The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for credentials with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1998 (15) 1999-2001 (28) 2002 (22) 2003 (36) 2004 (60) 2005 (58) 2006 (80) 2007 (91) 2008 (81) 2009 (68) 2010 (28) 2011 (15) 2012 (23) 2013-2014 (34) 2015 (35) 2016 (20) 2017 (22) 2018 (25) 2019 (32) 2020 (22) 2021 (41) 2022 (48) 2023 (73) 2024 (19)
Publication types (Num. hits)
article(228) book(2) incollection(18) inproceedings(719) phdthesis(9)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 777 occurrences of 334 keywords

Results
Found 976 publication records. Showing 976 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Isaac Agudo, Javier López 0001, José A. Montenegro Graphical Representation of Authorization Policies for Weighted Credentials. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Gerrit Bleumer Credentials. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jason E. Holt Reconciling CA-Oblivious Encryption, Hidden Credentials, OSBE and Secret Handshakes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
17Paolo Ceravolo, Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati Advanced Metadata for Privacy-Aware Representation of Credentials. Search on Bibsonomy ICDE Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Stephen Farrell Securely Available Credentials Protocol. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Dale Gustafson, Mike Just, Magnus Nyström Securely Available Credentials (SACRED) - Credential Server Framework. Search on Bibsonomy RFC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons Concealing Complex Policies with Hidden Credentials. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
17E. Eugene Schultz The case for one-time credentials. Search on Bibsonomy Comput. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Andreas Pashalidis, Chris J. Mitchell Limits to Anonymity When Using Credentials. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pseudonym systems, privacy, timing attacks, unlinkability, anonymous credential systems
17Jan Camenisch, Anna Lysyanskaya Signature Schemes and Anonymous Credentials from Bilinear Maps. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Marit Hansen, Martin Rost Nutzerkontrollierte Verkettung - Pseudonyme, Credentials, Protokolle für Identitätsmanagement. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2003 DBLP  BibTeX  RDF
17Arjan de Mes, Erik Rongen Technical note - Web Service Credentials. Search on Bibsonomy IBM Syst. J. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Carlos M. A. Costa, José Luís Oliveira, Augusto Silva A New User-Oriented Model to Manage Multiple Digital Credentials. Search on Bibsonomy ICEIS (4) The full citation details ... 2003 DBLP  BibTeX  RDF
17Marco Casassa Mont, Richard Brown 0001 Active Digital Credentials: Dynamic Provision of Up-to-Date Identity Information. Search on Bibsonomy InfraSec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Stefan Brands, Frédéric Légaré Digital Identity Management based on Digital Credentials. Search on Bibsonomy GI Jahrestagung The full citation details ... 2002 DBLP  BibTeX  RDF
17Stefan Brands, Frédéric Légaré Digital Identity Management based on Digital Credentials. Search on Bibsonomy GI Jahrestagung The full citation details ... 2002 DBLP  BibTeX  RDF
17Marco Casassa Mont, Michael Yearworth Negotiated Revealing of Traders? Credentials in e-Marketplaces: Dealing with Trust and Privacy Issues. Search on Bibsonomy WECWIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Alfred Arsenault, Stephen Farrell Securely Available Credentials - Requirements. Search on Bibsonomy RFC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Ariel Glenn, Ian Goldberg, Frédéric Légaré, Anton Stiglic A Description of Protocols for Private Credentials. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
17Jan Camenisch, Anna Lysyanskaya An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
17Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin Using Digital Credentials on the World Wide Web. Search on Bibsonomy J. Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
17Vicki Ellen Jones, Neil Ching, Marianne Winslett Credentials for privacy and interoperation. Search on Bibsonomy NSPW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17David Chaum Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
9Alessandro Sorniotti, Refik Molva Secret interest groups (SIGs) in social networks with an implementation on Facebook. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secret interest groups, social networks, secret handshakes
9Christopher Staite Portable secure identity management for software engineering. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
9Radia J. Perlman, Charlie Kaufman, Ray A. Perlner Privacy-preserving DRM. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF blindable parameterizable public key, privacy, algorithms, protocols, DRM
9Jiangtao Li 0001, Ninghui Li, XiaoFeng Wang 0001, Ting Yu 0001 Denial of service attacks and defenses in decentralized trust management. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access control, Game theory, Denial of service, Trust management, Trust negotiation
9Kalid Elmufti, Dasun Weerasinghe, Muttukrishnan Rajarajan, Veselin Rakocevic, Sanowar Khan, John A. MacDonald Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3GPP generic bootstrapping architecture, Mobile Authentication Protocol, Authentication, SAML, Mobile Web Services, GAA
9Danfeng Yao, Roberto Tamassia Compact and Anonymous Role-Based Authorization Chain. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymity, Delegation, aggregate signature
9Chao-Tung Yang, Kuan-Chou Lai, Po-Chi Shih Design and implementation of a workflow-based resource broker with information system on computational grids. Search on Bibsonomy J. Supercomput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Information monitoring, Workflow, Computational grid, Job scheduling, Globus toolkit, Resource broker
9Ke Chen 0005, Kai Hwang 0001, Gang Chen 0001 Heuristic Discovery of Role-Based Trust Chains in Peer-to-Peer Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Damien Aumaitre A little journey inside Windows memory. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak S. Prabhu, Matt Blaze, Sampath Kannan, Insup Lee 0001, Jonathan M. Smith, Oleg Sokolsky QuanTM: a quantitative trust management system. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF QuanTM, TNA-SL, quantified trust management, trust management, reputation management, KeyNote
9Andreas Klenk, Holger Kinkelin, Christoph Eunicke, Georg Carle Preventing identity theft with electronic identity cards and the trusted platform module. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication with TPM, electronic ID, identity system
9Zhiguo Wan, Kui Ren 0001, Bo Zhu 0001, Bart Preneel, Ming Gu 0001 Anonymous user communication for privacy protection in wireless metropolitan mesh networks. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous routing, information security, wireless mesh networks
9Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
9Shouhuai Xu, Moti Yung Expecting the Unexpected: Towards Robust Credential Infrastructure. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack
9Huajun Huang, Shaohong Zhong, Junshan Tan Browser-Side Countermeasures for Deceptive Phishing Attack. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Florian Rosenberg, Rania Khalaf, Matthew J. Duftler, Francisco Curbera, Paula Austel End-to-End Security for Enterprise Mashups. Search on Bibsonomy ICSOC/ServiceWave The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Frederik Orellana, Christian Ulrik Søttrup, Anders Wäänänen, Daniel Kalici, Michael Grønager The Case for a Simpler Security Model in Grid Computing. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Mehran Ahsant, Jim Basney Workflows in Dynamic and Restricted Delegation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Nuttapong Attrapadung, Hideki Imai Dual-Policy Attribute Based Encryption. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key policy, Attribute-based encryption, Ciphertext policy
9Joni Hahkala, John White, Ákos Frohner Proxy Restrictions for Grid Usage. Search on Bibsonomy GPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu PAES: Policy-Based Authority Evaluation Scheme. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Wolter Pieters, Qiang Tang 0001 Data Is Key: Introducing the Data-Based Access Control Paradigm. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data-based access control, de-perimeterisation, secret sharing, secure sketches
9Hicham Tout, William Hafner Phishpin: An Identity-Based Anti-phishing Approach. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Patrik Bichsel, Samuel Müller 0002, Franz-Stefan Preiss, Dieter Sommer, Mario Verdicchio Security and Trust through Electronic Social Network-Based Interactions. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Bob Hulsebosch, Robert de Groote, Martin Snijders Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF lightpath provisioning, trust, identity management, federation, User centric, network resources
9Rakesh Radhakrishnan "Identity & context for a changing world". Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF context, policy, identity
9Saman Zarandioon, Danfeng Yao, Vinod Ganapathy Privacy-aware identity management for client-side mashup applications. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF omos, security, communication, web, mashup, ajax
9Daisuke Mashima, Mustaque Ahamad Using identity credential usage logs to detect anomalous service accesses. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity theft and misuse detection, online access log monitoring, risk scoring
9David W. Chadwick, Kaniz Fatema An advanced policy based authorisation infrastructure. Search on Bibsonomy Digital Identity Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF application independent pep, credential validation service, master pdp, obligations service, pdp, pep, sticky policy
9Ladislav Huraj, Vladimír Siládi Authorization through trust chains in ad hoc grids. Search on Bibsonomy EATIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF certificate chain, authorization, delegation, ad hoc grid
9Jungha Woo, Jalaja Padma, Jae-Woo Lee, David Braun, Carol X. Song Puffin: a fast and efficient web service-based condor job manager. Search on Bibsonomy SC-GCE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Condor job manager, asynchronous event update, space lease, web service, Condor
9Corinne S. Irwin, Dennis C. Taylor Identity, credential, and access management at NASA, from Zachman to attributes. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attribute-based access control (ABAC), level of assurance (LoA), logical access control system (LACS)
9Sebastian Rieger User-Centric Identity Management in Heterogeneous Federations. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
9Siani Pearson, Marco Casassa Mont, Manny Novoa Securing Information Transfer in Distributed Computing Environments. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Eun-Jun Yoon, Kee-Young Yoo Improving the Host Authentication Mechanism for POD Copy Protection System. Search on Bibsonomy New Directions in Intelligent Interactive Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Host authentication, POD copy protection system, Diffie-Hellman key agreement, Replay attack
9Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. Smith PEREA: towards practical TTP-free revocation in anonymous authentication. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-membership proofs, privacy-enhanced revocation, subjective blacklisting, anonymous authentication
9Marina Blanton Online subscriptions with anonymous access. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymous access, privacy, signatures, zero-knowledge proofs
9Justin Cappos, Justin Samuel, Scott M. Baker, John H. Hartman A look in the mirror: attacks on package managers. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF package management, mirrors, replay attack
9Ibrahim Armac, Daniel Rose Privacy-friendly user modelling for smart environments. Search on Bibsonomy MobiQuitous The full citation details ... 2008 DBLP  DOI  BibTeX  RDF personalization, user model, smart environments
9Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López 0001, Antonio Fernandez Gómez-Skarmeta Levels of Assurance and Reauthentication in Federated Environments. Search on Bibsonomy EuroPKI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reauthentication, LoA, eduGAIN, authorization, federation, SSO
9Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jason Crampton, Hoon Wei Lim Role Signatures for Access Control in Open Distributed Systems. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Ana Bove, Venanzio Capretta A Type of Partial Recursive Functions. Search on Bibsonomy TPHOLs The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sarah Giersch, Heather Leary, Bart Palmer, Mimi Recker Developing a review process for online resources. Search on Bibsonomy JCDL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF education, peer review
9Jafar Haadi Jafarian, Morteza Amini, Rasool Jalili A Context-Aware Mandatory Access Control Model for Multilevel Security Environments. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Context-Awareness, Integrity, Confidentiality, Mandatory Access Control
9Stefano Bistarelli, Fabio Martinelli, Francesco Santini 0001 Weighted Datalog and Levels of Trust. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9R. J. Hulsebosch, P. W. G. Ebben Enhancing Face Recognition with Location Information. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, face recognition, Context, sensor fusion, identity verification
9Vladimir Kolesnikov, Charles Rackoff Password Mistyping in Two-Factor-Authenticated Key Exchange. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yuan-Chin Wen, Chia-Hung Chen, Sheng-De Wang Crossing Heterogeneous Grid Systems with a Single Sign-On Scheme Based on a P2P Layer. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Wenjing Ma, Mei Song, Yong Zhang 0025, Xin Lin, Huan Zhang An Optimization Method to Develop AAA Architectures with MIPv6 Mobility Support. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Chao-Tung Yang, Fang-Yie Leu, Wen-Jen Hu A Network Bandwidth-Aware Job Scheduling with Dynamic Information Model for Grid Resource Brokers. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9John Buck Surdu Wargaming: past, present and future. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Tyler Moore 0001, Maxim Raya, Jolyon Clulow, Panagiotis Papadimitratos, Ross J. Anderson, Jean-Pierre Hubaux Fast Exclusion of Errant Devices from Vehicular Networks. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Philip Craiger, Paul Burke, Christopher Marberry, Mark Pollitt A Virtual Digital Forensics Laboratory. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF virtualization, Virtual laboratory, storage area network
9André Zúquete, Helder Gomes, João Paulo da Silva Cunha Authentication Architecture for Region-Wide e-Health System with Smartcards and a PKI. Search on Bibsonomy BIOSTEC (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Andreas U. Schmidt, Nicolai Kuntze, Michael Kasper On the Deployment of Mobile Trusted Modules. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Mohammad Iftekhar Husain, Shambhu J. Upadhyaya, Madhusudhanan Chandrasekaran A Novel Approach for Security and Robustness in Wireless Embedded Systems. Search on Bibsonomy SEUS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF RTS/CTS, Security, Embedded systems, Wireless networks, Media Access Control (MAC), Covert channel
9Alexandru Caracas, Andreas Kind, Dieter Gantenbein, Stefan Fussenegger, Dimitrios Dechouniotis Mining semantic relations using NetFlow. Search on Bibsonomy BDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Fabio Martignon, Stefano Paris, Antonio Capone MobiSEC: a novel security architecture for wireless mesh networks. Search on Bibsonomy Q2SWinet The full citation details ... 2008 DBLP  DOI  BibTeX  RDF experimental test-bed, security, authentication, wireless mesh networks
9Quanxiang Liu, Leilei Tang Study of Printing Identification Based on Multi-spectrum Imaging Analysis. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Siddharth Tiwari, Richa Bansal, Divya Bansal Optimized client side solution for cross site scripting. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9David A. Knox, Thomas Kunz Secure Authentication in Wireless Sensor Networks Using RF Fingerprints. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Shangyuan Guan, Xiaoshe Dong, Yiduo Mei, Weiguo Wu, Zhenghua Xue Towards Automated Trust Negotiation for Grids. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Shangyuan Guan, Xiaoshe Dong, Weiguo Wu, Yiduo Mei, Guofu Feng A Distributed Trust Management Based on Authorizing Negotiation in Open and Dynamic Environments. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yu Zhang An Open Framework for Remote Electronic Elections. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yuri Demchenko, Alfred Wan, Mihai Cristea, Cees de Laat Authorisation infrastructure for on-demand network resource provisioning. Search on Bibsonomy GRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Stephen Wilson Public key superstructure "it's PKI Jim, but not as we know it!". Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, PKI, public key infrastructure, digital certificates
9Guoray Cai, Anna Cinzia Squicciarini A Unified Theory of Trust and Collaboration. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust communication, access control, information sharing, collaborative work
9Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles A Multiple-Control Fuzzy Vault. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Feng Cheng 0002, Christoph Meinel Strong Authentication over Lock-Keeper. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jatinder Singh, David M. Eyers, Jean Bacon Credential management in event-driven healthcare systems. Search on Bibsonomy Middleware (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF confidentaility, credential management, data control, eventbased middleware, privacy, healthcare, publish/subscribe
9Federica Paci, Mourad Ouzzani, Massimo Mecella Verification of Access Control Requirements in Web Services Choreography. Search on Bibsonomy IEEE SCC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF web services, verification, access control, choreography
9Jesus Luna, Manel Medina, Oscar Manso Using OGRO and CertiVeR to improve OCSP validation for Grids. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CertiVeR, Grid validation, Grid validation policy, Online Certificate Status Protocol, Open Grid OCSP, Prevalidation
9Chao-Tung Yang, Po-Chi Shih, Cheng-Fang Lin, Sung-Yi Chen A resource broker with an efficient network information model on grid environments. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Efficient network model, Grid computing, Globus toolkit, MDS, Resource broker, NWS
9Heidi Ellis Software engineering: effective teaching and learning approaches and practices. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Hristo Koshutanski, Fabio Massacci A Negotiation Scheme for Access Rights Establishment in Autonomic Communication. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF policy based access management, algorithms, access control, protocols, trust negotiation, logic reasoning
Displaying result #701 - #800 of 976 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license