Databases Reference
In-Depth Information
46. Ninghui Li, John C. Mitchell, and William H. Winsborough. Design of a role-
based trust management framework. In Proceedings of the 2002 IEEE Sympo-
sium on Security and Privacy , pages 114-130. IEEE Computer Society Press,
May 2002.
47. Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed creden-
tial chain discovery in trust management (extended abstract). In Proceedings of
the Eighth ACM Conference on Computer and Communications Security (CCS-
8) , pages 156-165. ACM Press, November 2001.
48. Ninghui Li, William H. Winsborough, and John C. Mitchell. Beyond proof-of-
compliance: Safety and availability analysis in trust management. In Proceedings
of IEEE Symposium on Security and Privacy , pages 123-139. IEEE Computer
Society Press, May 2003.
49. Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed cre-
dential chain discovery in trust management. Journal of Computer Security ,
11(1):35-86, February 2003.
50. Ziqing Mao, Ninghui Li, and William H. Winsborough. Distributed credential
chain discovery in trust management with parameterized roles and constraints.
In 2006 International Conference on Information and Communications Security
(ICICS 2006) , December 2006.
51. Kazuhiro Minami and David Kotz. Secure context-sensitive authorization. Jour-
nal of Pervasive and Mobile Computing , 1(1), March 2005.
52. Lars E. Olson, Michael J. Rosulek, and Marianne Winslett. Harvesting Cre-
dentials in Trust Negotiation as an Honest-But-Curious Adversary. In ACM
Workshop on Privacy in the Electronic Society (WPES) , 2007.
53. Jeff Polakow and Christian Skalka. Specifying distributed trust management
in Lollimon. In PLAS '06: Proceedings of the 2006 Workshop on Programming
Languages and Analysis for Security , pages 37-46, New York, NY, USA, 2006.
ACM Press.
54. Ronald
L.
Rivest
and
Bulter
Lampson.
SDSI
a
simple
dis-
tributed
security
infrastructure,
October
1996.
Available
at
http://theory.lcs.mit.edu/∼rivest/sdsi11.html .
55. T. Ryutov, L. Zhou, C. Neuman, T. Leithead, and K. E. Seamons. Adaptive
trust negotiation and access control. In 10th ACM Symposium on Access Control
Models and Technologies , June 2005.
56. Ravi S. Sandhu, Venkata Bhamidipati, and Qamar Munawer. The ARBAC97
model for role-based aministration of roles. ACM Transactions on Information
and Systems Security , 2(1):105-135, February 1999.
57. K. E. Seamons, M. Winslett, T. Yu, L. Yu, and R. Jarvis. Protecting privacy
during on-line trust negotiation. In Proceedings of the 2nd Workshop on Privacy
Enhancing Technologies , April 2002.
58. Kent Seamons, Marianne Winslett, Ting Yu, B. Smith, E. Child, J. Jacobson,
H. Mills, and Lina Yu. Requirements for policy languages for trust negotiation.
In Third IEEE International Workshop on Policies for Distributed Systems and
Networks (POLICY'02) , pages 68-79, June 2002.
59. A. C. Squicciarini, E. Bertino, and E. Ferrari. Achieving Privacy with an
Ontology-Based Approach in Trust Negotiations. IEEE Transaction on De-
pendable and Secure Computing (TDSC) , 3(1):13-30, 2006.
60. A. C. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham. PP-
Trust-X: A System for Privacy Preserving Trust Negotiations. ACM Transac-
tions on Information and System Security (TISSEC) , 10(3), July 2007.
Search WWH ::




Custom Search