-
1
-
-
33747063498
-
IRBAC 2000: Secure interoperability using dynamic role translation
-
University of Illinois, DeKalb, I11., USA: Technical Report UIUCDCS-R-2000-2162
-
Kapadia A., Al-Muhtadi J., Campbell R. H., Mickunas D.. IRBAC 2000: Secure interoperability using dynamic role translation. University of Illinois, DeKalb, I11., USA: Technical Report UIUCDCS-R-2000-2162, 2000.
-
(2000)
-
-
Kapadia, A.1
Al-Muhtadi, J.2
Campbell, R.H.3
Mickunas, D.4
-
2
-
-
30644461515
-
SERAT: Secure role applying technique for decentralized secure interoperability
-
Stockholm, Sweden
-
Shehab M., Bertino E., Ghafoor A.. SERAT: Secure Role Applying Technique for decentralized secure interoperability. In: Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, 2005, 159-167.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies
, pp. 159-167
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
3
-
-
0029700344
-
Decentralized trust management
-
Washington, DC, US
-
Blaze M., Feigenbaum J., Lacy J.. Decentralized trust management, In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Washington, DC, USA, 1996, 164-173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
0004078695
-
The key note trust-management version 2
-
RFC 2704
-
Blaze M., Feigenbaum J., Ioannidis J., Keromytis A. D.. The Key Note Trust-Management Version 2. RFC 2704, 1999. http://www.faqs.org/rfcs/rfc2704.html.
-
(1999)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
5
-
-
0003593599
-
SPKI certificate theory. RFC 2693
-
RFC 2693
-
Ellison C., Frantz B. et al. SPKI Certificate Theory. RFC 2693, 1999. http://www.faqs.org/rfcs/rfc27693.html.
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
-
6
-
-
0001843009
-
REFEREE: Trust management for web applications
-
Chu Yang-Hua, Feigenbaum J. et al. REFEREE: Trust management for Web applications. World Wide Web Journal, 1997, 2(3): 127-139.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 127-139
-
-
Chu, Y.H.1
Feigenbaum, J.2
-
7
-
-
0036085965
-
Design of a role-based trust-management framework
-
Oakland, CA, USA
-
Li Ning-Hui, Mitchell J. C., Winsborough W. H.. Design of a role-based trust-management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, Oakland, CA, USA, 2002, 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.H.1
Mitchell, J.C.2
Winsborough, W.H.3
-
8
-
-
3142676730
-
Trust-x: A peer to peer framework for trust negotiations
-
Bertino E., Ferrari E., Squicciarini A. C.. Trust-x: A Peer to Peer framework for trust negotiations. IEEE Transactions on Knowledge and Data Engineering, 2004, 16(7): 827-842.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
9
-
-
0036376894
-
dR-BAC: Distributed role-based access control for dynamic coalition environments
-
Vienna, Austria
-
Freudenthal E., Pesin T., Port L., Keenan E. et al. dR-BAC: Distributed role-based access control for dynamic coalition environments. In: Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), Vienna, Austria, 2002, 411-434.
-
(2002)
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02)
, pp. 411-434
-
-
Freudenthal, E.1
Pesin, T.2
Port, L.3
Keenan, E.4
-
10
-
-
33749491043
-
Certificate discovery using SPKI SDSI 2.0. certificates
-
M.S. dissertation, Cambridge, MA, USA: M.I. TECSE
-
Elien Jean-Emile. Certificate discovery using SPKI SDSI 2.0. certificates [M.S. dissertation], Cambridge, MA, USA: M.I. TECSE, 1998.
-
(1998)
-
-
Jean-Emile, E.1
-
11
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke D., Elien J. E., Ellison C. et al. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 2001, 9(4): 285-322.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.E.2
Ellison, C.3
-
12
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li N., Winsborough W. H., Mitchell J. C.. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
13
-
-
33744824372
-
Distributed credential chain discovery in trust-management with parameterized roles
-
Xiamen, China
-
Zhu Xian, Wang Shao-Bin, Hong Fan et al. Distributed credential chain discovery in trust-management with parameterized roles. In: Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05). Xiamen, China, 2005, 334-348.
-
(2005)
Proceedings of the 4th International Conference on Cryptology and Network Security (CANS05)
, pp. 334-348
-
-
Zhu, X.1
Wang, S.B.2
Hong, F.3
-
14
-
-
0002863367
-
Valuation of trust in open networks
-
Gollmann D.(ed.), Brighton, UK: Springer-Verlag
-
Beth T., Borcherding M., Klein B.. Valuation of trust in open networks. In: Gollmann D. ed. Proceedings of the 3rd European Symposium on Research in Computer Security (ESO-RICS94), Brighton, UK: Springer-Verlag, 1994, 3-18.
-
(1994)
Proceedings of the 3rd European Symposium on Research in Computer Security (ESO-RICS94)
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
15
-
-
77952907282
-
AT-PAM: Authentication trustworthiness-based PAM
-
Shanghai, China
-
Wang Lun-Wei, Liao Xiang-Ke, Wang Huai-Min. AT-PAM: Authentication Trustworthiness-based PAM. In: Proceedings of the 3rd International Conference on Information Security, Shanghai, China, 2004, 204-209.
-
(2004)
Proceedings of the 3rd International Conference on Information Security
, pp. 204-209
-
-
Wang, L.W.1
Liao, X.K.2
Wang, H.M.3
-
16
-
-
38149043562
-
Semantic constraints for trust transitivity
-
Newcastle, NSW, Australia, Australian Computer Society
-
Josang A., Pope S.. Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling (APCCM2005), Newcastle, NSW, Australia, Australian Computer Society, 2005, 59-68.
-
(2005)
Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling (APCCM2005)
, pp. 59-68
-
-
Josang, A.1
Pope, S.2
|