-
2
-
-
70450258571
-
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. Dept. of Computer Engineering Technical Report 99-15, Chalmers University of Technology, Mar. 2000.
-
S. Axelsson. Intrusion detection systems: A survey and taxonomy. Dept. of Computer Engineering Technical Report 99-15, Chalmers University of Technology, Mar. 2000.
-
-
-
-
5
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
July
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-X: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827-842, July 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
7
-
-
84904350804
-
A hybrid pki model: Application to secure mediation
-
J. Biskup and Y. Karabulut. A hybrid pki model: Application to secure mediation. In DBSec, pages 271-282, 2002.
-
(2002)
DBSec
, pp. 271-282
-
-
Biskup, J.1
Karabulut, Y.2
-
8
-
-
0029700344
-
Decentralized Trust Management
-
Oakland, CA, May
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In IEEE Symposium on Security and Privacy, Oakland, CA, May 1996.
-
(1996)
IEEE Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
84958048748
-
Compliance checking in the PolicyMaker trust management system
-
Proceedings of the Second International Conference on Financial Cryptography, number in, Springer, Feb
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the PolicyMaker trust management system. In Proceedings of the Second International Conference on Financial Cryptography, number 1465 in Lecture Notes in Computer Science, pages 254-274. Springer, Feb. 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
10
-
-
33750051130
-
An integration of reputation-based and policy-based trust management
-
Galway, Ireland, Nov
-
P. Bonatti, C. Duma, D. Olmedilla, and N. Shahmehri. An integration of reputation-based and policy-based trust management. In Sematic Web and Policy Workshop, Galway, Ireland, Nov. 2005.
-
(2005)
Sematic Web and Policy Workshop
-
-
Bonatti, P.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
13
-
-
85001842932
-
A decentralized security framework for web-based social networks
-
B. Carminati, E. Ferrari, and A. Perego. A decentralized security framework for web-based social networks. International Journal of Information Security and Privacy, 2(4):22-53, 2008.
-
(2008)
International Journal of Information Security and Privacy
, vol.2
, Issue.4
, pp. 22-53
-
-
Carminati, B.1
Ferrari, E.2
Perego, A.3
-
14
-
-
77953066525
-
Choosing reputable servents in a p2p network
-
F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In Proceedings of the 11th international conference on World Wide Web, pages 376-386, 2002.
-
(2002)
Proceedings of the 11th international conference on World Wide Web
, pp. 376-386
-
-
Cornelli, F.1
Damiani, E.2
di Vimercati, S.D.C.3
Paraboschi, S.4
Samarati, P.5
-
15
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of the 9th ACM conference on Computer and communications security, pages 207-216, 2002.
-
(2002)
Proceedings of the 9th ACM conference on Computer and communications security
, pp. 207-216
-
-
Damiani, E.1
di Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
16
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers, 55(10):1259-1270, 2006.
-
(2006)
IEEE Transactions on Computers
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
17
-
-
35048881895
-
Social capital, community trust, and e-government services
-
Pisa, Italy, May
-
M. Grimsley, A. Meehan, G. Green, and B. Stafford. Social capital, community trust, and e-government services. In International Conference on Trust Management, Pisa, Italy, May 2003.
-
(2003)
International Conference on Trust Management
-
-
Grimsley, M.1
Meehan, A.2
Green, G.3
Stafford, B.4
-
20
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Josang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. Decis. Support Syst., 43(2):618-644, 2007.
-
(2007)
Decis. Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
22
-
-
52149090525
-
D-foaf: Distributed identity management with access rights delegation
-
Beijing, China, Sept
-
S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H.-C. Choi. D-foaf: Distributed identity management with access rights delegation. In Asian Semantic Web Conference, Beijing, China, Sept. 2006.
-
(2006)
Asian Semantic Web Conference
-
-
Kruk, S.1
Grzonkowski, S.2
Gzella, A.3
Woroniecki, T.4
Choi, H.-C.5
-
25
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J. C. Mitchell, and W. H. Winsborough. Beyond proof-of-compliance: security analysis in trust management. Journal of the ACM, 52(3):474-514, 2005.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
26
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
27
-
-
84870965272
-
-
Liberty alliance project, Dec. 2008
-
Liberty alliance project. Web Site, Dec. 2008. http://www.projectliberty. org/.
-
Web Site
-
-
-
30
-
-
0030086382
-
Role-based access control models
-
Feb
-
R. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, Feb. 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
31
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
June
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu. Requirements for policy languages for trust negotiation. In IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY), June 2002.
-
(2002)
IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
32
-
-
70450266355
-
-
Shibboleth Project
-
Shibboleth Project. http://shibboleth.internet2.edu/.
-
-
-
|