Search the dblp DataBase
Jason E. Holt :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jason E. Holt Logcrypt: forward security and public verification for secure audit logs. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:203-211 [Conf ] Robert W. Bradshaw , Jason E. Holt , Kent E. Seamons Concealing complex policies with hidden credentials. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:146-157 [Conf ] Kent E. Seamons , Thomas Chan , Evan Child , Michael Halcrow , Adam Hess , Jason E. Holt , Jared Jacobson , Ryan Jarvis , Aaron Patty , Bryan Smith , Tore Sundelin , Lina Yu TrustBuilder: Negotiating Trust in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:49-51 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Thomas Chan , Evan Child , Michael Halcrow , Adam Hess , Jason E. Holt , Jared Jacobson , Ryan Jarvis , Bryan Smith , Tore Sundelin , Lina Yu Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:240-245 [Conf ] Jason E. Holt , Robert W. Bradshaw , Kent E. Seamons , Hilarie K. Orman Hidden Credentials. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:1-8 [Conf ] Ting Yu , Marianne Winslett , Jason E. Holt Two Security Symposia. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal ] Adam Hess , Jason E. Holt , Jared Jacobson , Kent E. Seamons Content-triggered trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:428-456 [Journal ] The One Page Model Checker [Citation Graph (, )][DBLP ] On the Job Training [Citation Graph (, )][DBLP ] Search in 0.000secs, Finished in 0.002secs