PeerAccess: a logic for distributed authorization
Proceedings of the 12th ACM conference on Computer and communications security
A survey of trust in computer science and the Semantic Web
Web Semantics: Science, Services and Agents on the World Wide Web
Towards content trust of web resources
Web Semantics: Science, Services and Agents on the World Wide Web
Integration of rules and policies for Semantic Web Services
International Journal of Advanced Media and Communication
Authorization in trust management: Features and foundations
ACM Computing Surveys (CSUR)
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Flexible Adaptivity in AEHS Using Policies
AH '08 Proceedings of the 5th international conference on Adaptive Hypermedia and Adaptive Web-Based Systems
SecGRID: model for maintaining trust in large-scale dynamic environments
International Journal of Grid and Utility Computing
ICLP '08 Proceedings of the 24th International Conference on Logic Programming
Flexible and Secure Logging of Grid Data Access
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
Trust negotiation: authorization for virtual organizations
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Advanced Policy Explanations on the Web
Proceedings of the 2006 conference on ECAI 2006: 17th European Conference on Artificial Intelligence August 29 -- September 1, 2006, Riva del Garda, Italy
Privacy in a Semantic Cloud: What's Trust Got to Do with It?
CloudCom '09 Proceedings of the 1st International Conference on Cloud Computing
Enabling advanced and context-dependent access control in RDF stores
ISWC'07/ASWC'07 Proceedings of the 6th international The semantic web and 2nd Asian conference on Asian semantic web conference
Evolution and reactivity in the semantic web
Semantic techniques for the web
Rule-based policy representations and reasoning
Semantic techniques for the web
Component-based security policy design with colored Petri nets
Semantics and algebraic specification
Access control policies for semantic networks
POLICY'09 Proceedings of the 10th IEEE international conference on Policies for distributed systems and networks
A General Framework for Web Content Filtering
World Wide Web
SecurOntology: A semantic web access control framework
Computer Standards & Interfaces
Managing adaptivity in web collaborative processes using policies and user profiles
ICWE'10 Proceedings of the 10th international conference on Current trends in web engineering
Fine-grained disclosure of access policies
ICICS'10 Proceedings of the 12th international conference on Information and communications security
A framework and implementation for secure knowledge management in large communities
i-KNOW '11 Proceedings of the 11th International Conference on Knowledge Management and Knowledge Technologies
Realizing business processes with ECA rules: benefits, challenges, limits
PPSWR'06 Proceedings of the 4th international conference on Principles and Practice of Semantic Web Reasoning
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Semantic web policies – a discussion of requirements and research issues
ESWC'06 Proceedings of the 3rd European conference on The Semantic Web: research and applications
The architecture of a privacy-aware access control decision component
CASSIS'05 Proceedings of the Second international conference on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices
Guarding a walled garden — semantic privacy preferences for the social web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part II
Reactive policies for the semantic web
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part I
Datalog for security, privacy and trust
Datalog'10 Proceedings of the First international conference on Datalog Reloaded
A multi-layer framework for personalized social tag-based applications
Data & Knowledge Engineering
Rule-based policy representation and reasoning for the semantic web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
RW'07 Proceedings of the Third international summer school conference on Reasoning Web
Exploiting policies in an open infrastructure for lifelong learning
EC-TEL'07 Proceedings of the Second European conference on Technology Enhanced Learning: creating new learning experiences on a global scale
Hi-index | 0.00 |
We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and access-control related actions. The framework features a powerful declarative metalanguage for driving some critical negotiation decisions, and integrity constraints for monitoring negotiations and credential disclosure.