Year |
Citation |
Score |
2012 |
Chowdhury O, Pontual M, Winsborough WH, Yu T, Irwin K, Niu J. Ensuring authorization privileges for cascading user obligations Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 33-43. DOI: 10.1145/2295136.2295144 |
0.368 |
|
2011 |
Krishnan R, Niu J, Sandhu R, Winsborough WH. Group-centric secure information-sharing models for isolated groups Acm Transactions On Information and System Security. 14. DOI: 10.1145/2043621.2043623 |
0.472 |
|
2010 |
Rocha BPS, Bandhakavi S, Den Hartog J, Winsborough WH, Etalle S. Towards static flow-based declassification for legacy and untrusted programs Proceedings - Ieee Symposium On Security and Privacy. 93-108. DOI: 10.1109/SP.2010.14 |
0.574 |
|
2010 |
Pontual M, Irwin K, Chowdhury O, Winsborough WH, Yu T. Failure feedback for user obligation systems Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 713-720. DOI: 10.1109/SocialCom.2010.111 |
0.344 |
|
2010 |
Sandhu R, Krishnan R, Niu J, Winsborough WH. Group-centric models for secure and agile information sharing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6258: 55-69. DOI: 10.1007/978-3-642-14706-7_5 |
0.455 |
|
2010 |
Hobbs TL, Winsborough WH. Implementation and performance analysis of the role-based trust management system, RTC Ifip Advances in Information and Communication Technology. 321: 184-199. |
0.555 |
|
2009 |
Etalle S, Winsborough WH. Maintaining control while delegating trust: Integrity constraints in trust management Acm Transactions On Information and System Security. 13. DOI: 10.1145/1609956.1609961 |
0.601 |
|
2009 |
Li J, Li N, Winsborough WH. Automated trust negotiation using cryptographic credentials Acm Transactions On Information and System Security. 13. DOI: 10.1145/1609956.1609958 |
0.718 |
|
2009 |
Krishnan R, Niu J, Sandhu R, Winsborough WH. Foundations for group-centric secure information sharing models Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 115-124. DOI: 10.1145/1542207.1542227 |
0.343 |
|
2009 |
Krishnan R, Sandhu R, Niu J, Winsborough WH. A conceptual framework for Group-Centric secure information sharing Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 384-387. DOI: 10.1145/1533057.1533111 |
0.369 |
|
2009 |
Reith M, Niu J, Winsborough WH. Toward practical analysis for trust management policy Proceedings of the 4th International Symposium On Acm Symposium On Information, Computer and Communications Security, Asiaccs'09. 310-321. DOI: 10.1145/1533057.1533098 |
0.868 |
|
2008 |
Irwin K, Yu T, Winsborough WH. Avoiding information leakage in security-policy-aware planning Proceedings of the Acm Conference On Computer and Communications Security. 85-94. DOI: 10.1145/1456403.1456418 |
0.571 |
|
2008 |
Krishnan R, Niu J, Sandhu R, Winsborough WH. Stale-safe security properties for group-based secure information sharing Proceedings of the Acm Conference On Computer and Communications Security. 53-62. DOI: 10.1145/1456396.1456402 |
0.463 |
|
2008 |
Reith M, Niu J, Winsborough WH. Role-based trust management security policy analysis and correction environment (RT-SPACE) Proceedings - International Conference On Software Engineering. 929-930. DOI: 10.1145/1370175.1370192 |
0.617 |
|
2008 |
Jha S, Li N, Tripunitara M, Wang Q, Winsborough WH. Toward formal verification of role-based access control policies Ieee Transactions On Dependable and Secure Computing. 5: 242-255. DOI: 10.1109/Tdsc.2007.70225 |
0.758 |
|
2008 |
Irwin K, Yu T, Winsborough WH. Assigning responsibility for failed obligations Ifip International Federation For Information Processing. 263: 327-342. DOI: 10.1007/978-0-387-09428-1_21 |
0.415 |
|
2007 |
Winsborough WH, Squicciarini AC, Bertino E. Information carrying identity proof trees Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 76-79. DOI: 10.1145/1314333.1314348 |
0.581 |
|
2007 |
Etalle S, Winsborough WH. A posteriori compliance control Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 11-20. DOI: 10.1145/1266840.1266843 |
0.711 |
|
2007 |
Reith M, Niu J, Winsborough WH. Engineering trust management into software models Proceedings - Icse 2007 Workshops: International Workshop On Modeling in Software Engineering, Mise'07. DOI: 10.1109/MISE.2007.5 |
0.58 |
|
2007 |
Reith M, Niu J, Winsborough WH. Apply model checking to security analysis in trust management Proceedings - International Conference On Data Engineering. 734-743. DOI: 10.1109/ICDEW.2007.4401061 |
0.412 |
|
2007 |
Czenko M, Etalle S, Li D, Winsborough WH. An introduction to the role based trust management framework RT Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4677: 246-281. |
0.454 |
|
2006 |
Irwin K, Yu T, Winsborough WH. On the modeling and analysis of obligations Proceedings of the Acm Conference On Computer and Communications Security. 134-143. DOI: 10.1145/1180405.1180423 |
0.678 |
|
2006 |
Winsborough WH, Li N. Safety in automated trust negotiation Acm Transactions On Information and System Security. 9: 352-390. DOI: 10.1145/1178618.1178623 |
0.637 |
|
2006 |
Kaushik S, Winsborough W, Wijesekera D, Ammann P. Policy transformations for preventing leakage of sensitive information in email systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4127: 163-178. DOI: 10.1007/11805588_12 |
0.672 |
|
2006 |
Chao Y, Winsborough WH, Jajodia S. A hierarchical release control policy framework Ifip International Federation For Information Processing. 193. |
0.367 |
|
2005 |
Li N, Mitchell JC, Winsborough WH. Beyond proof-of-compliance: Security analysis in trust management Journal of the Acm. 52: 474-514. DOI: 10.1145/1066100.1066103 |
0.586 |
|
2005 |
Yao D, Shin M, Tamassia R, Winsborough WH. Visualization of automated trust negotiation Ieee Workshop On Visualization For Computer Security 2005, Vizsec 05, Proceedings. 65-74. DOI: 10.1109/VIZSEC.2005.1532067 |
0.308 |
|
2005 |
Firozabadi BS, Winsborough WH, Sahai A. Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY'05): Preface Proceedings - Sixth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2005. 2005. DOI: 10.1109/POLICY.2005.28 |
0.526 |
|
2005 |
Etalle S, Winsborough WH. Integrity constraints in trust management Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 1-10. |
0.524 |
|
2004 |
Tamassia R, Yao D, Winsborough WH. Role-based cascaded delegation Proceedings of Acm Symposium On Access Control Models and Technologies (Sacmat 2002). 9: 146-155. |
0.321 |
|
2003 |
Li N, Winsborough WH, Mitchell JC. Beyond proof-of-compliance: Safety and availability analysis in trust management Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 123-139. DOI: 10.1109/SECPRI.2003.1199332 |
0.557 |
|
2003 |
Winsborough WH, Jacobs J. Automated trust negotiation in attribute-based access control Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 252-257. DOI: 10.1109/DISCEX.2003.1194974 |
0.643 |
|
2003 |
Winsborough WH, Jacobs J. Automated trust negotiation technology with attribute-based access control Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 60-62. DOI: 10.1109/DISCEX.2003.1194916 |
0.468 |
|
2003 |
Winsborough WH. A logic programming view of authorization in distributed systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2916: 20-46. DOI: 10.1007/978-3-540-24599-5_3 |
0.501 |
|
2002 |
Li N, Mitchell JC, Winsborough WH. Design of a role-based trust-management framework Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 114-130. DOI: 10.1109/SECPRI.2002.1004366 |
0.46 |
|
2002 |
Winsborough WH, Li N. Towards practical automated trust negotiation Proceedings - 3rd International Workshop On Policies For Distributed Systems and Networks, Policy 2002. 92-105. DOI: 10.1109/POLICY.2002.1011297 |
0.634 |
|
2002 |
Winsborough WH, Li N. Protecting sensitive attributes in automated trust negotiation Proceedings of the Acm Conference On Computer and Communications Security. 41-51. |
0.625 |
|
2000 |
Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2000. 1: 88-102. DOI: 10.1109/DISCEX.2000.824965 |
0.558 |
|
Show low-probability matches. |