-
1
-
-
0030086382
-
Role based access control models
-
February
-
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., and Youman, C. E., Role based access control models. IEEE Computer. February 1996, 29(2):38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
2
-
-
0035006262
-
Generalized role-based access control
-
In the, IEEE Computer Society Press
-
Moyer, M. J., and Ahamad, M., Generalized role-based access control. In the Proceedings of the 21st International Conference on Distributed Computing Systems. IEEE Computer Society Press, 2001, 391-398.
-
(2001)
Proceedings of the 21st International Conference on Distributed Computing Systems
, pp. 391-398
-
-
Moyer, M.J.1
Ahamad, M.2
-
3
-
-
0035791053
-
-
Covington, M. J., Long, W., Srinivasan, S., Dey, A. K., Ahamad, M. and Abowd, G. D., Securing context-aware applications using environment roles. In the Proceedings of the sixth ACM symposium on Access control models and technologies. May 2001, 10-20.
-
Covington, M. J., Long, W., Srinivasan, S., Dey, A. K., Ahamad, M. and Abowd, G. D., Securing context-aware applications using environment roles. In the Proceedings of the sixth ACM symposium on Access control models and technologies. May 2001, 10-20.
-
-
-
-
4
-
-
4344567712
-
Kerberos assisted authentication in mobile Ad-hoc networks
-
In the, Dunedin, New Zealand
-
Pirzada, A. A., McDonald, C., Kerberos assisted authentication in mobile Ad-hoc networks. In the Proceedings of the 27th Australasian Computer Science Conference. Dunedin, New Zealand, 2004. 26: 41-46.
-
(2004)
Proceedings of the 27th Australasian Computer Science Conference
, vol.26
, pp. 41-46
-
-
Pirzada, A.A.1
McDonald, C.2
-
5
-
-
0034317075
-
Key agreement in Ad-hoc Networks
-
Asokan, N., Ginzboorg, P., Key agreement in Ad-hoc Networks. Computer Communications, 2000, 23(17):1627-1637.
-
(2000)
Computer Communications
, vol.23
, Issue.17
, pp. 1627-1637
-
-
Asokan, N.1
Ginzboorg, P.2
-
6
-
-
84947251443
-
The resurrecting duckling: Security issues for Ad hoc wireless networks
-
In the Proceedings of the 7th International Workshop on Security Protocols, Springer-Verlag
-
Stajano, F., Anderson, R., The resurrecting duckling: security issues for Ad hoc wireless networks. In the Proceedings of the 7th International Workshop on Security Protocols, LNCS 1796, Springer-Verlag, 1999. 172-194.
-
(1999)
LNCS
, vol.1796
, pp. 172-194
-
-
Stajano, F.1
Anderson, R.2
-
7
-
-
84949953635
-
The resurrecting duckling - what next?
-
In the Proceedings of the 8th International Workshop on Security Protocols, Springier-Verlag, Berlin Germany, April
-
Stajano, F., The resurrecting duckling - what next? In the Proceedings of the 8th International Workshop on Security Protocols, LNCS 2133, Springier-Verlag, Berlin Germany, April 2000. 204-214.
-
(2000)
LNCS
, vol.2133
, pp. 204-214
-
-
Stajano, F.1
-
8
-
-
33751044073
-
Talking to strangers: Authentication in Ad-hoc wireless networks
-
San Diego, California
-
Balfanz, D., Smetters, D. K., Stewart, P., Wong, H. C., Talking to strangers: authentication in Ad-hoc wireless networks. In: the Symposium on Network and Distributed Systems Security, San Diego, California, 2002
-
(2002)
the Symposium on Network and Distributed Systems Security
-
-
Balfanz, D.1
Smetters, D.K.2
Stewart, P.3
Wong, H.C.4
-
9
-
-
0035577649
-
Trust-based security in ubiquitous computing environments
-
December
-
Kagal, L., Finin, T., Joshi, A., Trust-based security in ubiquitous computing environments. IEEE Computer, December 2001, 34(12):154-157.
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
10
-
-
0036085965
-
Design of a role-based trust-management framework
-
In the, IEEE Computer Society Press, May
-
Li, N., Mitchell, J. C., and Winsboough, W. H., Design of a role-based trust-management framework. In the Proceedings of 2002 IEE E Symposium on Security and Privacy. IEEE Computer Society Press, May 2002, 114-130.
-
(2002)
Proceedings of 2002 IEE E Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsboough, W.H.3
-
11
-
-
1542361507
-
-
Vawdrey, D. K., Sundelin, T. L., Seamons, K. E., Knutson1, C. D., Trust negotiation for authentication and authorization in healthcare information systems, In the Proceedings of the 25th Annual International Conference of the IEEE Engineering In Medicine And Biology Society, Cancun, Mexico, September 2003.
-
Vawdrey, D. K., Sundelin, T. L., Seamons, K. E., Knutson1, C. D., Trust negotiation for authentication and authorization in healthcare information systems, In the Proceedings of the 25th Annual International Conference of the IEEE Engineering In Medicine And Biology Society, Cancun, Mexico, September 2003.
-
-
-
-
12
-
-
84893110297
-
Towards practical automated trust negotiation
-
In the , Monterey, CA, IEEE Computer Society Press. June
-
Winsborough, W., Li, N., Towards practical automated trust negotiation. In the Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, IEEE Computer Society Press. June 2002. 92-103.
-
(2002)
Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (POLICY
, pp. 92-103
-
-
Winsborough, W.1
Li, N.2
-
13
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
Yu, T., Winslett, M., Seamons, K., Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, February 2003, 6(1): 1-42.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
-
14
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head, SC, IEEE Press, January
-
Winsborough, W., Seamons, K., Jones, V., Automated trust negotiation, In DARPA Information Survivability Conference and Exposition Hilton Head, SC, IEEE Press, January 2000. 1: 88-102.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
15
-
-
0036871183
-
Trust negotiation on the Web
-
November/December
-
Winslett, M., Yu, T., Seamons, K., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L., Trust negotiation on the Web. IEEE Internet Computing, November/December 2002, 6(6): 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
16
-
-
3543128965
-
Safety in automated trust negotiation
-
IEEE Computer Society Press, Berkeley, California, May
-
Winsborough, W. H., Li, N., Safety in automated trust negotiation, In the Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Berkeley, California, May 2004. 147-160.
-
(2004)
In the Proceedings of IEEE Symposium on Security and Privacy
, pp. 147-160
-
-
Winsborough, W.H.1
Li, N.2
-
17
-
-
4444341241
-
Content-triggered trust negotiation
-
Hess, A., Holt, J., Jaxobson, J., and Seamons., K. S., Content-triggered trust negotiation. ACM Transaction on information and System Security. 2004, 7(3): 428-456.
-
(2004)
ACM Transaction on information and System Security
, vol.7
, Issue.3
, pp. 428-456
-
-
Hess, A.1
Holt, J.2
Jaxobson, J.3
Seamons, K.S.4
-
18
-
-
33947121636
-
-
Lmsal, P., Requirements for modeling trust in ubiquitous computing and Ad Hoc networks. In HUT TML - Course T-110.557 - Publication ISBN 951-22-6309-2 ISSN 1456-7628 TML-C8, Ad Hoc Mobile Wireless Networks - Research Seminar on Telecommunications Software, Autumn 2002. http://www.tml.hut.fi/Studies/T-110. 557/2002/papers/
-
Lmsal, P., Requirements for modeling trust in ubiquitous computing and Ad Hoc networks. In HUT TML - Course T-110.557 - Publication ISBN 951-22-6309-2 ISSN 1456-7628 TML-C8, Ad Hoc Mobile Wireless Networks - Research Seminar on Telecommunications Software, Autumn 2002. http://www.tml.hut.fi/Studies/T-110. 557/2002/papers/
-
-
-
|