2009 - ACM Distinguished Member
Jorge Lobo mostly deals with Access control, Role-based access control, Computer security, XACML and Data mining. His Access control research includes elements of Knowledge management and Measure. His studies in Role-based access control integrate themes in fields like Formal concept analysis, Relation, Expression and Privacy policy.
His work in the fields of Computer security, such as Authorization, overlaps with other areas such as Policy analysis. His XACML study combines topics in areas such as Variety and Component. His biological study spans a wide range of topics, including Information flow, Scalability and Fuzzy logic.
His primary areas of investigation include Access control, Computer security, Distributed computing, Role-based access control and Policy analysis. His study on XACML is often connected to Process as part of broader study in Access control. In the subject of general Computer security, his work in Information privacy, Information security and Network security is often linked to Obligation, thereby combining diverse domains of study.
His Distributed computing research is multidisciplinary, incorporating perspectives in Network management, Resource allocation, Server and Stateful firewall. His research investigates the link between Server and topics such as Cloud computing that cross with problems in Computer network. His Role-based access control research includes elements of World Wide Web, Privacy policy and Software engineering.
The scientist’s investigation covers issues in Distributed computing, Server, Computer network, Resource allocation and Function. His Distributed computing research incorporates themes from Finite-state machine, Fixed topology, Scaling and Data management. His Server study combines topics from a wide range of disciplines, such as Cloud computing and Service.
Jorge Lobo has included themes like Signature and Anomaly-based intrusion detection system, Intrusion detection system in his Computer network study. Jorge Lobo interconnects Resource, Provisioning and Computer security, Network security in the investigation of issues within Resource allocation. In his study, Set and Theoretical computer science is strongly linked to Domain, which falls under the umbrella field of Scalability.
Jorge Lobo focuses on Server, Cloud computing, Distributed computing, Computer network and Theoretical computer science. His Server research incorporates elements of Virtual machine, Resource allocation and Service. His research in Cloud computing intersects with topics in Network management, Quality of service, Network management station and Telecommunications service.
His Computer network study frequently links to related topics such as Signature. Jorge Lobo specializes in Theoretical computer science, namely Datalog. His Domain research integrates issues from Scalability, Set and Function.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
Privacy-aware role-based access control
Qun Ni;Elisa Bertino;Jorge Lobo;Carolyn Brodie.
ACM Transactions on Information and System Security (2010)
Mining roles with semantic meanings
Ian Molloy;Hong Chen;Tiancheng Li;Qihua Wang.
symposium on access control models and technologies (2008)
Privacy-aware role based access control
Qun Ni;Alberto Trombetta;Elisa Bertino;Jorge Lobo.
symposium on access control models and technologies (2007)
Evaluating role mining algorithms
Ian Molloy;Ninghui Li;Tiancheng Li;Ziqing Mao.
symposium on access control models and technologies (2009)
Conflict resolution using logic programming
J. Chomicki;J. Lobo;S. Naqvi.
IEEE Transactions on Knowledge and Data Engineering (2003)
Risk-based access control systems built on fuzzy inferences
Qun Ni;Elisa Bertino;Jorge Lobo.
computer and communications security (2010)
Weak generalized closed world assumption
A. Rajasekar;J. Lobo;J. Minker.
Journal of Automated Reasoning (1989)
Policy-based management of networked computing systems
D. Agrawal;Kang-Won Lee;J. Lobo.
IEEE Communications Magazine (2005)
Access control policy combining: theory meets practice
Ninghui Li;Qihua Wang;Wahbeh Qardaji;Elisa Bertino.
symposium on access control models and technologies (2009)
An obligation model bridging access control policies and privacy policies
Qun Ni;Elisa Bertino;Jorge Lobo.
symposium on access control models and technologies (2008)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Purdue University West Lafayette
Imperial College London
Purdue University West Lafayette
Imperial College London
University of Missouri
Arizona State University
IBM (United States)
University of Maryland, College Park
University of California, San Diego
Dartmouth College
University of Southampton
Harvard University
Old Dominion University
East China Normal University
University of Georgia
Pennsylvania State University
University of California, Santa Cruz
Louisiana State University
University of Georgia
Max Planck Society
Aarhus University
Department for Environment Food and Rural Affairs
Universidade de São Paulo
McMaster University
Cleveland Clinic
Northwestern University