Author:
Corin R.,Etalle S.,den Hartog J.,Lenzini G.,Staicu I.
Reference12 articles.
1. M. Abadi. Logic in access control. 18th IEEE Symposium on Logic in Computer Science, June 2003.
2. A. W. Appel and E. W. Felten. Proof-carrying authentication. Proceedings of the 6th ACM Conference on Computer and Communications Security, pages 52–62, November 1999.
3. P. Ashley, S. Hada, G. Karjoth, and M. Schunter. E-p3p privacy policies and privacy authorization. Proceeding of the ACM workshop on Privacy in the Electronic Society, 2002.
4. P. Ashley, S. Hada, C. Powers, and M. Schunter. Enterprise privacy authorization language (EPAL). Research Report 3485, IBM Research, 2003.
5. M. Blaze, J. Feigenbaum, and A. D. Keromytis. The role of trust management in distributed systems security. Secure Internet Programming, Security Issues for Mobile and Distributed Objects, pages 185–210, 1999.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献