
OpenAlex is a bibliographic catalogue of scientific papers, authors and institutions accessible in open access mode, named after the Library of Alexandria. It's citation coverage is excellent and I hope you will find utility in this listing of citing articles!
If you click the article title, you'll navigate to the article, as listed in CrossRef. If you click the Open Access links, you'll navigate to the "best Open Access location". Clicking the citation count will open this listing for that article. Lastly at the bottom of the page, you'll find basic pagination options.
Requested Article:
Relying Party Credentials Framework
Amir Herzberg, Yosi Mass
Electronic Commerce Research (2003) Vol. 4, Iss. 1/2, pp. 23-39
Closed Access | Times Cited: 12
Amir Herzberg, Yosi Mass
Electronic Commerce Research (2003) Vol. 4, Iss. 1/2, pp. 23-39
Closed Access | Times Cited: 12
Showing 12 citing articles:
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
Ting Yu, Marianne Winslett, Kent E. Seamons
ACM Transactions on Information and System Security (2003) Vol. 6, Iss. 1, pp. 1-42
Closed Access | Times Cited: 306
Ting Yu, Marianne Winslett, Kent E. Seamons
ACM Transactions on Information and System Security (2003) Vol. 6, Iss. 1, pp. 1-42
Closed Access | Times Cited: 306
Privacy Enhancing Technologies: A Review
Yun Shen, Siani Pearson
(2011)
Closed Access | Times Cited: 33
Yun Shen, Siani Pearson
(2011)
Closed Access | Times Cited: 33
Privacy-Preserving Trust Negotiations
Elisa Bertino, Elena Ferrari, Anna Squicciarini
Lecture notes in computer science (2005), pp. 283-301
Closed Access | Times Cited: 32
Elisa Bertino, Elena Ferrari, Anna Squicciarini
Lecture notes in computer science (2005), pp. 283-301
Closed Access | Times Cited: 32
Trust-Based Protection of Software Component Users and Designers
Peter Herrmann
Lecture notes in computer science (2003), pp. 75-90
Closed Access | Times Cited: 30
Peter Herrmann
Lecture notes in computer science (2003), pp. 75-90
Closed Access | Times Cited: 30
The Scourge of Internet Personal Data Collection
Esma Aı̈meur, Manuel Lafond
(2013), pp. 821-828
Closed Access | Times Cited: 10
Esma Aı̈meur, Manuel Lafond
(2013), pp. 821-828
Closed Access | Times Cited: 10
A Rule-Based XML Access Control Model
Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwiahara, et al.
Lecture notes in computer science (2003), pp. 35-48
Closed Access | Times Cited: 17
Chutiporn Anutariya, Somchai Chatvichienchai, Mizuho Iwiahara, et al.
Lecture notes in computer science (2003), pp. 35-48
Closed Access | Times Cited: 17
Data Privacy: An End-User Perspective
International Journal of Computer Networks and Communications Security (2013) Vol. 1, Iss. 2013
Closed Access | Times Cited: 8
International Journal of Computer Networks and Communications Security (2013) Vol. 1, Iss. 2013
Closed Access | Times Cited: 8
Mediator-Free Secure Policy Interoperation of Exclusively-Trusted Multiple Domains
Xingang Wang, Dengguo Feng, Zhen Xu, et al.
Information Security Practice and Experience (2008), pp. 248-262
Closed Access | Times Cited: 4
Xingang Wang, Dengguo Feng, Zhen Xu, et al.
Information Security Practice and Experience (2008), pp. 248-262
Closed Access | Times Cited: 4
Provision of Trusted Identity Management Using Trust Credentials
Siani Pearson, Marco Casassa Mont
Lecture notes in computer science (2006), pp. 267-282
Closed Access | Times Cited: 3
Siani Pearson, Marco Casassa Mont
Lecture notes in computer science (2006), pp. 267-282
Closed Access | Times Cited: 3
Using Historical Role to Speed up Subsequent Negotiations
Yizhu Zhao, Hongwei Lu
(2008), pp. 158-164
Closed Access
Yizhu Zhao, Hongwei Lu
(2008), pp. 158-164
Closed Access
An Improved Approach Towards the Model of Trust-X
Yizhu Zhao, Hongwei Lu
(2008), pp. 1-4
Closed Access
Yizhu Zhao, Hongwei Lu
(2008), pp. 1-4
Closed Access