Search in Artificial Intelligence
Search in Artificial Intelligence
Referee: trust management for Web applications
World Wide Web Journal - Special issue: Web security: a matter of trust
Using digital credentials on the World Wide Web
Journal of Computer Security - Special issue on security in the World Wide Web
Secure access to data over the Internet
PDIS '94 Proceedings of the third international conference on on Parallel and distributed information systems
Formal Concepts in Artificial Intelligence Foundations
Formal Concepts in Artificial Intelligence Foundations
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
Interoperable strategies in automated trust negotiation
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
ACM Transactions on Information and System Security (TISSEC)
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Access Control: Policies, Models, and Mechanisms
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Towards Practical Automated Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Certificate-based access control policies description language
Artificial intelligence and security in computing systems
Trust Negotiations: Concepts, Systems, and Languages
Computing in Science and Engineering
Collaborative Automated Trust Negotiation in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
A logic-based framework for attribute based access control
Proceedings of the 2004 ACM workshop on Formal methods in security engineering
Anonymous yet accountable access control
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
BPEL orchestration of secure webmail
Proceedings of the 3rd ACM workshop on Secure web services
A complete and efficient strategy based on petri net in automated trust negotiation
Proceedings of the 2nd international conference on Scalable information systems
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Private Information: To Reveal or not to Reveal
ACM Transactions on Information and System Security (TISSEC)
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Compact and Anonymous Role-Based Authorization Chain
ACM Transactions on Information and System Security (TISSEC)
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Identity-based long running negotiations
Proceedings of the 4th ACM workshop on Digital identity management
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Frontiers of Computer Science in China
Towards flexible credential negotiation protocols
Proceedings of the 11th international conference on Security Protocols
Point-based trust: define how much privacy is worth
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
A new approach to hide policy for automated trust negotiation
IWSEC'06 Proceedings of the 1st international conference on Security
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
An XML-based protocol for improving trust negotiation between Web Services
Proceedings of the 27th Annual ACM Symposium on Applied Computing
A unified attribute-based access control model covering DAC, MAC and RBAC
DBSec'12 Proceedings of the 26th Annual IFIP WG 11.3 conference on Data and Applications Security and Privacy
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
An ontology-based approach to automated trust negotiation
Computer Standards & Interfaces
Hi-index | 0.00 |