Dynamically distributed query evaluation
PODS '01 Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
IEEE Internet Computing
Certificate Distribution with Local Autonomy
IWAN '00 Proceedings of the Second International Working Conference on Active Networks
Distributed credential chain discovery in trust management
Journal of Computer Security
An approach to certificate path discovery in mobile Ad Hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Role-based cascaded delegation
Proceedings of the ninth ACM symposium on Access control models and technologies
Integrity constraints in trust management
Proceedings of the tenth ACM symposium on Access control models and technologies
Beyond proof-of-compliance: security analysis in trust management
Journal of the ACM (JACM)
Highly distributed XQuery with DXQ
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
A posteriori compliance control
Proceedings of the 12th ACM symposium on Access control models and technologies
DXQ: a distributed XQuery scripting language
XIME-P '07 Proceedings of the 4th international workshop on XQuery implementation, experience and perspectives
Risk management for distributed authorization
Journal of Computer Security
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
A formal framework for reflective database access control policies
Proceedings of the 15th ACM conference on Computer and communications security
Distributed Authorization by Multiparty Trust Negotiation
ESORICS '08 Proceedings of the 13th European Symposium on Research in Computer Security: Computer Security
Towards Role Based Trust Management without Distributed Searching of Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Maintaining control while delegating trust: Integrity constraints in trust management
ACM Transactions on Information and System Security (TISSEC)
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
An introduction to the role based trust management framework RT
Foundations of security analysis and design IV
Abductive authorization credential gathering
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
Independently verifiable decentralized role-based delegation
IEEE Transactions on Systems, Man, and Cybernetics, Part A: Systems and Humans
ICICS'06 Proceedings of the 8th international conference on Information and Communications Security
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
Hi-index | 0.00 |