메뉴 건너뛰기




Volumn , Issue , 2002, Pages 68-79

Requirements for policy languages for trust negotiation

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL POLICIES; DIGITAL CREDENTIALS; POLICY LANGUAGE; RUNTIME SYSTEMS; SECURITY DOMAINS; TRADITIONAL APPROACHES; TRUST MANAGEMENT; TRUST NEGOTIATIONS;

EID: 84893105662     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/POLICY.2002.1011295     Document Type: Conference Paper
Times cited : (116)

References (15)
  • 1
    • 0035791550 scopus 로고    scopus 로고
    • On specifying security policies for web documents with an xml-based language
    • Chantilly, Virginia, May
    • E. Bertino, S. Castano, and E. Ferrari, "On Specifying Security Policies for Web Documents with an XML-based Language," Sixth ACM SACMAT, Chantilly, Virginia, May 2001.
    • (2001) Sixth ACM SACMAT
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 2
    • 0034823621 scopus 로고    scopus 로고
    • Securing XML Documents: The author-x project demonstration
    • Santa Barbara, CA May
    • E. Bertino, S. Castano, and E. Ferrari, "Securing XML Documents: the Author-X Project Demonstration," ACM SIGMOD Conference, Santa Barbara, CA, May 2001.
    • (2001) ACM SIGMOD Conference
    • Bertino, E.1    Castano, S.2    Ferrari, E.3
  • 5
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the policymaker trust management system
    • M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance Checking in the PolicyMaker Trust Management System," Financial Cryptography 1998: 254-274.
    • (1998) Financial Cryptography , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 8
    • 84893037714 scopus 로고    scopus 로고
    • GraphXML. Found on-line at
    • GraphXML. Found on-line at http://www.cwi.nl/InfoVisu/GraphXML/.
  • 9
    • 0033724294 scopus 로고    scopus 로고
    • Access control meets public key infrastructure, Or: Assigning Roles to Strangers
    • Oakland, CA May
    • A. Herzberg, Mihaeli, Y. Mass, D. Naor, and Y. Ravid, "Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers," IEEE Symposium on Security and Privacy, Oakland, CA, May 2000.
    • (2000) IEEE Symposium on Security and Privacy
    • Herzberg, A.1    Mass, M.Y.2    Naor, D.3    Ravid, Y.4
  • 13
    • 85056545124 scopus 로고    scopus 로고
    • Limiting the disclosure of access control policies during automated trust negotiation
    • San Diego, CA February
    • K. E. Seamons, M. Winslett, and T. Yu, "Limiting the Disclosure of Access Control Policies During Automated Trust Negotiation," Network and Distributed System Security Symposium, San Diego, CA, February 2001.
    • (2001) Network and Distributed System Security Symposium
    • Seamons, K.E.1    Winslett, M.2    Yu, T.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.