2009 |
40 | | Kent E. Seamons,
Neal McBurnett,
Tim Polk:
IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA
ACM 2009 |
2008 |
39 | | Kent E. Seamons,
Neal McBurnett,
Tim Polk:
IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA
ACM 2008 |
38 | EE | Ravi Chandra Jammalamadaka,
Roberto Gamboni,
Sharad Mehrotra,
Kent E. Seamons,
Nalini Venkatasubramanian:
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage.
EDBT 2008: 710-714 |
37 | EE | Ravi Chandra Jammalamadaka,
Roberto Gamboni,
Sharad Mehrotra,
Kent E. Seamons,
Nalini Venkatasubramanian:
iDataGuard: an interoperable security middleware for untrusted internet data storage.
Middleware (Companion) 2008: 36-41 |
36 | EE | Daniel D. Walker,
Eric G. Mercer,
Kent E. Seamons:
Or Best Offer: A Privacy Policy Negotiation Protocol.
POLICY 2008: 173-180 |
35 | EE | Andrew Harding,
Timothy W. van der Horst,
Kent E. Seamons:
Wireless authentication using remote passwords.
WISEC 2008: 24-29 |
34 | EE | Reed S. Abbott,
Timothy W. van der Horst,
Kent E. Seamons:
CPG: closed pseudonymous groups.
WPES 2008: 55-64 |
2007 |
33 | EE | Phillip L. Hellewell,
Kent E. Seamons:
Extensible Pre-authentication Kerberos.
ACSAC 2007: 201-210 |
32 | EE | Ravi Chandra Jammalamadaka,
Roberto Gamboni,
Sharad Mehrotra,
Kent E. Seamons,
Nalini Venkatasubramanian:
gVault: A Gmail Based Cryptographic Network File System.
DBSec 2007: 161-176 |
31 | EE | Timothy W. van der Horst,
Kent E. Seamons:
Simple authentication for the web.
WWW 2007: 1217-1218 |
30 | EE | Adam J. Lee,
Kent E. Seamons,
Marianne Winslett,
Ting Yu:
Automated Trust Negotiation in Open Systems.
Secure Data Management in Decentralized Systems 2007: 217-258 |
2006 |
29 | EE | Ravi Chandra Jammalamadaka,
Timothy W. van der Horst,
Sharad Mehrotra,
Kent E. Seamons,
Nalini Venkatasubramanian:
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine.
ACSAC 2006: 57-66 |
2005 |
28 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Noria Foukia,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control for grids.
GRID 2005: 55-62 |
27 | EE | Tatyana Ryutov,
Li Zhou,
B. Clifford Neuman,
Travis Leithead,
Kent E. Seamons:
Adaptive trust negotiation and access control.
SACMAT 2005: 139-146 |
2004 |
26 | EE | Robert W. Bradshaw,
Jason E. Holt,
Kent E. Seamons:
Concealing complex policies with hidden credentials.
ACM Conference on Computer and Communications Security 2004: 146-157 |
25 | EE | Rita Gavriloaie,
Wolfgang Nejdl,
Daniel Olmedilla,
Kent E. Seamons,
Marianne Winslett:
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web.
ESWS 2004: 342-356 |
24 | EE | Travis Leithead,
Wolfgang Nejdl,
Daniel Olmedilla,
Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Charles C. Zhang:
How to Exploit Ontologies for Trust Negotiation.
ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
23 | EE | Bryan Smith,
Kent E. Seamons,
Michael D. Jones:
Responding to Policies at Runtime in TrustBuilder.
POLICY 2004: 149-158 |
22 | EE | Adam Hess,
Jason E. Holt,
Jared Jacobson,
Kent E. Seamons:
Content-triggered trust negotiation.
ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004) |
2003 |
21 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Thomas Chan,
Evan Child,
Michael Halcrow,
Adam Hess,
Jason E. Holt,
Jared Jacobson,
Ryan Jarvis,
Bryan Smith,
Tore Sundelin,
Lina Yu:
Trust Negotiation in Dynamic Coalitions.
DISCEX (2) 2003: 240-245 |
20 | EE | Kent E. Seamons,
Thomas Chan,
Evan Child,
Michael Halcrow,
Adam Hess,
Jason E. Holt,
Jared Jacobson,
Ryan Jarvis,
Aaron Patty,
Bryan Smith,
Tore Sundelin,
Lina Yu:
TrustBuilder: Negotiating Trust in Dynamic Coalitions.
DISCEX (2) 2003: 49-51 |
19 | EE | Adam Hess,
Kent E. Seamons:
An access control model for dynamic client-side content.
SACMAT 2003: 207-216 |
18 | EE | Jason E. Holt,
Robert W. Bradshaw,
Kent E. Seamons,
Hilarie K. Orman:
Hidden Credentials.
WPES 2003: 1-8 |
17 | EE | Ting Yu,
Marianne Winslett,
Kent E. Seamons:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) |
2002 |
16 | EE | Adam Hess,
Jared Jacobson,
Hyrum Mills,
Ryan Wamsley,
Kent E. Seamons,
Bryan Smith:
Advanced Client/Server Authentication in TLS.
NDSS 2002 |
15 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Bryan Smith,
Evan Child,
Jared Jacobson,
Hyrum Mills,
Lina Yu:
Requirements for Policy Languages for Trust Negotiation.
POLICY 2002: 68-79 |
14 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu,
Lina Yu,
Ryan Jarvis:
Protecting Privacy during On-Line Trust Negotiation.
Privacy Enhancing Technologies 2002: 129-143 |
13 | EE | Marianne Winslett,
Ting Yu,
Kent E. Seamons,
Adam Hess,
Jared Jacobson,
Ryan Jarvis,
Bryan Smith,
Lina Yu:
Negotiating Trust on the Web.
IEEE Internet Computing 6(6): 30-37 (2002) |
2001 |
12 | EE | Ting Yu,
Marianne Winslett,
Kent E. Seamons:
Interoperable strategies in automated trust negotiation.
ACM Conference on Computer and Communications Security 2001: 146-155 |
11 | EE | Kent E. Seamons,
Marianne Winslett,
Ting Yu:
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
NDSS 2001 |
1997 |
10 | | Kent E. Seamons,
William H. Winsborough,
Marianne Winslett:
Internet Credential Acceptance Policies.
APPIA-GULP-PRODE 1997: 415-432 |
9 | EE | Yong Cho,
Marianne Winslett,
Mahesh Subramaniam,
Ying Chen,
Szu-Wen Kuo,
Kent E. Seamons:
Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations.
IOPADS 1997: 1-13 |
8 | | Szu-Wen Kuo,
Marianne Winslett,
Ying Chen,
Yong Cho,
Mahesh Subramaniam,
Kent E. Seamons:
Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2.
PPSC 1997 |
7 | EE | Szu-Wen Kuo,
Marianne Winslett,
Ying Chen,
Yong Cho,
Mahesh Subramaniam,
Kent E. Seamons:
Parallel Input/Output with Heterogeneous Disks.
SSDBM 1997: 79-90 |
6 | | Dik Lun Lee,
Huei Chuang,
Kent E. Seamons:
Document Ranking and the Vector-Space Model.
IEEE Software 14(2): 67-75 (1997) |
1996 |
5 | EE | Ying Chen,
Marianne Winslett,
Kent E. Seamons,
Szu-Wen Kuo,
Yong Cho,
Mahesh Subramaniam:
Scalable Message Passing in Panda.
IOPADS 1996: 109-121 |
4 | EE | Kent E. Seamons,
Ying Chen,
Marianne Winslett,
Yong Cho,
Szu-Wen Kuo,
Mahesh Subramaniam:
Persistent Array Access Using Server-Directed I/O.
SSDBM 1996: 98-107 |
1995 |
3 | EE | Kent E. Seamons,
Ying Chen,
P. Jones,
J. Jozwiak,
Marianne Winslett:
Server-Directed Collective I/O in Panda.
SC 1995 |
1994 |
2 | EE | Kent E. Seamons,
Marianne Winslett:
An efficient abstract interface for multidimensional array I/O.
SC 1994: 650-659 |
1 | EE | Kent E. Seamons,
Marianne Winslett:
Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications.
SSDBM 1994: 218-227 |