메뉴 건너뛰기




Volumn 5283 LNCS, Issue , 2008, Pages 282-299

Distributed authorization by multiparty trust negotiation

Author keywords

[No Author keywords available]

Indexed keywords

SECURITY OF DATA; SECURITY SYSTEMS;

EID: 57049140502     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-88313-5_19     Document Type: Conference Paper
Times cited : (12)

References (31)
  • 1
    • 57049139376 scopus 로고    scopus 로고
    • URL: Health insurance portability and accountability act. Web Site (August 1996), http://www.hhs.gov/ocr/hipaa/
    • URL: Health insurance portability and accountability act. Web Site (August 1996), http://www.hhs.gov/ocr/hipaa/
  • 4
    • 84939548725 scopus 로고    scopus 로고
    • Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (January 2000)
    • Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition (January 2000)
  • 6
    • 12844287351 scopus 로고    scopus 로고
    • No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web
    • Gavriloaie, R., Nejdl, W., Olmedilla, D., Seamons, K., Winslett, M.: No registration needed: How to use declarative policies and negotiation to access sensitive resources on the semantic web. In: European Semantic Web Symposium. (2004)
    • (2004) European Semantic Web Symposium
    • Gavriloaie, R.1    Nejdl, W.2    Olmedilla, D.3    Seamons, K.4    Winslett, M.5
  • 9
    • 62349090353 scopus 로고    scopus 로고
    • Li, N., Mitchell, J.: RT: A role-based trust-management framework. In: Third DARPA Information Survivability Conference and Exposition (April 2003)
    • Li, N., Mitchell, J.: RT: A role-based trust-management framework. In: Third DARPA Information Survivability Conference and Exposition (April 2003)
  • 10
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symposium on Security and Privacy (2001)
    • (2001) IEEE Symposium on Security and Privacy
    • Jim, T.1
  • 13
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu, T., Winslett, M., Seamons, K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security 6( 1) (2003)
    • (2003) ACM Transactions on Information and System Security , vol.6 , pp. 1
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 14
    • 13244299177 scopus 로고    scopus 로고
    • Collaborative automated trust negotiation in peer-to-peer systems
    • Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
    • Ye, S., Makedon, F., Ford, J.: Collaborative automated trust negotiation in peer-to-peer systems. In: 4th International Conference on Peer-to-Peer Computing, Washington, DC, USA, pp. 108-115. IEEE Computer Society, Los Alamitos (2004)
    • (2004) 4th International Conference on Peer-to-Peer Computing , pp. 108-115
    • Ye, S.1    Makedon, F.2    Ford, J.3
  • 16
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • Gunter, C.A., Jim, T.: Policy-directed certificate retrieval. Software Practice and Experience 30(15), 1609-1640 (2000)
    • (2000) Software Practice and Experience , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 17
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • Li, N., Winsborough, W., Mitchell, J.: Distributed credential chain discovery in trust management. Journal of Computer Security 11(1) (February 2003)
    • (2003) Journal of Computer Security , vol.11 , Issue.1
    • Li, N.1    Winsborough, W.2    Mitchell, J.3
  • 18
    • 85016316172 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management with parameterized roles and constraints (short paper)
    • Mao, Z., Li, N., Winsborough, W.H.: Distributed credential chain discovery in trust management with parameterized roles and constraints (short paper). In: International Conference on Information and Communications Security, pp. 159-173 (2006)
    • (2006) International Conference on Information and Communications Security , pp. 159-173
    • Mao, Z.1    Li, N.2    Winsborough, W.H.3
  • 20
    • 38049063981 scopus 로고    scopus 로고
    • Efficient proving for practical distributed access-control systems
    • Biskup, J, López, J, eds, ESORICS 2007, Springer, Heidelberg
    • Bauer, L., Garriss, S., Reiter, M.K.: Efficient proving for practical distributed access-control systems. In: Biskup, J., López, J. (eds.) ESORICS 2007. LNCS, vol. 4734, pp. 19-37. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4734 , pp. 19-37
    • Bauer, L.1    Garriss, S.2    Reiter, M.K.3
  • 23
    • 0032047565 scopus 로고    scopus 로고
    • Concensus: Multi-party negotiation support for conflict resolution in concurrent engineering design
    • March
    • Cooper, S., Taleb-Bendiab, A.: Concensus: multi-party negotiation support for conflict resolution in concurrent engineering design. Journal of Intelligent Manufacturing 9(2) (March 1998)
    • (1998) Journal of Intelligent Manufacturing , vol.9 , Issue.2
    • Cooper, S.1    Taleb-Bendiab, A.2
  • 24
    • 34547480474 scopus 로고    scopus 로고
    • Multi-party negotiation when agents have subjective estimates of bargaining powers
    • September
    • Querou, N., Rio, P., Tidball, M.: Multi-party negotiation when agents have subjective estimates of bargaining powers. Journal of Group Decision and Negotiation 16(5) (September 2007)
    • (2007) Journal of Group Decision and Negotiation , vol.16 , Issue.5
    • Querou, N.1    Rio, P.2    Tidball, M.3
  • 26
    • 57049117969 scopus 로고    scopus 로고
    • Multiparty trust negotiation: A new approach to distributed authorization
    • Technical Report UIUCDCS-R-2008-2976, Department of Computer Science, University of Illinois at Urbana-Champaign
    • Zhang, C.C., Winslett, M.: Multiparty trust negotiation: A new approach to distributed authorization. Technical Report UIUCDCS-R-2008-2976, Department of Computer Science, University of Illinois at Urbana-Champaign (2008)
    • (2008)
    • Zhang, C.C.1    Winslett, M.2
  • 28
    • 84893110297 scopus 로고    scopus 로고
    • Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: IEEE International Workshop on Policies for Distributed Systems and Networks (April 2002)
    • Winsborough, W.H., Li, N.: Towards practical automated trust negotiation. In: IEEE International Workshop on Policies for Distributed Systems and Networks (April 2002)
  • 30
    • 33748485156 scopus 로고    scopus 로고
    • Attribute-based access control with hidden policies and hidden credentials
    • Frikken, K.B., Atallah, M.J., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE Transactions on Computers 55(10), 1259-1270 (2006)
    • (2006) IEEE Transactions on Computers , vol.55 , Issue.10 , pp. 1259-1270
    • Frikken, K.B.1    Atallah, M.J.2    Li, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.