-
3
-
-
0027667638
-
A calculus for access control in distributed systems
-
Sept
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin, "A calculus for access control in distributed systems," ACM Trans. Programming Languages Syst., vol. 15, no. 4, pp. 706-734, Sept. 1993.
-
(1993)
ACM Trans. Programming Languages Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
4
-
-
0002863367
-
Valuation of trust in open systems
-
D. Gollmann, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
-
T. Beth, M. Borcherding, and B. Klein, "Valuation of trust in open systems," in Computer Security - Esorics'94, D. Gollmann, Ed. Berlin: Springer-Verlag, 1994, vol. 875, Lecture Notes in Computer Science, pp. 3-18.
-
(1994)
Computer Security - Esorics'94
, vol.875
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
5
-
-
0029700344
-
Decentralized trust management
-
M. Blaze, J. Feigenbaum, and J. Lacy, "Decentralized trust management," in Proc. Symp. Security Privacy, 1996, pp. 164-173.
-
(1996)
Proc. Symp. Security Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
-
M. Blaze, J. Feigenbaum, and M. Strauss, "Compliance checking in the policymaker trust management system," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 254-274.
-
(1998)
Financial Cryptography
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
7
-
-
0027612025
-
Security architectures using formal methods
-
C. Boyd, "Security architectures using formal methods," IEEE J. Select. Areas Commun., vol. 11, pp. 694-701, 1993.
-
(1993)
IEEE J. Select. Areas Commun.
, vol.11
, pp. 694-701
-
-
Boyd, C.1
-
8
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham, "A logic of authentication," ACM Trans. Computer Syst., vol. 8, no. 1, pp. 18-36, 1990.
-
(1990)
ACM Trans. Computer Syst.
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
9
-
-
0006599837
-
Partial belief and probabilistic reasoning in the analysis of secure protocols
-
E. Campbell, R. Safavi-Naini, and P. Pleasants, "Partial belief and probabilistic reasoning in the analysis of secure protocols," in Proc. Computer Foundations Workshop V, 1992, pp. 84-91.
-
(1992)
Proc. Computer Foundations Workshop V
, vol.5
, pp. 84-91
-
-
Campbell, E.1
Safavi-Naini, R.2
Pleasants, P.3
-
10
-
-
0031143168
-
Merging and extending the PGP and PEM trust models
-
May
-
D. Chadwick and A. Young, "Merging and extending the PGP and PEM trust models," IEEE Network Mag., May 1997.
-
(1997)
IEEE Network Mag.
-
-
Chadwick, D.1
Young, A.2
-
12
-
-
85084160946
-
Establishing identity without certification authorities
-
San Jose, CA, July 22-25
-
C. Ellison, "Establishing identity without certification authorities," in 6th USENIX Security Symp., San Jose, CA, July 22-25, 1996, pp. 67-76.
-
(1996)
6th USENIX Security Symp.
, pp. 67-76
-
-
Ellison, C.1
-
14
-
-
84958043633
-
Certificate revocation: Mechanisms and meaning
-
R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
-
B. Fox and B. LaMaccia, "Certificate revocation: Mechanisms and meaning," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 158-164.
-
(1998)
Financial Cryptography
, vol.1465
, pp. 158-164
-
-
Fox, B.1
LaMaccia, B.2
-
15
-
-
0026900438
-
A logicc for reasoning about security
-
J. Glasgow, G. MacEwen, and P. Panagaden, "A logicc for reasoning about security," ACM Trans. Computer Syst., vol. 10, no. 3, pp. 226-264, 1992.
-
(1992)
ACM Trans. Computer Syst.
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
MacEwen, G.2
Panagaden, P.3
-
17
-
-
84958063551
-
On certificate revocation and validation
-
R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
-
P. Kocher, "On certificate revocation and validation," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 172-177.
-
(1998)
Financial Cryptography
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
18
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Nov
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber, "Authentication in distributed systems: Theory and practice," ACM Trans. Computer Syst., vol. 10, no. 4, pp. 265-310, Nov. 1992.
-
(1992)
ACM Trans. Computer Syst.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
19
-
-
0342446301
-
Cerifying trust
-
H. Imai and Y. Theng, Eds
-
I. Lehti and P. Nikander, "Cerifying trust," in Proc. 1st Int. Workshop Practice Theory Public Key Cryptography, PKC'98, H. Imai and Y. Theng, Eds., 1998, pp. 83-98.
-
(1998)
Proc. 1st Int. Workshop Practice Theory Public Key Cryptography, PKC'98
, pp. 83-98
-
-
Lehti, I.1
Nikander, P.2
-
20
-
-
84947294004
-
Modeling a public-key infrastructure
-
E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin: Springer, LNCS, Lecture Notes in Computer Science
-
U. Maurer, "Modeling a public-key infrastructure," in Proc. 1996 European Symp. Res. Computer Security (ESORICS'96), E. Bertino, H. Kurth, G. Martella, and E. Montolivo, Eds. Berlin: Springer, LNCS, 1996, Lecture Notes in Computer Science, pp. 325-350.
-
(1996)
Proc. 1996 European Symp. Res. Computer Security (ESORICS'96)
, pp. 325-350
-
-
Maurer, U.1
-
21
-
-
0342446297
-
A calculus for secure channel establishment in open networks
-
D. Gollmann, Ed., Lecture Notes in Computer Science
-
U. Maurer and P. Schmid, "A calculus for secure channel establishment in open networks," in Proc. 1994 European Symp. Res. Computer Security (ESORICS'94), D. Gollmann, Ed., 1994, vol. 875, Lecture Notes in Computer Science, pp. 175-192.
-
(1994)
Proc. 1994 European Symp. Res. Computer Security (ESORICS'94)
, vol.875
, pp. 175-192
-
-
Maurer, U.1
Schmid, P.2
-
23
-
-
84958056811
-
Revocation: Options and challenges
-
R. Hirschfeld, Ed. Berlin: Springer-Verlag, Lecture Notes in Computer Science
-
M. Myers, "Revocation: Options and challenges," in Financial Cryptography, R. Hirschfeld, Ed. Berlin: Springer-Verlag, 1998, vol. 1465, Lecture Notes in Computer Science, pp. 165-172.
-
(1998)
Financial Cryptography
, vol.1465
, pp. 165-172
-
-
Myers, M.1
-
24
-
-
85084162561
-
Certificate revocation and certificate update
-
Jan
-
M. Naor and K. Nissim, "Certificate revocation and certificate update," in Proc. Usenix'98, Jan. 1998, pp. 217-228.
-
(1998)
Proc. Usenix'98
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
26
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
R. Hirschfeld, Ed
-
R. Rivest, "Can we eliminate certificate revocation lists?," in Proc. Financial Cryptography 1998, R. Hirschfeld, Ed., pp. 178-183.
-
(1998)
Proc. Financial Cryptography 1998
, pp. 178-183
-
-
Rivest, R.1
-
27
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
Online
-
R. Rivest and B. Lampson. SDSI - A simple distributed security infrastructure, presented at CRYPTO'96 Rumpsession. Online. Available: http://theory.lcs.mit.edu∧∼cis/sdsi.html
-
CRYPTO'96 Rumpsession
-
-
Rivest, R.1
Lampson, B.2
-
30
-
-
0027227136
-
A logical language for specifying cryptographic protocols requirements
-
P. Syverson and C. Meadows, "A logical language for specifying cryptographic protocols requirements," in IEEE Conf. Research Security Privacy, 1993, pp. 165-180.
-
(1993)
IEEE Conf. Research Security Privacy
, pp. 165-180
-
-
Syverson, P.1
Meadows, C.2
-
31
-
-
84976844798
-
What can we do about the unnecessary diversity of notation for syntactic definitions?
-
N. Wirth, "What can we do about the unnecessary diversity of notation for syntactic definitions?," Commun. ACM, vol. 20, no. 11, pp. 822-823, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.11
, pp. 822-823
-
-
Wirth, N.1
-
32
-
-
0027266208
-
Trust relationships in secure systems - A distributed authentication perspective
-
R. Yaholem, B. Klein, and T. Beth, "Trust relationships in secure systems - A distributed authentication perspective," in Proc. IEEE Conf. Research Security Privacy, 1993, pp. 150-164.
-
(1993)
Proc. IEEE Conf. Research Security Privacy
, pp. 150-164
-
-
Yaholem, R.1
Klein, B.2
Beth, T.3
|