Integrating trust management and access control in data-intensive Web applications, ACM Transactions on the Web, vol.6, issue.2, pp.1-643, 2012. ,
DOI : 10.1145/2180861.2180863
Constraining Credential Usage in Logic-Based Access Control, 2010 23rd IEEE Computer Security Foundations Symposium, pp.154-168, 2010. ,
DOI : 10.1109/CSF.2010.18
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems, In: ISC, pp.290-305, 2012. ,
DOI : 10.1007/978-3-642-33383-5_18
Towards an efficient and language-agnostic compliance checker for trust negotiation systems, Proceedings of the 2008 ACM symposium on Information, computer and communications security , ASIACCS '08, pp.228-239, 2008. ,
DOI : 10.1145/1368310.1368343
Model Checking of Qualitative Sensitivity Preferences to Minimize Credential Disclosure, In: FACS, pp.205-223, 2012. ,
DOI : 10.1007/978-3-642-35861-6_13
Access Control for the Web via Proof-carrying Authorization, 2003. ,
Distributed credential chain discovery in trust management*, Journal of Computer Security, vol.11, issue.1, pp.35-86, 2003. ,
DOI : 10.3233/JCS-2003-11102
Toward strong, usable access control for shared distributed data, Proceedings of the 12th USENIX Conference on File and Storage Technologies, 2014. ,
Requirements for policy languages for trust negotiation, Proceedings Third International Workshop on Policies for Distributed Systems and Networks, pp.68-79, 2002. ,
DOI : 10.1109/POLICY.2002.1011295