-
1
-
-
0035791550
-
On specifying security policies for web documents with an XML-based language
-
ACM Press, Chantilly, VA
-
BERTINO, E., CASTANO, S., AND FERRARI, E. 2001, On specifying security policies for web documents with an XML-based language. In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. ACM Press, Chantilly, VA, 57-65.
-
(2001)
Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies
, pp. 57-65
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
3
-
-
84874324906
-
Identity-based encryption from the Weil pairing
-
Lecture Notes in Computer Science, Springer, Berlin
-
BONEH, D. AND FRANKLIN, M. 2001. Identity-based encryption from the Weil pairing. In Proceedings of Crypto 2001. Lecture Notes in Computer Science, vol. 2139. Springer, Berlin 213-229.
-
(2001)
Proceedings of Crypto 2001
, vol.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
6
-
-
0003415244
-
-
FIELDING, R., GETTYS, J., MOGUL, J., FRYSTYK, H., MASINTER, L., LEACH, P., AND BERNERS-LEE, T. 1999. Hypertext transfer protocol-HTTP/1.1. RFC 2616.
-
(1999)
Hypertext Transfer Protocol-HTTP/1.1. RFC
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
7
-
-
0033724294
-
Access control meets public key infrastructure, or assigning roles to strangers
-
IEEE Computer Society Press
-
HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
8
-
-
4444380554
-
-
M.S. thesis, Computer Science Department, Brigham Young University
-
HESS, A. 2003. Content-Triggered Trust Negotiation. M.S. thesis, Computer Science Department, Brigham Young University.
-
(2003)
Content-Triggered Trust Negotiation
-
-
Hess, A.1
-
9
-
-
85180810679
-
Advanced client/server authentication in TLS
-
San Diego, CA
-
HESS, A., JACOBSON, J., MILLS, H., WAMSLEY, R., SEAMONS, K. E., AND SMITH, B. 2002. Advanced client/server authentication in TLS. In Network and Distributed System Security Symposium, San Diego, CA. 203-214.
-
(2002)
Network and Distributed System Security Symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
10
-
-
1642394295
-
Hidden credentials
-
ACM Press, Washington, D.C
-
HOLT, J., BRADSHAW, R., SEAMONS, K. E., AND ORMAN, H. 2003. Hidden credentials. In 2nd ACM Workshop on Privacy in the Electronic Society. ACM Press, Washington, D.C., 1-8.
-
(2003)
2nd ACM Workshop on Privacy in the Electronic Society
, pp. 1-8
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
13
-
-
84893084758
-
A policy language for pervasive computing environment
-
Lake Como, Italy
-
KAGAL, L., FININ, T., AND JOHSHI, A. 2003. A policy language for pervasive computing environment. In 4th International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy. 63-76.
-
(2003)
4th International Workshop on Policies for Distributed Systems and Networks
, pp. 63-76
-
-
Kagal, L.1
Finin, T.2
Johshi, A.3
-
14
-
-
11044225422
-
A policy based approach to security to the semantic web
-
Sanibel Island, FL
-
KAGAL, L., FININ, T., AND JOSHI, A. 2003. A policy based approach to security to the semantic web. In 2nd International Semantic Web Conference, Sanibel Island, FL.
-
(2003)
2nd International Semantic Web Conference
-
-
Kagal, L.1
Finin, T.2
Joshi, A.3
-
15
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
16
-
-
35048837841
-
-
http://www.projectliberty.org
-
Liberty Alliance Project. Available at http://www.projectliberty.org 2002. http://www.projectliberty.org.
-
Liberty Alliance Project
-
-
-
17
-
-
0242571324
-
A fuzzy document retrieval system using the keyword connection matrix and its learning method
-
OGAWA, Y., MORITA, T., AND KOBAYASHI, K. 1991. A fuzzy document retrieval system using the keyword connection matrix and its learning method. Fuzzy Sets Syst 38, 17-41.
-
(1991)
Fuzzy Sets Syst
, vol.38
, pp. 17-41
-
-
Ogawa, Y.1
Morita, T.2
Kobayashi, K.3
-
18
-
-
0003260540
-
Simple mail transfer protocol
-
POSTEL, J. 1982. Simple Mail Transfer Protocol. RFC 821.
-
(1982)
RFC
, vol.821
-
-
Postel, J.1
-
20
-
-
79959883118
-
Computer evaluation of indexing and text processing
-
SALTON, G. AND LESK, M. 1968. Computer evaluation of indexing and text processing. J. ACM 15, 1, 8-36.
-
(1968)
J. ACM
, vol.15
, Issue.1
, pp. 8-36
-
-
Salton, G.1
Lesk, M.2
-
21
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Comput
, vol.29
, Issue.2 FEB.
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
22
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA
-
SEAMONS, K. E., WINSLETT, M., AND YU, T. 2001. Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, San Diego, CA. 109-124.
-
(2001)
Network and Distributed System Security Symposium
, pp. 109-124
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
23
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
IEEE Computer Society Press
-
SEAMONS, K. E., WINSLETT, M., YU, T., SMITH, B., CHILD, E., JACOBSEN, J., MILLS, H., AND YU, L. 2002. Requirements for policy languages for trust negotiation. In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Computer Society Press, 68-79.
-
(2002)
Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobsen, J.6
Mills, H.7
Yu, L.8
-
24
-
-
84957811521
-
Protecting privacy during online trust negotiation
-
Springer-Verlag, San Francisco, CA
-
SEAMONS, K. E., WINSLETT, M., YU, T., YU, L., AND JARVIS, R. 2002. Protecting privacy during online trust negotiation. In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, San Francisco, CA, 129-143.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
, pp. 129-143
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
25
-
-
0038663269
-
Role-based EAM using X509 attribute certificate
-
University of Cambridge, United Kingdom
-
SHIN, D., AHN, G., AND CHO, S. 2002. Role-based EAM using X509 attribute certificate. In 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, University of Cambridge, United Kingdom.
-
(2002)
16th Annual IFIP WG 11.3 Working Conference on Data and Application Security
-
-
Shin, D.1
Ahn, G.2
Cho, S.3
-
26
-
-
4444234997
-
Semantic web languages for policy representation and reasoning: A comparison of Kaos, Rei, and Ponder
-
Sanibel Island, FL
-
TONTI, G., BRADSHAW, J. M., JEFFERS, R., MONTANARI, R., SURI, N., AND USZOK, A. 2003. Semantic web languages for policy representation and reasoning: A comparison of Kaos, Rei, and Ponder. In 2nd International Semantic Web Conference, Sanibel Island, FL.
-
(2003)
2nd International Semantic Web Conference
-
-
Tonti, G.1
Bradshaw, J.M.2
Jeffers, R.3
Montanari, R.4
Suri, N.5
Uszok, A.6
-
27
-
-
37149051976
-
Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement
-
Lake Como, Italy
-
USZOK, A., BRADSHAW, J., JEFFERS, R., SURI, N., HAYES, P., BREEDY, M., BUNCH, L., JOHNSON, M., KULKARNI, S., AND LOTT, J. 2003. Kaos policy and domain services: Toward a description-logic approach to policy representation, deconfliction, and enforcement. In 4th International Workshop on Policies for Distributed Systems and Networks, Lake Como, Italy, 93-98.
-
(2003)
4th International Workshop on Policies for Distributed Systems and Networks
, pp. 93-98
-
-
Uszok, A.1
Bradshaw, J.2
Jeffers, R.3
Suri, N.4
Hayes, P.5
Breedy, M.6
Bunch, L.7
Johnson, M.8
Kulkarni, S.9
Lott, J.10
-
28
-
-
33847415631
-
-
W3C, W3C, Http://www.w3.org/TR/WD-P3P/Overview.html.
-
W3C, http://www.w3.org/TR/WD-P3P/Overview.html. Platform for Privacy Preferences (P3P) Specification. W3C, http://www.w3.org/TR/WD-P3P/Overview.html.
-
Platform for Privacy Preferences (P3P) Specification
-
-
-
29
-
-
84893110297
-
Towards practical automated trust negotiation
-
IEEE Computer Society Press, Monterey, CA
-
WINSBOROUGH, W. H. AND LI, N. 2002. Towards practical automated trust negotiation. In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002). IEEE Computer Society Press, Monterey, CA, 92-103.
-
(2002)
Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks (Policy 2002)
, pp. 92-103
-
-
Winsborough, W.H.1
Li, N.2
-
30
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, Hilton Head, SC
-
WINSBOROUGH, W. H., SEAMONS, K. E., AND JONES, V. E. 2000. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Vol. I. IEEE Press, Hilton Head, SC, 88-102.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
31
-
-
0036871183
-
Negotiating trust on the web
-
WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., AND YU, L. 2002. Negotiating trust on the web. IEEE Internet Comput. 6, 6 (Nov./Dec.), 30-37.
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.6 NOV.-DEC.
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
32
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation
-
YU, T., WINSLETT, M., AND SEAMONS, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1 (Feb.), 1-42.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1 FEB.
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|