-
1
-
-
0038613719
-
Secure mediation: Requirements, design, and architecture
-
C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karabulut. Secure mediation: Requirements, design, and architecture. JCS, 11(3):365-398, 2003.
-
(2003)
JCS
, vol.11
, Issue.3
, pp. 365-398
-
-
Altenschmidt, C.1
Biskup, J.2
Flegel, U.3
Karabulut, Y.4
-
2
-
-
33745270070
-
Designing the mobile ipv6 security protocol
-
T. Aura and M. Roe. Designing the mobile ipv6 security protocol. Annales des Télécommunications, 61(3-4):332-356, 2006.
-
(2006)
Annales des Télécommunications
, vol.61
, Issue.3-4
, pp. 332-356
-
-
Aura, T.1
Roe, M.2
-
4
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati. A unified framework for regulating access and information release on the web. JCS, 10(3):241-272, 2002.
-
(2002)
JCS
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
5
-
-
0002817535
-
The PERMIS X.509 role-based privilege management infrastructure
-
ACM Press
-
D. W. Chadwick and A. Otenko. The PERMIS X.509 role-based privilege management infrastructure. In Proc. of SACMAT'02, pages 135-140. ACM Press, 2002.
-
(2002)
Proc. of SACMAT'02
, pp. 135-140
-
-
Chadwick, D.W.1
Otenko, A.2
-
6
-
-
84944048132
-
The Ponder policy specification language
-
Springer
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In Proc. of POLICY'01, pages 18-38. Springer, 2001.
-
(2001)
Proc. of POLICY'01
, pp. 18-38
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
7
-
-
37849002157
-
Security-by-contract: Toward a semantics for digital signatures on mobile code
-
Springer-Verlag
-
N. Dragoni, F. Massacci, K. Naliuka, and I. Siahaan. Security-by- contract: Toward a semantics for digital signatures on mobile code. In Proc. of EuroPKI'07, pages 297-312. Springer-Verlag, 2007.
-
(2007)
Proc. of EuroPKI'07
, pp. 297-312
-
-
Dragoni, N.1
Massacci, F.2
Naliuka, K.3
Siahaan, I.4
-
8
-
-
0003593599
-
-
September IETF RFC 2693
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI Certificate Theory, September 1999. IETF RFC 2693.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
9
-
-
37349029082
-
Towards contract-based testing of web services
-
Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004), of Elsevier Sci.
-
R. Heckel and M. Lohmann. Towards contract-based testing of web services. In Proc. of the Int. Workshop on Test and Analysis of Component Based Systems (TACoS 2004), volume 82 of ENTCS. Elsevier Sci., 2004.
-
(2004)
ENTCS
, vol.82
-
-
Heckel, R.1
Lohmann, M.2
-
11
-
-
33947544647
-
A negotiation scheme for access rights establishment in autonomic communication
-
H. Koshutanski and F. Massacci. A negotiation scheme for access rights establishment in autonomic communication. J. of Net. and Sys. Managment, 15(1):117-136, 2007.
-
(2007)
J. of Net. and Sys. Managment
, vol.15
, Issue.1
, pp. 117-136
-
-
Koshutanski, H.1
Massacci, F.2
-
12
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
ACM Press
-
J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. In Proc. of CCS'05, pages 46-57. ACM Press, 2005.
-
(2005)
Proc. of CCS'05
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
13
-
-
0347720836
-
An adaptive policy based framework for network services management
-
L. Lymberopoulos, E. Lupu, and M. Sloman. An adaptive policy based framework for network services management. J. of Net. and Sys. Managment, 11(3):277-303, 2003.
-
(2003)
J. of Net. and Sys. Managment
, vol.11
, Issue.3
, pp. 277-303
-
-
Lymberopoulos, L.1
Lupu, E.2
Sloman, M.3
-
14
-
-
34250616363
-
Access control enforcement for conversation-based web services
-
ACM Press
-
M. Mecella, M. Ouzzani, F. Paci, and E. Bertino. Access control enforcement for conversation-based web services. In Proc. of WWW'06, pages 257-266. ACM Press, 2006.
-
(2006)
Proc. of WWW'06
, pp. 257-266
-
-
Mecella, M.1
Ouzzani, M.2
Paci, F.3
Bertino, E.4
-
15
-
-
0000685151
-
Distributed rational decision making
-
G. Weiss, editor The MIT Press, Cambridge, Massachusetts
-
T. Sandholm. Distributed rational decision making. In G. Weiss, editor, Multiagent Systems, pages 201-259. The MIT Press, Cambridge, Massachusetts, 1999.
-
(1999)
Multiagent Systems
, pp. 201-259
-
-
Sandholm, T.1
-
16
-
-
33845533762
-
Automated trust negotiation
-
Technical report, US Patent and Trademark Office, IBM Corporation, patent application filed March 7, 2000
-
K. Seamons and W. Winsborough. Automated trust negotiation. Technical report, US Patent and Trademark Office, 2002. IBM Corporation, patent application filed March 7, 2000.
-
(2002)
-
-
Seamons, K.1
Winsborough, W.2
-
17
-
-
21644444136
-
Model-carrying code: A practical approach for safe execution of untrusted applications
-
ACM Press
-
R. Sekar, V. Venkatakrishnan, S. Basu, S. Bhatkar, and D. DuVarney. Model-carrying code: a practical approach for safe execution of untrusted applications. In Proc. of ACM SOSP'03., pages 15-28. ACM Press, 2003.
-
(2003)
Proc. of ACM SOSP'03
, pp. 15-28
-
-
Sekar, R.1
Venkatakrishnan, V.2
Basu, S.3
Bhatkar, S.4
DuVarney, D.5
-
19
-
-
35248824719
-
-
PhD thesis Univ. of Cambridge, Computer Laboratory, Technical report UCAM-CL-TR-608, ISSN 1476-2986
-
W. Yao. Trust management for widely distributed systems. PhD thesis, Univ. of Cambridge, Computer Laboratory, 2004. Technical report UCAM-CL-TR-608, ISSN 1476-2986.
-
(2004)
Trust Management for Widely Distributed Systems
-
-
Yao, W.1
-
20
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. TISSEC, 6(1):1-42, 2003.
-
(2003)
TISSEC
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|