Login / Signup
Automated trust negotiation using cryptographic credentials.
Jiangtao Li
Ninghui Li
William H. Winsborough
Published in:
CCS (2005)
Keyphrases
</>
trust negotiation
automated trust negotiation
access control policies
smart card
access control
conflict resolution
trust management
information sharing
security policies
distributed environment
decision making
social networks
knowledge sharing
trust relationships