Implementation aspects of a delegation system
暂无分享,去创建一个
[1] Carlos Cotta,et al. Analyzing Directed Acyclic Graph Recombination , 2001, Fuzzy Days.
[2] Tuomas Aura,et al. Fast Access Control Decisions from Delegation Certificate Databases , 1998, ACISP.
[3] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[4] José A. Montenegro,et al. A Representation Model of Trust Relationships with Delegation Extensions , 2005, iTrust.
[5] Javier López,et al. Graphical Representation of Authorization Policies for Weighted Credentials , 2006, ACISP.
[6] Vijay Varadharajan,et al. Logic-Based Reasoning on Delegatable Authorizations , 2002, ISMIS.
[7] Tuomas Aura,et al. On the structure of delegation networks , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).