Author:
Cho Hyun-Sook,Lee Bong-Hwan,Lee Kyu-Won
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Djordjevic, I., Dimitrakos, T.: Towards dynamic security perimeters for virtual collaborative networks. In: Trust Management: Second International Conference, iTrust, Oxford, UK (March 29–April 1, 2004)
2. Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated trust negotiation. In: DARPA Information Survivability Conference and Exposition, 2000, DISCEX Proceedings, vol. 1, pp. 88–102. IEEE, Los Alamitos (2000)
3. Tuecke, S., et al.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile. IETF (2003)
4. Turner, S., Arsenault, A.: X.509 Public Key Infrastructure, IETF (2002)
5. Hertzberg, A., Mihaeli, J., Mass, Y., Naor, D., David, Y.: Access Control Meets Public Key Infrastructure, Or Assigning Roles to Strangers. In: IEEE Symposium on Security and Privacy, Oakland, CA. IEEE Computer Society Press, Los Alamitos (2000)