메뉴 건너뛰기




Volumn 1, Issue , 2003, Pages 201-212

RT: A Role-based Trust-management framework

Author keywords

Engines

Indexed keywords

SEMANTICS;

EID: 62349090353     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194885     Document Type: Conference Paper
Times cited : (211)

References (25)
  • 9
    • 0023266943 scopus 로고
    • A comparision of commercial and military computer security policies
    • IEEE Computer Society Press, May
    • David D. Clark and David R. Wilson. A comparision of commercial and military computer security policies. In Proceedings of the 1987 IEEE Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, May 1987.
    • (1987) Proceedings of the 1987 IEEE Symposium on Security and Privacy , pp. 184-194
    • Clark, D.D.1    Wilson, D.R.2
  • 13
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, May
    • Trevor Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, May 2001.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 14
    • 0029359817 scopus 로고
    • Constraint query languages
    • August Preliminary version appeared in Proceedings of the 9th ACM Symposium on Principles of Database Systems (PODS), 1990
    • Paris C. Kanellakis, Gabriel M. Kuper, and Peter Z. Revesz. Constraint query languages. Journal of Computer and System Sciences, 51(1):26-52, August 1995. Preliminary version appeared in Proceedings of the 9th ACM Symposium on Principles of Database Systems (PODS), 1990.
    • (1995) Journal of Computer and System Sciences , vol.51 , Issue.1 , pp. 26-52
    • Kanellakis, P.C.1    Kuper, G.M.2    Revesz, P.Z.3
  • 16
    • 0026684778 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • November
    • Butler Lampson, Martín Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 20
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • February
    • Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, February 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.1 , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.