|
Search the dblp DataBase
Kent E. Seamons:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Kent E. Seamons, Marianne Winslett
Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. [Citation Graph (3, 0)][DBLP] SSDBM, 1994, pp:218-227 [Conf]
- Kent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam
Persistent Array Access Using Server-Directed I/O. [Citation Graph (2, 8)][DBLP] SSDBM, 1996, pp:98-107 [Conf]
- Ying Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam
Scalable Message Passing in Panda. [Citation Graph (1, 0)][DBLP] IOPADS, 1996, pp:109-121 [Conf]
- Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
Parallel Input/Output with Heterogeneous Disks. [Citation Graph (1, 13)][DBLP] SSDBM, 1997, pp:79-90 [Conf]
- Kent E. Seamons, William H. Winsborough, Marianne Winslett
Internet Credential Acceptance Policies. [Citation Graph (0, 0)][DBLP] APPIA-GULP-PRODE, 1997, pp:415-432 [Conf]
- Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons
Concealing complex policies with hidden credentials. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2004, pp:146-157 [Conf]
- Ting Yu, Marianne Winslett, Kent E. Seamons
Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf]
- Kent E. Seamons, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Aaron Patty, Bryan Smith, Tore Sundelin, Lina Yu
TrustBuilder: Negotiating Trust in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] DISCEX (2), 2003, pp:49-51 [Conf]
- Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu
Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP] DISCEX (2), 2003, pp:240-245 [Conf]
- Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett
No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. [Citation Graph (0, 0)][DBLP] ESWS, 2004, pp:342-356 [Conf]
- Yong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons
Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. [Citation Graph (0, 0)][DBLP] IOPADS, 1997, pp:1-13 [Conf]
- Kent E. Seamons, Marianne Winslett, Ting Yu
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP] NDSS, 2001, pp:- [Conf]
- Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsley, Kent E. Seamons, Bryan Smith
Advanced Client/Server Authentication in TLS. [Citation Graph (0, 0)][DBLP] NDSS, 2002, pp:- [Conf]
- Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP] Privacy Enhancing Technologies, 2002, pp:129-143 [Conf]
- Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu
Requirements for Policy Languages for Trust Negotiation. [Citation Graph (0, 0)][DBLP] POLICY, 2002, pp:68-79 [Conf]
- Bryan Smith, Kent E. Seamons, Michael D. Jones
Responding to Policies at Runtime in TrustBuilder. [Citation Graph (0, 0)][DBLP] POLICY, 2004, pp:149-158 [Conf]
- Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. [Citation Graph (0, 0)][DBLP] PPSC, 1997, pp:- [Conf]
- Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2005, pp:139-146 [Conf]
- Adam Hess, Kent E. Seamons
An access control model for dynamic client-side content. [Citation Graph (0, 0)][DBLP] SACMAT, 2003, pp:207-216 [Conf]
- Kent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett
Server-Directed Collective I/O in Panda. [Citation Graph (0, 0)][DBLP] SC, 1995, pp:- [Conf]
- Kent E. Seamons, Marianne Winslett
An efficient abstract interface for multidimensional array I/O. [Citation Graph (0, 0)][DBLP] SC, 1994, pp:650-659 [Conf]
- Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang
How to Exploit Ontologies for Trust Negotiation. [Citation Graph (0, 0)][DBLP] ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf]
- Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons, Hilarie K. Orman
Hidden Credentials. [Citation Graph (0, 0)][DBLP] WPES, 2003, pp:1-8 [Conf]
- Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu
Negotiating Trust on the Web. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2002, v:6, n:6, pp:30-37 [Journal]
- Dik Lun Lee, Huei Chuang, Kent E. Seamons
Document Ranking and the Vector-Space Model. [Citation Graph (0, 0)][DBLP] IEEE Software, 1997, v:14, n:2, pp:67-75 [Journal]
- Ting Yu, Marianne Winslett, Kent E. Seamons
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:1-42 [Journal]
- Adam Hess, Jason E. Holt, Jared Jacobson, Kent E. Seamons
Content-triggered trust negotiation. [Citation Graph (0, 0)][DBLP] ACM Trans. Inf. Syst. Secur., 2004, v:7, n:3, pp:428-456 [Journal]
- Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:57-66 [Conf]
- Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
gVault: A Gmail Based Cryptographic Network File System. [Citation Graph (0, 0)][DBLP] DBSec, 2007, pp:161-176 [Conf]
- Tatyana Ryutov, Li Zhou, Clifford Neuman, Noria Foukia, Travis Leithead, Kent E. Seamons
Adaptive trust negotiation and access control for grids. [Citation Graph (0, 0)][DBLP] GRID, 2005, pp:55-62 [Conf]
- Timothy W. van der Horst, Kent E. Seamons
Simple authentication for the web. [Citation Graph (0, 0)][DBLP] WWW, 2007, pp:1217-1218 [Conf]
Extensible Pre-authentication Kerberos. [Citation Graph (, )][DBLP]
pwdArmor: Protecting Conventional Password-Based Authentications. [Citation Graph (, )][DBLP]
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. [Citation Graph (, )][DBLP]
iDataGuard: an interoperable security middleware for untrusted internet data storage. [Citation Graph (, )][DBLP]
Or Best Offer: A Privacy Policy Negotiation Protocol. [Citation Graph (, )][DBLP]
CPG: closed pseudonymous groups. [Citation Graph (, )][DBLP]
Wireless authentication using remote passwords. [Citation Graph (, )][DBLP]
Search in 0.354secs, Finished in 0.356secs
|