Entry Lee:2008:TAS from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Lee:2008:TAS,
author = "Adam J. Lee and Marianne Winslett and Jim Basney and
Von Welch",
title = "The {Traust Authorization Service}",
journal = j-TISSEC,
volume = "11",
number = "1",
pages = "2:1--2:??",
month = feb,
year = "2008",
CODEN = "ATISBQ",
DOI = "https://doi.org/10.1145/1330295.1330297",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Jun 12 17:52:35 MDT 2008",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
abstract = "In recent years, trust negotiation has been proposed
as a novel authorization solution for use in
open-system environments, in which resources are shared
across organizational boundaries. Researchers have
shown that trust negotiation is indeed a viable
solution for these environments by developing a number
of policy languages and strategies for trust
negotiation that have desirable theoretical properties.
Further, existing protocols, such as TLS, have been
altered to interact with prototype trust negotiation
systems, thereby illustrating the utility of trust
negotiation. Unfortunately, modifying existing
protocols is often a time-consuming and bureaucratic
process that can hinder the adoption of this promising
technology. \par
In this paper, we present Traust, a third-party
authorization service that leverages the strengths of
existing prototype trust negotiation systems. Traust
acts as an authorization broker that issues access
tokens for resources in an open system after entities
use trust negotiation to satisfy the appropriate
resource access policies. The Traust architecture was
designed to allow Traust to be integrated either
directly with newer trust-aware applications or
indirectly with existing legacy applications; this
flexibility paves the way for the incremental adoption
of trust negotiation technologies without requiring
widespread software or protocol upgrades. We discuss
the design and implementation of Traust, the
communication protocol used by the Traust system, and
its performance. We also discuss our experiences using
Traust to broker access to legacy resources, our
proposal for a Traust-aware version of the GridFTP
protocol, and Traust's resilience to attack.",
acknowledgement = ack-nhfb,
articleno = "2",
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
keywords = "attribute-based access control; credentials; trust
negotiation",
}
Related entries
- across,
12(3)17,
13(4)35,
14(1)6,
14(1)13,
14(3)25,
15(2)7,
18(3)11
- act,
14(4)31,
16(4)15,
17(1)1
- adoption,
12(1)1,
13(4)36
- allow,
2(4)390,
9(2)181,
10(3)10,
10(4)2,
10(4)3,
11(2)2,
11(2)4,
12(1)3,
12(1)6,
12(2)8,
12(2)10,
12(3)16,
12(3)18,
12(3)19,
13(3)21,
13(4)34,
13(4)38,
13(4)39,
13(4)41,
14(1)3,
14(1)5,
14(1)10,
14(3)25,
14(3)26,
14(3)27,
14(4)28,
14(4)29,
15(2)6,
15(2)9,
15(2)10,
16(1)3,
16(2)5,
16(3)9,
16(4)13,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)16,
18(3)10
- application,
1(1)66,
2(2)159,
2(2)177,
2(4)354,
4(2)103,
7(1)1,
7(1)97,
8(3)287,
9(1)1,
9(1)94,
10(1)2,
10(2)6,
10(4)3,
11(1)3,
11(3)14,
11(3)16,
11(4)22,
12(1)2,
12(1)3,
12(2)11,
12(3)14,
12(4)21,
13(1)4,
13(1)10,
13(2)17,
13(3)22,
13(3)26,
13(4)38,
13(4)39,
14(1)2,
14(1)3,
14(1)6,
14(1)8,
14(1)9,
14(2)19,
14(3)27,
15(1)2,
15(1)4,
16(1)1,
16(1)2,
16(2)6,
16(3)9,
16(4)13,
16(4)17,
17(2)5,
17(4)13,
18(3)10,
18(4)12
- appropriate,
11(3)12,
11(3)16,
12(1)3,
12(2)9,
12(4)21,
14(1)2,
15(2)6
- architecture,
2(2)177,
2(3)269,
4(3)289,
8(2)187,
10(4)6,
11(1)3,
13(4)37,
14(1)3,
15(1)2,
15(3)13,
16(1)1,
16(2)5,
16(3)11,
17(2)8,
18(2)8
- attribute-based,
10(3)12,
13(4)31
- authorization,
1(1)26,
2(1)34,
2(1)65,
2(1)105,
2(2)177,
3(4)207,
4(4)453,
5(1)62,
6(1)128,
6(4)566,
7(2)175,
7(3)363,
10(4)2,
11(1)3,
11(1)4,
12(1)6,
12(2)8,
12(3)15,
13(3)20,
13(3)25,
13(4)40,
14(1)3,
14(1)8,
14(3)23,
15(3)13,
17(2)5
- based, attribute-,
10(3)12,
13(4)31
- been,
1(1)93,
2(3)269,
2(3)332,
10(1)2,
10(3)12,
10(4)4,
11(4)17,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(3)17,
13(3)20,
13(3)27,
13(4)36,
13(4)39,
14(1)3,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
15(2)10,
16(3)10,
16(4)14,
17(1)3,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(4)14
- boundary,
2(3)295,
10(1)2
- communication,
4(3)289,
4(4)371,
7(4)523,
10(3)9,
10(4)6,
11(2)2,
11(2)3,
11(3)14,
11(4)18,
12(1)2,
12(3)15,
12(3)16,
12(4)21,
12(4)22,
13(1)8,
13(4)29,
14(1)4,
14(1)12,
15(1)5,
15(2)6,
15(2)7,
15(2)9,
15(3)14,
16(3)10,
16(4)15,
17(1)4,
17(3)9,
18(2)5,
18(2)7
- consuming, time-,
16(2)7
- credential,
6(1)1,
10(3)12,
12(1)6,
12(2)8,
12(3)15,
13(1)2,
13(4)39,
14(1)8,
14(1)10,
14(4)29,
15(1)4,
17(3)10
- design,
1(1)66,
2(1)34,
2(1)105,
2(2)138,
2(3)269,
2(4)390,
2(4)416,
10(2)7,
10(3)11,
10(4)1,
11(2)1,
11(4)18,
11(4)23,
12(1)3,
12(2)8,
12(2)11,
12(3)17,
12(4)20,
12(4)22,
13(1)10,
13(4)29,
13(4)32,
14(1)8,
14(3)24,
15(3)13,
16(2)5,
16(2)6,
16(2)8,
16(4)16,
17(1)4,
17(2)7,
17(2)8,
17(4)13,
18(1)1,
18(1)3,
18(4)12
- designed,
2(4)416,
10(3)10,
10(3)11,
10(3)12,
11(3)12,
12(4)21,
12(4)22,
13(3)25,
13(4)38,
16(2)5,
16(2)8,
16(3)9,
16(3)10,
16(4)14,
17(4)13,
18(1)3
- desirable,
9(4)391,
15(2)10
- developing,
10(4)1,
10(4)2,
14(3)23
- directly,
1(1)26,
10(2)5,
12(2)12,
13(3)27
- discuss,
2(1)105,
10(2)5,
10(2)8,
11(2)1,
12(4)20,
12(4)22,
13(3)22,
13(3)25,
13(4)35,
14(3)24,
17(1)3,
18(2)7
- either,
2(4)390,
10(1)2,
11(2)3,
11(4)18,
11(4)23,
12(1)2,
13(4)33,
14(1)9,
15(3)14,
15(4)17,
16(4)15,
16(4)16,
16(4)17,
17(1)2,
18(2)5
- entities,
2(2)138,
10(1)2,
10(3)12,
11(3)14,
12(1)4,
12(2)8,
14(3)27
- environments,
4(4)407,
7(3)392,
11(3)14,
11(4)22,
12(3)15,
13(3)20,
13(3)25,
13(4)32,
13(4)37,
13(4)38,
15(2)9,
18(3)11
- existing,
1(1)93,
11(3)15,
11(4)22,
11(4)23,
12(1)1,
12(1)2,
12(1)3,
12(2)12,
12(3)14,
13(3)27,
13(4)36,
14(1)13,
14(3)25,
14(4)30,
15(1)4,
15(2)9,
15(3)12,
16(2)5,
16(3)10,
16(4)15,
17(1)2,
17(1)4,
17(2)5,
17(2)7,
17(4)15,
18(1)1,
18(3)10
- experience,
2(1)34,
14(4)32,
17(3)9,
17(4)14,
18(1)3
- flexibility,
9(4)391,
10(1)2,
15(2)10,
17(4)16
- further,
2(1)105,
2(3)230,
2(4)354,
10(2)8,
10(3)12,
11(3)15,
11(4)21,
12(2)11,
13(3)25,
13(3)27,
13(4)29,
13(4)30,
14(3)27,
15(2)7,
16(4)16,
16(4)17
- has,
1(1)93,
2(1)105,
2(2)138,
2(3)230,
2(3)269,
2(3)332,
9(4)391,
10(1)3,
10(1)4,
10(3)10,
11(2)2,
11(3)14,
11(4)17,
11(4)19,
11(4)22,
11(4)23,
12(1)2,
12(2)9,
12(2)10,
12(3)15,
12(4)22,
13(3)20,
13(3)25,
13(3)26,
13(3)27,
13(3)28,
13(4)36,
14(1)3,
14(1)12,
14(1)14,
14(3)26,
14(4)28,
15(1)2,
15(2)6,
15(2)10,
15(3)12,
16(2)8,
16(4)14,
17(1)2,
17(1)3,
17(3)9,
17(3)11,
17(4)14,
17(4)15,
17(4)16,
18(2)7,
18(3)11,
18(4)14
- have,
1(1)66,
1(1)93,
2(1)65,
2(2)138,
2(3)230,
2(3)269,
10(1)2,
10(1)4,
10(2)5,
10(3)10,
10(3)12,
10(4)4,
10(4)5,
10(4)6,
11(2)1,
11(2)5,
11(3)15,
11(3)16,
11(4)17,
11(4)18,
11(4)21,
12(1)1,
12(1)2,
12(2)10,
12(2)13,
12(3)15,
12(3)16,
12(3)17,
12(4)20,
13(3)20,
13(3)26,
13(3)27,
13(3)28,
13(4)32,
13(4)36,
13(4)39,
13(4)40,
14(1)6,
14(1)7,
14(1)10,
14(1)13,
14(1)14,
14(3)27,
14(4)28,
14(4)29,
15(2)7,
15(2)9,
15(2)10,
15(3)12,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
16(4)15,
16(4)16,
17(1)3,
17(3)11,
17(3)12,
17(4)13,
17(4)15,
18(1)1,
18(1)3,
18(2)5,
18(2)7,
18(4)13
- implementation,
1(1)3,
1(1)26,
1(1)66,
2(1)34,
2(2)177,
2(4)390,
2(4)416,
7(2)319,
11(1)3,
11(1)4,
11(3)16,
11(4)18,
11(4)22,
12(1)1,
12(2)10,
12(2)11,
12(3)14,
12(4)22,
13(1)4,
13(3)26,
13(3)27,
14(1)3,
15(1)3,
15(2)8,
15(3)13,
15(4)16,
16(1)1,
16(1)2,
16(3)9,
16(3)10,
16(3)11,
16(4)13,
17(2)5,
17(2)8,
18(1)2,
18(1)3,
18(1)4
- incremental,
10(3)11
- indeed,
11(4)21,
12(3)17
- indirectly,
12(2)12
- integrated,
7(3)392,
16(3)9,
18(1)2
- interact,
10(4)3
- issue,
1(1)66,
2(1)65,
2(4)354,
8(4)349,
10(1)1,
10(3)12,
12(1)5,
12(2)7,
12(3)15,
12(4)22,
13(1)1,
13(2)11,
13(3)22,
13(3)26,
13(4)32,
15(1)1,
15(2)7,
16(2)7,
16(3)12,
17(1)1,
17(1)2
- language,
2(1)65,
9(4)391,
9(4)421,
10(1)3,
10(2)8,
11(1)4,
11(4)21,
12(1)1,
12(2)12,
13(3)20,
13(3)24,
13(3)26,
13(3)28,
14(1)9,
15(1)2,
15(2)8,
16(1)3,
16(3)9,
16(4)17,
17(1)2,
17(1)3
- Lee, Adam J.,
12(2)8,
13(3)25
- legacy,
16(3)9
- leverage,
15(2)7,
16(2)6
- negotiation,
6(1)1,
7(3)428,
9(3)352,
10(3)12,
12(2)8,
13(1)2
- novel,
2(3)269,
9(4)461,
10(1)4,
10(3)12,
11(1)3,
11(2)2,
11(4)18,
11(4)19,
12(1)4,
12(3)16,
14(1)5,
15(1)4,
16(1)1,
16(4)16,
17(1)2,
17(3)9,
17(4)14,
18(1)4,
18(4)12
- number,
7(2)319,
9(2)181,
10(1)4,
10(2)5,
10(3)11,
10(3)12,
10(4)5,
11(2)5,
11(3)12,
11(3)14,
11(3)15,
12(1)1,
12(1)2,
12(1)5,
12(1)6,
12(2)8,
12(2)9,
12(2)13,
12(3)16,
12(3)18,
12(4)21,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(4)32,
13(4)34,
14(1)11,
14(3)26,
14(4)31,
15(1)4,
15(2)7,
15(2)8,
15(4)15,
16(1)4,
16(2)7,
16(4)14,
16(4)16,
17(3)10,
17(4)16,
18(2)8
- often,
2(1)65,
10(1)4,
10(2)8,
10(3)10,
10(3)12,
11(3)12,
11(4)20,
16(2)5,
17(1)2,
17(1)4
- open,
10(3)12,
10(4)3,
15(2)9,
16(4)15
- organizational,
15(3)13
- paper,
1(1)66,
1(1)93,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)269,
2(4)390,
7(2)319,
9(2)162,
9(2)181,
9(4)421,
10(1)2,
10(1)4,
10(2)5,
10(2)7,
10(3)9,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)4,
11(2)1,
11(2)6,
12(2)12,
14(4)28,
14(4)32
- party, third-,
2(4)354,
11(3)14
- performance,
1(1)3,
1(1)26,
1(1)66,
2(3)269,
4(3)289,
5(4)458,
7(3)457,
9(4)461,
10(1)3,
10(4)4,
11(1)3,
11(2)1,
11(4)17,
11(4)19,
12(3)14,
12(3)16,
13(3)24,
13(3)25,
13(4)32,
13(4)35,
13(4)38,
14(1)3,
15(1)4,
16(1)1,
16(2)6,
16(2)8,
16(3)9,
16(4)16,
17(1)1,
17(2)8,
17(3)9,
17(4)13,
17(4)15
- present,
1(1)26,
2(1)3,
2(1)65,
2(2)177,
2(3)230,
2(3)269,
2(3)295,
2(4)354,
7(2)319,
9(2)181,
9(4)461,
10(1)2,
10(2)7,
10(3)10,
10(3)11,
10(3)12,
10(4)2,
10(4)3,
11(1)4,
11(2)2,
11(2)5,
11(3)14,
11(4)22,
12(1)2,
12(1)4,
12(2)10,
12(2)11,
12(3)14,
12(3)15,
12(3)16,
12(3)17,
12(4)22,
13(1)10,
13(3)20,
13(3)22,
13(3)25,
13(3)28,
13(4)29,
13(4)41,
14(1)4,
14(1)5,
14(1)6,
15(1)2,
15(2)6,
15(2)8,
15(2)10,
15(3)12,
15(3)13,
15(4)16,
15(4)18,
16(2)6,
16(2)7,
16(4)13,
16(4)14,
17(1)4,
17(2)6,
17(2)7,
17(2)8,
17(3)9,
17(3)12,
17(4)14,
17(4)15,
17(4)16,
18(1)3,
18(1)4,
18(2)7,
18(3)9,
18(3)10,
18(3)11,
18(4)12,
18(4)14
- process,
1(1)26,
2(1)65,
9(4)421,
10(3)9,
10(4)4,
11(1)4,
11(4)18,
11(4)20,
12(2)11,
12(3)14,
13(1)10,
13(3)25,
13(4)36,
15(3)13,
16(2)5,
16(2)7,
17(2)6,
17(4)14,
18(1)3
- promising,
10(3)12,
16(4)14,
18(4)13
- property,
1(1)66,
1(1)93,
2(1)34,
2(2)177,
9(4)391,
10(1)2,
10(2)7,
10(2)8,
10(3)9,
11(3)12,
11(3)13,
12(1)2,
12(1)3,
12(2)8,
12(2)9,
12(3)14,
12(3)18,
12(3)19,
12(4)21,
13(3)26,
13(4)41,
14(2)16,
15(1)4,
15(2)9,
15(2)10,
15(3)14,
15(4)18,
16(1)3,
16(2)5,
17(1)3,
17(1)4,
18(1)3,
18(2)6,
18(2)8,
18(4)12
- proposal,
10(3)11,
12(1)2,
17(3)9
- proposed,
1(1)93,
2(2)138,
2(3)269,
2(4)416,
4(3)224,
9(2)162,
9(4)421,
10(1)2,
10(3)12,
10(4)4,
11(1)3,
11(2)5,
11(3)14,
11(4)22,
11(4)23,
12(1)2,
12(1)3,
12(3)18,
12(4)21,
13(3)20,
13(3)27,
13(3)28,
13(4)36,
13(4)38,
13(4)39,
14(3)24,
14(3)27,
15(1)5,
15(3)11,
15(3)13,
15(4)15,
15(4)17,
16(3)10,
16(3)11,
16(4)14,
16(4)16,
17(1)3,
17(4)14,
18(3)11
- prototype,
1(1)3,
2(1)34,
10(1)4,
10(4)4,
11(1)3,
11(4)18,
12(1)4,
12(2)13,
13(4)30,
14(1)3,
16(1)1,
16(2)6,
17(2)5
- recent,
2(1)65,
2(2)138,
10(2)8,
10(3)9,
11(4)22,
12(1)2,
12(2)12,
14(1)7,
14(1)14,
14(4)29,
15(1)3,
16(2)7,
16(3)10,
18(1)1,
18(2)5,
18(2)7,
18(4)13
- requiring,
11(3)14,
11(3)16,
15(2)9,
17(4)13,
18(4)13
- researcher,
2(3)332,
12(1)2,
12(3)17,
13(4)36,
16(3)10,
16(4)16,
17(1)1
- resilience,
10(4)6,
11(3)13,
14(4)28
- resource,
2(3)332,
9(4)391,
10(4)4,
11(1)3,
11(1)4,
11(2)2,
11(3)14,
11(4)19,
11(4)20,
12(1)1,
12(1)6,
12(4)22,
13(3)20,
14(1)7,
14(1)10,
15(4)18,
17(1)2,
17(3)9,
18(2)6
- satisfy,
1(1)93,
10(2)5,
12(3)18,
12(4)20,
13(3)26,
15(3)13,
16(1)4,
18(2)6
- service,
2(4)354,
4(4)453,
6(4)472,
10(1)2,
10(2)8,
10(3)11,
10(4)4,
10(4)6,
11(1)4,
11(3)15,
11(4)19,
12(2)12,
12(3)16,
13(4)38,
13(4)39,
13(4)41,
14(1)5,
14(3)23,
15(2)6,
15(3)12,
15(3)13,
16(2)5,
16(2)6,
16(3)11,
16(3)12,
16(4)14,
17(4)13,
17(4)15,
18(1)1,
18(1)2,
18(4)12,
18(4)13
- shared,
10(3)10,
11(1)3,
11(1)4,
12(2)8,
12(4)22,
14(1)11
- shown,
2(1)3,
11(2)3,
12(3)16,
13(3)25,
13(4)33,
14(1)7,
15(2)7,
15(2)10,
15(3)14,
18(2)5,
18(2)6
- software,
1(1)3,
2(1)3,
2(1)34,
2(1)105,
2(2)138,
2(2)177,
2(3)295,
2(4)354,
3(1)51,
12(2)11,
12(2)12,
12(3)14,
12(3)19,
14(1)8,
14(3)24,
14(4)32,
15(2)8,
17(1)1,
17(3)11
- solution,
9(2)162,
10(4)1,
11(1)4,
11(4)20,
12(1)3,
12(1)6,
12(3)16,
12(3)18,
12(4)21,
13(3)22,
13(3)25,
13(3)27,
13(3)28,
15(2)7,
16(2)6,
16(3)11,
17(1)4,
17(3)9,
17(3)10,
17(3)11,
18(1)1,
18(1)3
- strategy,
6(1)1,
8(1)78,
10(3)12,
10(4)1,
11(3)15,
11(4)19,
15(4)15
- strength,
2(3)269,
2(4)416,
10(2)5,
10(4)6,
11(4)22,
17(2)7,
18(1)1,
18(4)13
- technology,
4(2)103,
8(4)349,
10(1)1,
11(4)19,
16(3)10,
17(1)3,
17(2)5,
17(3)11,
18(2)5
- theoretical,
11(3)13,
12(2)13,
13(3)27,
16(3)11,
17(3)9
- thereby,
2(1)105,
9(4)391,
12(2)11,
14(1)3,
14(1)14,
17(3)10
- third-party,
2(4)354,
11(3)14
- time-consuming,
16(2)7
- TLS,
2(3)332,
4(2)134,
7(4)553,
15(1)3
- token,
7(3)333,
17(2)6,
17(3)10,
18(3)9
- trust,
5(2)95,
6(1)1,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)3,
10(4)4,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
14(4)29,
17(2)6
- Unfortunately,
2(1)65,
13(3)25
- upgrades,
14(1)5
- use,
2(1)3,
2(1)105,
2(2)138,
2(2)177,
2(3)230,
2(3)269,
2(3)332,
2(4)354,
2(4)390,
4(2)103,
7(1)21,
9(4)391,
9(4)421,
9(4)461,
10(1)4,
10(2)5,
10(3)11,
10(4)1,
10(4)3,
10(4)5,
10(4)6,
11(1)3,
11(1)4,
11(2)1,
11(2)4,
11(3)13,
11(3)14,
11(4)18,
11(4)19,
11(4)21,
11(4)22,
12(2)10,
12(3)16,
12(3)18,
13(3)22,
13(3)24,
13(3)25,
13(4)29,
13(4)31,
13(4)36,
14(1)6,
14(1)8,
14(1)10,
14(1)11,
14(4)31,
14(4)32,
15(1)3,
15(1)4,
15(1)5,
15(2)7,
15(3)12,
15(4)15,
15(4)16,
15(4)17,
16(2)8,
16(4)15,
16(4)17,
17(2)5,
17(2)6,
17(2)7,
17(2)8,
17(4)15,
17(4)16,
18(1)1,
18(2)6,
18(3)9,
18(4)14
- used,
1(1)3,
2(1)65,
2(4)416,
7(2)319,
9(2)181,
10(1)2,
10(2)5,
10(2)7,
10(2)8,
10(4)2,
11(1)3,
11(2)3,
11(3)14,
11(3)15,
11(3)16,
11(4)21,
11(4)22,
12(2)8,
12(3)15,
13(1)10,
13(3)22,
13(3)25,
13(4)29,
13(4)34,
14(1)3,
14(1)12,
14(1)13,
14(3)27,
15(1)3,
15(1)5,
15(3)12,
15(4)17,
15(4)18,
16(2)7,
16(2)8,
16(3)10,
17(1)1,
17(2)7,
17(3)9,
17(4)13,
18(1)3,
18(2)5,
18(2)6,
18(3)9,
18(4)13,
18(4)14
- using,
2(2)138,
2(2)177,
2(3)332,
4(3)289,
6(2)258,
6(3)327,
9(2)113,
9(2)162,
9(2)181,
9(3)292,
9(3)325,
9(4)461,
10(1)4,
10(2)8,
10(3)11,
10(4)3,
10(4)6,
11(2)1,
11(2)2,
11(2)3,
11(3)14,
11(4)19,
11(4)21,
12(2)10,
12(2)11,
13(1)2,
13(1)8,
13(3)20,
13(3)26,
13(4)31,
13(4)35,
13(4)39,
14(1)3,
14(1)12,
14(1)14,
14(3)27,
15(1)2,
15(3)11,
15(3)12,
15(4)15,
15(4)17,
16(1)1,
16(1)2,
16(1)4,
16(2)5,
16(2)6,
16(3)10,
16(4)17,
17(1)1,
17(2)5,
17(3)10,
17(3)11,
17(4)13,
17(4)14,
17(4)16,
18(2)7,
18(2)8,
18(3)10,
18(3)11,
18(4)14
- utility,
16(2)7,
18(2)7
- version,
10(1)3,
10(4)4,
12(2)10,
12(3)16,
13(4)37,
16(4)13,
17(4)15
- was,
2(1)105,
12(3)16,
13(1)10,
14(1)8,
16(3)10,
16(3)11,
16(4)16,
17(1)1,
18(1)3,
18(4)13
- way,
2(1)3,
2(1)65,
2(3)230,
2(3)269,
2(4)416,
9(4)461,
10(4)3,
10(4)4,
11(3)13,
12(1)5,
12(2)8,
12(2)11,
12(3)14,
13(1)10,
13(3)22,
13(3)28,
13(4)34,
15(2)10,
15(4)15,
16(3)10,
16(3)11,
16(4)17,
17(2)6
- widespread,
11(4)19,
12(1)1
- Winslett, Marianne,
6(1)1,
12(2)8,
13(3)25
- year,
2(1)65,
10(3)10,
11(4)17,
12(1)2,
14(1)14,
16(4)16,
18(2)7