Login / Signup
Automated trust negotiation using cryptographic credentials.
Jiangtao Li
Ninghui Li
William H. Winsborough
Published in:
ACM Trans. Inf. Syst. Secur. (2009)
Keyphrases
</>
trust negotiation
automated trust negotiation
access control policies
smart card
access control
trust management
conflict resolution
distributed environment
information sharing
security mechanisms
trust relationships
security policies