default search action
Ken Moody
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2011
- [c40]Jean Bacon, Andrei Iu. Bejan, Alastair R. Beresford, David Evans, Richard J. Gibbens, Ken Moody:
Using Real-Time Road Traffic Data to Evaluate Congestion. Dependable and Historic Computing 2011: 93-117 - 2010
- [c39]Ken Moody, Jean Bacon, David Evans, Scarlet Schwiderski-Grosche:
Implementing a Practical Spatio-Temporal Composite Event Language. From Active Data Management to Event-Based Systems and More 2010: 108-123 - [c38]David M. Eyers, Luis Vargas, Jatinder Singh, Ken Moody, Jean Bacon:
Relational database support for event-based middleware functionality. DEBS 2010: 160-171
2000 – 2009
- 2009
- [c37]Scarlet Schwiderski-Grosche, Ken Moody:
The SpaTeC composite event language for spatio-temporal reasoning in mobile systems. DEBS 2009 - 2008
- [c36]Luis Vargas, Jean Bacon, Ken Moody:
Event-Driven Database Information Sharing. BNCOD 2008: 113-125 - [c35]David M. Eyers, Sriram Srinivasan, Ken Moody, Jean Bacon:
Compile-Time Enforcement of Dynamic Security Policies. POLICY 2008: 119-126 - [c34]Jatinder Singh, Luis Vargas, Jean Bacon, Ken Moody:
Policy-Based Information Sharing in Publish/Subscribe Middleware. POLICY 2008: 137-144 - 2007
- [c33]Jatinder Singh, Jean Bacon, Ken Moody:
Dynamic trust domains for secure, private, technology-assisted living. ARES 2007: 27-34 - 2006
- [j12]David M. Eyers, Jean Bacon, Ken Moody:
OASIS role-based access control for electronic health records. IEE Proc. Softw. 153(1): 16-23 (2006) - [c32]Luis Vargas, Jean Bacon, Ken Moody:
Transactions in Distributed Event-Based Middleware. CEC/EEE 2006: 53 - 2005
- [c31]Luis Vargas, Jean Bacon, Ken Moody:
Integrating Databases with Publish/Subscribe. ICDCS Workshops 2005: 392-397 - [c30]Nathan Dimmock, Jean Bacon, David Ingram, Ken Moody:
Risk Models for Trust-Based Access Control(TBAC). iTrust 2005: 364-371 - [c29]Daniel Cvrcek, Ken Moody:
Combining Trust and Risk to Reduce the Cost of Attacks. iTrust 2005: 372-383 - [c28]Jean Bacon, David M. Eyers, Ken Moody, Lauri I. W. Pesonen:
Securing Publish/Subscribe for Multi-domain Systems. Middleware 2005: 1-20 - 2004
- [c27]András Belokosztolszki, Ken Moody, David M. Eyers:
A Formal Model for Hierarchical Policy Contexts. POLICY 2004: 127-136 - [c26]Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody:
Using trust and risk in role-based access control policies. SACMAT 2004: 156-162 - 2003
- [j11]Jean Bacon, Ken Moody, Walt Yao:
Access control and trust in the use of widely distributed services. Softw. Pract. Exp. 33(4): 375-394 (2003) - [c25]Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody:
Persistent versus Dynamic Role Membership. DBSec 2003: 344-357 - [c24]András Belokosztolszki, David M. Eyers, Peter R. Pietzuch, Jean Bacon, Ken Moody:
Role-based access control for publish/subscribe middleware architectures. DEBS 2003 - [c23]David M. Eyers, Ken Moody:
Credential negotiation with limited disclosure via iterative range refinement in an unordered space. DEXA Workshops 2003: 427-431 - [c22]Ken Moody, Marco A. Palomino:
SharpSpider: Spidering the Web through Web Services. LA-WEB 2003: 219-221 - [c21]András Belokosztolszki, David M. Eyers, Ken Moody:
Policy Contexts: Controlling Information Flow in Parameterised RBAC. POLICY 2003: 99-110 - [c20]András Belokosztolszki, David M. Eyers, Wei Wang, Ken Moody:
Policy Storage for Role-Based Access Control Systems. WETICE 2003: 196-201 - 2002
- [j10]Jean Bacon, Ken Moody:
Toward open, secure, widely distributed services. Commun. ACM 45(6): 59-64 (2002) - [j9]Jean Bacon, Ken Moody, Walt Yao:
A model of OASIS role-based access control and its support for active security. ACM Trans. Inf. Syst. Secur. 5(4): 492-540 (2002) - [c19]András Belokosztolszki, Ken Moody:
Meta-Policies for Distributed Role-Based Access Control Systems. POLICY 2002: 106-115 - 2001
- [c18]Jean Bacon, Ken Moody, Walt Yao:
Access Control and Trust in the Use of Widely Distributed Services. Middleware 2001: 295-310 - [c17]Jean Bacon, Michael Lloyd, Ken Moody:
Translating Role-Based Access Control Policy within Context. POLICY 2001: 107-119 - [c16]Walt Yao, Ken Moody, Jean Bacon:
A model of OASIS role-based access control and its support for active security. SACMAT 2001: 171-181 - [c15]Agathoniki Trigoni, Ken Moody:
Using Association Rules to Add or Eliminate Query Constraints Automatically. SSDBM 2001: 124-133 - 2000
- [j8]Jean Bacon, Ken Moody, John Bates, Richard Hayton, Chaoying Ma, Andrew McNeil, Oliver Seidel, Mark D. Spiteri:
Generic Support for Distributed Applications. Computer 33(3): 68-76 (2000) - [c14]Ken Moody:
Coordinating Policy for Federated Applications. DBSec 2000: 127-134 - [c13]John H. Hine, Walt Yao, Jean Bacon, Ken Moody:
An Architecture for Distributed OASIS Services. Middleware 2000: 104-120 - [c12]Jean Bacon, Alexis Hombrecher, Chaoying Ma, Ken Moody, Walt Yao:
Event Storage and Federation Using ODMG. POS 2000: 265-281
1990 – 1999
- 1998
- [j7]Jean Bacon, Richard Hayton, Ken Moody:
Middleware for Digital Libraries. D Lib Mag. 4(10) (1998) - [c11]John Bates, Jean Bacon, Ken Moody, Mark D. Spiteri:
Using events for the scalable federation of heterogeneous components. ACM SIGOPS European Workshop 1998: 58-65 - [c10]Richard Hayton, Jean Bacon, Ken Moody:
Access Control in an Open Distributed Environment. S&P 1998: 3-14 - 1997
- [j6]Tim Mills, Ken Moody, Kerry Rodden:
Providing World Wide Access to Historical Sources. Comput. Networks 29(8-13): 1317-1325 (1997) - [c9]Richard Hayton, Ken Moody:
An Open Architecture for Secure Interworking Services. ICDCS 1997: 315-321 - [c8]Tim Mills, Ken Moody, Kerry Rodden:
Cobra: A new approach to IR System design. RIAO 1997: 425-449 - 1996
- [c7]Richard Hayton, Jean Bacon, John Bates, Ken Moody:
Using events to build large scale distributed applications. ACM SIGOPS European Workshop 1996: 9-16 - [c6]Tim Mills, Ken Moody:
Wide-area information access to multimedia historical sources. ACM SIGOPS European Workshop 1996: 59-66 - [c5]Richard Hayton, Ken Moody:
An open architecture for secure interworking services. ACM SIGOPS European Workshop 1996: 233-240 - 1995
- [j5]Zhixue Wu, Robert J. Stroud, Ken Moody, Jean Bacon:
The design and implementation of a distributed transaction system based on atomic data types. Distributed Syst. Eng. 2(1): 50-64 (1995) - [c4]Zhixue Wu, Ken Moody, Jean Bacon, Robert J. Stroud:
Data consistency in a distributed persistent object system. HICSS (2) 1995: 635-644 - 1994
- [j4]Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody:
Extensible Access Control for a Hierarchy of Servers. ACM SIGOPS Oper. Syst. Rev. 28(3): 4-15 (1994) - [c3]Ken Moody:
Concurrency. POS 1994: 127-128 - [c2]Jean Bacon, Richard Hayton, Sai Lai Lo, Ken Moody:
Modular, Extensible Storage Services through Object Interfaces. ACM SIGOPS European Workshop 1994: 141-146 - 1991
- [j3]Jean Bacon, Ken Moody, Sue Thomson, Tim Wilson:
A Multi-Service Storage Architecture. ACM SIGOPS Oper. Syst. Rev. 25(4): 47-65 (1991)
1980 – 1989
- 1988
- [c1]Ken Moody:
Authentication in a distributed system during partition. ACM SIGOPS European Workshop 1988 - 1983
- [j2]T. J. King, Ken Moody:
The Design and Implementation of CODD. Softw. Pract. Exp. 13(1): 67-78 (1983) - 1980
- [j1]Ken Moody, Martin Richards:
A Coroutine Mechanism for BCPL. Softw. Pract. Exp. 10(10): 765-771 (1980)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint