Design and implementation of the idemix anonymous credential system

J Camenisch, E Van Herreweghen - … of the 9th ACM Conference on …, 2002 - dl.acm.org
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and
accountable transactions between users and service providers. As such, they represent a …

Rights protection for relational data

R Sion, M Atallah, S Prabhakar - Proceedings of the 2003 ACM SIGMOD …, 2003 - dl.acm.org
Protecting rights over relational data is of ever increasing interest, especially considering
areas where sensitive, valuable content is to be outsourced. A good example is a data …

Automated trust negotiation

WH Winsborough, KE Seamons… - … and Exposition. DISCEX …, 2000 - ieeexplore.ieee.org
Distributed software subjects face the problem of determining one another's trustworthiness.
The problem considered is managing the exchange of credentials between strangers for the …

Delegation logic: A logic-based approach to distributed authorization

N Li, BN Grosof, J Feigenbaum - ACM Transactions on Information and …, 2003 - dl.acm.org
We address the problem of authorization in large-scale, open, distributed systems.
Authorization decisions are needed in electronic commerce, mobile-code execution, remote …

An algebra for composing access control policies

P Bonatti, S De Capitani di Vimercati… - ACM Transactions on …, 2002 - dl.acm.org
Despite considerable advancements in the area of access control and authorization
languages, current approaches to enforcing access control are all based on monolithic and …

Access control meets public key infrastructure, or: Assigning roles to strangers

A Herzberg, Y Mass, J Mihaeli, D Naor… - Proceeding 2000 IEEE …, 2000 - ieeexplore.ieee.org
The Internet enables connectivity between many strangers: entities that don't know each
other. We present the Trust Policy Language (TPL), used to define the mapping of strangers …

A rule-based framework for role-based delegation and revocation

L Zhang, GJ Ahn, BT Chu - … on Information and System Security (TISSEC …, 2003 - dl.acm.org
Delegation is the process whereby an active entity in a distributed environment authorizes
another entity to access resources. In today's distributed systems, a user often needs to act …

A uniform framework for regulating service access and information release on the web

PA Bonatti, P Samarati - Journal of Computer Security, 2002 - content.iospress.com
The widespread use of Internet-based services is increasing the amount of information (such
as user profiles) that clients are required to disclose. This information demand is necessary …

Belief, information acquisition, and trust in multi-agent systems—a modal logic formulation

CJ Liau - Artificial Intelligence, 2003 - Elsevier
In this paper, we consider the influence of trust on the assimilation of acquired information
into an agent's belief. By use of modal logic, we semantically and axiomatically characterize …

[PDF][PDF] A declarative approach to business rules in contracts: courteous logic programs in XML

BN Grosof, Y Labrou, HY Chan - … of the 1st ACM Conference on …, 1999 - dl.acm.org
We address why, and especially how, to represent business rules in e-commerce contracts.
By contracts, we mean descriptions of goods and services offered or sought, including …