메뉴 건너뛰기




Volumn , Issue , 2004, Pages 108-115

Collaborative automated trust negotiation in peer-to-peer systems

Author keywords

[No Author keywords available]

Indexed keywords

LOCALLY TRUSTED THIRD PARTIES (LTTP); PEER-TO-PEER SYSTEMS; RESOURCE ACCESS CONTROL; TRUST NEGOTIATION;

EID: 13244299177     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (34)

References (23)
  • 1
    • 84860086990 scopus 로고    scopus 로고
    • http://www.ebay.com.
  • 2
    • 84860075384 scopus 로고    scopus 로고
    • Trust negotiation in peer-to-peer systems
    • in progress
    • Trust negotiation in peer-to-peer systems. Technical Report (in progress), 2004, available at http://scens.cs.dartmouth.edu.
    • (2004) Technical Report
  • 5
    • 0003293531 scopus 로고    scopus 로고
    • Free riding on gnutella
    • October
    • E. Adar. and B.A. Huberman. Free riding on gnutella. First Monday, 5(10), October 2000.
    • (2000) First Monday , vol.5 , Issue.10
    • Adar, E.1    Huberman, B.A.2
  • 12
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 22
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society
    • Ting Yu and Marianne Winslett. A unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122. IEEE Computer Society, 2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 23
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information System Security, 6(1):1-42, 2003.
    • (2003) ACM Transactions on Information System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.