메뉴 건너뛰기




Volumn 3, Issue 1, 2006, Pages 13-30

Achieving privacy in trust negotiations with an ontology-based approach

(4)  Squicciarini, Anna C a,b,f,g   Bertino, Elisa a,c,g,h,i,j,k,l   Ferrari, Elena a,d,l   Ray, Indrakshi a,e,m,n,o,p,q  


Author keywords

Ontology; Privacy; Trust negotiations

Indexed keywords

DIGITAL DEVICES; PROBLEM SOLVING; PUBLIC POLICY; REAL TIME SYSTEMS; SEMANTICS; SET THEORY;

EID: 32844474610     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2006.3     Document Type: Article
Times cited : (55)

References (26)
  • 2
    • 3142676730 scopus 로고    scopus 로고
    • Trust-χ - A peer to peer framework for trust establishment
    • Apr.
    • E Bertino, E. Ferrari, and A. Squicciarini, "Trust-χ - A Peer to Peer Framework for Trust Establishment," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 827-842, Apr. 2004.
    • (2004) IEEE Trans. Knowledge and Data Eng. , vol.16 , Issue.7 , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.3
  • 4
    • 0029324246 scopus 로고
    • Foundations on secure deductive databases
    • P. Bonatti and S. Kraus, "Foundations on Secure Deductive Databases," IEEE Trans. Knowledge and Data Eng., vol. 7, no. 3, pp. 406-422, 1995.
    • (1995) IEEE Trans. Knowledge and Data Eng. , vol.7 , Issue.3 , pp. 406-422
    • Bonatti, P.1    Kraus, S.2
  • 10
    • 35148839490 scopus 로고
    • A translation approach to portable ontology specifications
    • T.R. Gruber, "A Translation Approach to Portable Ontology Specifications," Knowledge Acquisition, vol. 5, no 2, pp. 199-220, 1993.
    • (1993) Knowledge Acquisition , vol.5 , Issue.2 , pp. 199-220
    • Gruber, T.R.1
  • 11
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • A. Herzberg et al., "Access Control Meets Public Key Infrastructure, or: Assigning Roles to Strangers," Proc. IEEE Symp. Security and Privacy, 2000.
    • (2000) Proc. IEEE Symp. Security and Privacy
    • Herzberg, A.1
  • 14
    • 0942268247 scopus 로고    scopus 로고
    • Retrieval effectiveness of an ontology-based model for information selection
    • L. Khan, D. McLeod, and E. Hovy, "Retrieval Effectiveness of an Ontology-Based Model for Information Selection," The VLDB J., vol. 13, no. 1, pp. 71-85, 2004.
    • (2004) The VLDB J. , vol.13 , Issue.1 , pp. 71-85
    • Khan, L.1    McLeod, D.2    Hovy, E.3
  • 16
    • 79551478054 scopus 로고
    • Bit commitment using pseudorandomness
    • Lecture Notes in Computer Science, New York
    • M. Naor, "Bit Commitment Using Pseudorandomness," Advances in Cryptology-89, vol. 435, Lecture Notes in Computer Science, New York, 1990.
    • (1990) Advances in Cryptology-89 , vol.435
    • Naor, M.1
  • 21
    • 0030166318 scopus 로고    scopus 로고
    • Ontologies: Principles, methods, and applications
    • M. Uschold and M. Gruninger, "Ontologies: Principles, Methods, and Applications," Knowledge Eng. Rev., vol. 11, no. 2, pp. 93-155, 1996.
    • (1996) Knowledge Eng. Rev. , vol.11 , Issue.2 , pp. 93-155
    • Uschold, M.1    Gruninger, M.2
  • 25
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy
    • Yu, T.1    Winslett, M.2
  • 26
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K.E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation," ACM Trans. Information and System Security, vol. 6, no. 1, 2003.
    • (2003) ACM Trans. Information and System Security , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.