메뉴 건너뛰기




Volumn 3424, Issue , 2005, Pages 283-301

Privacy-preserving trust negotiations

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION ANALYSIS; KNOWLEDGE ENGINEERING; STANDARDS;

EID: 24344462707     PISSN: 03029743     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1007/11423409_18     Document Type: Conference Paper
Times cited : (5)

References (27)
  • 3
    • 0036871183 scopus 로고    scopus 로고
    • Negotiating trust on the web
    • M. Winslett, e.a.: Negotiating Trust on The Web. IEEE Internet Computing, Vol. 6, No 6 (2002) 30-37
    • (2002) IEEE Internet Computing , vol.6 , Issue.6 , pp. 30-37
    • Winslett, M.1
  • 5
    • 2942654159 scopus 로고    scopus 로고
    • The platform for privacy preferences 1.0 (p3p1.0) specification
    • L. Cranor, M. Langheirich, M.M.: The Platform for Privacy Preferences 1. 0 (p3p1.0) specification (2002) W3C Reccomandation, http://www.w3.org/P3P/brochure.html.
    • (2002) W3C Reccomandation
    • Cranor, L.1    Langheirich, M.2    M., M.3
  • 8
    • 0001832779 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • Oakland, CA
    • A. Herzberg, Mihaeli, e.a.: Access Control meets Public Key Infrastructure, or: Assigning Roles to Strangers. IEEE Symposium on Security and Privacy, Oakland, CA (2000)
    • (2000) IEEE Symposium on Security and Privacy
    • Herzberg, A.1    Mihaeli2
  • 9
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • San Diego, CA
    • K. E. Seamons, M.W., Yu, T.: Limiting the disclosure of Access Control Policies during Automated Trust Negotiation. Network and Distributed System Security Simposium, San Diego, CA (2001)
    • (2001) Network and Distributed System Security Simposium
    • Seamons, K.E.1    W., M.2    Yu, T.3
  • 10
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Oakland, CA
    • T. Yu, M.W.: A Unified Scheme for Resource protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy (2003) Oakland, CA.
    • (2003) IEEE Symposium on Security and Privacy
    • Yu, T.1    W., M.2
  • 15
    • 0001475595 scopus 로고    scopus 로고
    • Relying party credentials framework
    • San Francisco, CA
    • Herzberg, A., Mass, Y.: Relying Party Credentials Framework. RSA Conference (2001) San Francisco, CA.
    • (2001) RSA Conference
    • Herzberg, A.1    Mass, Y.2
  • 17
    • 79551478054 scopus 로고
    • Bit commitment using pseudorandomness
    • Advances in Cryptology- 89, New York
    • Naor, M.: Bit commitment using pseudorandomness. Advances in Cryptology- 89 (1990) Lecture Notes in Computer Science, Vol. 435, New York.
    • (1990) Lecture Notes in Computer Science , vol.435
    • Naor, M.1
  • 24
    • 0345673941 scopus 로고    scopus 로고
    • IBM: (Ibm tivoli privacy wizard) Available at: www.tivoli.resource_center/ maximize/privacy/wizard_code.html.
    • Ibm Tivoli Privacy Wizard
  • 25
    • 24344460808 scopus 로고    scopus 로고
    • Center, J.J.R.: Jrc p3p resource centre (2002) Available athttp://p3p.jrc.it
    • Center, J.J.R.: Jrc p3p resource centre (2002) Available athttp://p3p.jrc.it.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.