-
1
-
-
0003226048
-
The key note trust management system
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, "The KeyNote Trust Management System, " IETF RFC 2704, September 1999.
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
3
-
-
3142676730
-
Trust-x: A peerto- peer framework for trust establishment
-
July
-
E. Bertino, E. Ferrari, and A. Squicciarini, "Trust-X: A Peerto- Peer Framework for Trust Establishment, " IEEE TKDE, July 2004, pp. 827-842.
-
(2004)
IEEE TKDE
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.3
-
6
-
-
0003593599
-
-
C. Ellison, B. Franz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, "RFC 2693: SPKI Certifi cate Theory, " http://www.faqs.org/frcs/rfc2693.html.
-
RFC 2693: SPKI Certificate Theory
-
-
Ellison, C.1
Franz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
85180810679
-
Advanced client/server authentication in TLS
-
February
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith, "Advanced Client/Server Authentication in TLS, " Network and Dist. System Security Symp., February 2002.
-
(2002)
Network and Dist. System Security Symp
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
10
-
-
0034829512
-
Sd3: A trust management system with certified evaluation
-
May
-
T. Jim, "SD3: A Trust Management System with Certified Evaluation, " IEEE Symp. on Security and Privacy, May 2001.
-
(2001)
IEEE Symp. on Security and Privacy
-
-
Jim, T.1
-
12
-
-
1642399823
-
A stateless network architecture for inter-enterprise authentication, authorization and accounting
-
June
-
H. Kung, F. Zhu, and M. Iansiti, "A Stateless Network Architecture for Inter-enterprise Authentication, Authorization and Accounting, " Intl. Conf. on Web Services, June 2003.
-
(2003)
Intl. Conf. on Web Services
-
-
Kung, H.1
Zhu, F.2
Iansiti, M.3
-
14
-
-
84990974702
-
Developer web services: Creating web services, part 2
-
March/April
-
M. Lehmann, "Developer Web Services: Creating Web Services, Part 2, " Oracle Magazine, March/April 2004.
-
(2004)
Oracle Magazine
-
-
Lehmann, M.1
-
16
-
-
35048841281
-
Peer trust: Automated trust negotiation for peers on the semantic web
-
W. Nejdl, D. Olmedilla, and M. Winslett, "Peer Trust: Automated Trust Negotiation for Peers on the Semantic Web, " Secure Data Management Workshop, 118-132, 2004.
-
(2004)
Secure Data Management Workshop
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
17
-
-
30644473909
-
Adaptive trust negotiation and access control
-
June
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons, "Adaptive Trust Negotiation and Access Control, " ACM SACMAT, June 2005.
-
(2005)
ACM SACMAT
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
18
-
-
33745921872
-
-
Internet2 Working Draft, 8 June
-
Shibboleth Architecture Technical Overview, Internet2 Working Draft, 8 June 2005, http://shibboleth.internet2.edu/docs/draft-mace-shibbolethtech-overview-latest.pdf.
-
(2005)
Shibboleth Architecture Technical Overview
-
-
-
20
-
-
0036871183
-
The trustbuilder architecture for trust negotiation
-
November/December
-
M. Winslett, T. Yu, K. E. Seamons, A. Hess, J. Jacobson, R. Jarvis, B. Smith, and L. Yu, "The TrustBuilder Architecture for Trust Negotiation, " IEEE Internet Computing, volume 6, number 6, November/December 2002, pages 30-37.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.E.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
21
-
-
0141945393
-
Xml-signature syntax and processing
-
12 February
-
XML-Signature Syntax and Processing, W3C Recommendation, 12 February 2002, http://www.w3.org/TR/2002/RECxmldsig-core-20020212/.
-
(2002)
W3C Recommendation
-
-
-
22
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, "Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, " ACM Transactions on Information Systems Security, 6(1): 1-42, 2003.
-
(2003)
ACM Transactions on Information Systems Security
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|