-
1
-
-
0027649548
-
Distributed timestamp generation in planar lattice networks ACM
-
Aug.
-
P. Ammann and S. Jajodia, "Distributed Timestamp Generation in Planar Lattice Networks," ACM Trans. Computer Systems, vol. 11, pp. 205-225, Aug. 1993.
-
(1993)
Trans. Computer Systems
, vol.11
, pp. 205-225
-
-
Ammann, P.1
Jajodia, S.2
-
2
-
-
74049102823
-
Provable data possession at untrusted stores
-
G. Ateniese, R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song, "Provable Data Possession at Untrusted Stores," Proc. ACM Conf. Computer and Comm. Security, pp. 598-609, 2007.
-
(2007)
Proc. ACM Conf. Computer and Comm. Security
, pp. 598-609
-
-
Ateniese, G.1
Burns, R.2
Curtmola, R.3
Herring, J.4
Kissner, L.5
Peterson, Z.6
Song, D.7
-
3
-
-
77950867762
-
Integrating usage control with sip-based communications
-
E. Barka and A. Lakas, "Integrating Usage Control with SIP-Based Communications," J. Computer Systems, Networks, and Comm., vol. 2008, pp. 1-8, 2008.
-
(2008)
J. Computer Systems, Networks, and Comm. 2008
, pp. 1-8
-
-
Barka, E.1
Lakas, A.2
-
4
-
-
84874324906
-
Identity-based encryption from the weil pairing
-
Advances in Cryptology - CRYPTO 2001
-
D. Boneh and M.K. Franklin, "Identity-Based Encryption from the Weil Pairing," Proc. Int'l Cryptology Conf. Advances in Cryptology, pp. 213-229, 2001. (Pubitemid 33317917)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 213-229
-
-
Boneh, D.1
Franklin, M.2
-
5
-
-
24344453002
-
Lineage retrieval for scientific data processing: A survey
-
DOI 10.1145/1057977.1057978
-
R. Bose and J. Frew, "Lineage Retrieval for Scientific Data Processing: A Survey," ACM Computing Surveys, vol. 37, pp. 1-28, Mar. 2005. (Pubitemid 41246320)
-
(2005)
ACM Computing Surveys
, vol.37
, Issue.1
, pp. 1-28
-
-
Bose, R.1
Frew, J.2
-
6
-
-
33846076805
-
Provenance management in curated databases
-
DOI 10.1145/1142473.1142534, SIGMOD 2006 - Proceedings of the ACM SIGMOD International Conference on Management of Data
-
P. Buneman, A. Chapman, and J. Cheney, "Provenance Management in Curated Databases," Proc. ACM SIGMOD Int'l Conf. Management of Data (SIGMOD '06), pp. 539-550, 2006. (Pubitemid 46946538)
-
(2006)
Proceedings of the ACM SIGMOD International Conference on Management of Data
, pp. 539-550
-
-
Buneman, P.1
Chapman, A.2
Cheney, J.3
-
8
-
-
84861175256
-
-
OASIS Security Services Technical Committee
-
OASIS Security Services Technical Committee, "Security Assertion Markup Language (saml) 2.0," http://www.oasis-open.org/committees/tc home.php?wg abbrev=security, 2012.
-
(2012)
Security Assertion Markup Language (Saml) 2.0
-
-
-
9
-
-
84902437419
-
A logic for auditing accountability in decentralized systems
-
R. Corin, S. Etalle, J.I. den Hartog, G. Lenzini, and I. Staicu, "A Logic for Auditing Accountability in Decentralized Systems," Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust, pp. 187-201, 2005.
-
(2005)
Proc. IFIP TC1 WG1.7 Workshop Formal Aspects in Security and Trust
, pp. 187-201
-
-
Corin, R.1
Etalle, S.2
Den Hartog, J.I.3
Lenzini, G.4
Staicu, I.5
-
10
-
-
84956993751
-
Reasoning about Accountability within Delegation
-
Information and Communications Security
-
B. Crispo and G. Ruffo, "Reasoning about Accountability within Delegation," Proc. Third Int'l Conf. Information and Comm. Security (ICICS), pp. 251-260, 2001. (Pubitemid 33361975)
-
(2001)
Lecture Notes in Computer Science
, Issue.2229
, pp. 251-260
-
-
Crispo, B.1
Ruffo, G.2
-
11
-
-
35248822611
-
Oblivious hashing: A stealthy software integrity verification primitive
-
F. Petitcolas, ed.
-
Y. Chen et al., "Oblivious Hashing: A Stealthy Software Integrity Verification Primitive," Proc. Int'l Workshop Information Hiding, F. Petitcolas, ed., pp. 400-414, 2003.
-
(2003)
Proc. Int'l Workshop Information Hiding
, pp. 400-414
-
-
Chen, Y.1
-
13
-
-
34249844415
-
An open framework for foundational proof-carrying code
-
DOI 10.1145/1190315.1190325, Proceedings of the TLDI 2007: 2007 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation - Papers Presented at the Workshop
-
X. Feng, Z. Ni, Z. Shao, and Y. Guo, "An Open Framework for Foundational Proof-Carrying Code," Proc. ACM SIGPLAN Int'l Workshop Types in Languages Design and Implementation, pp. 67-78, 2007. (Pubitemid 47338833)
-
(2007)
Proceedings of the TLDI 2007: 2007 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation - Papers Presented at the Workshop
, pp. 67-78
-
-
Feng, X.1
Ni, Z.2
Shao, Z.3
Guo, Y.4
-
14
-
-
84861153374
-
-
Flickr
-
Flickr, http://www.flickr.com/, 2012.
-
(2012)
-
-
-
15
-
-
85062006160
-
The case of the fake picasso: Preventing history forgery with secure provenance
-
R. Hasan, R. Sion, and M. Winslett, "The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance," Proc. Seventh Conf. File and Storage Technologies, pp. 1-14, 2009.
-
(2009)
Proc. Seventh Conf. File and Storage Technologies
, pp. 1-14
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
16
-
-
0035424017
-
Location systems for ubiquitous computing
-
DOI 10.1109/2.940014
-
J. Hightower and G. Borriello, "Location Systems for Ubiquitous Computing," Computer, vol. 34, no. 8, pp. 57-66, Aug. 2001. (Pubitemid 32742945)
-
(2001)
Computer
, vol.34
, Issue.8
, pp. 57-66
-
-
Hightower, J.1
Borriello, G.2
-
17
-
-
33746329517
-
Using self-defending objects to develop security aware applications in java
-
J.W. Holford, W.J. Caelli, and A.W. Rhodes, "Using Self-Defending Objects to Develop Security Aware Applications in Java," Proc. 27th Australasian Conf. Computer Science, vol. 26, pp. 341-349, 2004.
-
(2004)
Proc. 27th Australasian Conf. Computer Science
, vol.26
, pp. 341-349
-
-
Holford, J.W.1
Caelli, W.J.2
Rhodes, A.W.3
-
19
-
-
69949171348
-
Cloud computing and information policy: Computing in a policy cloud?
-
P.T. Jaeger, J. Lin, and J.M. Grimes, "Cloud Computing and Information Policy: Computing in a Policy Cloud?," J. Information Technology and Politics, vol. 5, no. 3, pp. 269-283, 2009.
-
(2009)
J. Information Technology and Politics
, vol.5
, Issue.3
, pp. 269-283
-
-
Jaeger, P.T.1
Lin, J.2
Grimes, J.M.3
-
20
-
-
70350381139
-
Towards a theory of accountability and audit
-
R. Jagadeesan, A. Jeffrey, C. Pitcher, and J. Riely, "Towards a Theory of Accountability and Audit," Proc. 14th European Conf. Research in Computer Security (ESORICS), pp. 152-167, 2009.
-
(2009)
Proc. 14th European Conf. Research in Computer Security (ESORICS)
, pp. 152-167
-
-
Jagadeesan, R.1
Jeffrey, A.2
Pitcher, C.3
Riely, J.4
-
21
-
-
33745689203
-
Accountability in electronic commerce protocols
-
R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. Software Eng., vol. 22, no. 5, pp. 313-328, May 1996. (Pubitemid 126771673)
-
(1996)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
22
-
-
70350241671
-
The design and evaluation of accountable grid computing system
-
W. Lee, A. Cinzia Squicciarini, and E. Bertino, "The Design and Evaluation of Accountable Grid Computing System," Proc. 29th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '09), pp. 145-154, 2009.
-
(2009)
Proc. 29th IEEE Int'l Conf. Distributed Computing Systems (ICDCS '09)
, pp. 145-154
-
-
Lee, W.1
Cinzia Squicciarini, A.2
Bertino, E.3
-
23
-
-
84861176378
-
-
US Patent 6 766 353 July
-
J.H. Lin, R.L. Geiger, R.R. Smith, A.W. Chan, and S. Wanchoo, Method for Authenticating a Java Archive (jar) for Portable Devices, US Patent 6,766,353, July 2004.
-
(2004)
Method for Authenticating A Java Archive (Jar) for Portable Devices
-
-
Lin, J.H.1
Geiger, R.L.2
Smith, R.R.3
Chan, A.W.4
Wanchoo, S.5
-
24
-
-
77955712460
-
On usage control for grid systems
-
F. Martinelli and P. Mori, "On Usage Control for Grid Systems," Future Generation Computer Systems, vol. 26, no. 7, pp. 1032-1042, 2010.
-
(2010)
Future Generation Computer Systems
, vol.26
, Issue.7
, pp. 1032-1042
-
-
Martinelli, F.1
Mori, P.2
-
26
-
-
84942776290
-
Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services
-
M.C. Mont, S. Pearson, and P. Bramhall, "Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services," Proc. Int'l Workshop Database and Expert Systems Applications (DEXA), pp. 377-382, 2003.
-
(2003)
Proc. Int'l Workshop Database and Expert Systems Applications (DEXA)
, pp. 377-382
-
-
Mont, M.C.1
Pearson, S.2
Bramhall, P.3
-
29
-
-
3142523603
-
The uconabc usage control model ACM
-
J. Park and R. Sandhu, "The Uconabc Usage Control Model," ACM Trans. Information and System Security, vol. 7, no. 1, pp. 128-174, 2004.
-
(2004)
Trans. Information and System Security
, vol.7
, Issue.1
, pp. 128-174
-
-
Park, J.1
Sandhu, R.2
-
31
-
-
71749102261
-
A privacy manager for cloud computing
-
S. Pearson, Y. Shen, and M. Mowbray, "A Privacy Manager for Cloud Computing," Proc. Int'l Conf. Cloud Computing (CloudCom), pp. 90-106, 2009.
-
(2009)
Proc. Int'l Conf. Cloud Computing (CloudCom)
, pp. 90-106
-
-
Pearson, S.1
Shen, Y.2
Mowbray, M.3
-
32
-
-
33748543201
-
Distributed usage control
-
DOI 10.1145/1151030.1151053, Privacy and Security in Highly Dynamic Systems
-
A. Pretschner, M. Hilty, and D. Basin, "Distributed Usage Control," Comm. ACM, vol. 49, no. 9, pp. 39-44, Sept. 2006. (Pubitemid 44371759)
-
(2006)
Communications of the ACM
, vol.49
, Issue.9
, pp. 39-44
-
-
Pretschner, A.1
Hilty, M.2
Basin, D.3
-
33
-
-
49249092646
-
Usage control enforcement: Present and future
-
July/Aug.
-
A. Pretschner, M. Hilty, F. Schuö tz, C. Schaefer, and T. Walter, "Usage Control Enforcement: Present and Future," IEEE Security & Privacy, vol. 6, no. 4, pp. 44-53, July/Aug. 2008.
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.4
, pp. 44-53
-
-
Pretschner, A.1
Hilty, M.2
Schuötz, F.3
Schaefer, C.4
Walter, T.5
-
34
-
-
67651154463
-
Policy evolution in distributed usage control
-
A. Pretschner, F. Schuö tz, C. Schaefer, and T. Walter, "Policy Evolution in Distributed Usage Control," Electronic Notes Theoretical Computer Science, vol. 244, pp. 109-123, 2009.
-
(2009)
Electronic Notes Theoretical Computer Science
, vol.244
, pp. 109-123
-
-
Pretschner, A.1
Schuötz, F.2
Schaefer, C.3
Walter, T.4
-
35
-
-
84861166049
-
-
NTP: The Network Time Protocol
-
NTP: The Network Time Protocol, http://www.ntp.org/, 2012.
-
(2012)
-
-
-
38
-
-
33947694320
-
Store, forget, and check: Using algebraic signatures to check remotely administered storage
-
T.J.E. Schwarz and E.L. Miller, "Store, Forget, and Check: Using Algebraic Signatures to Check Remotely Administered Storage," Proc. IEEE Int'l Conf. Distributed Systems, p. 12, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Distributed Systems
, pp. 12
-
-
Schwarz, T.J.E.1
Miller, E.L.2
-
40
-
-
80053159713
-
Promoting distributed accountability in the cloud
-
S. Sundareswaran, A. Squicciarini, D. Lin, and S. Huang, "Promoting Distributed Accountability in the Cloud," Proc. IEEE Int'l Conf. Cloud Computing, 2011.
-
(2011)
Proc. IEEE Int'l Conf. Cloud Computing
-
-
Sundareswaran, S.1
Squicciarini, A.2
Lin, D.3
Huang, S.4
-
41
-
-
84861175168
-
-
Eucalyptus Systems, http://www.eucalyptus.com/, 2012.
-
(2012)
Eucalyptus Systems
-
-
-
43
-
-
70350389843
-
Enabling public verifiability and data dynamics for storage security in cloud computing
-
Q. Wang, C. Wang, J. Li, K. Ren, and W. Lou, "Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing," Proc. European Conf. Research in Computer Security (ESORICS), pp. 355-370, 2009.
-
(2009)
Proc. European Conf. Research in Computer Security (ESORICS)
, pp. 355-370
-
-
Wang, Q.1
Wang, C.2
Li, J.3
Ren, K.4
Lou, W.5
-
44
-
-
45449105171
-
Information accountability
-
D.J. Weitzner, H. Abelson, T. Berners-Lee, J. Feigen-baum, J. Hendler, and G.J. Sussman, "Information Accountability," Comm. ACM, vol. 51, no. 6, pp. 82-87, 2008.
-
(2008)
Comm. ACM
, vol.51
, Issue.6
, pp. 82-87
-
-
Weitzner, D.J.1
Abelson, H.2
Berners-Lee, T.3
Feigen-Baum, J.4
Hendler, J.5
Sussman, G.J.6
-
46
-
-
34548043501
-
Towards a VMM-based usage control framework for OS kernel integrity protection
-
DOI 10.1145/1266840.1266852, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
M. Xu, X. Jiang, R. Sandhu, and X. Zhang, "Towards a VMMBased Usage Control Framework for OS Kernel Integrity Protection," SACMAT '07: Proc. 12th ACM Symp. Access Control Models and Technologies, pp. 71-80, 2007. (Pubitemid 47281539)
-
(2007)
Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT
, pp. 71-80
-
-
Xu, M.1
Jiang, X.2
Sandhu, R.3
Zhang, X.4
|