-
2
-
-
0001071507
-
Compliance checking in the policy-maker trust management system
-
British West Indies, February
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance Checking in the Policy-Maker Trust Management System. In Financial Cryptography, British West Indies, February 1998.
-
(1998)
Financial Cryptography
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
3
-
-
33646036095
-
Rule-based policy specification: State of the art and future work
-
Working Group I2, EU NoE REWERSE, aug
-
P. A. Bonatti, N. Shahmehri, C. Duma, D. Olmedilla, W. Nejdl, M. Baldoni, C. Baroglio, A. Martelli, V. Patti, P. Coraggio, G. Antoniou, J. Peer, and N. E. Fuchs. Rule-based policy specification: State of the art and future work. Technical report, Working Group I2, EU NoE REWERSE, aug 2004. http://reverse.net/deliverables/12-di.pdf.
-
(2004)
Technical Report
-
-
Bonatti, P.A.1
Shahmehri, N.2
Duma, C.3
Olmedilla, D.4
Nejdl, W.5
Baldoni, M.6
Baroglio, C.7
Martelli, A.8
Patti, V.9
Coraggio, P.10
Antoniou, G.11
Peer, J.12
Fuchs, N.E.13
-
4
-
-
33746103325
-
Advanced policy queries
-
Working Group 12, EU NoE REWERSE, Aug
-
P.A. Bonatti, D. Olmedilla, and J. Peer. Advanced policy queries. Technical Report I2-D4, Working Group 12, EU NoE REWERSE, Aug 2005. http://www.rewerse.net.
-
(2005)
Technical Report
, vol.I2-D4
-
-
Bonatti, P.A.1
Olmedilla, D.2
Peer, J.3
-
5
-
-
0036311802
-
A uniform framework for regulating service access and information release on the web
-
P.A. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.A.1
Samarati, P.2
-
7
-
-
34249798492
-
An integration of reputation-based and policy-based trust management
-
Galway, Ireland, nov
-
Piero A. Bonatti, Claudiu Duma, Daniel Olmedilla, and Nahid Shahmehri. An integration of reputation-based and policy-based trust management. In Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland, nov 2005.
-
(2005)
Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference
-
-
Bonatti, P.A.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
10
-
-
34547260252
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
1st European Semantic Web Symposium (ESWS 2004), Heraklion, Crete, Greece, may Springer
-
Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, and Marianne Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In 1st European Semantic Web Symposium (ESWS 2004), volume 3053 of Lecture Notes in Computer Science, pages 342-356, Heraklion, Crete, Greece, may 2004. Springer.
-
(2004)
Lecture Notes in Computer Science
, vol.3053
, pp. 342-356
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
-
11
-
-
33750685129
-
Towards a policy-aware web
-
Galway, Ireland, nov
-
Vladimir Kolovski, Yarden Katz, James Hendler, Daniel Weitzner, and Tim Berners-Lee. Towards a policy-aware web. In Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland, nov 2005.
-
(2005)
Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference
-
-
Kolovski, V.1
Katz, Y.2
Hendler, J.3
Weitzner, D.4
Berners-Lee, T.5
-
12
-
-
0035751908
-
Distributed credential chain discovery in trust management
-
Philadelphia, Pennsylvania, November
-
N. Li, W. Winsborough, and J.C. Mitchell. Distributed Credential Chain Discovery in Trust Management (Extended Abstract). In ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, November 2001.
-
(2001)
ACM Conference on Computer and Communications Security
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.C.3
-
13
-
-
9344223389
-
Explaining answers from the semantic web: The inference web approach
-
Deborah L. McGuinness and Paulo Pinheiro da Silva. Explaining answers from the semantic web: The inference web approach. Journal of Web Semantics, 1(4):397-413, 2004.
-
(2004)
Journal of Web Semantics
, vol.1
, Issue.4
, pp. 397-413
-
-
McGuinness, D.L.1
Da Silva, P.P.2
-
15
-
-
3142702937
-
Security of shared data in large systems: State of the art and research directions
-
ACM
-
Arnon Rosenthal and Marianne Winslett. Security of shared data in large systems: State of the art and research directions. In Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pages 962-964. ACM, 2004.
-
(2004)
Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004
, pp. 962-964
-
-
Rosenthal, A.1
Winslett, M.2
-
16
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
Monterey, CA, June
-
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobsen, H. Mills, and L. Yu. Requirements for Policy Languages for Trust Negotiation. In 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA, June 2002.
-
(2002)
3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
Mills, H.7
Yu, L.8
-
17
-
-
19944433808
-
The pudding of trust
-
Steffen Staab, Bharat K. Bhargava, Leszek Lilien, Arnon Rosenthal, Marianne Winslett, Morris Sloman, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain, Wolfgang Nejdl, Daniel Olmedilla, and Vipul Kashyap. The pudding of trust. IEEE Intelligent Systems, 19(5):74-88, 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.K.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
Dillon, T.S.7
Chang, E.8
Hussain, F.K.9
Nejdl, W.10
Olmedilla, D.11
Kashyap, V.12
-
18
-
-
0003910404
-
-
MIT Press
-
V. S. Subrahmanian, Piero A. Bonatti, Jürgen Dix, Thomas Eiter, Sarit Kraus, Fatma Ozean, and Robert Ross. Heterogenous Active Agents. MIT Press, 2000.
-
(2000)
Heterogenous Active Agents
-
-
Subrahmanian, V.S.1
Bonatti, P.A.2
Dix, J.3
Eiter, T.4
Kraus, S.5
Ozean, F.6
Ross, R.7
-
19
-
-
0003496922
-
-
V.S. Subrahmanian, S. Adali, A. Brink, R. Emery, J.J. Lu, A. Rajput, T.J. Rogers, R. Ross, and G. Ward. Hermes: Heterogeneous reasoning and mediator system. http://www.cs.umd.edu/projects/publications/ abstracts/hermes. html.
-
Hermes: Heterogeneous Reasoning and Mediator System
-
-
Subrahmanian, V.S.1
Adali, S.2
Brink, A.3
Emery, R.4
Lu, J.J.5
Rajput, A.6
Rogers, T.J.7
Ross, R.8
Ward, G.9
-
20
-
-
0026169418
-
Explanations in knowledge systems: Design for explainable expert systems
-
William Swartout, Cecile Paris, and Johanna Moore. Explanations in knowledge systems: Design for explainable expert systems. IEEE Expert: Intelligent Systems and Their Applications, 6(3):58-64, 1991.
-
(1991)
IEEE Expert: Intelligent Systems and Their Applications
, vol.6
, Issue.3
, pp. 58-64
-
-
Swartout, W.1
Paris, C.2
Moore, J.3
-
21
-
-
0026168818
-
Explanations in knowledge systems: The roles of the task structure and domain functional models
-
Michael C. Tanner and Anne M. Keuneke. Explanations in knowledge systems: The roles of the task structure and domain functional models. IEEE Expert: Intelligent Systems and Their Applications, 6(3):50-57, 1991.
-
(1991)
IEEE Expert: Intelligent Systems and Their Applications
, vol.6
, Issue.3
, pp. 50-57
-
-
Tanner, M.C.1
Keuneke, A.M.2
-
22
-
-
9344228137
-
Second generation expert system explanation
-
J.-M. David, J.-P. Krivine, and R. Simmons, editors, Springer Verlag
-
M. R. Wick. Second generation expert system explanation. In J.-M. David, J.-P. Krivine, and R. Simmons, editors, Second Generation Expert Systems, pages 614-640. Springer Verlag, 1993.
-
(1993)
Second Generation Expert Systems
, pp. 614-640
-
-
Wick, M.R.1
-
23
-
-
33746075609
-
Negotiating disclosure of sensitive credentials
-
Amalfi, Italy, September
-
W. Winsborough, K. Seamons, and V. Jones. Negotiating Disclosure of Sensitive Credentials. In Second Conference on Security in Communication Networks, Amalfi, Italy, September 1999.
-
(1999)
Second Conference on Security in Communication Networks
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
24
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head Island, SC, January
-
W. Winsborough, K. Seamons, and V. Jones. Automated Trust Negotiation. In DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
25
-
-
0036871183
-
Negotiating trust on the web
-
Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, and Lina Yu. Negotiating trust on the web. IEEE Internet Computing, 6(6):30-37, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
26
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur., 6(1):1-42, 2003.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
27
-
-
33745792729
-
Peeraccess: A logic for distributed authorization
-
Alexandria, VA, USA. ACM
-
C. Zhang, P.A. Bonatti, and M. Winslett. Peeraccess: A logic for distributed authorization. In 12th ACM Conference on Computer and Communication Security (CCS 2005), Alexandria, VA, USA. ACM.
-
12th ACM Conference on Computer and Communication Security (CCS 2005)
-
-
Zhang, C.1
Bonatti, P.A.2
Winslett, M.3
|