-
1
-
-
4544229404
-
ADAM: Detecting intrusions by data mining
-
D. Barbará, J. Couto, S. Jajodia, L. Popyack, and N. Wu ADAM: detecting intrusions by data mining Proceedings of the IEEE workshop on information assurance and security 2001 11 16
-
(2001)
Proceedings of the IEEE Workshop on Information Assurance and Security
, pp. 11-16
-
-
Barbará, D.1
Couto, J.2
Jajodia, S.3
Popyack, L.4
Wu, N.5
-
4
-
-
45449094775
-
An entity name system (ENS) for the semantic web
-
LNCS, Springer Berlin/Heidelberg
-
P. Bouquet, H. Stoermer, and B. Bazzanella An entity name system (ENS) for the semantic web Proceedings of the semantic web: research and applications (ESWC2008) vol. 5021/2008 2008 LNCS, Springer Berlin/Heidelberg 258 272
-
(2008)
Proceedings of the Semantic Web: Research and Applications (ESWC2008)
, vol.5021
, Issue.2008
, pp. 258-272
-
-
Bouquet, P.1
Stoermer, H.2
Bazzanella, B.3
-
5
-
-
52149122472
-
Entity name system: The backbone of an open and scalable web of data
-
IEEE Computer Society
-
P. Bouquet, H. Stoermer, C. Niederee, and A. Maña Entity name system: the backbone of an open and scalable web of data Proceedings of the IEEE international conference on semantic computing, (ICSC 2008) 2008 IEEE Computer Society 554 561
-
(2008)
Proceedings of the IEEE International Conference on Semantic Computing, (ICSC 2008)
, pp. 554-561
-
-
Bouquet, P.1
Stoermer, H.2
Niederee, C.3
Maña, A.4
-
6
-
-
84855991401
-
-
Available at
-
Ó Cánovas, M. Sánchez, G. López, R. del Campo, S. Neinert, and J. Rauschenbach Architecture for unified SSO, deliverable DJ5.3.2 May 2008 Available at: http://www.geant2.net/alice/upload/pdf/GN2-08- 080v2-DJ5-3-2-Architecture-for-Unified-SSO.pdf
-
(2008)
Architecture for Unified SSO, Deliverable DJ5.3.2
-
-
Cánovas, Ó.1
Sánchez, M.2
López, G.3
Del Campo, R.4
Neinert, S.5
Rauschenbach, J.6
-
8
-
-
27144485193
-
HYPROLOG: A new logic programming language with assumptions and abduction
-
Logic Programming: 21st International Conference, ICLP 2005. Proceedings
-
H. Christiansen, and V. Dahl HYPROLOG: a new logic programming language with assumptions and abduction Proceedings of the 21st international conference on logic programming (ICLP 2005) vol. 3668 2005 LNCS, Springer 159 173 (Pubitemid 41491600)
-
(2005)
Lecture Notes in Computer Science
, vol.3668
, pp. 159-173
-
-
Christiansen, H.1
Dahl, V.2
-
9
-
-
34748865949
-
Policy-driven negotiation for authorization in the grid
-
DOI 10.1109/POLICY.2007.36, 4262590, Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
-
I. Constandache, D. Olmedilla, and F. Siebenlist Policy-driven negotiation for authorization in the grid Proceedings of 8th IEEE international workshop on policies for distributed systems and networks (POLICY '07) 2007 IEEE Computer Society 211 220 (Pubitemid 47469564)
-
(2007)
Proceedings - Eighth IEEE International Workshop on Policies for Distributed Systems and Networks, POLICY 2007
, pp. 211-220
-
-
Constandache, I.1
Olmedilla, D.2
Siebenlist, F.3
-
10
-
-
84855991396
-
A semantic approach to access control and automated credential negotiation for decentralized online repositories/an OKKAM project use case
-
CEUR Workshop Proceedings Rome, Italy ISSN 1613-0073
-
H. Koshutanski, and A. Maña A semantic approach to access control and automated credential negotiation for decentralized online repositories/an OKKAM project use case Proceedings of the 5th workshop on semantic web applications and perspectives (SWAP2008) 2008 CEUR Workshop Proceedings Rome, Italy ISSN 1613-0073
-
(2008)
Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008)
-
-
Koshutanski, H.1
Maña, A.2
-
11
-
-
33947544647
-
A negotiation scheme for access rights establishment in autonomic communication
-
H. Koshutanski, and F. Massacci A negotiation scheme for access rights establishment in autonomic communication Journal of Network and System Management 15 1 2007
-
(2007)
Journal of Network and System Management
, vol.15
, Issue.1
-
-
Koshutanski, H.1
Massacci, F.2
-
13
-
-
68449090010
-
Enhancing grid security by fine-grained behavioral control and negotiation-based authorization
-
H. Koshutanski, A. Lazouski, F. Martinelli, and P. Mori Enhancing grid security by fine-grained behavioral control and negotiation-based authorization International Journal of Information Security 8 4 2009 291 314
-
(2009)
International Journal of Information Security
, vol.8
, Issue.4
, pp. 291-314
-
-
Koshutanski, H.1
Lazouski, A.2
Martinelli, F.3
Mori, P.4
-
14
-
-
38949188899
-
The traust authorization service
-
A.J. Lee, M. Winslett, J. Basney, and V. Welch The traust authorization service ACM Transactions on Information and System Security (TISSEC) 11 1 2008 1 33
-
(2008)
ACM Transactions on Information and System Security (TISSEC)
, vol.11
, Issue.1
, pp. 1-33
-
-
Lee, A.J.1
Winslett, M.2
Basney, J.3
Welch, V.4
-
16
-
-
0032630098
-
Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
-
U. Lindqvist, and P. Porras Detecting computer and network misuse through the production-based expert system toolset (P-BEST) Proceedings of the IEEE symposium on security and privacy 1999 146 161
-
(1999)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 146-161
-
-
Lindqvist, U.1
Porras, P.2
-
17
-
-
0027609384
-
A survey of intrusion detection techniques
-
T.F. Lunt A survey of intrusion detection techniques Computers and Security 12 4 1993 405 418
-
(1993)
Computers and Security
, vol.12
, Issue.4
, pp. 405-418
-
-
Lunt, T.F.1
-
18
-
-
79956323894
-
From web data to entities and back
-
LNCS, Springer
-
Z. Miklós, N. Bonvin, P. Bouquet, M. Catasta, D. Cordioli, and P. Fankhauser From web data to entities and back Proceedings of the 22nd international conference on advanced information systems engineering (CAiSE'10) 2010 LNCS, Springer
-
(2010)
Proceedings of the 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10)
-
-
Miklós, Z.1
Bonvin, N.2
Bouquet, P.3
Catasta, M.4
Cordioli, D.5
Fankhauser, P.6
-
19
-
-
35048841281
-
PeerTrust: Automated trust negotiation for peers on the semantic web
-
Lecture Notes in Computer Science, Springer
-
W. Nejdl, D. Olmedilla, and M. Winslett PeerTrust: automated trust negotiation for peers on the semantic web VLDB workshop on secure data management (SDM) vol. 3178 2004 Lecture Notes in Computer Science, Springer 118 132
-
(2004)
VLDB Workshop on Secure Data Management (SDM)
, vol.3178
, pp. 118-132
-
-
Nejdl, W.1
Olmedilla, D.2
Winslett, M.3
-
24
-
-
33845533762
-
-
US Patent and Trademark Office IBM Corporation, patent application filed March 7, 2000
-
K. Seamons, and W. Winsborough Automated trust negotiation 2002 US Patent and Trademark Office IBM Corporation, patent application filed March 7, 2000
-
(2002)
Automated Trust Negotiation
-
-
Seamons, K.1
Winsborough, W.2
-
26
-
-
34547505017
-
PP-trust-X: A system for privacy preserving trust negotiations
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham PP-trust-X: a system for privacy preserving trust negotiations ACM Transactions on Information and System Security 10 3 2007 12
-
(2007)
ACM Transactions on Information and System Security
, vol.10
, Issue.3
, pp. 12
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
27
-
-
85084164318
-
Certificate-based access control for widely distributed resources
-
M. Thompson, W. Johnston, S. Mudumbai, G. Hoo, K. Jackson, and A. Essiari Certificate-based access control for widely distributed resources Proceedings of eighth USENIX security symposium (Security'99) 1999 215 228
-
(1999)
Proceedings of Eighth USENIX Security Symposium (Security'99)
, pp. 215-228
-
-
Thompson, M.1
Johnston, W.2
Mudumbai, S.3
Hoo, G.4
Jackson, K.5
Essiari, A.6
-
28
-
-
84939548725
-
-
Proceedings of DARPA information survivability conference and exposition (DISCEX IEEE Press
-
W. Winsborough, K. Seamons, and V. Jones Automated trust negotiation) Proceedings of DARPA information survivability conference and exposition (DISCEX vol. 1 2000 IEEE Press 88 102
-
(2000)
Automated Trust Negotiation
, vol.1
, pp. 88-102
-
-
Winsborough, W.1
Seamons, K.2
Jones, V.3
-
29
-
-
0036871183
-
Negotiating trust in the web
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jacobson, and R. Jarvis Negotiating trust in the web IEEE Internet Computing 6 6 2002 30 37
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
-
33
-
-
18844438093
-
A metadata-based access control model for web services
-
DOI 10.1108/10662240510577095
-
M. Yagüe, A. Maña, and J. López A metadata-based access control model for web services Internet Research 15 1 2005 99 116 (Pubitemid 40687455)
-
(2005)
Internet Research
, vol.15
, Issue.1
, pp. 99-116
-
-
Yague, M.I.1
Mana, A.2
Lopez, J.3
-
36
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K.E. Seamons Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation ACM Transactions on Information and System Security (TISSEC) 6 1 2003 1 42
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|