dblp.uni-trier.dewww.uni-trier.de

Jason E. Holt

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2006
9EEJason E. Holt: Logcrypt: forward security and public verification for secure audit logs. ACSW Frontiers 2006: 203-211
2005
8EEJason E. Holt: The One Page Model Checker CoRR abs/cs/0506084: (2005)
7EEJason E. Holt: On the Job Training CoRR abs/cs/0506085: (2005)
2004
6EERobert W. Bradshaw, Jason E. Holt, Kent E. Seamons: Concealing complex policies with hidden credentials. ACM Conference on Computer and Communications Security 2004: 146-157
5EEAdam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004)
2003
4EEKent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245
3EEKent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu: TrustBuilder: Negotiating Trust in Dynamic Coalitions. DISCEX (2) 2003: 49-51
2EEJason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman: Hidden Credentials. WPES 2003: 1-8
1EETing Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003)

Coauthor Index

1Robert W. Bradshaw [2] [6]
2Thomas Chan [3] [4]
3Evan Child [3] [4]
4Michael Halcrow [3] [4]
5Adam Hess [3] [4] [5]
6Jared Jacobson [3] [4] [5]
7Ryan Jarvis [3] [4]
8Hilarie K. Orman [2]
9Aaron Patty [3]
10Kent E. Seamons [2] [3] [4] [5] [6]
11Bryan Smith [3] [4]
12Tore Sundelin [3] [4]
13Marianne Winslett [1] [4]
14Lina Yu [3] [4]
15Ting Yu [1] [4]

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)