Dynamic inter-organizational cooperation setup in Circle-of-Trust environments
暂无分享,去创建一个
[1] Christian Damsgaard Jensen,et al. Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .
[2] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[3] N. L. Chervany,et al. THE MEANINGS OF TRUST , 2000 .
[4] J. Feigenbaum,et al. The KeyNote trust management system version2, IETF RFC 2704 , 1999 .
[5] Amir Herzberg,et al. Access control meets public key infrastructure, or: assigning roles to strangers , 2000, Proceeding 2000 IEEE Symposium on Security and Privacy. S&P 2000.
[6] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[7] Joan Feigenbaum,et al. The KeyNote Trust-Management System Version 2 , 1999, RFC.
[8] Siddharth Bajaj,et al. Web Services Federation Language (WS- Federation) , 2003 .
[9] Chris J. Mitchell,et al. A Taxonomy of Single Sign-On Systems , 2003, ACISP.
[10] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[11] Latifa Boursas,et al. Propagating Trust and Privacy Aspects in Federated Identity Management Scenarios , 2008 .
[12] Sharon L. Milgram,et al. The Small World Problem , 1967 .
[13] Jennifer Golbeck,et al. Computing and Applying Trust in Web-based Social Networks , 2005 .
[14] James A. Hendler,et al. Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.
[15] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 1999, RFC.
[16] Wolfgang Hommel,et al. Federated Identity Management: Shortcomings of existing standards , 2005 .
[17] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[18] Serguei Leontiev,et al. Using the GOST R 34.10-94, GOST R 34.10-2001, and GOST R 34.11-94 Algorithms with the Internet X.509 Public Key Infrastructure Certificate and CRL Profile , 2006, RFC.