-
1
-
-
0041089975
-
On hiding information from an oracle
-
Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. Journal of Computer and System Sciences 39(1), 21-50 (1989)
-
(1989)
Journal of Computer and System Sciences
, vol.39
, Issue.1
, pp. 21-50
-
-
Abadi, M.1
Feigenbaum, J.2
Kilian, J.3
-
2
-
-
84937395634
-
A database encryption scheme which allows the computation of statistics using encrypted data
-
Los Angeles, Ca, USA, April, IEEE Computer Society Press, Los Alamito
-
Blakley, G.R., Meadows, C.: A database encryption scheme which allows the computation of statistics using encrypted data. In: SSP '85. Proceedings of the 1985 Symposium on Security and Privacy, Los Angeles, Ca., USA, April 1990, pp. 116-122. IEEE Computer Society Press, Los Alamito (1990)
-
(1990)
SSP '85. Proceedings of the 1985 Symposium on Security and Privacy
, pp. 116-122
-
-
Blakley, G.R.1
Meadows, C.2
-
3
-
-
38049177055
-
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust management system. Internet Request for Comment RFC 2704, Internet Engineering Task Force, Version 2 (September 1999)
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust management system. Internet Request for Comment RFC 2704, Internet Engineering Task Force, Version 2 (September 1999)
-
-
-
-
4
-
-
84982899264
-
The role of trust management in distributed systems security
-
Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
5
-
-
0029700344
-
Decentralized trust management
-
Oakland, CA, May, IEEE Computer Society Press, Los Alamitos
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Computer Society, Technical Committee on Security and Privacy. Proceedings of the IEEE Symposium on Research in Security and Privacy, Oakland, CA, May 1996, IEEE Computer Society Press, Los Alamitos (1996)
-
(1996)
IEEE Computer Society, Technical Committee on Security and Privacy. Proceedings of the IEEE Symposium on Research in Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill, V., Gray, E., Seigneur, C.J.J.-M., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nicon, P., di Marzo Serugendo, G., Bryce, C., Carbone, M., Krukow, K., Nielsen, M.: Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing 2(3), 52-61 (2003)
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, C.J.J.-M.3
Chen, Y.4
Shand, B.5
Dimmock, N.6
Twigg, A.7
Bacon, J.8
English, C.9
Wagealla, W.10
Terzis, S.11
Nicon, P.12
di Marzo Serugendo, G.13
Bryce, C.14
Carbone, M.15
Krukow, K.16
Nielsen, M.17
-
7
-
-
0001470602
-
REFEREE: Trust management for web applications
-
Chu, Y.-H., Feigenbaum, J., LaMacchia, B.A., Resnick, P., Strauss, M.: REFEREE: Trust management for web applications. Computer Networks 29(8-13), 953-964 (1997)
-
(1997)
Computer Networks
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.A.3
Resnick, P.4
Strauss, M.5
-
11
-
-
0035577649
-
Communications - trust-based security in pervasive computing environments
-
Kagal, L., Finin, T.W., Joshi, A.: Communications - trust-based security in pervasive computing environments. IEEE Computer 34(12), 154-157 (2001)
-
(2001)
IEEE Computer
, vol.34
, Issue.12
, pp. 154-157
-
-
Kagal, L.1
Finin, T.W.2
Joshi, A.3
-
12
-
-
84947294004
-
Modelling a public-key infrastructure
-
Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, Computer Security, ESORICS, 1146, Springer, Heidelberg
-
Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.96
-
-
Maurer, U.1
-
13
-
-
0032646625
-
-
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL, pp. 228-241 (1999)
-
Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL, pp. 228-241 (1999)
-
-
-
-
16
-
-
0033705124
-
Practical techniques for searches on encrypted data
-
Song, D.X., Wagner, D., Perrig, A.: Practical techniques for searches on encrypted data. In: IEEE Symposium on Security and Privacy, pp. 44-55 (2000)
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 44-55
-
-
Song, D.X.1
Wagner, D.2
Perrig, A.3
-
17
-
-
38049168776
-
Automated trust negotiation. Technical Report TR-2000-05, Department of Computer Science, North Carolina State University, April 24 2000
-
GMT, 24 April
-
Winsborough, W., Seamons, K., Jones, V.: Automated trust negotiation. Technical Report TR-2000-05, Department of Computer Science, North Carolina State University, April 24 2000. Monday, 24 April 2000 17:07:47 GMT
-
(2000)
Monday
, vol.17
, Issue.7
, pp. 47
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
18
-
-
0036871183
-
The trustbuilder architecture for trust negotiation
-
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: The trustbuilder architecture for trust negotiation. IEEE Internet Computing 6(6), 30-37 (2002)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
19
-
-
0036036793
-
Untrusted hosts and confidentiality: Secure program partitioning
-
Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.: Untrusted hosts and confidentiality: Secure program partitioning. In: Symposium on Operating Systems Principles, pp. 1-14 (2001)
-
(2001)
Symposium on Operating Systems Principles
, pp. 1-14
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.4
-
20
-
-
0037974191
-
Secure program partitioning
-
Zdancewic, S., Zheng, L., Nystrom, N., Myers, A.C.: Secure program partitioning. ACM Transactions on Computer Systems 20(3), 283-328 (2002)
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.3
, pp. 283-328
-
-
Zdancewic, S.1
Zheng, L.2
Nystrom, N.3
Myers, A.C.4
|