메뉴 건너뛰기




Volumn 2002-January, Issue , 2002, Pages 271-281

Networking in the Solar Trust Model: Determining optimal trust paths in a decentralized trust network

Author keywords

Application software; Authentication; Certification; Computer security; Context modeling; Electronic commerce; Intelligent networks; Medical diagnostic imaging; Public key

Indexed keywords

APPLICATION PROGRAMS; AUTHENTICATION; DIAGNOSIS; ELECTRONIC COMMERCE; INTELLIGENT NETWORKS; MEDICAL IMAGING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA; SECURITY SYSTEMS;

EID: 4644335468     PISSN: 10639527     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSAC.2002.1176298     Document Type: Conference Paper
Times cited : (12)

References (14)
  • 1
    • 84872007983 scopus 로고
    • Information technology-open systems interconnection - The directory: Authentication framework
    • International Telecommunication Union
    • International Telecommunication Union. "Information Technology-Open Systems Interconnection-The Directory: Authentication Framework," ITU-T Recommendation X.509, pages 7-17. 1995
    • (1995) ITU-T Recommendation X , vol.509 , pp. 7-17
  • 9
    • 0002137142 scopus 로고    scopus 로고
    • In "Mobile Computing", edited by Tomasz Imielinski and Hank Korth, chapter 5, Kluwer Academic Publishers
    • David B. Johnson and David A. Maltz. "Dynamic Source Routing in Ad Hoc Wireless Networks". In "Mobile Computing", edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996
    • (1996) Dynamic Source Routing in Ad Hoc Wireless Networks , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 14
    • 84949049991 scopus 로고    scopus 로고
    • Findings from the May 2001 Workshop on Information-Security-System Rating and Ranking
    • Information Assurance 'Metrics', Dec 11, 2001
    • Bodeau, D. and Connolly, J. Findings from the May 2001 Workshop on Information-Security-System Rating and Ranking, as presented at the 17th Annual Computer Security Applications Conference in the tutorial on "Information Assurance 'Metrics'", Dec 11, 2001. http://www.acsac.org/2001/tutorials.html#tut7
    • 17th Annual Computer Security Applications Conference in the Tutorial on
    • Bodeau, D.1    Connolly, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.