메뉴 건너뛰기




Volumn 9, Issue 3, 2006, Pages 352-390

Safety in automated trust negotiation

Author keywords

Access control; Attribute based access control; Automated trust negotiation; Credentials; Safety; Strategy

Indexed keywords

ACCESS CONTROL; ATTRIBUTE BASED ACCESS CONTROL; AUTOMATED TRUST NEGOTIATION (ATN); CREDENTIALS;

EID: 33750915444     PISSN: 10949224     EISSN: 10949224     Source Type: Journal    
DOI: 10.1145/1178618.1178623     Document Type: Article
Times cited : (40)

References (28)
  • 4
    • 71649084902 scopus 로고    scopus 로고
    • DOMINGO-FERREE, J., Ed. Lecture Notes in Computer Science. Springer-Verlag, New York
    • DOMINGO-FERREE, J., Ed. 2002. Inference Control in Statistical Databases, From Theory to Practice. Lecture Notes in Computer Science, vol. 2316. Springer-Verlag, New York.
    • (2002) Inference Control in Statistical Databases, from Theory to Practice , vol.2316
  • 7
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • IEEE Computer Society Press, Piscataway, New Jersey
    • HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the 2000 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Piscataway, New Jersey. 2-14.
    • (2000) Proceedings of the 2000 IEEE Symposium on Security and Privacy , pp. 2-14
    • Herzberg, A.1    Mass, Y.2    Mihaeli, J.3    Naor, D.4    Ravid, Y.5
  • 14
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Li, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003c. Distributed credential chain discovery in trust management. Journal of Computer Security 11, 1 (Feb.), 35-86.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 FEB , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 15
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • RIVEST, R. L., SHAMIR, A., AND ADLEMAN, L. M. 1978. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 120-126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 20
    • 27844580738 scopus 로고    scopus 로고
    • Cardinality-based inference control in data cubes
    • Sept. 2004
    • WANG, L., WIJESEKERA, D., AND JAJODIA, S. 2003. Cardinality-based inference control in data cubes. Journal of Computer Security 12, 5 (Sept. 2004), 655-692.
    • (2003) Journal of Computer Security , vol.12 , Issue.5 , pp. 655-692
    • Wang, L.1    Wijesekera, D.2    Jajodia, S.3
  • 26
    • 0038148412 scopus 로고    scopus 로고
    • Unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society Press, Piscataway, New Jersey
    • Yu, T. AND WINSLETT, M. 2003b. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Piscataway, New Jersey. 110-122.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 28
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu, T., WINSLETT, M., AND SEAMONS, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6, 1 (Feb.), 1-42.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 FEB , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.