-
1
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, Piscataway, New Jersey
-
BLAZE, M., FEIGENBAUM, J., AND LACY, J. 1996. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Piscataway, New Jersey. 164-173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
0029324246
-
Foundations of secure deductive databases
-
BONATTI, P., KRAUS, S., AND SUBRAHMANIAN, V. S. 1995. Foundations of secure deductive databases. Knowledge and Data Engineering 7, 3, 406-422.
-
(1995)
Knowledge and Data Engineering
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.1
Kraus, S.2
Subrahmanian, V.S.3
-
4
-
-
71649084902
-
-
DOMINGO-FERREE, J., Ed. Lecture Notes in Computer Science. Springer-Verlag, New York
-
DOMINGO-FERREE, J., Ed. 2002. Inference Control in Statistical Databases, From Theory to Practice. Lecture Notes in Computer Science, vol. 2316. Springer-Verlag, New York.
-
(2002)
Inference Control in Statistical Databases, from Theory to Practice
, vol.2316
-
-
-
5
-
-
0020299523
-
Security policies and security models
-
IEEE Computer Society Press, Piscataway, New Jersey
-
GOGUEN, J. AND MESEGUER, J. 1982. Security policies and security models. In Proceedings of the 1982 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Piscataway, New Jersey. 11-20.
-
(1982)
Proceedings of the 1982 IEEE Symposium on Security and Privacy
, pp. 11-20
-
-
Goguen, J.1
Meseguer, J.2
-
7
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, Piscataway, New Jersey
-
HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Piscataway, New Jersey. 2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
8
-
-
85180810679
-
Advanced client/server authentication in TLS
-
HESS, A., JACOBSON, J., MILLS, H., WAMSLEY, R., SEAMONS, K. E., AND SMITH, B. 2002. Advanced client/server authentication in TLS. In Network and Distributed System Security Symposium, 203-214.
-
(2002)
Network and Distributed System Security Symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
9
-
-
1642394295
-
Hidden credentials
-
HOLT, J. E., BRADSHAW, R. W., SEAMONS, K. E., AND ORMAN, H. 2003. Hidden credentials. In Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society.
-
(2003)
Proceedings of the 2nd ACM Workshop on Privacy in the Electronic Society
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orman, H.4
-
10
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
ACM Press, New York
-
Li, J., Li, N., AND WINSBOROUGH, W. H. 2005. Automated trust negotiation using cryptographic credentials. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security. ACM Press, New York. 46-57.
-
(2005)
CCS '05: Proceedings of the 12th ACM Conference on Computer and Communications Security
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
11
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Piscataway, New Jersey
-
Li, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, Piscataway, New Jersey. 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
12
-
-
1142293102
-
Oblivious signature-based envelope
-
ACM Press, New York
-
Li, N., Du, W., AND BONEH, D. 2003a. Oblivious signature-based envelope. In Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003). ACM Press, New York.
-
(2003)
Proceedings of the 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003)
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
13
-
-
0041524661
-
Delegation Logic: A logic-based approach to distributed authorization
-
Li, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003b. Delegation Logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC) 6, 1 (Feb.), 128-171.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1 FEB
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
14
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003c. Distributed credential chain discovery in trust management. Journal of Computer Security 11, 1 (Feb.), 35-86.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1 FEB
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
17
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
Springer-Verlag, New York
-
SEAMONS, K. E., WINSLETT, M., YU, T., YU, L., AND JARVIS, R. 2002. Protecting privacy during on-line trust negotiation. In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, New York.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
20
-
-
27844580738
-
Cardinality-based inference control in data cubes
-
Sept. 2004
-
WANG, L., WIJESEKERA, D., AND JAJODIA, S. 2003. Cardinality-based inference control in data cubes. Journal of Computer Security 12, 5 (Sept. 2004), 655-692.
-
(2003)
Journal of Computer Security
, vol.12
, Issue.5
, pp. 655-692
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
23
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, Piscataway, New Jersey
-
WINSBOHOUGH, W. H., SEAMONS, K. E., AND JONES, V. E. 2000. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition. Vol. I. IEEE Press, Piscataway, New Jersey. 88-102.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsbohough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
24
-
-
0036871183
-
Negotiating trust on the web
-
WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., AND YU, L. 2002. Negotiating trust on the web. IEEE Internet Computing 6, 6 (Nov./Dec.), 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6 NOV.-DEC.
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
26
-
-
0038148412
-
Unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society Press, Piscataway, New Jersey
-
Yu, T. AND WINSLETT, M. 2003b. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Piscataway, New Jersey. 110-122.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
27
-
-
0034449542
-
Prunes: An efficient and complete strategy for trust negotiation over the internet
-
ACM Press
-
Yu, T., MA, X., AND WINSLETT, M. 2000. Prunes: An efficient and complete strategy for trust negotiation over the internet. In Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7). ACM Press, 210-219.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security (CCS-7)
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
28
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu, T., WINSLETT, M., AND SEAMONS, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6, 1 (Feb.), 1-42.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1 FEB
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|