Yu T and Winslett M. Supporting structured credentials andsensitive policies through interoperable strategies forautomated trust negotiation[J].ACM Trans. on Informationand System Security.2003, 6(1):1-42[2]廖振松, 金海, 李赤松等. 自动信任协商及其发展趋势. 软件学报,2006, 17(6): 1933-1948.Liao Z S, Jin H, and Li C S et al.. Automated trustnegotiation and its development trend. Journal of Software,2006, 17(9): 1933-1948.[3]Holt J, Bradshaw R, Seamons K E, and Orman H. Hiddencredentials. In Proc. of the 2003 ACM Workshop on Privacyin the Electronic Society, Washington, DC, USA. ACM Press,2003: 1-8.[4]赵春明, 葛建华, 李新国. 隐藏认证的不经意传输[J].电子与信息学报.2007, 29(8):1984-1986浏览[5]Li Jiangtao and Li Ninghui. OACerts: Oblivious attributecertificates. In ACNS 2005, 2005, LNCS 3531: 301-317.[6]Kang B G, Park J H, and Hahn S G. A certificate-basedsignature scheme[J].In CR-RSA 04, LNCS.2004, Vol. 2964:99-111[7]Holt J and Seamons E. Selective disclosure credential sets.Cryptology ePrint archive: report 2002/151.[8]羌卫中, 邹德清, 金海. 网格环境中证书和策略的隐私保护机制研究. 计算机研究与发展, 2007, 44(1): 11-19.Qiang W Z, Zou D Q, and Jin H. Research on privacypreservation mechanism for credentials and policies in gridcomputing environment. Journal of Computer Research andDevelopment, 2007, 44(1): 11-19.[9]Smart N. Access control using pairing based cryptography. InProceedings CT-RSA03, 2003, LNCS 2612: 111-121.[10]Boneh D and Franklin M. Identity-based encryption from theWeil pairings. Advances in Cryptology-Crypto, Springer-Verlag, 2001: 213-229.[11]Bagga W and Molva R. Policy-based cryptography andapplications[J].Lecture Notes in Computer Science.2005, Vol.3570:72-83[12]Zhang F and Kim K. Id-based blind signature and ringsignature from pairings. In ASIACRYPT02. 2002, LNCS2501: 533-547.[13]Bagga W, Crosta S, and Molva R. Proof-carrying proxycertificates. SCN 2006, LNCS 4116: 321-335.[14]Chow S S M, Hui L C K, and Yiu S M. Efficient identitybased ring signature. ACNS 2005, Springer-Verlag, 2005:499-512.[15]Lin C and Wu T. An identity-based ring signature schemefrom bilinear pairings. In Proc. of the 18th InternationalConference on Advanced Information Networking andApplications. IEEE Computer Society, Fukuoka, Japan, 2004:182-185.
|