-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
ABADI. M. 1998. On SDSI's linked local name spaces. J. Comput. Secu. 6, 1/2 (Jan./Feb.), 3-21.
-
(1998)
J. Comput. Secu.
, vol.6
, Issue.1-2 JAN.-FEB.
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M., BURROWS, M., LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prag. Lang. and Systems. 15, 4 (Oct.), 706-734.
-
(1993)
ACM Trans. Prag. Lang. and Systems
, vol.15
, Issue.4 OCT.
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0031641091
-
On the structure of delegation networks
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
AURA, T. 1998. On the structure of delegation networks. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-11) (June). IEEE Computer Society Press, Los Alamitos, Calif., pp. 14-26.
-
(1998)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-11)
, Issue.JUNE
, pp. 14-26
-
-
Aura, T.1
-
4
-
-
19244381332
-
Logic programming and knowledge representation
-
BARAL C. AND GELFOND, M. 1994. Logic programming and knowledge representation. J. Logic Prog. 19/20 (May/July), 73-148.
-
(1994)
J. Logic Prog.
, Issue.19-20 MAY-JULY
, pp. 73-148
-
-
Baral, C.1
Gelfond, M.2
-
5
-
-
0032691796
-
A logical framework for reasoning on data access control policies
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
BERTINO E., BUCCAFURRI F., FERRARI, E., AND RULLO, P. 1999. A logical framework for reasoning on data access control policies. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12), (July). IEEE Computer Society Press, Los Alamitos, Calif., pp. 175-189.
-
(1999)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12)
, Issue.JULY
, pp. 175-189
-
-
Bertino, E.1
Buccafurri, F.2
Ferrari, E.3
Rullo, P.4
-
6
-
-
0003226048
-
The keynote trust-management system, version 2
-
September 1999
-
BLAZE, M., FEIGENBAUM J., IOANNIDIS J., AND KEROMYTIS, A. D. 1999a. The KeyNote trust-management system, version 2. IETP RFC 2704, September 1999.
-
(1999)
IETP RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
7
-
-
84982899264
-
The role of trust management in distributed systems
-
Lecture Notes in Computer Science, . Springer, Berlin
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999b. The role of trust management in distributed systems. In Secure Internet Programming, Lecture Notes in Computer Science, 1603. Springer, Berlin, pp. 185-210.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
8
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
BLAZE M., FEIGENBAUM, J., AND LACY, J. 1996. Decentralized trust management. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp 164-173.
-
(1996)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
9
-
-
84958048748
-
Compliance-checking in the PolicyMaker trust management system
-
Lecture Notes in Computer Science. Springer, Berlin
-
BLAZE, M., FEIGENBAUM, J., AND STRAUSS, M. 1998. Compliance-checking in the PolicyMaker trust management system. In Proceedings of Second International Conference on Financial Cryptography (FC'98), (Feb.). Lecture Notes in Computer Science, 1465. Springer, Berlin, pp. 254-274.
-
(1998)
Proceedings of Second International Conference on Financial Cryptography (FC'98)
, vol.1465
, Issue.FEB.
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
10
-
-
3142653138
-
-
Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva
-
CCITT. 1989. Recommendation X.509: The Directory-Authentication Framework. Consultation Committee, International Telephone and Telegraph, International Telecommunications Union, Geneva.
-
(1989)
Recommendation X.509: The Directory-authentication Framework
-
-
-
11
-
-
0029695436
-
Tabled evaluation with delaying for general logic programs
-
CHEN W. AND WARREN, D. S. 1996. Tabled evaluation with delaying for general logic programs. J. ACM 43, 1 (Jan.), 20-74.
-
(1996)
J. ACM
, vol.43
, Issue.1 JAN.
, pp. 20-74
-
-
Chen, W.1
Warren, D.S.2
-
12
-
-
0001843009
-
REFEREE: Trust management for web applications
-
CHU, Y.-H., FEIGENBAUM, J., LAMACCHIA, B., RESNICK, P., AND STRAUSS, M. 1997. REFEREE: Trust management for web applications. World Wide Web Journal. 2, 706-734.
-
(1997)
World Wide Web Journal
, vol.2
, pp. 706-734
-
-
Chu, Y.-H.1
Feigenbaum, J.2
Lamacchia, B.3
Resnick, P.4
Strauss, M.5
-
13
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLAHKE, D., ELIEN, J.-E., ELLISON, C., FREDETTE, M., MORCOS, A., AND RIVEST, R. L. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Secu. 9, 4 (Nov.), 285-322.
-
(2001)
J. Comput. Secu.
, vol.9
, Issue.4 NOV.
, pp. 285-322
-
-
Clahke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
14
-
-
0036083264
-
Binder, a logic-based security language
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
DETREVILLE, J. 2002. Binder, a logic-based security language. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 105-113.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 105-113
-
-
Detreville, J.1
-
15
-
-
0003358457
-
SPKI certificate theory
-
September 1999
-
ELLISON, C., PBANTZ, B., LAMPSON, B., RIVEST, R. L., THOMAS, B., AND YLONEN, T. 1999a. SPKI certificate theory. IETP RFC 2693, September 1999.
-
(1999)
IETP RFC
, vol.2693
-
-
Ellison, C.1
Pbantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.5
Ylonen, T.6
-
16
-
-
0003546303
-
Simple public key certificates
-
(work in progress), July 1999
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R. L., THOMAS, B., AND YLONEN, T. 1999b. Simple public key certificates. Internet Draft (work in progress), July 1999. http://world.std.com/~cme/spki.txt.
-
(1999)
Internet Draft
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.L.4
Thomas, B.5
Ylonen, T.6
-
17
-
-
84862379039
-
-
Post to cypherpunks mailing list. May1996
-
FINNEY, H. 1996. Transitive trust and MLM. Post to cypherpunks mailing list, archived at http://www.inet-one.com/cypherpunks/dir.1996.05.02-1996.05.08/ msg00415.html.May1996.
-
(1996)
Transitive Trust and MLM
-
-
Finney, H.1
-
18
-
-
0035067717
-
A logic for SDSI's linked local named spaces
-
HALPERN J. AND VAN DER MEYDEN, R. 2001. A logic for SDSI's linked local named spaces. J. Comput. Secu. 9, 1/2 (Feb./May), 47-74.
-
(2001)
J. Comput. Secu.
, vol.9
, Issue.1-2 FEB.-MAY
, pp. 47-74
-
-
Halpern, J.1
Van Der Meyden, R.2
-
19
-
-
0033724294
-
Access control meets public key infrastructure, or: Assigning roles to strangers
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
HERZBERG, A., MASS, Y., MIHAELI, J., NAOR, D., AND RAVID, Y. 2000. Access control meets public key infrastructure, or: Assigning roles to strangers. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 2-14.
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 2-14
-
-
Herzberg, A.1
Mass, Y.2
Mihaeli, J.3
Naor, D.4
Ravid, Y.5
-
21
-
-
0030677524
-
A logical language for expressing authorizations
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
JAJODIA, S., SAMARATI, P., AND SUBRAHMANIAN, V. S. 1997a. A logical language for expressing authorizations. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 31-42.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 31-42
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
22
-
-
0031162048
-
A unified framework for enforcing multiple access control policies
-
ACM Press, New York, NY
-
JAJODIA, S., SAMARATI, P., SUBRAHMANIAN, V. S., AND BERTTNO, E. 1997b. A unified framework for enforcing multiple access control policies. In Proceedings of ACM SIGMOD International Conference on Management of Data. ACM Press, New York, NY, pp. 474-485.
-
(1997)
Proceedings of ACM SIGMOD International Conference on Management of Data
, pp. 474-485
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
Berttno, E.4
-
23
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
JIM, T. 2001. SD3: A trust management system with certified evaluation. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 106-115.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 106-115
-
-
Jim, T.1
-
24
-
-
0040268965
-
Internet privacy enhanced mail
-
KENT, S. T. 1993. Internet privacy enhanced mail. Comm. ACM. 36, 8 (Aug.), 48-60.
-
(1993)
Comm. ACM
, vol.36
, Issue.8 AUG.
, pp. 48-60
-
-
Kent, S.T.1
-
25
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: theory and practice. ACM Trans. Comput. Systems 10, 4 (Nov.), 265-310.
-
(1992)
ACM Trans. Comput. Systems
, vol.10
, Issue.4 NOV.
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
26
-
-
18844373775
-
A P3P preference exchange language 1.0 (APPEL1.0)
-
April 2002
-
LANGHEINRTCH, M. 2002. A P3P Preference Exchange Language 1.0 (APPEL1.0). W3C Working Draft, April 2002.
-
(2002)
W3C Working Draft
-
-
Langheinrtch, M.1
-
27
-
-
0033681410
-
Local names in SPKI/SDSI
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LI, N. 2000a. Local names in SPKI/SDSI. In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-13), (July). IEEE Computer Society Press, Los Alamitos, Calif., pp. 2-15.
-
(2000)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-13)
, Issue.JULY
, pp. 2-15
-
-
Li, N.1
-
30
-
-
0032671779
-
A logic-based knowledge representation for authorization with delegation
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LI, N., FEIGENBAUM, J., AND GROSOF, B. N. 1999. A logic-based knowledge representation for authorization with delegation (extended abstract). In Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12) (June). IEEE Computer Society Press, Los Alamitos, Calif., pp. 162-174.
-
(1999)
Proceedings of the IEEE Computer Security Foundations Workshop (CSFW-12)
, Issue.JUNE
, pp. 162-174
-
-
Li, N.1
Feigenbaum, J.2
Grosof, B.N.3
-
31
-
-
0033718059
-
A practically implementable and tractable delegation logic
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2000. A practically implementable and tractable Delegation Logic. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp. 27-42..
-
(2000)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 27-42
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
32
-
-
0036085965
-
Design of a role-based trust management framework
-
EEEE Computer Society Press, Los Alamitos, Calif.
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the IEEE Symposium on Security and Privacy (May). EEEE Computer Society Press, Los Alamitos, Calif., pp. 114-130.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
33
-
-
0035751908
-
Distributed credential chain discovery in trust management
-
To appear. Extended abstract appeared in Proceedings of the ACM Conference on Computer and Communications Security (Nov, 2001). ACM Press, New York, NY
-
LI, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003. Distributed credential chain discovery in trust management. J. Comput. Secu. To appear. Extended abstract appeared in Proceedings of the ACM Conference on Computer and Communications Security (Nov, 2001). ACM Press, New York, NY, pp. 156-165.
-
(2003)
J. Comput. Secu.
, pp. 156-165
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
35
-
-
2942654159
-
The platform for privacy preferences 1.0 (P3P1.0) specification
-
April
-
MARCHIORI, M. 2002. The Platform for Privacy Preferences 1.0 (P3P1.0) Specification. W3C Recommendation. April.
-
(2002)
W3C Recommendation
-
-
Marchiori, M.1
-
36
-
-
84947294004
-
Modelling a public-key infrastructure
-
Lecture Notes in Computer Science. Springer, Berlin
-
MAUHER, U. 1997. Modelling a public-key infrastructure. In Proceedings of the European Symposium on Research in Computer Security. Lecture Notes in Computer Science, 1146. Springer, Berlin, pp. 325-350.
-
(1997)
Proceedings of the European Symposium on Research in Computer Security
, vol.1146
, pp. 325-350
-
-
Mauher, U.1
-
37
-
-
0345065437
-
Types and the intended meaning of logic programs
-
F. Pfenning, editor, . The MIT Press, Cambridge, Mass.
-
NAISH, L. 1992. Types and the intended meaning of logic programs. In F. Pfenning, editor, Types in Logic Programming. The MIT Press, Cambridge, Mass., pp. 189-216.
-
(1992)
Types in Logic Programming
, pp. 189-216
-
-
Naish, L.1
-
38
-
-
0003519508
-
-
BATCS monographs on Theoretical Computer Science. Springer Berlin
-
PADAWITZ, P. 1998. Computing in Horn Clause Theories. BATCS monographs on Theoretical Computer Science, vol. 16. Springer Berlin.
-
(1998)
Computing in Horn Clause Theories
, vol.16
-
-
Padawitz, P.1
-
39
-
-
0004084951
-
-
Logic Programming Series. The MIT Press, Cambridge, Mass
-
PFENNING, F. ED. 1992. Types in Logic Programming, Logic Programming Series. The MIT Press, Cambridge, Mass.
-
(1992)
Types in Logic Programming
-
-
Pfenning, F.1
-
41
-
-
0034835799
-
Understanding trust management systems
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
WEEKS, S. 2001. Understanding trust management systems. In Proceedings of the IEEE Symposium on Security and Privacy (May). IEEE Computer Society Press, Los Alamitos, Calif., pp 94-105.
-
(2001)
Proceedings of the IEEE Symposium on Security and Privacy
, Issue.MAY
, pp. 94-105
-
-
Weeks, S.1
-
42
-
-
84862379769
-
-
THE XSB RESEARCH GROUP. 2002. The XSB programming system, http://xsb.sourceforge.net/.
-
(2002)
The XSB Programming System
-
-
|