메뉴 건너뛰기




Volumn 12, Issue 1 SPEC. ISS., 2004, Pages 131-164

Reconstructing trust management

Author keywords

[No Author keywords available]

Indexed keywords

ALGEBRA; COMPUTATIONAL COMPLEXITY; COMPUTER SIMULATION; CRYPTOGRAPHY; GRAPH THEORY;

EID: 0344443746     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/jcs-2004-12106     Document Type: Conference Paper
Times cited : (12)

References (23)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • M. Abadi, On SDSI's linked local name spaces, Journal of Computer Security 6(1,2) (1998), 3-21.
    • (1998) Journal of Computer Security , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 4
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures
    • Proceedings of the 1998 Security Protocols Workshop
    • M. Blaze, J. Feigenbaum and A.D. Keromytis, KeyNote: Trust management for public-key infrastructures, in: Proceedings of the 1998 Security Protocols Workshop, Volume 1550 of Lecture Notes in Computer Science, 1999, pp. 59-63.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 5
    • 84958048748 scopus 로고    scopus 로고
    • Compliance checking in the PolicyMaker trust management system
    • FC: International Conference on Financial Cryptography
    • M. Blaze, J. Feigenbaum and M. Strauss, Compliance checking in the PolicyMaker trust management system, in: FC: International Conference on Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science, 1998, pp. 254-274.
    • (1998) Lecture Notes in Computer Science , vol.1465 , pp. 254-274
    • Blaze, M.1    Feigenbaum, J.2    Strauss, M.3
  • 10
    • 0345275445 scopus 로고
    • Invited lecture given at the Zurich Seminar. April
    • J. Gordon, The Alice and Bob after-dinner speech. Invited lecture given at the Zurich Seminar, April 1984. Available at http://www.conceptlabs.co.uk/alicebob.html.
    • (1984) The Alice and Bob after-dinner Speech
    • Gordon, J.1
  • 15
    • 0345275446 scopus 로고    scopus 로고
    • Authentication in distributed systems: Theory and practice
    • IEEE Computer Society Press. Based on article in ACM Transactions on Computer Systems (November) (1992)
    • B. Lampson, M. Abadi, M. Burrows and E. Wobber, Authentication in distributed systems: Theory and practice, in: William Stalling, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Based on article in ACM Transactions on Computer Systems (November) (1992).
    • (1996) William Stalling, Practical Cryptography for Data Internetworks
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 17
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • R.J. Lipton and L. Snyder, A linear time algorithm for deciding subject security, Journal of the ACM 24(3) (1977), 455-64.
    • (1977) Journal of the ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.