메뉴 건너뛰기




Volumn 2004, Issue , 2004, Pages 147-160

Safety in Automated Trust Negotiation

Author keywords

[No Author keywords available]

Indexed keywords

ATTRIBUTE-BASED ACCESS CONTROL (ABAC); AUTOMATED TRUST NEGOTIATION (ATN); CREDENTIAL SYSTEMS;

EID: 3543128965     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECPRI.2004.1301321     Document Type: Conference Paper
Times cited : (103)

References (27)
  • 12
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Feb.
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, Feb. 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 13
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21:120-126, 1978.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 21
    • 3543092307 scopus 로고    scopus 로고
    • Safety in automated trust negotiation
    • Center for Secure Information Systems, George Mason University, Mar.
    • W. H. Winsborough and N. Li. Safety in automated trust negotiation. Technical Report CSIS-TR-1-04, Center for Secure Information Systems, George Mason University, Mar. 2004.
    • (2004) Technical Report , vol.CSIS-TR-1-04
    • Winsborough, W.H.1    Li, N.2
  • 26
    • 0038148412 scopus 로고    scopus 로고
    • Unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society Press, May
    • T. Yu and M. Winslett. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, pages 110-122. IEEE Computer Society Press, May 2003.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 27
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Feb.
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1):1-42, Feb. 2003.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.