Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 378-381.
Previous Articles Next Articles
LI Jian-li, DENG Xiao, WANG Yi-mou and XIE Yue
[1] Winsborough W H,Seamons K E,Jones V E.Automated trust negotiation[C]∥Proceedings DARPA Information Survivability Conference and Exposition,2000(DISCEX’00).IEEE,2000,1:88-102P [2] Winslett M.An introduction to trust negotiation[M]∥TrustManagement.Springer Berlin Heidelberg,2003:275-283 [3] Harrison M A,Ruzzo W L,Ullman J D.Protection in operating systems[J].Communications of the ACM,1976,19(8):461-471 [4] Bell D E,LaPadula L J.Secure computer systems:Mathematical foundations[R].Mitre Corp Bedford MA,1973 [5] Ferraiolo D,Kuhn D R,Chandramouli R.Role-based access control[M].Artech House,2003 [6] Sandhu R S,Coyne E J,Feinstein H L,et al.Role-based access control models[J].Computer,1996,29(2):38-47 [7] Blaze M,Feigenbaum J,Lacy J.Decentralized trust management[C]∥Proceedings.,1996 IEEE Symposium on Security and Privacy,1996.IEEE,1996:164-173 [8] Bertino E,Ferrari E,Squicciarini A C.Trust-𝒳;:a peer-to-peer framework for trust establishment[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(7):827-842 [9] Liu B,Lu H.A peer-to-peer framework for accelerating trust establishment[C]∥International Conference on Multimedia Information Networking and Security,2009(MINES’09).IEEE,2009,1:135-139 [10] Liu B,Lu H,Zhao Y,et al.A Framework:Trust Establishment for E-services[C]∥International Conference on e-Education,e-Business,e-Management,and e-Learning,2010(IC4E’10).IEEE,2010:141-145 [11] Jianli L.Multi-negotiation targets in Automated Trust Negotiation over TrustBuilder framework[C]∥2012 8th International Conference on Computing Technology and Information Management(NCM and ICNIT).2012,1:101-105 [12] 廖振松.虚拟组织中自动信任协商研究[D].武汉:华中科技大学,2008 |
No related articles found! |
|