No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web
- 1 January 2004
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 10 references indexed in Scilit:
- PeerTrust: Automated Trust Negotiation for Peers on the Semantic WebPublished by Springer Nature ,2004
- SweetDeal: Representing Agent Contracts With Exceptions using XML Rules, Ontologies, and Process DescriptionsSSRN Electronic Journal, 2003
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiationACM Transactions on Information and System Security, 2003
- Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and PonderPublished by Springer Nature ,2003
- A Policy Based Approach to Security for the Semantic WebPublished by Springer Nature ,2003
- Design and implementation of the idemix anonymous credential systemPublished by Association for Computing Machinery (ACM) ,2002
- XML-Signature Syntax and ProcessingPublished by RFC Editor ,2001
- Rethinking Public Key Infrastructures and Digital CertificatesPublished by MIT Press ,2000
- Foundations of Logic ProgrammingPublished by Springer Nature ,1987
- Guarded horn clausesPublished by Springer Nature ,1986