Compliance checking in the PolicyMaker trust management system, 2nd International Conference on Financial Cryptography, pp.254-274, 1998. ,
DOI : 10.1007/BFb0055488
The KeyNote trustmanagement system, 1999. ,
Authorization in trust management, ACM Computing Surveys, vol.40, issue.3, p.40, 2008. ,
DOI : 10.1145/1380584.1380587
An Introduction to the Role Based Trust Management Framework RT, LNCS, vol.4677, pp.246-281, 2007. ,
DOI : 10.1007/978-3-540-74810-6_9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.3748
Design of a Role-Based Trust-Management Framework, IEEE Symposium on Security and Privacy, pp.114-130, 2002. ,
Distributed Credential Chain Discovery in Trust Management, J. Computer Security, vol.1, pp.35-86, 2003. ,
DOI : 10.1145/502001.502005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3410
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation NDSS, 2001. ,
Risk management for distributed authorization, Journal of Computer Security, vol.15, issue.4, pp.447-489, 2007. ,
DOI : 10.3233/JCS-2007-15402
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.330.9950
Automated trust negotiation technology with attributebased access control, Proc. DARPA Information Survivability Conf. and Exposition, pp.60-62, 2003. ,
DOI : 10.1109/discex.2003.1194916
Attributed based access control, ABAC) for Web services Proc. IEEE Int. Conf. Web Services ICWS, 2005. ,
Shinren: Non-monotonic Trust Management for Distributed Systems, Proc. IFIP Advances in Information and Communication Technology, 2010. ,