The NIST model for role-based access control, Proceedings of the fifth ACM workshop on Role-based access control , RBAC '00, pp.47-63, 2000. ,
DOI : 10.1145/344287.344301
Security issues and requirements for internet-scale publish-subscribe systems, 35th Hawaii International Conference on System Sciences (HICSS-35), 2002. ,
Role-based access control for publish/subscribe middleware architectures, Proceedings of the 2nd international workshop on Distributed event-based systems , DEBS '03, pp.1-8, 2003. ,
DOI : 10.1145/966618.966622
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.27
Security aspects in publish/subscribe systems, "International Workshop on Distributed Event-based Systems (DEBS 2004)" W18L Workshop, 26th International Conference on Software Engineering, 2004. ,
DOI : 10.1049/ic:20040381
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.4998
Architecture patterns for a ubiquitous identity management system, ICONS 2011, 2011. ,
Identity Management without Revocation, 2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010. ,
DOI : 10.1109/SECURWARE.2010.20
A framework for authentication in NBD tactical Ad Hoc networks, IEEE Communications Magazine, vol.49, issue.10, pp.64-71, 2011. ,
DOI : 10.1109/MCOM.2011.6035819
Implementation of a Trusted Ticket System, pp.152-163, 2009. ,
DOI : 10.1007/978-3-642-01244-0_14
Trusted Computing enhanced OpenID, 2010 International Conference for. (nov, pp.1-8, 2010. ,
DOI : 10.1504/ijitst.2011.043133
Property Based Attestation and Trusted Computing: Analysis and Challenges, 2009 Third International Conference on Network and System Security, pp.278-285, 2009. ,
DOI : 10.1109/NSS.2009.83
The Intel Safer Computing Initiative: Building Blocks for Trusted Computing. Engineer to Engineer Series, 2006. ,
Reducing the Trusted Computing Base for Applications on Commodity Systems, 2009. ,