Login / Signup
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles.
Keith B. Frikken
Jiangtao Li
Mikhail J. Atallah
Published in:
NDSS (2006)
Keyphrases
</>
trust negotiation
access control policies
conflict resolution
access control
security policies
distributed environment
optimal policy
trust management
management system
operating system
trust relationships
automated trust negotiation