Databases Reference
In-Depth Information
31. Russell Housely, Warwick Ford, Tim Polk, and David Solo. Internet X.509 public
key infrastructure certificate and CRL profile. IETF Request for Comments
RFC-2459 , January 1999.
32. Trevor Jim. SD3: A trust management system with certified evaluation. In
Proceedings of the 2001 IEEE Symposium on Security and Privacy , pages 106-
115. IEEE Computer Society Press, May 2001.
33. Trevor Jim and Dan Suciu. Dynamically distributed query evaluation. In PODS
'01: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium
on Principles of database systems , pages 28-39, New York, NY, USA, 2001.
ACM Press.
34. A. Jsang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for
online service provision. Decision Support Systems , 43(2):618-644, March 2007.
35. Apu Kapadia, Geetanjali Sampemane, and Roy H. Campbell. KNOW why your
access was denied: Regulating feedback for usable security. In Proceedings of the
ACM Conference on Computers and Communication Security (CCS) , pages 52-
61, Washington, DC, Oct 2004.
36. H. Koshutanski and F. Massacci. An interactive trust management and negoti-
ation scheme. In Theo Dimitrakos and Fabio Martinelli, editors, Formal Aspects
of Security and Trust , pages 139-152. KAP, 2004.
37. Adam J. Lee, Kazuhiro Minami, and Marianne Winslett. Lightweight consis-
tency enforcement schemes for distributed proofs with hidden subtrees. In 12th
ACM Symposium on Access Control Models and Technologies (SACMAT 2007) ,
June 2007.
38. Adam J. Lee and Marianne Winslett. Open problems for usable and secure open
systems. In Workshop on Usability Research Challenges for Cyberinfrastructure
and Tools held in conjunction with ACM CHI , April 2006.
39. Jiangtao Li and Ninghui Li. OACerts: Oblivious attribute certificates. IEEE
Transactions on Dependable and Secure Computing (TDSC) , 3(4), 2006.
40. Jiangtao Li, Ninghui Li, XiaoFeng Wang, and Ting Yu. Denial of Service At-
tacks and Defenses in Decentralized Trust Management. In 2nd IEEE Inter-
national Conference on Security and Privacy in Communication Networks (Se-
cureComm) , August 2006.
41. Jiangtao Li, Ninghui Li, and William Winsborough. Automated trust negoti-
ation using cryptographic credentials. ACM Transactions on Information and
System Security (TISSEC) , 2007.
42. Ninghui Li, Wenliang Du, and Dan Boneh. Oblivious signature-based envelope.
In PODC '03: Proceedings of the twenty-second annual symposium on Principles
of distributed computing , pages 182-189, New York, NY, USA, 2003. ACM Press.
43. Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation Logic: A
logic-based approach to distributed authorization. ACM Transaction on Infor-
mation and System Security , 6(1):128-171, February 2003.
44. Ninghui Li and John C. Mitchell. Datalog with constraints: A foundation for
trust management languages. In Proceedings of the Fifth International Sympo-
sium on Practical Aspects of Declarative Languages (PADL 2003) , number 2562
in LNCS, pages 58-73. Springer, January 2003.
45. Ninghui Li and John C. Mitchell. RT: A role-based trust-management frame-
work. In The Third DARPA Information Survivability Conference and Exposi-
tion (DISCEX III) . IEEE Computer Society Press, April 2003.
Search WWH ::




Custom Search