-
1
-
-
33846954268
-
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimer-Adrianacati, C. Fugazza, and P. Samarati. Offline expansion of xacml policies based on p3p metadata. In Proc. of the 5th International Conference on Web Engineering, Sydney, Australia, July 2005.
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimer-Adrianacati, C. Fugazza, and P. Samarati. Offline expansion of xacml policies based on p3p metadata. In Proc. of the 5th International Conference on Web Engineering, Sydney, Australia, July 2005.
-
-
-
-
3
-
-
85025424440
-
An algebra for composing access control policies
-
February
-
P. Bonatti, S. De Capitani di Vimercati, and P. Samarati. An algebra for composing access control policies. A CM Transactions on Information and System Security, 5(1):1-35, February 2002.
-
(2002)
A CM Transactions on Information and System Security
, vol.5
, Issue.1
, pp. 1-35
-
-
Bonatti, P.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
4
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
6
-
-
33947126508
-
Advanced metadata for privacy-aware representation of credentials
-
Tokyo, Japan
-
P. Ceravolo, E. Damiani, S. De Capitani di Vimercati, C. Fugazza, and P. Samarati. Advanced metadata for privacy-aware representation of credentials. In Proc. of the International Workshop on Privacy Data Management, Tokyo, Japan, 2005.
-
(2005)
Proc. of the International Workshop on Privacy Data Management
-
-
Ceravolo, P.1
Damiani, E.2
De Capitani di Vimercati, S.3
Fugazza, C.4
Samarati, P.5
-
7
-
-
84948123357
-
Implementation of a storage mechanism for untrusted DBMSs
-
Washington DC, USA, May
-
E. Damiani, S. De Capitani di Vimercati, M. Finetti, S. Paraboschi, P. Samarati, and S. Jajodia. Implementation of a storage mechanism for untrusted DBMSs. In Proc. of the Second International IEEE Security in Storage Workshop, Washington DC, USA, May 2003.
-
(2003)
Proc. of the Second International IEEE Security in Storage Workshop
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Finetti, M.3
Paraboschi, S.4
Samarati, P.5
Jajodia, S.6
-
8
-
-
24644439414
-
Extending policy languages to the semantic web
-
Munch, Germany
-
E. Damiani, S. De Capitani di Vimercati, C. Fugazza, and P. Samarati. Extending policy languages to the semantic web. In proc. of the International Conference on Web Engineering, Munch, Germany, 2004.
-
(2004)
proc. of the International Conference on Web Engineering
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Fugazza, C.3
Samarati, P.4
-
9
-
-
18744366643
-
Balancing confidentiality and efficiency in untrusted relational DBMSs
-
Washington, DC, USA, October 27-31
-
E. Damiani, S. De Capitani di Vimercati, S. Jajodia, S. Paraboschi, and P. Samarati. Balancing confidentiality and efficiency in untrusted relational DBMSs. In Proc. of the 10th ACM Conference on Computer and Communications Security, Washington, DC, USA, October 27-31 2003.
-
(2003)
Proc. of the 10th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
10
-
-
1142301905
-
Managing multiple and dependable identities
-
November/December
-
E. Damiani, S. De Capitani di Vimercati, and P. Samarati. Managing multiple and dependable identities. IEEE Internet Computing, 7(6):29-37, November/December 2003.
-
(2003)
IEEE Internet Computing
, vol.7
, Issue.6
, pp. 29-37
-
-
Damiani, E.1
De Capitani di Vimercati, S.2
Samarati, P.3
-
12
-
-
33745285293
-
Policies, models, and languages for access control
-
University of Aizu, Japan, March
-
S. De Capitani di Vimercati, P. Samarati, and S. Jajodia. Policies, models, and languages for access control. In Proc. of the Workshop on Databases in Networked Information Systems, University of Aizu, Japan, March 2005.
-
(2005)
Proc. of the Workshop on Databases in Networked Information Systems
-
-
De Capitani di Vimercati, S.1
Samarati, P.2
Jajodia, S.3
-
13
-
-
0036204131
-
Providing database as a service
-
San Jose, California, USA, February
-
H. Hacigümüs, B. Iyer, and S. Mehrotra. Providing database as a service. In Proc. of 18th International Conference on Data Engineering, San Jose, California, USA, February 2002.
-
(2002)
Proc. of 18th International Conference on Data Engineering
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
-
15
-
-
0036361105
-
Executing SQL over encrypted data in the database-service-provider model
-
Madison, Wisconsin, USA, June
-
H. Hacigümüs, B. Iyer, S. Mehrotra, and C. Li. Executing SQL over encrypted data in the database-service-provider model. In Proc. of the ACM SIGMOD'2002, Madison, Wisconsin, USA, June 2002.
-
(2002)
Proc. of the ACM SIGMOD'2002
-
-
Hacigümüs, H.1
Iyer, B.2
Mehrotra, S.3
Li, C.4
-
16
-
-
33846992534
-
-
IBM Zurich Research Laboratory
-
IBM Zurich Research Laboratory. Idemix anonymous credential system. http://www.zurich.ibm.com/security/idemix.
-
Idemix anonymous credential system
-
-
-
19
-
-
20444479906
-
A logic-based framework for attribute based access control
-
Washington DC, USA, October
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, October 2004.
-
(2004)
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
22
-
-
27144470183
-
-
World Wide Web Consourtium
-
World Wide Web Consourtium. Semantic Web. http://www.w3.org/2001/ sw/.
-
Semantic Web
-
-
-
23
-
-
24144498846
-
-
World Wide Web Consourtium
-
World Wide Web Consourtium. Web Ontology Language (OWL). http://www.w3.org/2004/OWL/.
-
Web Ontology Language (OWL)
-
-
-
24
-
-
33646394155
-
A formal semantics for p3p
-
Washingthon, DC, USA, October
-
T. Yu, N. Li, and A. Anton. A formal semantics for p3p. In Proc. of the A CM Workshop on Secure Web Services, Washingthon, DC, USA, October 2004.
-
(2004)
Proc. of the A CM Workshop on Secure Web Services
-
-
Yu, T.1
Li, N.2
Anton, A.3
-
25
-
-
0034449542
-
Prunes: Am efficient and complete strategy for automated trust negotiation over the internet
-
Athens, Greece, November
-
T. Yu, M. Winslett, and K.E. Seamons. Prunes: Am efficient and complete strategy for automated trust negotiation over the internet. In Proc. of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 2000.
-
(2000)
Proc. of the 7th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
26
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Philadelphia, PA, USA, November
-
T. Yu, M. Winslett, and K.E. Seamons. Interoperable strategies in automated trust negotiation. In Proc. of the 8th ACM Conference on Computer and Communications Security, Philadelphia, PA, USA, November 2001.
-
(2001)
Proc. of the 8th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
27
-
-
1642327001
-
Supporting structured credentials and sensistive policies trough interoperable strategies for automated trust
-
T. Yu, M. Winslett, and K.E. Seamons. Supporting structured credentials and sensistive policies trough interoperable strategies for automated trust. A CM Transactions on Information and System Security (TISSEC), 6(1):1-42, 2003.
-
(2003)
A CM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|