Author:
Pimlott Andrew,Kiselyov Oleg
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Abadi, M. Logic in access control. In: LICS [16], pp. 228–233
2. Blaze, M.: Using the KeyNote Trust Management System (March 2001), http://www.crypto.com/trustmgt/
3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy (May 1996)
4. Lecture Notes in Computer Science;P. Bruscoli,2003
5. Chisholm, P.: IA roadmap. Military Information Technology 9, 5 (2005)
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computational Trust and Reputation Management;Trust and Reputation Management Systems;2017-08-13
2. Guardat;Proceedings of the Tenth European Conference on Computer Systems;2015-04-17
3. Labeled Goal-Directed Search in Access Control Logic;Security and Trust Management;2013
4. Design of Attribute-Based Access Control in Cloud Computing Environment;Lecture Notes in Electrical Engineering;2011-12-07
5. Nexus authorization logic (NAL);ACM Transactions on Information and System Security;2011-05