University of Illinois at Urbana-Champaign
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
5 | EE | Lars E. Olson, Carl A. Gunter, P. Madhusudan: A formal framework for reflective database access control policies. ACM Conference on Computer and Communications Security 2008: 289-298 |
2007 | ||
4 | EE | Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 |
3 | EE | Lars E. Olson, Michael J. Rosulek, Marianne Winslett: Harvesting credentials in trust negotiation as an honest-but-curious adversary. WPES 2007: 64-67 |
2006 | ||
2 | EE | Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54 |
1 | EE | Lars E. Olson, Marianne Winslett, Gianluca Tonti, Nathan Seeley, Andrzej Uszok, Jeffrey M. Bradshaw: Trust Negotiation as an Authorization Service forWeb Services. ICDE Workshops 2006: 21 |
1 | Nikita Borisov | [4] |
2 | Jodie P. Boyer | [2] [4] |
3 | Jeffrey M. Bradshaw (Jeffrey Bradshaw) | [1] |
4 | Carl A. Gunter | [2] [4] [5] |
5 | Ragib Hasan | [4] |
6 | Adam J. Lee | [2] |
7 | P. Madhusudan (Parthasarathy Madhusudan) | [5] |
8 | David Raila | [4] |
9 | Mike Rosulek (Michael J. Rosulek) | [3] |
10 | Nathan Seeley | [1] |
11 | Gianluca Tonti | [1] |
12 | Andrzej Uszok | [1] |
13 | Marianne Winslett | [1] [3] |