Towards practical automated trust negotiation
暂无分享,去创建一个
[1] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[2] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..
[3] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[4] Ninghui Li,et al. Distributed credential chain discovery in trust management: extended abstract , 2001, CCS '01.
[5] Ninghui Li,et al. RT: a Role-based Trust-management framework , 2003, Proceedings DARPA Information Survivability Conference and Exposition.
[6] Pierangela Samarati,et al. Regulating service access and information release on the Web , 2000, CCS.
[7] Marianne Winslett,et al. Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation , 2001, NDSS.
[8] K.E. Seamons,et al. Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.
[9] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[10] Marianne Winslett,et al. PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet , 2000, CCS.
[11] Marianne Winslett,et al. Interoperable strategies in automated trust negotiation , 2001, CCS '01.
[12] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.