


default search action
Jason Crampton
Person information
- affiliation: Royal Holloway, University of London, UK
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j29]Jason Crampton
, Eduard Eiben
, Gregory Z. Gutin
, Daniel Karapetyan
, Diptapriyo Majumdar
:
Bi-objective Optimization in Role Mining. ACM Trans. Priv. Secur. 28(1): 5:1-5:22 (2025) - 2024
- [i32]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Bi-objective Optimization in Role Mining. CoRR abs/2403.16757 (2024) - 2022
- [j28]Jason Crampton, Eduard Eiben, Gregory Z. Gutin
, Daniel Karapetyan, Diptapriyo Majumdar
:
Valued Authorization Policy Existence Problem: Theory and Experiments. ACM Trans. Priv. Secur. 25(4): 28:1-28:32 (2022) - [c77]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Generalized Noise Role Mining. SACMAT 2022: 91-102 - 2021
- [j27]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar
:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. ACM Trans. Priv. Secur. 24(3): 21:1-21:22 (2021) - [c76]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar
:
Valued Authorization Policy Existence Problem. SACMAT 2021: 83-94 - [i31]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar
:
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis. CoRR abs/2104.05983 (2021) - [i30]Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem: Theory and Experiments. CoRR abs/2106.05761 (2021) - 2020
- [j26]Pierre Bergé
, Jason Crampton, Gregory Z. Gutin
, Rémi Watrigant:
The Authorization Policy Existence Problem. IEEE Trans. Dependable Secur. Comput. 17(6): 1333-1344 (2020)
2010 – 2019
- 2019
- [j25]Jason Crampton, Gregory Z. Gutin, Martin Koutecký
, Rémi Watrigant:
Parameterized resiliency problems. Theor. Comput. Sci. 795: 478-491 (2019) - [c75]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar
:
Bounded and Approximate Strong Satisfiability in Workflows. SACMAT 2019: 179-184 - [i29]Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Bounded and Approximate Strong Satisfiability in Workflows. CoRR abs/1904.07234 (2019) - 2017
- [j24]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan
, Rémi Watrigant:
The bi-objective workflow satisfiability problem and workflow resiliency. J. Comput. Secur. 25(1): 83-115 (2017) - [j23]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic enforcement of information flow policies without public information via tree partitions. J. Comput. Secur. 25(6): 511-535 (2017) - [c74]Jason Crampton, Gregory Z. Gutin, Martin Koutecký
, Rémi Watrigant:
Parameterized Resiliency Problems via Integer Linear Programming. CIAC 2017: 164-176 - [c73]Jason Crampton, Conrad Williams:
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. CODASPY 2017: 47-58 - [c72]Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. CODASPY 2017: 163-165 - [c71]James Alderman, Naomi Farley, Jason Crampton:
Tree-Based Cryptographic Access Control. ESORICS (1) 2017: 47-64 - [c70]Jason Crampton, Conrad Williams:
Attribute Expressions, Policy Tables and Attribute-Based Access Control. SACMAT 2017: 79-90 - [c69]James Alderman, Jason Crampton, Naomi Farley:
A Framework for the Cryptographic Enforcement of Information Flow Policies. SACMAT 2017: 143-154 - [c68]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
On the Satisfiability of Workflows with Release Points. SACMAT 2017: 207-217 - [i28]Jason Crampton, Conrad Williams:
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. CoRR abs/1702.04173 (2017) - 2016
- [j22]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Algorithms for the workflow satisfiability problem engineered for counting constraints. J. Comb. Optim. 32(1): 3-24 (2016) - [j21]Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones, Magnus Wahlström
:
On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations. ACM Trans. Priv. Secur. 19(3): 8:1-8:29 (2016) - [c67]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
A Multivariate Approach for Checking Resiliency in Access Control. AAIM 2016: 173-184 - [c66]Jason Crampton, James Sellwood:
ARPPM: Administration in the RPPM Model. CODASPY 2016: 219-230 - [c65]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. CT-RSA 2016: 147-163 - [c64]Jason Crampton, James Sellwood:
Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances. DBSec 2016: 96-105 - [c63]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
Resiliency Policies in Access Control Revisited. SACMAT 2016: 101-111 - [c62]Jason Crampton, Conrad Williams:
On Completeness in Languages for Attribute-Based Access Control. SACMAT 2016: 149-160 - [i27]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
A Multivariate Approach for Checking Resiliency in Access Control. CoRR abs/1604.01550 (2016) - [i26]Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
An Approach to Parameterized Resiliency Problems Using Integer Linear Programming. CoRR abs/1605.08738 (2016) - [i25]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information via Tree Partitions. CoRR abs/1608.08386 (2016) - [i24]Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
The Authorization Policy Existence Problem. CoRR abs/1612.06191 (2016) - 2015
- [c61]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies Without Public Information. ACNS 2015: 389-408 - [c60]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Access Control in Publicly Verifiable Outsourced Computation. AsiaCCS 2015: 657-662 - [c59]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones:
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies. DBSec 2015: 330-345 - [c58]Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
On the Workflow Satisfiability Problem with Class-independent Constraints. IPEC 2015: 66-77 - [c57]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan
:
Valued Workflow Satisfiability Problem. SACMAT 2015: 3-13 - [c56]Jason Crampton, Charles Morisset, Nicola Zannone
:
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. SACMAT 2015: 99-109 - [c55]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for an Open-Source Medical Records System. SACMAT 2015: 113-124 - [c54]Jason Crampton, Conrad Williams:
Obligations in PTaCL. STM 2015: 220-235 - [i23]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan:
Valued Workflow Satisfiability Problem. CoRR abs/1501.07814 (2015) - [i22]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones:
Optimal Constructions for Chain-based Cryptographic Enforcement of Information Flow Policies. CoRR abs/1503.01382 (2015) - [i21]Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood:
Relationship-Based Access Control for OpenMRS. CoRR abs/1503.06154 (2015) - [i20]David A. Cohen, Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
Algorithms for the workflow satisfiability problem engineered for counting constraints. CoRR abs/1504.02420 (2015) - [i19]Jason Crampton, Andrei V. Gagarin, Gregory Z. Gutin, Mark Jones:
On the Workflow Satisfiability Problem with Class-Independent Constraints. CoRR abs/1504.03561 (2015) - [i18]Jason Crampton, James Sellwood:
Relationships, Paths and Principal Matching: A New Approach to Access Control. CoRR abs/1505.07945 (2015) - [i17]Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan, Rémi Watrigant:
The Bi-Objective Workflow Satisfiability Problem and Workflow Resiliency. CoRR abs/1512.07019 (2015) - [i16]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Hybrid Publicly Verifiable Computation. IACR Cryptol. ePrint Arch. 2015: 320 (2015) - 2014
- [j20]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Iterative Plan Construction for the Workflow Satisfiability Problem. J. Artif. Intell. Res. 51: 555-577 (2014) - [j19]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking. Int. J. Softw. Tools Technol. Transf. 16(1): 31-48 (2014) - [c53]James Alderman, Christian Janson, Carlos Cid, Jason Crampton:
Revocation in Publicly Verifiable Outsourced Computation. Inscrypt 2014: 51-71 - [c52]Jason Crampton, Alexandre Pinto:
Attribute-Based Encryption for Access Control Using Elementary Operations. CSF 2014: 125-139 - [c51]David A. Cohen, Jason Crampton, Andrei Gagarin, Gregory Z. Gutin, Mark Jones:
Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints. FAW 2014: 48-59 - [c50]Jason Crampton, James Sellwood:
Path conditions and principal matching: a new approach to access control. SACMAT 2014: 187-198 - [c49]Jason Crampton, Charles Morisset:
Monotonicity and Completeness in Attribute-Based Access Control. STM 2014: 33-48 - [c48]Jason Crampton, James Sellwood:
Caching and Auditing in the RPPM Model. STM 2014: 49-64 - [i15]Jason Crampton, James Sellwood:
Path Conditions and Principal Matching: A New Approach to Access Control. CoRR abs/1406.4988 (2014) - [i14]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Publicly Verifiable Outsourced Computation with a Key Distribution Centre. CoRR abs/1406.5720 (2014) - [i13]Jason Crampton, James Sellwood:
Caching and Auditing in the RPPM Model. CoRR abs/1407.7841 (2014) - [i12]Jason Crampton, Naomi Farley, Gregory Z. Gutin, Mark Jones, Bertram Poettering:
Cryptographic Enforcement of Information Flow Policies without Public Information. CoRR abs/1410.5567 (2014) - [i11]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Revocation in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 640 (2014) - [i10]James Alderman, Carlos Cid, Jason Crampton, Christian Janson:
Access Control in Publicly Verifiable Outsourced Computation. IACR Cryptol. ePrint Arch. 2014: 762 (2014) - 2013
- [j18]Jason Crampton:
A personal tribute to Steve Barker. Sci. Comput. Program. 78(3): 269 (2013) - [j17]Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem. ACM Trans. Inf. Syst. Secur. 16(1): 4 (2013) - [c47]Jason Crampton, Robert Crowston, Gregory Z. Gutin, Mark Jones, M. S. Ramanujan:
Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints. FAW-AAIM 2013: 198-209 - [c46]James Sellwood, Jason Crampton:
Sleeping android: the danger of dormant permissions. SPSM@CCS 2013: 55-66 - [c45]James Alderman, Jason Crampton:
On the Use of Key Assignment Schemes in Authentication Protocols. NSS 2013: 607-613 - [c44]Evangelos Aktoudianakis, Jason Crampton, Steve A. Schneider
, Helen Treharne
, Adrian Waller:
Policy templates for relationship-based access control. PST 2013: 221-228 - [c43]Jason Crampton, Gregory Z. Gutin:
Constraint expressions and workflow satisfiability. SACMAT 2013: 73-84 - [e3]Jason Crampton, Sushil Jajodia
, Keith Mayes:
Computer Security - ESORICS 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings. Lecture Notes in Computer Science 8134, Springer 2013, ISBN 978-3-642-40202-9 [contents] - [i9]Jason Crampton, Gregory Z. Gutin:
Constraint Expressions and Workflow Satisfiability. CoRR abs/1301.3402 (2013) - [i8]James Alderman, Jason Crampton:
On the Use of Key Assignment Schemes in Authentication Protocols. CoRR abs/1303.4262 (2013) - [i7]David A. Cohen, Jason Crampton, Gregory Z. Gutin, Mark Jones:
Pattern-Based Plan Construction for the Workflow Satisfiability Problem. CoRR abs/1306.3649 (2013) - [i6]Rafael Accorsi, Jason Crampton, Michael Huth, Stefanie Rinderle-Ma:
Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341). Dagstuhl Reports 3(8): 73-86 (2013) - 2012
- [c42]Jason Crampton, Michael Huth, Jim Huan-Pu Kuo:
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning. PAAR@IJCAR 2012: 29-42 - [c41]Jason Crampton, Gregory Z. Gutin, Anders Yeo
:
On the parameterized complexity of the workflow satisfiability problem. CCS 2012: 857-868 - [c40]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. POST 2012: 390-409 - [c39]Liang Chen, Jason Crampton, Martin J. Kollingbaum, Timothy J. Norman
:
Obligations in risk-aware access control. PST 2012: 145-152 - [i5]Jason Crampton, Charles Morisset:
Towards A Generic Formal Framework for Access Control Systems. CoRR abs/1204.2342 (2012) - [i4]Jason Crampton, Gregory Z. Gutin, Anders Yeo:
On the Parameterized Complexity of the Workflow Satisfiability Problem. CoRR abs/1205.0852 (2012) - [i3]Jason Crampton, Robert Crowston, Gregory Z. Gutin, Mark Jones, M. S. Ramanujan:
Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints. CoRR abs/1210.3978 (2012) - 2011
- [j16]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson, Geraint Price:
User-friendly and certificate-free grid security infrastructure. Int. J. Inf. Sec. 10(3): 137-153 (2011) - [j15]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in hierarchical RBAC systems. ACM Trans. Inf. Syst. Secur. 14(1): 3:1-3:29 (2011) - [j14]Jason Crampton:
Practical and efficient cryptographic enforcement of interval-based access control policies. ACM Trans. Inf. Syst. Secur. 14(1): 14:1-14:30 (2011) - [c38]Jason Crampton, Michael Huth:
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems. Business Process Management Workshops (2) 2011: 423-434 - [c37]Jason Crampton:
Time-Storage Trade-Offs for Cryptographically-Enforced Access Control. ESORICS 2011: 245-261 - [c36]Liang Chen, Jason Crampton:
Risk-Aware Role-Based Access Control. STM 2011: 140-156 - [e2]Ian Wakeman, Ehud Gudes, Christian Damsgaard Jensen, Jason Crampton:
Trust Management V, 5th IFIP WG 11.11 International Conference, IFIPTM 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings. IFIP Advances in Information and Communication Technology 358, Springer 2011, ISBN 978-3-642-22199-6 [contents] - [e1]Ruth Breu, Jason Crampton, Jorge Lobo:
16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0688-1 [contents] - [i2]Jason Crampton, Charles Morisset:
PTaCL: A Language for Attribute-Based Access Control in Open Systems. CoRR abs/1111.5767 (2011) - 2010
- [c35]Jason Crampton, Rosli Daud, Keith M. Martin:
Constructing Key Assignment Schemes from Chain Partitions. DBSec 2010: 130-145 - [c34]Jason Crampton, Michael Huth:
An Authorization Framework Resilient to Policy Evaluation Failures. ESORICS 2010: 472-487 - [c33]Jason Crampton:
Cryptographic Enforcement of Role-Based Access Control. Formal Aspects in Security and Trust 2010: 191-205 - [c32]Jason Crampton, Michael Huth:
A Framework for the Modular Specification and Orchestration of Authorization Policies. NordSec 2010: 155-170 - [c31]Jason Crampton, Charles Morisset:
An Auto-delegation Mechanism for Access Control Systems. STM 2010: 1-16 - [p1]Jason Crampton, Michael Huth:
Towards an Access-Control Framework for Countering Insider Threats. Insider Threats in Cyber Security 2010: 173-195 - [i1]Jason Crampton:
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies. CoRR abs/1005.4993 (2010)
2000 – 2009
- 2009
- [j13]Jason Crampton:
Cryptographically-enforced hierarchical access control with multiple keys. J. Log. Algebraic Methods Program. 78(8): 690-700 (2009) - [c30]Jason Crampton, Hemanth Khambhammettu:
A Framework for Enforcing Constrained RBAC Policies. CSE (3) 2009: 195-200 - [c29]Liang Chen, Jason Crampton:
Set Covering Problems in Role-Based Access Control. ESORICS 2009: 689-704 - [c28]Jason Crampton:
Trade-Offs in Cryptographic Implementations of Temporal Access Control. NordSec 2009: 72-87 - 2008
- [j12]Jason Crampton, Hemanth Khambhammettu:
Delegation in role-based access control. Int. J. Inf. Sec. 7(2): 123-136 (2008) - [j11]Federica Paci
, Elisa Bertino, Jason Crampton:
An Access-Control Framework for WS-BPEL. Int. J. Web Serv. Res. 5(3): 20-43 (2008) - [c27]Liang Chen, Jason Crampton:
On spatio-temporal constraints and inheritance in role-based access control. AsiaCCS 2008: 205-216 - [c26]Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham:
Panel Session: What Are the Key Challenges in Distributed Security?. DBSec 2008: 219-221 - [c25]Jason Crampton, Hemanth Khambhammettu:
On delegation and workflow execution models. SAC 2008: 2137-2144 - [c24]Jason Crampton, Hemanth Khambhammettu:
Delegation and satisfiability in workflow systems. SACMAT 2008: 31-40 - [c23]Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in RBAC systems. SACMAT 2008: 63-72 - [c22]M. A. C. Dekker, Jason Crampton, Sandro Etalle:
RBAC administration in distributed systems. SACMAT 2008: 93-102 - [c21]Jason Crampton, Hoon Wei Lim:
Role Signatures for Access Control in Open Distributed Systems. SEC 2008: 205-220 - 2007
- [c20]M. A. C. Dekker, J. G. Cederquist
, Jason Crampton, Sandro Etalle:
Extended privilege inheritance in RBAC. AsiaCCS 2007: 383-385 - [c19]Allan Tucker, Stephen Swift
, Jason Crampton:
Efficiency updates for the restricted growth function GA for grouping problems. GECCO 2007: 1536 - [c18]Stephen Swift
, Allan Tucker, Jason Crampton, David Garway-Heath:
An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data. GECCO 2007: 2174-2181 - [c17]Liang Chen, Jason Crampton:
Applications of the Oriented Permission Role-Based Access Control Model. IPCCC 2007: 387-394 - [c16]Liang Chen, Jason Crampton:
Inter-domain role mapping and least privilege. SACMAT 2007: 157-162 - [c15]Jason Crampton, Hoon Wei Lim, Kenneth G. Paterson:
What can identity-based cryptography offer to web services? SWS 2007: 26-36 - [c14]James Skene, Allan Skene, Jason Crampton, Wolfgang Emmerich:
The monitorability of service-level agreements for application-service provision. WOSP 2007: 3-14 - 2006
- [j10]Jason Crampton:
Applying hierarchical and role-based access control to XML documents. Comput. Syst. Sci. Eng. 21(5) (2006) - [j9]Steve Counsell, Stephen Swift
, Jason Crampton:
The interpretation and utility of three cohesion metrics for object-oriented design. ACM Trans. Softw. Eng. Methodol. 15(2): 123-149 (2006) - [c13]Jason Crampton, Keith M. Martin, Peter R. Wild:
On Key Assignment for Hierarchical Access Control. CSFW 2006: 98-111 - [c12]Jason Crampton:
Discretionary and Mandatory Controls for Role-Based Administration. DBSec 2006: 194-208 - [c11]Jason Crampton, Hemanth Khambhammettu:
Delegation in Role-Based Access Control. ESORICS 2006: 174-191 - [c10]Elisa Bertino, Jason Crampton, Federica Paci
:
Access Control and Authorization Constraints for WS-BPEL. ICWS 2006: 275-284 - [c9]Jason Crampton, Wing Leung, Konstantin Beznosov:
The secondary and approximate authorization model and its application to Bell-LaPadula policies. SACMAT 2006: 111-120 - 2005
- [j8]Allan Tucker
, Jason Crampton, Stephen Swift
:
RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms. Evol. Comput. 13(4): 477-499 (2005) - [j7]Jason Crampton:
Introduction to February 2005 issue of ISTR. Inf. Secur. Tech. Rep. 10(1): 1 (2005) - [c8]Jason Crampton:
Understanding and developing role-based administrative models. CCS 2005: 158-167 - [c7]Stephen Swift, Amy Shi, Jason Crampton, Allan Tucker:
ICARUS: intelligent coupon allocation for retailers using search. Congress on Evolutionary Computation 2005: 182-189 - [c6]Jason Crampton:
A reference monitor for workflow systems with constrained task execution. SACMAT 2005: 38-47 - 2004
- [j6]Jason Crampton:
Introduction. Inf. Secur. Tech. Rep. 9(3): 5 (2004) - [c5]Kaijun Tan, Jason Crampton, Carl A. Gunter:
The Consistency of Task-Based Authorization Constraints in Workflow Systems. CSFW 2004: 155- - [c4]Jason Crampton:
Applying hierarchical and role-based access control to XML documents. SWS 2004: 37-46 - 2003
- [j5]Jason Crampton, Hemanth Khambhammettu:
Access control in a distributed object environment using XML and roles. South Afr. Comput. J. 31: 2-8 (2003) - [j4]Jason Crampton, George Loizou:
Administrative scope: A foundation for role-based administrative models. ACM Trans. Inf. Syst. Secur. 6(2): 201-231 (2003) - [c3]Jason Crampton:
On permissions, inheritance and role hierarchies. CCS 2003: 85-92 - [c2]Jason Crampton:
Specifying and enforcing constraints in role-based access control. SACMAT 2003: 43-50 - 2002
- [b1]Jason Alexis Valentine Crampton:
Authorization and antichains. Birkbeck, University of London, UK, 2002 - [c1]Jason Crampton:
Administrative scope and role hierarchy operations. SACMAT 2002: 145-154 - 2001
- [j3]Jason Crampton, George Loizou, Greg O'Shea:
A Logic of Access Control. Comput. J. 44(1): 54-66 (2001) - [j2]Jason Crampton, George Loizou, Greg O'Shea:
A Logic of Access Control. Comput. J. 44(2): 137-149 (2001) - [j1]Jason Crampton, George Loizou:
Authorisation and antichains. ACM SIGOPS Oper. Syst. Rev. 35(3): 6-15 (2001)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-13 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint