2004
DOI: 10.1007/978-3-540-25956-5_24
|View full text |Cite
|
Sign up to set email alerts
|

No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
75
0

Year Published

2005
2005
2006
2006

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 80 publications
(75 citation statements)
references
References 10 publications
0
75
0
Order By: Relevance
“…PeerTrust [7] builds upon previous work on policy-based access control and release for the Web and implements automated trust negotiation for such a dynamic environment.…”
Section: Peertrustmentioning
confidence: 99%
See 4 more Smart Citations
“…PeerTrust [7] builds upon previous work on policy-based access control and release for the Web and implements automated trust negotiation for such a dynamic environment.…”
Section: Peertrustmentioning
confidence: 99%
“…Protune's rule language extends two previous languages: PAPL [20], which until 2002 was one of the most complete policy languages for trust negotiation, and PeerTrust [7], which supports distributed credentials and a more flexible policy protection mechanism. In addition, the framework features a powerful declarative meta-language for driving some critical negotiation decisions, and integrity constraints for monitoring negotiations and credential disclosure.…”
Section: Protunementioning
confidence: 99%
See 3 more Smart Citations