메뉴 건너뛰기




Volumn , Issue , 2005, Pages 168-179

PeerAceess: A logic for distributed authorization

Author keywords

Distributed authorization; Logical signature; P2p systems; Proof hints; Release policies; Sticky policies

Indexed keywords

COMPUTATIONAL METHODS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; KNOWLEDGE BASED SYSTEMS; OPEN SYSTEMS; PARAMETER ESTIMATION; RESOURCE ALLOCATION; SEMANTICS;

EID: 33745792729     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1102120.1102144     Document Type: Conference Paper
Times cited : (42)

References (25)
  • 5
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • M. Blaze, J. Feigenbaum, and A. D. Keromytis. KeyNote: Trust management for public-key infrastructures (position paper). Lect. Notes in Computer Science, 1550:59-63, 1999.
    • (1999) Lect. Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 10
    • 12844287351 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
    • R. Gavriloaie, W. Nejdl, D. Olmedilla, K. Seamons, and M. Winslett. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In European Semantic Web Symposium, 2004.
    • (2004) European Semantic Web Symposium
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.4    Winslett, M.5
  • 13
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • T. Jim. SD3: A trust management system with certified evaluation. In IEEE Symp. on Security and Privacy, 2001.
    • (2001) IEEE Symp. on Security and Privacy
    • Jim, T.1
  • 18
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Feb.
    • N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1), Feb. 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 25
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. on Info. and System Security, 6(1), 2003.
    • (2003) ACM Trans. on Info. and System Security , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.