| Citation: | Zhang Rongqing, Li Jianxin, Huai Jinpenget al. Secure trust negotiation system for grid computing[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(03): 347-351. (in Chinese) |
|
[1] Yu T, Winslett M. A unified scheme for resource protection in automated trust negotiation . IEEE Symposium on Security and Privacy . Berkeley, California:IEEE, 2003.110~122 [2] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management . Proceedings of 17th Symposium on Security and Privacy . Oakland:IEEE, 1996.164~173 [3] Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation .DARPA Information Survivability Conference and Exposition . IEEE, 2000.88~102 [4] Barlow T, Hess A, Seamons K E. Trust negotiation in electronic markets . Eighth Research Symposium in Emerging Electronic Markets . Maastricht, Netherlands, 2001 [5] Li Ninghui, Winsborough W H, Mitchell J C,et al. Distributed credential chain discovery in trust management . Proceedings of the 8th ACM Conference on Computer and Communications Security . ACM Press, 2001.156~165 [6] Winslett M, Yu T, Seamons K E, et al. Negotiating trust on the web . IEEE Internet Computing . IEEE, 2002.30~37 [7] Hu Chunming, Huai Jinpeng, Zhu Yanmin,et al. Efficient information service management using service club in CROWN grid . Proceedings of the 2005 IEEE International Conference on Services Computing .IEEE Computer Society Press,2005.5~12 [8] Amir H, Yosi M, Joris M, et al. Access control meets public key infrastructure . Proceedings of the 2000 IEEE Symposium on Security and Privacy . Oakland:IEEE Computer Society Press, 2000.2~14
|