-
1
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
Chantilly, VA, May ACM Press
-
E. Bertino, S. Castano, and E. Ferrari. On specifying security policies for web documents with an XML-based language. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies, pages 57-65, Chantilly, VA, May 2001. ACM Press.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 57-65
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
2
-
-
84884500670
-
χ-TNL: An XML-based language for trust negotiation
-
Como, Italy, June IEEE Computer Society Press
-
E. Bertino, E. Ferrari, and A. Squicciarini. χ-TNL: An XML-based language for trust negotiation. In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 81-84, Como, Italy, June 2003. IEEE Computer Society Press.
-
(2003)
Fourth IEEE International Workshop on Policies for Distributed Systems and Networks
, pp. 81-84
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
4
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May IEEE Computer Society Press
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164-173, Oakland, CA, May 1996. IEEE Computer Society Press.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
5
-
-
84958048748
-
Compliance-checking in the PolicyMaker trust management system
-
Springer-Verlag
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance-checking in the PolicyMaker trust management system. In Proceedings of Second International Conference on Financial Cryptography (FC'98), volume 1465 of Lecture Notes in Computer Science, pages 254-274. Springer-Verlag, 1998.
-
(1998)
Proceedings of Second International Conference on Financial Cryptography (FC'98), Volume 1465 of Lecture Notes in Computer Science
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
7
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for Web applications. Computer Networks and ISDN Systems, 29(8-13):953-964, 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
8
-
-
12844287351
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic Web
-
Heraklion, Greece, May
-
R. Gavriloaie, W. Nejdl, D. Olmedilla, K. E. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the Semantic Web. In 1st European Semantic Web Symposium, Heraklion, Greece, May 2004.
-
(2004)
1st European Semantic Web Symposium
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, May
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2-14. IEEE Computer Society Press, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
10
-
-
1642394295
-
Hidden credentials
-
Washington, DC, Oct. ACM Press
-
J. Holt, R. Bradshaw, K. E. Seamons, and H. Orman. Hidden credentials. In 2nd ACM Workshop on Privacy and Electronic Society, pages 1-8, Washington, DC, Oct. 2003. ACM Press.
-
(2003)
2nd ACM Workshop on Privacy and Electronic Society
, pp. 1-8
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
12
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
IEEE Computer Society Press, June
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobsen, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002), pages 68-79. IEEE Computer Society Press, June 2002.
-
(2002)
Roceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
Mills, H.7
Yu, L.8
-
13
-
-
11244330180
-
-
Master's thesis, Computer Science Department, Brigham Young University, March
-
B. Smith. Responding to policies at runtime in TrustBuilder. Master's thesis, Computer Science Department, Brigham Young University, March 2004.
-
(2004)
Responding to Policies at Runtime in TrustBuilder
-
-
Smith, B.1
-
15
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head, SC, Jan. IEEE Press
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88-102, Hilton Head, SC, Jan. 2000. IEEE Press.
-
(2000)
ARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
16
-
-
0036871183
-
Negotiating trust on the web
-
November/December
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jarvis, B. Smith, and L. Yu. Negotiating Trust on the Web. IEEE Internet Computing Special Issue on Trust Management, 6(6):30-37, November/December 2002.
-
(2002)
IEEE Internet Computing Special Issue on Trust Management
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jarvis, J.5
Smith, B.6
Yu, L.7
-
17
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation
-
Feb.
-
T. Yu, M. Winslett, and K. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Transactions on Information and System Security, 6(1):1-42, Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|