-
1
-
-
0038613719
-
Secure mediation: Requirements, design, and architecture
-
C. Altenschmidt, J. Biskup, U. Flegel, and Y. Karab-ulut, "Secure mediation: Requirements, design, and architecture," Journal of Computer Security, vol. 11, no. 3, pp. 365-398, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.3
, pp. 365-398
-
-
Altenschmidt, C.1
Biskup, J.2
Flegel, U.3
Karab-ulut, Y.4
-
2
-
-
0034449825
-
Cross-domain one-shot authorization using smart cards
-
ACM Press
-
R. Au, M. Looi, and P. Ashley, "Cross-domain one-shot authorization using smart cards," in Proceedings of the 7th ACM conference on Computer and communications security, pp. 220-227, ACM Press, 2000.
-
(2000)
Proceedings of the 7th ACM conference on Computer and communications security
, pp. 220-227
-
-
Au, R.1
Looi, M.2
Ashley, P.3
-
3
-
-
0012604970
-
Toward open, secure, widely distributed services
-
J. Bacon and K. Moody, "Toward open, secure, widely distributed services," Communications of the ACM, vol. 45, no. 6, pp. 59-64, 2002.
-
(2002)
Communications of the ACM
, vol.45
, Issue.6
, pp. 59-64
-
-
Bacon, J.1
Moody, K.2
-
4
-
-
85053861123
-
A resource access decision service for CORBA-based distributed systems
-
K. Beznosov, Y. Deng, B. Blakley, C. Burt, and J. Barkley, "A resource access decision service for CORBA-based distributed systems," in Proceedings of 15th IEEE Annual Computer Security Applications Conference (ACSAC'99), pp. 310{319, 1999.
-
(1999)
Proceedings of 15th IEEE Annual Computer Security Applications Conference (ACSAC'99)
, pp. 310-319
-
-
Beznosov, K.1
Deng, Y.2
Blakley, B.3
Burt, C.4
Barkley, J.5
-
5
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis, "The role of trust management in distributed systems security," in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pp. 185-210, Springer-Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
6
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
LNCS 1550, Springer-Verlag
-
M. Blaze, J. Feigenbaum, and A. D. Keromytis, "KeyNote: Trust management for public-key infrastructures," in Proceedings of 6th International Workshop on Security Protocols, LNCS 1550, pp. 59-63, Springer-Verlag, 1998.
-
(1998)
Proceedings of 6th International Workshop on Security Protocols
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
7
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proceedings of IEEE Symposium on Security and Privacy, pp. 164-173, 1996.
-
(1996)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
0037362986
-
Role-based access control with X.509 attribute certificates
-
Mar/Apr
-
D. Chadwick, A. Otenko, and E. Ball, "Role-based access control with X.509 attribute certificates," IEEE Internet Computing, vol. 7, no. 2, pp. 62-69, Mar/Apr. 2003.
-
(2003)
IEEE Internet Computing, vol. 7, no. 2
, pp. 62-69
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
11
-
-
0001470602
-
REFEREE: Trust management for Web applications
-
Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, "REFEREE: Trust management for Web applications," Computer Networks and ISDN Systems, vol. 29, pp. 953-964, no. 8-13, 1997.
-
(1997)
Computer Networks and ISDN Systems
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
12
-
-
84944075856
-
An architecture for distributed OASIS services
-
Springer-Verlag
-
J. A. Hine, W. Yao, J. Bacon, and K. Moody, "An architecture for distributed OASIS services," in IFIP/ACM International Conference on Distributed Systems Platforms, pp. 104{120, Springer-Verlag, 2000.
-
(2000)
IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 104-120
-
-
Hine, J.A.1
Yao, W.2
Bacon, J.3
Moody, K.4
-
13
-
-
0031639452
-
Authorization and attribute certificates for widely distributed access control
-
W. Johnston, S. Mudumbai, and M. Thompson, "Authorization and attribute certificates for widely distributed access control," in Proceedings of Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98), pp. 340{345, 1998.
-
(1998)
Proceedings of Seventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE '98)
, pp. 340-345
-
-
Johnston, W.1
Mudumbai, S.2
Thompson, M.3
-
14
-
-
84948440714
-
Design of a role-based trust-management framework
-
N. Li, J. C. Mitchell, and W. H. Winsborough, "Design of a role-based trust-management framework," in Proceedings of IEEE Symposium on Security and Privacy, pp. 119-130, 2002.
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
, pp. 119-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
15
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Feb
-
N. Li, W. H. Winsborough, and J. C. Mitchell, "Distributed credential chain discovery in trust management," Journal of Computer Security, vol. 11, no. 1, pp. 35-86, Feb. 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
16
-
-
84871131596
-
A distributed certificate management system (DCMS) supporting group-based access controls
-
R. Oppliger, A. Greulich, and P. Trachsel, "A distributed certificate management system (DCMS) supporting group-based access controls," in Proceedings of 15th IEEE Annual omputer Security Applications Conference (ACSAC'99), pp. 241-248, 1999.
-
(1999)
Proceedings of 15th IEEE Annual omputer Security Applications Conference (ACSAC'99)
, pp. 241-248
-
-
Oppliger, R.1
Greulich, A.2
Trachsel, P.3
-
19
-
-
33845533762
-
Automated Trust Negotiation
-
IBM Corporation, patent application filed Mar. 7, 2000
-
K. Seamons and W. Winsborough, Automated Trust Negotiation, Technical report, US Patent and Trademark Office, 2002. IBM Corporation, patent application filed Mar. 7, 2000.
-
(2002)
Technical report, US Patent and Trademark Office
-
-
Seamons, K.1
Winsborough, W.2
-
21
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
Aug
-
M. Thompson, W, Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari, "Certificate-based access control for widely distributed resources," in Proceedings of Eighth USENIX Security Symposium (Security'99), pp. 215-228, Aug. 1999.
-
(1999)
Proceedings of Eighth USENIX Security Symposium (Security'99)
, pp. 215-228
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
-
22
-
-
84951714031
-
Authorization in enterprise-wide distributed system: a practical design and application
-
V. Varadharajan, C. Crall, and J. Pato, "Authorization in enterprise-wide distributed system: a practical design and application," in Proceedings of 14th IEEE Annual Computer Security Applications Conference, pp. 178{189, 1998.
-
(1998)
Proceedings of 14th IEEE Annual Computer Security Applications Conference
, pp. 178-189
-
-
Varadharajan, V.1
Crall, C.2
Pato, J.3
-
23
-
-
0032266575
-
Issues in the design of secure authorization service for distributed applications
-
IEEE Press
-
V. Varadharajan, C. Crall, and J. Pato, "Issues in the design of secure authorization service for distributed applications," in Global Telecommunications Conference (GLOBECOM'98) The Bridge to Global Integration, vol. 2, pp. 874-879, IEEE Press, 1998.
-
(1998)
Global Telecommunications Conference (GLOBECOM'98) The Bridge to Global Integration
, vol.2
, pp. 874-879
-
-
Varadharajan, V.1
Crall, C.2
Pato, J.3
-
27
-
-
0003504206
-
-
WS ConceptualArchitecture, May
-
WS ConceptualArchitecture, Web Services Conceptual Architecture (WSCA 1.0), May 2001 (http://www-3.ibm.com/software/solutions/webservices/pdf/WSCA.pdf).
-
(2001)
Web Services Conceptual Architecture (WSCA 1.0)
-
-
-
29
-
-
33745883651
-
eXtensible Access Control Markup Language (XACML)
-
XACML
-
XACML, eXtensible Access Control Markup Language (XACML), 2004 (http://www.oasis-open.org/committees/xacml).
-
(2004)
-
-
-
30
-
-
35248894984
-
-
in iTrust, LNCS 2692, Springer-Verlag
-
W. Yao, "Fidelis: A policy-driven trust management framework," in iTrust, LNCS 2692, pp. 301-314, Springer-Verlag, 2003.
-
(2003)
Fidelis: A policy-driven trust management framework
, pp. 301-314
-
-
Yao, W.1
-
31
-
-
35248824719
-
-
PhD thesis, University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom, Appeared as a technical report UCAM-CL-TR-608, ISSN
-
W. Yao, Trust management for widely distributed systems, PhD thesis, University of Cambridge, Computer Laboratory, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom, 2004. Appeared as a technical report UCAM-CL-TR-608, ISSN 1476-2986.
-
(2004)
Trust management for widely distributed systems
, pp. 1476-2986
-
-
Yao, W.1
-
32
-
-
0032629460
-
A usercentered, modular authorization service built on an RBAC foundation
-
M. Zurko, R. Simon, and T. Sanfilippo, "A usercentered, modular authorization service built on an RBAC foundation," in Proceedings of the IEEE Symposium on Security and Privacy, pp. 57-71, 1999.
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 57-71
-
-
Zurko, M.1
Simon, R.2
Sanfilippo, T.3
|