-
1
-
-
34247380764
-
Supporting location-based conditions in access control policies
-
Taipei, Taiwan, March
-
C.A. Ardagna, M. Cremonini, E. Damiani, S. De Capitani di Vimercati and P. Samarati, Supporting location-based conditions in access control policies, in: Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06), Taipei, Taiwan, March 2006, pp. 212-222.
-
(2006)
Proc. of the ACM Symposium on Information, Computer and Communications Security (ASIACCS'06)
, pp. 212-222
-
-
Ardagna, C.A.1
Cremonini, M.2
Damiani, E.3
De Vimercati Di Capitani, S.4
Samarati, P.5
-
2
-
-
48249091293
-
A privacy-aware access control system
-
C.A. Ardagna, M. Cremonini, S. De Capitani di Vimercati and P. Samarati, A privacy-aware access control system, Journal of Computer Security (JCS) 16(4) (2008), 369-392.
-
(2008)
Journal of Computer Security (JCS)
, vol.16
, Issue.4
, pp. 369-392
-
-
Ardagna, C.A.1
Cremonini, M.2
De Vimercati Di Capitani, S.3
Samarati, P.4
-
3
-
-
26444534381
-
Towards privacy-enhanced authorization policies and languages
-
Storrs, CA, USA, August
-
C.A. Ardagna, E. Damiani, S. De Capitani di Vimercati and P. Samarati, Towards privacy-enhanced authorization policies and languages, in: Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CA, USA, August 2005, pp. 16-27.
-
(2005)
Proc. of the 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security
, pp. 16-27
-
-
Ardagna, C.A.1
Damiani, E.2
De Vimercati Di Capitani, S.3
Samarati, P.4
-
4
-
-
34548037164
-
Managing privacy p in federated identity management
-
Fairfax, VA, USA, November
-
G.-J. Ahn and J. Lam, Managing privacy p in federated identity management, in: Proc. of the ACMWorkshop on Digital Identity Management, Fairfax, VA, USA, November 2005, pp. 28-36.
-
(2005)
Proc. of the ACMWorkshop on Digital Identity Management
, pp. 28-36
-
-
Ahn, G.-J.1
Lam, J.2
-
5
-
-
24944578141
-
-
Technical report, IBM Research
-
P. Ashley, S. Hada, G. Karjoth, C. Powers and M. Schunter, Enterprise privacy authorization language (EPAL 1.1), Technical report, IBM Research, 2003; http://www.zurich.ibm.com/security/ enterprise-privacy/epal.
-
(2003)
Enterprise Privacy Authorization Language (EPAL 1.1)
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Powers, C.4
Schunter, M.5
-
6
-
-
0037703469
-
E-P3P privacy policies and privacy authorization
-
Washington, DC, USA, November
-
P. Ashley, S. Hada, G. Karjoth and M. Schunter, E-P3P privacy policies and privacy authorization, in: Proc. of the ACM workshop on Privacy in the Electronic Society (WPES 2002),Washington, DC, USA, November 2002, pp. 103-109.
-
(2002)
Proc. of the ACM Workshop on Privacy in the Electronic Society (WPES 2002)
, pp. 103-109
-
-
Ashley, P.1
Hada, S.2
Karjoth, G.3
Schunter, M.4
-
7
-
-
0033750375
-
Optimistic fair exchange of digital signatures
-
N. Asokan, V. Shoup and M. Waidner, Optimistic fair exchange of digital signatures, IEEE Journal of Selected Areas in Communications 18(4) (2000), 591-610.
-
(2000)
IEEE Journal of Selected Areas in Communications
, vol.18
, Issue.4
, pp. 591-610
-
-
Asokan, N.1
Shoup, V.2
Waidner, M.3
-
8
-
-
33749001998
-
Anonymous yet accountable access control
-
Alexandria, VA, USA, November
-
M. Backes, J. Camenisch and D. Sommer, Anonymous yet accountable access control, in: Proc. of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria, VA, USA, November 2005, pp. 40-46.
-
(2005)
Proc. of the 2005 ACM Workshop on Privacy in the Electronic Society
, pp. 40-46
-
-
Backes, M.1
Camenisch, J.2
Sommer, D.3
-
9
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability H. Federrath, ed. Springer
-
O. Berthold, H. Federrath and S. Köpsell, Web MIXes: A system for anonymous and unobservable Internet access, in: Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, ed., Lecture Notes in Computer Science, vol.2009, Springer, 2000, pp. 115-129.
-
(2000)
Lecture Notes in Computer Science 2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
10
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Hong Kong, China, August
-
C. Bettini, S. Jajodia, X. Sean Wang and D. Wijesekera, Provisions and obligations in policy management and security applications, in: Proc. of the 28th VLDB Conference, Hong Kong, China, August 2002, pp. 502-513.
-
(2002)
Proc. of the 28th VLDB Conference
, pp. 502-513
-
-
Bettini, C.1
Jajodia, S.2
Sean Wang, X.3
Wijesekera, D.4
-
11
-
-
0036005214
-
Data retention and the panoptic society: The social benefits of forgetfulness
-
J.-F. Blanchette and D.G. Johnson, Data retention and the panoptic society: The social benefits of forgetfulness, The Information Society 18 (2002), 33-45.
-
(2002)
The Information Society
, vol.18
, pp. 33-45
-
-
Blanchette, J.-F.1
Johnson, D.G.2
-
12
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P.A. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security 10(3) (2002), 241-272.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.A.1
Samarati, P.2
-
15
-
-
14844295011
-
Direct anonymous attestation
-
E.F. Brickell, J. Camenisch and L. Chen, Direct anonymous attestation, in: 11th ACM Conference on Computer and Communications Security, CCS 2004, ACM, 2004, pp. 132-145.
-
(2004)
11th ACM Conference on Computer and Communications Security, CCS 2004, ACM
, pp. 132-145
-
-
Brickell, E.F.1
Camenisch, J.2
Chen, L.3
-
16
-
-
34748883672
-
On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises
-
Bologna, Italy, June
-
M. Casassa Mont and F. Beato, On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises, in: Proc. of the 8th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2007), Bologna, Italy, June 2007, pp. 51-55.
-
(2007)
Proc. of the 8th IEEE Workshop on Policies for Distributed Systems and Networks (Policy 2007)
, pp. 51-55
-
-
Casassa Mont, M.1
Beato, F.2
-
17
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, Security without identification: Transaction systems to make big brother obsolete, Communications of the ACM 28(10) (1985), 1030-1044.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
18
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Springer
-
D. Chaum and J.-H. Evertse, A secure and privacy-protecting protocol for transmitting personal information between organizations, in: Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Lecture Notes in Computer Science, vol.263, Springer, 1987, pp. 118-167.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
19
-
-
84937441148
-
Verifiable encryption group encryption and their applications to separable group signatures and signature sharing schemes
-
Advances in Cryptology - ASIACRYPT 2000 T. Okamoto, ed., Springer
-
J. Camenisch and I. Damgård, Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes, in: Advances in Cryptology - ASIACRYPT 2000, T. Okamoto, ed., Lecture Notes in Computer Science, vol.1976, Springer, 2000, pp. 331-345.
-
(2000)
Lecture Notes in Computer Science
, vol.1976
, pp. 331-345
-
-
Camenisch, J.1
Damgård, I.2
-
20
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
A. Juels, R.N. Wright and S. De Capitani di Vimercati, eds, ACM
-
J. Camenisch, S. Hohenberger, M. Kohlweiss, A. Lysyanskaya and M. Meyerovich, How to win the clonewars: efficient periodic n-times anonymous authentication, in: 13th ACM Conference on Computer and Communications Security, CCS 2006, A. Juels, R.N. Wright and S. De Capitani di Vimercati, eds, ACM, 2006, pp. 201-210.
-
(2006)
13th ACM Conference on Computer and Communications Security, CCS 2006
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
21
-
-
24944435537
-
Compact e-cash
-
Advances in Cryptology - EUROCRYPT 2005 R. Cramer, ed., Springer
-
J. Camenisch, S. Hohenberger and A. Lysyanskaya, Compact e-cash, in: Advances in Cryptology - EUROCRYPT 2005, R. Cramer, ed., Lecture Notes in Computer Science, vol.3494, Springer, 2005, pp. 302-321.
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
22
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 B. Pfitzmann, ed.,Springer
-
J. Camenisch and A. Lysyanskaya, An efficient system for non-transferable anonymous credentials with optional anonymity revocation, in: Advances in Cryptology - EUROCRYPT 2001, B. Pfitzmann, ed., Lecture Notes in Computer Science, vol.2045, Springer, 2001, pp. 93-118.
-
(2001)
Lecture Notes in Computer Science
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
23
-
-
35248839965
-
A signature scheme with efficient protocols, in: Security in Communication Networks
-
Third International Conference, S. Cimato, C. Galdi and G. Persiano, eds, Springer
-
J. Camenisch and A. Lysyanskaya, A signature scheme with efficient protocols, in: Security in Communication Networks, Third International Conference, S. Cimato, C. Galdi and G. Persiano, eds, Lecture Notes in Computer Science, vol.2576, Springer, 2003, pp. 268-289.
-
(2003)
Lecture Notes in Computer Science
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
24
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
Advances in Cryptology - CRYPTO 2004 M.K. Franklin, ed., Springer
-
J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in: Advances in Cryptology - CRYPTO 2004, M.K. Franklin, ed., Lecture Notes in Computer Science, vol.3152, Springer, 2004, pp. 56-72.
-
(2004)
Lecture Notes in Computer Science
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
25
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
Advances in Cryptology - CRYPTO 2003 D. Boneh, ed., Springer
-
J. Camenisch and V. Shoup, Practical verifiable encryption and decryption of discrete logarithms, in: Advances in Cryptology - CRYPTO 2003, D. Boneh, ed., Lecture Notes in Computer Science, vol.2729, Springer, 2003, pp. 126-144.
-
(2003)
Lecture Notes in Computer Science
, vol.2729
, pp. 126-144
-
-
Camenisch, J.1
Shoup, V.2
-
26
-
-
0038687775
-
Design and implementation of the Idemix anonymous credential system
-
V. Atluri, ed., ACM
-
J. Camenisch and E. Van Herreweghen, Design and implementation of the Idemix anonymous credential system, in: 9th ACM Conference on Computer and Communications Security, CCS 2002, V. Atluri, ed., ACM, 2002, pp. 21-30.
-
(2002)
9th ACM Conference on Computer and Communications Security, CCS 2002
, pp. 21-30
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
27
-
-
84888301236
-
The digital persona and its application to data surveillance
-
R. Clarke, The digital persona and its application to data surveillance, The Information Society 10 (1994), 77-92.
-
(1994)
The Information Society
, vol.10
, pp. 77-92
-
-
Clarke, R.1
-
29
-
-
85031802442
-
Payment systems and credential mechanisms with provable security against abuse by individuals
-
Advances in Cryptology - CRYPTO'88, S. Goldwasser, ed., Springer
-
I. Damgård, Payment systems and credential mechanisms with provable security against abuse by individuals, in: Advances in Cryptology - CRYPTO'88, S. Goldwasser, ed., Lecture Notes in Computer Science, vol.403, Springer, 1990, pp. 328-335.
-
(1990)
Lecture Notes in Computer Science
, vol.403
, pp. 328-335
-
-
Damgård, I.1
-
30
-
-
33746048789
-
Unclonable group identification
-
EUROCRYPT, S. Vaudenay, ed., Springer
-
I. Damgård, K. Dupont and M.ø. Pedersen, Unclonable group identification, in: EUROCRYPT, S. Vaudenay, ed., Lecture Notes in Computer Science, vol.4004, Springer, 2006, pp. 555-572.
-
(2006)
Lecture Notes in Computer Science
, vol.4004
, pp. 555-572
-
-
Damgård, I.1
Dupont, K.2
Pedersen, M.Ø.3
-
31
-
-
41949139623
-
The seven flaws of identity management: Usability and security challenges
-
R. Dhamija and L. Dusseault, The seven flaws of identity management: Usability and security challenges, IEEE Security and Privacy 6(2) (2008), 24-29.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 24-29
-
-
Dhamija, R.1
Dusseault, L.2
-
32
-
-
0003187764
-
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data 23/11/1995
-
Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, Official Journal L 281, 23/11/1995, pp. 31-50.
-
Official Journal L
, vol.281
, pp. 31-50
-
-
-
33
-
-
85084161366
-
Tor: The second-generation onion router
-
R. Dingledine, N. Mathewson and P.F. Syverson, Tor: The second-generation onion router, in: USENIX Security Symposium, USENIX, 2004, pp. 303-320.
-
(2004)
USENIX Security Symposium, USENIX
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.F.3
-
34
-
-
33745883651
-
-
Version 2.0 February
-
eXtensible Access Control Markup Language (XACML) Version 2.0, February 2005; http://docs. oasis-open.org/xacml/2.0/access-control-xacml-2.0-core-spec- os.pdf.
-
(2005)
EXtensible Access Control Markup Language (XACML)
-
-
-
36
-
-
0004124185
-
The Panoptic Sort
-
Westview Press, San Francisco, Boulder, Oxford
-
O.H. Gandy, The Panoptic Sort. A Political Economy of Personal Information, Critical Studies in Communication and in the Cultural Industries, Westview Press, San Francisco, Boulder, Oxford, 1993.
-
(1993)
A Political Economy of Personal Information, Critical Studies in Communication and in the Cultural Industries
-
-
Gandy, O.H.1
-
37
-
-
34547260252
-
No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
-
Heraklion, Greece, May
-
R. Gavriloaie,W. Nejdl, D. Olmedilla, K. Seamons andM.Winslett, No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web, in: Proc. of the 1st First European Semantic Web Symposium, Heraklion, Greece, May 2004, pp. 342-356.
-
(2004)
Proc. of the 1st First European Semantic Web Symposium
, pp. 342-356
-
-
Gavriloaie, R.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.4
Winslett, M.5
-
39
-
-
85032868051
-
How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design
-
Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Springer
-
O. Goldreich, S. Micali and A. Wigderson, How to prove all NP statements in zero-knowledge and a methodology of cryptographic protocol design, in: Advances in Cryptology - CRYPTO'86, A.M. Odlyzko, ed., Lecture Notes in Computer Science, vol.263, Springer, 1987, pp. 171-185.
-
(1987)
Lecture Notes in Computer Science
, vol.263
, pp. 171-185
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
40
-
-
0023985465
-
A digital signature scheme secure against adaptive chosenmessage attacks
-
S. Goldwasser, S. Micali and R. Rivest, A digital signature scheme secure against adaptive chosenmessage attacks, SIAM Journal on Computing 17(2) (1988), 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
41
-
-
84892262169
-
-
M. Hildebrandt and S. Gutwirth (eds) Springer
-
M. Hildebrandt and S. Gutwirth (eds), Profiling the European Citizen, Springer, 2008.
-
(2008)
Profiling the European Citizen
-
-
-
42
-
-
71849107806
-
-
IDEntity MIXer (IDEMIX)
-
IDEntity MIXer (IDEMIX); http://www.zurich.ibm.com/security/idemix/.
-
-
-
-
43
-
-
33745772562
-
Preventing attribute information leakage in automated trust negotiation
-
Alexandria, VA, USA, November
-
K. Irwin and T. Yu, Preventing attribute information leakage in automated trust negotiation, in: Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 2005, pp. 35-46.
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005)
, pp. 35-46
-
-
Irwin, K.1
Yu, T.2
-
44
-
-
17444423290
-
Sociotechnical architecture for online privacy
-
D.L. Jutla and P. Bodorik, Sociotechnical architecture for online privacy, IEEE Security & Privacy, 2005, pp. 29-39.
-
(2005)
IEEE Security & Privacy
, pp. 29-39
-
-
Jutla, D.L.1
Bodorik, P.2
-
45
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
N. Li, J.C. Mitchell andW.H.Winsborough, Beyond proof-of-compliance: Security analysis in trust management, Journal of the ACM 52(3) (2005), 474-514.
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
48
-
-
26444607972
-
Dynamic k-times anonymous authentication
-
ACNS, J. Ioannidis, A.D. Keromytis and M. Yung, eds
-
L. Nguyen and R. Safavi-Naini, Dynamic k-times anonymous authentication, in: ACNS, J. Ioannidis, A.D. Keromytis and M. Yung, eds, Lecture Notes in Computer Science, vol.3531, 2005, pp. 318- 333.
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
49
-
-
71849111011
-
-
Technical report, Senter for rettsinformatikk
-
T. Olsen, T. Mahler, C. Seddon, V. Cooper, S. Williams, M. Valdes and S.M. Arias, Privacy & identity management, Technical report, Senter for rettsinformatikk, 2007.
-
(2007)
Privacy & Identity Management
-
-
Olsen, T.1
Mahler, T.2
Seddon, C.3
Cooper, V.4
Williams, S.5
Valdes, M.6
Arias, S.M.7
-
50
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
Alexandria, VA, USA, November
-
J. Ni, N. Li and W.H. Winsborough, Automated trust negotiation using cryptographic credentials, in: Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 2005, pp. 46-57.
-
(2005)
Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005)
, pp. 46-57
-
-
Ni, J.1
Li, N.2
Winsborough, W.H.3
-
52
-
-
35248872156
-
From privacy legislation to interface design: Implementing information privacy in human-computer interfaces
-
Dresden
-
A.S. Patrick and S. Kenny, From privacy legislation to interface design: Implementing information privacy in human-computer interfaces, in: PET2003, Dresden, 2003, pp. 107-124.
-
(2003)
PET2003
, pp. 107-124
-
-
Patrick, A.S.1
Kenny, S.2
-
53
-
-
71849117337
-
-
PRIME Consortium Architecture v3, Deliverable D14.2.c 2008
-
PRIME Consortium, Architecture v3, Deliverable D14.2.c, 2008.
-
-
-
-
54
-
-
71849113696
-
-
PRIME Consortium, Framework v3, Deliverable D14.1.c, 2008
-
PRIME Consortium, Framework v3, Deliverable D14.1.c, 2008.
-
-
-
-
55
-
-
71849094653
-
-
PRIME Consortium Requirements for privacy enhancing tools (forthcoming) Deliverable 2008
-
PRIME Consortium, Requirements for privacy enhancing tools (forthcoming), Deliverable, 2008.
-
-
-
-
56
-
-
31544451561
-
Perspectives on "personal identity"
-
C.D. Raab, Perspectives on "personal identity", BT Technology Journal 23 (2005), 15-24.
-
(2005)
BT Technology Journal
, vol.23
, pp. 15-24
-
-
Raab, C.D.1
-
58
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
59
-
-
30644473909
-
Adaptive trust negotiation and access control
-
DOI 10.1145/1063979.1064004, SACMAT 2005: Proceedings of 10th ACM Symposium on Access Control Models and Technologies
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead and K.E. Seamons, Adaptive trust negotiation and access control, in: Proc. of the 10th ACM Symposium on Access Control Models and Technologies, Stockholm, Sweden, June 2005, pp. 139-146. (Pubitemid 43087470)
-
(2005)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 139-146
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
60
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium, July
-
K.E. Seamons, W. Winsborough and M. Winslett, Internet credential acceptance policies, in: Proc. of the Workshop on Logic Programming for Internet Applications, Leuven, Belgium, July 1997, pp. 415-432.
-
(1997)
Proc. of the Workshop on Logic Programming for Internet Applications
, pp. 415-432
-
-
Seamons, K.E.1
Winsborough, W.2
Winslett, M.3
-
61
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA, USA, April
-
K. Seamons, M. Winslett and T. Yu, Limiting the disclosure of access control policies during automated trust negotiation, in: Proc. of the Network and Distributed System Security Symposium (NDSS 2001), San Diego, CA, USA, April 2001.
-
(2001)
Proc. of the Network and Distributed System Security Symposium (NDSS 2001)
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
63
-
-
84937378505
-
The failure of privacy enhancing technologies (pets) and the voiding of privacy
-
F. Stalder, The failure of privacy enhancing technologies (pets) and the voiding of privacy, Sociological Research Online 7(2) (2002).
-
(2002)
Sociological Research Online
, vol.7
, pp. 2
-
-
Stalder, F.1
-
64
-
-
35048839792
-
K-times anonymous authentication (extended abstract)
-
ASIACRYPT, P.J. Lee, ed., Springer
-
I. Teranishi, J. Furukawa and K. Sako, k-times anonymous authentication (extended abstract), in: ASIACRYPT, P.J. Lee, ed., Lecture Notes in Computer Science, vol.3329, Springer, 2004, pp. 308- 322.
-
(2004)
Lecture Notes in Computer Science
, vol.3329
, pp. 308-322
-
-
Teranishi, I.1
Furukawa, J.2
Sako, K.3
-
65
-
-
77954408441
-
-
version 1.2
-
Trusted Computing Group, TCG TPM specification version 1.2, url: www.trustedcomputinggroup. org.
-
TCG TPM Specification
-
-
-
66
-
-
84863605068
-
Mobile trust negotiation: Authentication and authorization in dynamic mobile networks
-
Lake Windermere, England, September
-
T.W. van der Horst, T. Sundelin, K.E. Seamons and C.D. Knutson, Mobile trust negotiation: Authentication and authorization in dynamic mobile networks, in: Proc. of the Eighth IFIP Conference on Communications and Multimedia Security, Lake Windermere, England, September 2004, pp. 97- 109.
-
(2004)
Proc. of the Eighth IFIP Conference on Communications and Multimedia Security
, pp. 97-109
-
-
Van Den Horst, T.W.1
Sundelin, T.2
Seamons, K.E.3
Knutson, C.D.4
-
67
-
-
71849110077
-
-
Web services policy framework March
-
Web services policy framework, March 2006; http://www.ibm.com/ developerworks/webservices/ library/specification/ws-polfram/?S-TACT= 105AGX04&S-CMP=LP.
-
(2006)
-
-
-
69
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the web: Client and server security policies
-
Washington, DC, USA, May
-
M. Winslett, N. Ching, V. Jones and I. Slepchin, Assuring security and privacy for digital library transactions on the web: Client and server security policies, in: Proc. of the ADL'97 - Forum on Research and Tech. Advances in Digital Libraries, Washington, DC, USA, May 1997, pp. 140-152.
-
(1997)
Proc. of the ADL'97 - Forum on Research and Tech. Advances in Digital Libraries
, pp. 140-152
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
72
-
-
0034449542
-
An efficient complete strategy for automated trust negotiation over the internet
-
Athens, Greece, November
-
T. Yu, X. Ma and M. Winslett, An efficient complete strategy for automated trust negotiation over the internet, in: Proc. of the 7th ACM Computer and Communication Security, Athens, Greece, November 2000, pp. 210-219.
-
(2000)
Proc. of the 7th ACM Computer and Communication Security
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
73
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
Berkeley, CA, May
-
T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation, in: Proc. of the IEEE Symposium on Security and Privacy, Berkeley, CA, May 2003, pp. 110-122.
-
(2003)
Proc. of the IEEE Symposium on Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
-
74
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Philadelphia, PA, USA, November
-
T. Yu, M. Winslett and K.E. Seamons, Interoperable strategies in automated trust negotiation, in: Proc. of the 8th ACM Conference on Computer and Communications Security (CCS 2001), Philadelphia, PA, USA, November 2001, pp. 146-155.
-
(2001)
Proc. of the 8th ACM Conference on Computer and Communications Security (CCS 2001)
, pp. 146-155
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
75
-
-
1642327001
-
Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
-
T. Yu,M.Winslett and K.E. Seamons, Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust, ACM Transactions on Information and System Security (TISSEC), 6(1) (2003), 1-42.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
76
-
-
33645796029
-
Mine your own business!: Making the case for the implications of the data mining or personal information in the forum of public opinion
-
T. Zarsky, Mine your own business!: Making the case for the implications of the data mining or personal information in the forum of public opinion, Yale Journal of Law & Technology 5 (2002), 17-47.
-
(2002)
Yale Journal of Law & Technology
, vol.5
, pp. 17-47
-
-
Zarsky, T.1
-
77
-
-
71849096032
-
Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society
-
T. Zarsky, Desperately seeking solutions: Using implementation-based solutions for the troubles of information privacy in the age of data mining and the internet society, Maine Law Review 56 (2004), 14-59.
-
(2004)
Maine Law Review
, vol.56
, pp. 14-59
-
-
Zarsky, T.1
|