On the decidability of accessibility problems (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
The role of trust management in distributed systems security
Secure Internet programming
Distributed access-rights management with delegation certificates
Secure Internet programming
Distributed credential chain discovery in trust management: extended abstract
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Delegation logic: A logic-based approach to distributed authorization
ACM Transactions on Information and System Security (TISSEC)
A Uniform Model for Authorization and Access Control in Enterprise Information Platform
EDCIS '02 Proceedings of the First International Conference on Engineering and Deployment of Cooperative Information Systems
The Set and Function Approach to Modeling Authorization in Distributed Systems
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Overview of the AT&T Labs Trust-Management Project (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
KeyNote: Trust Management for Public-Key Infrastructures (Position Paper)
Proceedings of the 6th International Workshop on Security Protocols
A Practical Distributed Authorization System for GARA
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys
FC '99 Proceedings of the Third International Conference on Financial Cryptography
A General and Flexible Access-Control System for the Web
Proceedings of the 11th USENIX Security Symposium
Distributed credential chain discovery in trust management
Journal of Computer Security
A Logic-based Knowledge Representation for Authorization with Delegation
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A State-Transition Model of Trust Management and Access Control
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Requirements for Policy Languages for Trust Negotiation
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
The Specification and Enforcement of Advanced Security Policies
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Towards a formal notion of trust
Proceedings of the 5th ACM SIGPLAN international conference on Principles and practice of declaritive programming
Efficient support for enterprise delegation policies
Proceedings of the 2005 ACM symposium on Applied computing
CPOL: high-performance policy evaluation
Proceedings of the 12th ACM conference on Computer and communications security
A method for access authorisation through delegation networks
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
On the modeling and analysis of obligations
Proceedings of the 13th ACM conference on Computer and communications security
Fourth-factor authentication: somebody you know
Proceedings of the 13th ACM conference on Computer and communications security
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Digital-ticket-controlled digital ticket circulation
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
Kerberized credential translation: a solution to web access control
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
Provisions and obligations in policy management and security applications
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Towards an efficient and language-agnostic compliance checker for trust negotiation systems
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Using First-Order Logic to Reason about Policies
ACM Transactions on Information and System Security (TISSEC)
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
A Formal Framework for Expressing Trust Negotiation in the Ubiquitous Computing Environment
UIC '08 Proceedings of the 5th international conference on Ubiquitous Intelligence and Computing
Path-Based Access Control for Enterprise Networks
ISC '08 Proceedings of the 11th international conference on Information Security
Towards Role Based Trust Management without Distributed Searching of Credentials
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Towards a dynamic and composable model of trust
Proceedings of the 14th ACM symposium on Access control models and technologies
A trust-based approach to estimating the confidence of the software system in open environments
Journal of Computer Science and Technology
Enforcing access control in Web-based social networks
ACM Transactions on Information and System Security (TISSEC)
Trust Management Using Networks of Volunteers in Ubiquitous Computing Environments
NEW2AN '09 and ruSMART '09 Proceedings of the 9th International Conference on Smart Spaces and Next Generation Wired/Wireless Networking and Second Conference on Smart Spaces
An Implementation of Role-Base Trust Management Extended with Weights on Mobile Devices
Electronic Notes in Theoretical Computer Science (ENTCS)
Completeness of discovery protocols
Proceedings of the 2nd ACM workshop on Assurable and usable security configuration
Proceedings of the VLDB Endowment
Effective trust management through a hybrid logical and relational approach
ASIACCS '10 Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security
Experience with the keynote trust management system: applications and future directions
iTrust'03 Proceedings of the 1st international conference on Trust management
A RT0-based compliance checker model for automated trust negotiation
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Prototyping an armored data vault rights management on Big Brother's computer
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Secure attribute-based systems
Journal of Computer Security
An administrative model for UCONABC
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Credential chain discovery in RTTtrust management language
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Resource management with X.509 inter-domain authorization certificates (InterAC)
EuroPKI'09 Proceedings of the 6th European conference on Public key infrastructures, services and applications
Nexus authorization logic (NAL): Design rationale and applications
ACM Transactions on Information and System Security (TISSEC)
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
A formalization of distributed authorization with delegation
ACISP'05 Proceedings of the 10th Australasian conference on Information Security and Privacy
Managing trust in distributed agent systems
ATC'06 Proceedings of the Third international conference on Autonomic and Trusted Computing
Toward a broader view of security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
Specifying distributed authorization with delegation using logic programming
KES'05 Proceedings of the 9th international conference on Knowledge-Based Intelligent Information and Engineering Systems - Volume Part II
Modeling public key infrastructures in the real world
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
iTrust'05 Proceedings of the Third international conference on Trust Management
Device-enabled authorization in the grey system
ISC'05 Proceedings of the 8th international conference on Information Security
Bring efficient connotation expressible policies to trust management
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
VTrust: a trust management system based on a vector model of trust
ICISS'05 Proceedings of the First international conference on Information Systems Security
Relational-based calculus for trust management in networked services
Computer Communications
Enhancing directory virtualization to detect insider activity
Security and Communication Networks
Avoiding delegation subterfuge using linked local permission names
FAST'11 Proceedings of the 8th international conference on Formal Aspects of Security and Trust
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Efficient proving for practical distributed access-control systems
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
DEAL: A Distributed Authorization Language for Ambient Intelligence
International Journal of Ambient Computing and Intelligence
Trust management of services in cloud environments: Obstacles and solutions
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |