-
3
-
-
1542359992
-
N-way fail-over infrastructure for reliable servers and routers
-
Y. Amir, R. Caudy, A. Munjal, T. Schlossnagle, and C. Tutu. N-way fail-over infrastructure for reliable servers and routers. In DSN, pages 403, 2003.
-
(2003)
DSN
, pp. 403
-
-
Amir, Y.1
Caudy, R.2
Munjal, A.3
Schlossnagle, T.4
Tutu, C.5
-
7
-
-
3142676730
-
Trust-x: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-x: A peer-to-peer framework for trust establishment. IEEE Transactions on Knowledge and Data Engineering, 16(7):827-842, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
15
-
-
35048841281
-
Peertrust: Automated trust negotiation for peers on the semantic web
-
volume 3178 of Lecture Notes in Computer Science
-
W. Nejdl, D. Olmedilla, and M. Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In LDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118-132, 2004.
-
(2004)
LDB Workshop on Secure Data Management (SDM)
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
16
-
-
30644473909
-
Adaptive trust negotiation and access control
-
June
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive trust negotiation and access control. In 10th ACM Symposium on Access Control Models and Technologies, June 2005.
-
(2005)
10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
17
-
-
85175134206
-
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham. Pp-trust-x: A system for privacy preserving trust negotiations, 2007.
-
(2007)
Pp-trust-x: A System for Privacy Preserving Trust Negotiations
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
18
-
-
0004001001
-
Internet X.509 Public Key Infrastructure (PKI) proxy certificate profile
-
(Proposed Standard), June
-
S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (Proposed Standard), June 2004.
-
(2004)
RFC
, vol.3820
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearlman, L.4
Thompson, M.5
-
19
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004
-
B. Waters, A. Juels, J. A. Halderman, and E. W. Felten. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security, pages 246-256, Oct. 2004. (Pubitemid 40338206)
-
(2004)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 246-256
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
21
-
-
0036871183
-
Negotiating trust on the web
-
Nov./Dec.
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu. Negotiating trust on the web. IEEE Internet Computing, 6(6):30-37, Nov./Dec. 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
23
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation
-
February
-
T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Transaction on Information and System Security (TISSEC), pages 1-42, February 2003.
-
(2003)
ACM Transaction on Information and System Security (TISSEC)
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|