메뉴 건너뛰기




Volumn 8, Issue 2, 2009, Pages 89-101

Denial of service attacks and defenses in decentralized trust management

Author keywords

Access control; Denial of service; Game theory; Trust management; Trust negotiation

Indexed keywords

AD HOC NETWORKS; AUTHENTICATION; COMPUTER CRIME; GAME THEORY; QUERY LANGUAGES; SECURITY OF DATA; SECURITY SYSTEMS; SERVERS; TRANSMISSION CONTROL PROTOCOL;

EID: 60849112554     PISSN: 16155262     EISSN: 16155270     Source Type: Journal    
DOI: 10.1007/s10207-008-0068-8     Document Type: Article
Times cited : (10)

References (30)
  • 4
    • 0036083264 scopus 로고    scopus 로고
    • Binder, a logic-based security language
    • In: IEEE Computer Society Press, Washington, DC
    • DeTreville, J.: Binder, a logic-based security language. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 105-113. IEEE Computer Society Press, Washington, DC (2002)
    • (2002) Proceedings of the 2002 IEEE Symposium on Security and Privacy , pp. 105-113
    • DeTreville, J.1
  • 6
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • Gunter C.A., Jim T.: Policy-directed certificate retrieval. Softw. Pract. Exp. 30(15), 1609-1640 (2000)
    • (2000) Softw. Pract. Exp. , vol.30 , Issue.15 , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 7
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • In: IEEE Computer Society Press, Washington, DC
    • Jim, T.: SD3: A trust management system with certified evaluation. In: Proceedings of the 2001 IEEE Symposium on Security and Privacy, pp. 106-115. IEEE Computer Society Press, Washington, DC (2001)
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 8
    • 0041524661 scopus 로고    scopus 로고
    • Delegation Logic: A logic-based approach to distributed authorization
    • Li N., Grosof B.N., Feigenbaum J.: Delegation Logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur. 6(1), 128-171 (2003)
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 10
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Li N., Winsborough W.H., Mitchell J.C.: Distributed credential chain discovery in trust management. J. Comput. Secur. 11(1), 35-86 (2003)
    • (2003) J. Comput. Secur. , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 13
    • 50049125824 scopus 로고    scopus 로고
    • Server's benchmarks. www.sun.com/servers/coolthreads/t1000/benchmarks.jsp
    • Server's Benchmarks
  • 16
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu T., Winslett M., Seamons K.E.: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1), 1-42 (2003)
    • (2003) ACM Trans. Inf. Syst. Secur. , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 19
    • 85010849899 scopus 로고    scopus 로고
    • Denial of service via algorithmic complexity attacks
    • Crosby, S.A., Wallach, D.S.: Denial of service via algorithmic complexity attacks. USENIX Security (2003)
    • (2003) USENIX Security
    • Crosby, S.A.1    Wallach, D.S.2
  • 20
    • 0035075103 scopus 로고    scopus 로고
    • A cost-based framework for analysis of denial of service networks
    • Meadows C.: A cost-based framework for analysis of denial of service networks. J. Comput. Secur. 9, 143-164 (2001)
    • (2001) J. Comput. Secur. , vol.9 , pp. 143-164
    • Meadows, C.1
  • 25
    • 0004078695 scopus 로고    scopus 로고
    • The KeyNote trust-management system
    • Keromytis, A.D.: The KeyNote trust-management system
    • Keromytis, A.D.1
  • 26
    • 84892446001 scopus 로고    scopus 로고
    • Crypto benchmarks. www.eskimo.com/∼weidai/benchmarks.html
    • Crypto Benchmarks
  • 28
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, or: Assigning roles to strangers
    • In: IEEE Computer Society Press, Washington, DC
    • Herzberg, A., Mass, Y., Mihaeli, J., Naor, D., Ravid, Y.: Access control meets public key infrastructure, or: Assigning roles to strangers. In: Proceedings of the 2000 IEEE Symposium on Security and Privacy, pp. 2-14. IEEE Computer Society Press, Washington, DC (2000). www.hrl.il.ibm.com/TrustEstablishment/paper.pdf
    • (2000) Proceedings of the 2000 IEEE Symposium on Security and Privacy , pp. 2-14
    • Herzberg, A.1    Mass, Y.2    Mihaeli, J.3    Naor, D.4    Ravid, Y.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.