Regularity-Based Trust in Cyberspace
暂无分享,去创建一个
[1] Paddy Nixon,et al. Dynamic trust models for ubiquitous computing environments , 2002 .
[2] Angelos D. Keromytis,et al. Implementing a distributed firewall , 2000, CCS.
[3] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[4] D. Richard Kuhn,et al. A role-based access control model and reference implementation within a corporate intranet , 1999, TSEC.
[5] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Konstantin Beznosov,et al. Supporting relationships in access control using role based access control , 1999, RBAC '99.
[7] Frank Dignum,et al. The Role of Deontic Logic in the Specification of Information Systems , 1998, Logics for Databases and Information Systems.
[8] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[9] Victoria Ungureanu,et al. Law-Governed Internet Communities , 2000, COORDINATION.
[10] Victoria Ungureanu,et al. Establishing Business Rules for Inter-Enterprise Electronic Commerce , 2000, DISC.
[11] Martín Abadi,et al. The Millicent Protocol for Inexpensive Electronic Commerce , 1995, World Wide Web J..
[12] Peter F. Linington,et al. Options for expressing ODP enterprise communities and their policies by using UML , 1999, Proceedings Third International Enterprise Distributed Object Computing. Conference (Cat. No.99EX366).
[13] Carl M. Ellison,et al. The nature of a useable PKI , 1999, Comput. Networks.
[14] Victoria Ungureanu,et al. Formal treatment of certificate revocation under communal access control , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[15] Morris Sloman,et al. Policy driven management for distributed systems , 1994, Journal of Network and Systems Management.
[16] James P Anderson,et al. Computer Security Technology Planning Study , 1972 .
[17] Jean Bacon,et al. Access control in an open distributed environment , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[18] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[19] Victoria Ungureanu,et al. Law-governed interaction: a coordination and control mechanism for heterogeneous distributed systems , 2000, TSEM.
[20] Terry Winograd,et al. A communication agreement framework for access/action control , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[21] Simon N. Foley. The specification and implementation of “commercial” security requirements including dynamic segregation of duties , 1997, CCS '97.
[22] Michael J. Nash,et al. The Chinese Wall security policy , 1989, Proceedings. 1989 IEEE Symposium on Security and Privacy.
[23] Naftaly H. Minsky,et al. The Imposition of Protocols Over Open Distributed Systems , 1991, IEEE Trans. Software Eng..
[24] David D. Clark,et al. A Comparison of Commercial and Military Computer Security Policies , 1987, 1987 IEEE Symposium on Security and Privacy.
[25] Trevor Jim,et al. SD3: a trust management system with certified evaluation , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[26] Günter Karjoth. The Authorization Service of Tivoli Policy Director , 2001, Seventeenth Annual Computer Security Applications Conference.
[27] Zoran Milosevic,et al. Policies in communities: extending the ODP enterprise viewpoint , 1998, Proceedings Second International Enterprise Distributed Object Computing (Cat. No.98EX244).