메뉴 건너뛰기




Volumn 42, Issue 2, 2009, Pages 44-52

Dynamic trust management

Author keywords

Access control; Computer architecture; Data mining; Engines; Fires; Global Information Grid; Probability density function; Security; Service oriented architecture; Trust management; Virtual private services

Indexed keywords


EID: 61449159887     PISSN: 00189162     EISSN: None     Source Type: Trade Journal    
DOI: 10.1109/MC.2009.51     Document Type: Article
Times cited : (60)

References (12)
  • 2
    • 84958048748 scopus 로고    scopus 로고
    • Compliance Checking in the PolicyMaker Trust-Management System
    • Proc. Financial Cryptography 98, Springer
    • M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust-Management System," Proc. Financial Cryptography 98, LNCS 1465, Springer, 1998, pp. 254-274.
    • (1998) LNCS , vol.1465 , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 4
    • 4544378423 scopus 로고    scopus 로고
    • S. Ioannidis et al., Design and Implementation of Virtual Private Services, Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
    • S. Ioannidis et al., "Design and Implementation of Virtual Private Services," Proc. IEEE Int'l Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE), Workshop on Enterprise Security, Special Session on Trust Management in Collaborative Global Computing, IEEE Press, 2003, pp. 269-275.
  • 5
    • 61449188272 scopus 로고    scopus 로고
    • S. Ioannidis, Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments, doctoral dissertation, University of Pennsylvania, 2005.
    • S. Ioannidis, "Security Policy Consistency and Distributed Evaluation in Heterogeneous Environments," doctoral dissertation, University of Pennsylvania, 2005.
  • 6
    • 24944442759 scopus 로고    scopus 로고
    • Experience with the KeyNote Trust Management System: Applications and Future Directions
    • M. Blaze, J. Ioannidis, and A.D. Keromytis, "Experience with the KeyNote Trust Management System: Applications and Future Directions," Proc. 1st Int'l Conf. Trust Management, 2003; http://nsl.cs.columbia.edu/projects/gridlock/newkeynote.pdf.
    • (2003) Proc. 1st Int'l Conf. Trust Management
    • Blaze, M.1    Ioannidis, J.2    Keromytis, A.D.3
  • 7
    • 3042617182 scopus 로고    scopus 로고
    • A Quantitative Study of Firewall Configuration Errors
    • June
    • A. Wool, "A Quantitative Study of Firewall Configuration Errors," Computer, June 2004, pp. 62-67.
    • (2004) Computer , pp. 62-67
    • Wool, A.1
  • 9
    • 84942257511 scopus 로고    scopus 로고
    • Proc. 3rdDARPA Information Survivability Conf. and Exposition
    • DISCEX III
    • A.D. Keromytis et al., "The Strongman Architecture," Proc. 3rdDARPA Information Survivability Conf. and Exposition (DISCEX III), 2003; www1.cs.columbia.edu/~angelos/Papers/strongman.pdf.
    • (2003)
    • Keromytis, A.D.1
  • 10
    • 85084164032 scopus 로고    scopus 로고
    • Automated Response Using System-Call Delays
    • Usenix
    • A. Somayaji and S. Forrest, "Automated Response Using System-Call Delays," Proc. 9th Usenix Security Symposium, Usenix, 2000; www.csd.uoc.gr/~hy558/papers/somayaji-00automated.pdf.
    • (2000) Proc. 9th Usenix Security Symposium
    • Somayaji, A.1    Forrest, S.2
  • 11
    • 33745469273 scopus 로고    scopus 로고
    • Towards Collaborative Security and P2P Intrusion Detection
    • IAW, IEEE Press
    • M.E. Locasto et al., "Towards Collaborative Security and P2P Intrusion Detection," Proc. 6th Ann. IEEE SMC Information Assurance Workshop (IAW), IEEE Press, 2005, pp. 333-339.
    • (2005) Proc. 6th Ann. IEEE SMC Information Assurance Workshop , pp. 333-339
    • Locasto, M.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.