메뉴 건너뛰기




Volumn 31, Issue 1, 2012, Pages 4-25

A trust negotiation based security framework for service provisioning in load-balancing clusters

Author keywords

Access control; Load balancing cluster; Security evaluation; Security proxy; Trust negotiation; Web services security

Indexed keywords

LOAD-BALANCING; SECURITY EVALUATION; SECURITY PROXY; TRUST NEGOTIATIONS; WEB SERVICES SECURITY;

EID: 84855998039     PISSN: 01674048     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.cose.2011.11.006     Document Type: Conference Paper
Times cited : (10)

References (37)
  • 8
    • 27144485193 scopus 로고    scopus 로고
    • HYPROLOG: A new logic programming language with assumptions and abduction
    • Logic Programming: 21st International Conference, ICLP 2005. Proceedings
    • H. Christiansen, and V. Dahl HYPROLOG: a new logic programming language with assumptions and abduction Proceedings of the 21st international conference on logic programming (ICLP 2005) vol. 3668 2005 LNCS, Springer 159 173 (Pubitemid 41491600)
    • (2005) Lecture Notes in Computer Science , vol.3668 , pp. 159-173
    • Christiansen, H.1    Dahl, V.2
  • 10
    • 84855991396 scopus 로고    scopus 로고
    • A semantic approach to access control and automated credential negotiation for decentralized online repositories/an OKKAM project use case
    • CEUR Workshop Proceedings Rome, Italy ISSN 1613-0073
    • H. Koshutanski, and A. Maña A semantic approach to access control and automated credential negotiation for decentralized online repositories/an OKKAM project use case Proceedings of the 5th workshop on semantic web applications and perspectives (SWAP2008) 2008 CEUR Workshop Proceedings Rome, Italy ISSN 1613-0073
    • (2008) Proceedings of the 5th Workshop on Semantic Web Applications and Perspectives (SWAP2008)
    • Koshutanski, H.1    Maña, A.2
  • 11
    • 33947544647 scopus 로고    scopus 로고
    • A negotiation scheme for access rights establishment in autonomic communication
    • H. Koshutanski, and F. Massacci A negotiation scheme for access rights establishment in autonomic communication Journal of Network and System Management 15 1 2007
    • (2007) Journal of Network and System Management , vol.15 , Issue.1
    • Koshutanski, H.1    Massacci, F.2
  • 16
    • 0032630098 scopus 로고    scopus 로고
    • Detecting computer and network misuse through the production-based expert system toolset (P-BEST)
    • U. Lindqvist, and P. Porras Detecting computer and network misuse through the production-based expert system toolset (P-BEST) Proceedings of the IEEE symposium on security and privacy 1999 146 161
    • (1999) Proceedings of the IEEE Symposium on Security and Privacy , pp. 146-161
    • Lindqvist, U.1    Porras, P.2
  • 17
    • 0027609384 scopus 로고
    • A survey of intrusion detection techniques
    • T.F. Lunt A survey of intrusion detection techniques Computers and Security 12 4 1993 405 418
    • (1993) Computers and Security , vol.12 , Issue.4 , pp. 405-418
    • Lunt, T.F.1
  • 19
    • 35048841281 scopus 로고    scopus 로고
    • PeerTrust: Automated trust negotiation for peers on the semantic web
    • Lecture Notes in Computer Science, Springer
    • W. Nejdl, D. Olmedilla, and M. Winslett PeerTrust: automated trust negotiation for peers on the semantic web VLDB workshop on secure data management (SDM) vol. 3178 2004 Lecture Notes in Computer Science, Springer 118 132
    • (2004) VLDB Workshop on Secure Data Management (SDM) , vol.3178 , pp. 118-132
    • Nejdl, W.1    Olmedilla, D.2    Winslett, M.3
  • 24
    • 33845533762 scopus 로고    scopus 로고
    • US Patent and Trademark Office IBM Corporation, patent application filed March 7, 2000
    • K. Seamons, and W. Winsborough Automated trust negotiation 2002 US Patent and Trademark Office IBM Corporation, patent application filed March 7, 2000
    • (2002) Automated Trust Negotiation
    • Seamons, K.1    Winsborough, W.2
  • 28
    • 84939548725 scopus 로고    scopus 로고
    • Proceedings of DARPA information survivability conference and exposition (DISCEX IEEE Press
    • W. Winsborough, K. Seamons, and V. Jones Automated trust negotiation) Proceedings of DARPA information survivability conference and exposition (DISCEX vol. 1 2000 IEEE Press 88 102
    • (2000) Automated Trust Negotiation , vol.1 , pp. 88-102
    • Winsborough, W.1    Seamons, K.2    Jones, V.3
  • 33
    • 18844438093 scopus 로고    scopus 로고
    • A metadata-based access control model for web services
    • DOI 10.1108/10662240510577095
    • M. Yagüe, A. Maña, and J. López A metadata-based access control model for web services Internet Research 15 1 2005 99 116 (Pubitemid 40687455)
    • (2005) Internet Research , vol.15 , Issue.1 , pp. 99-116
    • Yague, M.I.1    Mana, A.2    Lopez, J.3
  • 36
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K.E. Seamons Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation ACM Transactions on Information and System Security (TISSEC) 6 1 2003 1 42
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.