2009 | ||
---|---|---|
41 | Kent E. Seamons, Neal McBurnett, Tim Polk: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA ACM 2009 | |
2008 | ||
40 | Kent E. Seamons, Neal McBurnett, Tim Polk: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA ACM 2008 | |
39 | Timothy W. van der Horst, Kent E. Seamons: pwdArmor: Protecting Conventional Password-Based Authentications. ACSAC 2008: 443-452 | |
38 | Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. EDBT 2008: 710-714 | |
37 | Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: iDataGuard: an interoperable security middleware for untrusted internet data storage. Middleware (Companion) 2008: 36-41 | |
36 | Daniel D. Walker, Eric G. Mercer, Kent E. Seamons: Or Best Offer: A Privacy Policy Negotiation Protocol. POLICY 2008: 173-180 | |
35 | Andrew Harding, Timothy W. van der Horst, Kent E. Seamons: Wireless authentication using remote passwords. WISEC 2008: 24-29 | |
34 | Reed S. Abbott, Timothy W. van der Horst, Kent E. Seamons: CPG: closed pseudonymous groups. WPES 2008: 55-64 | |
2007 | ||
33 | Phillip L. Hellewell, Kent E. Seamons: Extensible Pre-authentication Kerberos. ACSAC 2007: 201-210 | |
32 | Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: gVault: A Gmail Based Cryptographic Network File System. DBSec 2007: 161-176 | |
31 | Timothy W. van der Horst, Kent E. Seamons: Simple authentication for the web. WWW 2007: 1217-1218 | |
30 | Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 | |
2006 | ||
29 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ACSAC 2006: 57-66 | |
2005 | ||
28 | Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control for grids. GRID 2005: 55-62 | |
27 | Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control. SACMAT 2005: 139-146 | |
2004 | ||
26 | Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons: Concealing complex policies with hidden credentials. ACM Conference on Computer and Communications Security 2004: 146-157 | |
25 | Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett: No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. ESWS 2004: 342-356 | |
24 | Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 | |
23 | Bryan Smith, Kent E. Seamons, Michael D. Jones: Responding to Policies at Runtime in TrustBuilder. POLICY 2004: 149-158 | |
22 | Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004) | |
2003 | ||
21 | Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 | |
20 | Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu: TrustBuilder: Negotiating Trust in Dynamic Coalitions. DISCEX (2) 2003: 49-51 | |
19 | Adam Hess, Kent E. Seamons: An access control model for dynamic client-side content. SACMAT 2003: 207-216 | |
18 | Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman: Hidden Credentials. WPES 2003: 1-8 | |
17 | Ting Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) | |
2002 | ||
16 | Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith: Advanced Client/Server Authentication in TLS. NDSS 2002 | |
15 | Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 | |
14 | Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 | |
13 | Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002) | |
2001 | ||
12 | Ting Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155 | |
11 | Kent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001 | |
1997 | ||
10 | Kent E. Seamons, William H. Winsborough, Marianne Winslett: Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432 | |
9 | Yong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons: Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. IOPADS 1997: 1-13 | |
8 | Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons: Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. PPSC 1997 | |
7 | Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons: Parallel Input/Output with Heterogeneous Disks. SSDBM 1997: 79-90 | |
6 | Dik Lun Lee, Huei Chuang, Kent E. Seamons: Document Ranking and the Vector-Space Model. IEEE Software 14(2): 67-75 (1997) | |
1996 | ||
5 | Ying Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam: Scalable Message Passing in Panda. IOPADS 1996: 109-121 | |
4 | Kent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam: Persistent Array Access Using Server-Directed I/O. SSDBM 1996: 98-107 | |
1995 | ||
3 | Kent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett: Server-Directed Collective I/O in Panda. SC 1995 | |
1994 | ||
2 | Kent E. Seamons, Marianne Winslett: An efficient abstract interface for multidimensional array I/O. SC 1994: 650-659 | |
1 | Kent E. Seamons, Marianne Winslett: Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. SSDBM 1994: 218-227 |