-
1
-
-
84982899264
-
The role of trust management in distributed systems security
-
Berlin: Springer-Verlag
-
Blaze, M., Feigenbaum, J. Ioannidis, J., et al. The role of trust management in distributed systems security. In: Secure Internet Programming: Issues for Mobile and Distributed Objects. Berlin: Springer-Verlag, 1999. 185-210.
-
(1999)
Secure Internet Programming: Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
2
-
-
0002824760
-
Trust management on World Wide Web
-
Khare, R., Rifkin, A. Trust management on World Wide Web. World Wide Web Journal, 1997, 2(3): 77-112.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 77-112
-
-
Khare, R.1
Rifkin, A.2
-
3
-
-
0029700344
-
Decentralized trust management
-
Dale J. and Dinolt G. (ed.), Oakland, CA: IEEE Computer Society Press
-
Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA: IEEE Computer Society Press, 1996. 164-173.
-
(1996)
Proceedings of the 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspective
-
IEEE Press
-
Yahalom, R., Klein, B., Beth, T. Trust relationships in secure systems - A distributed authentication perspective. In: Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy. IEEE Press, 1993. 50-164. http://isbn.nu/0818633700.
-
(1993)
Proceedings of the 1993 IEEE Symposium on Research in Security and Privacy
, pp. 50-164
-
-
Yahalom, R.1
Klein, B.2
Beth, T.3
-
7
-
-
0002863367
-
Valuation of trust in open network
-
Gollmann D.(ed.), Brighton: Springer-Verlag
-
Beth, T., Borcherding, M., Klein, B. Valuation of trust in open network. In: Gollmann, D., ed. Proceedings of the European Symposium on Research in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18.
-
(1994)
Proceedings of the European Symposium on Research in Security (ESORICS)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
8
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures
-
Christianson B., Crispo B. and William S. (ed.), Berlin: Springer-Verlag
-
Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote: trust management for public-key infrastructures. In: Christianson, B., Crispo, B., William, S., et al. eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verlag, 1999. 59-63.
-
(1999)
Cambridge 1998 Security Protocols International Workshop
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
9
-
-
0001843009
-
REFEREE: Trust management for Web applications
-
Chu, Y.-H., Feigenbaum, J., LaMacchia, B., et al. REFEREE: trust management for Web applications. World Wide Web Journal 1997, 2(2): 127-139.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.2
, pp. 127-139
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
-
10
-
-
84961328772
-
Developing electronic trust policies using a risk management model
-
Povey, D. Developing electronic trust policies using a risk management model. In: Proceedings of the 1999 CQRE Congress. 1999. 1-16. http://security.dstc.edu.au/staff/povey/papers/CQRE/123.pdf.
-
(1999)
Proceedings of the 1999 CQRE Congress
, pp. 1-16
-
-
Povey, D.1
-
11
-
-
0001951820
-
Can we trust trust
-
Gambetta D.(ed.), Basil Blackwell: Oxford Press
-
Gambetta, D. Can we trust trust? In: Gambetta, D., ed. Trust: Making and Breaking Cooperative Relations. Basil Blackwell: Oxford Press, 1990. 213-237.
-
(1990)
Trust: Making and Breaking Cooperative Relations
, pp. 213-237
-
-
Gambetta, D.1
-
12
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
IEEE Computer Society Press
-
Herrmann, P., Krumm, H. Trust-Adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications. Hammamet: IEEE Computer Society Press, 2001. 2-8. http://www.computer.or/proceedings/iscc/1177/11770002abs.htm.
-
(2001)
Proceedings of the 6th IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
13
-
-
84958048748
-
Compliance checking in the policy maker trust management system
-
Hirschfeld R.(ed.), Computer Science 1465, Berlin: Springer-Verlag
-
Blaze, M., Feigenbaum, J., Strauss, M. Compliance Checking in the PolicyMaker Trust management System. In: Hirschfeld, R., ed. Proceedings of the Finanical Cryptography'98. Lecture Notes in Computer Science 1465, Berlin: Springer-Verlag, 1998. 254-274.
-
(1998)
Proceedings of the Financial Cryptography'98. Lecture Notes in Computer Science 1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
15
-
-
84949238095
-
Offline micropayments without trusted hardware
-
Syverson F.(ed.), Berlin: Springer Verlag
-
Blaze, M., Ioannidis, J., Keromytis, A. Offline Micropayments without Trusted Hardware. In: Syverson, F. ed. Financial Cryptography 2001. Lecture Notes in Computer Science 2339, Berlin: Springer Verlag, 2002.
-
(2002)
Financial Cryptography 2001. Lecture Notes in Computer Science 2339
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.3
-
16
-
-
0004078695
-
The keyNote trust management system (Version 2)
-
Internet RFC 2704
-
Blaze, M., Feigenbaum, J., Ioannidis, J., et al. The keyNote trust management system version 2. Internet RFC 2704, 1999.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
-
17
-
-
84949942881
-
The right type of trust for distributed systems
-
Meadows C.(ed.), Lake Arrowhead, CA: ACM Press
-
Jφsang, A. The right type of trust for distributed systems. In: Meadows, C., ed. Proceedings of the 1996 New Security Paradigms Workshop. Lake Arrowhead, CA: ACM Press, 1996.
-
(1996)
Proceedings of the 1996 New Security Paradigms Workshop
-
-
Jøsang, A.1
-
19
-
-
0013180730
-
A metric for trusted systems
-
Wien: Austrian Computer Society
-
Jφang, A., Knapskog, S.J. A metric for trusted systems. Global IT Security. Wien: Austrian Computer Society, 1998. 541-549.
-
(1998)
Global IT Security
, pp. 541-549
-
-
Jøang, A.1
Knapskog, S.J.2
-
20
-
-
84958759310
-
A subjective metric of authentication
-
Quisquater J.(ed.), Louvain-la-Neuve: Springer Verlag
-
Jφsang, A. A Subjective Metric of Authentication. In: Quisquater, J., ed. Proceedings of the ESORICS'98. Louvain-la-Neuve. Springer Verlag, 1998. 329-344.
-
(1998)
Proceedings of the ESORICS'98
, pp. 329-344
-
-
Jøsang, A.1
|