![]() |
University of Illinois at Urbana-Champaign
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
| 2008 | ||
|---|---|---|
| 5 | EE | Lars E. Olson, Carl A. Gunter, P. Madhusudan: A formal framework for reflective database access control policies. ACM Conference on Computer and Communications Security 2008: 289-298 |
| 2007 | ||
| 4 | EE | Jodie P. Boyer, Ragib Hasan, Lars E. Olson, Nikita Borisov, Carl A. Gunter, David Raila: Improving multi-tier security using redundant authentication. CSAW 2007: 54-62 |
| 3 | EE | Lars E. Olson, Michael J. Rosulek, Marianne Winslett: Harvesting credentials in trust negotiation as an honest-but-curious adversary. WPES 2007: 64-67 |
| 2006 | ||
| 2 | EE | Adam J. Lee, Jodie P. Boyer, Lars E. Olson, Carl A. Gunter: Defeasible security policy composition for web services. FMSE 2006: 45-54 |
| 1 | EE | Lars E. Olson, Marianne Winslett, Gianluca Tonti, Nathan Seeley, Andrzej Uszok, Jeffrey M. Bradshaw: Trust Negotiation as an Authorization Service forWeb Services. ICDE Workshops 2006: 21 |
| 1 | Nikita Borisov | [4] |
| 2 | Jodie P. Boyer | [2] [4] |
| 3 | Jeffrey M. Bradshaw (Jeffrey Bradshaw) | [1] |
| 4 | Carl A. Gunter | [2] [4] [5] |
| 5 | Ragib Hasan | [4] |
| 6 | Adam J. Lee | [2] |
| 7 | P. Madhusudan (Parthasarathy Madhusudan) | [5] |
| 8 | David Raila | [4] |
| 9 | Mike Rosulek (Michael J. Rosulek) | [3] |
| 10 | Nathan Seeley | [1] |
| 11 | Gianluca Tonti | [1] |
| 12 | Andrzej Uszok | [1] |
| 13 | Marianne Winslett | [1] [3] |