Analysis of role-based trust management policy using description logics

被引:0
|
作者
机构
[1] Liu, Xinxin
[2] Tang, Shaohua
来源
Tang, S. (csshtang@scut.edu.cn) | 2012年 / Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States卷 / 08期
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Authorization management for role-based collaboration
    Ahn, GJ
    Zhang, LH
    Shin, DW
    Chu, B
    2003 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS, VOLS 1-5, CONFERENCE PROCEEDINGS, 2003, : 4128 - 4134
  • [32] A role-based support mechanism for service description and discovery
    Fernandez, Alberto
    Vasirani, Matteo
    Caceres, Cesar
    Ossowski, Sascha
    SERVICE-ORIENTED COMPUTING: AGENTS, SEMANTICS, AND ENGINEERING, PROCEEDINGS, 2007, 4504 : 132 - +
  • [33] Policy-driven role-based access management for ad-hoc collaboration
    Ahn, Gail-Joon
    Jin, Jing
    Shehab, Mohamed
    JOURNAL OF COMPUTER SECURITY, 2012, 20 (2-3) : 223 - 257
  • [34] A role-based trust model for peer-to-peer systems
    Zhang, Jie
    Zhao, Zheng
    Wang, Song
    Zhang, Qiang
    Zhao, Zhichao
    NEXT-GENERATION COMMUNICATION AND SENSOR NETWORKS 2006, 2006, 6387
  • [35] Trust-based user-role assignment in role-based access control
    Takabi, Hassan
    Amini, Morteza
    Jalili, Rasool
    2007 IEEE/ACS INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS, VOLS 1 AND 2, 2007, : 807 - +
  • [36] A role-based infrastructure for the management of dynamic communities
    Schaeffer-Filho, Alberto
    Lupu, Emil
    Sloman, Morris
    Keoh, Sye-Loong
    Lobo, Jorge
    Calo, Seraphin
    RESILIENT NETWORKS AND SERVICES, 2008, 5127 : 1 - +
  • [37] Rights management for role-based access control
    Bouwman, Bart
    Mauw, Sjouke
    Petkovic, Milan
    2008 5TH IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, VOLS 1-3, 2008, : 1085 - +
  • [38] Policy storage for role-based access control systems
    Belokosztolszki, A
    Eyers, DM
    Wang, W
    Moody, K
    TWELFTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2003, : 196 - 201
  • [39] Language based policy analysis in a SPKI Trust Management System
    Eamani, Arun
    Sistla, A.
    JOURNAL OF COMPUTER SECURITY, 2006, 14 (04) : 327 - 357
  • [40] Toward Social Role-Based Interruptibility Management
    Anderson, Christoph
    Heinisch, Judith Simone
    Deldari, Shohreh
    Salim, Flora
    Ohly, Sandra
    David, Klaus
    Pejovic, Veljko
    IEEE PERVASIVE COMPUTING, 2023, 22 (01) : 59 - 68