메뉴 건너뛰기




Volumn 2, Issue , 2003, Pages 60-62

Automated trust negotiation technology with attribute-based access control

Author keywords

Access control

Indexed keywords

INFORMATION SYSTEMS;

EID: 84865524020     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DISCEX.2003.1194916     Document Type: Conference Paper
Times cited : (7)

References (7)
  • 2
    • 84942417001 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • To appear in Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8)
    • Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. To appear in Journal of Computer Security. Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-8).
    • Journal of Computer Security
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 4
    • 1642395221 scopus 로고    scopus 로고
    • Protecting sensitive attributes in automated trust negotiation
    • ACM Press, November
    • William H. Winsborough and Ninghui Li. Protecting sensitive attributes in automated trust negotiation. In Workshop on Privacy in the Electronic Society. ACM Press, November 2002.
    • (2002) Workshop on Privacy in the Electronic Society
    • Winsborough, W.H.1    Li, N.2
  • 7
    • 84942467256 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • to appear. Extended abstract appeared in Proceedings of the Eight ACM Conference on Computer and Communications Security (CCS-8)
    • Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), to appear. Extended abstract appeared in Proceedings of the Eight ACM Conference on Computer and Communications Security (CCS-8).
    • ACM Transactions on Information and System Security (TISSEC)
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.