메뉴 건너뛰기




Volumn 1270, Issue , 1997, Pages 2-13

Prospectives for modelling trust in information security

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84857091711     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/BFb0027928     Document Type: Conference Paper
Times cited : (19)

References (16)
  • 1
    • 0004215976 scopus 로고
    • Technical report, DEC Systems Research Center, February, Research Report 39
    • Michael Burrows, Martín Abadi, and Roger Needham. A logic of authentication. Technical report, DEC Systems Research Center, February 1989. Research Report 39.
    • (1989) A Logic of Authentication
    • Burrows, M.1    Abadi, M.2    Needham, R.3
  • 2
    • 0002863367 scopus 로고
    • Valuation of trust in open networks
    • Brighton, UK, November
    • T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open networks. In ESORICS 94. Brighton, UK, November 1994.
    • (1994) ESORICS 94
    • Beth, T.1    Borcherding, M.2    Klein, B.3
  • 4
    • 0003200464 scopus 로고
    • An expert system framework for non-monotonic reasoning about probabilistic assumptions
    • L.N. Kanal and J.F. Lemmer, editors, North-Holland
    • M.S. Cohen. An expert system framework for non-monotonic reasoning about probabilistic assumptions. In L.N. Kanal and J.F. Lemmer, editors, Uncertainty in Artificial Intelligence. North-Holland, 1986.
    • (1986) Uncertainty in Artificial Intelligence
    • Cohen, M.S.1
  • 5
    • 84957898800 scopus 로고
    • The European Commission
    • EC. Information Technology Security Evaluation Criteria (ITSEC). The European Commission, 1992.
    • (1992)
  • 7
    • 84957898801 scopus 로고    scopus 로고
    • Evaluation Criteria for IT Security (Common Criteria), documents N-1401/1404. ISO/IEC JTC1/SC 27
    • ISO. Evaluation Criteria for IT Security (Common Criteria), documents N-1401/1404. ISO/IEC JTC1/SC 27, 1996.
    • (1996)
    • ISO1
  • 8
    • 84957898802 scopus 로고
    • X.509, The Directory-Authentication Framework. International Telecommunications Union
    • ITU. X.509, The Directory-Authentication Framework. International Telecommunications Union, 1989.
    • (1989)
  • 12
    • 84974759626 scopus 로고
    • The role of trust in information integrity protocols
    • G.J. Simmons and C. Meadows. The role of trust in information integrity protocols. Journal of Computer Security, 3(1):71-84, 1995.
    • (1995) Journal of Computer Security , vol.3 , Issue.1 , pp. 71-84
    • Simmons, G.J.1    Meadows, C.2
  • 13
    • 0002796093 scopus 로고
    • On key distribution protocols for repeated authentication
    • October
    • Paul F. Syverson. On key distribution protocols for repeated authentication. Operating Systems Review, 27(4), October 1993.
    • (1993) Operating Systems Review , vol.27 , Issue.4
    • Syverson, P.F.1
  • 14
    • 84957898805 scopus 로고
    • Trusted Computer System Evaluation Criteria (TCSEC). US Department of Defence
    • USDoD. Trusted Computer System Evaluation Criteria (TCSEC). US Department of Defence, 1985.
    • (1985)
  • 16
    • 84957898806 scopus 로고
    • The Official PGP User’s Guide. MIT Press
    • P.R. Zimmermann. The Official PGP User’s Guide. MIT Press, 1995.
    • (1995)
    • Zimmermann, P.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.