Authorization in trust management: Features and foundations

PC Chapin, C Skalka, XS Wang - ACM Computing Surveys (CSUR), 2008 - dl.acm.org
Trust management systems are frameworks for authorization in modern distributed systems,
allowing remotely accessible resources to be protected by providers. By allowing providers …

[图书][B] Handbook of graph drawing and visualization

R Tamassia - 2013 - books.google.com
Get an In-Depth Understanding of Graph Drawing Techniques, Algorithms, Software, and
Applications The Handbook of Graph Drawing and Visualization provides a broad, up-to …

Design of a role-based trust-management framework

N Li, JC Mitchell… - Proceedings 2002 IEEE …, 2002 - ieeexplore.ieee.org
We introduce the RT framework, a family of role-based trust management languages for
representing policies and credentials in distributed authorization. RT combines the strengths …

Distributed credential chain discovery in trust management

N Li, WH Winsborough, JC Mitchell - … of the 8th ACM Conference on …, 2001 - dl.acm.org
We give goal-oriented algorithms for discovering credential chains in RT o, a role-based
trust-management language introduced in this paper. The algorithms search credential …

Trust management tools for internet applications

T Grandison, M Sloman - … , iTrust 2003 Heraklion, Crete, Greece, May 28 …, 2003 - Springer
Trust management has received a lot of attention recently as it is an important component of
decision making for electronic commerce, Internet interactions and electronic contract …

RT: A role-based trust-management framework

N Li, JC Mitchell - Proceedings DARPA Information …, 2003 - ieeexplore.ieee.org
The RT Role-based Trust-management framework provides policy language, semantics,
deduction engine, and pragmatic features such as application domain specification …

A formal model for trust in dynamic networks

M Carbone, M Nielsen… - … Engineering and Formal …, 2003 - ieeexplore.ieee.org
We propose a formal model of trust informed by the Global Computing scenario and
focusing on the aspects of trust formation, evolution, and propagation. The model is based …

A unified scheme for resource protection in automated trust negotiation

T Yu, M Winslett - 2003 Symposium on Security and Privacy …, 2003 - ieeexplore.ieee.org
Automated trust negotiation is an approach to establishing trust between strangers through
iterative disclosure of digital credentials. In automated trust negotiation, access control …

Cassandra: Flexible trust management, applied to electronic health records

MY Becker, P Sewell - Proceedings. 17th IEEE Computer …, 2004 - ieeexplore.ieee.org
We study the specification of access control policy in large-scale distributed systems. We
present Cassandra, a language and system for expressing policy, and the results of a …

A survey of approaches to adaptive application security

A Elkhodary, J Whittle - International Workshop on Software …, 2007 - ieeexplore.ieee.org
Adaptive systems dynamically change their behavior or structure at runtime to respond to
environmental changes. This paper considers one class of adaptive systems-those that …