An Introduction to Trust Negotiation
- 27 May 2003
- conference paper
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 275-283
- https://doi.org/10.1007/3-540-44875-6_20
Abstract
No abstract availableThis publication has 12 references indexed in Scilit:
- Requirements for policy languages for trust negotiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Towards practical automated trust negotiationPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- An access control model for dynamic client-side contentPublished by Association for Computing Machinery (ACM) ,2003
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Distributed credential chain discovery in trust management*Journal of Computer Security, 2003
- A Hybrid PKI Model: Application to Secure MediationIFIP Advances in Information and Communication Technology, 2003
- Access control meets public key infrastructure, or: assigning roles to strangersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Regulating service access and information release on the WebPublished by Association for Computing Machinery (ACM) ,2000
- User privacy issues regarding certificates and the TLS protocolPublished by Association for Computing Machinery (ACM) ,2000
- Rethinking Public Key Infrastructures and Digital CertificatesPublished by MIT Press ,2000