Acknowledgment
We are thankful to Dr. Robert L. Herklotz for his support, which made this work
possible.
References
1. Y. Zuo and B. Panda, “Component Based Trust Management in the Context of a Virtual
Organization”, The 20
th
ACM Symposium on Applied Computing, NM, USA, March
2005
2. J. Bacon, K. Moody, W. Yan, “A Mode of OASIS Role-based Access Control and Its
Support for Active Security”, ACM Transactions on Information and System Security, p.
492-540
3. S. P. Marsh, “Formalising Trust as a Computational Concept”, Ph.D. Dissertation,
University of Stirling, 1994
4. M. Richardson, R. Agrawal, P. Domingos, “Trust Management for the Semantic Web”,
the Second International Semantic Web Conference,. Sanibel Island, FL, USA, 2003.
5. R. Bellman, M. Giertz, “On the Analytic Formalism of the Theory of Fuzzy Sets”,
Information Sciences, 5, p. 149-159, 1973
6.
msdn.microsoft.com/library/default.asp?url=/workshop/security/szone/overview/overview.
asp
7. E. Lupu and M. Sloman, “Reconciling Role Based Management and Role Based Access
Control”, Second Role Based Control Workshop, Virginia, USA, 1997
8. L. Bauer, M. Schneider, and E. Felten, “A General and Flexible Access-Control System
for the Web”, The 11
th
USENIX Security Symposium, p. 93-108, 2002
9. M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, “A Calculus for Access Control in
Distributed Systems”, ACM Transactions on Programming Languages and Systems,
p.706-734, October, 1993
10. E. Bertino, B. Catania, E. Ferrari, and P. Perlasca, “A Logical Framework for Reasoning
about Access Control Models”, ACM Transactions on Information and System Security,
p.71-127, February 2003
11. D. F. Brewer and J. Nash, “The Chinese Wall Security Policy”, T
he IEEE Symposium on
Security and Privacy
, 1989
12. Dorothy E. Denning, “A lattice Model of Secure Information Flow”,
Communications of
the ACM
, 19(5): p. 236-243, 1976
13. D. Bell and L. LaPadula, “The Bell-LaPadula Model”, Journal of Computer Security,
p.303-339, 1997
14. Thomas A. Berson and Teresa F. Lunt, “Multilevel Security for Knowledge-Based
Systems”, In proceedings of the 1987 IEEE Symposium on Privacy and Security, p. 235-
242, 1987
15. Ninghui Li and John C. Mitchell, “RT: A Role-based Trust-management Framework”, The
Third DARPA Information Survivability Conference and Exposition, Washington, D.C.,
April 2003. IEEE Computer Society Press, Los Alamitos, CA, USA, p. 201-212
16. Ninghui Li, William H. Winsborough, and John C. Mitchell, “Distributed Credential
Chain Discovery in Trust Management”, Journal of Computer Security, 11(1): p. 35-86,
February 2003
17. M. Blaz, J. Feigenbaum and J. Lacy., “Decentralized Trust Management”, IEEE
Conference, Anguilla, British West Inides, 1998
205