-
4
-
-
4143121153
-
Access control and trust in the use of widely distributed services
-
November
-
Jean Bacon, Ken Moody, and Walt Yao. Access control and trust in the use of widely distributed services. In Middleware 2001, volume 2218, pages 300-315, November 2001.
-
(2001)
Middleware 2001
, vol.2218
, pp. 300-315
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
5
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
November
-
Jean Bacon, Ken Moody, and Walt Yao. A model of OASIS role-based access control and its support for active security. ACM Transactions on Information and System Security (TISSEC), 5(4):492-540, November 2002.
-
(2002)
ACM Transactions on Information and System Security (TISSEC)
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
7
-
-
4143083800
-
-
Research Series RS-03-04, BRICS, Department of Computer Science, University of Aarhus, January EU Project SECURE IST-2001-32486 Deliverable 1.1
-
Marco Carbone, Mogens Nielsen, and Vladimiro Sassone. A formal model for trust in dynamic networks. Research Series RS-03-04, BRICS, Department of Computer Science, University of Aarhus, January 2003. EU Project SECURE IST-2001-32486 Deliverable 1.1.
-
(2003)
A Formal Model for Trust in Dynamic Networks
-
-
Carbone, M.1
Nielsen, M.2
Sassone, V.3
-
13
-
-
0035577649
-
Trust-based security in pervasive computing environments
-
DEC
-
Lalana Kagal, Tim Finin, and Anupam Joshi, Trust-based security in pervasive computing environments. IEEE Computer, pages 154-157, DEC 2001.
-
(2001)
IEEE Computer
, pp. 154-157
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
15
-
-
2942533841
-
End-to-end trust in pervasive computing starts with recognition
-
Jean-Marc Seigneur, Stephen Farrell, Christian Damsgaard Jensen, Elizabeth Gray, and Chen Yong. End-to-end trust in pervasive computing starts with recognition. In Proceedings of the First International Conference on Security in Pervasive Computing, 2003.
-
(2003)
Proceedings of the First International Conference on Security in Pervasive Computing
-
-
Seigneur, J.-M.1
Farrell, S.2
Jensen, C.D.3
Gray, E.4
Yong, C.5
-
17
-
-
77950995918
-
Fidelis: A policy-driven trust management framework
-
number 2692 in LNCS. Springer-Verlag, May
-
Walt Teh-Ming Yao. Fidelis: A policy-driven trust management framework. In Proc. of the 1st Intem'l Conf. on Trust Management, number 2692 in LNCS. Springer-Verlag, May 2003.
-
(2003)
Proc. of the 1st Intem'l Conf. on Trust Management
-
-
Yao, W.T.-M.1
-
19
-
-
84864863529
-
Authorization based on evidence and trust
-
Yahiko Kambayashi, Werner Winiwarter, and Masatoshi Arikawa, editors, Springer
-
Yuhui Zhong and Bharat Bhargava. Authorization based on evidence and trust. In Yahiko Kambayashi, Werner Winiwarter, and Masatoshi Arikawa, editors, Data Warehousing and Knowledge Discovery(DaWaK 2002), 4th International Conference, volume 2454 of Lecture Notes in Computer Science, pages 94-103. Springer, 2002.
-
(2002)
Data Warehousing and Knowledge Discovery(DaWaK 2002), 4th International Conference, Volume 2454 of Lecture Notes in Computer Science
, vol.2454
, pp. 94-103
-
-
Zhong, Y.1
Bhargava, B.2
|