The official PGP user's guide
Authentication metric analysis and design
ACM Transactions on Information and System Security (TISSEC)
Valuation of Trust in Open Networks
ESORICS '94 Proceedings of the Third European Symposium on Research in Computer Security
Reasoning about Trust and Insurance in a Public Key Infrastructure
CSFW '00 Proceedings of the 13th IEEE workshop on Computer Security Foundations
Hi-index | 0.00 |
Trust Management systems use security credentials to determine whether action requests are authorized. This paper examines how they might be used in determining whether requests for delegation are safe.