Seamons, Kent E.
62  results:
Search for persons X
?
2

pwdArmor: Protecting Conventional Password-Based Authentica..:

, In: 2008 Annual Computer Security Applications Conference (ACSAC),
 
?
3

Wireless authentication using remote passwords:

, In: Proceedings of the first ACM conference on Wireless network security,
 
?
4

iDataGuard : middleware providing a secure network drive..:

, In: Proceedings of the 11th international conference on Extending database technology: Advances in database technology,
 
?
5

CPG : closed pseudonymous groups:

, In: Proceedings of the 7th ACM workshop on Privacy in the electronic society,
 
?
6

Simple authentication for the web:

, In: Proceedings of the 16th international conference on World Wide Web,
 
?
7

Adaptive trust negotiation and access control:

, In: Proceedings of the tenth ACM symposium on Access control models and technologies,
Ryutov, Tatyana ; Zhou, Li ; Neuman, Clifford.. - p. 139-146 , 2005
 
?
8

Concealing complex policies with hidden credentials:

, In: Proceedings of the 11th ACM conference on Computer and communications security,
 
?
9

Content-triggered trust negotiation:

Hess, Adam ; Holt, Jason ; Jacobson, Jared.
ACM Transactions on Information and System Security.  7 (2004)  3 - p. 428-456 , 2004
 
?
10

Content-triggered trust negotiation:

Hess, Adam ; Holt, Jason ; Jacobson, Jared.
ACM Transactions on Information and System Security (TISSEC).  7 (2004)  3 - p. 428-456 , 2004
 
?
11

Supporting structured credentials and sensitive policies th..:

Yu, Ting ; Winslett, Marianne ; Seamons, Kent E.
ACM Transactions on Information and System Security.  6 (2003)  1 - p. 1-42 , 2003
 
?
12

An access control model for dynamic client-side content:

, In: Proceedings of the eighth ACM symposium on Access control models and technologies,
Hess, Adam ; Seamons, Kent E. - p. 207-216 , 2003
 
?
13

Supporting structured credentials and sensitive policies th..:

Yu, Ting ; Winslett, Marianne ; Seamons, Kent E.
ACM Transactions on Information and System Security (TISSEC).  6 (2003)  1 - p. 1-42 , 2003
 
?
14

Hidden Credentials:

, In: Proceedings of the 2003 ACM workshop on Privacy in the electronic society,
 
?
15

Interoperable strategies in automated trust negotiation:

, In: Proceedings of the 8th ACM conference on Computer and Communications Security,
Yu, Ting ; Winslett, Marianne ; Seamons, Kent E. - p. 146-155 , 2001
 
1-15