메뉴 건너뛰기




Volumn 7, Issue 3, 2004, Pages 428-456

Content-triggered trust negotiation

Author keywords

Access control; Authentication; Credentials; Trust negotiation

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CREDENTIALS; TRUST NEGOTIATION;

EID: 4444341241     PISSN: 10949224     EISSN: None     Source Type: Journal    
DOI: 10.1145/1015040.1015044     Document Type: Article
Times cited : (23)

References (32)
  • 3
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil pairing
    • Lecture Notes in Computer Science, Springer, Berlin
    • BONEH, D. AND FRANKLIN, M. 2001. Identity-based encryption from the Weil pairing. In Proceedings of Crypto 2001. Lecture Notes in Computer Science, vol. 2139. Springer, Berlin 213-229.
    • (2001) Proceedings of Crypto 2001 , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 8
    • 4444380554 scopus 로고    scopus 로고
    • M.S. thesis, Computer Science Department, Brigham Young University
    • HESS, A. 2003. Content-Triggered Trust Negotiation. M.S. thesis, Computer Science Department, Brigham Young University.
    • (2003) Content-Triggered Trust Negotiation
    • Hess, A.1
  • 16
    • 35048837841 scopus 로고    scopus 로고
    • http://www.projectliberty.org
    • Liberty Alliance Project. Available at http://www.projectliberty.org 2002. http://www.projectliberty.org.
    • Liberty Alliance Project
  • 17
    • 0242571324 scopus 로고
    • A fuzzy document retrieval system using the keyword connection matrix and its learning method
    • OGAWA, Y., MORITA, T., AND KOBAYASHI, K. 1991. A fuzzy document retrieval system using the keyword connection matrix and its learning method. Fuzzy Sets Syst 38, 17-41.
    • (1991) Fuzzy Sets Syst , vol.38 , pp. 17-41
    • Ogawa, Y.1    Morita, T.2    Kobayashi, K.3
  • 18
    • 0003260540 scopus 로고
    • Simple mail transfer protocol
    • POSTEL, J. 1982. Simple Mail Transfer Protocol. RFC 821.
    • (1982) RFC , vol.821
    • Postel, J.1
  • 20
    • 79959883118 scopus 로고
    • Computer evaluation of indexing and text processing
    • SALTON, G. AND LESK, M. 1968. Computer evaluation of indexing and text processing. J. ACM 15, 1, 8-36.
    • (1968) J. ACM , vol.15 , Issue.1 , pp. 8-36
    • Salton, G.1    Lesk, M.2
  • 22
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • San Diego, CA
    • SEAMONS, K. E., WINSLETT, M., AND YU, T. 2001. Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, San Diego, CA. 109-124.
    • (2001) Network and Distributed System Security Symposium , pp. 109-124
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3
  • 28
    • 33847415631 scopus 로고    scopus 로고
    • W3C, W3C, Http://www.w3.org/TR/WD-P3P/Overview.html.
    • W3C, http://www.w3.org/TR/WD-P3P/Overview.html. Platform for Privacy Preferences (P3P) Specification. W3C, http://www.w3.org/TR/WD-P3P/Overview.html.
    • Platform for Privacy Preferences (P3P) Specification
  • 32
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation
    • YU, T., WINSLETT, M., AND SEAMONS, K. E. 2003. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6, 1 (Feb.), 1-42.
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 FEB. , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.