-
2
-
-
3142676730
-
Trust-χ - A peer to peer framework for trust establishment
-
Apr.
-
E Bertino, E. Ferrari, and A. Squicciarini, "Trust-χ - A Peer to Peer Framework for Trust Establishment," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 827-842, Apr. 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng.
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
3
-
-
3042777385
-
Trust negotiations: Concepts, systems, and languages
-
E. Bertino, E. Ferrari, and A. Squicciarini, "Trust Negotiations: Concepts, Systems, and Languages," IEEE Computing in Science and Eng., vol. 6, no. 4, pp. 27-34, 2004.
-
(2004)
IEEE Computing in Science and Eng.
, vol.6
, Issue.4
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
4
-
-
0029324246
-
Foundations on secure deductive databases
-
P. Bonatti and S. Kraus, "Foundations on Secure Deductive Databases," IEEE Trans. Knowledge and Data Eng., vol. 7, no. 3, pp. 406-422, 1995.
-
(1995)
IEEE Trans. Knowledge and Data Eng.
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.1
Kraus, S.2
-
8
-
-
32844455034
-
-
Springer-Velag
-
A. Doan, J. Madhavan, P. Domingos, and A. Halevy, Ontology Matching: Machine Learning Approach, Springer-Velag, 2003.
-
(2003)
Ontology Matching: Machine Learning Approach
-
-
Doan, A.1
Madhavan, J.2
Domingos, P.3
Halevy, A.4
-
10
-
-
35148839490
-
A translation approach to portable ontology specifications
-
T.R. Gruber, "A Translation Approach to Portable Ontology Specifications," Knowledge Acquisition, vol. 5, no 2, pp. 199-220, 1993.
-
(1993)
Knowledge Acquisition
, vol.5
, Issue.2
, pp. 199-220
-
-
Gruber, T.R.1
-
11
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg et al., "Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers," Proc. IEEE Symp. Security and Privacy, 2000.
-
(2000)
Proc. IEEE Symp. Security and Privacy
-
-
Herzberg, A.1
-
12
-
-
1642394295
-
Hidden credentials
-
J. Holt, R. Bradshaw, K.E. Seamons, and H. Orman, "Hidden Credentials," Proc. Second ACM Workshop Privacy in the Electronic Soc., 2003.
-
(2003)
Proc. Second ACM Workshop Privacy in the Electronic Soc.
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
14
-
-
0942268247
-
Retrieval effectiveness of an ontology-based model for information selection
-
L. Khan, D. McLeod, and E. Hovy, "Retrieval Effectiveness of an Ontology-Based Model for Information Selection," The VLDB J., vol. 13, no. 1, pp. 71-85, 2004.
-
(2004)
The VLDB J.
, vol.13
, Issue.1
, pp. 71-85
-
-
Khan, L.1
McLeod, D.2
Hovy, E.3
-
15
-
-
0013243382
-
-
W3C Reccomandation, Apr.
-
M. Marchiori, L. Cranor, and M. Langheirich, "The Platform for Privacy Preferences 1.0 (p3p1.0) Specification," W3C Reccomandation, Apr. 2002, http://www.w3.org/P3P/brochure.html.
-
(2002)
The Platform for Privacy Preferences 1.0 (P3p1.0) Specification
-
-
Marchiori, M.1
Cranor, L.2
Langheirich, M.3
-
16
-
-
79551478054
-
Bit commitment using pseudorandomness
-
Lecture Notes in Computer Science, New York
-
M. Naor, "Bit Commitment Using Pseudorandomness," Advances in Cryptology-89, vol. 435, Lecture Notes in Computer Science, New York, 1990.
-
(1990)
Advances in Cryptology-89
, vol.435
-
-
Naor, M.1
-
20
-
-
0036811662
-
k-anonymity: A model for protecting privacy
-
L. Sweeney, "k-anonymity: A Model for Protecting Privacy," Int'l J. Uncertainty, Fuziness and Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
-
(2002)
Int'l J. Uncertainty, Fuziness and Knowledge-based Systems
, vol.10
, Issue.5
, pp. 557-570
-
-
Sweeney, L.1
-
21
-
-
0030166318
-
Ontologies: Principles, methods, and applications
-
M. Uschold and M. Gruninger, "Ontologies: Principles, Methods, and Applications," Knowledge Eng. Rev., vol. 11, no. 2, pp. 93-155, 1996.
-
(1996)
Knowledge Eng. Rev.
, vol.11
, Issue.2
, pp. 93-155
-
-
Uschold, M.1
Gruninger, M.2
-
24
-
-
84939548725
-
Automated trust negotiation
-
W.H. Winsborough, K.E. Seamons, and V. Jones, "Automated Trust Negotiation," Proc. DARPA Information Survivability Conf. and Exposition, vol. I, pp. 88-102, 2000.
-
(2000)
Proc. DARPA Information Survivability Conf. and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.3
-
25
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
26
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K.E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation," ACM Trans. Information and System Security, vol. 6, no. 1, 2003.
-
(2003)
ACM Trans. Information and System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|