-
1
-
-
60349129239
-
-
Trustbuilder: http://isrl.cs.byu.edu/software.htm.
-
Trustbuilder
-
-
-
2
-
-
70350388459
-
MotOrBAC 2: A security policy tool
-
Loctudy, France, October 13-17
-
Fabien Autrel, Frederic Cuppens, Nora Cuppens-Boulahia, and Celine Coma. MotOrBAC 2: a security policy tool. In Third joint conference on security in network architectures and security of information systems (SAR-SST08), Loctudy, France, October 13-17 2008.
-
(2008)
Third joint conference on security in network architectures and security of information systems (SAR-SST08)
-
-
Autrel, F.1
Cuppens, F.2
Cuppens-Boulahia, N.3
Coma, C.4
-
3
-
-
3142676730
-
Trust-X: A Peer-to-Peer Framework for Trust Establishment
-
Elisa Bertino, Elena Ferrari, and Anna Cinzia Squic-ciarini. Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans. Knowl. Data Eng., 16(7):827-842, 2004.
-
(2004)
IEEE Trans. Knowl. Data Eng
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Cinzia Squic-ciarini, A.3
-
5
-
-
49049096753
-
Context Ontology for Secure Interoperability
-
March 4-7
-
Celine Coma, Nora Cuppens-Boulahia, Frederic Cup-pens, and Ana Rosa Cavalli. Context Ontology for Secure Interoperability. In 3rd International Conference on Availability, Reliability and Security (ARES'08), March 4-7 2008.
-
(2008)
3rd International Conference on Availability, Reliability and Security (ARES'08)
-
-
Coma, C.1
Cuppens-Boulahia, N.2
Cup-pens, F.3
Rosa Cavalli, A.4
-
6
-
-
85025819125
-
-
Frederic Cuppens, Nora Cuppens-Boulahia, and Celine Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In Second International Conference on Information Systems Security (ICISS'06), December 2006.
-
Frederic Cuppens, Nora Cuppens-Boulahia, and Celine Coma. 020: Virtual Private Organizations to Manage Security Policy Interoperability. In Second International Conference on Information Systems Security (ICISS'06), December 2006.
-
-
-
-
8
-
-
34347273369
-
High level conflict management strategies in advanced access control models
-
Jully
-
Frederic Cuppens, Nora Cuppens-Boulahia, and Meriam Ben Ghorbel. High level conflict management strategies in advanced access control models. Electronic Notes in Theoretical Computer Science (ENTCS), 186(1571-0661):3-26, Jully 2007.
-
(2007)
Electronic Notes in Theoretical Computer Science (ENTCS)
, vol.186
, Issue.1571 -0661
, pp. 3-26
-
-
Cuppens, F.1
Cuppens-Boulahia, N.2
Ben Ghorbel, M.3
-
10
-
-
0345566262
-
Learning to match ontologies on the Semantic Web
-
AnHai Doan, Jayant Madhavan, Robin Dhamankar, Pedro Domingos, and Alon Halevy. Learning to match ontologies on the Semantic Web. The VLDB Journal, 12(4):303-319, 2003.
-
(2003)
The VLDB Journal
, vol.12
, Issue.4
, pp. 303-319
-
-
Doan, A.1
Madhavan, J.2
Dhamankar, R.3
Domingos, P.4
Halevy, A.5
-
12
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Alexandria, VA, USA, November 7-11
-
Jiangtao Li, Ninghui Li, and William H. Winsbor-ough. Automated trust negotiation using cryptographic credentials. In 12th ACM Conference on Computer and Communications Security, CCS 2005, pages 46-57, Alexandria, VA, USA, November 7-11 2005.
-
(2005)
12th ACM Conference on Computer and Communications Security, CCS
, pp. 46-57
-
-
Li, J.1
Li, N.2
Winsbor-ough, W.H.3
-
13
-
-
49049109541
-
Policy-based Access Control for Task Computing Using Rei
-
May
-
Ryusuke Masuoka, Mohinder Chopra, Zhexuan Song, Yannis K Labrou, Lalana Kagal, and Tim Finin. Policy-based Access Control for Task Computing Using Rei. In Policy Management for the Web Workshop, WWW 2005, pages 37-43, May 2005.
-
(2005)
Policy Management for the Web Workshop
, vol.WWW 2005
, pp. 37-43
-
-
Masuoka, R.1
Chopra, M.2
Song, Z.3
Labrou, Y.K.4
Kagal, L.5
Finin, T.6
-
15
-
-
0041848577
-
Microsoft .net passport: A security analysis
-
Rolf Oppliger. Microsoft .net passport: A security analysis. Computer, 36(7):29-35, 2003.
-
(2003)
Computer
, vol.36
, Issue.7
, pp. 29-35
-
-
Oppliger, R.1
-
16
-
-
84887853842
-
A community Authorization Service for Group Collaboration
-
Monterey, California, U.S.A, June 5-7
-
Laura Pearlman, Von Welch, Ian Foster, Carl Kessel-man, and Steven Tuecke. A community Authorization Service for Group Collaboration. In 3rd international workshop on Policies for Distributed Systems and Networks (POLICY'02), Monterey, California, U.S.A, June 5-7 2002.
-
(2002)
3rd international workshop on Policies for Distributed Systems and Networks (POLICY'02)
-
-
Pearlman, L.1
Welch, V.2
Foster, I.3
Kessel-man, C.4
Tuecke, S.5
-
17
-
-
0030086382
-
Role-Based Access Control Models
-
Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-Based Access Control Models. Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
18
-
-
4344696700
-
Kaos policy management for semantic webservices
-
Andrzej Uszok, Jeffrey M. Bradshaw, Matthew Johnson, Renia Jeffers, Austin Tate, Jeff Dalton, and Stuart Aitken. Kaos policy management for semantic webservices. IEEE Intelligent Systems, 19(4), 2004.
-
(2004)
IEEE Intelligent Systems
, vol.19
, Issue.4
-
-
Uszok, A.1
Bradshaw, J.M.2
Johnson, M.3
Jeffers, R.4
Tate, A.5
Dalton, J.6
Aitken, S.7
|