Trustworthiness-based authorization delegation model

被引:0
|
作者
Liao, Jun-Guo [1 ,2 ]
Hong, Fan [2 ]
Zhu, Geng-Ming [1 ,2 ]
Yang, Qiu-Wei [2 ]
机构
[1] School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
[2] College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2006年 / 29卷 / 08期
关键词
16;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1265 / 1270
相关论文
共 50 条
  • [31] Attribute Delegation Authorization Based on Subjective Trust Evaluation
    Chen, Bo
    Zeng, Guo Sun
    Li, Li
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 42 - 49
  • [32] A Knowledge Management Process to Enhance Trustworthiness-based Security in On-line Learning Teams
    Miguel, Jorge
    Caballe, Santi
    Xhafa, Fatos
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS IEEE INCOS 2015, 2015, : 272 - 279
  • [33] A model of grid multi-level delegation authorization with applications
    Info. Sec. Center, State Key Lab. of Networking and Switching Tech., BJ University of Post and Telecom, Beijing 100876, China
    Dianzi Keji Diaxue Xuebao, 2008, 3 (428-431):
  • [34] Neighborhood trustworthiness-based vehicle-to-vehicle authentication scheme for vehicular ad hoc networks
    Wang, Chen
    Xiao, Lu
    Shen, Jian
    Huang, Rui
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2019, 31 (21):
  • [35] Evaluation of authorization with delegation and negation
    Ruan, C
    Varadharajan, V
    Zhang, Y
    INTELLIGENT INFORMATION PROCESSING AND WEB MINING, 2003, : 547 - 551
  • [36] A formalization of distributed authorization with delegation
    Wang, SJ
    Zhang, Y
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 303 - 315
  • [37] A blockchain based approach for the authorization policies delegation in emergency situations
    Sherazi, Syed Noman Ali
    Zahoor, Ehtesham
    Akhtar, Sabina
    Perrin, Olivier
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (05):
  • [38] Blockchain-based IoT-Cloud Authorization and Delegation
    Tapas, Nachiket
    Merlino, Giovanni
    Longo, Francesco
    2018 IEEE INTERNATIONAL CONFERENCE ON SMART COMPUTING (SMARTCOMP 2018), 2018, : 411 - 416
  • [39] Verification of authorization policies modified by delegation
    Egea, Marina
    Büttner, Fabian
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8431 : 287 - 314
  • [40] Supporting efficient authorization in delegation with supervision
    Lui, RWC
    Chow, SSM
    Hui, LCK
    Yiu, SM
    11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS WORKSHOPS, VOL II, PROCEEDINGS,, 2005, : 240 - 244