-
2
-
-
0004169462
-
-
of Nonconvex Optimization and Its Applications. Kluwer Academic Publishers
-
F. Forgo, J. Szep, and F. Szidarovsky. Introduction to the Theory of Games: Concepts, Methods, Applications, volume 32 of Nonconvex Optimization and Its Applications. Kluwer Academic Publishers, 1999.
-
(1999)
Introduction to the Theory of Games: Concepts, Methods, Applications
, vol.32
-
-
Forgo, F.1
Szep, J.2
Szidarovsky, F.3
-
3
-
-
77952268470
-
An architecture for flexible multi-security domain networks
-
San Diego, CA, February, The Internet Society
-
T. J. Gibson. An architecture for flexible multi-security domain networks. In Proceedings of Network and Distributed System Security Symposium, San Diego, CA, February 2001. The Internet Society.
-
(2001)
Proceedings of Network and Distributed System Security Symposium
-
-
Gibson, T.J.1
-
4
-
-
0031682433
-
On the formal definition of separationof- duty policies and their composition
-
Oakland, California, May
-
V. D. Gligor, S.I. Gavrila, and D. Ferraiolo. On the formal definition of separationof- duty policies and their composition. In Proceedings of the 1998 IEEE Symposium on Security and Privacy, Oakland, California, May 1998.
-
(1998)
Proceedings of the 1998 IEEE Symposium on Security and Privacy
-
-
Gligor, V.D.1
Gavrila, S.I.2
Ferraiolo, D.3
-
6
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
Oakland, California, May
-
A. Herzberg, Y. Mass, J. Michaeli, D. Naor, and Y. Ravid. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of IEEE Symposium on Security and Privacy, Oakland, California, May 2000.
-
(2000)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Herzberg, A.1
Mass, Y.2
Michaeli, J.3
Naor, D.4
Ravid, Y.5
-
7
-
-
0010389068
-
Review and revocation of access privileges distributed with PKI certificates
-
Cambridge, UK, April
-
H. Khurana and V.D. Gligor. Review and revocation of access privileges distributed with PKI certificates. In Proceedings of the 8th International Workshop on Security Protocols, volume 2133, pages 100–125, Cambridge, UK, April 2000.
-
(2000)
Proceedings of the 8Th International Workshop on Security Protocols
, vol.2133
, pp. 100-125
-
-
Khurana, H.1
Gligor, V.D.2
-
10
-
-
0001202536
-
The nucleolus of a characteristic function game
-
D. Schmeidler. The nucleolus of a characteristic function game. SIAM Journal on Applied Mathematics, 17:1163–1170, 1968.
-
(1968)
SIAM Journal on Applied Mathematics
, vol.17
, pp. 1163-1170
-
-
Schmeidler, D.1
-
11
-
-
85056545124
-
Limiting the disclosure of access control policies during automated trust negotiation
-
San Diego, California, February
-
K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, February 2001.
-
(2001)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
-
12
-
-
67650041248
-
Secure virtual enclaves: Supporting coalition use of distributed application technologies
-
San Diego, California, 3-4 February
-
D. Shands, R. Yee, J. Jacobs, and E. J. Sebes. Secure virtual enclaves: Supporting coalition use of distributed application technologies. In Proceedings of the Network and Distributed System Security Symposium (NDSS), San Diego, California, 3-4 February 2000.
-
(2000)
Proceedings of the Network and Distributed System Security Symposium (NDSS)
-
-
Shands, D.1
Yee, R.2
Jacobs, J.3
Sebes, E.J.4
-
13
-
-
84939548725
-
Automated trust negotiation
-
Hilton Head, SC, January
-
W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition (DISCEX 2000), Hilton Head, SC, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition (DISCEX 2000)
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
|