-
2
-
-
78649257622
-
Minimizing disclosure of private information in credential-based interactions: A graph-based approach
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Foresti, S. Paraboschi, and P. Samarati. Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, MN, USA, August 2010.
-
Proc. of the 2nd IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2010), Minneapolis, MN, USA, August 2010
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Foresti, S.3
Paraboschi, S.4
Samarati, P.5
-
3
-
-
81455141558
-
Expressive and deployable access control in open Web service applications
-
to appear
-
C.A. Ardagna, S. De Capitani di Vimercati, S. Paraboschi, E. Pedrini, P. Samarati, and M. Verdicchio. Expressive and deployable access control in open Web service applications. IEEE Transactions on Service Computing (TSC), 2010. (to appear).
-
(2010)
IEEE Transactions on Service Computing (TSC)
-
-
Ardagna, C.A.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Pedrini, E.4
Samarati, P.5
Verdicchio, M.6
-
4
-
-
70349255572
-
Minimal information disclosure with efficiently verifiable credentials
-
D. Bauer, D. Blough, and D. Cash. Minimal information disclosure with efficiently verifiable credentials. In Proc. of the 4th ACM Workshop on Digital Identity Management (DIM 2008), Alexandria, Virginia, USA, October 2008.
-
Proc. of the 4th ACM Workshop on Digital Identity Management (DIM 2008), Alexandria, Virginia, USA, October 2008
-
-
Bauer, D.1
Blough, D.2
Cash, D.3
-
5
-
-
0036311802
-
A uniform framework for regulating service access and information release on the Web
-
P. Bonatti and P. Samarati. A uniform framework for regulating service access and information release on the Web. Journal of Computer Security (JCS), 10(3):241-272, 2002.
-
(2002)
Journal of Computer Security (JCS)
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
8
-
-
25844481612
-
Optimizing cost-sensitive trust-negotiation protocols
-
W. Chen, L. Clarke, J. Kurose, and D. Towsley. Optimizing cost-sensitive trust-negotiation protocols. In Proc. of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA, March 2005.
-
Proc. of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM 2005), Miami, FL, USA, March 2005
-
-
Chen, W.1
Clarke, L.2
Kurose, J.3
Towsley, D.4
-
10
-
-
44649155238
-
MiniMaxSAT: A new weighted Max-SAT solver
-
F. Heras, J. Larrosa, and A. Oliveras. MiniMaxSAT: a new weighted Max-SAT solver. In Proc. of the 10th International Conference on Theory and Applications of Satisfiability Testing (SAT 2007), Lisbon, Portugal, May 2007.
-
Proc. of the 10th International Conference on Theory and Applications of Satisfiability Testing (SAT 2007), Lisbon, Portugal, May 2007
-
-
Heras, F.1
Larrosa, J.2
Oliveras, A.3
-
11
-
-
33745772562
-
Preventing attribute information leakage in automated trust negotiation
-
K. Irwin and T. Yu. Preventing attribute information leakage in automated trust negotiation. In Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 2005.
-
Proc. of the 12th ACM Conference on Computer and Communications Security (CCS 2005), Alexandria, VA, USA, November 2005
-
-
Irwin, K.1
Yu, T.2
-
12
-
-
54249106343
-
Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations. In
-
P. Kärger, D. Olmedilla, and W.-T. Balke. Exploiting preferences for minimal credential disclosure in policy-driven trust negotiations. In Proc. of the 5th VLDB Workshop on Secure Data Management (SDM 2008), Auckland, New Zealand, August 2008.
-
Proc. of the 5th VLDB Workshop on Secure Data Management (SDM 2008), Auckland, New Zealand, August 2008
-
-
Kärger, P.1
Olmedilla, D.2
Balke, W.-T.3
-
14
-
-
38949188899
-
The Traust authorization service
-
February
-
A. Lee, M. Winslett, J. Basney, and V. Welch. The Traust authorization service. ACM Transactions on Information and System Security (TISSEC), 11(1):1-33, February 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, Issue.1
, pp. 1-33
-
-
Lee, A.1
Winslett, M.2
Basney, J.3
Welch, V.4
-
15
-
-
78650224303
-
Minimal credential disclosure in trust negotiations
-
December
-
F. Paci, D. Bauer, E. Bertino, D. Blough, A. Squicciarini, and A. Gupta. Minimal credential disclosure in trust negotiations. Identity in the Information Society, 2(3):221-239, December 2009.
-
(2009)
Identity in the Information Society
, vol.2
, Issue.3
, pp. 221-239
-
-
Paci, F.1
Bauer, D.2
Bertino, E.3
Blough, D.4
Squicciarini, A.5
Gupta, A.6
-
16
-
-
30644473909
-
Adaptive trust negotiation and access control
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. Seamons. Adaptive trust negotiation and access control. In Proc. of the 10th Symposium on Access control Models and Technologies (SACMAT 2005), Stockholm, Sweden, June 2005.
-
Proc. of the 10th Symposium on Access Control Models and Technologies (SACMAT 2005), Stockholm, Sweden, June 2005
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
17
-
-
11244281946
-
Responding to policies at runtime in trustbuilder
-
B. Smith, K. Seamons, and M. Jones. Responding to policies at runtime in trustbuilder. In Proc. of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), Yorktown Heights, NY, USA, June 2004.
-
Proc. of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), Yorktown Heights, NY, USA, June 2004
-
-
Smith, B.1
Seamons, K.2
Jones, M.3
-
18
-
-
56349121668
-
Private information: To reveal or not to reveal
-
October
-
D. Yao, K. Frikken, M. Atallah, and R. Tamassia. Private information: To reveal or not to reveal. ACM Transactions on Information and System Security (TISSEC), 12(1):1-27, October 2008.
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.12
, Issue.1
, pp. 1-27
-
-
Yao, D.1
Frikken, K.2
Atallah, M.3
Tamassia, R.4
-
19
-
-
1642327001
-
Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust
-
February
-
T. Yu, M. Winslett, and K. Seamons. Supporting structured credentials and sensitive policies trough interoperable strategies for automated trust. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|