The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kent E. Seamons: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kent E. Seamons, Marianne Winslett
    Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. [Citation Graph (3, 0)][DBLP]
    SSDBM, 1994, pp:218-227 [Conf]
  2. Kent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam
    Persistent Array Access Using Server-Directed I/O. [Citation Graph (2, 8)][DBLP]
    SSDBM, 1996, pp:98-107 [Conf]
  3. Ying Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam
    Scalable Message Passing in Panda. [Citation Graph (1, 0)][DBLP]
    IOPADS, 1996, pp:109-121 [Conf]
  4. Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
    Parallel Input/Output with Heterogeneous Disks. [Citation Graph (1, 13)][DBLP]
    SSDBM, 1997, pp:79-90 [Conf]
  5. Kent E. Seamons, William H. Winsborough, Marianne Winslett
    Internet Credential Acceptance Policies. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1997, pp:415-432 [Conf]
  6. Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
    Concealing complex policies with hidden credentials. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:146-157 [Conf]
  7. Ting Yu, Marianne Winslett, Kent E. Seamons
    Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf]
  8. Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu
    TrustBuilder: Negotiating Trust in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:49-51 [Conf]
  9. Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu
    Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:240-245 [Conf]
  10. Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett
    No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ESWS, 2004, pp:342-356 [Conf]
  11. Yong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons
    Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. [Citation Graph (0, 0)][DBLP]
    IOPADS, 1997, pp:1-13 [Conf]
  12. Kent E. Seamons, Marianne Winslett, Ting Yu
    Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  13. Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith
    Advanced Client/Server Authentication in TLS. [Citation Graph (0, 0)][DBLP]
    NDSS, 2002, pp:- [Conf]
  14. Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
    Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:129-143 [Conf]
  15. Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu
    Requirements for Policy Languages for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:68-79 [Conf]
  16. Bryan Smith, Kent E. Seamons, Michael D. Jones
    Responding to Policies at Runtime in TrustBuilder. [Citation Graph (0, 0)][DBLP]
    POLICY, 2004, pp:149-158 [Conf]
  17. Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
    Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. [Citation Graph (0, 0)][DBLP]
    PPSC, 1997, pp:- [Conf]
  18. Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:139-146 [Conf]
  19. Adam Hess, Kent E. Seamons
    An access control model for dynamic client-side content. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:207-216 [Conf]
  20. Kent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett
    Server-Directed Collective I/O in Panda. [Citation Graph (0, 0)][DBLP]
    SC, 1995, pp:- [Conf]
  21. Kent E. Seamons, Marianne Winslett
    An efficient abstract interface for multidimensional array I/O. [Citation Graph (0, 0)][DBLP]
    SC, 1994, pp:650-659 [Conf]
  22. Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang
    How to Exploit Ontologies for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf]
  23. Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman
    Hidden Credentials. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:1-8 [Conf]
  24. Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu
    Negotiating Trust on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:6, pp:30-37 [Journal]
  25. Dik Lun Lee, Huei Chuang, Kent E. Seamons
    Document Ranking and the Vector-Space Model. [Citation Graph (0, 0)][DBLP]
    IEEE Software, 1997, v:14, n:2, pp:67-75 [Journal]
  26. Ting Yu, Marianne Winslett, Kent E. Seamons
    Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:1-42 [Journal]
  27. Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons
    Content-triggered trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:428-456 [Journal]
  28. Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
    Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:57-66 [Conf]
  29. Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
    gVault: A Gmail Based Cryptographic Network File System. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:161-176 [Conf]
  30. Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP]
    GRID, 2005, pp:55-62 [Conf]
  31. Timothy W. van der Horst, Kent E. Seamons
    Simple authentication for the web. [Citation Graph (0, 0)][DBLP]
    WWW, 2007, pp:1217-1218 [Conf]

  32. Extensible Pre-authentication Kerberos. [Citation Graph (, )][DBLP]


  33. pwdArmor: Protecting Conventional Password-Based Authentications. [Citation Graph (, )][DBLP]


  34. iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. [Citation Graph (, )][DBLP]


  35. iDataGuard: an interoperable security middleware for untrusted internet data storage. [Citation Graph (, )][DBLP]


  36. Or Best Offer: A Privacy Policy Negotiation Protocol. [Citation Graph (, )][DBLP]


  37. CPG: closed pseudonymous groups. [Citation Graph (, )][DBLP]


  38. Wireless authentication using remote passwords. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002