메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 39-48

Traust: A trust negotiation-based authorization service for open systems

Author keywords

Attribute based access control; Credentials; Trust negotiation

Indexed keywords

ATTRIBUTE BASED ACCESS CONTROL; CREDENTIALS; POLICY LANGUAGES; TRUST NEGOTIATION;

EID: 33748089681     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (23)

References (31)
  • 4
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • G. R. Blakley. Safeguarding cryptographic keys. In AFIPS Conference Proceedings, volume 48, pages 313-317, 1979.
    • (1979) AFIPS Conference Proceedings , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 8
    • 0020720357 scopus 로고
    • On the security of public key protocols
    • Mar.
    • D. Dolev and A. C. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, IT-29(2):198-208, Mar. 1983.
    • (1983) IEEE Transactions on Information Theory , vol.IT-29 , Issue.2 , pp. 198-208
    • Dolev, D.1    Yao, A.C.2
  • 12
    • 84858939576 scopus 로고    scopus 로고
    • Web Page, May
    • Internet security research lab-projects. Web Page, May 2005. 〈http://isrl.cs.byu.edu/TrustBuilder.html〉.
    • (2005)
  • 21
    • 0016555241 scopus 로고
    • The protection of information in computer systems
    • Sep.
    • J. H. Saltzer and M. D. Schroeder. The protection of information in computer systems. Proceedings of the IEEE, 63(9):1278-1308, Sep. 1975.
    • (1975) Proceedings of the IEEE , vol.63 , Issue.9 , pp. 1278-1308
    • Saltzer, J.H.1    Schroeder, M.D.2
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • Nov.
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, Nov. 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 30
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Feb.
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security, 6(1), Feb. 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.