-
1
-
-
38149099816
-
-
Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)
-
Apt, K.R.: From Logic Programming to Prolog. Prentice-Hall, Englewood Cliffs (1997)
-
-
-
-
2
-
-
84957810442
-
Verification of Logic Programs with Delay Declarations
-
Alagar, V.S, Nivat, M, eds, AMAST 1995, Springer, Heidelberg
-
Apt, K.R., Luitjes, I.: Verification of Logic Programs with Delay Declarations. In: Alagar, V.S., Nivat, M. (eds.) AMAST 1995. LNCS, vol. 936, pp. 66-90. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.936
, pp. 66-90
-
-
Apt, K.R.1
Luitjes, I.2
-
3
-
-
0001588190
-
Reasoning about Prolog programs: From Modes through Types to Assertions
-
Apt, K.R., Marchiori, E.: Reasoning about Prolog programs: from Modes through Types to Assertions. Formal Aspects of Computing 6(6A), 743-765 (1994)
-
(1994)
Formal Aspects of Computing 6(6A)
, pp. 743-765
-
-
Apt, K.R.1
Marchiori, E.2
-
4
-
-
3142676730
-
Peer-to-Peer Framework for Trust Establishment
-
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-χ: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827-842 (2004)
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
Trust-χ, A.4
-
5
-
-
38149138594
-
-
Blaze, M, Feigenbaum, J, Ioannidis, J, Keromytis, A, The KeyNote Trust-Management System, Version 2. IETF RFC 2704 September 1999
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust-Management System, Version 2. IETF RFC 2704 (September 1999)
-
-
-
-
6
-
-
84982899264
-
The Role of Trust Management in Distributed Systems Security
-
Vitek, J, Jensen, C, eds, Secure Internet Programming, Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The Role of Trust Management in Distributed Systems Security. In: Vitek, J., Jensen, C. (eds.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
7
-
-
0029700344
-
Decentralized Trust Management
-
IEEE Computer Society Press, Los Alamitos
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the 17th IEEE Symposium on Security and Privacy, pp. 164-173. IEEE Computer Society Press, Los Alamitos (1996)
-
(1996)
Proc. of the 17th IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
0035680371
-
Certificate Chain Discovery in SPKI/SDSI
-
Clarke, D., Elien, J.E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate Chain Discovery in SPKI/SDSI. Journal of Computer Security 9(4), 285-322 (2001)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
9
-
-
38149051318
-
-
Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)
-
Czenko, M.R., Etalle, S.: Core TuLiP. Technical Report TR-CTIT-07-22, Centre for Telematics and Information Technology. University of Twente, Enschede (March 2007)
-
-
-
-
10
-
-
0003593599
-
-
IETF RFC 2693 September
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (September 1999)
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
11
-
-
30644480441
-
-
Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management - Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1-10. ACM Press, New York (2005), Extended version available at CoRR:http://arxiv.org/abs/cs.CR/0503061
-
Etalle, S., Winsborough, W.H.: Integrity Constraints in Trust Management - Extended Abstract. In: Ahn, G-J. (ed.) Proc. 10th ACM Symp. on Access Control Models and Technologies (SACMAT), pp. 1-10. ACM Press, New York (2005), Extended version available at CoRR:http://arxiv.org/abs/cs.CR/0503061
-
-
-
-
12
-
-
38149047356
-
-
Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http://www.freeband.nl/project.cfm?language=en\&id=520
-
Freeband Communication. I-Share: Sharing Resources in Virtual Communities for Storage, Communications, and Processing of Multimedia Data. URL: http://www.freeband.nl/project.cfm?language=en\&id=520
-
-
-
-
13
-
-
0034829512
-
SD3: A Trust Management System with Certified Evaluation
-
IEEE Computer Society Press, Los Alamitos
-
Jim, T.: SD3: A Trust Management System with Certified Evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106-115. IEEE Computer Society Press, Los Alamitos (2001)
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
14
-
-
0041524661
-
Delegation Logic: A Logic-based Approach to Distributed Authorization
-
Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security (TISSEC) 6(1), 128-171(2003)
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
15
-
-
84948440714
-
-
Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press, Los Alamitos (2002)
-
Li, N., Mitchell, J., Winsborough, W.: Design of A Role-based Trust-management Framework. In: Proc. 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press, Los Alamitos (2002)
-
-
-
-
16
-
-
0037243196
-
Distributed Credential Chain Discovery in Trust Management
-
Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security 11(1), 35-86 (2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
18
-
-
33646551446
-
Nonmonotonic Trust Management for P2P Applications
-
Proc. of the 1st International Workshop on Security and Trust Management, Elsevier, Amsterdam
-
Czenko, M., Tran, H., Doumen, J., Etalle, S., Hartel, P., den Hartog, J.: Nonmonotonic Trust Management for P2P Applications. In: Proc. of the 1st International Workshop on Security and Trust Management. Electronic Notes in Theoretical Computer Science, vol. 157, pp. 113-130. Elsevier, Amsterdam (2006)
-
(2006)
Electronic Notes in Theoretical Computer Science
, vol.157
, pp. 113-130
-
-
Czenko, M.1
Tran, H.2
Doumen, J.3
Etalle, S.4
Hartel, P.5
den Hartog, J.6
-
19
-
-
38149128673
-
-
OASIS, eXtensible Access Control Markup Language (XACML) Version 2.0 February 2005, URL
-
OASIS.: eXtensible Access Control Markup Language (XACML) Version 2.0 (February 2005), URL: http: //www.oasis.org
-
-
-
-
20
-
-
38149093878
-
-
Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http: //theory.lcs.mit.edu/ ∼rivest/sdsill.html
-
Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure (October 1996), Available at http: //theory.lcs.mit.edu/ ∼rivest/sdsill.html
-
-
-
-
21
-
-
84893110297
-
Towards Practical Automated Trust Negotiation. In: POLICY
-
Los Alamitos
-
Winsborough, W.H., Li, N.: Towards Practical Automated Trust Negotiation. In: POLICY, pp. 92-103. IEEE Computer Society Press, Los Alamitos (2002)
-
(2002)
IEEE Computer Society Press
, pp. 92-103
-
-
Winsborough, W.H.1
Li, N.2
|