Databases Reference
In-Depth Information
19. Security and trust management (2005)
http://www.ercim.org/publication/Ercim News/enw63/.
20. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc.
of the 17th Symposium on Security and Privacy, Oakland, California, USA (May
1996)
21. Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.: The KeyNote Trust
Management System (Version 2). Internet RFC 2704 edn. (1999)
22. Bonatti, P., Samarati, P.: A unified framework for regulating access and infor-
mation release on the web. Journal of Computer Security 10 (3) (2002) 241-272
23. Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust
negotiation. In: Proc. of the 12th ACM Conference on Computer and Commu-
nications Security, Alexandria, VA, USA (2005)
24. Li, N., Mitchell, J., Winsborough, W.: Beyond proof-of-compliance: Security
analysis in trust management. Journal of the ACM 52 (2005) 474-514
25. Ni, J., Li, N., Winsborough, W.: Automated trust negotiation using crypto-
graphic credentials. In: Proc. of the 12th ACM Conference on Computer and
Communications Security, Alexandria, VA, USA (2005)
26. Yu, T., Winslett, M., Seamons, K.: Supporting structured credentials and sen-
sitive policies trough interoperable strategies for automated trust. ACM Trans-
actions on Information and System Security (TISSEC) 6 (1) (February 2003)
1-42
27. Seamons, K.E., Winsborough, W., Winslett, M.: Internet credential acceptance
policies. In: Proc. of the Workshop on Logic Programming for Internet Appli-
cations, Leuven, Belgium (July 1997)
28. Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills,
H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proc.
of the 3rd International Workshop on Policies for Distributed Systems and Net-
works (POLICY 2002), Monterey, CA (June 2002)
29. Winslett, M., Ching, N., Jones, V., Slepchin, I.: Assuring security and privacy
for digital library transactions on the web: Client and server security policies.
In: Proc. of the ADL '97 — Forum on Research and Tech. Advances in Digital
Libraries, Washington, DC (May 1997)
30. Yu, T., Ma, X., Winslett, M.: An ecient complete strategy for automated
trust negotiation over the internet. In: Proc. of the 7th ACM Computer and
Communication Security, Athens, Greece (November 2000)
31. Seamons, K., Winslett, M., Yu, T.: Limiting the disclosure of access control
policies during automated trust negotiation. In: Proc. of the Symposium on
Network and Distributed System Security, San Diego, CA (April 2001)
32. Yu, T., Winslett, M., Seamons, K.: Interoperable strategies in automated trust
negotiation. In: Proc. of the 8th ACM Conference on Computer and Commu-
nications Security, Philadelphia, Pennsylvania (November 2001)
33. Yu, T., Winslett, M.: A unified scheme for resource protection in automated
trust negotiation. In: Proc. of the IEEE Symposium on Security and Privacy,
Berkeley, California (May 2003)
34. Ryutov, T., Zhou, L., Neuman, C., Leithead, T., Seamons, K.: Adaptive trust
negotiation and access control. In: Proc. of the 10th ACM Symposium on Access
Control Models and Technologies, Stockholm, Sweden (June 2005)
35. Gladman, B., Ellison, C., Bohm, N.: Digital signatures, certificates and elec-
tronic commerce. http://www.clark.net/pub/cme/html/spki.html.
Search WWH ::




Custom Search