-
1
-
-
57049139376
-
-
URL: Health insurance portability and accountability act. Web Site (August 1996), http://www.hhs.gov/ocr/hipaa/
-
URL: Health insurance portability and accountability act. Web Site (August 1996), http://www.hhs.gov/ocr/hipaa/
-
-
-
-
3
-
-
33745792729
-
PeerAccess: A logic for distributed authorization
-
Alexandria, VA, pp
-
Winslett, M., Zhang, C.C., Bonatti, P.A.: PeerAccess: a logic for distributed authorization. In: 12th ACM Conference on Computer and Communications Security, Alexandria, VA, pp. 168-179 (2005)
-
(2005)
12th ACM Conference on Computer and Communications Security
, pp. 168-179
-
-
Winslett, M.1
Zhang, C.C.2
Bonatti, P.A.3
-
4
-
-
84939548725
-
-
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (January 2000)
-
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (January 2000)
-
-
-
-
5
-
-
0036871183
-
The TrustBuilder architecture for trust negotiation
-
Winslett, M., Yu, T., Seamons, K.E., Hess, A., Jacobson, J., Jarvis, R., Smith, B., Yu, L.: The TrustBuilder architecture for trust negotiation. IEEE Internet Computing 6(6) (2002)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
6
-
-
12844287351
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium. (2004)
-
(2004)
European Semantic Web Symposium
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.4
Winslett, M.5
-
9
-
-
62349090353
-
-
Li, N., Mitchell, J.: RT: A role-based trust-management framework. In: Third DARPA Information Survivability Conference and Exposition (April 2003)
-
Li, N., Mitchell, J.: RT: A role-based trust-management framework. In: Third DARPA Information Survivability Conference and Exposition (April 2003)
-
-
-
-
10
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symposium on Security and Privacy (2001)
-
(2001)
IEEE Symposium on Security and Privacy
-
-
Jim, T.1
-
12
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
San Francisco, CA April
-
Seamons, K., Winslett, M., Yu, T., Yu, L., Jarvis, R.: Protecting privacy during on-line trust negotiation. In: 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA (April 2002)
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
13
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6( 1) (2003)
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, pp. 1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
14
-
-
13244299177
-
Collaborative automated trust negotiation in peer-to-peer systems
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Ye, S., Makedon, F., Ford, J.: Collaborative automated trust negotiation in peer-to-peer systems. In: 4th International Conference on Peer-to-Peer Computing, Washington, DC, USA, pp. 108-115. IEEE Computer Society, Los Alamitos (2004)
-
(2004)
4th International Conference on Peer-to-Peer Computing
, pp. 108-115
-
-
Ye, S.1
Makedon, F.2
Ford, J.3
-
15
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering 16(7), 827-842 (2004)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
16
-
-
0034428960
-
Policy-directed certificate retrieval
-
Gunter, C.A., Jim, T.: Policy-directed certificate retrieval. Software Practice and Experience 30(15), 1609-1640 (2000)
-
(2000)
Software Practice and Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
17
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
February
-
Li, N., Winsborough, W., Mitchell, J.: Distributed credential chain discovery in trust management. Journal of Computer Security 11(1) (February 2003)
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
18
-
-
85016316172
-
Distributed credential chain discovery in trust management with parameterized roles and constraints (short paper)
-
Mao, Z., Li, N., Winsborough, W.H.: Distributed credential chain discovery in trust management with parameterized roles and constraints (short paper). In: International Conference on Information and Communications Security, pp. 159-173 (2006)
-
(2006)
International Conference on Information and Communications Security
, pp. 159-173
-
-
Mao, Z.1
Li, N.2
Winsborough, W.H.3
-
20
-
-
38049063981
-
Efficient proving for practical distributed access-control systems
-
Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
-
Bauer, L., Garriss, S., Reiter, M.K.: Efficient proving for practical distributed access-control systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 19-37. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4734
, pp. 19-37
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
21
-
-
0041524661
-
Delegation Logic: A Logic-based Approach to Distributed Authorization
-
February
-
Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic: A Logic-based Approach to Distributed Authorization. ACM Transactions on Information and System Security 6(1) (February 2003)
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, Issue.1
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
23
-
-
0032047565
-
Concensus: Multi-party negotiation support for conflict resolution in concurrent engineering design
-
March
-
Cooper, S., Taleb-Bendiab, A.: Concensus: multi-party negotiation support for conflict resolution in concurrent engineering design. Journal of Intelligent Manufacturing 9(2) (March 1998)
-
(1998)
Journal of Intelligent Manufacturing
, vol.9
, Issue.2
-
-
Cooper, S.1
Taleb-Bendiab, A.2
-
24
-
-
34547480474
-
Multi-party negotiation when agents have subjective estimates of bargaining powers
-
September
-
Querou, N., Rio, P., Tidball, M.: Multi-party negotiation when agents have subjective estimates of bargaining powers. Journal of Group Decision and Negotiation 16(5) (September 2007)
-
(2007)
Journal of Group Decision and Negotiation
, vol.16
, Issue.5
-
-
Querou, N.1
Rio, P.2
Tidball, M.3
-
25
-
-
44049096857
-
Trust management in P2P systems using standard TuLiP
-
Trondheim, Norway, May
-
Czenko, M.R., Doumen, J.M., Etalle, S.: Trust management in P2P systems using standard TuLiP. In: 2008 Joint iTrust and PST Conferences on Privacy, Trust Management and Security, Trondheim, Norway, May 2008, pp. 1-16 (2008)
-
(2008)
2008 Joint iTrust and PST Conferences on Privacy, Trust Management and Security
, pp. 1-16
-
-
Czenko, M.R.1
Doumen, J.M.2
Etalle, S.3
-
26
-
-
57049117969
-
Multiparty trust negotiation: A new approach to distributed authorization
-
Technical Report UIUCDCS-R-2008-2976, Department of Computer Science, University of Illinois at Urbana-Champaign
-
Zhang, C.C., Winslett, M.: Multiparty trust negotiation: A new approach to distributed authorization. Technical Report UIUCDCS-R-2008-2976, Department of Computer Science, University of Illinois at Urbana-Champaign (2008)
-
(2008)
-
-
Zhang, C.C.1
Winslett, M.2
-
28
-
-
84893110297
-
-
Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: IEEE International Workshop on Policies for Distributed Systems and Networks (April 2002)
-
Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: IEEE International Workshop on Policies for Distributed Systems and Networks (April 2002)
-
-
-
-
30
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
Frikken, K.B., Atallah, M.J., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers 55(10), 1259-1270 (2006)
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.B.1
Atallah, M.J.2
Li, J.3
-
31
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Li, J., Li, N., Winsborough, W.H.: Automated trust negotiation using cryptographic credentials. In: ACM Conference on Computer and Communications Security, pp. 46-57 (2005)
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
|