-
1
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
Washington, DC, USA, IEEE Computer Society
-
P.-C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 222-230, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 222-230
-
-
Cheng, P.-C.1
Rohatgi, P.2
Keser, C.3
Karger, P.A.4
Wagner, G.M.5
Reninger, A.S.6
-
2
-
-
35048872361
-
Parameterized authentication
-
M. J. Covington, M. Ahamad, I. A. Essa, and H. Venkateswaran. Parameterized authentication. In Proceedings of the 9th European Symposium on Research Computer Security (ESORICS), pages 276-292, 2004.
-
(2004)
Proceedings of the 9th European Symposium on Research Computer Security (ESORICS)
, pp. 276-292
-
-
Covington, M.J.1
Ahamad, M.2
Essa, I.A.3
Venkateswaran, H.4
-
4
-
-
85047685314
-
Communicating throughout Katrina: Competing and complementary conceptual lenses on crisis communication
-
November- December
-
J. L. Garnett and A. Kouzmin. Communicating throughout Katrina: Competing and complementary conceptual lenses on crisis communication. Public Administration Review, Special Issue, November- December: 170 - 187, 2007.
-
(2007)
Public Administration Review, Special Issue
, vol.187
, pp. 170
-
-
Garnett, J.L.1
Kouzmin, A.2
-
5
-
-
62749093615
-
-
HORIZONTAL INTEGRATION: Broader access models for realizing information dominance. Technical report, MITRE Corporation, 2004. JASON Program Office. http://www.fas.org/irp/agency/dod/jason/classpol.pdf.
-
HORIZONTAL INTEGRATION: Broader access models for realizing information dominance. Technical report, MITRE Corporation, 2004. JASON Program Office. http://www.fas.org/irp/agency/dod/jason/classpol.pdf.
-
-
-
-
6
-
-
62749089249
-
-
A. J0sang. Artificial reasoning with subjective logic. In Proceedings of Australian Workshop on Commonsense Reasoning, 1997. In conjunction with the Tenth Australian Joint Conference on Artificial Intelligence.
-
A. J0sang. Artificial reasoning with subjective logic. In Proceedings of Australian Workshop on Commonsense Reasoning, 1997. In conjunction with the Tenth Australian Joint Conference on Artificial Intelligence.
-
-
-
-
7
-
-
33748036055
-
Redirection policies for mission- based information sharing
-
New York, NY, USA, ACM
-
D. Keppler, V. Swarup, and S. Jajodia. Redirection policies for mission- based information sharing. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 210-218, New York, NY, USA, 2006. ACM.
-
(2006)
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
, pp. 210-218
-
-
Keppler, D.1
Swarup, V.2
Jajodia, S.3
-
8
-
-
84957803553
-
Confidence valuation in a public-key infrastructure based on uncertain evidence
-
Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography PKC '00, of, Springer
-
R. Kohlas and U. M. Maurer. Confidence valuation in a public-key infrastructure based on uncertain evidence. In Proceedings of the Third International Workshop on Practice and Theory in Public Key Cryptography (PKC '00), volume 1751 of Lecture Notes in Computer Science, pages 93-112. Springer, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1751
, pp. 93-112
-
-
Kohlas, R.1
Maurer, U.M.2
-
9
-
-
0028386809
-
Fuzzy systems: An overview
-
T. Munakata and Y. Jani. Fuzzy systems: An overview. In Communications of the ACM, volume 37 (3), pages 69 - 76, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.3
, pp. 69-76
-
-
Munakata, T.1
Jani, Y.2
-
11
-
-
5544326539
-
Trust for ubiquitous, transparent collaboration
-
B. Shand, N. Dimmock, and J. Bacon. Trust for ubiquitous, transparent collaboration. Wirel. Netw., 10(6):711-721, 2004.
-
(2004)
Wirel. Netw
, vol.10
, Issue.6
, pp. 711-721
-
-
Shand, B.1
Dimmock, N.2
Bacon, J.3
-
12
-
-
62749156022
-
Automatic verification of distributed and layered security policy implementation using the access policy tool
-
S. Singh, D. M. Nicol, and W. H. Sanders. Automatic verification of distributed and layered security policy implementation using the access policy tool. In 3rd Midwest Security Workshop (MSW), 2006.
-
(2006)
3rd Midwest Security Workshop (MSW)
-
-
Singh, S.1
Nicol, D.M.2
Sanders, W.H.3
-
13
-
-
28844464697
-
Trusted grid computing with security binding and trust integration
-
S. Song, K. Hwang, and Y.-K. Kwok. Trusted grid computing with security binding and trust integration. J. Grid Comput., 3(1-2):53-73, 2005.
-
(2005)
J. Grid Comput
, vol.3
, Issue.1-2
, pp. 53-73
-
-
Song, S.1
Hwang, K.2
Kwok, Y.-K.3
-
17
-
-
78349255568
-
Point-based trust: Define how much privacy is worth
-
Proc. Int. Conf. on Information and Communications Security ICICS, of, Springer
-
D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Point-based trust: Define how much privacy is worth. In Proc. Int. Conf. on Information and Communications Security (ICICS), volume 4307 of LNCS, pages 190-209. Springer, 2006.
-
(2006)
LNCS
, vol.4307
, pp. 190-209
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
Tamassia, R.4
-
19
-
-
0028385414
-
Fuzzy logic, neural networks, and soft computing
-
L. A. Zadeh. Fuzzy logic, neural networks, and soft computing. In Communications of the ACM, volume 37 (3), pages 77 - 84, 1994.
-
(1994)
Communications of the ACM
, vol.37
, Issue.3
, pp. 77-84
-
-
Zadeh, L.A.1
|