-
2
-
-
84882734978
-
-
Antoniou, G., Baldoni, M., Bonatti, P.A., Nejdl, W., Olmedilla, D.: Rule-based policy specification. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, 33, Springer, Heidelberg (2007)
-
Antoniou, G., Baldoni, M., Bonatti, P.A., Nejdl, W., Olmedilla, D.: Rule-based policy specification. In: Yu, T., Jajodia, S. (eds.) Secure Data Management in Decentralized Systems. Advances in Information Security, vol. 33, Springer, Heidelberg (2007)
-
-
-
-
3
-
-
84957800809
-
Keynote: Trust management for public-key infrastructures (position paper)
-
Christianson, B, Crispo, B, Harbison, W.S, Roe, M, eds, Security Protocols, Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: Trust management for public-key infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols. LNCS, vol. 1550, pp. 59-63. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
4
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
Hirschfeld, R, ed, FC, Springer, Heidelberg
-
Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the policymaker trust management system. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol. 1465, pp. 254-274. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
5
-
-
37149051976
-
-
Uszok, A., Bradshaw, J.M., Jeffers, R., Suri, N., Hayes, P.J., Breedy, M.R., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY, p. 93 (2003)
-
Uszok, A., Bradshaw, J.M., Jeffers, R., Suri, N., Hayes, P.J., Breedy, M.R., Bunch, L., Johnson, M., Kulkarni, S., Lott, J.: KAoS policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In: POLICY, p. 93 (2003)
-
-
-
-
6
-
-
0242276201
-
-
Kagal, L., Finin, T.W., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, 2870, pp. 402-418. Springer, Heidelberg (2003)
-
Kagal, L., Finin, T.W., Joshi, A.: A policy based approach to security for the semantic web. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 402-418. Springer, Heidelberg (2003)
-
-
-
-
7
-
-
34547260252
-
-
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, 3053, pp. 342-356. Springer, Heidelberg (2004)
-
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K.E., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: Bussler, C.J., Davies, J., Fensel, D., Studer, R. (eds.) ESWS 2004. LNCS, vol. 3053, pp. 342-356. Springer, Heidelberg (2004)
-
-
-
-
8
-
-
33745004626
-
Driving and monitoring provisional trust negotiation with metapolicies
-
Stockholm, Sweden, pp, IEEE Computer Society Press, Los Alamitos
-
Bonatti, P.A., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, pp. 14-23. IEEE Computer Society Press, Los Alamitos (2005)
-
(2005)
6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY
, pp. 14-23
-
-
Bonatti, P.A.1
Olmedilla, D.2
-
9
-
-
0242308055
-
Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder
-
Tonti, G., Bradshaw, J.M., Jeffers, R., Montanari, R., Suri, N., Uszok, A.: Semantic web languages for policy representation and reasoning: A comparison of KAoS, Rei, and Ponder. In: International Semantic Web Conference, pp. 419-437 (2003)
-
(2003)
International Semantic Web Conference
, pp. 419-437
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanari, R.4
Suri, N.5
Uszok, A.6
-
10
-
-
4344716019
-
Authorization and privacy for semantic web services
-
Kagal, L., Paolucci, M., Srinivasan, N., Denker, G., Finin, T.W., Sycara, K.P.: Authorization and privacy for semantic web services. IEEE Intelligent Systems 19(4), 50-56 (2004)
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
, pp. 50-56
-
-
Kagal, L.1
Paolucci, M.2
Srinivasan, N.3
Denker, G.4
Finin, T.W.5
Sycara, K.P.6
-
11
-
-
84956868137
-
-
Taveter, K., Wagner, G.: Agent-oriented enterprise modeling based on business rules. In: Kunii, H.S., Jajodia, S., Sølvberg, A. (eds.) ER 2001. LNCS, 2224, pp. 527-540. Springer, Heidelberg (2001)
-
Taveter, K., Wagner, G.: Agent-oriented enterprise modeling based on business rules. In: Kunii, H.S., Jajodia, S., Sølvberg, A. (eds.) ER 2001. LNCS, vol. 2224, pp. 527-540. Springer, Heidelberg (2001)
-
-
-
-
12
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, Los Alamitos
-
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, IEEE Press, Los Alamitos (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
13
-
-
26444492656
-
-
Nejdl, W., Olmedilla, D., Winslett, M., Zhang, C.C.: Ontology-based policy specification and management. In: Gómez-Pérez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, 3532, pp. 290-302. Springer, Heidelberg (2005)
-
Nejdl, W., Olmedilla, D., Winslett, M., Zhang, C.C.: Ontology-based policy specification and management. In: Gómez-Pérez, A., Euzenat, J. (eds.) ESWC 2005. LNCS, vol. 3532, pp. 290-302. Springer, Heidelberg (2005)
-
-
-
-
14
-
-
33746056431
-
-
Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic web policies - a discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, 4011, Springer, Heidelberg (2006)
-
Bonatti, P.A., Duma, C., Fuchs, N., Nejdl, W., Olmedilla, D., Peer, J., Shahmehri, N.: Semantic web policies - a discussion of requirements and research issues. In: Sure, Y., Domingue, J. (eds.) ESWC 2006. LNCS, vol. 4011, Springer, Heidelberg (2006)
-
-
-
-
15
-
-
34249825248
-
Security and privacy on the semantic web
-
Petkovic, M, Jonker, W, eds, Springer, Heidelberg to appear
-
Olmedilla, D.: Security and privacy on the semantic web. In: Petkovic, M., Jonker, W. (eds.) Security, Privacy and Trust in Modern Data Management, Springer, Heidelberg (to appear)
-
Security, Privacy and Trust in Modern Data Management
-
-
Olmedilla, D.1
-
16
-
-
10744225535
-
Representation and reasoning for DAML-based policy and domain services in KAoS and nomads
-
Melbourne, Victoria, Australia
-
Bradshaw, J.M., Uszok, A., Jeffers, R., Suri, N., Hayes, P.J., Burstein, M.H., Acquisti, A., Benyo, B., Breedy, M.R., Carvalho, M.M., Diller, D.J., Johnson, M., Kulkarni, S., Lott, J., Sierhuis, M., von Hoof, R.: Representation and reasoning for DAML-based policy and domain services in KAoS and nomads. In: The Second International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS), Melbourne, Victoria, Australia (2003)
-
(2003)
The Second International Joint Conference on Autonomous Agents & Multiagent Systems (AAMAS)
-
-
Bradshaw, J.M.1
Uszok, A.2
Jeffers, R.3
Suri, N.4
Hayes, P.J.5
Burstein, M.H.6
Acquisti, A.7
Benyo, B.8
Breedy, M.R.9
Carvalho, M.M.10
Diller, D.J.11
Johnson, M.12
Kulkarni, S.13
Lott, J.14
Sierhuis, M.15
von Hoof, R.16
-
18
-
-
0003727420
-
-
Baader, F, Calvanese, D, McGuinness, D.L, Nardi, D, Patel-Schneider, P.F, eds, Cambridge University Press, Cambridge
-
Baader, F., Calvanese, D., McGuinness, D.L., Nardi, D., Patel-Schneider, P.F. (eds.): The Description Logic Handbook: Theory, Implementation, and Applications. Cambridge University Press, Cambridge (2003)
-
(2003)
The Description Logic Handbook: Theory, Implementation, and Applications
-
-
-
21
-
-
62349090353
-
-
Li, N., Mitchell, J.C.: RT: A Role-based Trust-management Framework. In: DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C (2003)
-
Li, N., Mitchell, J.C.: RT: A Role-based Trust-management Framework. In: DARPA Information Survivability Conference and Exposition (DISCEX), Washington, D.C (2003)
-
-
-
-
22
-
-
0034826560
-
Dynamically distributed query evaluation
-
Santa Barbara, CA, USA, ACM, New York
-
Trevor, J., Suciu, D.: Dynamically distributed query evaluation. In: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, Santa Barbara, CA, USA, ACM, New York (2001)
-
(2001)
Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems
-
-
Trevor, J.1
Suciu, D.2
-
23
-
-
33845417664
-
A distributed tabling algorithm for rule based policy systems
-
London, Ontario, Canada, pp, IEEE Computer Society, Los Alamitos
-
Alves, M., Damásio, C.V., Nejdl, W., Olmedilla, D.: A distributed tabling algorithm for rule based policy systems. In: 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), London, Ontario, Canada, pp. 123-132. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY
, pp. 123-132
-
-
Alves, M.1
Damásio, C.V.2
Nejdl, W.3
Olmedilla, D.4
-
24
-
-
84885983134
-
Advanced policy explanations on the web
-
Riva del Garda, Italy, pp, IOS Press, Amsterdam
-
Bonatti, P.A., Olmedilla, D., Peer, J.: Advanced policy explanations on the web. In: 17th European Conference on Artificial Intelligence (ECAI 2006), Riva del Garda, Italy, pp. 200-204. IOS Press, Amsterdam (2006)
-
(2006)
17th European Conference on Artificial Intelligence (ECAI
, pp. 200-204
-
-
Bonatti, P.A.1
Olmedilla, D.2
Peer, J.3
-
25
-
-
33744984819
-
Enhancing web privacy protection through declarative policies
-
Stockholm, Sweden, pp, IEEE Computer Society, Los Alamitos
-
Kolari, P., Ding, L., Ganjugunte, S., Joshi, A., Finin, T.W., Kagal, L.: Enhancing web privacy protection through declarative policies. In: 6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), Stockholm, Sweden, pp. 57-66. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
6th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY
, pp. 57-66
-
-
Kolari, P.1
Ding, L.2
Ganjugunte, S.3
Joshi, A.4
Finin, T.W.5
Kagal, L.6
-
26
-
-
19944433808
-
The pudding of trust
-
Staab, S., Bhargava, B.K., Lilien, L., Rosenthal, A., Winslett, M., Sloman, M., Dillon, T.S., Chang, E., Hussain, F.K., Nejdl, W., Olmedilla, D., Kashyap, V.: The pudding of trust. IEEE Intelligent Systems 19(5), 74-88 (2004)
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.5
, pp. 74-88
-
-
Staab, S.1
Bhargava, B.K.2
Lilien, L.3
Rosenthal, A.4
Winslett, M.5
Sloman, M.6
Dillon, T.S.7
Chang, E.8
Hussain, F.K.9
Nejdl, W.10
Olmedilla, D.11
Kashyap, V.12
-
27
-
-
0242371001
-
-
Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for daml web services: Annotation and matchmaking. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, 2870, pp. 335-350. Springer, Heidelberg (2003)
-
Denker, G., Kagal, L., Finin, T.W., Paolucci, M., Sycara, K.P.: Security for daml web services: Annotation and matchmaking. In: Fensel, D., Sycara, K.P., Mylopoulos, J. (eds.) ISWC 2003. LNCS, vol. 2870, pp. 335-350. Springer, Heidelberg (2003)
-
-
-
-
28
-
-
24144437747
-
Trust negotiation for semantic web services
-
Cardoso, J, Sheth, A.P, eds, SWSWPC 2004, Springer, Heidelberg
-
Olmedilla, D., Lara, R., Polleres, A., Lausen, H.: Trust negotiation for semantic web services. In: Cardoso, J., Sheth, A.P. (eds.) SWSWPC 2004. LNCS, vol. 3387, pp. 81-95. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3387
, pp. 81-95
-
-
Olmedilla, D.1
Lara, R.2
Polleres, A.3
Lausen, H.4
-
30
-
-
35048902599
-
-
Uszok, A., Bradshaw, J.M., Jeffers, R.: Kaos: A policy and domain services framework for grid computing and semantic web services. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, 2995, pp. 16-26. Springer, Heidelberg (2004)
-
Uszok, A., Bradshaw, J.M., Jeffers, R.: Kaos: A policy and domain services framework for grid computing and semantic web services. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 16-26. Springer, Heidelberg (2004)
-
-
-
-
31
-
-
38149102050
-
Policy based dynamic negotiation for grid services authorization
-
Galway, Ireland
-
Constandache, I., Olmedilla, D., Nejdl, W.: Policy based dynamic negotiation for grid services authorization. In: Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland (2005)
-
(2005)
Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference
-
-
Constandache, I.1
Olmedilla, D.2
Nejdl, W.3
-
33
-
-
0001119421
-
The stable model semantics for logic programming
-
MIT Press, Cambridge
-
Gelfond, M., Lifschitz, V.: The stable model semantics for logic programming. In: Proc. of the 5th ICLP, pp. 1070-1080. MIT Press, Cambridge (1988)
-
(1988)
Proc. of the 5th ICLP
, pp. 1070-1080
-
-
Gelfond, M.1
Lifschitz, V.2
-
34
-
-
0032691796
-
A logical framework for reasoning on data access control policies
-
IEEE Computer Society, Los Alamitos
-
Bertino, E., Ferrari, E., Buccafurri, F., Rullo, P.: A logical framework for reasoning on data access control policies. In: Proc. of the 12th IEEE Computer Security Foundations Workshop (CSFW'99), pp. 175-189. IEEE Computer Society, Los Alamitos (1999)
-
(1999)
Proc. of the 12th IEEE Computer Security Foundations Workshop (CSFW'99)
, pp. 175-189
-
-
Bertino, E.1
Ferrari, E.2
Buccafurri, F.3
Rullo, P.4
-
35
-
-
0024663219
-
The Chinese wall security policy
-
IEEE Computer Society Press, Los Alamitos
-
Brewer, D.F.C., Nash, M.J.: The Chinese wall security policy. In: IEEE Symposium on Security and Privacy, pp. 206-214. IEEE Computer Society Press, Los Alamitos (1989)
-
(1989)
IEEE Symposium on Security and Privacy
, pp. 206-214
-
-
Brewer, D.F.C.1
Nash, M.J.2
-
36
-
-
21444439292
-
Polynomial-time computable stable models
-
Palopoli, L., Zaniolo, C.: Polynomial-time computable stable models. Ann. Math. Artif. Intell. 17(3-4), 261-290 (1996)
-
(1996)
Ann. Math. Artif. Intell
, vol.17
, Issue.3-4
, pp. 261-290
-
-
Palopoli, L.1
Zaniolo, C.2
-
38
-
-
0002198395
-
Towards a theory of declarative knowledge
-
Morgan Kaufmann, San Francisco
-
Apt, K.R., Blair, H.A., Walker, A.: Towards a theory of declarative knowledge. In: Foundations of Deductive Databases and Logic Programming, pp. 89-148. Morgan Kaufmann, San Francisco (1988)
-
(1988)
Foundations of Deductive Databases and Logic Programming
, pp. 89-148
-
-
Apt, K.R.1
Blair, H.A.2
Walker, A.3
-
39
-
-
33646036095
-
Rule-based policy specification: State of the art and future work
-
Technical report, Working Group 12, EU NoE REWERSE August
-
Bonatti, P.A., Shahmehri, N., Duma, C., Olmedilla, D., Nejdl, W., Baldoni, M., Baroglio, C., Martelli, A., Patti, V., Coraggio, P., Antoniou, G., Peer, J., Fuchs, N.E.: Rule-based policy specification: State of the art and future work. Technical report, Working Group 12, EU NoE REWERSE (August 2004), http://rewerse.net/deliverables/i2-d1.pdf
-
(2004)
-
-
Bonatti, P.A.1
Shahmehri, N.2
Duma, C.3
Olmedilla, D.4
Nejdl, W.5
Baldoni, M.6
Baroglio, C.7
Martelli, A.8
Patti, V.9
Coraggio, P.10
Antoniou, G.11
Peer, J.12
Fuchs, N.E.13
-
40
-
-
0003496922
-
-
Subrahmanian, V.S., Adali, S., Brink, A., Emery, R., Lu, J.J., Rajput, A., Rogers, T.J., Ross, R., Ward, C.: Hermes: Heterogeneous reasoning and mediator system, http://www.cs.umd.edu/projects/publications/abstracts/hermes. html
-
Hermes: Heterogeneous reasoning and mediator system
-
-
Subrahmanian, V.S.1
Adali, S.2
Brink, A.3
Emery, R.4
Lu, J.J.5
Rajput, A.6
Rogers, T.J.7
Ross, R.8
Ward, C.9
-
41
-
-
0003910404
-
-
MIT Press, Cambridge
-
Subrahmanian, V.S., Bonatti, P.A., Dix, J., Eiter, T., Kraus, S., Ozean, F., Ross, R.: Heterogenous Active Agents. MIT Press, Cambridge (2000)
-
(2000)
Heterogenous Active Agents
-
-
Subrahmanian, V.S.1
Bonatti, P.A.2
Dix, J.3
Eiter, T.4
Kraus, S.5
Ozean, F.6
Ross, R.7
-
42
-
-
3142702937
-
Security of shared data in large systems: State of the art and research directions
-
Paris, France, June 13-18, ACM, New York
-
Rosenthal, A., Winslett, M.: Security of shared data in large systems: State of the art and research directions. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Paris, France, June 13-18, 2004, pp. 962-964. ACM, New York (2004)
-
(2004)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 962-964
-
-
Rosenthal, A.1
Winslett, M.2
-
43
-
-
34249798492
-
An integration of reputation-based and policy-based trust management
-
Ireland
-
Bonatti, P.A., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Ireland (2005)
-
(2005)
Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference
-
-
Bonatti, P.A.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
44
-
-
0001071507
-
Compliance Checking in the PolicyMaker Trust Management System
-
West Indies February
-
Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust Management System. In: Financial Cryptography, British West Indies (February 1998)
-
(1998)
Financial Cryptography, British
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
45
-
-
0036311802
-
-
Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241-272 (2000) Short version in the Proc. of the Conference on Computer and Communications Security (CCS'00), Athens (2000)
-
Bonatti, P.A., Samarati, P.: A uniform framework for regulating service access and information release on the web. Journal of Computer Security 10(3), 241-272 (2000) Short version in the Proc. of the Conference on Computer and Communications Security (CCS'00), Athens (2000)
-
-
-
-
46
-
-
33746075609
-
Negotiating Disclosure of Sensitive Credentials
-
Italy September
-
Winsborough, W., Seamons, K., Jones, V.: Negotiating Disclosure of Sensitive Credentials. In: Second Conference on Security in Communication Networks, Amalfi, Italy (September 1999)
-
(1999)
Second Conference on Security in Communication Networks, Amalfi
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
47
-
-
84939548725
-
Automated Trust Negotiation
-
Hilton Head Island, SC
-
Winsborough, W., Seamons, K., Jones, V.: Automated Trust Negotiation. In: DARPA Information Survivability Conference and Exposition, Hilton Head Island, SC (2000)
-
(2000)
DARPA Information Survivability Conference and Exposition
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
48
-
-
0036871183
-
Negotiating trust on the web
-
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: Negotiating trust on the web. IEEE Internet Computing 6(6), 30-37 (2002)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
49
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1), 1-42 (2003)
-
(2003)
ACM Trans. Inf. Syst. Secur
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
51
-
-
84893105662
-
Requirements for Policy Languages for Trust Negotiation
-
Monterey, CA
-
Seamons, K., Winslett, M., Yu, T., Smith, B., Child, E., Jacobsen, J., Mills, H., Yu, L.: Requirements for Policy Languages for Trust Negotiation. In: 3rd International Workshop on Policies for Distributed Systems and Networks, Monterey, CA (2002)
-
(2002)
3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
Mills, H.7
Yu, L.8
-
52
-
-
0035751908
-
Distributed Credential Chain Discovery in Trust Management (Extended Abstract)
-
Philadelphia, Pennsylvania, ACM, New York
-
Li, N., Winsborough, W., Mitchell, J.C.: Distributed Credential Chain Discovery in Trust Management (Extended Abstract). In: ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, ACM, New York (2001)
-
(2001)
ACM Conference on Computer and Communications Security
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.C.3
-
53
-
-
33745792729
-
Peeraccess: A logic for distributed authorization
-
Alexandria, VA, USA, ACM Press, New York
-
Zhang, C., Bonatti, P.A., Winslett, M.: Peeraccess: A logic for distributed authorization. In: 12th ACM Conference on Computer and Communication Security (CCS 2005), Alexandria, VA, USA, ACM Press, New York (2005)
-
(2005)
12th ACM Conference on Computer and Communication Security (CCS
-
-
Zhang, C.1
Bonatti, P.A.2
Winslett, M.3
-
54
-
-
9344223389
-
Explaining answers from the semantic web: The inference web approach
-
McGuinness, D.L., da Silva, P.P.: Explaining answers from the semantic web: The inference web approach. Journal of Web Semantics 1(4), 397-413 (2004)
-
(2004)
Journal of Web Semantics
, vol.1
, Issue.4
, pp. 397-413
-
-
McGuinness, D.L.1
da Silva, P.P.2
-
57
-
-
0026169418
-
Explanations in knowledge systems: Design for explainable expert systems
-
Swartout, W., Paris, C., Moore, J.: Explanations in knowledge systems: Design for explainable expert systems. IEEE Expert: Intelligent Systems and Their Applications 6(3), 58-64 (1991)
-
(1991)
IEEE Expert: Intelligent Systems and Their Applications
, vol.6
, Issue.3
, pp. 58-64
-
-
Swartout, W.1
Paris, C.2
Moore, J.3
-
58
-
-
0026168818
-
Explanations in knowledge systems: The roles of the task structure and domain functional models
-
Tanner, M.C., Keuneke, A.M.: Explanations in knowledge systems: The roles of the task structure and domain functional models. IEEE Expert: Intelligent Systems and Their Applications 6(3), 50-57 (1991)
-
(1991)
IEEE Expert: Intelligent Systems and Their Applications
, vol.6
, Issue.3
, pp. 50-57
-
-
Tanner, M.C.1
Keuneke, A.M.2
-
59
-
-
9344228137
-
Second generation expert system explanation
-
David, J.-M, Krivine, J.-P, Simmons, R, eds, Springer, Heidelberg
-
Wick, M.R.: Second generation expert system explanation. In: David, J.-M., Krivine, J.-P., Simmons, R. (eds.) Second Generation Expert Systems, pp. 614-640. Springer, Heidelberg (1993)
-
(1993)
Second Generation Expert Systems
, pp. 614-640
-
-
Wick, M.R.1
-
60
-
-
33750685129
-
Towards a policy-aware web
-
Galway, Ireland
-
Kolovski, V., Katz, Y., Hendler, J., Weitzner, D., Berners-Lee, T.: Towards a policy-aware web. In: Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference, Galway, Ireland (2005)
-
(2005)
Semantic Web Policy Workshop in conjunction with 4th International Semantic Web Conference
-
-
Kolovski, V.1
Katz, Y.2
Hendler, J.3
Weitzner, D.4
Berners-Lee, T.5
|