메뉴 건너뛰기




Volumn , Issue , 2007, Pages

Supporting robust and secure interactions in open domains through recovery of trust negotiations

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK PROTOCOLS; ROBUSTNESS (CONTROL SYSTEMS); SYSTEMS ANALYSIS;

EID: 34848877469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2007.144     Document Type: Conference Paper
Times cited : (15)

References (15)
  • 2
  • 3
    • 0042078549 scopus 로고    scopus 로고
    • A survey of rollback-recovery protocols in message-passing systems
    • E. N. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Comput. Surv., 34(3):375-408, 2002.
    • (2002) ACM Comput. Surv , vol.34 , Issue.3 , pp. 375-408
    • Elnozahy, E.N.1    Alvisi, L.2    Wang, Y.-M.3    Johnson, D.B.4
  • 4
    • 9144223280 scopus 로고    scopus 로고
    • Checkpointing for peta-scale systems: A look into the future of practical rollback-recovery
    • E. N. Elnozahy and J. S. Plank. Checkpointing for peta-scale systems: A look into the future of practical rollback-recovery. IEEE Trans. Dependable Sec. Comput., 1(2):97-108, 2004.
    • (2004) IEEE Trans. Dependable Sec. Comput , vol.1 , Issue.2 , pp. 97-108
    • Elnozahy, E.N.1    Plank, J.S.2
  • 9
    • 84969346266 scopus 로고
    • A certified digital signature
    • New York, NY, USA, Springer-Verlag New York, Inc
    • R. C. Merkle. A certified digital signature. In CRYPTO '89: Proceedings on Advances in cryptology, pages 218-238, New York, NY, USA, 1989. Springer-Verlag New York, Inc.
    • (1989) CRYPTO '89: Proceedings on Advances in cryptology , pp. 218-238
    • Merkle, R.C.1
  • 10
    • 11344261340 scopus 로고    scopus 로고
    • Approaches to fault-tolerant and transactional mobile agent execution-an algorithmic view
    • S. Pleisch and A. Schiper. Approaches to fault-tolerant and transactional mobile agent execution-an algorithmic view. ACM Comput. Surv., 36(3):219-262, 2004.
    • (2004) ACM Comput. Surv , vol.36 , Issue.3 , pp. 219-262
    • Pleisch, S.1    Schiper, A.2
  • 11
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In NDSS, 2001.
    • (2001) NDSS
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3
  • 12
    • 34848881183 scopus 로고    scopus 로고
    • Supporting robust and secure interactions in open domains through recovery of trust negotiations
    • A. C. Squicciarini, A. Trombetta, and E. Bertino. Supporting robust and secure interactions in open domains through recovery of trust negotiations. CERIAS Technical Report.
    • CERIAS Technical Report
    • Squicciarini, A.C.1    Trombetta, A.2    Bertino, E.3
  • 14
    • 0034449542 scopus 로고    scopus 로고
    • Prunes: An efficient and complete strategy for automated trust negotiation over the internet
    • T. Yu, X. Ma, and M. Winslett. Prunes: an efficient and complete strategy for automated trust negotiation over the internet. In ACM Conference on Computer and Communications Security, pages 210-219, 2000.
    • (2000) ACM Conference on Computer and Communications Security , pp. 210-219
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 15
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In IEEE Symposium on Security and Privacy, pages 110-122, 2003.
    • (2003) IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.