1 |
M. Castro, P. Druschel, A. -M. Kermarrec, A. Nandi, A. Rowstron and A. Singh, "Split Stream :High-Bandwidth Multicast in Cooperative Environments," Proc. SOSP '03, Oct. 2003
|
2 |
C. Schlager, T.Nowey and J. Montenegro, "A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce," Proc. of the First Int. Conf. on Availability, Reliability and Security (IEEE ARES '06), 2006
|
3 |
B. Lang et al, "Attribute Based Access Control for Grid Computing," Preprint ANL/MCS-P1367- 0806, August 2006
|
4 |
C. English, P. Nixon, S. Terzis, A. McGetrtrick and H. Lowe, "Dynamic Trust Models for Ubiquitous Computing Environments," Workshop on Security in Ubiquitous Computing. 2002
|
5 |
ISO/IEC 9594-8, Information Technology Open Systems Interconn ection-The Directory :Public-Key and Attribute Certificate Frameworks, 2005
|
6 |
KS X ISO/IEC 9594-8, 지식경제부 기술표준 원, http://www.kats.go.kr
|
7 |
ITI, Role Based Access Control ITU/T. Recommendation X.509|ISO/IEC 9594-8, Information Technology Open Systems Interconnection - The Directory:Public-Key and Attribute Certificate Frameworks, 2003
|
8 |
S. Farrel and R. Hously "An Internet Attribute Certificate Profile for Authorization," IETFRFC 3281, 2002
|
9 |
E. Palomar et al, "A. Ribagorda, Certificatebased Access Control in Pure P2P Networks," 6th IEEE International Conference on Peer-to- Peer Computing, 2006
|
10 |
J. Joshi, E. Bertino and A. Ghafoor, "Temporal hierarchies and inheritance semantics for GTR BAC," Proc. of the seventh ACM symposium on Access control models and technologies, pp.74-83, 2002
|
11 |
Sandro Rafaeli, David Hutchison, "A Survey of Key Management for Secure Group Communication," ACM Computing Surveys, Vol. 35, No. 3, pp. 309-329, 2003
DOI
ScienceOn
|
12 |
D. Ferraiolo, R. Sandhu, S. Bavrila, D. Kuhn and R. Chandramouli, Proposed NIST Standard for Role-Based Access Control, ACM Transactions on Information and System Security, 4(3), 2001
|
13 |
I. Djordjevic, T. Dimitrakos and D. Randal, "Dynamic Service Perimeters for Secure Collaborations in Grid-enabled Virtual Organizations: Overview of a proposed architecture," 2nd European Across Grids Conference, Jan. 2004
|
14 |
D. Kostic, A. Rodriguez, J. Albrecht and A. Vahdat, "Bullet:High Bandwidth Data Dissemination Using An Overlay Mesh," ACM Symposium on Operating Systems Principles, 2003
|
15 |
C. Schlager and N. Ganslmayer, "Effects of Architectural Decisions in Authentication and Authorisation Infrastructures," Proc. of the First Int. Conf. on Availability, Reliability and Security (IEEE ARES '07), 2007
|