메뉴 건너뛰기




Volumn 2, Issue , 2011, Pages 735-738

Trust vector-based sensitive information protecting scheme in automatic trust negotiation

Author keywords

access control; automatic trust negotiation; sensitive information protecting; trust evaluation

Indexed keywords

CONCRETE APPLICATIONS; IMPLEMENTATION PROCESS; PERSONAL SECURITY; SECURITY REQUIREMENTS; SENSITIVE ATTRIBUTE; SENSITIVE INFORMATIONS; TRUST EVALUATION; TRUST NEGOTIATIONS;

EID: 84860569499     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCSNT.2011.6182069     Document Type: Conference Paper
Times cited : (2)

References (6)
  • 3
    • 1642327001 scopus 로고    scopus 로고
    • Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation
    • [J]. February
    • T. Yu, M. Winslett, K. E. Seamons. Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation[J]. ACM Transactions on Information and System Security(TISSEC), February 2003, 6(1):1-42.
    • (2003) ACM Transactions on Information and System Security(TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3
  • 4
    • 35048855095 scopus 로고    scopus 로고
    • Secret Handshakes from Ca-oblivious Encryption
    • [C]. Advances in Cryptology - ASIACRPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security. Springer
    • C. Castelluccia, S. Jarecki, G. Tsudik. Secret Handshakes from Ca-oblivious Encryption[C]. In Advances in Cryptology - ASIACRPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security. Volume 3329 of Lecture Notes in Computer Science, Springer, 2004, 293-307.
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 293-307
    • Castelluccia, C.1    Jarecki, S.2    Tsudik, G.3
  • 6
    • 47049083286 scopus 로고    scopus 로고
    • Keeping confidentiality of sensitive attributes in credential during trust negotiation
    • [J]
    • Liao Junguo, Hong Fan, Li Jun et al. Keeping confidentiality of sensitive attributes in credential during trust negotiation [J].Chinese Journal of Communications. 2008,29(6):20-25.
    • (2008) Chinese Journal of Communications , vol.29 , Issue.6 , pp. 20-25
    • Liao, J.1    Hong, F.2    Li, J.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.