-
3
-
-
0036871183
-
Negotiating trust on the web
-
November/December
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, November/December 2002. 6(6): pp. 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
5
-
-
1642327001
-
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.^CM Transactions on Information and System Security (TISSEC), 6(1), February 2003.
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.^CM Transactions on Information and System Security (TISSEC), 6(1), February 2003.
-
-
-
-
7
-
-
26444566795
-
Oblivious attribute certificates
-
rd Conference on Applied Cryptography and Network Security ACNS, of, Springer, June
-
rd Conference on Applied Cryptography and Network Security (ACNS), volume 3531 of Lecture Notes in Computer Science, Springer, June 2005. 301-317.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 301-317
-
-
Li, J.1
OACerts, N.L.2
-
9
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology: EUROCRYPT '01, of, Springer
-
J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology: EUROCRYPT '01, volume 2045 of Lecture Notes in Computer Science, Springer, 2001. 93-118.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
13
-
-
35248834606
-
Datalog with constraints: A foundation for trust management languages
-
Veronica D, Philip W, eds. Proc. of the 5th Int'l Symp. on Practical Aspects of Declarative Languages, Berlin, Heidelberg: Springer-Verlag
-
N. Li, J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In: Veronica D, Philip W, eds. Proc. of the 5th Int'l Symp. on Practical Aspects of Declarative Languages. LNCS 2562, Berlin, Heidelberg: Springer-Verlag, 2003. pp. 58-73.
-
(2003)
LNCS
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
17
-
-
85180810679
-
Advanced client/server authentication in TLS
-
Feb
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith. Advanced client/server authentication in TLS. In Network and Distributed System Security Symposium. Feb. 2002. pp. 203-214.
-
(2002)
Network and Distributed System Security Symposium
, pp. 203-214
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
21
-
-
0038148412
-
Unified scheme for resource protection in automated trust negotiation
-
IEEE Computer Society Press, May
-
T. Yu and M. Winslett. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 2003. pp. 110-122.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
22
-
-
84893105662
-
Requirements for Policy languages for Trust Negotiation
-
IEEE Computer Society Press
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, L. Yu. Requirements for Policy languages for Trust Negotiation. In proceeding of 3rd IEEE Intel Workshop on Policies for Distributed Systems and Networks. IEEE Computer Society Press, 2002. pp. 68-79.
-
(2002)
proceeding of 3rd IEEE Intel Workshop on Policies for Distributed Systems and Networks
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
24
-
-
0004078695
-
-
IETF RFC 2704, Sep
-
M. Blaze, J. Feigenbaum, J. Ioannidis, A. D. Keromytis. The Key Note Trust-Management System (Version 2). IETF RFC 2704, Sep, 1999.
-
(1999)
The Key Note Trust-Management System (Version 2)
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
25
-
-
0035791550
-
On Specifying Security Police for Web Documents with an XML-based Languages
-
ACM Press
-
E. Bertino, S. Castano, E. Ferrari. On Specifying Security Police for Web Documents with an XML-based Languages. In proceeding of 6th ACM SACMAT, ACM Press, 2001, pp. 18-23.
-
(2001)
proceeding of 6th ACM SACMAT
, pp. 18-23
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
28
-
-
34547505017
-
-
A. Squicciarini 1, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham. PP-Trust-X : A System for Privacy Preserving Trust Negotiations. ACM Transactions on Information and System Security(TISSEC), ACM Press, 2007, 10(3). pp. 1-50.
-
A. Squicciarini 1, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham. PP-Trust-X : A System for Privacy Preserving Trust Negotiations. ACM Transactions on Information and System Security(TISSEC), ACM Press, 2007, 10(3). pp. 1-50.
-
-
-
-
29
-
-
0001832779
-
Access control meets public key infrastructure, Or: Assigning roles to strangers
-
IEEE CS Press
-
A. Herzberg, Mihaeli, Y. Mass, D. Naor, Y. Ravid. Access control meets public key infrastructure, Or: Assigning roles to strangers. IEEE Symposium on Security and Privacy. IEEE CS Press, 2000. pp. 230-243.
-
(2000)
IEEE Symposium on Security and Privacy
, pp. 230-243
-
-
Herzberg, A.1
Mihaeli2
Mass, Y.3
Naor, D.4
Ravid, Y.5
-
30
-
-
33646932243
-
A XACML-base Access Control Model for Web Service. Wireless Communications, Networking and Mobile
-
H. Tao. A XACML-base Access Control Model for Web Service. Wireless Communications, Networking and Mobile Computing, 2005. pp. 23-26.
-
(2005)
Computing
, pp. 23-26
-
-
Tao, H.1
-
31
-
-
33845935560
-
Privacy Preserving Trust Authorization Framework Using XACML
-
U. M. Mbanaso, G. S. Cooper, D. W. Chadwick, S. Proctor. Privacy Preserving Trust Authorization Framework Using XACML. in Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks WOWMOM '06, 2006.
-
(2006)
Proceedings of the 2006 International Symposium on World of Wireless, Mobile and Multimedia Networks WOWMOM '06
-
-
Mbanaso, U.M.1
Cooper, G.S.2
Chadwick, D.W.3
Proctor, S.4
|