| 2006 |
9 | | Jason E. Holt:
Logcrypt: forward security and public verification for secure audit logs.
ACSW Frontiers 2006: 203-211 |
| 2005 |
8 | | Jason E. Holt:
The One Page Model Checker
CoRR abs/cs/0506084: (2005) |
7 | | Jason E. Holt:
On the Job Training
CoRR abs/cs/0506085: (2005) |
| 2004 |
6 | | Robert W. Bradshaw,
Jason E. Holt,
Kent E. Seamons:
Concealing complex policies with hidden credentials.
ACM Conference on Computer and Communications Security 2004: 146-157 |
5 | | Adam Hess,
Jason E. Holt,
Jared Jacobson,
Kent E. Seamons:
Content-triggered trust negotiation.
ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004) |
| 2003 |
4 | | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Thomas Chan,
Evan Child,
Michael Halcrow,
Adam Hess,
Jason E. Holt,
Jared Jacobson,
Ryan Jarvis,
Bryan Smith,
Tore Sundelin,
Lina Yu:
Trust Negotiation in Dynamic Coalitions.
DISCEX (2) 2003: 240-245 |
3 | | Kent E. Seamons,
Thomas Chan,
Evan Child,
Michael Halcrow,
Adam Hess,
Jason E. Holt,
Jared Jacobson,
Ryan Jarvis,
Aaron Patty,
Bryan Smith,
Tore Sundelin,
Lina Yu:
TrustBuilder: Negotiating Trust in Dynamic Coalitions.
DISCEX (2) 2003: 49-51 |
2 | | Jason E. Holt,
Robert W. Bradshaw,
Kent E. Seamons,
Hilarie K. Orman:
Hidden Credentials.
WPES 2003: 1-8 |
1 | | Ting Yu,
Marianne Winslett,
Jason E. Holt:
Two Security Symposia.
IEEE Security & Privacy 1(4): 50-52 (2003) |