Author:
Bhargava Bharat,Zhong Yuhui
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. A. Abdul-Rahman and S. Hailes. Supporting trust in virtual communities. In Hawaii International Conference on System Sciences, Hawaii, January 2000.
2. G. Ahn and R. Sandhu. Role-based authorization constraints specification. ACM Transactions on Information and System Security, 3(4), November 2000.
3. E. Bertino, E. Ferrari, and E. Pitoura. An access control mechanism for large scale data dissemination Systems. In RIDE-DM 2001, 2001.
4. M. Blaze, J. Feigenbaum, and J. Ioannidis. The keynote trust-management System Version 2, http:// www.ietf.org/rfc/rfc2704.txt .
5. M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In the 17th Symposium on Security and Privacy, 1996.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Authorization Estimation Model: An Object Oriented Design Complexity Perspective;International Journal of Security and Its Applications;2014-09-30
2. Practical Investigation;Customer Knowledge Management;2010-11-30
3. Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks;Computational Science and Its Applications – ICCSA 2009;2009
4. Towards an Ontology of Trust;Trust, Privacy, and Security in Digital Business;2005
5. Vulnerabilities and Threats in Distributed Systems;Distributed Computing and Internet Technology;2004