-
2
-
-
63449120632
-
A formal security policy for an NHS electronic health record service
-
University of Cambridge Computer Laboratory, Mar
-
M. Y. Becker. A formal security policy for an NHS electronic health record service. Technical Report UCAM-CL-TR-628, University of Cambridge Computer Laboratory, Mar. 2005.
-
(2005)
Technical Report UCAM-CL-TR-628
-
-
Becker, M.Y.1
-
5
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
July
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16 (7):827-842, July 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
8
-
-
84958048748
-
Compliance checking in the PolicyMaker trust management system
-
number 1465 in Lecture Notes in Computer Science, Springer, Feb
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the Second International Conference on Financial Cryptography, number 1465 in Lecture Notes in Computer Science, pages 254-274. Springer, Feb. 1998.
-
(1998)
Proceedings of the Second International Conference on Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
11
-
-
0001843009
-
REFEREE: Trust management for web applications
-
Summer
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. REFEREE: Trust management for web applications. World Wide Web Journal, 2 (3):127-139, Summer 1997.
-
(1997)
World Wide Web Journal
, vol.2
, Issue.3
, pp. 127-139
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
12
-
-
84944048132
-
The Ponder policy specification language
-
number 1995 in Lecture Notes in Computer Science, Springer, Jan
-
N. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder policy specification language. In Proceedings of the Second IEEE Workshop on Policies for Distributed Systems and Networks (POLICY), number 1995 in Lecture Notes in Computer Science, pages 18-39. Springer, Jan. 2001.
-
(2001)
Proceedings of the Second IEEE Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 18-39
-
-
Damianou, N.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
13
-
-
38149127774
-
Rete: A fast algorithm for the many pattern/many object pattern match problem
-
C. L. Forgy. Rete: A fast algorithm for the many pattern/many object pattern match problem. Artificial Intelligence, 27 (3):219-227, 1985.
-
(1985)
Artificial Intelligence
, vol.27
, Issue.3
, pp. 219-227
-
-
Forgy, C.L.1
-
15
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the IEEE Symposium on Security and Privacy, pages 2-14, May 2000.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
17
-
-
77952346131
-
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
-
University of Illinois at Urbana Champaign Department of Computer Science, Oct
-
A. J. Lee and M. Winslett. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. Technical Report UIUCDCS-R-2007-2903, University of Illinois at Urbana Champaign Department of Computer Science, Oct. 2007.
-
(2007)
Technical Report UIUCDCS-R-2007-2903
-
-
Lee, A.J.1
Winslett, M.2
-
21
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
June
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In Proceedings of the Third IEEE Workshop on Policies for Distributed Systems and Networks (POLICY), pages 68-79, June 2002.
-
(2002)
Proceedings of the Third IEEE Workshop on Policies for Distributed Systems and Networks (POLICY)
, pp. 68-79
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
25
-
-
0036871183
-
Negotiating trust on the web
-
Nov./Dec
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, 6 (6):30-37, Nov./Dec. 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
27
-
-
78349255568
-
Point-based trust: Define how much privacy is worth
-
number 4307 in, Lecture Notes in Computer Science, Springer
-
D. Yao, K. Frikken, M. Atallah, and R. Tamassia. Point-based trust: Define how much privacy is worth. In Proceedings of the Eighth International Conference on Information and Communications Security (ICICS '06), number 4307 in Lecture Notes in Computer Science, pages 190-209. Springer, 2006.
-
(2006)
Proceedings of the Eighth International Conference on Information and Communications Security (ICICS '06)
, pp. 190-209
-
-
Yao, D.1
Frikken, K.2
Atallah, M.3
Tamassia, R.4
-
28
-
-
1642327001
-
Supporting structured credentials and sensitive policies throu gh interoperable strategies for automated trust negotiation
-
Feb
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies throu gh interoperable strategies for automated trust negotiation. A CM Transactions on Information and System Security, 6 (1), Feb. 2003.
-
(2003)
A CM Transactions on Information and System Security
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|