메뉴 건너뛰기




Volumn 14, Issue 9, 2000, Pages 909-925

An authorization-based trust model for multiagent systems

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; INTERNET; MULTI AGENT SYSTEMS; SECURITY OF DATA;

EID: 0034309364     PISSN: 08839514     EISSN: 10876545     Source Type: Journal    
DOI: 10.1080/08839510050144877     Document Type: Article
Times cited : (12)

References (23)
  • 3
    • 25344468943 scopus 로고
    • July, Technical Report # 800-7, National Institute of Standards and Technology, Gaithersburg, MD
    • Bagwill, R. et al. July 1994. Security in open systems. Technical Report # 800-7, National Institute of Standards and Technology, Gaithersburg, MD.
    • (1994) Security in Open Systems
    • Bagwill, R.1
  • 6
    • 0011716691 scopus 로고
    • Limitations of the kerberos authentication system
    • Winter, Dallas, TX
    • Bellovin, M., and M. Merritt. Winter 1991. Limitations of the kerberos authentication system. In USENIX Conference, 253-267, Dallas, TX.
    • (1991) USENIX Conference , pp. 253-267
    • Bellovin, M.1    Merritt, M.2
  • 7
    • 25344433293 scopus 로고    scopus 로고
    • December, Technical Report, Entrust Technologies Ltd, Plano, Texas
    • Curry, I. December 1997. Trusted public-key infrastructure. Technical Report, Entrust Technologies Ltd, Plano, Texas.
    • (1997) Trusted Public-Key Infrastructure
    • Curry, I.1
  • 8
    • 0003593599 scopus 로고    scopus 로고
    • November, Technical Report, IETF SPKI Working Group, Reston, VA
    • Ellison, C. et al. November 1997. Spki certificate theory, internet draft. Technical Report, IETF SPKI Working Group, Reston, VA.
    • (1997) Spki Certificate Theory, Internet Draft
    • Ellison, C.1
  • 9
    • 0011748579 scopus 로고    scopus 로고
    • Towards and infrastructure for authorization. In
    • Feigenbaum, J. 1998. Towards and infrastructure for authorization. In E-Commerce Conference, 15-19.
    • (1998) E-Commerce Conference , pp. 15-19
    • Feigenbaum, J.1
  • 10
    • 0011748580 scopus 로고    scopus 로고
    • March, Technical Report, IETF Task Force
    • Freier, A., P. Kocher, and P. Kaltorn. March 1996. SSL v3.0 specification. Technical Report http://home.netscape.com/eng/ss13/s-SPEC.HTM, IETF Task Force.
    • (1996) SSL V3.0 Specification
    • Freier, A.1    Kocher, P.2    Kaltorn, P.3
  • 12
    • 0031683295 scopus 로고    scopus 로고
    • Personal security agent: Kqml-based pki
    • May, Minneapolis, MN
    • He, Q., K. Sycara, and T. Finin. May 1998. Personal security agent: Kqml-based pki. In Autonomous agents, Minneapolis, MN.
    • (1998) Autonomous Agents
    • He, Q.1    Sycara, K.2    Finin, T.3
  • 13
    • 4243705673 scopus 로고    scopus 로고
    • October, Technical Report, Technical University of Graz, Austria
    • IAIK. October 1999. Iaik-jce toolkit. Technical Report http://jcewww.iaik.at/jce/jce.html, Technical University of Graz, Austria.
    • (1999) Iaik-Jce Toolkit
  • 14
    • 0003839495 scopus 로고
    • Technical Report, The University of Stirling, Stirling, Scotland, UK
    • Marsh, S. 1994. Formalising trust as a computational concept. Technical Report, The University of Stirling, Stirling, Scotland, UK.
    • (1994) Formalising Trust as a Computational Concept
    • Marsh, S.1
  • 15
    • 0011783454 scopus 로고    scopus 로고
    • Smart office project: Architecture and environment (in Japanese)
    • July, Japan
    • Mizoguchi, F. July 1998. Smart office project: Architecture and environment (in Japanese). In 1998 Symposium on Information Processing, Japan.
    • (1998) 1998 Symposium on Information Processing
    • Mizoguchi, F.1
  • 17
    • 0028514601 scopus 로고
    • Kerberos: An authentication service for computer networks
    • Septemper
    • Neuman, B., and T. Ts’o. Septemper 1994. Kerberos: An authentication service for computer networks. IEEE Communications 32(9):33-38.
    • (1994) IEEE Communications , vol.32 , Issue.9 , pp. 33-38
    • Neuman, B.1    Ts’O, T.2
  • 18
    • 0030086382 scopus 로고    scopus 로고
    • Role-based access control models
    • February
    • Sandhu, R. S., et al. February 1996. Role-based access control models. IEEE Computer 29:38-47.
    • (1996) IEEE Computer , vol.29 , pp. 38-47
    • Sandhu, R.S.1
  • 20
    • 4243907680 scopus 로고    scopus 로고
    • Technical Report 98-05, Verisign, Inc, Mountain View, CA
    • Verisign. Verisign worldtrust pki architecture. Technical Report 98-05, Verisign, Inc, Mountain View, CA.
    • Verisign Worldtrust Pki Architecture
  • 22
    • 22844457244 scopus 로고    scopus 로고
    • Security of public-key based authentication protocol
    • January, New York: Springer-Verlag
    • Wen, W., T. Saito, and F. Mizoguchi. January 2000. Security of public-key based authentication protocol. LNCS 1751: 196-209. New York: Springer-Verlag.
    • (2000) LNCS , vol.1751 , pp. 196-209
    • Wen, W.1    Saito, T.2    Mizoguchi, F.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.