: 131-140 - [c5]Babak Sadighi Firozabadi, Marek J. Sergot:
Contractual Access Control. Security Protocols Workshop 2002: 96-103 - 2001
- [c4]Babak Sadighi Firozabadi, Marek J. Sergot, Olav L. Bandmann:
Using Authority Certificates to Create Management Structures. Security Protocols Workshop 2001: 134-145 - [c3]Babak Sadighi Firozabadi:
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). Security Protocols Workshop 2001: 146-150 - 2000
- [j3]Cristiano Castelfranchi, Rino Falcone, Babak Sadighi Firozabadi, Yao-Hua Tan:
Guest Editorial. Appl. Artif. Intell. 14(8): 763-768 (2000) - [j2]Cristiano Castelfranchi, Rino Falcone, Babak Sadighi Firozabadi, Yao-Hua Tan:
Guest Editorial. Appl. Artif. Intell. 14(9): 863-865 (2000)
1990 – 1999
- 1999
- [j1]Rino Falcone, Babak Sadighi Firozabadi:
The challenge of trust, The Autonomous Agents '98 Workshop on Deception, Fraud and Trust in Agent Societies. Knowl. Eng. Rev. 14(1): 81-89 (1999) - [c2]Babak Sadighi Firozabadi, Marek J. Sergot:
Power and Permission in Security Systems. Security Protocols Workshop 1999: 48-59 - 1998
- [c1]Babak Sadighi Firozabadi, Leendert W. N. van der Torre:
Formal Models of Control Systems. ECAI 1998: 317-318
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint