메뉴 건너뛰기




Volumn , Issue , 2002, Pages 107-113

An authorization infrastructure for nomadic computing

Author keywords

Access control; Authorization; Mobile computing; Nomadic computing; Ubiquitous computing

Indexed keywords

ALGORITHMS; COMPUTER OPERATING SYSTEMS; COMPUTER PRIVACY; CRYPTOGRAPHY; DATA ACQUISITION; DATA STORAGE EQUIPMENT; INFORMATION TECHNOLOGY; MATHEMATICAL MODELS; MOBILE COMPUTING; NETWORK PROTOCOLS; ONLINE SYSTEMS; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 0242540390     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/507711.507728     Document Type: Conference Paper
Times cited : (14)

References (32)
  • 2
    • 0003700417 scopus 로고
    • Section E.2.1: Kerberos authentication and authorization system
    • Project Athena Technical Plan, MIT Project Athena, Cambridge, Massachusetts, October; (Version 4)
    • S.P. Miller, B. C. Neuman, J. I. Schiller, and J.H. Saltzer. Section E.2.1: Kerberos Authentication and Authorization System. Project Athena Technical Plan, MIT Project Athena, Cambridge, Massachusetts, October 1988. (Version 4)
    • (1988)
    • Miller, S.P.1    Neuman, B.C.2    Schiller, J.I.3    Saltzer, J.H.4
  • 3
    • 0003899818 scopus 로고
    • The kerberos network authentication service (Version 5)
    • Internet Request for Comments RFC-1510. September
    • John Kohl and B. Clifford Neuman. The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510. September 1993.
    • (1993)
    • Kohl, J.1    Clifford Neuman, B.2
  • 6
    • 0242528816 scopus 로고    scopus 로고
    • Security extensions for DCE 1.1
    • OSF DCE RFC 19
    • S. B. Fairthorne, "Security Extensions for DCE 1.1", OSF DCE RFC 19.
    • Fairthorne, S.B.1
  • 7
    • 0242445261 scopus 로고
    • SESAME V4 - Overview
    • Dec
    • T. Parker, and D. Pinkas, "SESAME V4 - Overview", Dec 1995 Available as http://www.esat.kuleuven.ac.be/cosic/sesame/doc-txt/overview.txt
    • (1995)
    • Parker, T.1    Pinkas, D.2
  • 10
    • 0242445262 scopus 로고
    • DCE authorization services - Privilege server
    • OSF DCE Specifications
    • Joseph N. Pato, DCE Authorization Services - Privilege Server, OSF DCE Specifications, 1990.
    • (1990)
    • Pato, J.N.1
  • 19
  • 20
    • 0003978251 scopus 로고    scopus 로고
    • Key management for multicast: Issues and architectures
    • RFC 2627, June
    • D. Wallner, E. Harder, and R. Agee. Key Management for Multicast: Issues and Architectures. RFC 2627, June 1999.
    • (1999)
    • Wallner, D.1    Harder, E.2    Agee, R.3
  • 22
    • 0000205020 scopus 로고    scopus 로고
    • Efficient communication-storage tradeoffs for multicast encryption
    • R. Canetti, T. Malkin, and K. Nissim. Efficient communication-storage tradeoffs for multicast encryption. Proc. EUROCRYPT'99.
    • Proc. EUROCRYPT'99
    • Canetti, R.1    Malkin, T.2    Nissim, K.3
  • 23
    • 0003557429 scopus 로고    scopus 로고
    • Key establishment in large dynamic groups using one-way function trees
    • Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, May
    • D.A. McGrew and A.T. Sherman. Key Establishment in Large Dynamic Groups Using One-Way Function Trees. Technical Report No. 0755, TIS Labs at Network Associates, Inc., Glenwood, MD, May 1998.
    • (1998)
    • McGrew, D.A.1    Sherman, A.T.2
  • 27
    • 84948984838 scopus 로고
    • Space requirements for broadcast encryption
    • C. Blundo and A. Cresti. Space requirements for broadcast encryption. In Proc. EUROCRYPT'94, LNCS 950, pp 287-298, 1994.
    • (1994) Proc. EUROCRYPT'94, LNCS 950 , pp. 287-298
    • Blundo, C.1    Cresti, A.2
  • 28
    • 0001720832 scopus 로고    scopus 로고
    • Generalized beimel-chor schemes for broadcast encryption and interactive key distribution
    • C. Blundo, L. A. Frota Mattos, and D.R. Stinson. Generalized Beimel-Chor schemes for broadcast encryption and interactive key distribution. Theoretical Computer Science, 200(1-2):313-334, 1998.
    • (1998) Theoretical Computer Science , vol.200 , Issue.1-2 , pp. 313-334
    • Blundo, C.1    Frota Mattos, L.A.2    Stinson, D.R.3
  • 29
    • 0005053804 scopus 로고    scopus 로고
    • Some new results on key distribution patterns and broadcast encryption
    • D.R. Stinson and T. van Trung. Some new results on key distribution patterns and broadcast encryption. Designs, Codes and Cryptography, 14(3):261-279, 1998.
    • (1998) Designs, Codes and Cryptography , vol.14 , Issue.3 , pp. 261-279
    • Stinson, D.R.1    Van Trung, T.2
  • 30
    • 84957696450 scopus 로고    scopus 로고
    • Combinatorial bounds for broadcast encryption
    • M. Luby and J. Staddon. Combinatorial bounds for broadcast encryption. In Proc. EUROCRYPT'98, LNCS 1403, pp 512-526, 1998.
    • (1998) Proc. EUROCRYPT'98, LNCS 1403 , pp. 512-526
    • Luby, M.1    Staddon, J.2
  • 31
    • 0031142511 scopus 로고    scopus 로고
    • Key derivation for network management applications
    • May/June
    • U. Blumenthal, N. C. Hien, and B. Wijnen. Key Derivation for Network Management Applications. IEEE Network Magezine, pp 26-29, May/June 1997.
    • (1997) IEEE Network Magezine , pp. 26-29
    • Blumenthal, U.1    Hien, N.C.2    Wijnen, B.3
  • 32
    • 0042854809 scopus 로고    scopus 로고
    • Secret sets and applications
    • 15 January
    • R. Molva and G. Tsudik. Secret sets and applications. Information Processing Letters, 65(1):47-55, 15 January 1998.
    • (1998) Information Processing Letters , vol.65 , Issue.1 , pp. 47-55
    • Molva, R.1    Tsudik, G.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.