-
2
-
-
34748916380
-
On interoperable trust negotiation strategies
-
S. Baselice, P. A.Bonatti, and M. Faella, On interoperable trust negotiation strategies. In Eighth IEEE International Workshop on Policies for Distributed Systems and Networks. Bologna, Italy, pp. 39-50. DOI= 10.1109/POLICY.2007.29. 2007.
-
(2007)
Eighth IEEE International Workshop on Policies for Distributed Systems and Networks. Bologna, Italy
, pp. 39-50
-
-
Baselice, S.1
Bonatti, P.A.2
Faella, M.3
-
3
-
-
3142676730
-
Trust-x: A peer-to-peer framework for trust establishment
-
E. Bertino, E. Ferrari, and A. C. Squicciarini, Trust-X: A Peer-to-Peer Framework for Trust Establishment. IEEE Transactions on Knowledge and Data Engineering. 16(7), 827-842. DOI= 10.1109/TKDE.2004.1318565. 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering.
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
6
-
-
4444341241
-
Content-triggered trust negotiation
-
A. Hess, J. Holt, J. Jacobson, and K. E. Seamons, Content-Triggered Trust Negotiation. ACM Transactions on Information and System Security (TISSEC), 7(3), 428-456. DOI=10.1145/1015040.1015044. 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
, Issue.3
, pp. 428-456
-
-
Hess, A.1
Holt, J.2
Jacobson, J.3
Seamons, K.E.4
-
7
-
-
84255174001
-
TrustBuilder2: A recongurable framework for trust negotiation
-
A. J. Lee, M. Winslett, and K. J. Perano, TrustBuilder2: A Recongurable Framework for Trust Negotiation. IFIP Advances in Information and Communication Technology, 300, 176-195. DOI=10.1007/978-3-642-02056-8-12. 2009.
-
(2009)
IFIP Advances in Information and Communication Technology
, vol.300
, pp. 176-195
-
-
Lee, A.J.1
Winslett, M.2
Perano, K.J.3
-
8
-
-
18744387712
-
Oblivious signature-based envelope
-
N. Li, W. Du, and D. Boneh, Oblivious signature-based envelope. Distributed Computing, 17(4), 293-302. DOI=10.1007/s00446-004-0116-1. 2003.
-
(2003)
Distributed Computing
, vol.17
, Issue.4
, pp. 293-302
-
-
Li, N.1
Du, W.2
Boneh, D.3
-
9
-
-
84884499196
-
An ontology-based approach to automated trust negotiation
-
X. Liu, S. Tang, Q. Huang, and Z. Zhu, An ontology-based approach to automated trust negotiation. Computer Standards &Interfaces. 36(1), 219-230. DOI= 10.1016/j.csi.2013.03.003. 2013.
-
(2013)
Computer Standards &interfaces.
, vol.36
, Issue.1
, pp. 219-230
-
-
Liu, X.1
Tang, S.2
Huang, Q.3
Zhu, Z.4
-
10
-
-
70349439059
-
DFANS: A highly efficient strategy for automated trust negotiation
-
H. Lu, and B. Liu, DFANS: A highly efficient strategy for automated trust negotiation. Computers &Security, 28(7), pp.557-565. DOI=10.1016/j.cose.2009.03.004. 2009.
-
(2009)
Computers &security
, vol.28
, Issue.7
, pp. 557-565
-
-
Lu, H.1
Liu, B.2
-
12
-
-
79956107600
-
Trust negotiation as an authorization service for web services
-
L. Olson, M. Winslett, G. Toni, N. Seeley, A. Uszok, and J. Bradshaw, Trust Negotiation as an Authorization Service for Web Services. In: 22nd International Conference on Data Engineering Workshops. DOI= 10.1109/ICDEW.2006.154. 2006.
-
(2006)
22nd International Conference on Data Engineering Workshops
-
-
Olson, L.1
Winslett, M.2
Toni, G.3
Seeley, N.4
Uszok, A.5
Bradshaw, J.6
-
14
-
-
30644473909
-
Adaptive trust negotiation and access control
-
T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons, Adaptive Trust Negotiation and Access Control. In: Proceedings of the tenth ACM symposium on Access control models and technologies. DOI=10.1145/1063979.1064004. 2005.
-
(2005)
Proceedings of the Tenth ACM Symposium on Access Control Models and Technologies
-
-
Ryutov, T.1
Zhou, L.2
Neuman, C.3
Leithead, T.4
Seamons, K.E.5
-
15
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
K. E. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu, Requirements for Policy Languages for Trust Negotiation. In: Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks. 2002.
-
(2002)
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
16
-
-
61449237425
-
Modeling trust negotiation for web services
-
H. Skogsrud, H. R. Motahari-Nezhad, B. Benatallah, and F. Casati, Modeling Trust Negotiation for Web Services. Computer. 42(2), 54-61. DOI=10.1109/MC.2009.56. 2009.
-
(2009)
Computer.
, vol.42
, Issue.2
, pp. 54-61
-
-
Skogsrud, H.1
Motahari-Nezhad, H.R.2
Benatallah, B.3
Casati, F.4
-
17
-
-
34547505017
-
PP-trust-x: A system for privacy preserving trust negotiations
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham, PP-trust-X: A system for privacy preserving trust negotiations. ACM Transactions on Information and System Security (TISSEC), 10(3). DOI=10.1145/1266977.126698. 2007.
-
(2007)
ACM Transactions on Information and System Security (TISSEC)
, vol.10
, Issue.3
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
18
-
-
81455143719
-
A flexbile approach to multi-session trust negotiations
-
A. Squicciarini, E. Bertino, A. Trombetta, and S. Braghin, A Flexbile Approach to Multi-Session Trust Negotiations. IEEE Transactions on Dependable and Secure Computing. 9(1), 2-15. DOI=10.1109/TDSC.2011.31. 2012.
-
(2012)
IEEE Transactions on Dependable and Secure Computing.
, vol.9
, Issue.1
, pp. 2-15
-
-
Squicciarini, A.1
Bertino, E.2
Trombetta, A.3
Braghin, S.4
-
23
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
T. Yu, M. Winslett, and K. E. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1), 1-42. DOI=10.1145/605434.605435. 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 1-42
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|