Prenumerata
Bibliografia
[1] Blaze M., Feigenbaum J., Lacy J.: Decentralized Trust Management,
Proc. 17th IEEE Symposium on Security and Privacy,
1996, pp. 164-173.
[2] Ruohomaa S., Kutvonen L.: Trust management survey, Proc.
iTrust 3rd International Conference on Trust Management, Rocquencourt,
pp. 77-92, LNCS 3477/2005, 2005.
[3] Li N., Mitchell J.: RT: A Role-based Trust Management Framework,
Proc. 3rd DARPA Information Survivability Conference
and Exposition, 2003, pp. 201-212
[4] Li N., Winsborough W. H., Mitchell J. C.: Distributed credential
chain discovery in trust management, Journal of Computer
Security, 11(1), pp. 35-86, 2003.
[5] Felkner A., Sacha K.: The Semantics of Role-based Trust
Management Languages, Advances in Software Engineering
Techniques, T. Szmuc, M. Szpyrka, and J. Zendulka, Eds.
LNCS, Heidelberg: Springer, 2012, vol. 7054, pp. 179-189.
[6] Felkner A., Kozakiewicz A.: Time Validity in Role-based Trust
Management Inference System, Secure and Trust Computing,
Data Management, and Applications Communications in
Computer and Information Science, vol. 187, 2011, pp. 7-15.
[7] Gorla, D., Hennessy, M., Sassone, V.: Inferring Dynamic Credentials
for Role-Based Trust Management, Proc. 8th ACM
SIGPLAN PPDP’06, pp. 213-224, (2006)
[8] Felkner A., Kozakiewicz A.: More Practical Application of Trust
Management Credentials, IEEE Conference: Federated Conference
on Computer Science and Information Systems, 2015,
pp. 1125-1134,