메뉴 건너뛰기




Volumn 173, Issue , 2005, Pages 115-128

An interactive trust management and negotiation scheme

Author keywords

[No Author keywords available]

Indexed keywords

INFORMATION TECHNOLOGY;

EID: 84902469060     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/0-387-24098-5_9     Document Type: Conference Paper
Times cited : (3)

References (12)
  • 1
    • 0742268963 scopus 로고    scopus 로고
    • Web service conversation modeling: A cornerstone for e-business automation
    • (Jan/Feb)
    • Benatallah, B., Casati, F., and Toumani, F. Web service conversation modeling: a cornerstone for e-business automation. IEEE Internet Computing 8, 1 (Jan/Feb 2004), 46-54.
    • (2004) IEEE Internet Computing , vol.8 , Issue.1 , pp. 46-54
    • Benatallah, B.1    Casati, F.2    Toumani, F.3
  • 4
    • 0002817535 scopus 로고    scopus 로고
    • The PERMIS X.509 role-based privilege management infrastructure
    • In
    • Chadwick, D. W., and Otenko, A. The PERMIS X.509 role-based privilege management infrastructure. In 7th ACM SACMAT (2002), pp. 135-140.
    • (2002) 7th ACM SACMAT , pp. 135-140
    • Chadwick, D.W.1    Otenko, A.2
  • 11
    • 0036871183 scopus 로고    scopus 로고
    • Negotiating trust in the Web
    • (Nov/Dec)
    • Winslett M, et al. Negotiating trust in the Web. IEEE Internet Computing 6, 6 (Nov/Dec 2002), 30-37.
    • (2002) IEEE Internet Computing 6 , vol.6 , pp. 30-37
    • Winslett, M.1
  • 12
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • Yu, T., Winslett, M., and Seamons, K. E. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM TISSEC 6, 1 (2003), 1-42.
    • (2003) ACM TISSEC , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.