Entry Yu:2003:SSC from tissec.bib
Last update: Sun Oct 15 02:58:48 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Yu:2003:SSC,
author = "Ting Yu and Marianne Winslett and Kent E. Seamons",
title = "Supporting structured credentials and sensitive
policies through interoperable strategies for automated
trust negotiation",
journal = j-TISSEC,
volume = "6",
number = "1",
pages = "1--42",
month = feb,
year = "2003",
CODEN = "ATISBQ",
ISSN = "1094-9224 (print), 1557-7406 (electronic)",
ISSN-L = "1094-9224",
bibdate = "Thu Aug 7 09:02:37 MDT 2003",
bibsource = "http://portal.acm.org/;
http://www.math.utah.edu/pub/tex/bib/tissec.bib",
acknowledgement = ack-nhfb,
fjournal = "ACM Transactions on Information and System Security",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J789",
}
Related entries
- automated,
9(3)352,
10(3)12,
12(1)4,
13(1)2,
15(1)3,
15(3)12,
15(4)17,
17(4)14,
18(3)9
- credential,
10(3)12,
11(1)2,
12(1)6,
12(2)8,
12(3)15,
13(1)2,
13(4)39,
14(1)8,
14(1)10,
14(4)29,
15(1)4,
17(3)10
- interoperable,
10(3)12
- negotiation,
7(3)428,
9(3)352,
10(3)12,
11(1)2,
12(2)8,
13(1)2
- Seamons, Kent E.,
7(3)428
- sensitive,
1(1)26,
2(2)159,
2(3)332,
10(2)5,
10(2)7,
10(3)12,
12(2)9,
12(3)15,
13(3)21,
13(3)22,
13(3)24
- strategy,
8(1)78,
10(3)12,
10(4)1,
11(1)2,
11(3)15,
11(4)19,
15(4)15
- structured,
15(1)5
- supporting,
4(2)103,
10(4)4,
13(3)24
- through,
5(4)367,
9(2)162,
10(3)12,
10(4)2,
10(4)6,
11(2)2,
11(3)12,
11(4)22,
11(4)23,
12(2)8,
12(2)13,
13(2)12,
13(3)25,
14(1)13,
15(3)12,
15(4)16,
16(2)5,
16(2)7,
16(3)9,
17(4)14,
18(1)2,
18(2)7,
18(3)11
- trust,
5(2)95,
7(1)21,
7(3)428,
9(3)352,
9(4)391,
10(3)11,
10(3)12,
10(4)3,
10(4)4,
11(1)2,
12(1)2,
12(1)6,
12(2)8,
13(1)2,
13(1)5,
13(2)16,
14(4)29,
17(2)6
- Winslett, Marianne,
11(1)2,
12(2)8,
13(3)25
- Yu, Ting,
11(3)12