-
1
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
SP 00, IEEE CS Press
-
A. Herzberg et al., "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," Proc. 2000 IEEE Symp. Security and Privacy (SP 00), IEEE CS Press, 2000, pp. 2-14.
-
(2000)
Proc. 2000 IEEE Symp. Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
-
3
-
-
3142676730
-
Trust-X: A Peer-to-Peer Framework for Trust Establishment
-
July
-
E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge and Data Sharing, July 2004, pp. 827-842.
-
(2004)
IEEE Trans. Knowledge and Data Sharing
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
4
-
-
1642327001
-
Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation
-
Feb
-
T. Yu, M. Winslett, and K.E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation," ACM Trans. Information and System Security, Feb. 2003, pp. 1-42.
-
(2003)
ACM Trans. Information and System Security
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
5
-
-
0036871183
-
Negotiating Trust on the Web
-
Nov./Dec
-
M. Winslett et al., "Negotiating Trust on the Web," IEEE Internet Computing, Nov./Dec. 2002, pp. 30-37.
-
(2002)
IEEE Internet Computing
, pp. 30-37
-
-
Winslett, M.1
-
6
-
-
85056545124
-
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation
-
Internet Society
-
K.E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation," Proc. 2001 Network and Distributed System Security Symp. (NDSS 01), Internet Society, 2001; www.isoc.org/isoc/conferences/ndss/01/ papers/seamons.pdf.
-
(2001)
Proc. 2001 Network and Distributed System Security Symp. (NDSS 01)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
7
-
-
19944408999
-
Trust-Serv: Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services
-
ACM Press
-
H. Skogsrud, B. Benatallah, and F. Casati, "Trust-Serv: Model-Driven Lifecycle Management of Trust Negotiation Policies for Web Services," Proc. 13th Int'l Conf. World Wide Web (WWW 04), ACM Press, 2004, pp. 53-62.
-
(2004)
Proc. 13th Int'l Conf. World Wide Web (WWW 04)
, pp. 53-62
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
8
-
-
24344462707
-
Privacy-Preserving Trust Negotiations
-
Privacy Enhancing Technologies, Springer
-
E. Bertino, E. Ferrari, and A.C. Squicciarini, "Privacy-Preserving Trust Negotiations," Privacy Enhancing Technologies, LNCS 3424, Springer, 2004, pp. 283-301.
-
(2004)
LNCS
, vol.3424
, pp. 283-301
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
9
-
-
1142301944
-
Model-Driven Trust Negotiation for Web Services
-
Nov./Dec
-
H. Skogsrud, B. Benatallah, and F. Casati, "Model-Driven Trust Negotiation for Web Services," IEEE Internet Computing, Nov./Dec. 2003, pp. 42-52.
-
(2003)
IEEE Internet Computing
, pp. 42-52
-
-
Skogsrud, H.1
Benatallah, B.2
Casati, F.3
-
10
-
-
34548793482
-
Managing Impacts of Security Protocol Changes in Service-Oriented Applications
-
IEEE CS Press
-
H. Skogsrud et al., "Managing Impacts of Security Protocol Changes in Service-Oriented Applications," Proc. 29th Int'l Conf. Software Engineering (ICSE 07), IEEE CS Press, 2007, pp. 468-477.
-
(2007)
Proc. 29th Int'l Conf. Software Engineering (ICSE 07)
, pp. 468-477
-
-
Skogsrud, H.1
-
11
-
-
84992227458
-
Proposed NIST Standard for Role-Based Access Control
-
Aug
-
D.F. Ferraiolo et al., "Proposed NIST Standard for Role-Based Access Control," ACM Trans. Information and System Security, Aug. 2001, pp. 224-274.
-
(2001)
ACM Trans. Information and System Security
, pp. 224-274
-
-
Ferraiolo, D.F.1
-
12
-
-
85135977047
-
Trust-Serv: A Lightweight Trust Negotiation Service
-
VLDB Endowment
-
H. Skogsrud et al., "Trust-Serv: A Lightweight Trust Negotiation Service," Proc. 30th Int'l Conf. Very Large Databases (VLDB 04), VLDB Endowment, 2004, pp. 1329-1332.
-
(2004)
Proc. 30th Int'l Conf. Very Large Databases (VLDB 04)
, pp. 1329-1332
-
-
Skogsrud, H.1
-
13
-
-
1142273446
-
PFIRES: A Policy Framework for Information Security
-
July
-
J. Rees et al., "PFIRES: A Policy Framework for Information Security," Comm. ACM, July 2003, pp. 101-106.
-
(2003)
Comm. ACM
, pp. 101-106
-
-
Rees, J.1
-
14
-
-
33745471209
-
Model Driven Security: From UML Models to Access Control Infrastructures
-
Jan
-
D. Basin, J. Doser, and T. Lodderstedt, "Model Driven Security: From UML Models to Access Control Infrastructures," ACM Trans. Software Eng. and Methodology, Jan. 2006, pp. 39-91.
-
(2006)
ACM Trans. Software Eng. and Methodology
, pp. 39-91
-
-
Basin, D.1
Doser, J.2
Lodderstedt, T.3
|