-
2
-
-
0029700344
-
Decentralized trust management
-
0
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. Security and Privacy, IEEE Symposium on, 0:0164, 1996.
-
(1996)
Security and Privacy, IEEE Symposium on
, pp. 0164
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
3
-
-
24144485861
-
Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries
-
C.-K. Chu and W.-G. Tzeng. Efficient k-out-of-n oblivious transfer schemes with adaptive and non-adaptive queries. In Public Key Cryptography - PKC 2005, pages 172 - 183, 2005.
-
(2005)
Public Key Cryptography - PKC 2005
, pp. 172-183
-
-
Chu, C.-K.1
Tzeng, W.-G.2
-
4
-
-
0001470602
-
Referee: Trust management for web applications
-
Papers from the Sixth International World Wide Web Conference
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss. Referee: trust management for web applications. Computer Networks and ISDN Systems, 29(8-13):953 - 964, 1997. Papers from the Sixth International World Wide Web Conference.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
LaMacchia, B.3
Resnick, P.4
Strauss, M.5
-
5
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
K. Kim, editor, volume 1992 of Lecture Notes in Computer Science, Cheju Island, Korea
-
I. Damgard and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In K. Kim, editor, Public Key Cryptography, volume 1992 of Lecture Notes in Computer Science, pages 119-136, Cheju Island, Korea, 2001.
-
(2001)
Public Key Cryptography
, pp. 119-136
-
-
Damgard, I.1
Jurik, M.2
-
6
-
-
84875346007
-
Privacy-preserving credential verification for non-monotonic trust management systems
-
C. Dong, G. Russello, and N. Dulay. Privacy-preserving credential verification for non-monotonic trust management systems. In Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, 2007.
-
(2007)
Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security
-
-
Dong, C.1
Russello, G.2
Dulay, N.3
-
7
-
-
0342537489
-
Varieties of secure distributed computing
-
Positano, Italy, June
-
M. Franklin and M. Yung. Varieties of secure distributed computing. In Proceedings of Sequences II, Methods in Communications, Security and Computer Science, pages 392-417, Positano, Italy, June 1991.
-
(1991)
Proceedings of Sequences II, Methods in Communications, Security and Computer Science
, pp. 392-417
-
-
Franklin, M.1
Yung, M.2
-
9
-
-
33748485156
-
Attribute-based access control with hidden policies and hidden credentials
-
Oct.
-
K. Frikken, M. Atallah, and J. Li. Attribute-based access control with hidden policies and hidden credentials. Computers, IEEE Transactions on, 55(10):1259-1270, Oct. 2006.
-
(2006)
Computers, IEEE Transactions on
, vol.55
, Issue.10
, pp. 1259-1270
-
-
Frikken, K.1
Atallah, M.2
Li, J.3
-
10
-
-
38349082709
-
Trust negotiation with hidden credentials, hidden policies, and policy cycles
-
San Diego, California, USA
-
K. B. Frikken, J. Li, and M. J. Atallah. Trust negotiation with hidden credentials, hidden policies, and policy cycles. In Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA, 2006.
-
(2006)
Proceedings of the Network and Distributed System Security Symposium, NDSS 2006
-
-
Frikken, K.B.1
Li, J.2
Atallah, M.J.3
-
11
-
-
24944523186
-
On private scalar product computation for privacy-preserving data mining
-
C. Park and S. Chee, editors, New York, NY, December 2-3, Springer-Verlag
-
B. Goethals, S. Laur, H. Lipmaa, and T. Mielikäinen. On Private Scalar Product Computation for Privacy-Preserving Data Mining. In C. Park and S. Chee, editors, The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004), volume 3506, pages 104-120, New York, NY, December 2-3, 2004. Springer-Verlag.
-
(2004)
The 7th Annual International Conference in Information Security and Cryptology (ICISC 2004)
, vol.3506
, pp. 104-120
-
-
Goethals, B.1
Laur, S.2
Lipmaa, H.3
Mielikäinen, T.4
-
12
-
-
33645593031
-
The foundations of cryptography
-
chapter, Cambridge University Press, Cambridge, UK
-
O. Goldreich. The Foundations of Cryptography, volume 2, chapter General Cryptographic Protocols, pages 599-764. Cambridge University Press, Cambridge, UK, 2004.
-
(2004)
General Cryptographic Protocols
, vol.2
, pp. 599-764
-
-
Goldreich, O.1
-
14
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Washington, DC, USA, IEEE Computer Society
-
A. Herzberg, Y. Mass, J. Michaeli, Y. Ravid, and D. Naor. Access control meets public key infrastructure, or: Assigning roles to strangers. In SP'00: Proceedings of the 2000 IEEE Symposium on Security and Privacy, page 2, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
SP'00: Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Ravid, Y.4
Naor, D.5
-
15
-
-
70449612716
-
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
-
New York, NY, USA, ACM
-
A. J. Lee and M. Winslett. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. In ASIACCS'08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 228-239, New York, NY, USA, 2008. ACM.
-
(2008)
ASIACCS'08: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security
, pp. 228-239
-
-
Lee, A.J.1
Winslett, M.2
-
17
-
-
72449173381
-
Automated trust negotiation using cryptographic credentials
-
J. Li, N. Li, and W. H. Winsborough. Automated trust negotiation using cryptographic credentials. ACM Trans. Inf. Syst. Secur., 13(1):1-35, 2009.
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.1
, pp. 1-35
-
-
Li, J.1
Li, N.2
Winsborough, W.H.3
-
18
-
-
0032218237
-
A new public key cryptosystem based on higher residues
-
San Francisco, California, United States, ACM Press
-
D. Naccache and J. Stern. A new public key cryptosystem based on higher residues. In Proceedings of the 5th ACM conference on Computer and communications security, pages 59-66, San Francisco, California, United States, 1998. ACM Press.
-
(1998)
Proceedings of the 5th ACM Conference on Computer and Communications Security
, pp. 59-66
-
-
Naccache, D.1
Stern, J.2
-
19
-
-
84942550998
-
Public key cryptosystems based on composite degree residuosity classes
-
LNCS 1592, Springer-Verlag
-
P. Paillier. Public key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt'99 Proceedings, LNCS 1592, pages 223-238. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - Eurocrypt'99 Proceedings
, pp. 223-238
-
-
Paillier, P.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM, 21(2):120-126, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
21
-
-
11244281946
-
Responding to policies at runtime in trustbuilder
-
0
-
B. Smith, K. E. Seamons, and M. D. Jones. Responding to policies at runtime in trustbuilder. Policies for Distributed Systems and Networks, IEEE International Workshop on, 0:149, 2004.
-
(2004)
Policies for Distributed Systems and Networks, IEEE International Workshop on
, pp. 149
-
-
Smith, B.1
Seamons, K.E.2
Jones, M.D.3
-
22
-
-
77952332120
-
Privacy-preserving k-means clustering over vertically partitioned data
-
Washington, DC, Aug. 24-27, ACM
-
J. Vaidya and C. Clifton. Privacy-preserving k-means clustering over vertically partitioned data. In The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 206-215, Washington, DC, Aug. 24-27 2003. ACM.
-
(2003)
The Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 206-215
-
-
Vaidya, J.1
Clifton, C.2
-
24
-
-
78349255568
-
Point-based trust: Define how much privacy is worth
-
D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Point-based trust: Define how much privacy is worth. In International Conference on Information and Communications Security, pages 190-209, 2006.
-
(2006)
International Conference on Information and Communications Security
, pp. 190-209
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
Tamassia, R.4
-
25
-
-
56349121668
-
Private information: To reveal or not to reveal
-
D. Yao, K. B. Frikken, M. J. Atallah, and R. Tamassia. Private information: To reveal or not to reveal. ACM Trans. Inf. Syst. Secur., 12(1), 2008.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.1
-
-
Yao, D.1
Frikken, K.B.2
Atallah, M.J.3
Tamassia, R.4
-
26
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
Washington, DC, USA, IEEE Computer Society
-
T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 110, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
SP'03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 110
-
-
Yu, T.1
Winslett, M.2
|