메뉴 건너뛰기




Volumn , Issue , 2002, Pages 429-438

Reasoning about joint administration of access policies for coalition resources

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; CLIENT SERVER COMPUTER SYSTEMS; COMPUTER ARCHITECTURE; LOGIC PROGRAMMING; NETWORK PROTOCOLS; OPTIMIZATION; PROBLEM SOLVING; RESOURCE ALLOCATION; SECURITY OF DATA; SERVERS; WORLD WIDE WEB;

EID: 0036375159     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (20)

References (27)
  • 2
    • 84949973195 scopus 로고    scopus 로고
    • The correctness of crypto transaction sets
    • 8th International Workshop on Security Protocols, Springer-Verlag
    • (2000) LNCS , vol.2133 , pp. 125-141
    • Anderson, R.1
  • 3
    • 84957018842 scopus 로고    scopus 로고
    • Low cost attacks on tamper resistant devices
    • 5th International Workshop on Security Protocols, Springer-Verlag
    • (1997) LNCS , vol.1361 , pp. 125-136
    • Anderson, R.1    Kuhn, M.2
  • 7
    • 84944874831 scopus 로고    scopus 로고
    • Attacks on cryptoprocessor transaction sets
    • Proceedings of the CHES 2001 Workshop, Paris, Springer-Verlag
    • (2001) LNCS , vol.2162 , pp. 220-234
    • Bond, M.1
  • 9
    • 85022187530 scopus 로고
    • Shared generation of authenticators and signatures
    • Advances in Cryptology - Crypto '91, Springer-Verlag
    • (1992) LNCS , vol.576 , pp. 457-469
    • Desmedt, Y.1    Frankel, Y.2
  • 15
    • 0010389068 scopus 로고    scopus 로고
    • Review and revocation of access privileges distributed with PKI certificates
    • 8th International Workshop on Security Protocols, Springer-Verlag
    • (2000) LNCS , vol.2133 , pp. 100-124
    • Khurana, H.1    Gligor, V.D.2
  • 24
    • 84948954277 scopus 로고    scopus 로고
    • Practical threshold signatures
    • Advances in Cryptology - Eurocrypt 2000, Springer-Verlag
    • (2000) LNCS , vol.1807 , pp. 207-220
    • Shoup, V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.