메뉴 건너뛰기




Volumn 4, Issue 3, 2004, Pages 185-207

A trust negotiation system for digital library web services

Author keywords

Conceptual modeling; Digital libraries; Lifecycle management; Trust negotiation; Web services

Indexed keywords


EID: 33746699343     PISSN: 14325012     EISSN: 14321300     Source Type: Journal    
DOI: 10.1007/s00799-004-0083-y     Document Type: Article
Times cited : (11)

References (43)
  • 2
  • 4
    • 0002848811 scopus 로고    scopus 로고
    • The specification and enforcement of authorization constraints in workflow management systems
    • Bertino E, Ferrari E, Atluri V (2002) The specification and enforcement of authorization constraints in workflow management systems. ACM Trans Inf Syst Secur 2:65-104
    • (2002) ACM Trans Inf Syst Secur , vol.2 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 10
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the Web
    • Bonatti P, Samarati P (2002) A unified framework for regulating access and information release on the Web. J Comput Secur 10:241-272
    • (2002) J Comput Secur , vol.10 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 12
    • 4243187007 scopus 로고    scopus 로고
    • Business-oriented management of Web services
    • Casati F, Shan E, Dayal U, Shan MC (2003) Business-oriented management of Web services. Commun ACM 46:55-60
    • (2003) Commun ACM , vol.46 , pp. 55-60
    • Casati, F.1    Shan, E.2    Dayal, U.3    Shan, M.C.4
  • 22
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • Berkeley, CA. IEEE Press, Los Alamitos, CA
    • Herzberg A, Mass Y, Mihaeli J, Naor D, Ravid Y (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: Proc. IEEE symposium on security and privacy, Berkeley, CA. IEEE Press, Los Alamitos, CA, pp 2-14
    • (2000) Proc. IEEE Symposium On Security and Privacy , pp. 2-14
    • Herzberg, A.1    Mass, Y.2    Mihaeli, J.3    Naor, D.4    Ravid, Y.5
  • 31
    • 35248864500 scopus 로고    scopus 로고
    • Concurrent and real-time update of access control policies
    • Prague, Czech Republic. Lecture notes in computer science, Springer, Berlin Heidelberg New York
    • Ray I, Xin T (2003) Concurrent and real-time update of access control policies. In: Proc. 14th international on workshop database and expert systems applications (DEXA'03), Prague, Czech Republic. Lecture notes in computer science, vol 2736. Springer, Berlin Heidelberg New York, pp 330-339
    • (2003) Proc. 14th International On Workshop Database and Expert Systems Applications (DEXA'03) , vol.2736 , pp. 330-339
    • Ray, I.1    Xin, T.2
  • 32
    • 1142273446 scopus 로고    scopus 로고
    • PFIRES: A policy framework for information security
    • Rees J, Bandyopadhyay S, Spafford EH (2003) PFIRES: A policy framework for information security. Commun ACM 46:101-106
    • (2003) Commun ACM , vol.46 , pp. 101-106
    • Rees, J.1    Bandyopadhyay, S.2    Spafford, E.H.3
  • 33
    • 0028513932 scopus 로고
    • Access control: Principles and practice
    • Sandhu RS, Samarati P (1994) Access control: principles and practice. IEEE Commun Mag 32:40-48
    • (1994) IEEE Commun Mag , vol.32 , pp. 40-48
    • Sandhu, R.S.1    Samarati, P.2
  • 37
    • 85008030215 scopus 로고    scopus 로고
    • State machines
    • Thomas D, Hunt A (2002) State machines. IEEE Softw 19: 10-12
    • (2002) IEEE Softw , vol.19 , pp. 10-12
    • Thomas, D.1    Hunt, A.2
  • 38
    • 84867569718 scopus 로고    scopus 로고
    • UDDI.org, Discovery, And Integration
    • UDDI.org (2003) Universal Description, Discovery, And Integration. www.uddi.org
    • (2003) Universal Description
  • 39
    • 10444249814 scopus 로고    scopus 로고
    • VeriSign, (current April 2003)
    • VeriSign (2003) Trust Services Integration Kit (TSIK). (www.xmltrustcenter.org/developer/verisign/tsik) (current April 2003)
    • (2003) Trust Services Integration Kit (TSIK)
  • 42
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • Berkeley, CA. IEEE Press, Los Alamitos, CA
    • Yu T, Winslett M (2003) A unified scheme for resource protection in automated trust negotiation. In: Proc. IEEE symposium on security and privacy, Berkeley, CA. IEEE Press, Los Alamitos, CA, pp 110-122
    • (2003) Proc. IEEE Symposium On Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 43
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu T, Winslett M, Seamons KE (2003) Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans Inf Syst Secur 6:1-42
    • (2003) ACM Trans Inf Syst Secur , vol.6 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.