-
3
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
Jul.
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827-842, Jul. 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
4
-
-
85062838317
-
Safeguarding cryptographic keys
-
G. R. Blakley. Safeguarding cryptographic keys. In AFIPS Conference Proceedings, volume 48, pages 313-317, 1979.
-
(1979)
AFIPS Conference Proceedings
, vol.48
, pp. 313-317
-
-
Blakley, G.R.1
-
8
-
-
0020720357
-
On the security of public key protocols
-
Mar.
-
D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, Mar. 1983.
-
(1983)
IEEE Transactions on Information Theory
, vol.IT-29
, Issue.2
, pp. 198-208
-
-
Dolev, D.1
Yao, A.C.2
-
9
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: assigning roles to strangers. In IEEE Symposium on Security and Privacy, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
10
-
-
4444341241
-
Content-triggered trust negotiation
-
Aug.
-
A. Hess, J. Holt, J. Jacobson, and K. E. Seamons. Content-triggered trust negotiation. ACM Transactions on Information System Security, 7(3), Aug. 2004.
-
(2004)
ACM Transactions on Information System Security
, vol.7
, Issue.3
-
-
Hess, A.1
Holt, J.2
Jacobson, J.3
Seamons, K.E.4
-
11
-
-
85180810679
-
Advanced client/server authentication in TLS
-
Feb.
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in TLS. In Network and Distributed Systems Security Symposium, Feb. 2002.
-
(2002)
Network and Distributed Systems Security Symposium
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
12
-
-
84858939576
-
-
Web Page, May
-
Internet security research lab-projects. Web Page, May 2005. 〈http://isrl.cs.byu.edu/TrustBuilder.html〉.
-
(2005)
-
-
-
19
-
-
84887853842
-
A community authorization service for group collaboration
-
L. Pearlman, V. Welch, I. Foster, C. Kesselman, and C. Tuecke. A community authorization service for group collaboration. In IEEE 3rd International Workshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
IEEE 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kesselman, C.4
Tuecke, C.5
-
20
-
-
30644473909
-
Adaptive trust negotiation and access control
-
Jun.
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In 10th ACM Symposium on Access Control Models and Technologies, Jun. 2005.
-
(2005)
10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
21
-
-
0016555241
-
The protection of information in computer systems
-
Sep.
-
J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sep. 1975.
-
(1975)
Proceedings of the IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.H.1
Schroeder, M.D.2
-
22
-
-
0018545449
-
How to share a secret
-
Nov.
-
A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, Nov. 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
24
-
-
84942318236
-
Security for grid services
-
Jun.
-
V. Welch, F. Siebenlist, I. Foster, J. Bresnahan, K. Czajkowski, J. Gawor, C. Kesselman, S. Meder, L. Pearlman, and S. Tuecke. Security for grid services. In Twelfth International Symposium on High Performance Distributed Computing (HPDC-12), Jun. 2003.
-
(2003)
Twelfth International Symposium on High Performance Distributed Computing (HPDC-12)
-
-
Welch, V.1
Siebenlist, F.2
Foster, I.3
Bresnahan, J.4
Czajkowski, K.5
Gawor, J.6
Kesselman, C.7
Meder, S.8
Pearlman, L.9
Tuecke, S.10
-
27
-
-
0036871183
-
The TrustBuilder architecture for trust negotiation
-
Nov./Dec.
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. The TrustBuilder architecture for trust negotiation. IEEE Internet Computing, 6(6):30-37, Nov./Dec. 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
30
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Feb.
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1), Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
31
-
-
0242539790
-
Heterogeneous networking: A new survivability paradigm
-
Y. Zhang, H. Vin, L. Alvisi, W. Lee, and S. K. Dao. Heterogeneous networking: A new survivability paradigm. In 2001 Workshop on New Security Paradigms, pages 33-39, 2001.
-
(2001)
2001 Workshop on New Security Paradigms
, pp. 33-39
-
-
Zhang, Y.1
Vin, H.2
Alvisi, L.3
Lee, W.4
Dao, S.K.5
|