Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Yi-Hong Long"'
Autor:
Yi-Hong Long1 longyihong@itrus.com.cn, Zu-De Zhou1, Quan Liu1, Ben-Yuan Chen1, Heng-Lin Zhou1
Publikováno v:
International Journal of Advanced Manufacturing Technology. Mar2009, Vol. 40 Issue 7/8, p749-759. 11p. 4 Color Photographs, 9 Diagrams.
Publikováno v:
2010 International Conference on Computer and Information Application.
Role mapping theory is an attracting approach for cross-domain authorization (access control). However, it is only applicable to domains that employ role-based access control (RBAC) model. In this paper, an attribute mapping theory for cross-domain a
Publikováno v:
2010 IEEE International Conference on Information Theory and Information Security.
Cross-CA certificate trust is often required in the application of Public Key Infrastructure (PKI). Contrary to the CA-oriented approach for it such as cross-certification, the approach proposed in this paper is application-oriented. In the proposed