메뉴 건너뛰기




Volumn 4, Issue , 2003, Pages 3128-3135

Trust metrics for survivable security systems

Author keywords

Critical infrastructures; Fault tolerant; Secret sharing; Sustainable trust; Trust metrics

Indexed keywords

ALGORITHMS; CALCULATIONS; COMPUTATIONAL COMPLEXITY; DATA PRIVACY; FAULT TOLERANT COMPUTER SYSTEMS; NETWORK PROTOCOLS;

EID: 0242721789     PISSN: 08843627     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (16)

References (17)
  • 2
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • J. Vitek, C. Jensen, Ed., Springer-Verlag
    • M. Blaze, J. Feigenbaum, J. Ioannidis and A.D. Keromytis, "The Role of Trust Management in Distributed Systems Security", Secure Internet Programming, J. Vitek, C. Jensen, Ed., Springer-Verlag, pp. 185-210, 1999.
    • (1999) Secure Internet Programming , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 4
    • 0010344835 scopus 로고    scopus 로고
    • Poblano - A distributed trust model for peer-to-peer networks
    • Sun white paper, 5/2002
    • R. Chen, "Poblano - A Distributed Trust Model for Peer-to-Peer Networks", Sun white paper, 5/2002.
    • Chen, R.1
  • 8
    • 0242621246 scopus 로고    scopus 로고
    • New combinatorial bounds for authentication codes and key predistribution schemes
    • K. Kurosawa, K. Okada, H. Saido and D. Stinson, "New combinatorial bounds for authentication codes and key predistribution schemes", Designs, Codes and Cryptography, Vol. 15, No. 1, pp. 87-100, 1998.
    • (1998) Designs, Codes and Cryptography , vol.15 , Issue.1 , pp. 87-100
    • Kurosawa, K.1    Okada, K.2    Saido, H.3    Stinson, D.4
  • 11
    • 0003547217 scopus 로고    scopus 로고
    • O'Reilly, 2nd edition
    • S. Oaks, "Java Security", O'Reilly, 2nd edition, 2001.
    • (2001) Java Security
    • Oaks, S.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir, "How to Share a Secret", Communications of the ACM, Vol. 22, No. 11, pp. 612-613, 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.