-
1
-
-
84883268548
-
Authentication and delegation with smart-cards
-
To appear in Springer, Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct.
-
M. Abadi, M. Burrows, C. Kaufman, and B Lampson. Authentication and delegation with smart-cards. To appear in Theoretical Aspects of Computer Sofware, Springer, 1991. Also research report 67, Systems Research Center, Digital Equipment Corp., Palo Alto, Oct. 1990.
-
(1990)
Theoretical Aspects of Computer Sofware
-
-
Abadi, M.1
Burrows, M.2
Kaufman, C.3
Lampson, B.4
-
2
-
-
34548730877
-
A calculus for access control in distributed systems
-
To appear in Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. To appear in Proc. Crypto '91, Springer, 1992. Also research report 70, Systems Research Center, Digital Equipment Corp., Palo Alto, March 1991.
-
(1991)
Proc. Crypto '91, Springer, 1992
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
84920498757
-
Global authentication without global trust
-
A. Birrell, B. Lampson, R. Needham, and M. Schroeder. Global authentication without global trust. Proc. IEEE Symposium on Security and Privacy, Oakland, 1986, 223-230.
-
Proc. IEEE Symposium on Security and Privacy, Oakland, 1986
, pp. 223-230
-
-
Birrell, A.1
Lampson, B.2
Needham, R.3
Schroeder, M.4
-
4
-
-
0025386404
-
A logic of authentication
-
Feb.
-
M Burrows, M. Abadi, and R. Needham. A logic of authentication ACM Trans. Computer Systems 8, 1, Feb. 1990, 18-36.
-
(1990)
ACM Trans. Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
5
-
-
84883268656
-
Information processing systems - Open systems interconnection - The directory authentication framework
-
CCITT. Also ISO/IEC 9594-8
-
CCITT. Information processing systems - Open systems interconnection - The directory authentication framework. CCITT 1988 Recommendation X 509. Also ISO/IEC 9594-8:1989.
-
(1989)
CCITT 1988 Recommendation X 509
-
-
-
6
-
-
10444273896
-
Exponentiation cryptosystems on the IBM PC
-
P. Combs. Exponentiation cryptosystems on the IBM PC. IBM Systems Journal 28, 4, 1990, 526-538
-
(1990)
IBM Systems Journal
, vol.28
, Issue.4
, pp. 526-538
-
-
Combs, P.1
-
7
-
-
0025508369
-
Network security via private-key certificates
-
Oct.
-
D. Davis and R. Swick. Network security via private-key certificates. ACM Operating Systems Review 24, 4, Oct. 1990, 64-67.
-
(1990)
ACM Operating Systems Review
, vol.24
, Issue.4
, pp. 64-67
-
-
Davis, D.1
Swick, R.2
-
8
-
-
0016949746
-
A lattice model of secure information flow
-
May
-
D. Denning. A lattice model of secure information flow. Comm. ACM 19, 5, May 1976, 236-243.
-
(1976)
Comm. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.1
-
11
-
-
84883264907
-
-
Systems Research Center, Digital Equipment Corp., Palo Alto. Private communication
-
H. Eberle, Systems Research Center, Digital Equipment Corp., Palo Alto. Private communication.
-
-
-
Eberle, H.1
-
12
-
-
0003339136
-
The Digital distributed system security architecture
-
M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital distributed system security architecture. Proc. 12th National Computer Security Conference, NIST/NCSC, Baltimore, 1989, 305-319.
-
Proc. 12th National Computer Security Conference, NIST/NCSC, Baltimore, 1989
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
15
-
-
0003899818
-
-
Version 5, draft 3, Project Athena, MIT, Oct.
-
J. Kohl, C. Neuman, and J. Steiner. The Kerberos network authentication service. Version 5, draft 3, Project Athena, MIT, Oct. 1990.
-
(1990)
The Kerberos Network Authentication Service
-
-
Kohl, J.1
Neuman, C.2
Steiner, J.3
-
18
-
-
0003508568
-
-
National Bureau of Standards. FIPS Pub. 46, Jan.
-
National Bureau of Standards. Data Encryption Standard. FIPS Pub. 46, Jan. 1977.
-
(1977)
Data Encryption Standard
-
-
-
19
-
-
0018048246
-
Using encryption for authentication in large networks of computers
-
Dec.
-
R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Comm. ACM 21, 12, Dec. 1978, 993-999.
-
(1978)
Comm. ACM
, vol.21
, Issue.12
, pp. 993-999
-
-
Needham, R.1
Schroeder, M.2
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21, 2, Feb. 1978, 120-126.
-
(1978)
Comm. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
23
-
-
84976845043
-
End-to-end arguments in system design
-
Nov.
-
J. Saltzer, D. Reed, and D. Clark. End-to-end arguments in system design. ACM Trans. Computer Systems 2, 4, Nov. 1984, 277-288.
-
(1984)
ACM Trans. Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.1
Reed, D.2
Clark, D.3
-
25
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
Usenix Association, Berkeley, CA, Feb.
-
J. Steiner, C. Neuman, and J Schiller. Kerberos: An authentication service for open network systems. Proc. Usenix Winter Conference, Usenix Association, Berkeley, CA, Feb. 1988, 191-202.
-
(1988)
Proc. Usenix Winter Conference
, pp. 191-202
-
-
Steiner, J.1
Neuman, C.2
Schiller, J.3
-
27
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
June
-
V. Voydock and S. Kent Security mechanisms in high-level network protocols. ACM Computing Surveys 15, 2, June 1983, 135-171.
-
(1983)
ACM Computing Surveys
, vol.15
, Issue.2
, pp. 135-171
-
-
Voydock, V.1
Kent, S.2
|