-
1
-
-
0029700344
-
Decentralized Trust Management
-
IEEE CS Press
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized Trust Management," Proc. 17th Symp. Security and Privacy, IEEE CS Press, 1996, pp. 164-173.
-
(1996)
Proc. 17th Symp. Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
2
-
-
84958048748
-
Compliance Checking in the PolicyMaker Trust-Management System
-
Proc. Financial Cryptography 98, Springer
-
M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust-Management System," Proc. Financial Cryptography 98, LNCS 1465, Springer, 1998, pp. 254-274.
-
(1998)
LNCS
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
4
-
-
4544378423
-
-
S. Ioannidis et al., Design and Implementation of Virtual Private Services, Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
-
S. Ioannidis et al., "Design and Implementation of Virtual Private Services," Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
-
-
-
-
5
-
-
61449188272
-
-
S. Ioannidis, Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments, doctoral dissertation, University of Pennsylvania, 2005.
-
S. Ioannidis, "Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments," doctoral dissertation, University of Pennsylvania, 2005.
-
-
-
-
6
-
-
24944442759
-
Experience with the KeyNote Trust Management System: Applications and Future Directions
-
M. Blaze, J. Ioannidis, and A.D. Keromytis, "Experience with the KeyNote Trust Management System: Applications and Future Directions," Proc. 1st Int'l Conf. Trust Management, 2003; http://nsl.cs.columbia.edu/projects/gridlock/newkeynote.pdf.
-
(2003)
Proc. 1st Int'l Conf. Trust Management
-
-
Blaze, M.1
Ioannidis, J.2
Keromytis, A.D.3
-
7
-
-
3042617182
-
A Quantitative Study of Firewall Configuration Errors
-
June
-
A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, June 2004, pp. 62-67.
-
(2004)
Computer
, pp. 62-67
-
-
Wool, A.1
-
9
-
-
84942257511
-
Proc. 3rdDARPA Information Survivability Conf. and Exposition
-
DISCEX III
-
A.D. Keromytis et al., "The Strongman Architecture," Proc. 3rdDARPA Information Survivability Conf. and Exposition (DISCEX III), 2003; www1.cs.columbia.edu/~angelos/Papers/strongman.pdf.
-
(2003)
-
-
Keromytis, A.D.1
-
10
-
-
85084164032
-
Automated Response Using System-Call Delays
-
Usenix
-
A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," Proc. 9th Usenix Security Symposium, Usenix, 2000; www.csd.uoc.gr/~hy558/papers/somayaji-00automated.pdf.
-
(2000)
Proc. 9th Usenix Security Symposium
-
-
Somayaji, A.1
Forrest, S.2
-
11
-
-
33745469273
-
Towards Collaborative Security and P2P Intrusion Detection
-
IAW, IEEE Press
-
M.E. Locasto et al., "Towards Collaborative Security and P2P Intrusion Detection," Proc. 6th Ann. IEEE SMC Information Assurance Workshop (IAW), IEEE Press, 2005, pp. 333-339.
-
(2005)
Proc. 6th Ann. IEEE SMC Information Assurance Workshop
, pp. 333-339
-
-
Locasto, M.E.1
|