메뉴 건너뛰기




Volumn , Issue , 2009, Pages

Declarative reconfigurable trust management

Author keywords

[No Author keywords available]

Indexed keywords

CUSTOMIZABLE; DATALOG; DISTRIBUTION STRATEGIES; ENTERPRISE SOFTWARE; EXECUTION ENVIRONMENTS; LANGUAGES AND SYSTEMS; META MODEL; META PROGRAMMING; PROOF OF CONCEPT; RE-CONFIGURABLE; SECURE NETWORKS; SECURITY POLICY; TRUST LEVEL; TRUST MANAGEMENT; TRUST MANAGEMENT SYSTEMS;

EID: 84889706925     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (6)

References (19)
  • 3
    • 0036040302 scopus 로고    scopus 로고
    • Analyzing security protocols with secrecy types and logic programs
    • M. Abadi and B. Blanchet. Analyzing security protocols with secrecy types and logic programs. In POPL, 2002.
    • (2002) POPL
    • Abadi, M.1    Blanchet, B.2
  • 4
    • 51949088463 scopus 로고    scopus 로고
    • Towards a declarative language and system for secure networking
    • M. Abadi and B. T. Loo. Towards a Declarative Language and System for Secure Networking. In NetDB, 2007.
    • (2007) NetDB
    • Abadi, M.1    Loo, B.T.2
  • 6
    • 85027186168 scopus 로고
    • Magic sets and other strange ways to implement logic programs
    • F. Bancilhon, D. Maier, Y. Sagiv, and J. Ullman. Magic Sets and Other Strange Ways to Implement Logic Programs. In SIGMOD, 1986.
    • (1986) SIGMOD
    • Bancilhon, F.1    Maier, D.2    Sagiv, Y.3    Ullman, J.4
  • 9
    • 34250652156 scopus 로고    scopus 로고
    • Declarative networking: Language, execution and optimization
    • June
    • Boon Thau Loo et. al. Declarative Networking: Language, Execution and Optimization. In SIGMOD, June 2006.
    • (2006) SIGMOD
    • Al, B.T.L.Et.1
  • 11
  • 13
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • May
    • T. Jim. SD3: A Trust Management System With Certified Evaluation. In IEEE Symposium on Security and Privacy, May 2001.
    • (2001) IEEE Symposium on Security and Privacy
    • Jim, T.1
  • 14
    • 0001251855 scopus 로고
    • Authentication in distributed Systems: Theory and practice
    • B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. ACM TOCS, 1992.
    • (1992) ACM TOCS
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 15
    • 22244485369 scopus 로고    scopus 로고
    • Delegation Logic: A logic-based approach to distributed authorization
    • Feb.
    • N. Li, B. N. Grosof, and J. Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM TISSEC, Feb. 2003.
    • (2003) ACM TISSEC
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 17
    • 33646580035 scopus 로고    scopus 로고
    • Secure context-sensitive authorization
    • K. Minami and D. Kotz. Secure context-sensitive authorization. In PERCOM, 2005.
    • (2005) PERCOM
    • Minami, K.1    Kotz, D.2
  • 18
    • 58149319645 scopus 로고
    • A survey of research on deductive database systems
    • R. Ramakrishnan and J. D. Ullman. A Survey of Research on Deductive Database Systems. Journal of Logic Programming, 23(2):125-149, 1993.
    • (1993) Journal of Logic Programming , vol.23 , Issue.2 , pp. 125-149
    • Ramakrishnan, R.1    Ullman, J.D.2
  • 19
    • 67649635248 scopus 로고    scopus 로고
    • Unified declarative platform for secure networked information systems
    • W. Zhou, Y. Mao, B. T. Loo, and M. Abadi. Unified Declarative Platform for Secure Networked Information Systems. In ICDE, 2009.
    • (2009) ICDE
    • Zhou, W.1    Mao, Y.2    Loo, B.T.3    Abadi, M.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.