-
1
-
-
0003400251
-
-
Technical Report M74-244, The MITRE Corporation, Bedford, MA May
-
Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, Bedford, MA (May 1973)
-
(1973)
Secure Computer Systems: Mathematical Foundations and Model
-
-
Bell, D.E.1
LaPadula, L.J.2
-
2
-
-
0013142893
-
The KeyNote Trust- Management System
-
Version 2, September
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust- Management System Version 2, RFC 2704 (September 1999)
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
3
-
-
0029700344
-
Decentralized trust management
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173 (1996)
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
79960713305
-
An integration of reputation-based and policy-based trust management
-
Bonatti, P.A., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference, Galway, Ireland (November 2005)
-
Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference, Galway, Ireland (November 2005)
-
-
Bonatti, P.A.1
Duma, C.2
Olmedilla, D.3
Shahmehri, N.4
-
5
-
-
38349047685
-
Fine grained access control with trust and reputation management for globus
-
Chung, S. (ed.) OTM 2007, Part II. Springer, Heidelberg
-
Colombo, M., Martinelli, F., Mori, P., Petrocchi, M., Vaccarelli, A.: Fine grained access control with trust and reputation management for globus. In: Chung, S. (ed.) OTM 2007, Part II. LNCS, vol. 4804, pp. 1505-1515. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4804
, pp. 1505-1515
-
-
Colombo, M.1
Martinelli, F.2
Mori, P.3
Petrocchi, M.4
Vaccarelli, A.5
-
6
-
-
33646593567
-
Overview of the AT&T Labs trust-management project
-
Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. Springer, Heidelberg
-
Feigenbaum, J.: Overview of the AT&T Labs trust-management project. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 45-50. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1550
, pp. 45-50
-
-
Feigenbaum, J.1
-
9
-
-
84872793525
-
A method for access authorisation through delegation networks
-
Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) CRPIT
-
Jøsang, A., Gollmann, D., Au, R.: A method for access authorisation through delegation networks. In: Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, vol. 54, pp. 165-174 (2006)
-
(2006)
Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia
, vol.54
, pp. 165-174
-
-
Jøsang, A.1
Gollmann, D.2
Au, R.3
-
10
-
-
37249031542
-
A logical framework for history-based access control and reputation systems
-
Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security 16(1), 63-101 (2008)
-
(2008)
Journal of Computer Security
, vol.16
, Issue.1
, pp. 63-101
-
-
Krukow, K.1
Nielsen, M.2
Sassone, V.3
-
11
-
-
0345241830
-
-
Addison-Wesley Professional, Boston
-
La Macchia, B.A., Lange, S., Lyons, M., Martin, R., Price, K.T.: .NET Framework Security. Addison-Wesley Professional, Boston (2002)
-
(2002)
NET Framework Security
-
-
La Macchia, B.A.1
Lange, S.2
Lyons, M.3
Martin, R.4
Price, K.T.5
-
12
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265-310 (1992)
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
14
-
-
0033652039
-
The NIST model for role based access control: Toward a unified standard
-
July
-
Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The NIST model for role based access control: Toward a unified standard. In: Proceedings of the 5th ACM Workshop on Role Based Access Control, pp. 47-63 (July 2000)
-
(2000)
Proceedings of the 5th ACM Workshop on Role Based Access Control
, pp. 47-63
-
-
Sandhu, R.S.1
Ferraiolo, D.2
Kuhn, R.3
-
15
-
-
33749611403
-
Reputation based localized access control for mobile ad-hoc networks
-
Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. Springer, Heidelberg
-
Sukumaran, S., Blessing, E.: Reputation based localized access control for mobile ad-hoc networks. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol. 4104, pp. 197-210. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4104
, pp. 197-210
-
-
Sukumaran, S.1
Blessing, E.2
|