1 |
T. Ryutov et al., “Adaptive Trust Negotiation and Access Control for Grids,” In Proc. of 6th IEEE/ACM International Workshop on Grid Computing, Seattle, WA, November, 2005
DOI
|
2 |
Ian Foster et al., “Security Architecture for Open Grid Services,” GGF OGSA Security Workgroup, June, 2003
|
3 |
M. Winslett et al., “Negotiating Trust on the Web,” IEEE Internet Computing Special Issue on Trust Management, pp.6(6):30–37, Nov./Dec., 2002
DOI
ScienceOn
|
4 |
M. Blaze, J. Feigenbaum and J. Lacy, “Decentralized trust management,” Proceedings of the IEEE Symposium on Research in Security and Privacy, (Oakland, CA), IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, pp.164-173, May, 1996
|
5 |
T. Yu, M. Winslett and K. Seamons. Interoperable strategies in automated trust negotiation. Proc. of ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, November, 2001
|
6 |
T. Yu, X. Ma and M. Winslett. “PRUNES: An efficient and complete strategy for trust negotiation over the Internet,” Proc. of ACM Conference on Computer and Communications Security, Athens, November, 2000
|
7 |
GGF Security Area, Grid Security Infrastructure Working Group, http://www.gridforum.org/security/gsi/index.html, 2007
|
8 |
D. F. Ferraiolo et. al, “A role-based access control model and reference implementation within a corporate intranet,” ACM Transactions on Information and System Security, Vol.2, pp.34-64, Feb. 1999
DOI
|
9 |
R. Sandhu et. al, “The ARBAC97 model for role-based administration of roles,” ACM Transactions on Information and System Security, Vol.2, pp.105-135, Feb., 1999
DOI
|
10 |
S. Osborn, “Mandatory access control and role-based access control revisited,” In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), (New York, NY), ACM Press, Nov., 6-7, pp.31-40, 1997
DOI
|
11 |
H Cho, B Lee, K Lee, “A Trust Management Model for PACS-Grid,” LNCS, Computational Science and Its Applications, ICCSA, 2007
DOI
ScienceOn
|
12 |
Erberich SG et al., “Globus MEDICUS - Federation of DICOM Medical Imaging Devices into Healthcare Grids. Studies in Health Technology and Informatics,” IOS Press, Vol.126, pp.269-278, 2007
|
13 |
Weifeng Chen et. al, “Optimizing Cost-sensitive Trust-negotiation Protocols,” NSF Technical Report, 2004
|
14 |
Howard Chivers, “Grid Security: Problems and Potential Solutions,” Department of Computer Science, University of York, 2003
|
15 |
T. Yu et al., “Supporting structured credentials and sensitive policies through interoperable strategies in automated trust negotiation,” ACM Transactions on Information and System Security, pp.6(1):1–42, Feb., 2003
DOI
|