Reference: | [1] Abadi, M., Burrows, M., and Lampson, B. (1993). A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems, 15(4), 706-734.
[2] Aura, T. (1998). On the Structure of Delegation Network. Proceedings of the 11th IEEE Computer Security Foundations Workshop, IEEE Computer Society Press, 14-26.
[3] Aura, T. (1999). Distributed Access-Rights Management with Delegation Certificates. Secure Internet Programming: Security Issues for Mobile and Distributed Objects LNCS 1603, Springer-Verlag, 213-238.
[4] Blaze, M., Feigenbaum, J., and Lacy, J. (1996). Decentralized Trust Management. Proceedings of the 17th Symposium on Security and Privacy, 164-173.
[5] Camp, L.J. (2000). Trust and Risk in Internet Commerce, MIT Press.
[6] Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. (1997). REFEREE: Trust Management for Web Applications. World Wide Web Journal, 2, 127-139.
[7] Ellison, M. Carl, et al. (1999). SPKI Certificate Theory, RFC 2693, Internet Society. See ftp://ftp.isi.edu/in-notes/rfc2693.txt
[8] Extensible Markup Language (XML). See http://www.w3.org/XML/
[9] FIPA Specification Repository. See http://www.fipa.org/repository/index.html
[10] Gerck, E. (1998). Overview of Certification systems. See http://www.mcg.org.br
[11] He, Q., Sycara, K., and Finin, T.W. (1998). Personal Security Agent: KQML-Based PKI, ACM Conference on Autonomous Agents.
[12] Herzbery, A., Mass, Y., Mihaeli, J., Naor, D., and Ravid, Y. (2000). Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers, 2000 IEEE Symposium on Security and Privacy, 2-14.
[13] Hu, Y.J. (2001). Some Thoughts on Agent Trust and Delegation. Proceedings of The 5th International Conference on Autonomous Agents 2001.
[14] JDOM. See http://www.jdom.org/
[15] Jennings, R.N., Sycara, K., and Wooldridge M. (1998). A Roadmap of Agent Research and Development. Journal of Autonomous Agents and Multi-Agent Systems, 1(1), 7-38.
[16] Kimbrough, O.S. and Moore, A.S. (1997). On Automated Message Processing in Electronic Commerce and Work Support Systems: Speech Act Theory and Expressive Felicity, ACM Transactions on Information Systems, 15(4), 321-367.
[17] NIST Role Based Access Control. See http://hissa.nist.gov/rbac/
[18] Nortel Networks FIPA-OS. See http://sourceforge.net/projects/fipa-os/
[19] Nwana, S.H., et al. (1998). Agent-Mediated Electronic Commerce: Issues, Challenges and some Viewpoints. Proceedings of the 2nd International Conference on Autonomous Agent 98, 189-196.
[20] Resource Description Framework (RDF). See http://www.w3.org/RDF/
[21] Rivest, R., and Lampson, B., SDSI: A Simple Distributed Security Infrastructure (SDSI). See http://theory.lcs.mit.edu/~cis/sdsi.html
[22] Special Interest Group on Agent-Mediated Electronic Commerce. See http://www.iiia.csic.es/AMEC/
[23] Wong, H. C., and Sycara, K. (1999). Adding Security and Trust to Multi-Agent Systems. Proceedings of Autonomous Agents ’99 (Workshop on Deception, Fraud and Trust in Agent Societies). 149-161.
[24] XML-Signature WG. See http://www.w3.org/Signature/ |