메뉴 건너뛰기




Volumn , Issue , 2005, Pages 1-10

Integrity constraints in trust management

Author keywords

Access control; Distributed system security; Integrity; Trust management

Indexed keywords

CONTROL SYSTEM ANALYSIS; DISTRIBUTED COMPUTER SYSTEMS; PUBLIC POLICY; SECURITY OF DATA;

EID: 30644480441     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1063979.1063981     Document Type: Conference Paper
Times cited : (9)

References (18)
  • 2
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag
    • M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of LNCS, pages 185-210. Springer-Verlag, 1999.
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.4
  • 7
    • 30644475433 scopus 로고    scopus 로고
    • Integrity constraints in trust management
    • Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, March
    • S. Etalle and W. H. Winsborough. Integrity constraints in trust management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, March 2005.
    • (2005) Technical Report , vol.TR-CTIT-05-12
    • Etalle, S.1    Winsborough, W.H.2
  • 8
    • 0001348573 scopus 로고    scopus 로고
    • Integrity constraints: Semantics and applications
    • J. Chomicki and G. Saake, editors. Kluwer Academic
    • P. Godfrey, J. Grant, J. Gryz, and J. Minker. Integrity constraints: Semantics and applications. In J. Chomicki and G. Saake, editors, Logics for Databases and Information Systems, pages 265-306. Kluwer Academic, 1998.
    • (1998) Logics for Databases and Information Systems , pp. 265-306
    • Godfrey, P.1    Grant, J.2    Gryz, J.3    Minker, J.4
  • 9
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • September
    • C. Gunter and T. Jim. Policy-directed certificate retrieval. Software: Practice & Experience, 30(15):1609-1640, September 2000.
    • (2000) Software: Practice & Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.1    Jim, T.2
  • 10
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, May
    • T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, May 2001.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 11
    • 0036085965 scopus 로고    scopus 로고
    • Design of a role-based trust-management framework
    • IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
    • N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In Proc. of the IEEE Symposium on Research in Security and Privacy, pages 114-130. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, 2002.
    • (2002) Proc. of the IEEE Symposium on Research in Security and Privacy , pp. 114-130
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 12
    • 30644467444 scopus 로고    scopus 로고
    • Beyond proof of compliance: Security analysis in trust management
    • To appear
    • N. Li, J. Mitchell, and W. Winsborough. Beyond proof of compliance: Security analysis in trust management. Journal of ACM, 2004. To appear.
    • (2004) Journal of ACM
    • Li, N.1    Mitchell, J.2    Winsborough, W.3
  • 13
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust management languages
    • V. Dahl and P. Wadler, editors, 5th International Symposium on Practical Aspects of Declarative Languages (PADL'03). Springer-Verlag
    • N. Li and J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In V. Dahl and P. Wadler, editors, 5th International Symposium on Practical Aspects of Declarative Languages (PADL'03), volume 2562 of LNCS, pages 58-73. Springer-Verlag, 2003.
    • (2003) LNCS , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 14
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 17


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.