


default search action
Sylvia L. Osborn
Person information
- affiliation: University of Western Ontario, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2017
- [j15]Daniel Servos
, Sylvia L. Osborn:
Current Research and Open Problems in Attribute-Based Access Control. ACM Comput. Surv. 49(4): 65:1-65:45 (2017) - 2016
- [c42]Daniel Servos
, Sylvia L. Osborn:
Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC). FPS 2016: 320-328 - 2014
- [c41]Daniel Servos
, Sylvia L. Osborn:
HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control. FPS 2014: 187-204 - [c40]Sharmin Ahmed, Sylvia L. Osborn:
A system for risk awareness during role mining. SACMAT 2014: 181-184 - [e2]Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy:
19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014. ACM 2014, ISBN 978-1-4503-2939-2 [contents] - 2013
- [j14]Hessam Zakerzadeh, Sylvia L. Osborn:
Delay-sensitive approaches for anonymizing numerical streaming data. Int. J. Inf. Sec. 12(5): 423-437 (2013) - [j13]Sylvia L. Osborn, He Wang:
A Survey of Delegation from an RBAC Perspective. J. Softw. 8(2): 266-275 (2013) - [c39]Xiao Liang Hu, Sylvia L. Osborn:
A new approach for delegation in usage control. CODASPY 2013: 269-276 - 2012
- [c38]Md. Sadim Mahmud, Sylvia L. Osborn:
Tradeoff Analysis of Relational Database Storage of Privacy Preferences. Secure Data Management 2012: 1-13 - 2011
- [j12]He Wang, Sylvia L. Osborn:
Static and Dynamic Delegation in the Role Graph Model. IEEE Trans. Knowl. Data Eng. 23(10): 1569-1582 (2011) - [c37]Aiman Lafi Al-Harbi, Sylvia L. Osborn:
Mixing privacy with role-based access control. C3S2E 2011: 1-7 - 2010
- [c36]Hessam Zakerzadeh, Sylvia L. Osborn:
FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa. DPM/SETOP 2010: 36-50
2000 – 2009
- 2009
- [c35]Sabah Mohammed
, Lyle F. Chamarette, Jinan Fiaidhi, Sylvia L. Osborn:
A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0. CSE (1) 2009: 40-47 - [c34]Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin:
Database Intrusion Detection Using Role Profiling with Role Hierarchy. Secure Data Management 2009: 33-48 - 2008
- [c33]Candy Wai-Yue Shum, Sylvia L. Osborn, He Wang:
A Methodology for Bridging between RBAC and an Arbitrary Application Program. Secure Data Management 2008: 199-208 - 2007
- [c32]He Wang, Sylvia L. Osborn:
Discretionary access control with the administrative role graph model. SACMAT 2007: 151-156 - [c31]Xin Jin, Sylvia L. Osborn:
Architecture for Data Collection in Database Intrusion Detection Systems. Secure Data Management 2007: 96-107 - [p2]Sylvia L. Osborn:
Role-Based Access Control. Security, Privacy, and Trust in Modern Data Management 2007: 55-70 - 2006
- [c30]Sylvia L. Osborn:
Role-based access control: past, present and future. PST 2006: 4 - [c29]He Wang, Sylvia L. Osborn:
Delegation in the role graph model. SACMAT 2006: 91-100 - [c28]Yunyu Song, Sylvia L. Osborn:
Conflict of Interest in the Administrative Role Graph Model. Secure Data Management 2006: 100-114 - 2005
- [c27]Cecilia Ionita, Sylvia L. Osborn:
Specifying an Access Control Model for Ontologies for the Semantic Web. Secure Data Management 2005: 73-85 - 2004
- [c26]Mei Ge, Sylvia L. Osborn:
A Design for Parameterized Roles. DBSec 2004: 251-264 - [c25]Jingzhu Wang, Sylvia L. Osborn:
A role-based approach to access control for XML databases. SACMAT 2004: 70-77 - [c24]Shengli Sheng, Sylvia L. Osborn:
A Classifier-Based Approach to User-Role Assignment for Web Applications. Secure Data Management 2004: 163-171 - 2003
- [c23]He Wang, Sylvia L. Osborn:
An Administrative Model for Role Graphs. DBSec 2003: 302-315 - [c22]Sylvia L. Osborn, Yan Han
, Jun Liu:
A methodology for managing roles in legacy systems. SACMAT 2003: 33-40 - 2002
- [j11]Sylvia L. Osborn:
Integrating role graphs: a tool for security integration. Data Knowl. Eng. 43(3): 317-333 (2002) - [c21]Cecilia Ionita, Sylvia L. Osborn:
Privilege Administration for the Role Graph Model. DBSec 2002: 15-25 - [c20]Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu:
Making access control more usable. SACMAT 2002: 141 - [c19]Sylvia L. Osborn:
Information flow analysis of an RBAC system. SACMAT 2002: 163-168 - 2001
- [c18]Sylvia L. Osborn, Bhavani Thuraisingham, Pierangela Samarati:
Panel on XML and Security. DBSec 2001: 317-323 - 2000
- [j10]Sylvia L. Osborn, Ravi S. Sandhu, Qamar Munawer:
Configuring role-based access control to enforce mandatory and discretionary access control policies. ACM Trans. Inf. Syst. Secur. 3(2): 85-106 (2000) - [c17]Sylvia L. Osborn:
Database Security Integration using Role-Based Access Control. DBSec 2000: 245-257 - [c16]Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold:
Panel. DBSec 2000: 367-371 - [c15]Sylvia L. Osborn, Yuxia Guo:
Modeling users in role-based access control. ACM Workshop on Role-Based Access Control 2000: 31-37
1990 – 1999
- 1999
- [j9]Matunda Nyanchama, Sylvia L. Osborn:
The Role Graph Model and Conflict of Interest. ACM Trans. Inf. Syst. Secur. 2(1): 3-33 (1999) - [e1]Charles E. Youman, Sylvia L. Osborn:
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, RBAC 1999, Fairfax, VA, USA, October 28-29, 1999. ACM 1999, ISBN 1-58113-180-1 [contents] - 1998
- [j8]M. Edmonds, Michael A. Bauer, Sylvia L. Osborn, Hanan Lutfiyya, J. Mahon, Gordon Doig
, P. Grundy, C. Gittens, Gary Molenkamp, D. Fenlon:
Using the vista 350 telephone to communicate the results of home monitoring of diabetes mellitus to a central database and to provide feedback. Int. J. Medical Informatics 51(2-3): 117-125 (1998) - 1997
- [c14]Sylvia L. Osborn:
Mandatory access control and role-based access control revisited. ACM Workshop on Role-Based Access Control 1997: 31-40 - 1996
- [j7]Sylvia L. Osborn, Li Yu:
Unifying Data, Behaviours, and Messages in Object-Oriented Databases. Data Knowl. Eng. 18(1): 29-54 (1996) - [c13]Sylvia L. Osborn, Laura K. Reid, Gregory J. Wesson:
On the Interaction Between Role-Based Access Control and Relational Databases. DBSec 1996: 275-287 - 1995
- [c12]Matunda Nyanchama, Sylvia L. Osborn:
Modeling Mandatory Access Control in Role-Based Security Systems. DBSec 1995: 129-144 - [c11]Matunda Nyanchama, Sylvia L. Osborn:
The role graph model. ACM Workshop on Role-Based Access Control 1995 - 1994
- [c10]Matunda Nyanchama, Sylvia L. Osborn:
Access Rights Administration in Role-Based Security Systems. DBSec 1994: 37-56 - 1993
- [j6]Matunda Nyanchama, Sylvia L. Osborn:
Role-Based Security, Object Oriented Databases & Separation of Duty. SIGMOD Rec. 22(4): 45-51 (1993) - [j5]F. Bukhari, Sylvia L. Osborn:
Two Fully Distributed Concurrency Control Algorithms. IEEE Trans. Knowl. Data Eng. 5(5): 872-881 (1993) - 1992
- [c9]Matunda Nyanchama, Sylvia L. Osborn:
Database Security Issues in Distributed Object-Oriented Databases. IWDOM 1992: 92-97 - 1991
- [c8]Li Yu, Sylvia L. Osborn:
Context Inheritance and Content Inheritance in an Object-Oriented Data Model. ICCI 1991: 240-251 - [c7]Li Yu, Sylvia L. Osborn:
An Evaluation Framework for Algebraic Object-Oriented Query Models. ICDE 1991: 670-677 - [p1]Sylvia L. Osborn:
Design Issues for Object-Oriented Database Systems. On Object-Oriented Database System 1991: 315-319
1980 – 1989
- 1989
- [j4]Sylvia L. Osborn:
The Role of Polymorphism in Schema Evolution in an Object-Oriented Database. IEEE Trans. Knowl. Data Eng. 1(3): 310-317 (1989) - 1988
- [c6]Sylvia L. Osborn:
Identity, Equality and Query Optimization. OODBS 1988: 346-351 - 1986
- [j3]Sylvia L. Osborn, T. E. Heaven:
The Design of a Relational Database System with Abstract Data Types for Domains. ACM Trans. Database Syst. 11(3): 357-373 (1986) - [c5]Sylvia L. Osborn:
Object Modelling. OODBS 1986: 231 - 1985
- [c4]Michael A. Bauer, Edward W. Elcock, Sylvia L. Osborn:
A framework for the generation of microcomputer-based application. SIGSMALL 1985: 179-189 - 1982
- [c3]Michael A. Bauer, Sylvia L. Osborn:
A graphical model of procedures for an automated manager's assistant. ACM Annual Conference 1982: 37-43 - [c2]Sylvia L. Osborn:
Teaching relational database concepts in a university environment. SIGCSE 1982: 1-3
1970 – 1979
- 1979
- [j2]Sylvia L. Osborn:
Testing for Existence of a Covering Boyce-Codd normal Form. Inf. Process. Lett. 8(1): 11-14 (1979) - [c1]Sylvia L. Osborn:
Towards a Universal Relation Interface. VLDB 1979: 52-60 - 1978
- [j1]Claudio L. Lucchesi, Sylvia L. Osborn:
Candidate Keys for Relations. J. Comput. Syst. Sci. 17(2): 270-279 (1978)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint