-
1
-
-
38149004731
-
Trust management
-
Springer
-
C. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Trust management. In Security, Privacy and Trust in Modern Data Management. Springer, 2006.
-
(2006)
Security, Privacy and Trust in Modern Data Management
-
-
Ardagna, C.1
Damiani, E.2
De Capitani di Vimercati, S.3
Foresti, S.4
Samarati, P.5
-
2
-
-
0004078695
-
-
2704 edition
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust Management System (Version 2), internet rfc 2704 edition, 1999.
-
(1999)
The KeyNote Trust Management System (Version 2), internet rfc
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
3
-
-
0002923966
-
Decentralized trust management
-
Oakland, California, USA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proc. of the 17th Symposium on Security and Privacy, Oakland, California, USA, May 1996.
-
(1996)
Proc. of the 17th Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. Journal of Computer Security, 10(3):241-272, 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
5
-
-
0001843009
-
REFEREE: Trust management for web applications
-
Y. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for web applications. The World Wide Web Journal, 2(3):127-139, 1997.
-
(1997)
The World Wide Web Journal
, vol.2
, Issue.3
, pp. 127-139
-
-
Chu, Y.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
6
-
-
34748890804
-
Database language SQL - part 2: Foundation (SQL/foundation). ISO International Standard
-
Database language SQL - part 2: Foundation (SQL/foundation). ISO International Standard, ISO/IEC 9075:1999, 1999.
-
(1999)
ISO/IEC
, vol.9075
, pp. 1999
-
-
-
8
-
-
0003593599
-
-
RFC2693, September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. RFC2693, September 1999.
-
(1999)
SPKI certificate theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0003900673
-
-
rfc 2459 edition, January
-
R. Housley, W. Ford, W. Polk, and D. Solo. Internet X. 509 Public Key Infrastructure Certificate and CRL Profile, rfc 2459 edition, January 1999. http://www.ietf.org/rfc/rfc2459.txt.
-
(1999)
Internet X. 509 Public Key Infrastructure Certificate and CRL Profile
-
-
Housley, R.1
Ford, W.2
Polk, W.3
Solo, D.4
-
10
-
-
33745772562
-
Preventing attribute information leakage in automated trust negotiation
-
Alexandria, VA, USA, Nov
-
K. Irwin and T. Yu. Preventing attribute information leakage in automated trust negotiation. In Proc. of the 12th ACM CCS, Alexandria, VA, USA, Nov. 2005.
-
(2005)
Proc. of the 12th ACM CCS
-
-
Irwin, K.1
Yu, T.2
-
11
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
May
-
N. Li, J. Mitchell, and W. Winsborough. Beyond proof-of-compliance: Security analysis in trust management. Journal of the ACM, 52(3):474-514, May 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
12
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
13
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Alexandria, VA, USA, Nov
-
J. Ni, N. Li, and W. Winsborough. Automated trust negotiation using cryptographic credentials. In Proc. of the 12th ACM CCS, Alexandria, VA, USA, Nov. 2005.
-
(2005)
Proc. of the 12th ACM CCS
-
-
Ni, J.1
Li, N.2
Winsborough, W.3
-
14
-
-
84964853055
-
-
P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
-
P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001.
-
-
-
-
15
-
-
20444479906
-
A logic-based framework for attribute based access control
-
Washington DC, USA, October
-
L. Wang, D. Wijesekera, and S. Jajodia. A logic-based framework for attribute based access control. In Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering, Washington DC, USA, October 2004.
-
(2004)
Proc. of the 2004 ACM Workshop on Formal Methods in Security Engineering
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
16
-
-
34748868711
-
An attribute graph based approach to map local access control policies to credential based access control policies
-
Kolkata, India, December
-
J. Warner, V. Atluri, and R. Mukkamala. An attribute graph based approach to map local access control policies to credential based access control policies. In Proc. of the International Conference on Information Systems Security (ICISS 2005), Kolkata, India, December 2005.
-
(2005)
Proc. of the International Conference on Information Systems Security (ICISS 2005)
-
-
Warner, J.1
Atluri, V.2
Mukkamala, R.3
-
18
-
-
84954418287
-
A unified scheme for resource protection in automated trust negotiation
-
Oakland, CA, USA, May
-
T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003.
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
19
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1):1-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|