Beyond proof-of-compliance: security analysis in trust management
From MaRDI portal
Publication:3546305
DOI10.1145/1066100.1066103zbMath1323.68035OpenAlexW2043144080MaRDI QIDQ3546305
John C. Mitchell, Ninghui Li, William Winsborough
Publication date: 21 December 2008
Published in: Journal of the ACM (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1066100.1066103
Analysis of algorithms and problem complexity (68Q25) Data encryption (aspects in computer science) (68P25) Logic programming (68N17) Distributed systems (68M14)
Related Items (6)
Logic in Access Control (Tutorial Notes) ⋮ An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling ⋮ Policy analysis for administrative role-based access control ⋮ Role-based access control for boxed ambients ⋮ Analysis of dynamic policies ⋮ On the Decidability of the Safety Problem for Access Control Policies
This page was built for publication: Beyond proof-of-compliance: security analysis in trust management