-
1
-
-
11244331795
-
Cassandra: Distributed Access Control Policies with Tunable Expressiveness
-
M. Becker and P. Sewell, "Cassandra: Distributed Access Control Policies with Tunable Expressiveness," Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, Jun. 2004.
-
Workshop on Policies for Distributed Systems and Networks, Yorktown Heights, NY, Jun. 2004
-
-
Becker, M.1
Sewell, P.2
-
2
-
-
3142676730
-
Trust-X: A Peer-to-Peer Framework for Trust Establishment
-
E. Bertino, E. Ferrari, and A. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," Transactions on Knowledge and Data Engineering 16(7): 827-842, 2004.
-
(2004)
Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
3
-
-
0034449399
-
Regulating Service Access and Information Release on the Web
-
P. Bonatti and P. Samarati, "Regulating Service Access and Information Release on the Web," Conference on Computer and Communications Security, Athens, Greece, Nov. 2000.
-
Conference on Computer and Communications Security, Athens, Greece, Nov. 2000
-
-
Bonatti, P.1
Samarati, P.2
-
4
-
-
0038687775
-
Design and Implementation of the idemix Anonymous Credential System
-
J. Camenisch and E. Van Herreweghen, "Design and Implementation of the idemix Anonymous Credential System," Conference on Computer and Communications Security, Washington, DC, Nov. 2002.
-
Conference on Computer and Communications Security, Washington, DC, Nov. 2002
-
-
Camenisch, J.1
Van Herreweghen, E.2
-
5
-
-
1642394295
-
Hidden Credentials
-
J. Holt, R. Bradshaw, K. E. Seamons, and H. Orman, "Hidden Credentials,"Workshop on Privacy in the Electronic Society, Washington, DC, Oct. 2003.
-
Workshop on Privacy in the Electronic Society, Washington, DC, Oct. 2003
-
-
Holt, J.1
Bradshaw, R.2
Seamons, K.E.3
Orman, H.4
-
6
-
-
79959658551
-
OACerts: Oblivious Attribute Certificates
-
J. Li and N. Li, "OACerts: Oblivious Attribute Certificates," Conference on Applied Cryptography and Network Security, New York, NY, Jun. 2005.
-
Conference on Applied Cryptography and Network Security, New York, NY, Jun. 2005
-
-
Li, J.1
Li, N.2
-
8
-
-
1142293102
-
Oblivious Signature-Based Envelope
-
N. Li, W. Du, and D. Boneh, "Oblivious Signature-Based Envelope," Symposium on Principles of Distributed Computing, Boston, MA, Jul. 2003.
-
Symposium on Principles of Distributed Computing, Boston, MA, Jul. 2003
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
9
-
-
79959628753
-
-
Technical Report UIUCDCS-R-2007-2892, Department of Computer Science, University of Illinois, Aug.
-
L. E. Olson, M. J. Rosulek, and M.Winslett, "A Generalized Honest-But-Curious Strategy for Automatically Harvesting Credentials," Technical Report UIUCDCS-R-2007-2892, Department of Computer Science, University of Illinois, Aug. 2007.
-
(2007)
A Generalized Honest-But-Curious Strategy for Automatically Harvesting Credentials
-
-
Olson, L.E.1
Rosulek, M.J.2
Winslett, M.3
-
10
-
-
30644473909
-
Adaptive Trust Negotiation and Access Control
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons, "Adaptive Trust Negotiation and Access Control," Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun. 2005.
-
Symposium on Access Control Models and Technologies, Stockholm, Sweden, Jun. 2005
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
11
-
-
84893110297
-
Towards Practical Automated Trust Negotiation
-
W. H. Winsborough and N. Li, "Towards Practical Automated Trust Negotiation,"Workshop on Policies for Distributed Systems and Networks, Monterrey, CA, Jun. 2002.
-
Workshop on Policies for Distributed Systems and Networks, Monterrey, CA, Jun. 2002
-
-
Winsborough, W.H.1
Li, N.2
-
12
-
-
1642327001
-
Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation
-
Feb.
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation," Transactions on Information and System Security 6(1): 1-42, Feb. 2003.
-
(2003)
Transactions on Information and System Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|