Proceedings 1996 IEEE Symposium on Security and Privacy
DOI: 10.1109/secpri.1996.502679
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized trust management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

4
954
0
8

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 1,196 publications
(966 citation statements)
references
References 1 publication
4
954
0
8
Order By: Relevance
“…be used. This is similar in spirit with the work of Blaze and Feigenbaum [5], except that by unifying the agent language and the trust speci cation language, the programmer's work is simpli ed.…”
Section: Trust Modelsmentioning
confidence: 84%
See 2 more Smart Citations
“…be used. This is similar in spirit with the work of Blaze and Feigenbaum [5], except that by unifying the agent language and the trust speci cation language, the programmer's work is simpli ed.…”
Section: Trust Modelsmentioning
confidence: 84%
“…This necessarily implies having some basic public key infrastructure | we should be able to leverage o of the existing work being done to support SSL [6], PCT [3], and TLS. 5 …”
Section: Trusted Environments Secure Coprocessorsmentioning
confidence: 99%
See 1 more Smart Citation
“…The Policy based Trust systems like SPKI/SDSI [14], PolicyMaker [23], KeyNote [24], DelegationLogic [22] use credential verification to establish trust relationship for access control. These systems are based on the notion of delegation, whereby one entity gives some of its authority to other entities.…”
Section: Introductionmentioning
confidence: 99%
“…In the mid 1990s, Blaze, Feigenbaum, and Lacy coined the term "trust management" [6] to treat similar issues in an application-independent way.…”
Section: Introductionmentioning
confidence: 99%