A Policy Based Approach to Security for the Semantic Web
- 1 January 2003
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- The STRONGMAN architecturePublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Framework for role-based delegation modelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Access control meets public key infrastructure, or: assigning roles to strangersPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Semantic Matching of Web Services CapabilitiesLecture Notes in Computer Science, 2002
- Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) ProfilePublished by RFC Editor ,2002
- ITtalks: a case study in the Semantic Web and DAML+OILIEEE Intelligent Systems, 2002
- XML-Signature Syntax and ProcessingPublished by RFC Editor ,2001
- Managing trust between collaborating companies using outsourced role based access controlPublished by Association for Computing Machinery (ACM) ,1999
- The KeyNote Trust-Management System Version 2Published by RFC Editor ,1999
- Conflicts in policy-based distributed systems managementIEEE Transactions on Software Engineering, 1999