Databases Reference
In-Depth Information
14. Piero A. Bonatti and Pierangela Samarati. A uniform framework for regulating
service access and information release on the web. J. Comput. Secur. , 10(3):241-
271, 2002.
15. R. Bradshaw, J. Holt, and K. E. Seamons. Concealing complex policies with
hidden credentials. In Eleventh ACM Conference on Computer and Communi-
cations Security , October 2004.
16. Stefan Brands. Rethinking Public Key Infrastructures and Digital Certificates;
Building in Privacy . MIT Press, 2000.
17. Jan Camenisch and Els Van Herreweghen. Design and implementation of the
Idemix anonymous credential system. In ACM Computer and Communication
Security , 2002.
18. Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Fredette, Alexander Mor-
cos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal
of Computer Security , 9(4):285-322, 2001.
19. Jason Cornwell, Ian Fette, Gary Hsieh, Madhu Prabaker, Jinghai Rao, Karen
Tang, Kami Vaniea, Lujo Bauer, Lorrie Cranor, Jason Hong, Bruce McLaren,
Mike Reiter, and Norman Sadeh. User-controllable security and privacy for
pervasive computing. In Eighth IEEE Workshop on Mobile Computing Systems
and Applications (HotMobile) , February 2007.
20. Jack B. Dennis and Earl C. Van Horn. Programming semantics for multipro-
grammed computations. Commun. ACM , 9(3):143-155, 1966.
21. John DeTreville. Binder, a logic-based security language. In Proceedings of the
2002 IEEE Symposium on Security and Privacy , pages 105-113. IEEE Com-
puter Society Press, May 2002.
22. Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu
Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
23. David F. Ferraiolo, Janet A. Cuigini, and D. Richard Kuhn. Role-based access
control (RBAC): Features and motivations. In Proceedings of the 11th Annual
Computer Security Applications Conference (ACSAC'95) , December 1995.
24. Keith Frikken, Mikhail Atallah, and Jiangtao Li. Attribute-based access control
with hidden policies and hidden credentials. IEEE Transactions on Computers
(TC) , 55(10), 2006.
25. Carl A. Gunter and Trevor Jim. Policy-directed certificate retrieval. Software:
Practice & Experience , 30(15):1609-1640, September 2000.
26. R. J. Hayton, J. M. Bacon, and K. Moody. Access control in an open distributed
environment. In IEEE Symposium of Security and Privacy , pages 3-14, '1998.
27. Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, and Yiftach Ravid. Access
control meets public key infrastructure, or: Assigning roles to strangers. In
Proceedings of the 2000 IEEE Symposium on Security and Privacy , pages 2-14.
IEEE Computer Society Press, May 2000.
28. John A. Hine, Walt Yao, Jean Bacon, and Ken Moody. An architecture for
distributed oasis services. In Middleware '00: IFIP/ACM International Con-
ference on Distributed systems platforms , pages 104-120, Secaucus, NJ, USA,
2000. Springer-Verlag New York, Inc.
29. J. Holt and K. E. Seamons.
Selective disclosure credential sets. Cryptology
ePrint Archive , 2002.
30. Jason Holt, Robert W. Bradshaw, Kent E. Seamons, and Hilarie Orman. Hidden
credentials. In Workshop on Privacy in the Electronic Society (WPES) , 2003.
Search WWH ::




Custom Search