[1] WINSBOROUGH W H, SEAMONS K E, JONES V E. Automated trust negotiation [C]// DISCEX'00: Proceedings of the 2000 DARPA Information Survivability Conference and Exposition. Piscataway: IEEE, 2000: 88-102. [2] LI C. Study on several problems of authorization conflict in access control [D]. Wuhan: Huazhong University of Science and Technology, 2012.(李赤松.访问控制中授权一致性问题的研究[D].武汉:华中科技大学,2012.) [3] LIAO Z, JIN H, LI C, et al. Automated trust negotiation and its development trend [J]. Journal of Software, 2006, 17(9): 1933-1948.(廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948.) [4] YU T, WINSLETT M. A unified scheme for resource protection in automated trust negotiation [C]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2003: 110-122. [5] LEI J, YU H, JIANG T, et al. Sensitive information protect scheme in automated trust negotiation [J]. Journal of Wuhan University of Technology, 2012, 34(3): 137-140.(雷建云,余涵,蒋天发,等.自动信任协商中的敏感信息保护方案[J].武汉理工大学学报,2012,34(3):137-140.) [6] SEAMONS K E, WINSLETT M, YU T. Limiting the disclosure of access control policies during automated trust negotiation [C]// Proceedings of the 2001 Network and Distributed System Security Symposium. Berkeley: USENIX Association, 2001: 25-32. [7] SEAMONS K E, WINSLETT M, YU T, et al. Protecting privacy during on-line trust negotiation [C]// Proceedings of the Second International Workshop on Privacy Enhancing Technologies, LNCS 2482. Berlin: Springer, 2003: 129-143. [8] IRWIN K, YU T. Preventing attribute information leakage in automated trust negotiation [C]// Proceedings of the 12th ACM Conference on Computer and Communications Security. New York: ACM, 2002: 36-45. [9] LIU B, LU H. An ontology-based trust negotiation framework in advanced communications and computing environments [J]. Journal of Internet Technology, 2009, 10(5): 559-564. [10] LIU X, TANG S, HUANG Q, et al. An ontology-based approach to automated trust negotiation [J]. Computer Standards & Interfaces, 2013, 36(1): 219-230. [11] KIKUCHI H, PIKULKAEW T. Perfect privacy preserving in automated trust negotiation [C]// Proceedings of the 2011 IEEE International Conference on Advanced Information Networking and Applications. Piscataway: IEEE, 2011: 129-134. [12] LI J, HUO G, LIU B, et al. Sensitive information transmission scheme based on magic cube algorithm in automated trust negotiation [J]. Journal of Computer Applications, 2011, 31(4): 984-988.(李健利,霍光磊,刘博,等.基于魔方算法的自动信任协商敏感信息传输方案[J].计算机应用,2011,31(4):984-988.) [13] PAUL M, MANDAL J K. A novel symmetric key cryptographic technique at bit level based on spiral matrix concept [EB/OL]. [2014-12-20]. http://arxiv.org/pdf/1305.0807.pdf. |