메뉴 건너뛰기




Volumn 4691 LNCS, Issue , 2007, Pages 170-184

Program partitioning using dynamic trust models

Author keywords

[No Author keywords available]

Indexed keywords

DATA REDUCTION; DATA STRUCTURES; DECENTRALIZED CONTROL; DYNAMIC ANALYSIS; PRINCIPAL COMPONENT ANALYSIS;

EID: 38049185201     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-75227-1_12     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 2
    • 84937395634 scopus 로고
    • A database encryption scheme which allows the computation of statistics using encrypted data
    • Los Angeles, Ca, USA, April, IEEE Computer Society Press, Los Alamito
    • Blakley, G.R., Meadows, C.: A database encryption scheme which allows the computation of statistics using encrypted data. In: SSP '85. Proceedings of the 1985 Symposium on Security and Privacy, Los Angeles, Ca., USA, April 1990, pp. 116-122. IEEE Computer Society Press, Los Alamito (1990)
    • (1990) SSP '85. Proceedings of the 1985 Symposium on Security and Privacy , pp. 116-122
    • Blakley, G.R.1    Meadows, C.2
  • 3
    • 38049177055 scopus 로고    scopus 로고
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust management system. Internet Request for Comment RFC 2704, Internet Engineering Task Force, Version 2 (September 1999)
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust management system. Internet Request for Comment RFC 2704, Internet Engineering Task Force, Version 2 (September 1999)
  • 4
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems security
    • Vitek, J, ed, Secure Internet Programming, Springer, Heidelberg
    • Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The role of trust management in distributed systems security. In: Vitek, J. (ed.) Secure Internet Programming. LNCS, vol. 1603, pp. 185-210. Springer, Heidelberg (1999)
    • (1999) LNCS , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 11
    • 0035577649 scopus 로고    scopus 로고
    • Communications - trust-based security in pervasive computing environments
    • Kagal, L., Finin, T.W., Joshi, A.: Communications - trust-based security in pervasive computing environments. IEEE Computer 34(12), 154-157 (2001)
    • (2001) IEEE Computer , vol.34 , Issue.12 , pp. 154-157
    • Kagal, L.1    Finin, T.W.2    Joshi, A.3
  • 12
    • 84947294004 scopus 로고    scopus 로고
    • Modelling a public-key infrastructure
    • Martella, G, Kurth, H, Montolivo, E, Bertino, E, eds, Computer Security, ESORICS, 1146, Springer, Heidelberg
    • Maurer, U.: Modelling a public-key infrastructure. In: Martella, G., Kurth, H., Montolivo, E., Bertino, E. (eds.) Computer Security - ESORICS 96. LNCS, vol. 1146, Springer, Heidelberg (1996)
    • (1996) LNCS , vol.96
    • Maurer, U.1
  • 13
    • 0032646625 scopus 로고    scopus 로고
    • Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL, pp. 228-241 (1999)
    • Myers, A.C.: JFlow: Practical mostly-static information flow control. In: POPL, pp. 228-241 (1999)
  • 17
    • 38049168776 scopus 로고    scopus 로고
    • Automated trust negotiation. Technical Report TR-2000-05, Department of Computer Science, North Carolina State University, April 24 2000
    • GMT, 24 April
    • Winsborough, W., Seamons, K., Jones, V.: Automated trust negotiation. Technical Report TR-2000-05, Department of Computer Science, North Carolina State University, April 24 2000. Monday, 24 April 2000 17:07:47 GMT
    • (2000) Monday , vol.17 , Issue.7 , pp. 47
    • Winsborough, W.1    Seamons, K.2    Jones, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.