D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 36 Citations 5,068 139 World Ranking 7284 National Ranking 99

Research.com Recognitions

Awards & Achievements

2009 - ACM Distinguished Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Programming language
  • Computer network
  • Operating system

Jorge Lobo mostly deals with Access control, Role-based access control, Computer security, XACML and Data mining. His Access control research includes elements of Knowledge management and Measure. His studies in Role-based access control integrate themes in fields like Formal concept analysis, Relation, Expression and Privacy policy.

His work in the fields of Computer security, such as Authorization, overlaps with other areas such as Policy analysis. His XACML study combines topics in areas such as Variety and Component. His biological study spans a wide range of topics, including Information flow, Scalability and Fuzzy logic.

His most cited work include:

  • Privacy-aware role-based access control (191 citations)
  • Mining roles with semantic meanings (152 citations)
  • Privacy-aware role based access control (135 citations)

What are the main themes of his work throughout his whole career to date?

His primary areas of investigation include Access control, Computer security, Distributed computing, Role-based access control and Policy analysis. His study on XACML is often connected to Process as part of broader study in Access control. In the subject of general Computer security, his work in Information privacy, Information security and Network security is often linked to Obligation, thereby combining diverse domains of study.

His Distributed computing research is multidisciplinary, incorporating perspectives in Network management, Resource allocation, Server and Stateful firewall. His research investigates the link between Server and topics such as Cloud computing that cross with problems in Computer network. His Role-based access control research includes elements of World Wide Web, Privacy policy and Software engineering.

He most often published in these fields:

  • Access control (27.54%)
  • Computer security (16.67%)
  • Distributed computing (15.22%)

What were the highlights of his more recent work (between 2013-2020)?

  • Distributed computing (15.22%)
  • Server (5.80%)
  • Computer network (7.97%)

In recent papers he was focusing on the following fields of study:

The scientist’s investigation covers issues in Distributed computing, Server, Computer network, Resource allocation and Function. His Distributed computing research incorporates themes from Finite-state machine, Fixed topology, Scaling and Data management. His Server study combines topics from a wide range of disciplines, such as Cloud computing and Service.

Jorge Lobo has included themes like Signature and Anomaly-based intrusion detection system, Intrusion detection system in his Computer network study. Jorge Lobo interconnects Resource, Provisioning and Computer security, Network security in the investigation of issues within Resource allocation. In his study, Set and Theoretical computer science is strongly linked to Domain, which falls under the umbrella field of Scalability.

Between 2013 and 2020, his most popular works were:

  • Optimizing Resource Allocation for Virtualized Network Functions in a Cloud Center Using Genetic Algorithms (75 citations)
  • Towards making network function virtualization a cloud computing service (63 citations)
  • Representing and Learning Grammars in Answer Set Programming (17 citations)

In his most recent research, the most cited papers focused on:

  • Programming language
  • Computer network
  • Operating system

Jorge Lobo focuses on Server, Cloud computing, Distributed computing, Computer network and Theoretical computer science. His Server research incorporates elements of Virtual machine, Resource allocation and Service. His research in Cloud computing intersects with topics in Network management, Quality of service, Network management station and Telecommunications service.

His Computer network study frequently links to related topics such as Signature. Jorge Lobo specializes in Theoretical computer science, namely Datalog. His Domain research integrates issues from Scalability, Set and Function.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Privacy-aware role-based access control

Qun Ni;Elisa Bertino;Jorge Lobo;Carolyn Brodie.
ACM Transactions on Information and System Security (2010)

479 Citations

Mining roles with semantic meanings

Ian Molloy;Hong Chen;Tiancheng Li;Qihua Wang.
symposium on access control models and technologies (2008)

216 Citations

Privacy-aware role based access control

Qun Ni;Alberto Trombetta;Elisa Bertino;Jorge Lobo.
symposium on access control models and technologies (2007)

201 Citations

Evaluating role mining algorithms

Ian Molloy;Ninghui Li;Tiancheng Li;Ziqing Mao.
symposium on access control models and technologies (2009)

178 Citations

Conflict resolution using logic programming

J. Chomicki;J. Lobo;S. Naqvi.
IEEE Transactions on Knowledge and Data Engineering (2003)

177 Citations

Risk-based access control systems built on fuzzy inferences

Qun Ni;Elisa Bertino;Jorge Lobo.
computer and communications security (2010)

169 Citations

Weak generalized closed world assumption

A. Rajasekar;J. Lobo;J. Minker.
Journal of Automated Reasoning (1989)

164 Citations

Policy-based management of networked computing systems

D. Agrawal;Kang-Won Lee;J. Lobo.
IEEE Communications Magazine (2005)

151 Citations

Access control policy combining: theory meets practice

Ninghui Li;Qihua Wang;Wahbeh Qardaji;Elisa Bertino.
symposium on access control models and technologies (2009)

148 Citations

An obligation model bridging access control policies and privacy policies

Qun Ni;Elisa Bertino;Jorge Lobo.
symposium on access control models and technologies (2008)

129 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jorge Lobo

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 52

Frédéric Cuppens

Frédéric Cuppens

Polytechnique Montréal

Publications: 33

Jaideep Vaidya

Jaideep Vaidya

Rutgers, The State University of New Jersey

Publications: 30

Emil Lupu

Emil Lupu

Imperial College London

Publications: 27

Jack Minker

Jack Minker

University of Maryland, College Park

Publications: 26

Scott D. Stoller

Scott D. Stoller

Stony Brook University

Publications: 23

Elena Ferrari

Elena Ferrari

University of Insubria

Publications: 20

Morris Sloman

Morris Sloman

Imperial College London

Publications: 20

Thomas Eiter

Thomas Eiter

TU Wien

Publications: 17

David Basin

David Basin

ETH Zurich

Publications: 16

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 16

Chitta Baral

Chitta Baral

Arizona State University

Publications: 14

Vijayalakshmi Atluri

Vijayalakshmi Atluri

Rutgers, The State University of New Jersey

Publications: 14

Anupam Datta

Anupam Datta

Carnegie Mellon University

Publications: 12

Thomas Lukasiewicz

Thomas Lukasiewicz

University of Oxford

Publications: 12

Naranker Dulay

Naranker Dulay

Imperial College London

Publications: 11

Trending Scientists

Michael Butler

Michael Butler

University of Southampton

Luis M. Viceira

Luis M. Viceira

Harvard University

Li Da Xu

Li Da Xu

Old Dominion University

Hai-Bo Yang

Hai-Bo Yang

East China Normal University

Richard A. Dluhy

Richard A. Dluhy

University of Georgia

Carlo G. Pantano

Carlo G. Pantano

Pennsylvania State University

Paul L. Koch

Paul L. Koch

University of California, Santa Cruz

Herbert C. Dessauer

Herbert C. Dessauer

Louisiana State University

David Hoisington

David Hoisington

University of Georgia

Suzanne Eaton

Suzanne Eaton

Max Planck Society

Brian F.C. Clark

Brian F.C. Clark

Aarhus University

Richard Wilson

Richard Wilson

Department for Environment Food and Rural Affairs

Alberto José da Silva Duarte

Alberto José da Silva Duarte

Universidade de São Paulo

Clive Kearon

Clive Kearon

McMaster University

Leonard H. Calabrese

Leonard H. Calabrese

Cleveland Clinic

Noshir Contractor

Noshir Contractor

Northwestern University

Something went wrong. Please try again later.