메뉴 건너뛰기




Volumn 4237 LNCS, Issue , 2006, Pages 67-86

Adding support to XACML for dynamic delegation of authority in multiple domains

Author keywords

Credentials, attributes; Delegation of authority; PDP; Policies; XACML

Indexed keywords

COMPUTER SYSTEMS; DATA PROCESSING; DECISION MAKING; MATHEMATICAL MODELS; PUBLIC POLICY; SPECIFICATIONS;

EID: 33845225891     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11909033_7     Document Type: Conference Paper
Times cited : (16)

References (20)
  • 1
    • 84860057830 scopus 로고    scopus 로고
    • See http://dictionary.reference.com/search?=delegate
  • 4
    • 33646028994 scopus 로고    scopus 로고
    • Shibboleth architecture, protocols and profiles
    • 22 September
    • Scot Cantor. "Shibboleth Architecture, Protocols and Profiles, Working Draft 02, 22 September 2004, see http://shibboleth.internet2.edu/
    • (2004) Working Draft , vol.2
    • Cantor, S.1
  • 6
    • 84860051791 scopus 로고    scopus 로고
    • Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir) December
    • Internet2 Middleware Architecture Committee for Education, Directory Working Group (MACE-Dir) "EduPerson Specification (200312)", December 2003. Available from http://www.nmi-edit.org/eduPerson/internet2-mace-dir- eduperson-200312.html
    • (2003) EduPerson Specification (200312)
  • 13
    • 84860042587 scopus 로고    scopus 로고
    • VOMS: An authorization system for virtual organizations, 1st European across grids conference
    • 13-14 February
    • Alfieri R, et al. VOMS: an authorization system for virtual organizations, 1st European across grids conference, Santiago de Compostela. 13-14 February 2003. Available from: http://grid-auth.infn.it/docs/VOMS- Santiago.pdf
    • (2003) Santiago de Compostela
    • Alfieri, R.1
  • 17
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Ninghui Li, William H. Winsborough, John C. Mitchell. "Distributed credential chain discovery in trust management".Joumal of Computer Security 11 (2003) pp 35-86
    • (2003) Joumal of Computer Security , vol.11 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 19
    • 0011255177 scopus 로고    scopus 로고
    • Internet X.509 public key infrastructure certificate and Certificate Revocation List (CRL) profile
    • April
    • Housley, R., Ford, W., Polk, W., and Solo, D., "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC 3280, April 2000
    • (2000) RFC , vol.3280
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 20
    • 46449084609 scopus 로고    scopus 로고
    • Authorisation using attributes from multiple authorities
    • June, Manchester, UK
    • David Chadwick. "Authorisation using Attributes from Multiple Authorities" in Proceedings of WET-ICE 2006, June 2006, Manchester, UK
    • (2006) Proceedings of WET-ICE 2006
    • Chadwick, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.