[1]
Winsborough WH, Seamons KE, Jones VE. Automated trust negotiation. In: DARPA Information Survivability Conf. and Exposition. New York: IEEE Press, 2000. Pages: 88-102.
DOI: 10.1109/discex.2000.824965
Google Scholar
[2]
Winsborough WH, Li NH. Safety in automated trust negotiation. In: IEEE Symp. on Security and Privacy 2004. Washington: IEEE Computer Society Press, 2004. Pages: 147−160.
DOI: 10.1109/secpri.2004.1301321
Google Scholar
[3]
Holt JE, Bradshaw RW, Seamons KE, Orman H. Hidden credentials. Proc of the ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2003. Pages: 1-8.
DOI: 10.1145/1005140.1005142
Google Scholar
[4]
Bradshaw RW, Holt JE, Seamons KE. Concealing complex policies with hidden credentials. ACM Conf. on Computer and Communications Security. New York: ACM Press. 2004. Pages: 146-157.
DOI: 10.1145/1030083.1030104
Google Scholar
[5]
Frikken K, Atallah M, Li JT. Hidden access control policies with hidden credentials. ACM Workshop on Privacy in the Electronic Society. New York: ACM Press, 2004. Pages: 27-28.
DOI: 10.1145/1029179.1029186
Google Scholar
[6]
Jiangtao Li. Ninghui Li. William H. Winsborough: Automated Trust Negotiation Using Cryptographic Credentials. CCS'05, November 7–11, 2005, Pages: 46-57.
DOI: 10.1145/1102120.1102129
Google Scholar
[7]
Adi Shamlr. Identity based cryptosystems and signature schemes[A]. In G. BIakley and David Chaum Editors, Proceedings of Crypto 1984, volume 196 of LNCS[C]. Springer-Verlag, 1984, 47-53.
Google Scholar
[8]
Winsborough, W.H.; Jacobs, J: Automated trust negotiation in attribute-based access control. DARPA Information Survivability Conference and Exposition, 2003. Proceedings Volume 2, Issue, 22-24 April 2003 Pages: 252 - 257.
DOI: 10.1109/discex.2003.1194974
Google Scholar
[9]
Ting Yu. Marianne Winslett. Kent E: Supporting Structured Credentials and Sensitive Policies through Interoperable Strategies for Automated Trust Negotiation. ACM Transactions on Information and System Security, Vol. 6, No. 1, February 2003, Pages: 1–42.
DOI: 10.1145/605434.605435
Google Scholar
[10]
Dan Boneh, Matt Franklin. Identity-based encryption from the Well pairing[c]. Joe Kilian, editor, Proceedings of Crypto 2001, LNCS Springer-Verlag, 2001, 2139: 213-229.
DOI: 10.1007/3-540-44647-8_13
Google Scholar
[11]
Dan Boneh, Xavier Boyen, Eu-Jin Goh. Hierarchical identity based encryption with constant size ciphertext[C]. Advances in Cryptology EUROCRYPT 2005 Springer-Verlag. 2005. LNCS, 3494: 440-456.
DOI: 10.1007/11426639_26
Google Scholar
[12]
Sherman S M Chow, Lucas C K Hui, Siu MingYiu, et a1. Secure hierarchical identity based signature and its application. ICICS 2004, Springer-Verlag, 2004, LNCS. 3269: 480-494.
Google Scholar
[13]
Markus Lorch. Seth Proctor. Rebekah Lepro: First Experiences Using XACML for Access Control in Distributed Systems ACM Workshop on XML Security, October 31, 2003, Pages 25-37.
DOI: 10.1145/968559.968563
Google Scholar
[14]
Moses, T., ed., Privacy policy profile of XACML v2. 0; OASIS Standard, February 1, (2005).
Google Scholar
[15]
Moses, T., ed., eXtensible Access Control Markup Language (XACML), Version 2. 0; OASIS Standard, February 1, (2005).
Google Scholar
[16]
Anderson, A., and Lockhart, H., eds., SAML 2. 0 profile of XACML v2. 0, OASIS Standard, 1 February (2005).
Google Scholar
[17]
Anderson, A., ed., Hierarchical resource profile of XACML v2. 0, OASIS Standard, 1 February (2005).
Google Scholar
[18]
Fan Hong, Lei Liu: Implementing access policies with hidden credentials. Computer Application, 2005. 12 Vol. 25 No. 12 Pages: 2731-2733(in Chinese).
Google Scholar
[19]
Xuexiong Yan, Hengtai Ma, Qingxian Wang, Pengfei Li: Attribute-tree based access control model for Web services. Computer Engineering and Applications, 2008. Vol. 44 No. 6 Pages: 142-145 (in Chinese).
Google Scholar