Changes between Initial Version and Version 1 of TIEDABACRefs


Ignore:
Timestamp:
07/10/12 23:31:51 (9 years ago)
Author:
faber@isi.edu
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • TIEDABACRefs

    v1 v1  
     1= Papers on the ABAC Authorization Logic =
     2
     3* William H. Winsborough, Ninghui Li,[http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1011297&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1011297 Towards practical automated trust negotiation], 
     4''In Proceedings of the Third International Workshop on Policies for Distributed Systems and Networks'', pp. 92-103, 2002.
     5
     6* William H. Winsborough, J. C. Mitchell, Ninghui Li, [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1004366&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1004366 Design of a role-based trust-management framework] , ''In Proceedings of IEEE Symposium on Security and Privacy'', pp. 114 - 130  2002.
     7
     8* William H. Winsborough, Jay Jacobs, [http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=1194916&url=http%3A%2F%2Fieeexplore.ieee.org%2Fxpls%2Fabs_all.jsp%3Farnumber%3D1194916 Automated trust negotiation technology with attribute-based access control], ''In Proceedings of DARPA Information Survivability Conference and Exposition'',pp. 60-62, 2003.
     9
     10* William H. Winsborough and Ninghui Li, Protecting sensitive attributes in automated trust negotiation, ''In Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society (WPES '02)'' ACM, New York, NY, USA, 41-51, 2002. [http://doi.acm.org/10.1145/644527.644532 DOI=10.1145/644527.644532 ].
     11