-
1
-
-
0032218229
-
A Security Architecture for Computational Grids
-
I. Foster, C. Kesselman, G. Tsudik, S. Tuecke, "A Security Architecture for Computational Grids." Proc. 5th ACM Conference on Computer and Communications Security Conference, pp. 83-92, 1998.
-
(1998)
Proc. 5th ACM Conference on Computer and Communications Security Conference
, pp. 83-92
-
-
Foster, I.1
Kesselman, C.2
Tsudik, G.3
Tuecke, S.4
-
2
-
-
0034502932
-
A National-Scale Authentication Infrastructure
-
R. Butler, D. Engert, I. Foster, C. Kesselman, S. Tuecke, J. Volmer, V. Welch. "A National-Scale Authentication Infrastructure". IEEE Computer, 33(12):60-66, 2000.
-
(2000)
IEEE Computer
, vol.33
, Issue.12
, pp. 60-66
-
-
Butler, R.1
Engert, D.2
Foster, I.3
Kesselman, C.4
Tuecke, S.5
Volmer, J.6
Welch, V.7
-
6
-
-
0041291986
-
-
RFC 3280, April
-
Housley, R., W. Polk, W. Ford, and D. Solo, "Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile," RFC 3280, April 2002.
-
(2002)
Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
9
-
-
0003451922
-
-
RFC 2743, January
-
Linn, J., "Generic Security Service Application Program Interface", Version 2, Update 1, RFC 2743, January 2000.
-
(2000)
"Generic Security Service Application Program Interface", Version 2, Update 1
-
-
Linn, J.1
-
10
-
-
0004249393
-
-
Netscape communications, Inc., CA Mar.
-
A. Freier, P. Kariton, P. Kocher, "The SSL Protocol: Version 3.0". Netscape communications, Inc., CA (Mar. 1996).
-
(1996)
The SSL Protocol: Version 3.0
-
-
Freier, A.1
Kariton, P.2
Kocher, P.3
-
11
-
-
35248840735
-
Trust Management and Whether to Delegate
-
Security Protocols
-
Simon N. Foley. "Trust Management and Whether to Delegate", Security Protocols, LNCS 2467, pp. 151-157, 2002.
-
(2002)
LNCS
, vol.2467
, pp. 151-157
-
-
Foley, S.N.1
-
13
-
-
0032290722
-
Resilient authentication using path independence
-
December
-
M. Reiter and S. Stubblebine. "Resilient authentication using path independence". IEEE Transactions on computers, Vol.47, No.12, December 1998.
-
(1998)
IEEE Transactions on Computers
, vol.47
, Issue.12
-
-
Reiter, M.1
Stubblebine, S.2
-
17
-
-
84982994153
-
Distributed Access-Rights Managements with Delegations Certificates
-
Tuomas Aura. "Distributed Access-Rights Managements with Delegations Certificates". Secure Internet Programming 1999: 211-235.
-
(1999)
Secure Internet Programming
, pp. 211-235
-
-
Aura, T.1
-
18
-
-
84969363097
-
A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model
-
Mendes, S. and Huitema, C. "A new approach to the X.509 framework: Allowing a global authentication infrastructure without a global trust model". In Proceedings of NDSS'95.
-
Proceedings of NDSS'95
-
-
Mendes, S.1
Huitema, C.2
-
20
-
-
84947294004
-
Modelling a Public-Key Infrastructure
-
ESORICS'96
-
Ueli Maurer. "Modelling a Public-Key Infrastructure". ESORICS'96, LNCS 1146, pp. 325-350, 1996.
-
(1996)
LNCS
, vol.1146
, pp. 325-350
-
-
Maurer, U.1
|