Databases Reference
In-Depth Information
61. David Toman. Memoing evaluation for constraint extensions of datalog. Con-
straints and databases , pages 99-121, 1998.
62. William H. Winsborough and Ninghui Li. Towards practical automated trust
negotiation. In Proceedings of the Third International Workshop on Policies for
Distributed Systems and Networks (Policy 2002) , pages 92-103. IEEE Computer
Society Press, June 2002.
63. William H. Winsborough and Ninghui Li. Safety in automated trust negotiation.
In Proceedings of the IEEE Symposium on Security and Privacy , pages 147-160,
May 2004.
64. William H. Winsborough, Kent E. Seamons, and Vicki E. Jones. Automated
trust negotiation. In DARPA Information Survivability Conference and Expo-
sition , volume I, pages 88-102. IEEE Press, January 2000.
65. Marianne Winslett. An introduction to trust negotiation. In Proceedings of
iTrust , pages 275-283, 2003.
66. Marianne Winslett, Charles C. Zhang, and Piero A. Bonatti. Peeraccess: a
logic for distributed authorization. In CCS '05: Proceedings of the 12th ACM
Conference on Computer and Communications Security , pages 168-179, New
York, NY, USA, 2005. ACM Press.
67. Walt Yao, Ken Moody, and Jean Bacon. A model of oasis role-based access
control and its support for active security. In SACMAT '01: Proceedings of
the sixth ACM Symposium on Access Control Models and Technologies , pages
171-181, New York, NY, USA, 2001. ACM Press.
68. Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured
credentials and sensitive policies through interoperable strategies for automated
trust negotiation. ACM Transactions on Information System Security , 6(1):1-
42, 2003.
Search WWH ::




Custom Search