-
1
-
-
0036311802
-
A unified framework for regulating access and information release on the web
-
P. Bonatti and P. Samarati, "A unified framework for regulating access and information release on the web," JCS, vol. 10, no. 3, 2002.
-
(2002)
JCS
, vol.10
, Issue.3
-
-
Bonatti, P.1
Samarati, P.2
-
2
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
J. Li, N. Li, and W. Winsborough, "Automated trust negotiation using cryptographic credentials," in ACM CCS 2005.
-
(2005)
ACM CCS
-
-
Li, J.1
Li, N.2
Winsborough, W.3
-
3
-
-
71849091813
-
Exploiting cryptography for privacy-enhanced access control
-
C. A. Ardagna, J. Camenisch, M. Kohlweiss, R. Leenes, G. Neven, B. Priem, P. Samarati, D. Sommer, and M. Verdicchio, "Exploiting cryptography for privacy-enhanced access control," JCS, vol. 18, no. 1, 2010.
-
(2010)
JCS
, vol.18
, Issue.1
-
-
Ardagna, C.A.1
Camenisch, J.2
Kohlweiss, M.3
Leenes, R.4
Neven, G.5
Priem, B.6
Samarati, P.7
Sommer, D.8
Verdicchio, M.9
-
4
-
-
81455141558
-
Expressive and deployable access control in open web service applications
-
to appear
-
C. A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, and M. Verdicchio, "Expressive and deployable access control in open web service applications," IEEE Transaction on Services Computing, 2010, to appear.
-
(2010)
IEEE Transaction on Services Computing
-
-
Ardagna, C.A.1
Vimercati, S.D.C.D.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
Verdicchio, M.6
-
5
-
-
77954923296
-
A card requirements language enabling privacypreserving access control
-
to appear
-
J. Camenisch, S. Moedersheim, G. Neven, F.-S. Preiss, and D. Sommer," A card requirements language enabling privacypreserving access control," in ACM SACMAT 2010, to appear.
-
ACM SACMAT 2010
-
-
Camenisch, J.1
Moedersheim, S.2
Neven, G.3
Preiss, F.-S.4
Sommer, D.5
-
6
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," CACM, vol. 28, no. 10, 1985.
-
(1985)
CACM
, vol.28
, Issue.10
-
-
Chaum, D.1
-
8
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
ser. LNCS, Springer
-
J. Camenisch and A. Lysyanskaya, "An efficient system for non-transferable anonymous credentials with optional anonymity revocation," in EUROCRYPT 2001, ser. LNCS, vol. 2045. Springer, 2001.
-
(2001)
EUROCRYPT 2001
, vol.2045
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
9
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and V. Subrahmanian, "Flexible support for multiple access control policies," ACM TODS, vol. 26, no. 2, 2001.
-
(2001)
ACM TODS
, vol.26
, Issue.2
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmanian, V.4
-
10
-
-
0030698978
-
Assuring security and privacy for digital library transactions on the web: Client and server security policies
-
M. Winslett, N. Ching, V. Jones, and I. Slepchin, "Assuring security and privacy for digital library transactions on the web: Client and server security policies," in ADL 1997.
-
(1997)
ADL
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
12
-
-
35248847060
-
Practical verifiable encryption and decryption of discrete logarithms
-
ser. LNCS, Springer
-
J. Camenisch and V. Shoup, "Practical verifiable encryption and decryption of discrete logarithms," in CRYPTO 2003, ser. LNCS, vol. 2729. Springer, 2003.
-
(2003)
CRYPTO 2003
, vol.2729
-
-
Camenisch, J.1
Shoup, V.2
|