메뉴 건너뛰기




Volumn , Issue , 2007, Pages 442-449

Improving negotiation efficiency and success in automated trust negotiation

Author keywords

[No Author keywords available]

Indexed keywords

AUTOMATED TRUST NEGOTIATIONS; MUTUAL TRUSTS; NEW CONCEPTS; POLICY LANGUAGES; SENSITIVE INFORMATIONS;

EID: 57849097560     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SITIS.2007.27     Document Type: Conference Paper
Times cited : (2)

References (31)
  • 5
    • 1642327001 scopus 로고    scopus 로고
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.^CM Transactions on Information and System Security (TISSEC), 6(1), February 2003.
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.^CM Transactions on Information and System Security (TISSEC), 6(1), February 2003.
  • 7
    • 26444566795 scopus 로고    scopus 로고
    • Oblivious attribute certificates
    • rd Conference on Applied Cryptography and Network Security ACNS, of, Springer, June
    • rd Conference on Applied Cryptography and Network Security (ACNS), volume 3531 of Lecture Notes in Computer Science, Springer, June 2005. 301-317.
    • (2005) Lecture Notes in Computer Science , vol.3531 , pp. 301-317
    • Li, J.1    OACerts, N.L.2
  • 9
    • 84945135810 scopus 로고    scopus 로고
    • An efficient system for non-transferable anonymous credentials with optional anonymity revocation
    • Advances in Cryptology: EUROCRYPT '01, of, Springer
    • J. Camenisch and A. Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology: EUROCRYPT '01, volume 2045 of Lecture Notes in Computer Science, Springer, 2001. 93-118.
    • (2001) Lecture Notes in Computer Science , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 35248834606 scopus 로고    scopus 로고
    • Datalog with constraints: A foundation for trust management languages
    • Veronica D, Philip W, eds. Proc. of the 5th Int'l Symp. on Practical Aspects of Declarative Languages, Berlin, Heidelberg: Springer-Verlag
    • N. Li, J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In: Veronica D, Philip W, eds. Proc. of the 5th Int'l Symp. on Practical Aspects of Declarative Languages. LNCS 2562, Berlin, Heidelberg: Springer-Verlag, 2003. pp. 58-73.
    • (2003) LNCS , vol.2562 , pp. 58-73
    • Li, N.1    Mitchell, J.C.2
  • 21
    • 0038148412 scopus 로고    scopus 로고
    • Unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society Press, May
    • T. Yu and M. Winslett. Unified scheme for resource protection in automated trust negotiation. In Proceedings of IEEE Symposium on Security and Privacy, IEEE Computer Society Press, May 2003. pp. 110-122.
    • (2003) Proceedings of IEEE Symposium on Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 25
    • 0035791550 scopus 로고    scopus 로고
    • On Specifying Security Police for Web Documents with an XML-based Languages
    • ACM Press
    • E. Bertino, S. Castano, E. Ferrari. On Specifying Security Police for Web Documents with an XML-based Languages. In proceeding of 6th ACM SACMAT, ACM Press, 2001, pp. 18-23.
    • (2001) proceeding of 6th ACM SACMAT , pp. 18-23
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 28
    • 34547505017 scopus 로고    scopus 로고
    • A. Squicciarini 1, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham. PP-Trust-X : A System for Privacy Preserving Trust Negotiations. ACM Transactions on Information and System Security(TISSEC), ACM Press, 2007, 10(3). pp. 1-50.
    • A. Squicciarini 1, E. Bertino, E. Ferrari, F. Paci, B. Thuraisingham. PP-Trust-X : A System for Privacy Preserving Trust Negotiations. ACM Transactions on Information and System Security(TISSEC), ACM Press, 2007, 10(3). pp. 1-50.
  • 29
    • 0001832779 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, Or: Assigning roles to strangers
    • IEEE CS Press
    • A. Herzberg, Mihaeli, Y. Mass, D. Naor, Y. Ravid. Access control meets public key infrastructure, Or: Assigning roles to strangers. IEEE Symposium on Security and Privacy. IEEE CS Press, 2000. pp. 230-243.
    • (2000) IEEE Symposium on Security and Privacy , pp. 230-243
    • Herzberg, A.1    Mihaeli2    Mass, Y.3    Naor, D.4    Ravid, Y.5
  • 30
    • 33646932243 scopus 로고    scopus 로고
    • A XACML-base Access Control Model for Web Service. Wireless Communications, Networking and Mobile
    • H. Tao. A XACML-base Access Control Model for Web Service. Wireless Communications, Networking and Mobile Computing, 2005. pp. 23-26.
    • (2005) Computing , pp. 23-26
    • Tao, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.