An access control model for dynamic client-side content
暂无分享,去创建一个
[1] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[2] Michael E. Lesk,et al. Computer Evaluation of Indexing and Text Processing , 1968, JACM.
[3] Marc Langheinrich,et al. The platform for privacy preferences 1.0 (p3p1.0) specification , 2002 .
[4] David W. Chadwick,et al. The PERMIS X.509 role based privilege management infrastructure , 2002, SACMAT '02.
[5] Kent E. Seamons,et al. Advanced Client/Server Authentication in TLS , 2002, NDSS.
[6] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[7] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[8] Ravi S. Sandhu,et al. Binding identities and attributes using digitally signed certificates , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[9] Marianne Winslett,et al. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.
[10] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[11] Elisa Bertino,et al. On specifying security policies for web documents with an XML-based language , 2001, SACMAT '01.
[12] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[13] John C. Klensin,et al. Simple Mail Transfer Protocol , 2001, RFC.
[14] Marianne Winslett,et al. Negotiating Trust on the Web , 2002, IEEE Internet Comput..
[15] Eric Rescorla,et al. SSL and TLS: Designing and Building Secure Systems , 2000 .
[16] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[17] Roy T. Fielding,et al. Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.
[18] Ninghui Li,et al. Towards practical automated trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[19] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[20] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[21] Tetsuya Morita,et al. A fuzzy document retrieval system using the keyword connection matrix and a learning method , 1991 .
[22] Marianne Winslett,et al. Requirements for policy languages for trust negotiation , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.
[23] Sangrae Cho,et al. ROLE-BASED EAM USING X.509 ATTRIBUTE CERTIFICATE∗ , 2003 .
[24] Marianne Winslett,et al. Protecting Privacy during On-Line Trust Negotiation , 2002, Privacy Enhancing Technologies.