共 31 条
- [1] Blaze M., Feigenbaum J., Lacy J., Decentralized trust management, Proc. of the 1996 IEEE Symp. on Security and Privacy, pp. 164-173, (1996)
- [2] Xu F., Lu J., Research and development of trust management in Web security, Journal of Software, 13, 11, pp. 2057-2064, (2002)
- [3] Winsborough W.H., Seamons K.E., Jones V.E., Automated trust negotiation, DARPA Information Survivability Conf. and Exposition, pp. 88-102, (2000)
- [4] Johnson W., Mudumbai S., Thompson M., Authorization and attribute certificates for widely distributed access control, IEEE Proc. of the 7th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, pp. 340-345, (1998)
- [5] Li N.H., Mitchell J.C., Winsborough W.H., Design of a role-based trust management framework, Proc. of the 2002 IEEE Symp. on Security and Privacy, pp. 114-130, (2002)
- [6] Li N.H., Winsborough W.H., Mitchell J.C., Distributed credential chain discovery in trust management, Proc. of the 8th ACM Conf. on Computer and Communications Security, pp. 156-165, (2001)
- [7] Barlow T., Hess A., Seamons K.E., Trust negotiation in electronic markets, Proc. of 8th Research Symp. in Emerging Electronic Markets, (2001)
- [8] Seamons K.E., Winslett M., Yu T., Limiting the disclosure of access control policies during automated trust negotiation, Network and Distributed System Security Symp. (NDSS 2001), (2001)
- [9] Seamons K.E., Winslett M., Yu T., Yu L., Jarvis R., Protecting privacy during on-line trust negotiation, Proc. of the 2nd Workshop on Privacy Enhancing Technologies, pp. 129-143, (2003)
- [10] Smith B., Seamons K.E., Jones M.D., Responding to policies at runtime in TrustBuilder, Proc. of the 5th Int'l Workshop on Policies for Distributed Systems and Networks, pp. 149-158, (2004)