-
2
-
-
0344146600
-
Making Components Contract Aware
-
Beugnard, A., Jézéquel, J.M., Plouzeau, N., Watkins, D.: Making Components Contract Aware. IEEE Computer 32 (1999) 38-45
-
(1999)
IEEE Computer
, vol.32
, pp. 38-45
-
-
Beugnard, A.1
Jézéquel, J.M.2
Plouzeau, N.3
Watkins, D.4
-
3
-
-
35248888647
-
-
Sun Microsystems: Java Beans Specification. Available via WWW: java.sun.com /beans/docs/spec.html (1998)
-
(1998)
Java Beans Specification
-
-
-
4
-
-
35248884523
-
-
Technical Report #00-28, University of California, Irvine, Department of Information and Computer Science
-
Lüer, C., Rosenblum, D.S.: WREN - An Environment for Component-Based Development. Technical Report #00-28, University of California, Irvine, Department of Information and Computer Science (2000)
-
(2000)
WREN - An Environment for Component-Based Development
-
-
Lüer, C.1
Rosenblum, D.S.2
-
6
-
-
0344416225
-
-
Microsoft
-
Microsoft: The Microsoft COM Technologies. Available via WWW: http://www. microsoft.com/com/comPapers.asp (1998)
-
(1998)
The Microsoft COM Technologies
-
-
-
8
-
-
0032097883
-
A Map of Security Risks Associated with Using COTS
-
Lindqvist, U., Jonsson, E.: A Map of Security Risks Associated with Using COTS. IEEE Computer 31 (1998) 60-66
-
(1998)
IEEE Computer
, vol.31
, pp. 60-66
-
-
Lindqvist, U.1
Jonsson, E.2
-
10
-
-
0034872904
-
Trust-adapted enforcement of security policies in distributed component-structured applications
-
Hammamet, IEEE Computer Society Press
-
Herrmann, P., Krumm, H.: Trust-adapted enforcement of security policies in distributed component-structured applications. In: Proceedings of the 6th IEEE Symposium on Computers and Communications, Hammamet, IEEE Computer Society Press (2001) 2-8
-
(2001)
Proceedings of the 6th IEEE Symposium on Computers and Communications
, pp. 2-8
-
-
Herrmann, P.1
Krumm, H.2
-
11
-
-
84904244303
-
State-Based Security Policy Enforcement in Component-Based E-Commerce Applications
-
E-Business & E-Government (I3E), Lisbon, Kluwer Academic Publisher
-
Herrmann, P., Wiebusch, L., Krumm, H.: State-Based Security Policy Enforcement in Component-Based E-Commerce Applications. In: Proceedings of the 2nd IFIP Conference on E-Commerce, E-Business & E-Government (I3E), Lisbon, Kluwer Academic Publisher (2002) 195-209
-
(2002)
Proceedings of the 2nd IFIP Conference on E-Commerce
, pp. 195-209
-
-
Herrmann, P.1
Wiebusch, L.2
Krumm, H.3
-
12
-
-
0032641892
-
Hardening COTS Software with Generic Software Wrappers
-
IEEE Computer Society Press
-
Fraser, T., Badger, L., Feldman, M.: Hardening COTS Software with Generic Software Wrappers. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, IEEE Computer Society Press (1999) 2-16
-
(1999)
Proceedings of the 1999 IEEE Symposium on Security and Privacy
, pp. 2-16
-
-
Fraser, T.1
Badger, L.2
Feldman, M.3
-
15
-
-
85084161255
-
Cryptographic Support for Secure Logs on Untrusted Machines
-
San Antonio, USENIX Press
-
Schneier, B., Kelsey, J.: Cryptographic Support for Secure Logs on Untrusted Machines. In: Proceedings of the 7th USENIX Security Symposium, San Antonio, USENIX Press (1998) 53-62
-
(1998)
Proceedings of the 7th USENIX Security Symposium
, pp. 53-62
-
-
Schneier, B.1
Kelsey, J.2
-
16
-
-
0038223020
-
-
Technical report, Computer Science and Engineering Department, University of California at San Diego
-
Bellare, M., Yee, B.: Forward Integrity for Secure Audit Logs. Technical report, Computer Science and Engineering Department, University of California at San Diego (1997)
-
(1997)
Forward Integrity for Secure Audit Logs
-
-
Bellare, M.1
Yee, B.2
-
18
-
-
0002863367
-
Valuation of Trust in Open Networks
-
Proceedings of the European Symposium on Research in Security (ESORICS). Brighton, Springer-Verlag
-
Beth, T., Borcherding, M., Klein, B.: Valuation of Trust in Open Networks. In: Proceedings of the European Symposium on Research in Security (ESORICS). Lecture Notes in Computer Science 875, Brighton, Springer-Verlag (1994) 3-18
-
(1994)
Lecture Notes in Computer Science
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
19
-
-
84982899264
-
The Role of Trust Management in Distributed Systems Security
-
Vitek, J., Jensen, C., eds.: Springer-Verlag
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The Role of Trust Management in Distributed Systems Security. In Vitek, J., Jensen, C., eds.: Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag (1999) 185-210
-
(1999)
Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
20
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, IEEE
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 17th Symposium on Security and Privacy, Oakland, IEEE (1996) 164-173
-
(1996)
Proceedings of the 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
21
-
-
0001843009
-
REFEREE: Trust Management for Web Applications
-
Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., Strauss, M.: REFEREE: Trust Management for Web Applications. World Wide Web Journal 2 (1997) 127-139
-
(1997)
World Wide Web Journal
, vol.2
, pp. 127-139
-
-
Chu, Y.H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
22
-
-
0004078695
-
-
Report RFC-2704, IETF
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust Management System, Version 2. Report RFC-2704, IETF (1999)
-
(1999)
The KeyNote Trust Management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
24
-
-
35248830154
-
Building Trust for E-Commerce: Collaborating Label Bureaus
-
Kou, W., Yesha, Y., Tan, C.J., eds.: Proceedings of the 2nd International Symposium on Electronic Commerce Technologies (ISEC'2001). Hong Kong, Springer-Verlag
-
Shepherd, M., Dhonde, A., Watters, C.: Building Trust for E-Commerce: Collaborating Label Bureaus. In Kou, W., Yesha, Y., Tan, C.J., eds.: Proceedings of the 2nd International Symposium on Electronic Commerce Technologies (ISEC'2001). LNCS 2040, Hong Kong, Springer-Verlag (2001) 42-56
-
(2001)
LNCS
, vol.2040
, pp. 42-56
-
-
Shepherd, M.1
Dhonde, A.2
Watters, C.3
-
25
-
-
0002101577
-
Reputation Systems: Facilitating Trust in Internet Interactions
-
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems: Facilitating Trust in Internet Interactions. Communications of the ACM 43 (2000) 45-48
-
(2000)
Communications of the ACM
, vol.43
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
26
-
-
35248858024
-
-
eBay Inc.: Feedback Forum. Available via WWW: pages.ebay.com/services/forum /feedback.html (2002)
-
(2002)
Feedback Forum
-
-
-
27
-
-
84936864635
-
Discretionary Enforcement of Electronic Contracts
-
Lausanne
-
Milosevic, Z., Jøsang, A., Dimitrakos, T., Patton, M.A.: Discretionary Enforcement of Electronic Contracts. In: Proceedings of the 6th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2002), Lausanne (2002) 39-50
-
(2002)
Proceedings of the 6th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2002)
, pp. 39-50
-
-
Milosevic, Z.1
Jøsang, A.2
Dimitrakos, T.3
Patton, M.A.4
-
28
-
-
84871044906
-
Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior
-
ACM Press
-
Dellarocas, C.: Immunizing Online Reputation Reporting Systems Against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce (EC'00), ACM Press (2000) 150-157
-
(2000)
Proceedings of the 2nd ACM Conference on Electronic Commerce (EC'00)
, pp. 150-157
-
-
Dellarocas, C.1
|