-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
ABADI, M. 1998. On SDSI's linked local name spaces. J. Comput. Secur. 6, 1-2, 3-21.
-
(1998)
J. Comput. Secur
, vol.6
, Issue.1-2
, pp. 3-21
-
-
ABADI, M.1
-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Program. Lang. Syst. 15, 4, 706-734.
-
(1993)
ACM Trans. Program. Lang. Syst
, vol.15
, Issue.4
, pp. 706-734
-
-
ABADI, M.1
BURROWS, M.2
LAMPSON, B.3
PLOTKIN, G.4
-
4
-
-
34249909389
-
ConChord: Cooperative SDSI certificate storage and name resolution
-
AJMANI, S., CLARKE, D. E., MOH, C.-H., AND RICHMAN, S. 2002. ConChord: Cooperative SDSI certificate storage and name resolution. In International Workshop on Peer-to-Peer Systems.
-
(2002)
International Workshop on Peer-to-Peer Systems
-
-
AJMANI, S.1
CLARKE, D.E.2
MOH, C.-H.3
RICHMAN, S.4
-
6
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
BACON, J., MOODY, K., AND YAO, W. 2002. A model of OASIS role-based access control and its support for active security. ACM Trans. Inform. Syst. Secur. 5, 4, 492-540.
-
(2002)
ACM Trans. Inform. Syst. Secur
, vol.5
, Issue.4
, pp. 492-540
-
-
BACON, J.1
MOODY, K.2
YAO, W.3
-
8
-
-
85084162149
-
-
BAUER, L., SCHNEIDER, M. A., AND FELTEN, E. W. 2002. A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium. 93-108.
-
BAUER, L., SCHNEIDER, M. A., AND FELTEN, E. W. 2002. A general and flexible access-control system for the Web. In Proceedings of the 11th USENIX Security Symposium. 93-108.
-
-
-
-
9
-
-
33947674219
-
Cassandra: Flexible trust management and its application to electronic health records
-
Tech. rep. 648, University of Cambridge
-
BECKER, M. Y. 2005. Cassandra: Flexible trust management and its application to electronic health records. Tech. rep. 648, University of Cambridge.
-
(2005)
-
-
BECKER, M.Y.1
-
12
-
-
0041524664
-
A logical framework for reasoning about access control models
-
BERTINO, E., CATANIA, B., FERRARI, E., AND PERLASCA, P. 2003. A logical framework for reasoning about access control models. ACM Trans. Inform. Syst. Secur. 6, 1, 71-127.
-
(2003)
ACM Trans. Inform. Syst. Secur
, vol.6
, Issue.1
, pp. 71-127
-
-
BERTINO, E.1
CATANIA, B.2
FERRARI, E.3
PERLASCA, P.4
-
13
-
-
49449089594
-
-
BLAZE, M, FEIGENBAUM, J, IOANNIDIS, J, AND KEROMYTIS, A. D. 1999a. RFC-2704: The keyNote trustmanagement system version 2. Internet Engineering Task Force
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999a. RFC-2704: The keyNote trustmanagement system version 2. Internet Engineering Task Force.
-
-
-
-
14
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer-Verlag
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999b. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag, 185-210.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
BLAZE, M.1
FEIGENBAUM, J.2
IOANNIDIS, J.3
KEROMYTIS, A.D.4
-
15
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press
-
BLAZE, M., FEIGENBAUM, J., AND LACY, J. 1996. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 164-173.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
BLAZE, M.1
FEIGENBAUM, J.2
LACY, J.3
-
16
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
Springer-Verlag
-
BLAZE, M., FEIGENBAUM, J., AND STRAUSS, M. 1998. Compliance checking in the policymaker trust management system. In Proceedings of the 2nd International Conference on Financial Cryptography. Springer-Verlag, 254-274.
-
(1998)
Proceedings of the 2nd International Conference on Financial Cryptography
, pp. 254-274
-
-
BLAZE, M.1
FEIGENBAUM, J.2
STRAUSS, M.3
-
17
-
-
84958235938
-
Trust management for IPsec
-
BLAZE, M., IOANNIDIS, J., AND KEROMYTIS, A. D. 2002. Trust management for IPsec. ACM Trans. Inform. Syst. Secur. 5, 2, 95-118.
-
(2002)
ACM Trans. Inform. Syst. Secur
, vol.5
, Issue.2
, pp. 95-118
-
-
BLAZE, M.1
IOANNIDIS, J.2
KEROMYTIS, A.D.3
-
18
-
-
35248873087
-
Experience with the keynote trust management system: Applications and future directions
-
Springer-Verlag
-
BLAZE, M., IOANNIDIS, J., AND KEROMYTIS, A. D. 2003. Experience with the keynote trust management system: Applications and future directions. In Proceedings of the 1st International Conference on Trust Management. Springer-Verlag, 284-300.
-
(2003)
Proceedings of the 1st International Conference on Trust Management
, pp. 284-300
-
-
BLAZE, M.1
IOANNIDIS, J.2
KEROMYTIS, A.D.3
-
19
-
-
33744993674
-
Policy language specification
-
BONATTI, P. AND OLMEDILLA, D. 2005a. Policy language specification. REWERSE Deliverable I2-D2, http://rewerse.net/ deliverables.html.
-
(2005)
REWERSE Deliverable
-
-
BONATTI, P.1
OLMEDILLA, D.2
-
21
-
-
0036311802
-
A unified framework for regulating access and information release on the Web
-
BONATTI, P. AND SAMARATI, P. 2002. A unified framework for regulating access and information release on the Web. J. Comput. Secur. 10, 3, 241-272.
-
(2002)
J. Comput. Secur
, vol.10
, Issue.3
, pp. 241-272
-
-
BONATTI, P.1
SAMARATI, P.2
-
22
-
-
26444484308
-
Logics for authorizations and security
-
J. Chomicki, R. van der Meyden, and G. Saake, Eds. Springer-Verlag
-
BONATTI, P. AND SAMARATI, P. 2003. Logics for authorizations and security. In Logics for Emerging Applications of Databases, J. Chomicki, R. van der Meyden, and G. Saake, Eds. Springer-Verlag.
-
(2003)
Logics for Emerging Applications of Databases
-
-
BONATTI, P.1
SAMARATI, P.2
-
24
-
-
84885983134
-
Advanced policy queries
-
IOS Press
-
BONATTI, P. A., OLMEDILLA, D., AND PEER, J. 2006. Advanced policy queries. In Proceedings of the 17th European Conference on Artificial Intelligence. IOS Press, 200-204.
-
(2006)
Proceedings of the 17th European Conference on Artificial Intelligence
, pp. 200-204
-
-
BONATTI, P.A.1
OLMEDILLA, D.2
PEER, J.3
-
25
-
-
0025386404
-
Alogic of authentication
-
BURROWS, M., ABADI, M., AND NEEDHAM, R. M. 1990. Alogic of authentication. ACM Trans. Comput. Syst. 8, 1, 18-36.
-
(1990)
ACM Trans. Comput. Syst
, vol.8
, Issue.1
, pp. 18-36
-
-
BURROWS, M.1
ABADI, M.2
NEEDHAM, R.M.3
-
26
-
-
0001843009
-
REFEREE: Trust management for Web applications
-
CHU, Y.-H., FEIGENBAUM, J., LAMACCHIA, B., RESNICK, P., AND STRAUSS, M. 1997. REFEREE: Trust management for Web applications. World Wide Web J. 2, 3, 127-139.
-
(1997)
World Wide Web J
, vol.2
, Issue.3
, pp. 127-139
-
-
CHU, Y.-H.1
FEIGENBAUM, J.2
LAMACCHIA, B.3
RESNICK, P.4
STRAUSS, M.5
-
27
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLARKE, D., ELIEN, J.-E., ELLISON, C., FREDETTE, M., MORCOS, A., AND RIVEST, R. L. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 4, 285-322.
-
(2001)
J. Comput. Secur
, vol.9
, Issue.4
, pp. 285-322
-
-
CLARKE, D.1
ELIEN, J.-E.2
ELLISON, C.3
FREDETTE, M.4
MORCOS, A.5
RIVEST, R.L.6
-
30
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
ACM Press
-
DIMMOCK, N., BELOKOSZTOLSZKI, A., EYERS, D., BACON, J., AND MOODY, K. 2004. Using trust and risk in role-based access control policies. In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies. ACM Press, 156-162.
-
(2004)
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies
, pp. 156-162
-
-
DIMMOCK, N.1
BELOKOSZTOLSZKI, A.2
EYERS, D.3
BACON, J.4
MOODY, K.5
-
31
-
-
0031237090
-
Disjunctive datalog
-
EITER, T., GOTTLOB, G., AND MANNILA, H. 1997. Disjunctive datalog. ACM Trans. Datab. Syst. 22, 3, 364-418.
-
(1997)
ACM Trans. Datab. Syst
, vol.22
, Issue.3
, pp. 364-418
-
-
EITER, T.1
GOTTLOB, G.2
MANNILA, H.3
-
32
-
-
49449105200
-
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. RFC-2693: SPKI certificate theory. Internet Engineering Task Force.
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND YLONEN, T. 1999. RFC-2693: SPKI certificate theory. Internet Engineering Task Force.
-
-
-
-
34
-
-
34547260252
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic Web
-
Proceedings of the 1st European Semantic Web Symposium, Springer
-
GAVRILOAIE, R., NEJDL, W., OLMEDILLA, D., SEAMONS, K. E., AND WINSLETT, M. 2004. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic Web. In Proceedings of the 1st European Semantic Web Symposium. Lecture Notes in Computer Science, vol. 3053. Springer, 342-356.
-
(2004)
Lecture Notes in Computer Science
, vol.3053
, pp. 342-356
-
-
GAVRILOAIE, R.1
NEJDL, W.2
OLMEDILLA, D.3
SEAMONS, K.E.4
WINSLETT, M.5
-
37
-
-
0034428960
-
Policy-directed certificate retrieval
-
GUNTER, C. A. AND JIM, T. 2000b. Policy-directed certificate retrieval. Softw. Prac. Exper. 30, 15, 1609-1640.
-
(2000)
Softw. Prac. Exper
, vol.30
, Issue.15
, pp. 1609-1640
-
-
GUNTER, C.A.1
JIM, T.2
-
38
-
-
49449093032
-
-
GUNTER, C. A., JIM, T., AND WANG, B.-Y. 1997. Authenticated data distribution using query certificate managers, unpublished extended abstract.
-
GUNTER, C. A., JIM, T., AND WANG, B.-Y. 1997. Authenticated data distribution using query certificate managers, unpublished extended abstract.
-
-
-
-
39
-
-
0032681483
-
-
HALPERN, J. AND VAN DER MEYDEN, R. 1999. A logic for SDSI's linked local name spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. 111-122.
-
HALPERN, J. AND VAN DER MEYDEN, R. 1999. A logic for SDSI's linked local name spaces. In Proceedings of the 12th IEEE Computer Security Foundations Workshop. 111-122.
-
-
-
-
40
-
-
0034822798
-
-
HALPERN, J. Y AND VAN DER MEYDEN, R. 2001. A logical reconstruction of SPKI. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. 59-70.
-
HALPERN, J. Y AND VAN DER MEYDEN, R. 2001. A logical reconstruction of SPKI. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. 59-70.
-
-
-
-
41
-
-
0031650454
-
OASIS: Access control in an open distributed environment
-
IEEE Computer Society Press
-
HAYTON, R. J., BACON, J. M., AND MOODY, K. 1998. OASIS: Access control in an open distributed environment. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 3-14.
-
(1998)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 3-14
-
-
HAYTON, R.J.1
BACON, J.M.2
MOODY, K.3
-
42
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
HERZBERG, A., MASS, Y., MICHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
HERZBERG, A.1
MASS, Y.2
MICHAELI, J.3
NAOR, D.4
RAVID, Y.5
-
43
-
-
84944075856
-
An architecture for distributed OASIS services
-
Springer-Verlag
-
HINE, J. A., YAO, W., BACON, J., AND MOODY, K. 2000. An architecture for distributed OASIS services. In Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware'00). Springer-Verlag, 104-120.
-
(2000)
Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware'00)
, pp. 104-120
-
-
HINE, J.A.1
YAO, W.2
BACON, J.3
MOODY, K.4
-
45
-
-
0003623954
-
A formal semantics for SPKI
-
Tech. rep. 2000-363, Dartmouth College
-
HOWELL, J. AND KOTZ, D. 2000. A formal semantics for SPKI. Tech. rep. 2000-363, Dartmouth College.
-
(2000)
-
-
HOWELL, J.1
KOTZ, D.2
-
48
-
-
4243532938
-
Constraint logic programming: A survey
-
JAFFAR, J. AND MAHER, M. J. 1994. Constraint logic programming: A survey. J. Logic Program. 19/20, 503-581.
-
(1994)
J. Logic Program
, vol.19-20
, pp. 503-581
-
-
JAFFAR, J.1
MAHER, M.J.2
-
49
-
-
0001619596
-
Flexible support for multiple access control policies
-
JAJODIA, S., SAMARATI, P., SAPINO, M. L., AND SUBRAHMANIAN, V. S. 2001. Flexible support for multiple access control policies. ACM Trans. Datab. Syst. 26, 2, 214-260.
-
(2001)
ACM Trans. Datab. Syst
, vol.26
, Issue.2
, pp. 214-260
-
-
JAJODIA, S.1
SAMARATI, P.2
SAPINO, M.L.3
SUBRAHMANIAN, V.S.4
-
54
-
-
84949191488
-
-
LI, N. AND FEIGENBAUM, J. 2002. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th International Conference on Financial Cryptography. Springer-Verlag, 166-177.
-
LI, N. AND FEIGENBAUM, J. 2002. Nonmonotonicity, user interfaces, and risk assessment in certificate revocation. In Proceedings of the 5th International Conference on Financial Cryptography. Springer-Verlag, 166-177.
-
-
-
-
55
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inform. Syst. Secur. 6, 1, 128-171.
-
(2003)
ACM Trans. Inform. Syst. Secur
, vol.6
, Issue.1
, pp. 128-171
-
-
LI, N.1
GROSOF, B.N.2
FEIGENBAUM, J.3
-
56
-
-
33646242539
-
Understanding spki/sdsi using first-order logic
-
LI, N. AND MITCHELL, C. 2006. Understanding spki/sdsi using first-order logic. Int. J. Inform. Secur. 5, 1, 48-64.
-
(2006)
Int. J. Inform. Secur
, vol.5
, Issue.1
, pp. 48-64
-
-
LI, N.1
MITCHELL, C.2
-
59
-
-
0036085965
-
Design of a role-based trust-management framework
-
IEEE Computer Society Press
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust-management framework. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 114-130.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
LI, N.1
MITCHELL, J.C.2
WINSBOROUGH, W.H.3
-
60
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2005. Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52, 3, 474-514.
-
(2005)
J. ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
LI, N.1
MITCHELL, J.C.2
WINSBOROUGH, W.H.3
-
61
-
-
0037243196
-
Distributed chain discovery in trust management
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
-
(2003)
J. Comput. Secur
, vol.11
, Issue.1
, pp. 35-86
-
-
LI, N.1
WINSBOROUGH, W.H.2
MITCHELL, J.C.3
-
69
-
-
49449091723
-
-
OFFICE OF TECHNOLOGY ASSESSMENT. 1993. Protecting Privacy in Computerized Medical Information. OTA-TCT-576. U.S. Government Printing Office.
-
OFFICE OF TECHNOLOGY ASSESSMENT. 1993. Protecting Privacy in Computerized Medical Information. OTA-TCT-576. U.S. Government Printing Office.
-
-
-
-
71
-
-
0030258432
-
PICS: Internet access controls without censorship
-
RESNICK, P. AND MILLER, J. 1996. PICS: Internet access controls without censorship. Comm. ACM 39, 10, 87-93.
-
(1996)
Comm. ACM
, vol.39
, Issue.10
, pp. 87-93
-
-
RESNICK, P.1
MILLER, J.2
-
73
-
-
49449085092
-
-
RIVEST, R. L. AND LAMPSON, B. 1996a. SDSI-A simple distributed security infrastructure. version 1.0
-
RIVEST, R. L. AND LAMPSON, B. 1996a. SDSI-A simple distributed security infrastructure. version 1.0. http://theory.les.mit. edu/~rivest/sdsi10.html.
-
-
-
-
74
-
-
49449111475
-
-
RIVEST, R. L. AND LAMPSON, B. 1996b. SDSI-A simple distributed security infrastructure. version 1.1
-
RIVEST, R. L. AND LAMPSON, B. 1996b. SDSI-A simple distributed security infrastructure. version 1.1. http://theory.lcs.mit. edu/~rivest/sdsi11.html.
-
-
-
-
75
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. Computer 29, 2, 38-47.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
SANDHU, R.S.1
COYNE, E.J.2
FEINSTEIN, H.L.3
YOUMAN, C.E.4
-
76
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium
-
SEAMONS, K., WINSBOROUGH, W., AND WINSLETT, M. 1997. Internet credential acceptance policies. In Proceedings of the Workshop on Logic Programming for Internet Applications. Leuven, Belgium.
-
(1997)
Proceedings of the Workshop on Logic Programming for Internet Applications
-
-
SEAMONS, K.1
WINSBOROUGH, W.2
WINSLETT, M.3
-
78
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
IEEE Computer Society
-
SEAMONS, K., WINSLETT, M.,YU, T., SMITH, B., CHILD, E., JACOBSON, J., MILLS, H., ANDYU, L. 2002. Requirements for policy languages for trust negotiation. In Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society, 68.
-
(2002)
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
, pp. 68
-
-
SEAMONS, K.1
WINSLETT, M.2
YU, T.3
SMITH, B.4
CHILD, E.5
JACOBSON, J.6
MILLS, H.7
ANDYU, L.8
-
80
-
-
34249881318
-
Risk management for distributed authorization
-
SKALKA, C., WANG, X. S., AND CHAPIN, P. 2007. Risk management for distributed authorization. J. Comput. Secur. 15, 4, 447-489.
-
(2007)
J. Comput. Secur
, vol.15
, Issue.4
, pp. 447-489
-
-
SKALKA, C.1
WANG, X.S.2
CHAPIN, P.3
-
81
-
-
0029210673
-
Recent-secure authentication: Enforcing revocation in distributed systems
-
IEEE Computer Society
-
STUBBLEBINE, S. 1995. Recent-secure authentication: Enforcing revocation in distributed systems. In Proceedings of the 1995 IEEE Symposium on Security and Privacy. IEEE Computer Society, 224-235.
-
(1995)
Proceedings of the 1995 IEEE Symposium on Security and Privacy
, pp. 224-235
-
-
STUBBLEBINE, S.1
-
82
-
-
0029711077
-
An authentication logic supporting synchronization, revocation, and recency
-
ACM Press
-
STUBBLEBINE, S. G. AND WRIGHT, R. N. 1996. An authentication logic supporting synchronization, revocation, and recency. In Proceedings of the 3rd ACM Conference on Computer and Communications Security. ACM Press, 95-105.
-
(1996)
Proceedings of the 3rd ACM Conference on Computer and Communications Security
, pp. 95-105
-
-
STUBBLEBINE, S.G.1
WRIGHT, R.N.2
-
83
-
-
0242453160
-
Memoing evaluation for constraint extensions of datalog
-
TOMAN, D. 1997. Memoing evaluation for constraint extensions of datalog. Constraints 2, 337-359.
-
(1997)
Constraints
, vol.2
, pp. 337-359
-
-
TOMAN, D.1
-
87
-
-
84939548725
-
Automated trust negotiation
-
IEEE Computer Society
-
WINSBOROUGH, W. H., SEAMONS, K. E., AND JONES, V. E. 2000. Automated trust negotiation. In Procedings of the DARPA Information Survivability Conference and Exposition. Vol. 1. IEEE Computer Society, 88-102.
-
(2000)
Procedings of the DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
WINSBOROUGH, W.H.1
SEAMONS, K.E.2
JONES, V.E.3
-
88
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the Web: Client and server security policies
-
IEEE Computer Society
-
WINSLETT, M., CHING, N., JONES, V., AND SLEPCHIN, I. 1997. Assuring security and privacy for digital library transactions on the Web: Client and server security policies. In Proceedings of the IEEE International Forum on Research and Technology Advances in Digital Libraries. IEEE Computer Society, 140-151.
-
(1997)
Proceedings of the IEEE International Forum on Research and Technology Advances in Digital Libraries
, pp. 140-151
-
-
WINSLETT, M.1
CHING, N.2
JONES, V.3
SLEPCHIN, I.4
-
89
-
-
0036871183
-
-
WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., ANDYU, L. 2002. Negotiating trust on the Web. IEEE Intern. Comput. 6, 6, 30-37.
-
WINSLETT, M., YU, T., SEAMONS, K. E., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., ANDYU, L. 2002. Negotiating trust on the Web. IEEE Intern. Comput. 6, 6, 30-37.
-
-
-
-
90
-
-
0027809739
-
Authentication in the TAOS operating system
-
WOBBER, E., ABADI, M., BURROWS, M., AND LAMPSON, B. 1993. Authentication in the TAOS operating system. SIGOPS Operat. Syst. Rev. 27, 5, 256-269.
-
(1993)
SIGOPS Operat. Syst. Rev
, vol.27
, Issue.5
, pp. 256-269
-
-
WOBBER, E.1
ABADI, M.2
BURROWS, M.3
LAMPSON, B.4
-
91
-
-
84974750564
-
Authorizations in distributed systems: A new approach
-
WOO, T. Y. C. AND LAM, S. S. 1993. Authorizations in distributed systems: A new approach. J. Comput. Secur. 2, 2-3, 107-136.
-
(1993)
J. Comput. Secur
, vol.2
, Issue.2-3
, pp. 107-136
-
-
WOO, T.Y.C.1
LAM, S.S.2
-
92
-
-
49449102469
-
-
XSB INC. 2006. XSB home page, http://xsb.sourceforge.net.
-
XSB INC. 2006. XSB home page, http://xsb.sourceforge.net.
-
-
-
-
93
-
-
0034449542
-
PRUNES: An efficient and complete strategy for automated trust negotiation over the internet
-
ACM Press
-
YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the internet. In Proceedings of the 7th ACM Conference on Computer and Communications Security. ACM Press, 210-219.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
YU, T.1
MA, X.2
WINSLETT, M.3
-
94
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
ACM Press
-
YU, T., WINSLETT, M., AND SEAMONS, K. E. 2001. Interoperable strategies in automated trust negotiation. In Proceedings of the 8th ACM Conference on Computer and Communications Security. ACM Press, 146-155.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
, pp. 146-155
-
-
YU, T.1
WINSLETT, M.2
SEAMONS, K.E.3
|