메뉴 건너뛰기




Volumn 3, Issue , 2008, Pages 182-185

An efficient and minimum sensitivity cost negotiation strategy in automated trust Negotiation

Author keywords

Automated trust negotiation; Minimum sensitivity cost; Negotiation strategy

Indexed keywords

ACCESS CONTROL POLICIES; DIGITAL CREDENTIALS; DISTRIBUTED APPLICATIONS; GREEDY ALGORITHMS; MINIMUM SENSITIVITY COST; NEGOTIATION STRATEGY; NET ARCHITECTURE; REAL TIME REQUIREMENT; SECURITY MODEL; SENSITIVE INFORMATIONS; TRUST NEGOTIATIONS;

EID: 79551653064     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CSSE.2008.867l     Document Type: Conference Paper
Times cited : (6)

References (12)
  • 1
    • 79951520959 scopus 로고    scopus 로고
    • I. Foster, C. Kesselman. The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann, 2004.
  • 2
    • 84939548725 scopus 로고    scopus 로고
    • Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation. In: DARPA Information Survivability Conf and Exposition. IEEE Press, 2CCQ 88-102.
  • 3
    • 33646886776 scopus 로고    scopus 로고
    • Huraisingham, Bhavani. Secure Knowledge Management: Confidentiality, Trust, and Privacy. IEEE. Transactions on Systems, Man & Cybernetics, Vol.36, Issue 3. May 2005,429-438
  • 4
    • 33745764834 scopus 로고    scopus 로고
    • J. Li, N. Li, W. H. Winsborough. Automated trust negotiation using cryptographic credentials. In: Proceedings of the 12th ACM conference on Computer and communications security. ACM Press, 2005. 46-57.
  • 5
    • 0034449542 scopus 로고    scopus 로고
    • th ACM Conf. on Computer and communications Security. ACM Press, 2000. 210-219.
  • 6
    • 25844481612 scopus 로고    scopus 로고
    • Weifeng Chen, L. Clarke, James F. Kurose, Donald F. Towsley. Optimizing cost-sensitive trust-negotiation protocols. In: Proc. of the 24th Annual Joint Conf. of the IEEE Computer and Communications Societies. Miami, FL, USA. 13-17 March 2005. 1431-1442.
  • 7
    • 79951539822 scopus 로고    scopus 로고
    • Seamons KE, Winslett M, Yu T. Limiting the disclosure of access control policies during automated trust negotiation. In:Network and Distributed System Security Symp. Internet Society Press,2001.
  • 8
    • 79951545107 scopus 로고    scopus 로고
    • Yu T. Automated trust establishment in open systems [Ph.D. Thesis]. Illinois: University of Illinois, 2003.
  • 9
    • 14844297757 scopus 로고    scopus 로고
    • Bradshaw R, Holt J, Seamons KE Concealing complex policies with hidden credentials. In: Proc.of the 11th ACM Conf. on Computer and Communications Security. ACM Press,2004.146-157.
  • 10
    • 1642327001 scopus 로고    scopus 로고
    • Yu T, Winslett M, Seamons KE Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans, on Information and System Security, 2003,1(6): 1-42
  • 11
    • 79951526410 scopus 로고    scopus 로고
    • Yan He, Miaoliang Zhu. A complete and efficient strategy based on petri net in automated trust negotiation. In: The Second International Conference on Scalable Information Systems,2007,75.
  • 12
    • 13244299177 scopus 로고    scopus 로고
    • Song Ye, Fillia Makedon, James Ford. Collaborative Automated Trust Negotiation in Peer-to-Peer Systems. In: Proc. of the Fourth International Conf. on Peer-to-Peer Computing (P2P'04), Aug.2004.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.