-
1
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones, "Automated trust negotiation," In DARPA Information Survivability Conference and Exposition, IEEE Press, 2000, pp.88-102
-
(2000)
DARPA Information Survivability Conference and Exposition
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
2
-
-
0036871183
-
Negotiating trust on the web
-
November/December
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jarvis, B. Smith, and L. Yu., "Negotiating trust on the web," IEEE Internet Computing, November/December 2002, pp.30-37.
-
(2002)
IEEE Internet Computing
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jarvis, J.5
Smith, B.6
Yu, L.7
-
3
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. Squicciarin "Trust-X: A Peer-to-Peer framework for trust establishment," IEEE Transaction on Knowledge and Data Engineering, 2004, 16(7)
-
(2004)
IEEE Transaction on Knowledge and Data Engineering
, vol.16
, Issue.7
-
-
Bertino, E.1
Ferrari, E.2
Squicciarin, A.3
-
4
-
-
11244281946
-
Responding to policies at runtime in trustbuilder
-
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
-
B. Smith, K. E. Seamons, and M.D. Jones. "Responding to policies at runtime in TrustBuilder," Proc. of the 5th International Workshop on Policies for Distributed Systems and Networks, IEEE Computer Society Press, 2004, pp.149-158 (Pubitemid 40061194)
-
(2004)
Proceedings - Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2004
, pp. 149-158
-
-
Smith, B.1
Seamons, K.E.2
Jones, M.D.3
-
5
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, May
-
A. Herzberg, Y. Mass, J. Mihaeli, D. Naor, and Y. Ravid. "Access control meets public key infrastructure, or: Assigning roles to strangers." In Proceedings of the 2000 IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 2000, pp.2-14.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Security and Privacy
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
6
-
-
33750028604
-
Negotiating trust on the grid
-
J. Basney, W. Nejdl, D. Olmedilla, V. Welch, and M. Winslett, "Negotiating trust on the grid," In: Proc. of the 2nd Workshop on Semantics in P2P and Grid Computing at the 13th Int'l World Wide Web Conf, 2004.
-
(2004)
Proc. of the 2nd Workshop on Semantics in P2P and Grid Computing at the 13th Int'l World Wide Web Conf
-
-
Basney, J.1
Nejdl, W.2
Olmedilla, D.3
Welch, V.4
Winslett, M.5
-
8
-
-
19944424800
-
Real-time intrusion detection for high-speed networks
-
DOI 10.1016/j.cose.2004.07.005, PII S0167404804002354
-
WB. Jiang, H. Song, and YQ. Dai., "Real-time Intrusion Detection for High-speed Networks," Computers & Security, Volume 24, Issue 4, June 2005, pp. 287-294. (Pubitemid 40752312)
-
(2005)
Computers and Security
, vol.24
, Issue.4
, pp. 287-294
-
-
Jiang, W.1
Song, H.2
Dai, Y.3
|