Trust management services in relational databases
暂无分享,去创建一个
[1] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[2] Ninghui Li,et al. Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.
[3] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[4] Marianne Winslett,et al. A unified scheme for resource protection in automated trust negotiation , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Sushil Jajodia,et al. Access Control Policies and Languages in Open Environments , 2007, Secure Data Management in Decentralized Systems.
[6] Sabrina De Capitani di Vimercati,et al. Access Control: Policies, Models, and Mechanisms , 2000, FOSAD.
[7] Sushil Jajodia,et al. A logic-based framework for attribute based access control , 2004, FMSE '04.
[8] Marianne Winslett,et al. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation , 2003, TSEC.
[9] Pierangela Samarati,et al. A Uniform Framework for Regulating Service Access and Information Release on the Web , 2002, J. Comput. Secur..
[10] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[11] Joan Feigenbaum,et al. REFEREE: Trust Management for Web Applications , 1997, Comput. Networks.
[12] Ninghui Li,et al. Automated trust negotiation using cryptographic credentials , 2005, CCS '05.
[13] Ting Yu,et al. Preventing attribute information leakage in automated trust negotiation , 2005, CCS '05.
[14] Marianne Winslett,et al. Using Digital Credentials on the World Wide Web , 1997, J. Comput. Secur..
[15] Boon Thau Loo,et al. Trust Management , 2006, Lecture Notes in Computer Science.
[16] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[17] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[18] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[19] Vijayalakshmi Atluri,et al. An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies , 2005, ICISS.