Foundations of logic programming
Foundations of logic programming
A unified framework for enforcing multiple access control policies
SIGMOD '97 Proceedings of the 1997 ACM SIGMOD international conference on Management of data
IEEE ADL '97 Proceedings of the IEEE international forum on Research and technology advances in digital libraries
The platform for privacy preferences
Communications of the ACM
Mind your vocabulary: query mapping across heterogeneous information sources
SIGMOD '99 Proceedings of the 1999 ACM SIGMOD international conference on Management of data
Data on the Web: from relations to semistructured data and XML
Data on the Web: from relations to semistructured data and XML
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
The Conceptual Basis for Mediation Services
IEEE Expert: Intelligent Systems and Their Applications
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
A Mechanism for Establishing Policies for Electronic Commerce
ICDCS '98 Proceedings of the The 18th International Conference on Distributed Computing Systems
A Communication Agreement Framework for Access/Action Control
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Fine grained access control for SOAP E-services
Proceedings of the 10th international conference on World Wide Web
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
ACM Transactions on Information and System Security (TISSEC)
An access control model for data archives
Sec '01 Proceedings of the 16th international conference on Information security: Trusted information: the new decade challenge
A reputation-based approach for choosing reliable resources in peer-to-peer networks
Proceedings of the 9th ACM conference on Computer and communications security
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
IEEE Internet Computing
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Policy migration for sensitive credentials in trust negotiation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Concealing complex policies with hidden credentials
Proceedings of the 11th ACM conference on Computer and communications security
Preventing attribute information leakage in automated trust negotiation
Proceedings of the 12th ACM conference on Computer and communications security
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
PeerAccess: a logic for distributed authorization
Proceedings of the 12th ACM conference on Computer and communications security
Privacy and identity management for everyone
Proceedings of the 2005 workshop on Digital identity management
Achieving Privacy in Trust Negotiations with an Ontology-Based Approach
IEEE Transactions on Dependable and Secure Computing
Traust: a trust negotiation-based authorization service for open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Safety and consistency in policy-based authorization systems
Proceedings of the 13th ACM conference on Computer and communications security
PP-trust-X: A system for privacy preserving trust negotiations
ACM Transactions on Information and System Security (TISSEC)
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
IEEE Transactions on Parallel and Distributed Systems
Harvesting credentials in trust negotiation as an honest-but-curious adversary
Proceedings of the 2007 ACM workshop on Privacy in electronic society
The Traust Authorization Service
ACM Transactions on Information and System Security (TISSEC)
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Distributed Authorization by Multiparty Trust Negotiation
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
SecGRID: model for maintaining trust in large-scale dynamic environments
International Journal of Grid and Utility Computing
ICLP '08 Proceedings of the 24th International Conference on Logic Programming
Confidentiality-preserving distributed proofs of conjunctive queries
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Efficient datalog abduction through bounded treewidth
AAAI'07 Proceedings of the 22nd national conference on Artificial intelligence - Volume 2
Tractable database design and datalog abduction through bounded treewidth
Information Systems
An introduction to trust negotiation
iTrust'03 Proceedings of the 1st international conference on Trust management
Implementation of an agent-oriented trust management infrastructure based on a hybrid PKI model
iTrust'03 Proceedings of the 1st international conference on Trust management
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Rule-based policy representations and reasoning
Semantic techniques for the web
Receipt-mode trust negotiation: efficient authorization through outsourced interactions
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Exploiting proxy-based federated identity management in wireless roaming access
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
A framework for flexible access control in digital library systems
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
Synergy: a policy-driven, trust-aware information dissemination framework
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Risk-based security decisions under uncertainty
Proceedings of the second ACM conference on Data and Application Security and Privacy
Ontology-Based policy specification and management
ESWC'05 Proceedings of the Second European conference on The Semantic Web: research and Applications
Privacy-Preserving trust negotiations
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Privacy preserving of trust management credentials based on trusted computing
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A new approach to hide policy for automated trust negotiation
IWSEC'06 Proceedings of the 1st international conference on Security
Reactive policies for the semantic web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part I
Anonymity preserving techniques in trust negotiations
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
A semantic authorization model for pervasive healthcare
Journal of Network and Computer Applications
Hi-index | 0.00 |