Computing of Trust in Distributed Networks
暂无分享,去创建一个
Robert H. Deng | Feng Bao | Huafei Zhu | R. Deng | Huafei Zhu | F. Bao
[1] Tuomas Aura,et al. On the structure of delegation networks , 1998, Proceedings. 11th IEEE Computer Security Foundations Workshop (Cat. No.98TB100238).
[2] Morris Sloman,et al. Specifying and Analysing Trust for Internet Applications , 2002, I3E.
[3] Silvio Micali,et al. Transitive Signature Schemes , 2002, CT-RSA.
[4] Jorge Lobo,et al. Policies for distributed systems and networks : international workshop, POLICY 2001, Bristol, UK, January 29-31, 2001 : proceedings , 2001 .
[5] Bruce Schneier,et al. Inside risks: risks of PKI: secure email , 2000, CACM.
[6] Thomas Beth,et al. Valuation of Trust in Open Networks , 1994, ESORICS.
[7] Jorge Lobo,et al. Policies for Distributed Systems and Networks , 2001, Lecture Notes in Computer Science.
[8] Tuomas Aura,et al. Towards a Survivable Security Architecture for Ad-Hoc Networks , 2001, Security Protocols Workshop.
[9] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[10] Angelos D. Keromytis,et al. Trust management for IPsec , 2002, TSEC.
[11] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[12] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[13] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[14] Carl M. Ellison,et al. The nature of a useable PKI , 1999, Comput. Networks.
[15] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[16] Bruce Schneier,et al. Risks of PKI: E-Commerce. , 2000 .
[17] Emil C. Lupu,et al. A Policy Language for the Management of Distributed Agents , 2001, AOSE.
[18] Thomas Beth,et al. Trust-Based Navigation in Distribution Systems , 1994, Comput. Syst..
[19] Tuomas Aura,et al. Fast Access Control Decisions from Delegation Certificate Databases , 1998, ACISP.
[20] Michael K. Reiter,et al. Resilient Authentication Using Path Independence , 1998, IEEE Trans. Computers.
[21] Joan Feigenbaum,et al. KeyNote : Trust management for public-key infrastructures. Discussion , 1999 .
[22] Tuomas Aura,et al. Distributed Access-Rights Managements with Delegations Certificates , 2001, Secure Internet Programming.