메뉴 건너뛰기




Volumn 85, Issue , 2004, Pages 186-191

A rule-based framework for role-based constrained delegation

Author keywords

Constraint; Delegation; Trust management

Indexed keywords

KEYPOINTS; ROLE-BASED; RULE BASED; RULE-BASED LANGUAGE; STRICT CONSTRAINT; TRUST MANAGEMENT; TRUST MANAGEMENT SYSTEMS;

EID: 77952903906     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1046290.1046329     Document Type: Conference Paper
Times cited : (5)

References (18)
  • 1
    • 0039015629 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • November
    • Butler Lampson, Martin Abadi, Michael Burrows, and Edward Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
    • (1992) ACM Transactions on Computer Systems , vol.10 , Issue.4 , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 6
    • 0012419393 scopus 로고    scopus 로고
    • Edited by Fran Berman, Geoffery Fox, Tony Hey, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England
    • Grid Computing - Making the Global Infrastructure a Reality, Edited by Fran Berman, Geoffery Fox, Tony Hey, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, 2003
    • (2003) Grid Computing - Making the Global Infrastructure a Reality
  • 8
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems
    • Secure Intternet Programming, Springer
    • M. Blaze, Joan Feigenbaum, John Ioannidis, and Angelos D. Keromytis. The role of trust management in distributed systems. In Secure Intternet Programming, volume 1603 of Lec-ture Notes in Computer Science, pages 185-210. Springer, 1999.
    • (1999) Lec-ture Notes in Computer Science , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.