[1] Liao Zhensong, Jin Hai, Li Chisong, et al.Automated trust negotiation and its development trend[J].Journal of Software, 2006, 17(9):1933-1948.(in Chinese)
[2] Winsborough W H, Li N.Towards practical automated trust negotiation[C]//Proc of the 3rd International Workshop on Policies for Distributed Systems and Networks.Los Alamitos:IEEE Computer Society, 2002:92-103.
[3] Winsborough W H, Seamons K E, Jones V E.Automated trust negotiation[C]//DARPA Information Survivability Conference and Exposition.Piscataway:IEEE Press, 2000:88-102.
[4] Jin H, Liao Z S, Zou D Q, et al.A new approach to hide policy for automated trust negotiation[C]//Proc of the 1st International Workshop on Security.Berlin:Springer-Verlag, 2006:168-178.
[5] Winsborough W H, Li N.Protecting sensitive attributes in automated trust negotiation[C]//Proc of ACM Workshop on Privacy in the Electronic Society.New York:ACM Press, 2002:102-113.
[6] Yu T, Winslett M.A unified scheme for resource protection in automated trust negotiation[C]//IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2003:245-257.
[7] Winsborough W H, Li N.Safety in automated trust negotiation[C]//Proc of the IEEE Symposium on Security and Privacy.Los Alamitos:IEEE Computer Society, 2004:147-160.
[8] Yu T.Dynamic trust establishment in open systems[D].Urbana-Champaign:Department of Computer Science of University of Illinois, 2003.
[9] Seamons K, Winslett M, Yu T.Limiting the disclosure of access control policies during automated trust negotiation[C]//Proceedings of the Network and Distributed System Security Symposium.San Diego, CA, 2001:45-56.