-
1
-
-
48249124718
-
Towards Filtering and Alerting Rule Rewriting on Single-Component Policies
-
Gdansk, Poland, September
-
J. G. Alfaro, F. Cuppens, and N. Cuppens-Boulahia. Towards Filtering and Alerting Rule Rewriting on Single-Component Policies. In SAFECOMP, Gdansk, Poland, September 2006.
-
(2006)
SAFECOMP
-
-
Alfaro, J.G.1
Cuppens, F.2
Cuppens-Boulahia, N.3
-
2
-
-
3142676730
-
Trust-X: A Peer-to-Peer Framework for Trust Establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827-842, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
5
-
-
84944754330
-
Modelling Contexts in the Or-BAC Model
-
F. Cuppens and A. Miège. Modelling Contexts in the Or-BAC Model. ACSAC, page 416, 2003.
-
(2003)
ACSAC
, pp. 416
-
-
Cuppens, F.1
Miège, A.2
-
6
-
-
48249153525
-
Negotiation of prohibition: An approach based on policy rewriting
-
Technical report, TELECOM Bretagne, 2008
-
N. Cuppens-Boulahia, F. Cuppens, D. Abi Haidar, and H. Debar. Negotiation of prohibition: An approach based on policy rewriting. Technical report, TELECOM Bretagne, 2008.
-
-
-
Cuppens-Boulahia, N.1
Cuppens, F.2
Abi Haidar, D.3
Debar, H.4
-
8
-
-
46749116030
-
Resource Classification Based Negotiation inWeb Services
-
August
-
D. Abi Haidar, N. Cuppens, F. Cuppens, and H. Debar. Resource Classification Based Negotiation inWeb Services. Third International Symposium on Information Assurance and Security (IAS), pages 313-318, August 2007.
-
(2007)
Third International Symposium on Information Assurance and Security (IAS)
, pp. 313-318
-
-
Abi Haidar, D.1
Cuppens, N.2
Cuppens, F.3
Debar, H.4
-
10
-
-
77952407814
-
Organization Based Access Control
-
Lake Como, Italy, June
-
A. Abou El Kalam, R. El Baida, P. Balbiani, S. Benferhat, F. Cuppens, Y. Deswarte, A. Miège, C. Saurel, and G. Trouessin. Organization Based Access Control. In 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), Lake Como, Italy, June 2003.
-
(2003)
8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003)
-
-
Abou El Kalam, A.1
El Baida, R.2
Balbiani, P.3
Benferhat, S.4
Cuppens, F.5
Deswarte, Y.6
Miège, A.7
Saurel, C.8
Trouessin, G.9
-
12
-
-
85056545124
-
Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation
-
San Diego, CA, April
-
K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, April 2001.
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
13
-
-
84942433458
-
-
K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. TrustBuilder: Negotiating trust in dynamic coalitions. Proceedings DARPA Information Survivability Conference and Exposition, 2:49-51, April 2003.
-
K.E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and L. Yu. TrustBuilder: Negotiating trust in dynamic coalitions. Proceedings DARPA Information Survivability Conference and Exposition, 2:49-51, April 2003.
-
-
-
-
15
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC)(1):1-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|