-
1
-
-
1142303699
-
Information sharing across private databases
-
A. Y. Halevy, Z. G. Ives, & A. Doan (Eds.), New York: ACM
-
Agrawal, R., Evfimievski, A., & Srikant, R. (2003). Information sharing across private databases. In A. Y. Halevy, Z. G. Ives, & A. Doan (Eds.), Proceedings of the ACM SIGMOD Data 2003 (pp. 86-97). New York: ACM.
-
(2003)
Proceedings of the ACM SIGMOD Data 2003
, pp. 86-97
-
-
Agrawal, R.1
Evfimievski, A.2
Srikant, R.3
-
2
-
-
85085719296
-
A role-based framework for health-care information systems
-
R. Sandhu & T. Jaeger (Eds.), New York: ACM
-
Ahn, G., Chu, B., & Zhang, L. (2001). A role-based framework for health-care information systems. In R. Sandhu & T. Jaeger (Eds.), Proceedings of the ACM Symposium on Access Control Models and Technologies (pp. 153-162). New York: ACM.
-
(2001)
Proceedings of the ACM Symposium on Access Control Models and Technologies
, pp. 153-162
-
-
Ahn, G.1
Chu, B.2
Zhang, L.3
-
3
-
-
13844257876
-
A trusted third-party computation service
-
Cambridge, MA: MIT
-
Ajmani, S., Morris R., & Liskov, B. (2001). A trusted third-party computation service (Technical report MIT-LCS-TR-847). Cambridge, MA: MIT.
-
(2001)
Technical Report
, vol.MIT-LCS-TR-847
-
-
Ajmani, S.1
Morris, R.2
Liskov, B.3
-
4
-
-
13844294687
-
Secure access wrapper: Mediating security between heterogeneous databases
-
January. Paper presented at the Hilton Head, SC
-
Akella, Y, Bilello, M., Dawson, S., De Capitani di Vimercati, S., Samarati, P., Lincoln, P., et al. (2000, January). Secure access wrapper: Mediating security between heterogeneous databases. Paper presented at the DARPA Information Survivability Conference and Exposition, Hilton Head, SC.
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Akella, Y.1
Bilello, M.2
Dawson, S.3
De Capitani Di Vimercati, S.4
Samarati, P.5
Lincoln, P.6
-
6
-
-
84860091323
-
-
InfoWorld. Retrieved July 27, 2003
-
April, C.A., & Fonseca, B. (2002). Monumental mission. InfoWorld. Retrieved July 27, 2003, from http://www.infoworld.com/article/02/09/06/ 020909ctgovt_l.html
-
(2002)
Monumental Mission
-
-
April, C.A.1
Fonseca, B.2
-
7
-
-
0031682832
-
Efficient and practical fair exchange protocols with off-line TTP
-
Piscataway, NJ: IEEE
-
Bao, F., Deng, R.H., & Mao, W. (1998). Efficient and practical fair exchange protocols with off-line TTP. In Proceedings of the IEEE Symposium on Research in Security and Privacy (pp. 86-99). Piscataway, NJ: IEEE.
-
(1998)
Proceedings of the IEEE Symposium on Research in Security and Privacy
, pp. 86-99
-
-
Bao, F.1
Deng, R.H.2
Mao, W.3
-
8
-
-
0025246897
-
A fair protocol for signing contracts
-
Ben-Or, M., Goldreich, O., Micali, S., & Rivest, R.L. (1990). A fair protocol for signing contracts. IEEE Transactions on Information Theory, 36(1), 40-46.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
9
-
-
0003888541
-
-
Birmingham, UK: Wrox Press
-
Birbeck, M., Diamond, J., Duckett, J., Gudmundsson, O.G., Kobak, P., Lenz, E., et al. (2001). Professional XML (2nd ed.). Birmingham, UK: Wrox Press.
-
(2001)
Professional XML (2nd Ed.)
-
-
Birbeck, M.1
Diamond, J.2
Duckett, J.3
Gudmundsson, O.G.4
Kobak, P.5
Lenz, E.6
-
10
-
-
0029700344
-
Decentralized trust management
-
Piscataway, NJ: IEEE
-
Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A.D. (1996). Decentralized trust management. In the Proceedings of the 1996 IEEE Symposium on Security and Privacy (pp. 164-173). Piscataway, NJ: IEEE.
-
(1996)
The Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
11
-
-
0003226048
-
The keynote trust-management system, version 2
-
Blaze, M., Feigenbaum, J., Ioannidis, J., & Keromytis, A.D. (1999). The keynote trust-management system, version 2, Internet Engineering Task Force (IETF) Request for Comments (RFC) 2704. Retreived from http://www.faqs.org/rfcs/ rfc2704.html
-
(1999)
Internet Engineering Task Force (IETF) Request for Comments (RFC)
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
14
-
-
0001843009
-
REFEREE: Trust management for web applications
-
Chu, Y., Feigenbaum, J., LaMacchia, B., Resnick, P., & Strauss, M. (1997). REFEREE: Trust management for web applications. World Wide Web Journal, 2, 706-734.
-
(1997)
World Wide Web Journal
, vol.2
, pp. 706-734
-
-
Chu, Y.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
15
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke, D., Elien, J., Ellison, C., Fredette, M., Morcos, A., & Rivest, R.L. (2001). Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4), 285-322.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
16
-
-
80051982639
-
NetBill security and transaction protocol
-
July. Paper presented at the New York
-
Cox, B., Sirbu, M., & Tygar, D. (1995, July). NetBill security and transaction protocol. Paper presented at the First USENIX Workshop on Electronic Commerce, New York.
-
(1995)
First USENIX Workshop on Electronic Commerce
-
-
Cox, B.1
Sirbu, M.2
Tygar, D.3
-
17
-
-
0030086382
-
Role-based access control models
-
Coyne, E.J., Feinstein, H.L., Sandhu, R., & Youman, C.E. (1996). Role-based access control models. IEEE Computer, 29(2), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Coyne, E.J.1
Feinstein, H.L.2
Sandhu, R.3
Youman, C.E.4
-
19
-
-
0030246312
-
Practical protocols for certified electronic mail
-
Deng, R.H., Gong, L., Lazer, A.A., & Wang, W. (1996). Practical protocols for certified electronic mail. Journal of Network and System Management, 4(3), 279-297.
-
(1996)
Journal of Network and System Management
, vol.4
, Issue.3
, pp. 279-297
-
-
Deng, R.H.1
Gong, L.2
Lazer, A.A.3
Wang, W.4
-
21
-
-
84860077330
-
-
Microsoft Corporation. Retrieved July 27, 2003
-
Ewald, T. (2002). The web services idea. Microsoft Corporation. Retrieved July 27, 2003, from http://msdn.microsoft.com/webservices/understanding/readme/ default.aspx
-
(2002)
The Web Services Idea
-
-
Ewald, T.1
-
22
-
-
2342534635
-
-
FEA Working Group. Retrieved July 17, 2003
-
Federal CIO Council. (2002). E-gov enterprise architecture guidance (common reference model). FEA Working Group. Retrieved July 17, 2003, from http://www.cio.gov/documents/E-Gov_Guidance_July_25_Final_Draft_2_Oa.pdf
-
(2002)
E-gov Enterprise Architecture Guidance (Common Reference Model)
-
-
-
23
-
-
12344266325
-
-
Federal Architecture Program Management Office
-
Federal Enterprise Architecture Program Management Office. (2002a). The business reference model version 1.0: A foundation for government wide improvement. Federal Architecture Program Management Office. Retrieved from http://www.feapmo.gov/resources/fea_brm_release_document_rev_l.pdf
-
(2002)
The Business Reference Model Version 1.0: A Foundation for Government Wide Improvement
-
-
-
24
-
-
12344266325
-
-
Federal Architecture Program Management Office. Retrieved July 27, 2003
-
Federal Enterprise Architecture Program Management Office. (2002b). The business reference model version 1.0: Agency Briefing. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea_downloads.htm
-
(2002)
The Business Reference Model Version 1.0: Agency Briefing
-
-
-
25
-
-
84860079977
-
-
Federal Architecture Program Management Office. Retrieved July 27, 2003
-
Federal Enterprise Architecture Program Management Office. (2002c). Draft business reference model common response document. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea_downloads.htm
-
(2002)
Draft Business Reference Model Common Response Document
-
-
-
26
-
-
84860077164
-
-
Federal Architecture Program Management Office. Retrieved July 27, 2003
-
Federal Enterprise Architecture Program Management Office. (2002d). Solution architects working group: Overview of missions and objectives. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://xml.gov/presentations/sawg/overview.ppt
-
(2002)
Solution Architects Working Group: Overview of Missions and Objectives
-
-
-
27
-
-
84860091726
-
-
Federal Architecture Program Management Office. Retrieved July 27, 2003
-
Federal Enterprise Architecture Program Management Office. (2002e). Twenty four presidential priority e-govt initiatives. Federal Architecture Program Management Office. Retrieved July 27, 2003, from http://www.feapmo.gov/ fea.htm
-
(2002)
Twenty Four Presidential Priority E-govt Initiatives
-
-
-
28
-
-
0030676227
-
Fair exchange with a semi-trusted third party
-
R. Graveman, P. Janson, C. Neumann, & L. Gong (Eds.), New York: ACM
-
Franklin, M.K., & Reiter, M.K. (1997). Fair exchange with a semi-trusted third party. In R. Graveman, P. Janson, C. Neumann, & L. Gong (Eds.), the Proceedings of the 4th ACM Conference on Computer and Communications Security (pp. 1-7). New York: ACM.
-
(1997)
The Proceedings of the 4th ACM Conference on Computer and Communications Security
, pp. 1-7
-
-
Franklin, M.K.1
Reiter, M.K.2
-
29
-
-
13844303998
-
CIA, FBI wrangle over threat center
-
Retrieved July 27, 2003
-
French, M. (2003). CIA, FBI wrangle over threat center. Federal Computer Week. Retrieved July 27, 2003, from http://www.fcw.com/fcw/articles/2003/0421/ web-ciafbi-04-23-03.asp
-
(2003)
Federal Computer Week.
-
-
French, M.1
-
33
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Grosof, B.N., Feigenbaum, J., & Li, N. (2003). Delegation logic: A logic-based approach to distributed authorization. Proceedings of ACM Transactions on Information and Systems Security, 6(1), 128-171.
-
(2003)
Proceedings of ACM Transactions on Information and Systems Security
, vol.6
, Issue.1
, pp. 128-171
-
-
Grosof, B.N.1
Feigenbaum, J.2
Li, N.3
-
35
-
-
0036871183
-
Negotiating trust on the web
-
Hess, A., Jacobson, J., Jarvis, R., Seamons, K.E., Smith, B., Yu, L. Yu, T., & Winslett, M. (2002). Negotiating trust on the web. IEEE Internet Computing 6(6), 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Hess, A.1
Jacobson, J.2
Jarvis, R.3
Seamons, K.E.4
Smith, B.5
Yu, L.6
Yu, T.7
Winslett, M.8
-
37
-
-
84860091516
-
-
Federal Computer Incident Response Center. Retrieved July 27, 2003
-
Jarrell, D. (2002) The value of information sharing. Federal Computer Incident Response Center. Retrieved July 27, 2003, from http://www.fed-circ.gov
-
(2002)
The Value of Information Sharing
-
-
Jarrell, D.1
-
38
-
-
84955565977
-
A proposed architecture for trusted third party services
-
E. Dawson & J. O. Golie (Eds.), Cryptography Policy and Algorithms Conference. Heidelberg, Germany: Springer
-
Jefferies, N., Mitchell, C., & Walker, M. (1995). A proposed architecture for trusted third party services. In E. Dawson & J. O. Golie (Eds.), Cryptography Policy and Algorithms Conference. Springer LNCS (Vol. 1029, pp. 98-104). Heidelberg, Germany: Springer.
-
(1995)
Springer LNCS
, vol.1029
, pp. 98-104
-
-
Jefferies, N.1
Mitchell, C.2
Walker, M.3
-
39
-
-
84949942881
-
The right type of trust for distributed systems
-
T. Haigh, B. Blakey, M. E. Zurbo, & C. Meadows (Eds.), ACM. New York: ACM
-
Josang, A. (1996). The right type of trust for distributed systems. In T. Haigh, B. Blakey, M. E. Zurbo, & C. Meadows (Eds.), the Proceedings of New Security Paradigm Workshop, ACM. New York: ACM.
-
(1996)
The Proceedings of New Security Paradigm Workshop
-
-
Josang, A.1
-
40
-
-
36649033444
-
An algebra for assessing trust in certification chains
-
S. Kent & G. Tsudik (Eds.), Reston, VA: The Internet Society
-
Josang, A. (1999). An algebra for assessing trust in certification chains. In S. Kent & G. Tsudik (Eds.), The Proceedings of Network and Distributed Systems Security Symposium. Reston, VA: The Internet Society.
-
(1999)
The Proceedings of Network and Distributed Systems Security Symposium
-
-
Josang, A.1
-
41
-
-
0242624675
-
A reputation-based trust model for peer-to-peer e-commerce communities
-
New York: ACM
-
Liu, L., & Xiong, L. (2003). A reputation-based trust model for peer-to-peer e-commerce communities. In the Proceedings of 4th ACM Conference on Electronic Commerce (pp. 228-229). New York: ACM.
-
(2003)
The Proceedings of 4th ACM Conference on Electronic Commerce
, pp. 228-229
-
-
Liu, L.1
Xiong, L.2
-
44
-
-
84898266558
-
-
The Open Group. Retrieved July 27, 2003
-
Open Resource Group. (1999). Technical reference model in detail. The Open Group. Retrieved July 27, 2003, from http://www.opengroup.org/architecture/ togaf7/presents/togaf_ovu.pdf
-
(1999)
Technical Reference Model in Detail
-
-
-
45
-
-
0036887434
-
Integrating role graphs: A tool for security integration
-
Osborn, S.L. (2002). Integrating role graphs: A tool for security integration. Data and Knowledge Engineering, 43(3), 317-333.
-
(2002)
Data and Knowledge Engineering
, vol.43
, Issue.3
, pp. 317-333
-
-
Osborn, S.L.1
-
46
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
February. Paper presented at the San Diego, CA
-
Seamons, K.E., Winslett, M., & Yu, T. (2001, February). Limiting the disclosure of access control policies during automated trust negotiation. Paper presented at the Network and Distributed System Security Symposium, San Diego, CA.
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
47
-
-
84860075362
-
-
Understanding XML namespaces. DevelopMentor. Retrieved July 27, 2003
-
Skonnard, A. (2002). Understanding XML namespaces. DevelopMentor. Retrieved July 27, 2003, from http://msdn.microsoft.com/msdnmag/issues/01/07/ xml/default.aspx
-
(2002)
-
-
Skonnard, A.1
-
48
-
-
0002688881
-
Atomicity versus anonymity: Distributed transactions for electronic commerce
-
August. Paper presented at the New York
-
Tygar, J.D. (1998, August). Atomicity versus anonymity: Distributed transactions for electronic commerce. Paper presented at the 24th VLDB Conference, New York.
-
(1998)
24th VLDB Conference
-
-
Tygar, J.D.1
-
49
-
-
84860091848
-
An insider's look at homeland security and technology
-
Retrieved July 27, 2003
-
Utanoff, L. (2002). An insider's look at homeland security and technology. PC Magazine. Retrieved July 27, 2003, from http://www.pcmag.com/ articled0,4149,652467,00.asp
-
(2002)
PC Magazine
-
-
Utanoff, L.1
-
50
-
-
6344247257
-
-
Microsoft Corporation. Retrieved July 27, 2003
-
Wolter, R. (2001). XML web services basics. Microsoft Corporation. Retrieved July 27, 2003, from http://msdn.microsoft.com/library/default.asp?url= /library/enus/dnwebsrv/html/webservbasics.asp
-
(2001)
XML Web Services Basics
-
-
Wolter, R.1
-
51
-
-
0022882770
-
How to generate and exchange secrets
-
October. Paper presented at the Toronto, Canada
-
Yao, A.C. (1986, October). How to generate and exchange secrets. Paper presented at the 27th Annual Symposium on Foundations of Computer Science, Toronto, Canada.
-
(1986)
27th Annual Symposium on Foundations of Computer Science
-
-
Yao, A.C.1
-
52
-
-
84860080307
-
Battling the cyberthreat
-
Retrieved July 27, 2003
-
York, S. (1997). Battling the cyberthreat. Wabash Magazine. Retrieved July 27, 2003, from http://www.wabash.edu/magazine/1997/fall/features/ face_of_conflict/cyber_threat.htm
-
(1997)
Wabash Magazine
-
-
York, S.1
|