Decentralized trust management, Proceedings 1996 IEEE Symposium on Security and Privacy, pp.164-173, 1996. ,
DOI : 10.1109/SECPRI.1996.502679
The Role of Trust Management in Distributed Systems Security Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS, vol.1603, pp.185-210, 1999. ,
Role-based access control with X.509 attribute certificates, IEEE Internet Computing, vol.7, issue.2, pp.62-69, 2003. ,
DOI : 10.1109/MIC.2003.1189190
Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, pp.1-48, 2008. ,
DOI : 10.1145/1380584.1380587
Modeling Trust Mangement in Computer Systems, Proc. of the 9th Int. PhD Workshop OWD 2007, pp.65-70, 2007. ,
Set-Theoretic Semantics of Role-Based Trust Management, Proc. of the 10th Int. PhD Workshop OWD 2008, Conference Archives PTETiS, pp.567-572, 2008. ,
Role-based Access Control, Proc. of the 15th National Computer Security Conference, pp.554-563, 1992. ,
Proposed NIST standard for role-based access control, ACM Transactions on Information and System Security, vol.4, issue.3, pp.224-274, 2001. ,
DOI : 10.1145/501978.501980
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.4562
Inferring dynamic credentials for r??le-based trust management, Proceedings of the 8th ACM SIGPLAN symposium on Principles and practice of declarative programming , PPDP '06, pp.213-224, 2006. ,
DOI : 10.1145/1140335.1140361
Modeling Languages: Syntax, Semantics and All That Stuff, Part I: The Basic Stuff, 2000. ,
RT: A Role-Based Trust-Management Framework, Proc. of the 3rd DARPA Information Survivability Conference and Exposition, pp.201-212, 2003. ,
Design of a Role-Based Trust-Management Framework, Proc. of the IEEE Symposium on Security and Privacy, pp.114-130, 2002. ,
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management, Proc. of the IEEE Symposium on Security and Privacy, pp.123-139, 2003. ,
Distributed Credential Chain Discovery in Trust Management, Journal of Computer Security, vol.1, pp.35-86, 2003. ,
DOI : 10.1145/502001.502005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3410
Role-based access control models, Computer, vol.29, issue.2, pp.38-47, 1996. ,
DOI : 10.1109/2.485845
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.7649