-
1
-
-
0035791550
-
On specifying security policies for web documents with an xml-based language
-
Chantilly, Virginia, May
-
E. Bertino, S. Castano, and E. Ferrari, "On Specifying Security Policies for Web Documents with an XML-based Language," Sixth ACM SACMAT, Chantilly, Virginia, May 2001.
-
(2001)
Sixth ACM SACMAT
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
2
-
-
0034823621
-
Securing XML Documents: The author-x project demonstration
-
Santa Barbara, CA May
-
E. Bertino, S. Castano, and E. Ferrari, "Securing XML Documents: the Author-X Project Demonstration," ACM SIGMOD Conference, Santa Barbara, CA, May 2001.
-
(2001)
ACM SIGMOD Conference
-
-
Bertino, E.1
Castano, S.2
Ferrari, E.3
-
3
-
-
0013142893
-
The keynote trust-management system
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The KeyNote Trust-Management System," RFC 2704, September 1999.
-
(1999)
RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
4
-
-
84982899264
-
-
Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Vitek and Jensen, eds., Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis, "The Role of Trust Management in Distributed System Security," Chapter in Secure Internet Programming: Security Issues for Mobile and Distributed Objects, Vitek and Jensen, eds., Springer-Verlag, 1999.
-
(1999)
The Role of Trust Management in Distributed System Security
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
5
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust Management System," Financial Cryptography 1998: 254-274.
-
(1998)
Financial Cryptography
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
7
-
-
0001470602
-
-
WWW6/Computer Networks
-
Y. Chu, J. Feigenbaum, B. A. LaMacchia, P. Resnick, M. Strauss, "REFEREE: Trust Management for Web Applications," WWW6/Computer Networks 29(8-13): 953-964 (1997).
-
(1997)
REFEREE: Trust Management for Web Applications
, vol.29
, Issue.8-13
, pp. 953-964
-
-
Chu, Y.1
Feigenbaum, J.2
Lamacchia, B.A.3
Resnick, P.4
Strauss, M.5
-
8
-
-
84893037714
-
-
GraphXML. Found on-line at
-
GraphXML. Found on-line at http://www.cwi.nl/InfoVisu/GraphXML/.
-
-
-
-
9
-
-
0033724294
-
Access control meets public key infrastructure, Or: Assigning Roles to Strangers
-
Oakland, CA May
-
A. Herzberg, Mihaeli, Y. Mass, D. Naor, and Y. Ravid, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, M.Y.2
Naor, D.3
Ravid, Y.4
-
10
-
-
85180810679
-
Advanced client/server authentication in TLS
-
San Diego, CA February
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. E. Seamons, and B. Smith, "Advanced Client/Server Authentication in TLS," Network and Distributed System Security Symposium, San Diego, CA, February 2002.
-
(2002)
Network and Distributed System Security Symposium
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.E.5
Smith, B.6
-
13
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, CA February
-
K. E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation," Network and Distributed System Security Symposium, San Diego, CA, February 2001.
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
14
-
-
0003324667
-
Internet credential acceptance policies
-
Leuven, Belgium July
-
K. E. Seamons, W. Winsborough, and M. Winslett. "Internet Credential Acceptance Policies," Workshop on Logic Programming for Internet Applications, Leuven, Belgium, July 1997.
-
(1997)
Workshop on Logic Programming for Internet Applications
-
-
Seamons, K.E.1
Winsborough, W.2
Winslett, M.3
-
15
-
-
0035747337
-
Interoperable strategies in automated trust negotiation
-
Philadelphia, Pennsylvania November
-
T. Yu, M. Winslett, and K. E. Seamons, "Interoperable Strategies in Automated Trust Negotiation," 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, November 2001.
-
(2001)
8th ACM Conference on Computer and Communications Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|