-
1
-
-
84957810442
-
Verification of logic programs with delay declarations
-
AMAST, of, Springer
-
K. R. Apt and I. Luitjes. Verification of logic programs with delay declarations. In AMAST, volume 936 of LNCS, pages 66-90. Springer, 1995.
-
(1995)
LNCS
, vol.936
, pp. 66-90
-
-
Apt, K.R.1
Luitjes, I.2
-
2
-
-
3142676730
-
Trust-X : A Peer-to-Peer Framework for Trust Establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X : A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng., 16(7):827-842, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
3
-
-
44049089909
-
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust-Management System, Version 2. IETF RFC 2704, September 1999
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust-Management System, Version 2. IETF RFC 2704, September 1999.
-
-
-
-
5
-
-
0035680371
-
Certificate Chain Discovery in SPKI/SDSI
-
D. Clarke, J.E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. L. Rivest. Certificate Chain Discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
6
-
-
38149043621
-
Core TuLiP - Logic Programming for Trust Management
-
Proc. 23rd International Conference on Logic Programming, ICLP 2007, Porto, Portugal, of, Berlin, Springer Verlag
-
M. R. Czenko and S. Etalle. Core TuLiP - Logic Programming for Trust Management. In Proc. 23rd International Conference on Logic Programming, ICLP 2007, Porto, Portugal, volume 4670 of LNCS, pages 380-394, Berlin, 2007. Springer Verlag.
-
(2007)
LNCS
, vol.4670
, pp. 380-394
-
-
Czenko, M.R.1
Etalle, S.2
-
7
-
-
44049100433
-
-
Freeband Communication. I-Share: Sharing resources in virtual communities for storage, communications, and processing of multimedia data. URL: http://www.freeband.nl/project.cfm?language=en&id=520.
-
Freeband Communication. I-Share: Sharing resources in virtual communities for storage, communications, and processing of multimedia data. URL: http://www.freeband.nl/project.cfm?language=en&id=520.
-
-
-
-
8
-
-
0002447342
-
Consumer Trust in an Internet Store
-
S. L. Jarvenpaa, N. Tractinsky, and M. Vitale. Consumer Trust in an Internet Store. Inf. Tech. and Management, 1(1-2):45-71, 2000.
-
(2000)
Inf. Tech. and Management
, vol.1
, Issue.1-2
, pp. 45-71
-
-
Jarvenpaa, S.L.1
Tractinsky, N.2
Vitale, M.3
-
9
-
-
0034829512
-
SD3: A Trust Management System with Certified Evaluation
-
IEEE Computer Society Press
-
T. Jim. SD3: A Trust Management System with Certified Evaluation. In Proc. IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, 2001.
-
(2001)
Proc. IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
10
-
-
44049099345
-
-
F. Lee, D. Vogel, and M. Limayem. Adoption of informatics to support virtual communities. In HICSS '02: Proc. 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-8, page 214.2. IEEE Computer Society Press, 2002.
-
F. Lee, D. Vogel, and M. Limayem. Adoption of informatics to support virtual communities. In HICSS '02: Proc. 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 8, page 214.2. IEEE Computer Society Press, 2002.
-
-
-
-
11
-
-
0041524661
-
Delegation Logic: A Logic-based Approach to Distributed Authorization
-
N. Li, B. Grosof, and J. Feigenbaum. Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
13
-
-
0037243196
-
Distributed Credential Chain Discovery in Trust Management
-
N. Li, W. Winsborough, and J. Mitchell. Distributed Credential Chain Discovery in Trust Management. Journal of Computer Security, 11(1):35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
14
-
-
44049086079
-
-
LIACC/Universidade do Porto and COPPE Sistemas/UFRJ. YAP Prolog, April 2006.
-
LIACC/Universidade do Porto and COPPE Sistemas/UFRJ. YAP Prolog, April 2006.
-
-
-
-
15
-
-
35048841281
-
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web
-
W. Nejdl, D. Olmedilla, and M. Winslett. PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. In Secure Data Management pages 118-132, 2004.
-
(2004)
Secure Data Management
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
17
-
-
44049084069
-
-
OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 URL:, Feb 2005
-
OASIS. eXtensible Access Control Markup Language (XACML) Version 2.0 URL: http://www.oasis.org, Feb 2005.
-
-
-
-
19
-
-
0034775826
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. M. Karp, and S. Shenker. A scalable content-addressable network. In SIGCOMM, pages 161-172, 2001.
-
(2001)
SIGCOMM
, pp. 161-172
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.M.4
Shenker, S.5
-
20
-
-
44049085562
-
-
W3C. XML-Signature Syntax and Processing, Feb 2002.
-
W3C. XML-Signature Syntax and Processing, Feb 2002.
-
-
-
-
21
-
-
44049084894
-
-
W3C. Extensible Markup Language (XML) 1.1 (Second Edition), Sep 2006.
-
W3C. Extensible Markup Language (XML) 1.1 (Second Edition), Sep 2006.
-
-
-
-
22
-
-
44049085029
-
-
W3C. Namespaces in XML 1.0 (Second Edition), Aug 2006.
-
W3C. Namespaces in XML 1.0 (Second Edition), Aug 2006.
-
-
-
-
23
-
-
84893110297
-
Towards Practical Automated Trust Negotiation
-
IEEE Computer Society Press
-
W. H. Winsborough and N. Li. Towards Practical Automated Trust Negotiation. In POLICY, pages 92-103. IEEE Computer Society Press, 2002.
-
(2002)
POLICY
, pp. 92-103
-
-
Winsborough, W.H.1
Li, N.2
|