메뉴 건너뛰기




Volumn 157, Issue 3, 2006, Pages 3-9

Why Trust is Bad for Security

Author keywords

Access control; security policies; trust; trust management; trusted code; trusted computing

Indexed keywords

CODES (SYMBOLS); COMPUTER PRIVACY; DATA PRIVACY; PROBLEM SOLVING; PUBLIC POLICY;

EID: 33646562485     PISSN: 15710661     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.entcs.2005.09.044     Document Type: Article
Times cited : (29)

References (10)
  • 1
    • 33646589068 scopus 로고    scopus 로고
    • D.E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, Bedford, MA, May 1973
  • 2
    • 33646545431 scopus 로고    scopus 로고
    • Matt Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The KeyNote Trust-Management System Version 2, September 1999. RFC 2704
  • 3
    • 0029700344 scopus 로고    scopus 로고
    • Matt Blaze, Joan Feigenbaum, and Jack Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164-173, 1996
  • 4
    • 33646578543 scopus 로고    scopus 로고
    • Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. DEC Systems Research Center, Report 39, revised February 22 1990
  • 5
    • 33646593567 scopus 로고    scopus 로고
    • Overview of the AT&T Labs trust-management project
    • Security Protocols, Springer Verlag
    • Feigenbaum J. Overview of the AT&T Labs trust-management project. Security Protocols. LNCS 1550 (1998), Springer Verlag 45-50
    • (1998) LNCS , vol.1550 , pp. 45-50
    • Feigenbaum, J.1
  • 7
    • 33646551532 scopus 로고    scopus 로고
    • Trusted Computing Group. TCG Glossary, July 2004. Revision 0.1
  • 10
    • 33646541124 scopus 로고    scopus 로고
    • US Department of Defense. DoD Trusted Computer System Evaluation Criteria, 1985. DOD 5200.28-STD


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.