0 | -- | 0 | Robert Tolksdorf, Christian Bizer, Rainer Eckstein, Ralf Heese. Trustable B2C markets on the semantic web |
0 | -- | 0 | Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati. A comparison of modeling strategies in defining XML-based access control languages |
0 | -- | 0 | Ling Feng, Willem Jonker. Preparations for encrypted XML metadata querying |
0 | -- | 0 | Ernesto Damiani. Special issue: Semantics-Aware Techniques for Security |
0 | -- | 0 | Frédéric Cuppens, Alexandre Miège. AdOrBAC: an administration model for Or-BAC |
0 | -- | 0 | Giles Hogben. The formation of software agreements between autonomous agents |
0 | -- | 0 | Paolo Ceravolo. Extracting role hierarchies from authentication data flows |
0 | -- | 0 | Naren Kodali, Csilla Farkas, Duminda Wijesekera. Specifying multimedia access control using RDF |
0 | -- | 0 | Farookh Khadeer Hussain, Elizabeth Chang, Tharam S. Dillon. Trustworthiness and CCCI metrics in P2P communication |
0 | -- | 0 | Ernesto Damiani. Semantics-aware techniques for security |