메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 14-23

Driving and monitoring provisional trust negotiation with metapolicies

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEMS; DECISION MAKING; METADATA; MONITORING;

EID: 33745004626     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2005.13     Document Type: Conference Paper
Times cited : (106)

References (18)
  • 6
    • 84944048132 scopus 로고    scopus 로고
    • The ponder policy specification language
    • Proc. of POLICY 2001, Springer
    • N. Damianou, N. Dulay, E. Lupu, M. Sloman. The Ponder Policy Specification Language, In Proc. of POLICY 2001, LNCS 1995, p.18-38, Springer, 2001
    • (2001) LNCS 1995 , pp. 18-38
    • Damianou, N.1    Dulay, N.2    Lupu, E.3    Sloman, M.4
  • 11
    • 0000788149 scopus 로고    scopus 로고
    • Law-governed interaction: A coordination & control mechanism for heterogeneous distributed systems
    • N. Minsky, V. Ungureanu. Law-Governed Interaction: A Coordination & Control Mechanism for Heterogeneous Distributed Systems. ACM Transactions on Software Engineering and Methodology (TOSEM) 9(3):273-305, 2000
    • (2000) ACM Transactions on Software Engineering and Methodology (TOSEM) , vol.9 , Issue.3 , pp. 273-305
    • Minsky, N.1    Ungureanu, V.2
  • 15
    • 21144448916 scopus 로고    scopus 로고
    • How to design a general rule markup language?
    • XML Technologien für das Semantic Web - XSW 2002, 24.-25 Juni 2002, Berlin
    • Wagner, G.: How to design a general rule markup language? In: XML Technologien für das Semantic Web - XSW 2002, Proceedings zum Workshop, 24.-25 Juni 2002, Berlin. (2002)
    • (2002) Proceedings Zum Workshop
    • Wagner, G.1
  • 18
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu, M. Winslett. A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy, pp. 110-122, 2003
    • (2003) IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.