메뉴 건너뛰기




Volumn 9, Issue 1, 2012, Pages 16-29

A flexible approach to multisession trust negotiations

Author keywords

access control; dependability; Security and management; trust negotiations

Indexed keywords

COMPUTATION THEORY; ELECTRICAL ENGINEERING;

EID: 81455143719     PISSN: 15455971     EISSN: None     Source Type: Journal    
DOI: 10.1109/TDSC.2011.31     Document Type: Article
Times cited : (9)

References (37)
  • 2
    • 35048879241 scopus 로고    scopus 로고
    • Design and semantics of a decentralized authorization language
    • DOI 10.1109/CSF.2007.18, 4271637, Proceedings - 20th IEEE Computer Security Foundations Symposium, CSFS20
    • M.Y. Becker, C. Fournet, and A.D. Gordon, "Design and Semantics of a Decentralized Authorization Language," Proc. IEEE 20th Computer Security Foundations Symp. (CSF), pp. 3-15, 2007. (Pubitemid 47554202)
    • (2007) Proceedings - IEEE Computer Security Foundations Symposium , pp. 3-15
    • Becker, M.Y.1    Fournet, C.2    Gordon, A.D.3
  • 4
    • 3142676730 scopus 로고    scopus 로고
    • Trust-X: A peer-to-peer framework for trust establishment
    • July
    • E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, pp. 827-842, July 2004.
    • (2004) IEEE Trans. Knowledge Data Eng. , vol.16 , Issue.7 , pp. 827-842
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.C.3
  • 5
    • 3042777385 scopus 로고    scopus 로고
    • Trust negotiations: Concepts, systems and languages
    • E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust Negotiations: Concepts, Systems and Languages," Computing in Science Eng., vol. 6, no. 4, pp. 27-34, 2004.
    • (2004) Computing in Science Eng. , vol.6 , Issue.4 , pp. 27-34
    • Bertino, E.1    Ferrari, E.2    Squicciarini, A.C.3
  • 7
    • 84948973732 scopus 로고    scopus 로고
    • Efficient proofs that a committed number lies in an interval
    • F. Boudot, "Efficient Proofs that a Committed Number Lies in an Interval," Proc. EUROCRYPT, pp. 431-444, 2000.
    • (2000) Proc. EUROCRYPT , pp. 431-444
    • Boudot, F.1
  • 11
    • 85032463527 scopus 로고
    • Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms
    • D. Chaum, "Showing Credentials without Identification Transferring Signatures between Unconditionally Unlinkable Pseudonyms," Proc. Int'l Conf. Cryptology on Advances in Cryptology (AUSCRYPT), pp. 246-264, 1990.
    • (1990) Proc. Int'l Conf. Cryptology on Advances in Cryptology (AUSCRYPT) , pp. 246-264
    • Chaum, D.1
  • 14
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • A. Fiat and A. Shamir, "How to Prove Yourself: Practical Solutions to Identification and Signature Problems," Proc. Int'l Cryptology Conf. (CRYPTO '86), pp. 186-194, 1986.
    • (1986) Proc. Int'l Cryptology Conf. (CRYPTO '86) , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 21
    • 57949107810 scopus 로고    scopus 로고
    • Enforcing safety and consistency constraints in policy-based authorization systems
    • Dec.
    • A.J. Lee and M. Winslett, "Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems," ACM Trans. Information and System Security, vol. 12, no. 8, pp. 1-33, Dec. 2008.
    • (2008) ACM Trans. Information and System Security , vol.12 , Issue.8 , pp. 1-33
    • Lee, A.J.1    Winslett, M.2
  • 22
    • 33751513006 scopus 로고    scopus 로고
    • OACerts: Oblivious attribute certificates
    • DOI 10.1109/TDSC.2006.54
    • J. Li and N. Li, "Oacerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006. (Pubitemid 44837036)
    • (2006) IEEE Transactions on Dependable and Secure Computing , vol.3 , Issue.4 , pp. 340-352
    • Li, J.1    Li, N.2
  • 25
    • 33646149431 scopus 로고    scopus 로고
    • Organization for the Advancement of Structured Information Standards (OASIS) Version 2.0
    • Organization for the Advancement of Structured Information Standards (OASIS) "Security Assertions Markup Language (SAML), Version 2.0," http://wiki.oasis-open.org/security, 2005.
    • (2005) Security Assertions Markup Language (SAML)
  • 27
  • 29
    • 0018545449 scopus 로고
    • How to Share a Secret
    • A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 36
    • 1642351286 scopus 로고    scopus 로고
    • World Wide Web Consortium
    • World Wide Web Consortium "OWL Web Ontology Language," http://www.w3.org/TR/owl-ref/, 2004.
    • (2004) OWL Web Ontology Language
  • 37
    • 0038148412 scopus 로고    scopus 로고
    • A unified scheme for resource protection in automated trust negotiation
    • T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, pp. 110-122, 2003.
    • (2003) Proc. IEEE Symp. Security and Privacy , pp. 110-122
    • Yu, T.1    Winslett, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.