-
1
-
-
28444446666
-
Extending relational database systems to automatically enforce privacy policies
-
AGRAWAL, R., BIRD, P., GRANDISON, T., KIERNAN, J., LOGAN, S., AND RJAIBI, W. 2005. Extending relational database systems to automatically enforce privacy policies. In Proceedings of the 21st International Conference on Data Engineering.
-
(2005)
Proceedings of the 21st International Conference on Data Engineering
-
-
Agrawal, R.1
Bird, P.2
Grandison, T.3
Kiernan, J.4
Logan, S.5
Rjaibi, W.6
-
2
-
-
0003226048
-
The KeyNote trust management system (version 2)
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. 1999. The KeyNote trust management system (version 2). Internet RFC 2704. http://www.crypto.com/papers/rfc2704.txt.
-
(1999)
Internet RFC 2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
3
-
-
0029700344
-
Decentralized trust management
-
IEEE, Los Alamitos, CA
-
BLAZE, M., FEIGENBAUM, J., AND LACY, J. 1996. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, Los Alamitos, CA.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
0036311802
-
A unified framework for regulating access and information release on the Web
-
BONATTI, P. AND SAMARATI, P. 2002. A unified framework for regulating access and information release on the Web. J. Comput, Secur. 10, 3, 241-272.
-
(2002)
J. Comput, Secur.
, vol.10
, Issue.3
, pp. 241-272
-
-
Bonatti, P.1
Samarati, P.2
-
8
-
-
0028515678
-
Automatic generation of production rules for integrity maintenance
-
CERI, S., FRATERNALI, P., PARABOSCHI, S., AND TANCA, L. 1994. Automatic generation of production rules for integrity maintenance. ACM Trans. Datab. Syst. 19, 3, 367-422.
-
(1994)
ACM Trans. Datab. Syst.
, vol.19
, Issue.3
, pp. 367-422
-
-
Ceri, S.1
Fraternali, P.2
Paraboschi, S.3
Tanca, L.4
-
9
-
-
34548810781
-
Fine-grained authorization through predicated grants
-
IEEE, Los Alamitos, CA
-
CHAUDHURI, S., DUTTA, T., AND SUDARSHAN, S. 2007. Fine-grained authorization through predicated grants. In Proceeding of the 23rd IEEE International Conference on Data Engineering. IEEE, Los Alamitos, CA.
-
(2007)
Proceeding of the 23rd IEEE International Conference on Data Engineering
-
-
Chaudhuri, S.1
Dutta, T.2
Sudarshan, S.3
-
10
-
-
0001843009
-
REFEREE: Trust management for Web applications
-
CHU, Y., FEIGENBAUM, J., LAMACCHIA, B., RESNICK, P., AND STRAUSS, M. 1997. REFEREE: Trust management for Web applications. World Wide Web J.l 2, 3, 127-139.
-
(1997)
World Wide Web J.l
, vol.2
, Issue.3
, pp. 127-139
-
-
Chu, Y.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
11
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLARKE, D., ELIEN, J., ELLISON, C., FREDETTE, M., MORCOS, A., AND RIVEST, R. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secur. 9, 4, 285-322. (Pubitemid 34063915)
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
12
-
-
34748852515
-
Trust management services in relational databases
-
ACM, New York
-
DE CAPITANI DI VIMERCATI, S., JAJODIA, S., PARABOSCHI, S., AND SAMARATI, P. 2007. Trust management services in relational databases. In Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. ACM, New York.
-
(2007)
Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
-
-
De Capitani Di Vimercati, S.1
Jajodia, S.2
Paraboschi, S.3
Samarati, P.4
-
14
-
-
0003981627
-
SPKI requirements
-
ELLISON, C. 1999. SPKI requirements. Internet RFC 2692. http://www.ietf.org/rfc/rfc2692.txt.
-
(1999)
Internet RFC 2692
-
-
Ellison, C.1
-
15
-
-
0003593599
-
-
Internet RFC 2693
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R., THOMAS, B., AND LONEN, T. 1999. SPKI certificate theory. Internet RFC 2693. http://www.ietf.org/rfc/ rfc2693.txt.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Lonen, T.6
-
17
-
-
0003900673
-
-
Internet RFC 3280
-
HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. 2002. Internet X.509 public key infrastructure certificate and CRL profile. Internet RFC 3280. http://www.ietf.org/rfc/rfc3280.txt.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and CRL Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
20
-
-
34250649785
-
Redundancy and information leakage in fine-grained access control
-
ACM, New York
-
KABRA, G., RAMAMURTHY, R., AND SUDARSHAN, S. 2006. Redundancy and information leakage in fine-grained access control. In Proceeding of the 2006 ACM SIGMOD International Conference on Management of Data. ACM, New York.
-
(2006)
Proceeding of the 2006 ACM SIGMOD International Conference on Management of Data
-
-
Kabra, G.1
Ramamurthy, R.2
Sudarshan, S.3
-
21
-
-
34548046021
-
Lightweight consistency enforcement schemes for distributed proofs with hidden subtrees
-
ACM, New York
-
LEE, A., MINAMI, K., AND WINSLETT, M. 2007. Lightweight consistency enforcement schemes for distributed proofs with hidden subtrees. In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. ACM, New York.
-
(2007)
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies
-
-
Lee, A.1
Minami, K.2
Winslett, M.3
-
23
-
-
57949107810
-
Enforcing safety and consistency constraints in policy-based authorization systems
-
LEE, A. AND WINSLETT, M. 2008a. Enforcing safety and consistency constraints in policy-based authorization systems. ACM Trans. Inf. Syst. Secur. 12, 2, 1-33.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.2
, pp. 1-33
-
-
Lee, A.1
Winslett, M.2
-
25
-
-
40049091352
-
The trust authorization service
-
LEE, A., WINSLETT, M., BASNEY, J., AND WELCH, V. 2008. The trust authorization service. ACM Trans. Inf. Syst. Secur. 11, 1, 1-33.
-
(2008)
ACM Trans. Inf. Syst. Secur.
, vol.11
, Issue.1
, pp. 1-33
-
-
Lee, A.1
Winslett, M.2
Basney, J.3
Welch, V.4
-
26
-
-
33745764834
-
Automated trust negotiation using cryptographic credentials
-
ACM, New York
-
LI, J., LI, N., AND WINSBOROUGH, W. 2005a. Automated trust negotiation using cryptographic credentials. In Proceedings of the 12th ACM Conference on Computer and Communications Security. ACM, New York.
-
(2005)
Proceedings of the 12th ACM Conference on Computer and Communications Security
-
-
Li, J.1
Li, N.2
Winsborough, W.3
-
27
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
DOI 10.1145/1066100.1066103
-
LI, N., MITCHELL, J., AND WINSBOROUGH, W. 2005b. Beyond proof-of compliance: Security analysis in trust management. J. ACM 52, 3, 474-514. (Pubitemid 43078378)
-
(2005)
Journal of the ACM
, vol.52
, Issue.3
, pp. 474-514
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
28
-
-
33646242539
-
Understanding SPKI/SDSI using first-order logic
-
DOI 10.1007/s10207-005-0073-0
-
LI, N. AND MITCHELL, J. 2006. Understanding SPKI/SDSI using first-order logic. Int. J, Inf. Secur. 5, 1, 48-64. (Pubitemid 43650841)
-
(2006)
International Journal of Information Security
, vol.5
, Issue.1
, pp. 48-64
-
-
Li, N.1
Mitchell, J.C.2
-
29
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
LI, N., WINSBOROUGH, W., AND MITCHELL, J. 2003. Distributed credential chain discovery in trust management. J. Comput. Secur. 11, 1, 35-86.
-
(2003)
J. Comput. Secur.
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
30
-
-
85043089151
-
-
OASIS working draft
-
LOCKHART, H., WISNIEWSKI, T., CANTOR, S., MISHRA, P., AND LIEN, J. 2007. Security assertion markup language (SAML) V2.0 tech. overview. OASIS working draft. http://www.oasisopen.org/committees/download.php/22553/sstc-saml-tech- overview-2200-draft-13.pdf.
-
(2007)
Security Assertion Markup Language (SAML) V2.0 Tech. Overview
-
-
Lockhart, H.1
Wisniewski, T.2
Cantor, S.3
Mishra, P.4
Lien, J.5
-
33
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
NEEDHAM, R. M. AND SCHROEDER, M. D. 1978. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, 993-999.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.M.1
Schroeder, M.D.2
-
34
-
-
69949149767
-
A formal framework for reflective database access control policies
-
ACM, New York
-
OLSON, E., GUNTER, C., AND MADHUSUDAN, P. 2008. A formal framework for reflective database access control policies. In Proceedings of the 15th ACM Conference on Computer and Communications Security. ACM, New York.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security
-
-
Olson, E.1
Gunter, C.2
Madhusudan, P.3
-
37
-
-
30644473909
-
Adaptive trust negotiation and access control
-
ACM, New York
-
RYUTOV, T., ZHOU, L., NEUMAN, C., LEITHEAD, T., AND SEAMONS, K. 2005. Adaptive trust negotiation and access control. In Proceedings of the 10th ACM Symposium on Access Control Models and Technologies. ACM, New York.
-
(2005)
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.5
-
38
-
-
0016555241
-
The protection of information in computer systems
-
SALTZER, J. AND SCHROEDER, M. 1975. The protection of information in computer systems. Proc. IEEE 63, 9, 1278-1308.
-
(1975)
Proc. IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Saltzer, J.1
Schroeder, M.2
-
40
-
-
20444479906
-
A logic-based framework for attribute based access control
-
ACM, New York
-
WANG, L., WIJESEKERA, D., AND JAJODIA, S. 2004. A logic-based framework for attribute based access control. In Proceedings of the ACM Workshop on Formal Methods in Security Engineering. ACM, New York.
-
(2004)
Proceedings of the ACM Workshop on Formal Methods in Security Engineering
-
-
Wang, L.1
Wijesekera, D.2
Jajodia, S.3
-
43
-
-
0031338080
-
Using digital credentials on the World Wide Web
-
WINSLETT, M., CHING, N., JONES, V., AND SLEPCHIN, I. 1997. Using digital credentials on the World Wide Web. J. Comput. Secur. 5, 3, 255-267.
-
(1997)
J. Comput. Secur.
, vol.5
, Issue.3
, pp. 255-267
-
-
Winslett, M.1
Ching, N.2
Jones, V.3
Slepchin, I.4
-
44
-
-
0036871183
-
Negotiating trust on the Web
-
WINSLETT, M., YU, T., SEAMONS, K., HESS, A., JACOBSON, J., JARVIS, R., SMITH, B., AND YU, L. 2002. Negotiating trust on the Web. IEEE Internet Comput. 6, 6, 30-37.
-
(2002)
IEEE Internet Comput.
, vol.6
, Issue.6
, pp. 30-37
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jacobson, J.5
Jarvis, R.6
Smith, B.7
Yu, L.8
-
45
-
-
0034449542
-
PRUNES: An efficient and complete strategy for automated trust negotiation over the internet
-
ACM, New York
-
YU, T., MA, X., AND WINSLETT, M. 2000. PRUNES: An efficient and complete strategy for automated trust negotiation over the internet. In Proceedings of the 7th ACM Conference on Computer and Communications Security. ACM, New York.
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
47
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
ACM, New York
-
YU, T., WINSLETT, M., AND SEAMONS, K. 2001. Interoperable strategies in automated trust negotiation. In Proceedings of the 8th ACM Conference on Computer and Communications Security. ACM, New York.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
-
48
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
YU, T., WINSLETT, M., AND SEAMONS, K. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1, 1-42.
-
(2003)
ACM Trans. Inf. Syst. Secur.
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|