-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
M. Abadi, On SDSI's linked local name spaces, Journal of Computer Security 6(1,2) (1998), 3-21.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
M. Abadi, M. Burrows, B. Lampson and G. Plotkin, A calculus for access control in distributed systems, ACM Transactions on Programming Languages and Systems 15(4) (1993), 706-734.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0033684451
-
Security infrastructure for distributed Java applications
-
IEEE Computer Society Press
-
D. Balfanz, D. Dean and M. Spreitzer, Security infrastructure for distributed Java applications, in: Proceedings of the 2000 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 2000, pp. 15-26.
-
(2000)
Proceedings of the 2000 IEEE Symposium on Research in Security and Privacy
, pp. 15-26
-
-
Balfanz, D.1
Dean, D.2
Spreitzer, M.3
-
4
-
-
84957800809
-
KeyNote: Trust management for public-key infrastructures
-
Proceedings of the 1998 Security Protocols Workshop
-
M. Blaze, J. Feigenbaum and A.D. Keromytis, KeyNote: Trust management for public-key infrastructures, in: Proceedings of the 1998 Security Protocols Workshop, Volume 1550 of Lecture Notes in Computer Science, 1999, pp. 59-63.
-
(1999)
Lecture Notes in Computer Science
, vol.1550
, pp. 59-63
-
-
Blaze, M.1
Feigenbaum, J.2
Keromytis, A.D.3
-
5
-
-
84958048748
-
Compliance checking in the PolicyMaker trust management system
-
FC: International Conference on Financial Cryptography
-
M. Blaze, J. Feigenbaum and M. Strauss, Compliance checking in the PolicyMaker trust management system, in: FC: International Conference on Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science, 1998, pp. 254-274.
-
(1998)
Lecture Notes in Computer Science
, vol.1465
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
6
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press
-
M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management, in: Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy, IEEE Computer Society Press, 1996, pp. 164-173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Research in Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas and T. Ylonen, SPKI certificate theory, RFC 2693, September 1999.
-
(1999)
RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
9
-
-
0003339136
-
The digital distributed system security architecture
-
M. Gasser, A. Goldstein, C. Kaufman and B. Lampson, The digital distributed system security architecture, in: Proceedings of the 12th NIST-NCSC National Computer Security Conference, 1989, pp. 305-319.
-
(1989)
Proceedings of the 12th NIST-NCSC National Computer Security Conference
, pp. 305-319
-
-
Gasser, M.1
Goldstein, A.2
Kaufman, C.3
Lampson, B.4
-
10
-
-
0345275445
-
-
Invited lecture given at the Zurich Seminar. April
-
J. Gordon, The Alice and Bob after-dinner speech. Invited lecture given at the Zurich Seminar, April 1984. Available at http://www.conceptlabs.co.uk/alicebob.html.
-
(1984)
The Alice and Bob after-dinner Speech
-
-
Gordon, J.1
-
13
-
-
0016984825
-
Protection in operating systems
-
ACM
-
M. Harrison, W. Ruzzo and J. Ullman, Protection in operating systems, in: Communications of the ACM, ACM, 1976, pp. 461-471.
-
(1976)
Communications of the ACM
, pp. 461-471
-
-
Harrison, M.1
Ruzzo, W.2
Ullman, J.3
-
15
-
-
0345275446
-
Authentication in distributed systems: Theory and practice
-
IEEE Computer Society Press. Based on article in ACM Transactions on Computer Systems (November) (1992)
-
B. Lampson, M. Abadi, M. Burrows and E. Wobber, Authentication in distributed systems: Theory and practice, in: William Stalling, Practical Cryptography for Data Internetworks, IEEE Computer Society Press, 1996. Based on article in ACM Transactions on Computer Systems (November) (1992).
-
(1996)
William Stalling, Practical Cryptography for Data Internetworks
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
17
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
R.J. Lipton and L. Snyder, A linear time algorithm for deciding subject security, Journal of the ACM 24(3) (1977), 455-64.
-
(1977)
Journal of the ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
18
-
-
0003037229
-
-
chapter 19, Elsevier Science Publishers B.V., Amsterdam, The Netherlands
-
R. Milner, Operational and Algebraic Semantics of Concurrent Programs, Volume B of Handbook of Theoretical Computer Science, chapter 19, Elsevier Science Publishers B.V., Amsterdam, The Netherlands, 1990, pp. 1201-1242.
-
(1990)
Operational and Algebraic Semantics of Concurrent Programs, Volume B of Handbook of Theoretical Computer Science
, vol.B
, pp. 1201-1242
-
-
Milner, R.1
-
20
-
-
0003465730
-
-
September
-
S. Owre, N. Shankar, J.M. Rushby and D.W.J Stringer-Calvert, PVS Language Reference, Version 2.3. SRI International, September 1999. Available from http://pvs.csl.sri.com/.
-
(1999)
PVS Language Reference, Version 2.3
-
-
Owre, S.1
Shankar, N.2
Rushby, J.M.3
Stringer-Calvert, D.W.J.4
-
22
-
-
0030086382
-
Role-based access control models
-
R.S. Sandhu, E.J. Coyne, H.L. Feinstein and C.E. Youman, Role-based access control models, IEEE Computer 29(2) (1996), 38-47.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
23
-
-
0028380781
-
Authentication in the Taos operating system
-
E. Wobber, M. Abadi, M. Burrows and B. Lampson, Authentication in the Taos operating system, ACM Transactions on Computer Systems 12(1) (1994), 3-32.
-
(1994)
ACM Transactions on Computer Systems
, vol.12
, Issue.1
, pp. 3-32
-
-
Wobber, E.1
Abadi, M.2
Burrows, M.3
Lampson, B.4
|