메뉴 건너뛰기




Volumn , Issue , 2011, Pages 430-434

Receipt-mode trust negotiation: Efficient authorization through outsourced interactions

Author keywords

Load balancing; Optimization; Security; Trust negotiation

Indexed keywords

COMPUTER OPERATING SYSTEMS; OPEN SYSTEMS;

EID: 79955997599     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1966913.1966973     Document Type: Conference Paper
Times cited : (4)

References (23)
  • 3
    • 1542359992 scopus 로고    scopus 로고
    • N-way fail-over infrastructure for reliable servers and routers
    • Y. Amir, R. Caudy, A. Munjal, T. Schlossnagle, and C. Tutu. N-way fail-over infrastructure for reliable servers and routers. In DSN, pages 403, 2003.
    • (2003) DSN , pp. 403
    • Amir, Y.1    Caudy, R.2    Munjal, A.3    Schlossnagle, T.4    Tutu, C.5
  • 15
    • 35048841281 scopus 로고    scopus 로고
    • Peertrust: Automated trust negotiation for peers on the semantic web
    • volume 3178 of Lecture Notes in Computer Science
    • W. Nejdl, D. Olmedilla, and M. Winslett. Peertrust: Automated trust negotiation for peers on the semantic web. In LDB Workshop on Secure Data Management (SDM), volume 3178 of Lecture Notes in Computer Science, pages 118-132, 2004.
    • (2004) LDB Workshop on Secure Data Management (SDM) , pp. 118-132
    • Nejdl, W.1    Olmedilla, D.2    Winslett, M.3
  • 18
    • 0004001001 scopus 로고    scopus 로고
    • Internet X.509 Public Key Infrastructure (PKI) proxy certificate profile
    • (Proposed Standard), June
    • S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. RFC 3820 (Proposed Standard), June 2004.
    • (2004) RFC , vol.3820
    • Tuecke, S.1    Welch, V.2    Engert, D.3    Pearlman, L.4    Thompson, M.5
  • 23
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation
    • February
    • T. Yu, M. Winslett, and K. E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation. ACM Transaction on Information and System Security (TISSEC), pages 1-42, February 2003.
    • (2003) ACM Transaction on Information and System Security (TISSEC) , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.