PeerAccess
- 7 November 2005
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 168-179
- https://doi.org/10.1145/1102120.1102144
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Driving and Monitoring Provisional Trust Negotiation with MetapoliciesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- A logic-based framework for attribute based access controlPublished by Association for Computing Machinery (ACM) ,2004
- The Pudding of TrustIEEE Intelligent Systems, 2004
- No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic WebLecture Notes in Computer Science, 2004
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Negotiating trust in the WebIEEE Internet Computing, 2002
- Design and implementation of the idemix anonymous credential systemPublished by Association for Computing Machinery (ACM) ,2002
- Dynamically distributed query evaluationPublished by Association for Computing Machinery (ACM) ,2001
- Regulating service access and information release on the WebPublished by Association for Computing Machinery (ACM) ,2000
- A logic of authenticationACM Transactions on Computer Systems, 1990