-
1
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Dwaine Clarke, Jean-Emile Elien, Carl Ellison, Matt Predette, Alexander Morcos, and Ronald L. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Predette, M.4
Morcos, A.5
Rivest, R.L.6
-
3
-
-
0003358457
-
SPKI certificate theory
-
September
-
Carl Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian Thomas, and Tatu Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
5
-
-
0035751908
-
Distributed credential chain discovery in trust management
-
Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security
-
Ninghui Li, William H. Winsborough, and John C. Mitchell. Distributed credential chain discovery in trust management. To appear in Journal of Computer Security. Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security, 2001.
-
(2001)
Journal of Computer Security
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
6
-
-
0000322097
-
A proof procedure for the logic of hereditary harrop formulas
-
Gopalan Nadathur. A proof procedure for the logic of hereditary harrop formulas. Journal of Automated Reasoning, 11:115-145, 1993.
-
(1993)
Journal of Automated Reasoning
, vol.11
, pp. 115-145
-
-
Nadathur, G.1
-
8
-
-
0037669985
-
Protecting privacy during on-line trust negotiation
-
Springer-Verlag, April
-
Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, and Ryan Jarvis. Protecting privacy during on-line trust negotiation. In 2nd Workshop on Privacy Enhancing Technologies. Springer-Verlag, April 2002.
-
(2002)
2nd Workshop on Privacy Enhancing Technologies
-
-
Seamons, K.E.1
Winslett, M.2
Yu, T.3
Yu, L.4
Jarvis, R.5
-
10
-
-
84939548725
-
Automated trust negotiation
-
IEEE Press, January
-
William H. Winsborough, Kent E. Seamons, and Vicki E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88-102. IEEE Press, January 2000.
-
(2000)
DARPA Information Survivability Conference and Exposition
, vol.1
, pp. 88-102
-
-
Winsborough, W.H.1
Seamons, K.E.2
Jones, V.E.3
-
13
-
-
1642327001
-
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation
-
February. To appear
-
Ting Yu, Marianne Winslett, and Kent E. Seamons. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Transactions on Information and System Security (TISSEC), 6(1). February 2003. To appear.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
-
-
Yu, T.1
Winslett, M.2
Seamons, K.E.3
|