-
2
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
(San Diego, California, USA)
-
K.E. Seamons, M. Winslett, and T. Yu Limiting the disclosure of access control policies during automated trust negotiation Proceedings of the Network and Distributed System Security Symposium, NDSS 2001 (San Diego, California, USA)
-
(2001)
Proceedings of the Network and Distributed System Security Symposium, NDSS
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
3
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
T. Yu, M. Winslett, and K.E. Seamons Interoperable strategies in automated trust negotiation Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA November 6-8, 2001 146 155
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA
, vol.6
, pp. 146-155
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
-
4
-
-
0038041232
-
Protecting sensitive attributes in automated trust negotiation
-
Washington, DC, USA, November 21, 2002
-
W.H. Winsborough, and N. Li Protecting sensitive attributes in automated trust negotiation Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES 2002 41 51 (Washington, DC, USA, November 21, 2002)
-
(2002)
Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society, WPES
, pp. 41-51
-
-
Winsborough, W.H.1
Li, N.2
-
11
-
-
11244331795
-
Cassandra: Distributed access control policies with tunable expressiveness
-
M.Y. Becker, and P. Sewell Cassandra: distributed access control policies with tunable expressiveness POLICY, IEEE Computer Society 2004 159 168
-
(2004)
POLICY, IEEE Computer Society
, pp. 159-168
-
-
Becker, M.Y.1
Sewell, P.2
-
13
-
-
70449612716
-
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
-
(Tokyo, Japan, March 18-20, 2008)
-
A.J. Lee, and M. Winslett Towards an efficient and language-agnostic compliance checker for trust negotiation systems Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008 228 239 (Tokyo, Japan, March 18-20, 2008)
-
(2008)
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS
, pp. 228-239
-
-
Lee, A.J.1
Winslett, M.2
-
14
-
-
0034449542
-
Prunes: An efficient and complete strategy for automated trust negotiation over the internet
-
Athens, Greece November 1-4
-
T. Yu, X. Ma, and M. Winslett Prunes: an efficient and complete strategy for automated trust negotiation over the internet Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece November 1-4, 2000 210 219
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
, pp. 210-219
-
-
Yu, T.1
Ma, X.2
Winslett, M.3
-
15
-
-
79551653064
-
An efficient and minimum sensitivity cost negotiation strategy in automated trust negotiation
-
Y. He, M. Zhu, and C. Zheng An efficient and minimum sensitivity cost negotiation strategy in automated trust negotiation CSSE (3), IEEE Computer Society 2008 182 185
-
(2008)
CSSE (3), IEEE Computer Society
, pp. 182-185
-
-
He, Y.1
Zhu, M.2
Zheng, C.3
-
16
-
-
70349439059
-
Dfans: A highly efficient strategy for automated trust negotiation
-
H. Lu, and B. Liu Dfans: a highly efficient strategy for automated trust negotiation Computers & Security 28 2009 557 565
-
(2009)
Computers & Security
, vol.28
, pp. 557-565
-
-
Lu, H.1
Liu, B.2
-
17
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, N.T. Yu, M. Winslett, M. Winslett, N. Kent, and K.E. Seamons Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation ACM Transactions on Information and System Security 6 2003 1 42
-
(2003)
ACM Transactions on Information and System Security
, vol.6
, pp. 1-42
-
-
Yu, T.1
Yu, N.T.2
Winslett, M.3
Winslett, M.4
Kent, N.5
Seamons, K.E.6
-
18
-
-
57349182523
-
-
ACM Press Estes Park, Colorado, USA
-
T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W.H. Winsborough, and B. Thuraisingham Rowlbac - Representing Role Based Access Control in Owl, in: Proceedings of the 13th Symposium on Access Control Models and Technologies 2008 ACM Press Estes Park, Colorado, USA
-
(2008)
Rowlbac - Representing Role Based Access Control in Owl, In: Proceedings of the 13th Symposium on Access Control Models and Technologies
-
-
Finin, T.1
Joshi, A.2
Kagal, L.3
Niu, J.4
Sandhu, R.5
Winsborough, W.H.6
Thuraisingham, B.7
-
20
-
-
79960459695
-
Using description logic to formalize role-based access control model
-
July 26-28, CEUR Workshop Proceedings
-
C. Zhao, N. Heilili, S. Liu, and Z. Lin Using description logic to formalize role-based access control model Proceedings of the 2005 International Workshop on Description Logics (DL2005), Edinburgh, Scotland, UK CEUR Workshop Proceedings vol. 147 July 26-28, 2005
-
(2005)
Proceedings of the 2005 International Workshop on Description Logics (DL2005), Edinburgh, Scotland, UK
, vol.147
-
-
Zhao, C.1
Heilili, N.2
Liu, S.3
Lin, Z.4
-
21
-
-
33646851522
-
How to exploit ontologies for trust negotiation
-
CEUR Workshop Proceedings
-
T. Leithead, W. Nejdl, D. Olmedilla, K.E. Seamons, M. Winslett, T. Yu, and C.C. Zhang How to exploit ontologies for trust negotiation Proceedings of the ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan CEUR Workshop Proceedings vol. 127 November 7, 2004
-
(2004)
Proceedings of the ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan
, vol.127 VOL.
-
-
Leithead, T.1
Nejdl, W.2
Olmedilla, D.3
Seamons, K.E.4
Winslett, M.5
Yu, T.6
Zhang, C.C.7
-
25
-
-
49949106453
-
Owl-dl as a power tool to model negotiation mechanisms with incomplete information
-
Springer Verlag Berlin, Heidelberg
-
A. Ragone Owl-dl as a power tool to model negotiation mechanisms with incomplete information Proceedings of the 6th International Semantic Web Conference and 2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, volume 4825 of LNCS 2007 Springer Verlag Berlin, Heidelberg 935 939
-
(2007)
Proceedings of the 6th International Semantic Web Conference and 2nd Asian Semantic Web Conference (ISWC/ASWC2007), Busan, South Korea, Volume 4825 of LNCS
, pp. 935-939
-
-
Ragone, A.1
-
27
-
-
84255174001
-
Trustbuilder2: A reconfigurable framework for trust negotiation
-
IFIP Conference Proceedings Springer
-
A.J. Lee, M. Winslett, and K.J. Perano Trustbuilder2: a reconfigurable framework for trust negotiation Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009 IFIP Conference Proceedings vol. 300 2009 Springer 176 195
-
(2009)
Trust Management III, Third IFIP WG 11.11 International Conference, IFIPTM 2009, West Lafayette, IN, USA, June 15-19, 2009
, vol.300
, pp. 176-195
-
-
Lee, A.J.1
Winslett, M.2
Perano, K.J.3
-
28
-
-
34249817069
-
Pellet: A practical owl-dl reasoner
-
E. Sirin, B. Parsia, B.C. Grau, A. Kalyanpur, and Y. Katz Pellet: a practical owl-dl reasoner Journal of Web Semantics 5 2007 51 53
-
(2007)
Journal of Web Semantics
, vol.5
, pp. 51-53
-
-
Sirin, E.1
Parsia, B.2
Grau, B.C.3
Kalyanpur, A.4
Katz, Y.5
-
29
-
-
84994791896
-
A complete and efficient strategy based on petri net in automated trust negotiation
-
June 6-8, ACM International Conference Proceeding Series
-
Y. He, and M. Zhu A complete and efficient strategy based on petri net in automated trust negotiation Proceedings of the 2nd ACM International Conference on Scalable Information Systems, Suzhou, China ACM International Conference Proceeding Series vol. 304 June 6-8, 2007 75 81
-
(2007)
Proceedings of the 2nd ACM International Conference on Scalable Information Systems, Suzhou, China
, vol.304
, pp. 75-81
-
-
He, Y.1
Zhu, M.2
|