Follow
Aya Mohamed
Title
Cited by
Cited by
Year
A systematic literature review for authorization and access control: definitions, strategies and models
AKYS Mohamed, D Auer, D Hofer, J Küng
International Journal of Web Information Systems 18 (2/3), 156-180, 2022
202022
Extended authorization policy for graph-structured data
A Mohamed, D Auer, D Hofer, J Küng
SN Computer Science 2 (5), 351, 2021
102021
Extending authorization capabilities of object relational/graph mappers by request manipulation
D Hofer, S Nadschläger, A Mohamed, J Küng
International Conference on Database and Expert Systems Applications, 71-83, 2022
72022
On applying graph database time models for security log analysis
D Hofer, M Jäger, A Mohamed, J Küng
Future Data and Security Engineering: 7th International Conference, FDSE …, 2020
42020
Authorization policy extension for graph databases
A Mohamed, D Auer, D Hofer, J Küng
Future Data and Security Engineering: 7th International Conference, FDSE …, 2020
42020
An intermediate representation for rewriting cypher queries
D Hofer, A Mohamed, S Nadschläger, D Auer
International Conference on Database and Expert Systems Applications, 86-90, 2023
32023
Extended XACML Language and Architecture for Access Control in Graph-structured Data
A Mohamed, D Auer, D Hofer, J Küng
The 23rd International Conference on Information Integration and Web …, 2021
32021
A systematic literature review of authorization and access control requirements and current state of the art for different database models
AKYS Mohamed, D Auer, D Hofer, J Küng
International Journal of Web Information Systems 20 (1), 1-23, 2024
22024
Authorization and access control for different database models: Requirements and current state of the art
A Mohamed, D Auer, D Hofer, J Küng
International Conference on Future Data and Security Engineering, 225-239, 2022
22022
A study on time models in graph databases for security log analysis
D Hofer, M Jäger, AKYS Mohamed, J Küng
International Journal of Web Information Systems 17 (5), 427-448, 2021
22021
Authorization strategies and classification of access control models
A Mohamed, D Auer, D Hofer, J Küng
Future Data and Security Engineering: 8th International Conference, FDSE …, 2021
22021
Rewriting Graph-DB Queries to Enforce Attribute-Based Access Control
D Hofer, A Mohamed, D Auer, S Nadschläger, J Küng
International Conference on Database and Expert Systems Applications, 431-436, 2023
12023
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement
A Mohamed, D Auer, D Hofer, J Küng
arXiv preprint arXiv:2306.12819, 2023
12023
Modifying neo4j’s object graph mapper queries for access control
D Hofer, A Mohamed, J Küng
International Conference on Information Integration and Web, 421-426, 2022
12022
Comparison of Access Control Approaches for Graph-Structured Data
A Mohamed, D Auer, D Hofer, J Kueng
arXiv preprint arXiv:2405.20762, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–15