Regulating service access and information release on the Web
Proceedings of the 7th ACM conference on Computer and communications security
SSL and TLS: designing and building secure systems
SSL and TLS: designing and building secure systems
Policy-directed certificate retrieval
Software—Practice & Experience
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
ACM Transactions on Information and System Security (TISSEC)
Relying Party Credentials Framework
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
A Practically Implementable and Tractable Delegation Logic
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
SD3: A Trust Management System with Certified Evaluation
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
Strongman: a scalable solution to trust management in networks
Strongman: a scalable solution to trust management in networks
An access control model for dynamic client-side content
Proceedings of the eighth ACM symposium on Access control models and technologies
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Oblivious signature-based envelope
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Concealing complex policies with hidden credentials
Proceedings of the 11th ACM conference on Computer and communications security
Model-Driven Trust Negotiation for Web Services
IEEE Internet Computing
The role of trust in distributed design
Artificial Intelligence for Engineering Design, Analysis and Manufacturing
Facilitating secure ad hoc service discovery in public environments
Journal of Systems and Software - Special issue: Computer software & applications
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
Preventing attribute information leakage in automated trust negotiation
Proceedings of the 12th ACM conference on Computer and communications security
Automated trust negotiation using cryptographic credentials
Proceedings of the 12th ACM conference on Computer and communications security
PeerAccess: a logic for distributed authorization
Proceedings of the 12th ACM conference on Computer and communications security
A note on the anatomy of federation
BT Technology Journal
Traust: a trust negotiation-based authorization service for open systems
Proceedings of the eleventh ACM symposium on Access control models and technologies
Oblivious signature-based envelope
Distributed Computing
Law-abiding and integrity on the internet: a case for agents
Artificial Intelligence and Law
Attribute-Based Access Control with Hidden Policies and Hidden Credentials
IEEE Transactions on Computers
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Safety and consistency in policy-based authorization systems
Proceedings of the 13th ACM conference on Computer and communications security
OACerts: Oblivious Attribute Certificates
IEEE Transactions on Dependable and Secure Computing
ROST: Remote and hot service deployment with trustworthiness in CROWN Grid
Future Generation Computer Systems
Administering access control in dynamic coalitions
LISA '05 Proceedings of the 19th conference on Large Installation System Administration Conference - Volume 19
Adaptive Trust Negotiation and Access Control for Grids
GRID '05 Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
PP-trust-X: A system for privacy preserving trust negotiations
ACM Transactions on Information and System Security (TISSEC)
Private and Secure Service Discovery via Progressive and Probabilistic Exposure
IEEE Transactions on Parallel and Distributed Systems
The Traust Authorization Service
ACM Transactions on Information and System Security (TISSEC)
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Trust on the world wide web: a survey
Foundations and Trends in Web Science
Interactive access control for autonomic systems: From theory to implementation
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems
ACM Transactions on Information and System Security (TISSEC)
Preserving confidentiality of security policies in data outsourcing
Proceedings of the 7th ACM workshop on Privacy in the electronic society
Minimal credential disclosure in trust negotiations
Proceedings of the 4th ACM workshop on Digital identity management
Requirements of federated trust management for service-oriented architectures
Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services
Incorporating accountability into internet email
Proceedings of the 2009 ACM symposium on Applied Computing
A Model for Authentication Credentials Translation in Service Oriented Architecture
Transactions on Computational Science IV
Automated trust negotiation using cryptographic credentials
ACM Transactions on Information and System Security (TISSEC)
Toward Trustworthy Web Services - Approaches, Weaknesses and Trust-By-Contract Framework
WI-IAT '09 Proceedings of the 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology - Volume 03
Memory Complexity of Automated Trust Negotiation Strategies
PRIMA '09 Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems
The sisterhood of the traveling packets
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Program partitioning using dynamic trust models
FAST'06 Proceedings of the 4th international conference on Formal aspects in security and trust
Evaluation of P2P search algorithms for discovering trust paths
EPEW'07 Proceedings of the 4th European performance engineering conference on Formal methods and stochastic models for performance evaluation
Initial trust formation in Virtual Organisations
International Journal of Internet Technology and Secured Transactions
Trust establishment in the formation of Virtual Organizations
Computer Standards & Interfaces
Building Automated Trust Negotiation architecture in virtual computing environment
The Journal of Supercomputing
Receipt-mode trust negotiation: efficient authorization through outsourced interactions
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
Virtual fingerprinting as a foundation for reputation in open systems
iTrust'06 Proceedings of the 4th international conference on Trust Management
A scalable probabilistic approach to trust evaluation
iTrust'06 Proceedings of the 4th international conference on Trust Management
Traust: a trust negotiation based authorization service
iTrust'06 Proceedings of the 4th international conference on Trust Management
Early experience of remote and hot service deployment with trustworthiness in CROWN grid
APPT'05 Proceedings of the 6th international conference on Advanced Parallel Processing Technologies
Synergy: a policy-driven, trust-aware information dissemination framework
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
Privacy-Preserving trust negotiations
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
GPC'10 Proceedings of the 5th international conference on Advances in Grid and Pervasive Computing
Vulnerabilities and threats in distributed systems
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
A formal definition for trust in distributed systems
ISC'05 Proceedings of the 8th international conference on Information Security
An approach to trust management challenges for critical infrastructures
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Analysis and modelling of trust in distributed information systems
ICISS'05 Proceedings of the First international conference on Information Systems Security
Integrating trust management and access control in data-intensive Web applications
ACM Transactions on the Web (TWEB)
An XML-based protocol for improving trust negotiation between Web Services
Proceedings of the 27th Annual ACM Symposium on Applied Computing
Identifying and utilizing secure paths in ad hoc assistive medical environments
Security and Communication Networks
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Attacks on Confidentiality of Communications Between Stranger Organizations
International Journal of Knowledge-Based Organizations
Hi-index | 0.00 |
To enable interactions across security domain boundaries, the TrustBuilder trust negotiation system establishes trust between strangers by gradually disclosing credentials.