 | 2008 |
6 |  | Charles C. Zhang,
Marianne Winslett:
Distributed Authorization by Multiparty Trust Negotiation.
ESORICS 2008: 282-299 |
| 2007 |
5 |  | Charles C. Zhang,
Marianne Winslett,
Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment.
IEEE Symposium on Security and Privacy 2007: 33-50 |
| 2006 |
4 |  | Sruthi Bandhakavi,
Charles C. Zhang,
Marianne Winslett:
Super-sticky and declassifiable release policies for flexible information dissemination control.
WPES 2006: 51-58 |
| 2005 |
3 |  | Marianne Winslett,
Charles C. Zhang,
Piero A. Bonatti:
PeerAccess: a logic for distributed authorization.
ACM Conference on Computer and Communications Security 2005: 168-179 |
2 |  | Wolfgang Nejdl,
Daniel Olmedilla,
Marianne Winslett,
Charles C. Zhang:
Ontology-Based Policy Specification and Management.
ESWC 2005: 290-302 |
| 2004 |
1 |  | Travis Leithead,
Wolfgang Nejdl,
Daniel Olmedilla,
Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation.
ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |