-
1
-
-
0029700344
-
Decentralized Trust Management
-
IEEE Computer Press, Los Angeles
-
M. Blaze, J. Feigenbaum and J. Lacy. Decentralized Trust Management. Proceedings IEEE Symposium on Security and Privacy, IEEE Computer Press, Los Angeles, pages 164-173, 1996.
-
(1996)
Proceedings IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
2
-
-
84958048748
-
Compliance Checking in the Policy Maker Trust Management System
-
Proceedings of the Financial Cryptography '98
-
M. Blaze, J. Feigenbaum and M. Strauss. Compliance Checking in the Policy Maker Trust Management System. In Proceedings of the Financial Cryptography '98, Lecture Notes in Computer Science, volume 1465, pages 254-274.
-
Lecture Notes in Computer Science
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
3
-
-
85084164023
-
A Comparison of Methods for Implementing Adaptive Security Policies
-
January
-
M. Carney and B. Loe. A Comparison of Methods for Implementing Adaptive Security Policies. In Proceedings of the 7th USENIX Security Symposium, pages 1-14, January, 1998.
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 1-14
-
-
Carney, M.1
Loe, B.2
-
4
-
-
84944048132
-
The Ponder Policy Specification Language
-
Proceedings of the Workshop on Policies for Distributed Systems and Networks, Springer-Verlag Bristol, UK, January
-
N. Damianou, N. Dulay, E. Lupu and M. Sloman. The Ponder Policy Specification Language. In Proceedings of the Workshop on Policies for Distributed Systems and Networks, Springer-Verlag LNCS 1995, pages 18-39, Bristol, UK, January, 2001.
-
(2001)
LNCS
, vol.1995
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
5
-
-
0031650454
-
OASIS: Access Control in an Open, Distributed Environment
-
Oakland, CA, May
-
R. J. Hayton, J. M. Bacon and K. Moody. OASIS: Access Control in an Open, Distributed Environment. Proceedings of the IEEE Symposium on Security and Privacy, pages 3-14, Oakland, CA, May 1998.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
Hayton, R.J.1
Bacon, J.M.2
Moody, K.3
-
7
-
-
0027609384
-
A Survey of Intrusion Detection Techniques
-
June
-
T. F. Lunt. A Survey of Intrusion Detection Techniques. Computers and Security, volume 12, pages 405-418, June 1993.
-
(1993)
Computers and Security
, vol.12
, pp. 405-418
-
-
Lunt, T.F.1
-
9
-
-
0000788149
-
Law-Governed Interaction: A Coordination & Control Mechanism for Heterogeneous Distributed Systems
-
July
-
N. Minsky and V. Ungureanu. Law-Governed Interaction: A Coordination & Control Mechanism for Heterogeneous Distributed Systems. In ACM Transactions on Software Engineering and Methodology (TOSEM), Vol 9, No 3, pages 273-305, July 2000.
-
(2000)
ACM Transactions on Software Engineering and Methodology (TOSEM)
, vol.9
, Issue.3
, pp. 273-305
-
-
Minsky, N.1
Ungureanu, V.2
-
11
-
-
0028514601
-
Kerberos: An authentication service for computer networks
-
September
-
B.C. Neuman and T. Ts'o. Kerberos: An authentication service for computer networks. IEEE Communications Magazine, pages 33-38, September 1994.
-
(1994)
IEEE Communications Magazine
, pp. 33-38
-
-
Neuman, B.C.1
Ts'o, T.2
-
12
-
-
0037968017
-
Integrated Access Control and Intrusion Detection for Web Servers
-
T. V. Ryutov, B. C. Neuman, Li Zhou and Dongho Kim. Integrated Access Control and Intrusion Detection for Web Servers. In Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, May 2003.
-
Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, Rhode Island, May 2003
-
-
Ryutov, T.V.1
Neuman, B.C.2
Zhou, L.3
Kim, D.4
-
13
-
-
0037510581
-
Authentication, Access Control, and Intrusion Detection
-
CRC Press
-
R. Sandhu and P. Samarati. Authentication, Access Control, and Intrusion Detection. The Computer Science and Engineering Handbook, pages 1929-1948, CRC Press, 1997.
-
(1997)
The Computer Science and Engineering Handbook
, pp. 1929-1948
-
-
Sandhu, R.1
Samarati, P.2
|