-
1
-
-
0029700344
-
Decentralized trust management
-
Washington, DC, USA: IEEE Computer Society
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 1996, p. 164.
-
(1996)
SP '96: Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
2
-
-
0007783431
-
Keynote: Trust management for public-key infrastructures (position paper)
-
London, UK: Springer-Verlag
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "Keynote: Trust management for public-key infrastructures (position paper)," in Proceedings of the 6th International Workshop on Security Protocols. London, UK: Springer-Verlag, 1999, pp. 59-63.
-
(1999)
Proceedings of the 6th International Workshop on Security Protocols
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
3
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Washington, DC, USA: IEEE Computer Society
-
A. Herzberg, Y. Mass, J. Michaeli, Y. Ravid, and D. Naor, "Access control meets public key infrastructure, or: Assigning roles to strangers," in SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2000, p. 2.
-
(2000)
SP '00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
Naor, D.5
-
4
-
-
0036085965
-
Design of a role-based trust-management framework
-
Washington, DC, USA: IEEE Computer Society
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Design of a role-based trust-management framework," in SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2002, p. 114.
-
(2002)
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
5
-
-
0036362188
-
An evidential model of distributed reputation management
-
New York, NY, USA: ACM Press
-
B. Yu and M. P. Singh, "An evidential model of distributed reputation management," in AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems. New York, NY, USA: ACM Press, 2002, pp. 294-301.
-
(2002)
AAMAS '02: Proceedings of the first international joint conference on Autonomous agents and multiagent systems
, pp. 294-301
-
-
Yu, B.1
Singh, M.P.2
-
6
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
New York, NY, USA: ACM Press
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, "The eigentrust algorithm for reputation management in p2p networks," in WWW '03: Proceedings of the 12th international conference on World Wide Web. New York, NY, USA: ACM Press, 2003, pp. 640-651.
-
(2003)
WWW '03: Proceedings of the 12th international conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
7
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
New York, NY, USA: ACM Press
-
J. Li, N. Li, and W. H. Winsborough, "Automated trust negotiation using cryptographic credentials," in CCS '05: Proceedings of the 12th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2005, pp. 46-57.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
8
-
-
84893110297
-
Towards practical automated trust negotiation
-
Washington, DC, USA: IEEE Computer Society
-
W. Winsborough and N. Li, "Towards practical automated trust negotiation," in POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02). Washington, DC, USA: IEEE Computer Society, 2002, p. 92.
-
(2002)
POLICY '02: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
, pp. 92
-
-
Winsborough, W.1
Li, N.2
-
9
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head, SC: IEEE Press, 1
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones, "Automated trust negotiation," in DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00, vol. 1. Hilton Head, SC: IEEE Press, 2000, pp. 88-102 vol. 1.
-
(2000)
DARPA Information Survivability Conference and Exposition, 2000. DISCEX '00
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
10
-
-
84957811521
-
Protecting privacy during on-line trust negotiation
-
Privacy Enhancing Technologies, R. Dingledine and P. F. Syverson, Eds, Springer
-
K. E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Jarvis, "Protecting privacy during on-line trust negotiation." in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, R. Dingledine and P. F. Syverson, Eds., vol. 2482. Springer, 2002, pp. 129-143.
-
(2002)
ser. Lecture Notes in Computer Science
, vol.2482
, pp. 129-143
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
11
-
-
50249147811
-
-
R. Housley, W. Polk, W. Ford, and D. Solo, RFC3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, IETF RFC Publication, April 2002. [Online]. Available: http://www.ietf.org/rfc/rfc3280.txt
-
R. Housley, W. Polk, W. Ford, and D. Solo, "RFC3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," IETF RFC Publication, April 2002. [Online]. Available: http://www.ietf.org/rfc/rfc3280.txt
-
-
-
-
12
-
-
0038687775
-
Design and implementation of the idemix anonymous credential system
-
New York, NY, USA: ACM Press
-
J. Camenisch and E. V. Herreweghen, "Design and implementation of the idemix anonymous credential system," in CCS '02: Proceedings of the 9th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2002, pp. 21-30.
-
(2002)
CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
, pp. 21-30
-
-
Camenisch, J.1
Herreweghen, E.V.2
-
13
-
-
84945135810
-
An efficient system for nontransferable anonymous credentials with optional anonymity revocation
-
EUROCRYPT, B. Pfitzmann, Ed, Springer
-
J. Camenisch and A. Lysyanskaya, "An efficient system for nontransferable anonymous credentials with optional anonymity revocation." in EUROCRYPT, ser. Lecture Notes in Computer Science, B. Pfitzmann, Ed., vol. 2045. Springer, 2001, pp. 93-118.
-
(2001)
ser. Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
14
-
-
24344462707
-
Privacy-preserving trust negotiations
-
Privacy Enhancing Technologies, D. Martin and A. Serjantov, Eds, Springer
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, "Privacy-preserving trust negotiations." in Privacy Enhancing Technologies, ser. Lecture Notes in Computer Science, D. Martin and A. Serjantov, Eds., vol. 3424. Springer, 2004, pp. 283-301.
-
(2004)
ser. Lecture Notes in Computer Science
, vol.3424
, pp. 283-301
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
15
-
-
26444566795
-
Oacerts: Oblivious attribute certificates
-
ACNS, J. Ioannidis, A. D. Keromytis, and M. Yung, Eds
-
J. Li and N. Li, "Oacerts: Oblivious attribute certificates." in ACNS, ser. Lecture Notes in Computer Science, J. Ioannidis, A. D. Keromytis, and M. Yung, Eds., vol. 3531, 2005, pp. 301-317.
-
(2005)
ser. Lecture Notes in Computer Science
, vol.3531
, pp. 301-317
-
-
Li, J.1
Li, N.2
-
16
-
-
84957680703
-
Zero-knowledge proofs for finite field arithmetic; or: Can zero-knowledge be for free?
-
CRYPTO, H. Krawczyk, Ed, Springer
-
R. Cramer and I. Damgård, "Zero-knowledge proofs for finite field arithmetic; or: Can zero-knowledge be for free?" in CRYPTO, ser. Lecture Notes in Computer Science, H. Krawczyk, Ed., vol. 1462. Springer, 1998, pp. 424-441.
-
(1998)
ser. Lecture Notes in Computer Science
, vol.1462
, pp. 424-441
-
-
Cramer, R.1
Damgård, I.2
-
17
-
-
1642394295
-
Hidden credentials
-
New York, NY, USA: ACM Press
-
J. E. Holt, R. W. Bradshaw, K. E. Seamons, and H. Oman, "Hidden credentials," in WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM Press, 2003, pp. 1-8.
-
(2003)
WPES '03: Proceedings of the 2003 ACM workshop on Privacy in the electronic society
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Oman, H.4
-
18
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
New York, NY, USA: ACM Press
-
R. W. Bradshaw, J. E. Holt, and K. E. Seamons, "Concealing complex policies with hidden credentials," in CCS '04: Proceedings of the 11th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2004, pp. 146-157.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 146-157
-
-
Bradshaw, R.W.1
Holt, J.E.2
Seamons, K.E.3
-
19
-
-
1142293102
-
Oblivious signature-based envelope
-
New York, NY, USA: ACM Press
-
N. Li, W. Du, and D. Boneh, "Oblivious signature-based envelope," in PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing. New York, NY, USA: ACM Press, 2003, pp. 182-189.
-
(2003)
PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing
, pp. 182-189
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
20
-
-
0036871183
-
Negotiating trust on the web
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "Negotiating trust on the web." IEEE Internet Computing, vol. 6, no. 6, pp. 30-37, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
21
-
-
84942433458
-
Trustbuilder: Negotiating trust in dynamic coalitions
-
IEEE Press, 2
-
K. E. Seamons, T. Chan, E. Child, M. Halcrow, A. Hess, J. Holt, J. Jacobson, R. Jarvis, A. Patty, B. Smith, T. Sundelin, and Y. Lina, "Trustbuilder: negotiating trust in dynamic coalitions," in DARPA Information Survivability Conference and Exposition, 2003., vol. 2. IEEE Press, 2003, pp. 49-51 vol. 2.
-
(2003)
DARPA Information Survivability Conference and Exposition, 2003
, vol.2
, pp. 49-51
-
-
Seamons, K.E.1
Chan, T.2
Child, E.3
Halcrow, M.4
Hess, A.5
Holt, J.6
Jacobson, J.7
Jarvis, R.8
Patty, A.9
Smith, B.10
Sundelin, T.11
Lina, Y.12
-
22
-
-
85180810679
-
Advanced client/server authentication in tls
-
The Internet Society
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith, "Advanced client/server authentication in tls." in NDSS. The Internet Society, 2002.
-
(2002)
NDSS
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
24
-
-
3142676730
-
Trust-x: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, "Trust-x: A peer-to-peer framework for trust establishment." IEEE Trans. Knowl. Data Eng., vol. 16, no. 7, pp. 827-842, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
|