-
3
-
-
0034446895
-
A modular approach to composing access control policies
-
Athens, Greece, Nov
-
P. Bonatti, S. Vimercati, and P. Samarati. A modular approach to composing access control policies. In ACM Conference on Computer and Communication Security, Athens, Greece, Nov. 2000.
-
(2000)
ACM Conference on Computer and Communication Security
-
-
Bonatti, P.1
Vimercati, S.2
Samarati, P.3
-
5
-
-
0001809810
-
The Ponder Policy Specification Language
-
Bristol, UK, Jan
-
D. Damianou, N. Dulay, E. Lupu, and M. Sloman. The Ponder Policy Specification Language. In 2nd International Workshop on Policies for Distributed Systems and Networks, Bristol, UK, Jan. 2001.
-
(2001)
2nd International Workshop on Policies for Distributed Systems and Networks
-
-
Damianou, D.1
Dulay, N.2
Lupu, E.3
Sloman, M.4
-
6
-
-
0033724294
-
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
-
Oakland, CA, May
-
A. Herzberg, J. Mihaeli, Y. Mass, D. Naor, and Y. Ravid. Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
-
(2000)
IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mihaeli, J.2
Mass, Y.3
Naor, D.4
Ravid, Y.5
-
7
-
-
85180810679
-
Advanced Client/Server Authetication in TLS
-
San Diego, CA, Feb
-
A. Hess, J. Jacobson, H. Mills, R. Wamsley, K. Seamons, and B. Smith. Advanced Client/Server Authetication in TLS. In Network and Distributed System Security Symposium, San Diego, CA, Feb. 2002.
-
(2002)
Network and Distributed System Security Symposium
-
-
Hess, A.1
Jacobson, J.2
Mills, H.3
Wamsley, R.4
Seamons, K.5
Smith, B.6
-
10
-
-
0035751908
-
Distributed Credential Chain Discovery in Trust Management
-
Philadelphia, PA, Nov
-
N. Li, W. Winsborough, and J. Mitchell. Distributed Credential Chain Discovery in Trust Management. In Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001.
-
(2001)
Conference on Computer and Communication Security
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
11
-
-
85056545124
-
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation
-
San Diego, CA, Feb
-
K. Seamons, M. Winslett, and T. Yu. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. In Network and Distributed System Security Symposium, San Diego, CA, Feb. 2001.
-
(2001)
Network and Distributed System Security Symposium
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
-
16
-
-
0036871183
-
Negotiating Trust on the Web
-
Nov
-
M. Winslett, T. Yu, K. Seamons, A. Hess, J. Jarvis, B. Smith, and L. Yu. Negotiating Trust on the Web. IEEE Internet Computing Special Issue on Trust Management, 6(6), Nov. 2002.
-
(2002)
IEEE Internet Computing Special Issue on Trust Management
, vol.6
, Issue.6
-
-
Winslett, M.1
Yu, T.2
Seamons, K.3
Hess, A.4
Jarvis, J.5
Smith, B.6
Yu, L.7
-
17
-
-
0035747337
-
Interoperable Strategies in Automated Trust Negotiation
-
Philadelphia, PA, Nov
-
T. Yu, M. Winslett, and K. Seamons. Interoperable Strategies in Automated Trust Negotiation. In ACM Conference on Computer and Communication Security, Philadelphia, PA, Nov. 2001.
-
(2001)
ACM Conference on Computer and Communication Security
-
-
Yu, T.1
Winslett, M.2
Seamons, K.3
|