Search the dblp DataBase
Vijay Varadharajan :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Claudio Calvelli , Vijay Varadharajan Authentication and Revocation in SPM (Extended Abstract). [Citation Graph (1, 0)][DBLP ] Operating Systems Review, 1993, v:27, n:4, pp:42-57 [Journal ] Ching Lin , Vijay Varadharajan Trust Based Risk Management for Distributed System Security - A New Approach. [Citation Graph (0, 0)][DBLP ] ARES, 2006, pp:6-13 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang , Vineet Pruthi Enhancing Grid Security with Trust Management. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2004, pp:303-310 [Conf ] Yan Wang , Vijay Varadharajan Trust2: Developing Trust in Peer-to-Peer Environments. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2005, pp:24-34 [Conf ] Michael Hitchens , Rajan Shankaran , Vijay Varadharajan Securing the Ad-Hoc On-demand Distance Vector Protocol. [Citation Graph (0, 0)][DBLP ] ISCA PDCS, 2004, pp:353-360 [Conf ] Yun Bai , Vijay Varadharajan Analysis and Implementation of a Formal Authorisation Policy Design Approach. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:14-25 [Conf ] Yun Bai , Vijay Varadharajan A High Level Language for Conventional Access Control Models. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:273-283 [Conf ] Yun Bai , Vijay Varadharajan Authorization in Object Oriented Databases. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:270-280 [Conf ] Michael Hitchens , Vijay Varadharajan , Gregory Saunders Policy Administration Domains. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:286-302 [Conf ] Yi Mu , Vijay Varadharajan Fail-Stop Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:368-377 [Conf ] Yi Mu , Vijay Varadharajan On the design of security protocols for mobile communications. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:134-145 [Conf ] Yi Mu , Vijay Varadharajan , Yan-Xia Lin New Micropayment Schemes Based on PayWords. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:283-293 [Conf ] Yi Mu , Junqi Zhang , Vijay Varadharajan m out of n Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:395-405 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Divertible Zero-Knowledge Proof of Polynominal Relations and Blind Group Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:117-128 [Conf ] Chun Ruan , Vijay Varadharajan Resolving Conflicts in Authorization Delegations. [Citation Graph (0, 0)][DBLP ] ACISP, 2002, pp:271-285 [Conf ] Chun Ruan , Vijay Varadharajan A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:402-413 [Conf ] Gregory Saunders , Michael Hitchens , Vijay Varadharajan An Analysis of Access Control Models. [Citation Graph (0, 0)][DBLP ] ACISP, 1999, pp:281-293 [Conf ] Vijay Varadharajan , Phillip Allen Support for joint action based security policies. [Citation Graph (0, 0)][DBLP ] ACISP, 1996, pp:207-218 [Conf ] Vijay Varadharajan , Rajan Shankaran , Michael Hitchens Security Issues in Asynchronous Transfer Mode. [Citation Graph (0, 0)][DBLP ] ACISP, 1997, pp:76-89 [Conf ] Vlad Ingar Wietrzyk , Makoto Takizawa , Vijay Varadharajan A Strategy for MLS Workflow. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:159-175 [Conf ] Chun Ruan , Vijay Varadharajan An Authorization Model for E-consent Requirement in a Health Care Application. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:191-205 [Conf ] Ching Lin , Vijay Varadharajan Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:176-190 [Conf ] Yi Mu , Vijay Varadharajan Anonymous Secure E-Voting Over a Network. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:293-299 [Conf ] Michael Hitchens , Vijay Varadharajan esign Choices For Symmetric Key Based Inter-Domain Authentication Protocols In Distributed Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:105-116 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Micro-Digital Money for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:2-8 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Secure and Efficient Digital Coins. [Citation Graph (0, 0)][DBLP ] ACSAC, 1997, pp:9-15 [Conf ] Rajan Shankaran , Vijay Varadharajan Secure Signaling and Access Control for ATM Networks. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:212-222 [Conf ] Vijay Varadharajan , C. Crall , Joe Pato Authorization in Enterprise-Wide Distributed System: A Practical Design and Application. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:178-189 [Conf ] Vijay Varadharajan , Yi Mu On The Design Of Secure Electronic Payment Schemes For Internet. [Citation Graph (0, 0)][DBLP ] ACSAC, 1996, pp:78-87 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu Fair On-line Gambling. [Citation Graph (0, 0)][DBLP ] ACSAC, 2000, pp:394-400 [Conf ] Udaya Kiran Tupakula , Vijay Varadharajan A Practical Method to Counteract Denial of Service Attacks. [Citation Graph (0, 0)][DBLP ] ACSC, 2003, pp:275-284 [Conf ] Yan Zhang , Vijay Varadharajan A Logic for Modeling the Dynamics of Beliefs in Cryptographic Protocols. [Citation Graph (0, 0)][DBLP ] ACSC, 2001, pp:215-222 [Conf ] Weiliang Zhao , Vijay Varadharajan , Yi Mu A Secure Mental Poker Protocol Over The Internet. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2003, pp:105-109 [Conf ] Udaya Kiran Tupakula , Vijay Varadharajan Analysis of traceback techniques. [Citation Graph (0, 0)][DBLP ] ACSW Frontiers, 2006, pp:115-124 [Conf ] Vlad Ingar Wietrzyk , Mehmet A. Orgun , Vijay Varadharajan On the Analysis of On-Line Database Reorganization. [Citation Graph (0, 0)][DBLP ] ADBIS-DASFAA, 2000, pp:293-306 [Conf ] Yi Mu , Vijay Varadharajan Towards a Protection Model for Supporting Multiple Access Control Policies. [Citation Graph (0, 0)][DBLP ] Australasian Database Conference, 2000, pp:107-114 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Scalable Multi-service Group Key Management Scheme. [Citation Graph (0, 0)][DBLP ] AICT/ICIW, 2006, pp:172- [Conf ] Venkatesan Balakrishnan , Vijay Varadharajan Designing Secure Wireless Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] AINA, 2005, pp:5-8 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu Securing XML Document Sources and Their Distribution. [Citation Graph (0, 0)][DBLP ] AINA (1), 2004, pp:562-567 [Conf ] Venkatesan Balakrishnan , Vijay Varadharajan , Phillip Lucs , Udaya Kiran Tupakula Trust Enhanced Secure Mobile Ad-Hoc Network Routing. [Citation Graph (0, 0)][DBLP ] AINA Workshops (2), 2007, pp:27-33 [Conf ] Tri Van Le , Khanh Quoc Nguyen , Vijay Varadharajan How to Prove That a Committed Number Is Prime. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:208-218 [Conf ] Vijay Varadharajan Network Security Policy Models. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:74-95 [Conf ] Vijay Varadharajan Security enhanced mobile agents. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:200-209 [Conf ] Vijay Varadharajan Trapdoor Rings and Their Use in Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:369-395 [Conf ] Yun Bai , Vijay Varadharajan A Logic For State Transformations in Authorization Policies. [Citation Graph (0, 0)][DBLP ] CSFW, 1997, pp:173-182 [Conf ] Claudio Calvelli , Vijay Varadharajan An Analysis of some Delegation Protocols for Distributed Systems. [Citation Graph (0, 0)][DBLP ] CSFW, 1992, pp:92-110 [Conf ] Vijay Varadharajan Petri Net Based Modelling of Information Flow Security Requirements. [Citation Graph (0, 0)][DBLP ] CSFW, 1990, pp:51-61 [Conf ] Vijay Varadharajan Hook-Up Property of Information Flow Secure Nets. [Citation Graph (0, 0)][DBLP ] CSFW, 1991, pp:154-175 [Conf ] Chun Ruan , Vijay Varadharajan , Yan Zhang Delegatable Authorization Program and Its Application. [Citation Graph (0, 0)][DBLP ] Security and Management, 2003, pp:267-273 [Conf ] Yun Bai , Vijay Varadharajan A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. [Citation Graph (0, 0)][DBLP ] DBSec, 1999, pp:317-330 [Conf ] Sarath Indrakanti , Vijay Varadharajan An Authorization Architecture for Web Services. [Citation Graph (0, 0)][DBLP ] DBSec, 2005, pp:222-236 [Conf ] Sarath Indrakanti , Vijay Varadharajan , Michael Hitchens , Rajat Kumar Todi Secure Authorisation for Web Services. [Citation Graph (0, 0)][DBLP ] DBSec, 2003, pp:163-175 [Conf ] Chun Ruan , Vijay Varadharajan Decentralized Temporal Authorization Administration. [Citation Graph (0, 0)][DBLP ] DEXA, 2003, pp:917-926 [Conf ] Chun Ruan , Vijay Varadharajan Implementing Authorization Delegations Using Graph. [Citation Graph (0, 0)][DBLP ] DEXA, 2006, pp:904-913 [Conf ] Feng Bao , Robert H. Deng , Khanh Quoc Nguyen , Vijay Varadharajan Multi-Party Fair Exchange with an Off-Line Trusted Neutral Party. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:858-863 [Conf ] Khanh Quoc Nguyen , Vijay Varadharajan , Yi Mu Batching Proofs of Knowledge and Its Applications. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1999, pp:844-849 [Conf ] Yan Wang , Vijay Varadharajan Interaction Trust Evaluation in Decentralized Environments. [Citation Graph (0, 0)][DBLP ] EC-Web, 2004, pp:144-153 [Conf ] Yan Wang , Vijay Varadharajan Two-Phase Peer Evaluation in P2P E-Commerce Environments. [Citation Graph (0, 0)][DBLP ] EEE, 2005, pp:654-657 [Conf ] Huu Tran , Michael Hitchens , Vijay Varadharajan , Paul Andrew Watters A Trust based Access Control Framework for P2P File-Sharing Systems. [Citation Graph (0, 0)][DBLP ] HICSS, 2005, pp:- [Conf ] Sarath Indrakanti , Vijay Varadharajan , Rajat Kumar Todi Authorisation Service in .Net My Services. [Citation Graph (0, 0)][DBLP ] ICWI, 2003, pp:1115-1118 [Conf ] Yan Wang , Vijay Varadharajan A Mobile Autonomous Agent-based Secure Payment Protocol Supporting Multiple Payments. [Citation Graph (0, 0)][DBLP ] IAT, 2005, pp:88-94 [Conf ] Hongxue Wang , Vijay Varadharajan , Yan Zhang Towards a Generic Logic for Analysing Network Protocols. [Citation Graph (0, 0)][DBLP ] ICDCS Workshop on Internet, 2000, pp:0-0 [Conf ] Pascal Molli , Hala Skaf-Molli , Claude Godart , Pradeep Ray , Rajan Shankaran , Vijay Varadharajan Integrating Network Services for Virtual Teams. [Citation Graph (0, 0)][DBLP ] ICEIS (2), 2001, pp:1034-1039 [Conf ] Weiliang Zhao , Vijay Varadharajan , George Bryan Type and Scope of Trust Relationships in Collaborative Interactions in Distributed Environments. [Citation Graph (0, 0)][DBLP ] ICEIS (3), 2005, pp:331-336 [Conf ] Yun Bai , Vijay Varadharajan A language for specifying sequences of authorization transformations and its applications. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:39-49 [Conf ] Michael Hitchens , Vijay Varadharajan RBAC for XML Document Stores. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:131-143 [Conf ] Michael Hitchens , Vijay Varadharajan Issues in the Design of a Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:22-38 [Conf ] Chuan-Kun Wu , Vijay Varadharajan Fair Exchange of Digital Signatures with Offline Trusted Third Party. [Citation Graph (0, 0)][DBLP ] ICICS, 2001, pp:466-470 [Conf ] Gregory Saunders , Michael Hitchens , Vijay Varadharajan Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:145-157 [Conf ] Khanh Quoc Nguyen , Feng Bao , Yi Mu , Vijay Varadharajan Zero-Knowledge Proofs of Possession of Digital Signatures and Its Applications. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:103-118 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Secure Object Sharing Scheme for Java Card. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:243-251 [Conf ] Yi Mu , Vijay Varadharajan An Internet Anonymous Auction Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:171-182 [Conf ] Weiliang Zhao , Vijay Varadharajan , George Bryan Analysis and Modelling of Trust in Distributed Information Systems. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:106-119 [Conf ] Vijay Varadharajan Authorization and Trust Enhanced Security for Distributed Applications. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:1-20 [Conf ] Zaobin Gan , Ching Lin , Vijay Varadharajan A Middleware-Based Script Language. [Citation Graph (0, 0)][DBLP ] ICMB, 2005, pp:690-693 [Conf ] Rajan Shankaran , Vijay Varadharajan , Michael Hitchens A Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP ] ICPADS, 2001, pp:297-304 [Conf ] Vlad Ingar Wietrzyk , Makoto Takizawa , Mehmet A. Orgun , Vijay Varadharajan A Secure Transaction Environment for Workflows in Distributed Systems. [Citation Graph (0, 0)][DBLP ] ICPADS, 2001, pp:198-208 [Conf ] Chuan-Kun Wu , Vijay Varadharajan Modified Chinese Remainder Theorem and Its Application to Proxy Signatures. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:146-0 [Conf ] Yuko Murayama , Vijay Varadharajan Message from the IWSEC Workshop Co-Chairs. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 1999, pp:132-0 [Conf ] Sarath Indrakanti , Vijay Varadharajan , Michael Hitchens Authorization Service for Web Services and its Implementation. [Citation Graph (0, 0)][DBLP ] ICWS, 2004, pp:774-777 [Conf ] Vijay Varadharajan , Yi Mu Design of Secure End-toEnd Protocols for Mobile Systems. [Citation Graph (0, 0)][DBLP ] IFIP World Conference on Mobile Communications, 1996, pp:258-266 [Conf ] Chun Ruan , Vijay Varadharajan , Yan Zhang Evaluation of Authorization with Delegation and Negation. [Citation Graph (0, 0)][DBLP ] IIS, 2003, pp:547-551 [Conf ] Udaya Kiran Tupakula , Vijay Varadharajan A Controller Agent Model to Counteract DoS Attacks in Multiple Domains. [Citation Graph (0, 0)][DBLP ] Integrated Network Management, 2003, pp:113-116 [Conf ] Yi Mu , Vijay Varadharajan , Khanh Quoc Nguyen Delegated Decryption. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 1999, pp:258-269 [Conf ] Yi Mu , Vijay Varadharajan Distributed Signcryption. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2000, pp:155-164 [Conf ] Yi Mu , Vijay Varadharajan Robust and Secure Broadcasting. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:223-231 [Conf ] Vijay Varadharajan A Multilevel Security Policy for Networks. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1990, pp:710-718 [Conf ] Khanh Quoc Nguyen , Vijay Varadharajan , Yi Mu A New Efficient Off-line Anonymous Cash Scheme. [Citation Graph (0, 0)][DBLP ] ISAAC, 1997, pp:193-201 [Conf ] Yi Mu , Khanh Quoc Nguyen , Vijay Varadharajan A Fair Electronic Cash Scheme. [Citation Graph (0, 0)][DBLP ] ISEC, 2001, pp:20-32 [Conf ] Chun Ruan , Vijay Varadharajan Integration of Graph Based Authorization Policies. [Citation Graph (0, 0)][DBLP ] ISMIS, 2006, pp:359-368 [Conf ] Chun Ruan , Vijay Varadharajan , Yan Zhang Logic-Based Reasoning on Delegatable Authorizations. [Citation Graph (0, 0)][DBLP ] ISMIS, 2002, pp:185-193 [Conf ] Chun Ruan , Vijay Varadharajan Supporting E-consent on Health Data by Logic. [Citation Graph (0, 0)][DBLP ] ISMIS, 2003, pp:392-396 [Conf ] Chun Ruan , Vijay Varadharajan Data Protection in Distributed Database Systems. [Citation Graph (0, 0)][DBLP ] ISMIS, 2005, pp:191-199 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:313-320 [Conf ] Khanh Quoc Nguyen , Yi Mu , Vijay Varadharajan Undeniable Confirmer Signature. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:235-246 [Conf ] Chun Ruan , Vijay Varadharajan , Yan Zhang A Logic Model for Temporal Authorization Delegation with Negation. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:310-324 [Conf ] Sarath Indrakanti , Vijay Varadharajan , Michael Hitchens Analysis of Existing Authorization Models and Requirements for Design of Authorization Framework for the Service Oriented Architecture. [Citation Graph (0, 0)][DBLP ] ISWS, 2005, pp:35-44 [Conf ] Weiliang Zhao , Vijay Varadharajan Efficient TTP-Free Mental Poker Protocols. [Citation Graph (0, 0)][DBLP ] ITCC (1), 2005, pp:745-750 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu A Secure PIM-SM Multicast Routing Protocol. [Citation Graph (0, 0)][DBLP ] IWDC, 2004, pp:276-288 [Conf ] Yi Mu , Vijay Varadharajan A New Scheme of Credit based Payment for Electronic Commerce. [Citation Graph (0, 0)][DBLP ] LCN, 1998, pp:278-0 [Conf ] Rajan Shankaran , Vijay Varadharajan , Michael Hitchens Secure Distributed Location Management Scheme for Mobile Hosts. [Citation Graph (0, 0)][DBLP ] LCN, 2001, pp:296-323 [Conf ] Rajan Shankaran , Vijay Varadharajan , Michael Hitchens Secure Multicast Extensions for Mobile Networks. [Citation Graph (0, 0)][DBLP ] LCN, 1999, pp:106-116 [Conf ] Vijay Varadharajan Security in High-Speed Networks. [Citation Graph (0, 0)][DBLP ] LCN, 1996, pp:2-11 [Conf ] Vijay Varadharajan , Rajan Shankaran , Michael Hitchens Security services and public key infrastructure for ATM networks. [Citation Graph (0, 0)][DBLP ] LCN, 1997, pp:253-263 [Conf ] Vijay Varadharajan Secure Networked Computing. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2001, pp:27- [Conf ] Michael Hitchens , Vijay Varadharajan , Gregory Saunders Security Policy Management in Distributed Systems. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2002, pp:290-294 [Conf ] Rajan Shankaran , Vijay Varadharajan , Michael Hitchens Secure Multicast Support for Mobile IP with Hierarchical Registration Approach. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2002, pp:851-856 [Conf ] Michael Hitchens , Vijay Varadharajan Tower: A Language for Role Based Access Control. [Citation Graph (0, 0)][DBLP ] POLICY, 2001, pp:88-106 [Conf ] Hongxue Wang , Vijay Varadharajan , Yan Zhang A Secure Communication Scheme for Multiagent Systems. [Citation Graph (0, 0)][DBLP ] PRIMA, 1998, pp:174-185 [Conf ] Yun Bai , Vijay Varadharajan On Formal Languages for Sequences of Authorization Transformations. [Citation Graph (0, 0)][DBLP ] SAFECOMP, 1999, pp:375-384 [Conf ] Michael Hitchens , Vijay Varadharajan Elements of a Language for Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] SEC, 2000, pp:371-380 [Conf ] Vijay Varadharajan , Thomas Hardjono Security model for distributed object framework and its applicability to CORBA. [Citation Graph (0, 0)][DBLP ] SEC, 1996, pp:452-463 [Conf ] Zaobin Gan , Vijay Varadharajan Design and Implementation of a Practical Secure Distributed Healthcare Application. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:431-436 [Conf ] Zaobin Gan , Dengwei Wei , Vijay Varadharajan Improving Software Security Through an Integrated Approach. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:437-442 [Conf ] Weiliang Zhao , Vijay Varadharajan , George Bryan Fair Trading Protocol With Off-line Anonymous Credit Card Payment. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:186-195 [Conf ] Vijay Varadharajan , Phillip Allen , Stewart Black An Analysis of the Proxy Problem in Distributed Systems. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1991, pp:255-277 [Conf ] Weiliang Zhao , Vijay Varadharajan , George Bryan Modelling Trust Relationships in Distributed Environments. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:40-49 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang Maximizing Utility of Mobile Agent Based E-Commerce Applications with Trust Enhanced Security. [Citation Graph (0, 0)][DBLP ] TrustBus, 2005, pp:151-160 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang , Yi Mu On the Design of a New Trust Model for Mobile Agent Security. [Citation Graph (0, 0)][DBLP ] TrustBus, 2004, pp:60-69 [Conf ] Ching Lin , Vijay Varadharajan , Yan Wang , Vineet Pruthi Trust Enhanced Security for Mobile Agents. [Citation Graph (0, 0)][DBLP ] CEC, 2005, pp:231-238 [Conf ] Vijay Varadharajan Design of enterprise-wide secure networked system. [Citation Graph (0, 0)][DBLP ] WETICE, 1996, pp:100-105 [Conf ] Yan Wang , Vijay Varadharajan A Time-Based Peer Trust Evaluation in P2P E-commerce Environments. [Citation Graph (0, 0)][DBLP ] WISE, 2004, pp:730-735 [Conf ] Vijay Varadharajan Trustworthy Computing (Extended Abstract). [Citation Graph (0, 0)][DBLP ] WISE, 2004, pp:13-16 [Conf ] Junqi Zhang , Vijay Varadharajan , Yi Mu ID-based Secure PIM-SM Schemes. [Citation Graph (0, 0)][DBLP ] Wireless and Optical Communications, 2006, pp:190-195 [Conf ] Sarath Indrakanti , Vijay Varadharajan , Michael Hitchens Architectural Framework for Web Services Authorization. [Citation Graph (0, 0)][DBLP ] WSMDEIS, 2005, pp:75-84 [Conf ] Zaobin Gan , Deng-Wen Wei , Vijay Varadharajan Evaluating the Performance and Scalability of Web Application Systems. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:111-114 [Conf ] D. Foster , Vijay Varadharajan Security and Trust Enhanced Mobile Agent Based System Design. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:155-160 [Conf ] Zaobin Gan , Deng-Wen Wei , Jin-Long Zhang , Vijay Varadharajan Business-Process-Oriented Software Requirements Automatic Generator. [Citation Graph (0, 0)][DBLP ] ICITA (1), 2005, pp:95-98 [Conf ] Hongxue Wang , Vijay Varadharajan , John K. Slaney Towards Perfect Objects. [Citation Graph (0, 0)][DBLP ] TOOLS (32), 1999, pp:115-126 [Conf ] Panos Katsavos , Vijay Varadharajan A Secure Frame Relay Service. [Citation Graph (0, 0)][DBLP ] Computer Networks and ISDN Systems, 1994, v:26, n:12, pp:1539-1558 [Journal ] Vijay Varadharajan , Claudio Calvelli Key management for a secure LAN-SMDS network. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1996, v:19, n:9-10, pp:813-823 [Journal ] Vijay Varadharajan , Panos Katsavos High-speed network security. I. SMDS and frame relay. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1997, v:20, n:10, pp:832-847 [Journal ] Vijay Varadharajan , P. W. Sanders Practical secure electronic mail system with public key distribution. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1985, v:8, n:3, pp:121-127 [Journal ] Vijay Varadharajan , Rajan Shankaran , Michael Hitchens Security for cluster based ad hoc networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 2004, v:27, n:5, pp:488-501 [Journal ] Vijay Varadharajan , Rajan Shankaran , Michael Hitchens On the design of secure ATM networks. [Citation Graph (0, 0)][DBLP ] Computer Communications, 1999, v:22, n:15-16, pp:1512-1525 [Journal ] Chris J. Mitchell , Vijay Varadharajan Modified forms of cipher block chaining. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:1, pp:37-40 [Journal ] Vijay Varadharajan , Stewart Black Multilevel security in a distributed object-oriented system. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1991, v:10, n:1, pp:51-68 [Journal ] Vijay Varadharajan , Claudio Calvelli Extending the schematic protection model - II. Revocation. [Citation Graph (0, 0)][DBLP ] Computers & Security, 1996, v:15, n:6, pp:525-536 [Journal ] Vijay Varadharajan , K. D. Baker Net-Based System Design Representation and Analysis. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 1987, v:2, n:4, pp:167-178 [Journal ] Yun Bai , Vijay Varadharajan On transformation of authorization policies. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2003, v:45, n:3, pp:333-357 [Journal ] Yun Bai , Vijay Varadharajan Object Oriented Database with Authorization Policies. [Citation Graph (0, 0)][DBLP ] Fundam. Inform., 2002, v:53, n:3-4, pp:229-250 [Journal ] Yun Bai , Yan Zhang , Vijay Varadharajan On the sequence of authorization policy transformations. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:120-131 [Journal ] Chun Ruan , Vijay Varadharajan A formal graph based framework for supporting authorization delegations and conflict resolutions. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2003, v:1, n:4, pp:211-222 [Journal ] Yi Mu , Vijay Varadharajan Group Cryptography: Signature and Encryption. [Citation Graph (0, 0)][DBLP ] Informatica (Slovenia), 2002, v:26, n:3, pp:- [Journal ] Guangrong Chen , Vijay Varadharajan , Pradeep Ray , P. Zuluaga Management for eBusiness in the New Millennium: A Report on APNOMS 2001. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2002, v:10, n:2, pp:- [Journal ] Udaya Kiran Tupakula , Vijay Varadharajan Tracing DoS Floods: An Automated Approach. [Citation Graph (0, 0)][DBLP ] J. Network Syst. Manage., 2004, v:12, n:1, pp:- [Journal ] Vijay Varadharajan A petri net model for system design and refinement. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1991, v:15, n:3, pp:239-250 [Journal ] Yan Wang , Vijay Varadharajan Secure route structures for parallel mobile agents based systems using fast binary dispatch. [Citation Graph (0, 0)][DBLP ] Mobile Information Systems, 2005, v:1, n:3, pp:185-205 [Journal ] Gregory Saunders , Michael Hitchens , Vijay Varadharajan Role-Based Access Control and the Access Control Matrix. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 2001, v:35, n:4, pp:6-20 [Journal ] Vijay Varadharajan Extending the Schematic Protection Model II: Revocation. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1997, v:31, n:1, pp:64-77 [Journal ] Vijay Varadharajan , Phillip Allen Joint Actions Based Authorization Schemes. [Citation Graph (0, 0)][DBLP ] Operating Systems Review, 1996, v:30, n:3, pp:32-45 [Journal ] Vijay Varadharajan , Khanh Quoc Nguyen , Yi Mu On the Design of Efficient RSA-based Off-line Electronic Cash Schemes. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:173-184 [Journal ] Vijay Varadharajan , Claudio Calvelli An Access Control Model and Its Use in Representing Mental Health Application Access Policy. [Citation Graph (0, 4)][DBLP ] IEEE Trans. Knowl. Data Eng., 1996, v:8, n:1, pp:81-95 [Journal ] Ghassan Chaddoud , Vijay Varadharajan , Isabelle Chrisment , André Schaff Gestion efficace de la sécurité des communications de groupe pour le service SSM. [Citation Graph (0, 0)][DBLP ] Technique et Science Informatiques, 2004, v:23, n:9, pp:1107-1135 [Journal ] Hua Wang , Yanchun Zhang , Jinli Cao , Vijay Varadharajan Achieving secure and flexible M-services through tickets. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Systems, Man, and Cybernetics, Part A, 2003, v:33, n:6, pp:697-708 [Journal ] Vijay Varadharajan , D. Foster A Security Architecture for Mobile Agent Based Applications. [Citation Graph (0, 0)][DBLP ] World Wide Web, 2003, v:6, n:1, pp:93-122 [Journal ] Yan Wang , Vijay Varadharajan Role-based Recommendation and Trust Evaluation. [Citation Graph (0, 0)][DBLP ] CEC/EEE, 2007, pp:278-288 [Conf ] A Hybrid Trust Model for Enhancing Security in Distributed Systems. [Citation Graph (, )][DBLP ] ALOPA: Authorization Logic for Property Attestation in Trusted Platforms. [Citation Graph (, )][DBLP ] Fuzzy Regression Based Trust Prediction in Service-Oriented Applications. [Citation Graph (, )][DBLP ] Trust management for trusted computing platforms in web services. [Citation Graph (, )][DBLP ] Trust Relationship Modelling in E-commerce-Based Social Network. [Citation Graph (, )][DBLP ] Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP ] On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. [Citation Graph (, )][DBLP ] Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. [Citation Graph (, )][DBLP ] Reasoning on Weighted Delegatable Authorizations. [Citation Graph (, )][DBLP ] Trust Enhanced Authorization for Mobile Agents. [Citation Graph (, )][DBLP ] The Design of A Rule-based and Event-driven Trust Management Framework. [Citation Graph (, )][DBLP ] SBAC: Service Based Access Control. [Citation Graph (, )][DBLP ] Trust Management for Web Services. [Citation Graph (, )][DBLP ] Critical Issues in Trust Management for Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP ] Secure Interoperation in Multidomain Environments Employing UCON Policies. [Citation Graph (, )][DBLP ] Trust Management and Negotiation for Attestation in Trusted Platforms Using Web Services. [Citation Graph (, )][DBLP ] DoSTRACK: a system for defending against DoS attacks. [Citation Graph (, )][DBLP ] Overhearing Gain Analysis in Low-Traffic CDMA Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Trust and Recommendations in Mobile Ad hoc Networks. [Citation Graph (, )][DBLP ] A New Security Scheme for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Mobile Agent and Web Service Integration Security Architecture. [Citation Graph (, )][DBLP ] A New Security Scheme for Integration of Mobile Agents and Web Services. [Citation Graph (, )][DBLP ] A Novel Approach of Web Search Based on Community Wisdom. [Citation Graph (, )][DBLP ] A Property-Dependent Agent Transfer Protocol. [Citation Graph (, )][DBLP ] Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. [Citation Graph (, )][DBLP ] Evolution and challenges in trust and security in information system infrastructures. [Citation Graph (, )][DBLP ] TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. [Citation Graph (, )][DBLP ] Property Based Attestation and Trusted Computing: Analysis and Challenges. [Citation Graph (, )][DBLP ] Verification of network security protocols. [Citation Graph (, )][DBLP ] A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems. [Citation Graph (, )][DBLP ] Search in 0.157secs, Finished in 0.164secs