TrustAC: Trust-Based Access Control for Pervasive Devices
暂无分享,去创建一个
[1] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[2] David R. Kuhn,et al. Role-Based Access Control (RBAC): Features and Motivations | NIST , 1995 .
[3] Carl M. Ellison,et al. SPKI Requirements , 1999, RFC.
[4] Joan Feigenbaum,et al. The KeyNote Trust-Management System , 1998 .
[5] Audun Jøsang,et al. An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.
[6] Chris Shiflett,et al. Essential PHP security - a guide to building secure web applications , 2005 .
[7] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[8] Lisa J. Carnahan,et al. Security in Open Systems , 1994 .
[9] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[10] D. Richard Kuhn,et al. Role-Based Access Control ( RBAC ) : Features and Motivations , 2014 .
[11] Sun Meifeng,et al. KeyNote Trust Management System , 2002 .
[12] Tim Moses,et al. EXtensible Access Control Markup Language (XACML) version 1 , 2003 .
[13] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[14] Roch Guérin,et al. A Framework for Policy-based Admission Control , 2000, RFC.
[15] Celeste Campo,et al. PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .
[16] Audun J sang,et al. An Algebra for Assessing Trust in Certi cation Chains , 1998 .