메뉴 건너뛰기




Volumn 15, Issue 1, 2007, Pages 117-136

A negotiation scheme for access rights establishment in autonomic communication

Author keywords

Access control; Algorithms; Logic reasoning; Policy based access management; Protocols; Trust negotiation

Indexed keywords

AUTONOMIC COMMUNICATION; LOGIC REASONING; NEGOTIATION SCHEME; POLICY BASED ACCESS MANAGEMENT; TRUST NEGOTIATION;

EID: 33947544647     PISSN: 10647570     EISSN: None     Source Type: Journal    
DOI: 10.1007/s10922-006-9057-2     Document Type: Article
Times cited : (21)

References (15)
  • 2
    • 0347720836 scopus 로고    scopus 로고
    • An adaptive policy based framework for network services management
    • Plenum Press
    • L. Lymberopoulos, E. Lupu, and M. Sloman, An adaptive policy based framework for network services management, Journal of Network and Systems Management, Vol. 11, No. 3, pp. 277-303, 2003, Plenum Press.
    • (2003) Journal of Network and Systems Management , vol.11 , Issue.3 , pp. 277-303
    • Lymberopoulos, L.1    Lupu, E.2    Sloman, M.3
  • 3
    • 35248856852 scopus 로고    scopus 로고
    • Rule-based systems security model
    • Springer-Verlag Press
    • M. Smirnov, Rule-based systems security model. In Proc. of MMM-ACNS, pp. 135-146, 2003, Springer-Verlag Press.
    • (2003) Proc. of MMM-ACNS , pp. 135-146
    • Smirnov, M.1
  • 4
    • 84964853055 scopus 로고    scopus 로고
    • Access control: Policies, models, and mechanism
    • R. Focardi and F. Gorrieri eds, Foundations of Security Analysis and Design, of, Springer-Verlag Press
    • S. De Capitani di Vimercati and P. Samarati, Access control: Policies, models, and mechanism. In R. Focardi and F. Gorrieri (eds.), Foundations of Security Analysis and Design, Vol. 2171 of LNCS. Springer-Verlag Press, 2001.
    • (2001) LNCS , vol.2171
    • De Capitani di Vimercati, S.1    Samarati, P.2
  • 6
    • 0003593599 scopus 로고    scopus 로고
    • SPKI, IETF RFC 2693. Available from
    • SPKI, SPKI certificate theory, 1999. IETF RFC 2693. Available from http://www.ietf.org/rfc/rfc2693.txt.
    • (1999) SPKI certificate theory
  • 7
    • 62349090353 scopus 로고    scopus 로고
    • RT: A role-based trust-management framework
    • IEEE press
    • N. Li and J. C. Mitchell, RT: A role-based trust-management framework. In Proc. of DISCEX III Conf., pp. 201-212, 2003, IEEE press.
    • (2003) Proc. of DISCEX III Conf , pp. 201-212
    • Li, N.1    Mitchell, J.C.2
  • 8
    • 0036311802 scopus 로고    scopus 로고
    • A unified framework for regulating access and information release on the web
    • PP
    • P. Bonatti and P. Samarati, A unified framework for regulating access and information release on the web, Journal of Computer Security, Vol. 10, No. 3, PP. 241-272, 2002.
    • (2002) Journal of Computer Security , vol.10 , Issue.3 , pp. 241-272
    • Bonatti, P.1    Samarati, P.2
  • 9
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation, ACM Transactions on Information and System Security, Vol. 6, No. 1, pp. 1-42, 2003.
    • (2003) ACM Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 10
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • May IEEE press
    • T. Yu and M. Winslett, A unified scheme for resource protection in automated trust negotiation. In Proc. IEEE Symposium on Security and Privacy, pp. 110-122, May 2003 IEEE press.
    • (2003) Proc. IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 12
    • 33748042046 scopus 로고    scopus 로고
    • Interactive credential negotiation for stateful business processes
    • Springer-Verlag Press
    • H. Koshutanski and F. Massacci, Interactive credential negotiation for stateful business processes. In Proc. of In Proc. Conference, pp. 257-273, 2005, Springer-Verlag Press.
    • (2005) Proc. of In Proc. Conference , pp. 257-273
    • Koshutanski, H.1    Massacci, F.2
  • 13
    • 84864174077 scopus 로고    scopus 로고
    • Abduction and deduction in logic programming for access control for autonomic systems
    • Tech. Report, DIT-05-053, University of Trento, July
    • H. Koshutanski and F. Massacci, Abduction and deduction in logic programming for access control for autonomic systems. Tech. Report, DIT-05-053, University of Trento, July 2005. http://eprints.biblio.unitn.it/archive/ 00000821/0l/053.pdf.
    • (2005)
    • Koshutanski, H.1    Massacci, F.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.