메뉴 건너뛰기




Volumn , Issue , 2007, Pages 64-67

Harvesting credentials in trust negotiation as an honest-but-curious adversary

Author keywords

privacy; protocol; trust negotiation; vulnerability

Indexed keywords

PROTOCOL; TRUST NEGOTIATIONS; VULNERABILITY;

EID: 77952018992     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1314333.1314345     Document Type: Conference Paper
Times cited : (9)

References (12)
  • 12
    • 1642327001 scopus 로고    scopus 로고
    • Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation
    • Feb.
    • T. Yu, M. Winslett, and K. E. Seamons, "Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies in Automated Trust Negotiation," Transactions on Information and System Security 6(1): 1-42, Feb. 2003.
    • (2003) Transactions on Information and System Security , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.