-
2
-
-
0029324246
-
Foundations of secure deductive databases
-
P. Bonatti, S. Kraus, and V. S. Subrahmanian. Foundations of secure deductive databases. Knowledge and Data Engineering, 7(3):406-422, 1995.
-
(1995)
Knowledge and Data Engineering
, vol.7
, Issue.3
, pp. 406-422
-
-
Bonatti, P.1
Kraus, S.2
Subrahmanian, V.S.3
-
6
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, May
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 2-14. IEEE Computer Society Press, May 2000.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
7
-
-
85180810679
-
Advanced client/server authentication in TLS
-
Feb.
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in TLS. In Network and Distributed System Security Symposium, pages 203-214, Feb. 2002.
-
(2002)
Network and Distributed System Security Symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
10
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Feb.
-
N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC), 6(1):128-171, Feb. 2003.
-
(2003)
ACM Transaction on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
12
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Feb.
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
Springer-Verlag, Apr.
-
K. E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Jarvis. Protecting privacy during on-line trust negotiation. In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, Apr. 2002.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
21
-
-
3543092307
-
Safety in automated trust negotiation
-
Center for Secure Information Systems, George Mason University, Mar.
-
W. H. Winsborough and N. Li. Safety in automated trust negotiation. Technical Report CSIS-TR-1-04, Center for Secure Information Systems, George Mason University, Mar. 2004.
-
(2004)
Technical Report
, vol.CSIS-TR-1-04
-
-
Winsborough, W.H.1
Li, N.2
-
22
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, Jan.
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88-102. IEEE Press, Jan. 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
23
-
-
0036871183
-
Negotiating trust on the web
-
November/December
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, 6(6):30-37, November/December 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
26
-
-
0038148412
-
Unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society Press, May
-
T. Yu and M. Winslett. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122. IEEE Computer Society Press, May 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
27
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Feb.
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, Feb. 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|