메뉴 건너뛰기




Volumn , Issue , 2015, Pages 106-113

Remembrance of local information status for enforcing robustness of policy-exchanged strategies for trust negotiation

Author keywords

Policy cyclic dependencies; Policy exchanged strategies; Remembrance of local information status; Repetitive credential request attacks; Trust negotiation; Vulnerability

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER SCIENCE;

EID: 84923006102     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2014.18     Document Type: Conference Paper
Times cited : (1)

References (25)
  • 8
    • 18744387712 scopus 로고    scopus 로고
    • Oblivious signature-based envelope
    • N. Li, W. Du, and D. Boneh, Oblivious signature-based envelope. Distributed Computing, 17(4), 293-302. DOI=10.1007/s00446-004-0116-1. 2003.
    • (2003) Distributed Computing , vol.17 , Issue.4 , pp. 293-302
    • Li, N.1    Du, W.2    Boneh, D.3
  • 9
    • 84884499196 scopus 로고    scopus 로고
    • An ontology-based approach to automated trust negotiation
    • X. Liu, S. Tang, Q. Huang, and Z. Zhu, An ontology-based approach to automated trust negotiation. Computer Standards &Interfaces. 36(1), 219-230. DOI= 10.1016/j.csi.2013.03.003. 2013.
    • (2013) Computer Standards &interfaces. , vol.36 , Issue.1 , pp. 219-230
    • Liu, X.1    Tang, S.2    Huang, Q.3    Zhu, Z.4
  • 10
    • 70349439059 scopus 로고    scopus 로고
    • DFANS: A highly efficient strategy for automated trust negotiation
    • H. Lu, and B. Liu, DFANS: A highly efficient strategy for automated trust negotiation. Computers &Security, 28(7), pp.557-565. DOI=10.1016/j.cose.2009.03.004. 2009.
    • (2009) Computers &security , vol.28 , Issue.7 , pp. 557-565
    • Lu, H.1    Liu, B.2
  • 23
    • 1642327001 scopus 로고    scopus 로고
    • Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
    • T. Yu, M. Winslett, and K. E. Seamons, Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1), 1-42. DOI=10.1145/605434.605435. 2003.
    • (2003) ACM Transactions on Information and System Security (TISSEC) , vol.6 , Issue.1 , pp. 1-42
    • Yu, T.1    Winslett, M.2    Seamons, K.E.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.