-
6
-
-
33645995393
-
Device-enabled authorization in the Grey system
-
Information Security: 8th International Conference, ISC 2005
-
L. Bauer, S. Garriss, J. M. McCune, M. K. Reiter, J. Rouse, and P. Rutenbar. Device-enabled authorization in the Grey system. In Information Security: 8th International Conference, ISC 2005 (Lecture Notes in Computer Science 3650), pages 63-81, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 63-81
-
-
Bauer, L.1
Garriss, S.2
McCune, J.M.3
Reiter, M.K.4
Rouse, J.5
Rutenbar, P.6
-
9
-
-
3142676730
-
Trust-X: A peer to peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A peer to peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827-842, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
12
-
-
33646048955
-
Greenpass: Decentralized, PKI-based authorization for wireless LANs
-
N. C. Goffee, S. H. Kim, S. Smith, P. Taylor, M. Zhao, and J. Marchesini. Greenpass: Decentralized, PKI-based authorization for wireless LANs. In Proceedings of the 3rd Annual PKI Research and Development Workshop, 2004.
-
(2004)
Proceedings of the 3rd Annual PKI Research and Development Workshop
-
-
Goffee, N.C.1
Kim, S.H.2
Smith, S.3
Taylor, P.4
Zhao, M.5
Marchesini, J.6
-
14
-
-
84968352943
-
Policy management using access control spaces
-
T. Jaeger, A. Edwards, and X. Zhang. Policy management using access control spaces. ACM Transaction on Information and System Security, 6(3):327-364, 2003.
-
(2003)
ACM Transaction on Information and System Security
, vol.6
, Issue.3
, pp. 327-364
-
-
Jaeger, T.1
Edwards, A.2
Zhang, X.3
-
18
-
-
34248368977
-
Minerals: Using data mining to detect router misconfigurations
-
F. Le, S. Lee, T. Wong, H. S. Kim, and D. Newcomb. Minerals: Using data mining to detect router misconfigurations. In MineNet '06: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data, pages 293-298, 2006.
-
(2006)
MineNet '06: Proceedings of the 2006 SIGCOMM Workshop on Mining Network Data
, pp. 293-298
-
-
Le, F.1
Lee, S.2
Wong, T.3
Kim, H.S.4
Newcomb, D.5
-
21
-
-
0012408597
-
SDSI-A simple distributed security Infrastructure
-
Presented at, April
-
R. L. Rivest and B. Lampson. SDSI-A simple distributed security Infrastructure. Presented at CRYPTO'96 Rumpsession, April 1996.
-
(1996)
CRYPTO'96 Rumpsession
-
-
Rivest, R.L.1
Lampson, B.2
-
22
-
-
0030086382
-
Role-based access control models
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
26
-
-
33751028760
-
FIREMAN: A toolkit for FIREwall modeling and ANalysis
-
L. Yuan, J. Mai, Z. Su, H. Chen, C.-N. Chuah, and P. Mohapatra. FIREMAN: A toolkit for FIREwall modeling and ANalysis. In Proceedings of the 2006 IEEE Symposium on Security & Privacy, 2006.
-
(2006)
Proceedings of the 2006 IEEE Symposium on Security & Privacy
-
-
Yuan, L.1
Mai, J.2
Su, Z.3
Chen, H.4
Chuah, C.-N.5
Mohapatra, P.6
|