-
1
-
-
33750028604
-
Negotiating trust on the Grid
-
New York
-
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett. Negotiating trust on the Grid. In 2nd Workshop on Semantics in P2P and Grid Computing, New York, 2004.
-
(2004)
2nd Workshop on Semantics in P2P and Grid Computing
-
-
Basney, J.1
Nejdl, W.2
Olmedilla, D.3
Welch, V.4
Winslett, M.5
-
5
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures (position paper)
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lect. Notes in Computer Science, 1550:59-63, 1999.
-
(1999)
Lect. Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
10
-
-
12844287351
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In European Semantic Web Symposium, 2004.
-
(2004)
European Semantic Web Symposium
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.4
Winslett, M.5
-
11
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: assigning roles to strangers. In Symp. on Security and Privacy, 2000.
-
(2000)
Symp. on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
12
-
-
85180810679
-
Advanced client/server authentication in TLS
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in TLS. In Network and Dist. Systems Security Symp., 2002.
-
(2002)
Network and Dist. Systems Security Symp.
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
13
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symp. on Security and Privacy, 2001.
-
(2001)
IEEE Symp. on Security and Privacy
-
-
Jim, T.1
-
19
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and C. Tuecke. A community authorization service for group collaboration. In Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, C.5
-
21
-
-
33745767363
-
Logic-based reasoning on delegatable authorizations
-
Lyon, June
-
C. Ruan, V. Varadharajan, and Y. Zhang. Logic-based reasoning on delegatable authorizations. In Foundations of Intelligent Systems, ISMIS 2002, Lyon, June 2002.
-
(2002)
Foundations of Intelligent Systems, ISMIS 2002
-
-
Ruan, C.1
Varadharajan, V.2
Zhang, Y.3
-
22
-
-
19944433808
-
The pudding of trust
-
Sep./Oct.
-
S. Staab, B. Bhargava, L. Lilien, A. Rosenthal, M. Winslett, M. Sloman, T. S. Dillon, E. Chang, F. K. Hussain, W. Nejdl, D. Olmedilla, and V. Kashyap. The pudding of trust. IEEE Intelligent Systems, 19(5):74-88, Sep./Oct. 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
Dillon, T.S.7
Chang, E.8
Hussain, F.K.9
Nejdl, W.10
Olmedilla, D.11
Kashyap, V.12
-
24
-
-
0036871183
-
The TrustBuilder architecture for trust negotiation
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. The TrustBuilder architecture for trust negotiation. IEEE Internet Computing, 6(6), 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
25
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. on Info. and System Security, 6(1), 2003.
-
(2003)
ACM Trans. on Info. and System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|