No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
- 1 January 2004
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- PeerTrust: Automated Trust Negotiation for Peers on the Semantic WebLecture Notes in Computer Science, 2004
- SweetDeal: Representing Agent Contracts With Exceptions using XML Rules, Ontologies, and Process DescriptionsSSRN Electronic Journal, 2003
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and PonderLecture Notes in Computer Science, 2003
- A Policy Based Approach to Security for the Semantic WebLecture Notes in Computer Science, 2003
- Design and implementation of the idemix anonymous credential systemPublished by Association for Computing Machinery (ACM) ,2002
- XML-Signature Syntax and ProcessingPublished by RFC Editor ,2001
- Rethinking Public Key Infrastructures and Digital CertificatesPublished by MIT Press ,2000
- Foundations of Logic ProgrammingPublished by Springer Nature ,1987
- Guarded horn clausesLecture Notes in Computer Science, 1986