-
2
-
-
3142676730
-
Trust-x: A Peer-to-Peer Framework for Trust Establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-x: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng., 16(7):827-842, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
3
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv., 34(3):375-408, 2002.
-
(2002)
ACM Comput. Surv
, vol.34
, Issue.3
, pp. 375-408
-
-
Elnozahy, E.N.1
Alvisi, L.2
Wang, Y.-M.3
Johnson, D.B.4
-
4
-
-
9144223280
-
Checkpointing for peta-scale systems: A look into the future of practical rollback-recovery
-
E. N. Elnozahy and J. S. Plank. Checkpointing for peta-scale systems: A look into the future of practical rollback-recovery. IEEE Trans. Dependable Sec. Comput., 1(2):97-108, 2004.
-
(2004)
IEEE Trans. Dependable Sec. Comput
, vol.1
, Issue.2
, pp. 97-108
-
-
Elnozahy, E.N.1
Plank, J.S.2
-
6
-
-
85180810679
-
Advanced client/server authentication in tls
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in tls. In NDSS, 2002.
-
(2002)
NDSS
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
7
-
-
1642394295
-
Hidden Credentials
-
New York, NY, USA, ACM Press
-
J. E. Holt, R. W. Bradshaw, K. E. Seamons, and H. Orinan. Hidden Credentials. In WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society, pages 1-8, New York, NY, USA, 2003. ACM Press.
-
(2003)
WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orinan, H.4
-
9
-
-
84969346266
-
A certified digital signature
-
New York, NY, USA, Springer-Verlag New York, Inc
-
R. C. Merkle. A certified digital signature. In CRYPTO '89: Proceedings on Advances in cryptology, pages 218-238, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
-
(1989)
CRYPTO '89: Proceedings on Advances in cryptology
, pp. 218-238
-
-
Merkle, R.C.1
-
10
-
-
11344261340
-
Approaches to fault-tolerant and transactional mobile agent execution-an algorithmic view
-
S. Pleisch and A. Schiper. Approaches to fault-tolerant and transactional mobile agent execution-an algorithmic view. ACM Comput. Surv., 36(3):219-262, 2004.
-
(2004)
ACM Comput. Surv
, vol.36
, Issue.3
, pp. 219-262
-
-
Pleisch, S.1
Schiper, A.2
-
11
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In NDSS, 2001.
-
(2001)
NDSS
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
12
-
-
34848881183
-
Supporting robust and secure interactions in open domains through recovery of trust negotiations
-
A. C. Squicciarini, A. Trombetta, and E. Bertino. Supporting robust and secure interactions in open domains through recovery of trust negotiations. CERIAS Technical Report.
-
CERIAS Technical Report
-
-
Squicciarini, A.C.1
Trombetta, A.2
Bertino, E.3
-
14
-
-
0034449542
-
Prunes: An efficient and complete strategy for automated trust negotiation over the internet
-
T. Yu, X. Ma, and M. Winslett. Prunes: an efficient and complete strategy for automated trust negotiation over the internet. In ACM Conference on Computer and Communications Security, pages 210-219, 2000.
-
(2000)
ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
15
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In IEEE Symposium on Security and Privacy, pages 110-122, 2003.
-
(2003)
IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
|