Login / Signup
Using reputation to augment explicit authorization.
Phillip J. Windley
Devlin Daley
Bryant Cutler
Kevin Tew
Published in:
Digital Identity Management (2007)
Keyphrases
</>
usage control
trust management
access control
trust relationships
fine grained
conflict resolution
trust evaluation
data sets
case study
trust model
databases
neural network
expert systems
electronic commerce
security policies
role assignment