메뉴 건너뛰기




Volumn 28, Issue 7, 2009, Pages 557-565

DFANS: A highly efficient strategy for automated trust negotiation

Author keywords

Access control policy; Automated trust negotiation; Disclosure; Sensitive credential; Strategy

Indexed keywords

ACCESS CONTROL POLICY; AUTOMATED TRUST NEGOTIATION; DISCLOSURE; SENSITIVE CREDENTIAL; STRATEGY;

EID: 70349439059     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2009.03.004     Document Type: Article
Times cited : (19)

References (26)
  • 1
    • 0017983865 scopus 로고
    • Binary decision diagrams
    • Akers S.B. Binary decision diagrams. IEEE Transactions on Computers C-27 6 (June 1978) 509-516
    • (1978) IEEE Transactions on Computers , vol.C-27 , Issue.6 , pp. 509-516
    • Akers, S.B.1
  • 2
    • 0022769976 scopus 로고
    • Graph-based algorithms for Boolean function manipulation
    • Bryant R.E. Graph-based algorithms for Boolean function manipulation. IEEE Transactions on Computers C-35 8 (1986) 677-691
    • (1986) IEEE Transactions on Computers , vol.C-35 , Issue.8 , pp. 677-691
    • Bryant, R.E.1
  • 6
    • 33745772562 scopus 로고    scopus 로고
    • Preventing attribute information leakage in automated trust negotiation
    • CCS, Alexandria, VA; November
    • Irwin K, Yu T. Preventing attribute information leakage in automated trust negotiation. In: ACM conference on computer and communications security (CCS), Alexandria, VA; November 2005.
    • (2005) ACM conference on computer and communications security
    • Irwin, K.1    Yu, T.2
  • 8
    • 84903828974 scopus 로고
    • Representation of switching circuits by binary-decision programs
    • Lee C.Y. Representation of switching circuits by binary-decision programs. Bell System Technical Journal 38 (July 1959) 985-999
    • (1959) Bell System Technical Journal , vol.38 , pp. 985-999
    • Lee, C.Y.1
  • 18
    • 84893110297 scopus 로고    scopus 로고
    • Towards practical automated trust negotiation
    • IEEE Computer Society Press
    • Winsborough W.H., and Li N. Towards practical automated trust negotiation. Policy 2002 (2002), IEEE Computer Society Press 92-103
    • (2002) Policy 2002 , pp. 92-103
    • Winsborough, W.H.1    Li, N.2
  • 22
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • IEEE Computer Society Press
    • Yu T., and Winslett M. A unified scheme for resource protection in automated trust negotiation. Proceedings of IEEE symposium on security and privacy (May 2003), IEEE Computer Society Press 110-122
    • (2003) Proceedings of IEEE symposium on security and privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2
  • 23
    • 0034449542 scopus 로고    scopus 로고
    • PRUNES: An efficient and complete strategy for automated trust negotiation over the internet
    • Athens, Greece; November
    • Yu T, Ma X, Winslett M. PRUNES: an efficient and complete strategy for automated trust negotiation over the internet. In: ACM conference on computer and communication security, Athens, Greece; November 2000.
    • (2000) ACM conference on computer and communication security
    • Yu, T.1    Ma, X.2    Winslett, M.3
  • 25
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu T., Winslett M., and Seamons K.E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC) 6 1 (February 2003) 1-42
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.