-
1
-
-
0036190633
-
Building trust in e-commerce
-
Atif, Y. (2000). Building trust in e-commerce. IEEE Internet Computing, 6(1), 18-24.
-
(2000)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 18-24
-
-
Atif, Y.1
-
2
-
-
84865788031
-
A model of OASIS role-based access control and its support for active security
-
Bacon, J., Moody, K., and Yao, W. (2002). A model of OASIS role-based access control and its support for active security. ACM Transaction Information System Security, 5(4), 492-540.
-
(2002)
ACM Transaction Information System Security
, vol.5
, Issue.4
, pp. 492-540
-
-
Bacon, J.1
Moody, K.2
Yao, W.3
-
3
-
-
0036311802
-
A uniform framework for regulating service access and information release on the Web
-
Bonatti, P., and Samarati, P. (2002). A Unified Framework for Regulating Access and Information Release on the Web. In Journal of Computer Security, 10, 3, 241-271. (Pubitemid 34814466)
-
(2002)
Journal of Computer Security
, vol.10
, Issue.3
, pp. 241-271
-
-
Bonatti, P.A.1
Samarati, P.2
-
4
-
-
84944792110
-
TRBAC: A temporal role-based access control model
-
Bertino, E., Bonatti, P. A., and Ferrari, E. (2001). TRBAC: A temporal role-based access control model. ACM Transactions on Information and System Security, 4(3), 191-233.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.3
, pp. 191-233
-
-
Bertino, E.1
Bonatti, P.A.2
Ferrari, E.3
-
5
-
-
84893077785
-
Obligation monitoring in policy management
-
Bettini, C., Jajodia, S.,Wang, X. S., and Wijesekera, D. (2002). Obligation monitoring in policy management. In Proceedings of the 3rd InternationlWorkshop on Policies for Distributed Systems and Networks, 2002.
-
(2002)
Proceedings of the 3rd InternationlWorkshop on Policies for Distributed Systems and Networks, 2002
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
6
-
-
1142309815
-
Provisions and obligations in policy management and security applications
-
Bettini, C., Jajodia, S.,Wang, X. S., and Wijesekera, D. (2002). Provisions and obligations in policy management and security applications. In Proceedings of the 28th VLDB Conference, 2002.
-
(2002)
Proceedings of the 28th VLDB Conference, 2002
-
-
Bettini, C.1
Jajodia, S.2
Wang, X.S.3
Wijesekera, D.4
-
8
-
-
2442549069
-
Using trust for secure collaboration in uncertain environments
-
Cahill, V., Gray, E., Seigneur, J. M., Jensen, C.D., Chen, Y., and Shand, B., et al. (2003). Using trust for secure collaboration in uncertain environments. IEEE Pervasive Computing, 2(3), 52-61.
-
(2003)
IEEE Pervasive Computing
, vol.2
, Issue.3
, pp. 52-61
-
-
Cahill, V.1
Gray, E.2
Seigneur, J.M.3
Jensen, C.D.4
Chen, Y.5
Shand, B.6
-
9
-
-
4143058053
-
Using trust and risk in role-based access control policies
-
ACM Press
-
Dimmock, N., Belokosztolszki, A., Eyers, D., Bacon, J., and Moody, K. (2004). Using trust and risk in role-based access control policies. In Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, New York, (pp. 156-162). ACM Press.
-
(2004)
Proceedings of the Ninth ACM Symposium on Access Control Models and Technologies, New York
, pp. 156-162
-
-
Dimmock, N.1
Belokosztolszki, A.2
Eyers, D.3
Bacon, J.4
Moody, K.5
-
10
-
-
0016949746
-
A lattice model of secure information
-
1976
-
Denning, D. E. (1976). A lattice model of secure information. Communications of the ACM, vol.19, no.5, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.5
-
-
Denning, D.E.1
-
11
-
-
84955574746
-
Future Directions in Role-Based Access Control Models
-
Information Assurance in Computer Networks Methods, Models and Architectures for Network Security
-
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Richard Kuhn, D., and Chandramouli, R. (2001). Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and System Security, Volume 4, Number 3, August 2001. (Pubitemid 33275961)
-
(2001)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.2052
, pp. 22-26
-
-
Sandhu, R.1
-
13
-
-
0016984825
-
Protection in Operating Systems
-
1976
-
Harrison, M. H., Ruzzo, W. L. and Ullman, J. D. (1976). Protection in Operating Systems, Communication of ACM, Vol 19, No.8, 1976.
-
(1976)
Communication of ACM
, vol.19
, Issue.8
-
-
Harrison, M.H.1
Ruzzo, W.L.2
Ullman, J.D.3
-
14
-
-
0001619596
-
Flexible support for multiple access control policies
-
Jajodia, S., Samarati, P., Sapino, M. L., and Subrahmanian, V. S. (2001). Flexible support for multiple access control policies. ACM Transaction Database System, 26(2), 214-260.
-
(2001)
ACM Transaction Database System
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.L.3
Subrahmanian, V.S.4
-
15
-
-
0036085965
-
Design of a role-based trust management framework
-
Li, N., Mitchell, J. C., and Winsborough, W. H. (2002). Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy, Washington, D.C., (p. 114).
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy, Washington, D.C.
, pp. 114
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
16
-
-
3142523603
-
The UCON usage control model
-
Park, J., and Sandhu, R. S. (2004) The UCON usage control model. ACM Transaction Information System Security, 7(1), 128-174.
-
(2004)
ACM Transaction Information System Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.S.2
-
17
-
-
84874834655
-
Privacy promises, access control, and privacy management
-
Washington, DC, USA, 2002. IEEE Computer Society
-
Powers, C. S. (2002). Privacy promises, access control, and privacy management. In ISEC 02: Proceedings of the Third International Symposium on Electronic Commerce, page 13, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
ISEC 02: Proceedings of the Third International Symposium on Electronic Commerce
, pp. 13
-
-
Powers, C.S.1
-
18
-
-
0002101577
-
Reputation systems
-
Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E. (2000) Reputation systems. ACM Communications, 43(12), 45-48.
-
(2000)
ACM Communications
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Kuwabara, K.2
Zeckhauser, R.3
Friedman, E.4
-
20
-
-
0030086382
-
Role-Based Access Control Models
-
February 1996
-
Sandhu, R., Coyne, E., Feinstein, H., and Youman, C. (1996). Role-Based Access Control Models, IEEE Computer, Volume 29, Number 2, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
21
-
-
3142738238
-
Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
Xiong, L., and Liu, L. (2004). Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transaction Knowledge Data Engineering, 16(7), 843-857.
-
(2004)
IEEE Transaction Knowledge Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
22
-
-
34748878894
-
Fine-grained reputation-based routing in wireless ad hoc networks
-
4258677, ISI 2007: 2007 IEEE Intelligence and Security Informatics
-
Yang, L., Kizza, J. M., Cemerlic, A., and Liu, F. (2007). Finegrained reputation-based routing in wireless ad hoc networks. In Proceedings of IEEE Intelligence and Security Informatics Conference (pp. 75-78). IEEE Computer Society Press. (Pubitemid 47469218)
-
(2007)
ISI 2007: 2007 IEEE Intelligence and Security Informatics
, pp. 75-78
-
-
Yang, L.1
Kizza, J.M.2
Cemerlic, A.3
Liu, F.4
-
24
-
-
23144456445
-
Bayesian network trust model in peer-to-peer networks
-
Agents and Peer-to-Peer Computing AP2PC 2003
-
Wang, Y., and Vassileva, J., Trust and reputation model in collaborative networks. in Proc. 3rd IEEE Int. Conf. Collaborative Computing, pp.150- 157, 2003. (Pubitemid 41083669)
-
(2003)
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science)
, vol.2872
, pp. 23-34
-
-
Wang, Y.1
Vassileva, J.2
-
25
-
-
84893110297
-
Towards Practical Automated Trust Negotiation
-
Winsborough, W. and Li, N. (2002). Towards Practical Automated Trust Negotiation. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, June 2002.
-
(2002)
Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, June 2002
-
-
Winsborough, W.1
Li, N.2
|