![DBLP keys DBLP keys](../../../keys.gif) | 2008 |
6 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Charles C. Zhang,
Marianne Winslett:
Distributed Authorization by Multiparty Trust Negotiation.
ESORICS 2008: 282-299 |
| 2007 |
5 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Charles C. Zhang,
Marianne Winslett,
Carl A. Gunter:
On the Safety and Efficiency of Firewall Policy Deployment.
IEEE Symposium on Security and Privacy 2007: 33-50 |
| 2006 |
4 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Sruthi Bandhakavi,
Charles C. Zhang,
Marianne Winslett:
Super-sticky and declassifiable release policies for flexible information dissemination control.
WPES 2006: 51-58 |
| 2005 |
3 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Marianne Winslett,
Charles C. Zhang,
Piero A. Bonatti:
PeerAccess: a logic for distributed authorization.
ACM Conference on Computer and Communications Security 2005: 168-179 |
2 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Wolfgang Nejdl,
Daniel Olmedilla,
Marianne Winslett,
Charles C. Zhang:
Ontology-Based Policy Specification and Management.
ESWC 2005: 290-302 |
| 2004 |
1 | ![bibliographical record in XML bibliographical record in XML](../../../xml.gif) | Travis Leithead,
Wolfgang Nejdl,
Daniel Olmedilla,
Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation.
ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |