1 |
E. Bertino, E. Fenari, A. Squicciarini, "X-TNL: An XML-based Language for Trust Negotiations," Proeeedings of the 4th Intemational Workshop on Policies for Distributed Systems and Networks, pp. 1-4. Jun. 2003.
|
2 |
Abhilasha Bhargavspantzel, Anna C. Squicciarini, Elisa Bertino, '"Trust Negotiation in Identity Management," IEEE Security and Privacy, Vol. 5, pp. 55-63, Mar-Apr.2007.
DOI
|
3 |
Piero Bonatti, and Pierangela Samarati, "Regulating Service Aceess and Information Release on the Web," ACM Conference on Computer and Communications Security, Athens, Greece, pp. 134-143, Nov. 2000.
|
4 |
Amir Herzberg, Yosi Mass, Joris Michaeli, Dalit Naor, and Yiftaeh Ravid, "Access Control Meets Public Key Infrastueture, Or: Assigning Roles to Strangers," IEEE Symposium on Security and Privacy, Oakland, CA. pp. 2-14, May. 2000.
|
5 |
Kent E. Seamons et. ai, "Requirements for Policy Languages for Trust Negotiation," Proceedings of the 3rd Intemational Workshop on Policies for Distributed Systems and Networks, pp. 68-79, Jun. 2002.
|
6 |
Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Transactions on Knowledge and Data engineering, Vol. 16, No.7, pp. 827-842, Jul. 2004.
DOI
ScienceOn
|