-
2
-
-
35048879241
-
Design and semantics of a decentralized authorization language
-
DOI 10.1109/CSF.2007.18, 4271637, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
-
M.Y. Becker, C. Fournet, and A.D. Gordon, "Design and Semantics of a Decentralized Authorization Language," Proc. IEEE 20th Computer Security Foundations Symp. (CSF), pp. 3-15, 2007. (Pubitemid 47554202)
-
(2007)
Proceedings - IEEE Computer Security Foundations Symposium
, pp. 3-15
-
-
Becker, M.Y.1
Fournet, C.2
Gordon, A.D.3
-
4
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
July
-
E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, pp. 827-842, July 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng.
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
5
-
-
3042777385
-
Trust negotiations: Concepts, systems and languages
-
E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust Negotiations: Concepts, Systems and Languages," Computing in Science Eng., vol. 6, no. 4, pp. 27-34, 2004.
-
(2004)
Computing in Science Eng.
, vol.6
, Issue.4
, pp. 27-34
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
6
-
-
81455129763
-
Anonymity preserving techniques in trust negotiations
-
E. Bertino, I. Ray, A.C. Squicciarini, and E. Ferrari, "Anonymity Preserving Techniques in Trust Negotiations," To appear in Proc. Fifth Privacy Enhancing Technologies Workshop, 2005.
-
(2005)
To Appear in Proc. Fifth Privacy Enhancing Technologies Workshop
-
-
Bertino, E.1
Ray, I.2
Squicciarini, A.C.3
Ferrari, E.4
-
7
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
F. Boudot, "Efficient Proofs that a Committed Number Lies in an Interval," Proc. EUROCRYPT, pp. 431-444, 2000.
-
(2000)
Proc. EUROCRYPT
, pp. 431-444
-
-
Boudot, F.1
-
8
-
-
80052494019
-
Consumable credentials in linear-logic-based access-control systems
-
K.D. Bowers, L. Bauer, D. Garg, F. Pfenning, and M.K. Reiter, "Consumable Credentials in Linear-Logic-Based Access-Control Systems," Proc. Network and Distributed System Security Symp. (NDSS), 2007.
-
(2007)
Proc. Network and Distributed System Security Symp. (NDSS)
-
-
Bowers, K.D.1
Bauer, L.2
Garg, D.3
Pfenning, F.4
Reiter, M.K.5
-
11
-
-
85032463527
-
Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms
-
D. Chaum, "Showing Credentials without Identification Transferring Signatures between Unconditionally Unlinkable Pseudonyms," Proc. Int'l Conf. Cryptology on Advances in Cryptology (AUSCRYPT), pp. 246-264, 1990.
-
(1990)
Proc. Int'l Conf. Cryptology on Advances in Cryptology (AUSCRYPT)
, pp. 246-264
-
-
Chaum, D.1
-
14
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," Proc. Int'l Cryptology Conf. (CRYPTO '86), pp. 186-194, 1986.
-
(1986)
Proc. Int'l Cryptology Conf. (CRYPTO '86)
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
33750280592
-
A linear logic of authorization and knowledge
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
D. Garg, L. Bauer, K.D. Bowers, F. Pfenning, and M.K. Reiter, "A Linear Logic of Authorization and Knowledge," Proc. European Symp. Research in Computer Security (ESORICS), pp. 297-312, 2006. (Pubitemid 44609863)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189
, pp. 297-312
-
-
Garg, D.1
Bauer, L.2
Bowers, K.D.3
Pfenning, F.4
Reiter, M.K.5
-
16
-
-
85180810679
-
Advanced client/server authentication in TLS
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K.E. Seamons, and B. Smith, "Advanced Client/Server Authentication in TLS," Proc. Network and Distributed System Security Symp. (NDSS), 2002.
-
(2002)
Proc. Network and Distributed System Security Symp. (NDSS)
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
17
-
-
1642394295
-
Hidden credentials
-
J.E. Holt, R.W. Bradshaw, K.E. Seamons, and H. Orman, "Hidden Credentials," WPES '03: Proc. ACM Workshop Privacy in the Electronic Soc., pp. 1-8, 2003.
-
(2003)
WPES '03: Proc.ACM Workshop Privacy in the Electronic Soc.
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orman, H.4
-
18
-
-
84883816153
-
Gmo: A graph matching for ontologies
-
W. Hu, N. Jian, Y. Qu, and Y. Wang, "Gmo: A Graph Matching for Ontologies," Proc. Workshop Integrating Ontologies, 2005.
-
(2005)
Proc. Workshop Integrating Ontologies
-
-
Hu, W.1
Jian, N.2
Qu, Y.3
Wang, Y.4
-
21
-
-
57949107810
-
Enforcing safety and consistency constraints in policy-based authorization systems
-
Dec.
-
A.J. Lee and M. Winslett, "Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems," ACM Trans. Information and System Security, vol. 12, no. 8, pp. 1-33, Dec. 2008.
-
(2008)
ACM Trans. Information and System Security
, vol.12
, Issue.8
, pp. 1-33
-
-
Lee, A.J.1
Winslett, M.2
-
22
-
-
33751513006
-
OACerts: Oblivious attribute certificates
-
DOI 10.1109/TDSC.2006.54
-
J. Li and N. Li, "Oacerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006. (Pubitemid 44837036)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 340-352
-
-
Li, J.1
Li, N.2
-
25
-
-
33646149431
-
-
Organization for the Advancement of Structured Information Standards (OASIS) Version 2.0
-
Organization for the Advancement of Structured Information Standards (OASIS) "Security Assertions Markup Language (SAML), Version 2.0," http://wiki.oasis-open.org/security, 2005.
-
(2005)
Security Assertions Markup Language (SAML)
-
-
-
27
-
-
33750254142
-
Constructing virtual documents for ontology matching
-
DOI 10.1145/1135777.1135786, Proceedings of the 15th International Conference on World Wide Web
-
Y. Qu, W. Hu, and G. Cheng, "Constructing Virtual Documents for Ontology Matching," Proc. 15th Int'l Conf. World Wide Web (WWW), pp. 23-31, 2006. (Pubitemid 46946594)
-
(2006)
Proceedings of the 15th International Conference on World Wide Web
, pp. 23-31
-
-
Qu, Y.1
Hu, W.2
Cheng, G.3
-
29
-
-
0018545449
-
How to Share a Secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
30
-
-
34848877469
-
Supporting robust and secure interactions in open domains through recovery of trust negotiations
-
A.C. Squicciarini, A. Trombetta, and E. Bertino, "Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations," Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS), p. 57, 2007.
-
(2007)
Proc. 27th Int'l Conf. Distributed Computing Systems (ICDCS)
, pp. 57
-
-
Squicciarini, A.C.1
Trombetta, A.2
Bertino, E.3
-
31
-
-
70349249348
-
Identity-based long running negotiations
-
A.C. Squicciarini, A. Trombetta, E. Bertino, and S. Braghin, "Identity-Based Long Running Negotiations," Proc. Fourth ACM Workshop Digital Identity Management, pp. 97-106, 2008.
-
(2008)
Proc. Fourth ACM Workshop Digital Identity Management
, pp. 97-106
-
-
Squicciarini, A.C.1
Trombetta, A.2
Bertino, E.3
Braghin, S.4
-
35
-
-
33750915444
-
Safety in automated trust negotiation
-
DOI 10.1145/1178618.1178623
-
W.H. Winsborough and N. Li, "Safety in Automated Trust Negotiation," ACM Trans. Information and System Security, vol. 9, no. 3, pp. 352-390, 2006. (Pubitemid 44728678)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.3
, pp. 352-390
-
-
Winsborough, W.H.1
Li, N.2
-
36
-
-
1642351286
-
-
World Wide Web Consortium
-
World Wide Web Consortium "OWL Web Ontology Language," http://www.w3.org/TR/owl-ref/, 2004.
-
(2004)
OWL Web Ontology Language
-
-
-
37
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, pp. 110-122, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 110-122
-
-
Yu, T.1
Winslett, M.2
|