-
1
-
-
0344927756
-
Implementing P3P using database technology
-
Bangalore, India
-
AGRAWAL, R., KIERNAN, J., SRIKANT, R., AND XU, Y. 2003. Implementing P3P using database technology. 19th International Conference on Data Engineering. Bangalore, India.
-
(2003)
19th International Conference on Data Engineering
-
-
AGRAWAL, R.1
KIERNAN, J.2
SRIKANT, R.3
XU, Y.4
-
2
-
-
84884500670
-
X-TNL-an XML based language for trust negotiations
-
Como, Italy
-
BERTINO, E., FERRARI, E., AND SQUICCIARINI, A. 2003. X-TNL-an XML based language for trust negotiations. Fourth IEEE International Workshop on Policies for Distributed Systems and Networks. Como, Italy.
-
(2003)
Fourth IEEE International Workshop on Policies for Distributed Systems and Networks
-
-
BERTINO, E.1
FERRARI, E.2
SQUICCIARINI, A.3
-
3
-
-
38149057145
-
Privacy preserving trust negotiations
-
Toronto, Canada
-
BERTINO, E., FERRARI, E., AND SQUICCIARINI, A. 2004a. Privacy preserving trust negotiations. 4th International Workshop on Privacy Enhancing Technologies. Toronto, Canada.
-
(2004)
4th International Workshop on Privacy Enhancing Technologies
-
-
BERTINO, E.1
FERRARI, E.2
SQUICCIARINI, A.3
-
4
-
-
3142676730
-
Trust-X - a Peer to Peer Framework for Trust Establishment
-
BERTINO, E., FERRARI, E., AND SQUICCIARINI, A. 2004b. Trust-X - a Peer to Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng. 16, 7, 827-842.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
BERTINO, E.1
FERRARI, E.2
SQUICCIARINI, A.3
-
6
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
ACM Press, New York
-
BRADSHAW, R., HOLT, J. E., AND SEAMONS, K. E. 2004. Concealing complex policies with hidden credentials. In CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security. ACM Press, New York. 146-157.
-
(2004)
CCS '04: Proceedings of the 11th ACM Conference on Computer and Communications Security
, pp. 146-157
-
-
BRADSHAW, R.1
HOLT, J.E.2
SEAMONS, K.E.3
-
9
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
CHAUM, D. 1985. Security without identification: transaction systems to make big brother obsolete. Commununications of ACM 28, 10, 1030-1044.
-
(1985)
Commununications of ACM 28
, vol.10
, pp. 1030-1044
-
-
CHAUM, D.1
-
10
-
-
84858099530
-
-
CLARK, J. 1999. XSL transformations XSLT, version 1.0 W3C recommendation. Available at
-
CLARK, J. 1999. XSL transformations (XSLT). version 1.0 W3C recommendation. Available at: http://www.w3.org/TR/xslt.
-
-
-
-
11
-
-
34547507451
-
-
CRANOR, L., LANGHERINRIGH, M., AND MARCHIORI, M. 2002. A P3P preference exchange language 1.0 (APPEL1.0). W3C Working Draft.
-
CRANOR, L., LANGHERINRIGH, M., AND MARCHIORI, M. 2002. A P3P preference exchange language 1.0 (APPEL1.0). W3C Working Draft.
-
-
-
-
12
-
-
84858085247
-
-
CRANOR, L, LANGHERINRIGH, M, MARCHIORI, M, PRESLER-MARSALL, M, AND REAGLE, J. 2003. P3P-the platform for privacy preferences, version 1.1. Available at
-
CRANOR, L., LANGHERINRIGH, M., MARCHIORI, M., PRESLER-MARSALL, M., AND REAGLE, J. 2003. P3P-the platform for privacy preferences, version 1.1. Available at: http://www.w3.org/P3P/1.1/.
-
-
-
-
13
-
-
34547501237
-
-
HERZBERG, A. AND J. MIHAELI, E. A. 2000. Access control meets public key infrastructure, or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy. Oakland, CA.
-
HERZBERG, A. AND J. MIHAELI, E. A. 2000. Access control meets public key infrastructure, or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy. Oakland, CA.
-
-
-
-
14
-
-
34547496110
-
-
HOUSLEY, R., POLK, W., FORD, W., AND SO, D. 2002. Internet X.509 public key infrastructure certificate and certificate revocation List (crl) profile. RFC 3280.
-
HOUSLEY, R., POLK, W., FORD, W., AND SO, D. 2002. Internet X.509 public key infrastructure certificate and certificate revocation List (crl) profile. RFC 3280.
-
-
-
-
15
-
-
0345673941
-
-
IBM, Available at
-
IBM. IBM Tivoli privacy wizard. Available at: www.tivoli.resource-center/ maximize/privacy/wizard.code.html.
-
IBM Tivoli privacy wizard
-
-
-
17
-
-
84858099118
-
-
JRC, centre. Available at
-
JRC. 2002. JRC P3Presource centre. Available at: http://p3p.jrc.it.
-
(2002)
JRC P3Presource
-
-
-
18
-
-
33748089681
-
Traust: A trust negotiation-based authorization service for open systems
-
ACM Press, New York
-
LEE, A. J., WINSLETT, M., BASNEY, J., AND WELCH, V. 2006. Traust: A trust negotiation-based authorization service for open systems. In SACMAT '06: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies. ACM Press, New York. 39-48.
-
(2006)
SACMAT '06: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies
, pp. 39-48
-
-
LEE, A.J.1
WINSLETT, M.2
BASNEY, J.3
WELCH, V.4
-
20
-
-
34547547548
-
-
MICROSOFT. 2004. Infocard project. Available at http://msdn.microsoft.com/winf x/ref erence/infocard/default.aspx.
-
MICROSOFT. 2004. Infocard project. Available at http://msdn.microsoft.com/winf x/ref erence/infocard/default.aspx.
-
-
-
-
21
-
-
79551478054
-
Bit commitment using pseudorandomness
-
Advances in Cryptology- 89, New York
-
NAOR, M. 1990. Bit commitment using pseudorandomness. Advances in Cryptology- 89. Lecture Notes in Computer Science, vol. 435, New York.
-
(1990)
Lecture Notes in Computer Science
, vol.435
-
-
NAOR, M.1
-
23
-
-
85056545124
-
Limiting the disclosure of Access Control Policies during automated trust negotiation
-
San Diego, CA
-
SEAMONS, K. E., WINSLETT, M., AND YU, T. 2001. Limiting the disclosure of Access Control Policies during automated trust negotiation. Network and Distributed System Security Simposium. San Diego, CA.
-
(2001)
Network and Distributed System Security Simposium
-
-
SEAMONS, K.E.1
WINSLETT, M.2
YU, T.3
-
24
-
-
0037669985
-
Protecting privacy during on line trust negotiation
-
San Francisco, CA
-
SEAMONS, K. E., WINSLETT, M., AND YU, T. 2002. Protecting privacy during on line trust negotiation. 2nd Workshop on Privacy Enhancing Technologies. San Francisco, CA.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
SEAMONS, K.E.1
WINSLETT, M.2
YU, T.3
-
28
-
-
84939548725
-
Automated trust negotiation
-
WINSBOROUGH, W. H., SEAMONS, K. E., AND JONES, V. 2000. Automated trust negotiation. DAAPA Information Survivability Conference and Exposition, Vol. I, 88-102.
-
(2000)
DAAPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
WINSBOROUGH, W.H.1
SEAMONS, K.E.2
JONES, V.3
-
29
-
-
0036871183
-
Negotiating trust on the Web
-
WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JARVIS, J., SMITH, B., AND YU, L. 2002. Negotiating trust on the Web. IEEE Internet Computing, 6, 6, 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
WINSLETT, M.1
YU, T.2
SEAMONS, K.E.3
HESS, A.4
JARVIS, J.5
SMITH, B.6
YU, L.7
-
30
-
-
84858098984
-
-
WORLD WIDE WEB CONSORTIUM, Available at
-
WORLD WIDE WEB CONSORTIUM. References for P3P implementation. Available at: http://www.w3org/P3P/implementations.
-
References for P3P implementation
-
-
-
32
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
Oakland, CA
-
YU, T. AND WINSLETT, M. 2003. A unified scheme for resource protection in automated trust negotiation. IEEE Symposium on Security and Privacy, 110. Oakland, CA.
-
(2003)
IEEE Symposium on Security and Privacy
, vol.110
-
-
YU, T.1
WINSLETT, M.2
-
33
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Feb
-
YU, T., WINSLETT, M., AND SEAMONS, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6, 1 (Feb.).
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, pp. 1
-
-
YU, T.1
WINSLETT, M.2
SEAMONS, K.E.3
|