More practical application of Trust management credentials
暂无分享,去创建一个
[1] Turgay Korkmaz,et al. Mobile Ad-Hoc Networks Security , 2012, CSIE 2012.
[2] Jerry den Hartog,et al. Nonmonotonic Trust Management for P2P Applications , 2005, STM.
[3] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[4] Sandro Etalle,et al. An Introduction to the Role Based Trust Management Framework RT , 2007, FOSAD.
[5] Chithra Selvaraj,et al. A Role Based Trust Model for Peer to Peer Systems Using Credential Trees , 2011 .
[6] Joan Feigenbaum,et al. The Role of Trust Management in Distributed Systems Security , 2001, Secure Internet Programming.
[7] Daniele Gorla,et al. Inferring dynamic credentials for rôle-based trust management , 2006, PPDP '06.
[8] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[9] Hongchang Liu,et al. Role-based Trust Management Model in Multi-domain Environment , 2012 .
[11] Anna Felkner. How the Role-Based Trust Management Can Be Applied to Wireless Sensor Networks , 2012 .
[12] Anna Felkner,et al. Time Validity in Role-Based Trust Management Inference System , 2011, STA Workshops.
[13] Krzysztof Sacha,et al. Deriving RTT Credentials for Role-Based Trust Management , 2010, e Informatica Softw. Eng. J..
[14] A. Felkner,et al. RTT+ - Time Validity Constraints in RTT Language , 2012 .
[15] Ninghui Li,et al. Design of a role-based trust-management framework , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[17] Anna Sankowska,et al. Trust management in virtual work environments : a human factors perspective , 2008 .
[18] Xiaoyang Sean Wang,et al. Authorization in trust management: Features and foundations , 2008, CSUR.
[19] Ronald L. Rivest,et al. Certificate Chain Discovery in SPKI/SDSI , 2002, J. Comput. Secur..