-
2
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M. K. Franklin. Identity-based encryption from the weil pairing. In International Cryptology Conference on Advances in Cryptology, pages 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
DOI 10.1145/1057977.1057978
-
R. Bose and J. Frew. Lineage retrieval for scientific data processing: a survey. ACM Comput. Surv., 37:1-28, March 2005. (Pubitemid 41246320)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
5
-
-
12344311915
-
Decentralized trust management and accountability in federated systems
-
B. Chun and A. C. Bavier. Decentralized trust management and accountability in federated systems. In HICSS, 2004.
-
(2004)
HICSS
-
-
Chun, B.1
Bavier, C.A.2
-
6
-
-
84902437419
-
A logic for auditing accountability in decentralized systems
-
R. Corin, S. Etalle, J. I. den Hartog, G. Lenzini, and I. Staicu. A logic for auditing accountability in decentralized systems. In IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust, pages 187-201, 2005.
-
(2005)
IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust
, pp. 187-201
-
-
Corin, R.1
Etalle, S.2
Den Hartog, J.I.3
Lenzini, G.4
Staicu, I.5
-
7
-
-
84956993751
-
Reasoning about accountability within delegation
-
Information and Communications Security
-
B. Crispo and G. Ruffo. Reasoning about accountability within delegation. In ICICS, pages 251-260, 2001. (Pubitemid 33361975)
-
(2001)
Lecture Notes in Computer Science
, Issue.2229
, pp. 251-260
-
-
Crispo, B.1
Ruffo, G.2
-
8
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
Fabien Petitcolas, editor
-
Y. Chen et al. Oblivious hashing: A stealthy software integrity verification primitive. In Fabien Petitcolas, editor, Information Hiding, volume 2578 of Lecture Notes in Computer Science, pages 400-414. 2003.
-
(2003)
Information Hiding, Volume 2578 of Lecture Notes in Computer Science
, pp. 400-414
-
-
Chen, Y.1
-
9
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
Berkeley, CA, USA USENIX Association
-
R. Hasan, R. Sion, and M. Winslett. The case of the fake picasso: preventing history forgery with secure provenance. In 7th conference on File and storage technologies, pages 1-14, Berkeley, CA, USA, 2009. USENIX Association.
-
(2009)
7th Conference on File and Storage Technologies
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
10
-
-
0035424017
-
Location systems for ubiquitous computing
-
DOI 10.1109/2.940014
-
J. Hightower and G. Borriello. Location systems for ubiquitous computing. Computer, 34(8):57-66, August 2001. (Pubitemid 32742945)
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Borriello, G.2
-
12
-
-
70350381139
-
Towards a theory of accountability and audit
-
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely. Towards a theory of accountability and audit. In ESORICS, pages 152-167, 2009.
-
(2009)
ESORICS
, pp. 152-167
-
-
Jagadeesan, R.1
Jeffrey, A.2
Pitcher, C.3
Riely, J.4
-
13
-
-
33745689203
-
Accountability in electronic commerce protocols
-
R. Kailar. Accountability in electronic commerce protocols. IEEE Trans. Software Eng., 22(5):313-328, 1996. (Pubitemid 126771673)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
16
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
M. Casassa Mont, S. Pearson, and P. Bramhall. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services. In DEXA Workshops, pages 377-382, 2003.
-
(2003)
DEXA Workshops
, pp. 377-382
-
-
Casassa Mont, M.1
Pearson, S.2
Bramhall, P.3
-
20
-
-
71749102261
-
A privacy manager for cloud computing
-
S. Pearson, Y. Shen, and M. Mowbray. A privacy manager for cloud computing. In CloudCom, pages 90-106, 2009.
-
(2009)
CloudCom
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
25
-
-
80053139948
-
-
Eucalyptus Systems. http://www.eucalyptus.com/.
-
-
-
-
27
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou. Enabling public verifiability and data dynamics for storage security in cloud computing. In ESORICS, pages 355-370, 2009.
-
(2009)
ESORICS
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
28
-
-
45449105171
-
Information accountability
-
D. Weitzner, H. Abelson, T. Berners-Lee, J. Feigenbaum, J. Hendler, and G. Sussman. Information accountability. Commun. ACM, 51(6):82-87, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D.1
Abelson, H.2
Berners-Lee, T.3
Feigenbaum, J.4
Hendler, J.5
Sussman, G.6
|