메뉴 건너뛰기




Volumn 9, Issue , 2004, Pages 146-155

Role-based cascaded delegation

Author keywords

Access Control; Delegation; RBAC; Trust Management

Indexed keywords

ALGORITHMS; COMPUTATIONAL METHODS; COMPUTER OPERATING SYSTEMS; CRYPTOGRAPHY; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION MANAGEMENT; MATHEMATICAL MODELS; PUBLIC POLICY; SERVERS; SOCIETIES AND INSTITUTIONS; XML;

EID: 4143059136     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/990036.990061     Document Type: Conference Paper
Times cited : (46)

References (31)
  • 1
    • 4143143144 scopus 로고    scopus 로고
    • Comparison of graph-search algorithms for authorization verification in delegation networks
    • November
    • T. Aura. Comparison of graph-search algorithms for authorization verification in delegation networks. In 2nd Nordic Workshop on Secure Computer Systems NORDSEC'97, November 1997.
    • (1997) 2nd Nordic Workshop on Secure Computer Systems NORDSEC'97
    • Aura, T.1
  • 6
    • 35248835575 scopus 로고    scopus 로고
    • Aggregate and verifiably encrypted signatures from bilinear maps.n
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. Aggregate and verifiably encrypted signatures from bilinear maps. In EUROCRYPT 2003, pages 416-432, 2003.
    • (2003) EUROCRYPT 2003 , pp. 416-432
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 7
    • 4143140890 scopus 로고    scopus 로고
    • A survey of two signature aggregation techniques
    • D. Boneh, C. Gentry, B. Lynn, and H. Shacham. A survey of two signature aggregation techniques. CryptoBytes, 6(2), 2003.
    • (2003) CryptoBytes , vol.6 , Issue.2
    • Boneh, D.1    Gentry, C.2    Lynn, B.3    Shacham, H.4
  • 15
    • 35248866223 scopus 로고    scopus 로고
    • Certificate-based encryption and the certificate revocation problem
    • C. Gentry. Certificate-based encryption and the certificate revocation problem. In EUROCRYPT 2003, pages 272-293, 2003.
    • (2003) EUROCRYPT 2003 , pp. 272-293
    • Gentry, C.1
  • 18
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • September
    • C. A. Gunter and T. Jim. Policy-directed certificate retrieval. Software: Practice and Experience, 30:1609-1640, September 2000.
    • (2000) Software: Practice and Experience , vol.30 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 19
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, May
    • T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, May 2001.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 21
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • N. Li, W. H. Winsborough, and J. C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 27
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems
    • R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public key cryptosystems. Commun. ACM, 21:120-126, 1978.
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 31
    • 84862392463 scopus 로고    scopus 로고
    • http://sunxacml.sourceforge.net/
    • XACML. http://www.oasis-open.org/committees/xacml/ and http://sunxacml.sourceforge.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.