Login / Signup
Beyond proof-of-compliance: security analysis in trust management.
Ninghui Li
John C. Mitchell
William H. Winsborough
Published in:
J. ACM (2005)
Keyphrases
</>
security analysis
trust management
management system
access control
security requirements
trust evaluation
computing environments
decision support
trust model
virtual communities
smart card
test bed
public key
virtual organization
access control policies
service providers
encryption scheme