-
1
-
-
0009247605
-
KeyNote: Trust management for public-key infrastructures
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust Management for Public-Key Infrastructures. In Security Protocols Workshop, Cambridge, UK, 1998.
-
Security Protocols Workshop, Cambridge, UK, 1998
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
3
-
-
0034446895
-
A modular approach to composing access control policies
-
P. Bonatti, S. Vimercati, and P. Samarati. A modular approach to composing access control policies. In ACM Conference on Computer and Communication Security, Athens, Greece, Nov. 2000.
-
ACM Conference on Computer and Communication Security, Athens, Greece, Nov. 2000
-
-
Bonatti, P.1
Vimercati, S.2
Samarati, P.3
-
5
-
-
0001809810
-
The ponder policy specification language
-
D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001.
-
2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001
-
-
Damianou, D.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg, J. Mihaeli, Y. Mass, D. Naor, and Y. Ravid. Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
IEEE Symposium on Security and Privacy, Oakland, CA, May 2000
-
-
Herzberg, A.1
Mihaeli, J.2
Mass, Y.3
Naor, D.4
Ravid, Y.5
-
7
-
-
85180810679
-
Advanced client/server authetication in TLS
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. Seamons, and B. Smith. Advanced Client/Server Authetication in TLS. In Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002.
-
Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.5
Smith, B.6
-
8
-
-
0010480845
-
Rec. X.509 - Information technology - Open systems interconnection - the directory: Authentication framework
-
International Telecommunication Union; Aug.
-
International Telecommunication Union. Rec. X.509 - Information Technology - Open Systems Interconnection - The Directory: Authentication Framework, Aug. 1997.
-
(1997)
-
-
-
10
-
-
0035751908
-
Distributed credential chain discovery in trust management
-
N. Li, W. Winsborough, and J. Mitchell. Distributed Credential Chain Discovery in Trust Management. In Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001.
-
Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
11
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, Feb. 2001.
-
Network and Distributed System Security Symposium, San Diego, CA, Feb. 2001
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
16
-
-
0036871183
-
Negotiating trust on the web
-
Nov.
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jarvis, B. Smith, and L. Yu. Negotiating Trust on the Web. IEEE Internet Computing Special Issue on Trust Management, 6(6), Nov. 2002.
-
(2002)
IEEE Internet Computing Special Issue on Trust Management
, vol.6
, Issue.6
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jarvis, J.5
Smith, B.6
Yu, L.7
-
17
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
T. Yu, M. Winslett, and K. Seamons. Interoperable Strategies in Automated Trust Negotiation. In ACM Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001.
-
ACM Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|