dblp.uni-trier.dewww.uni-trier.de

Kent E. Seamons

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
40 Kent E. Seamons, Neal McBurnett, Tim Polk: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA ACM 2009
2008
39 Kent E. Seamons, Neal McBurnett, Tim Polk: IDtrust 2008, Proceedings of the 7th Symposium on Identity and Trust on the Internet, March 4-6, 2008, Gaithersburg, Maryland, USA ACM 2008
38EERavi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. EDBT 2008: 710-714
37EERavi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: iDataGuard: an interoperable security middleware for untrusted internet data storage. Middleware (Companion) 2008: 36-41
36EEDaniel D. Walker, Eric G. Mercer, Kent E. Seamons: Or Best Offer: A Privacy Policy Negotiation Protocol. POLICY 2008: 173-180
35EEAndrew Harding, Timothy W. van der Horst, Kent E. Seamons: Wireless authentication using remote passwords. WISEC 2008: 24-29
34EEReed S. Abbott, Timothy W. van der Horst, Kent E. Seamons: CPG: closed pseudonymous groups. WPES 2008: 55-64
2007
33EEPhillip L. Hellewell, Kent E. Seamons: Extensible Pre-authentication Kerberos. ACSAC 2007: 201-210
32EERavi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: gVault: A Gmail Based Cryptographic Network File System. DBSec 2007: 161-176
31EETimothy W. van der Horst, Kent E. Seamons: Simple authentication for the web. WWW 2007: 1217-1218
30EEAdam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258
2006
29EERavi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian: Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ACSAC 2006: 57-66
2005
28EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control for grids. GRID 2005: 55-62
27EETatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons: Adaptive trust negotiation and access control. SACMAT 2005: 139-146
2004
26EERobert W. Bradshaw, Jason E. Holt, Kent E. Seamons: Concealing complex policies with hidden credentials. ACM Conference on Computer and Communications Security 2004: 146-157
25EERita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett: No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. ESWS 2004: 342-356
24EETravis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004
23EEBryan Smith, Kent E. Seamons, Michael D. Jones: Responding to Policies at Runtime in TrustBuilder. POLICY 2004: 149-158
22EEAdam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons: Content-triggered trust negotiation. ACM Trans. Inf. Syst. Secur. 7(3): 428-456 (2004)
2003
21EEKent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245
20EEKent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu: TrustBuilder: Negotiating Trust in Dynamic Coalitions. DISCEX (2) 2003: 49-51
19EEAdam Hess, Kent E. Seamons: An access control model for dynamic client-side content. SACMAT 2003: 207-216
18EEJason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman: Hidden Credentials. WPES 2003: 1-8
17EETing Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003)
2002
16EEAdam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith: Advanced Client/Server Authentication in TLS. NDSS 2002
15EEKent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79
14EEKent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143
13EEMarianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002)
2001
12EETing Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155
11EEKent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001
1997
10 Kent E. Seamons, William H. Winsborough, Marianne Winslett: Internet Credential Acceptance Policies. APPIA-GULP-PRODE 1997: 415-432
9EEYong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons: Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. IOPADS 1997: 1-13
8 Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons: Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. PPSC 1997
7EESzu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons: Parallel Input/Output with Heterogeneous Disks. SSDBM 1997: 79-90
6 Dik Lun Lee, Huei Chuang, Kent E. Seamons: Document Ranking and the Vector-Space Model. IEEE Software 14(2): 67-75 (1997)
1996
5EEYing Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam: Scalable Message Passing in Panda. IOPADS 1996: 109-121
4EEKent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam: Persistent Array Access Using Server-Directed I/O. SSDBM 1996: 98-107
1995
3EEKent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett: Server-Directed Collective I/O in Panda. SC 1995
1994
2EEKent E. Seamons, Marianne Winslett: An efficient abstract interface for multidimensional array I/O. SC 1994: 650-659
1EEKent E. Seamons, Marianne Winslett: Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. SSDBM 1994: 218-227

Coauthor Index

1Reed S. Abbott [34]
2Robert W. Bradshaw [18] [26]
3Thomas Chan [20] [21]
4Ying Chen [3] [4] [5] [7] [8] [9]
5Evan Child [15] [20] [21]
6Yong Cho [4] [5] [7] [8] [9]
7Huei Chuang [6]
8Noria Foukia [28]
9Roberto Gamboni [32] [37] [38]
10Rita Gavriloaie [25]
11Michael Halcrow [20] [21]
12Andrew Harding [35]
13Phillip L. Hellewell [33]
14Adam Hess [13] [16] [19] [20] [21] [22]
15Jason E. Holt [18] [20] [21] [22] [26]
16Timothy W. van der Horst [29] [31] [34] [35]
17Jared Jacobson [13] [15] [16] [20] [21] [22]
18Ravi Chandra Jammalamadaka [29] [32] [37] [38]
19Ryan Jarvis [13] [14] [20] [21]
20Michael D. Jones [23]
21P. Jones [3]
22J. Jozwiak [3]
23Szu-Wen Kuo [4] [5] [7] [8] [9]
24Adam J. Lee [30]
25Dik Lun Lee [6]
26Travis Leithead [24] [27] [28]
27Neal McBurnett [39] [40]
28Sharad Mehrotra [29] [32] [37] [38]
29Eric Mercer (Eric G. Mercer) [36]
30Hyrum Mills [15] [16]
31Wolfgang Nejdl [24] [25]
32B. Clifford Neuman [27] [28]
33Daniel Olmedilla [24] [25]
34Hilarie K. Orman [18]
35Aaron Patty [20]
36Tim Polk [39] [40]
37Tatyana Ryutov [27] [28]
38Bryan Smith [13] [15] [16] [20] [21] [23]
39Mahesh Subramaniam [4] [5] [7] [8] [9]
40Tore Sundelin [20] [21]
41Nalini Venkatasubramanian [29] [32] [37] [38]
42Daniel D. Walker [36]
43Ryan Wamsley [16]
44William H. Winsborough [10]
45Marianne Winslett [1] [2] [3] [4] [5] [7] [8] [9] [10] [11] [12] [13] [14] [15] [17] [21] [24] [25] [30]
46Lina Yu [13] [14] [15] [20] [21]
47Ting Yu [11] [12] [13] [14] [15] [17] [21] [24] [30]
48Charles C. Zhang [24]
49Li Zhou [27] [28]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)