-
4
-
-
0003226048
-
The keynote trust-management system version 2
-
Sept.
-
M. Blaze et al. The keynote trust-management system version 2. Sept. 1999. Internet Request For Comments 2704.
-
(1999)
Internet Request for Comments
, vol.2704
-
-
Blaze, M.1
-
5
-
-
0001885557
-
The role of trust management in distributed system's security
-
Springer-Verlag Lecture Notes in Computer Science
-
M. Blaze et al, The role of trust management in distributed system's security. In Secure Internet Programming: Issues in Distributed and Mobile Object Systems. Springer-Verlag Lecture Notes in Computer Science, 1999.
-
(1999)
Secure Internet Programming: Issues in Distributed and Mobile Object Systems
-
-
Blaze, M.1
-
10
-
-
0033295882
-
The nature of a useable PKI
-
C. M. Ellison. The nature of a useable PKI. Computer Networks, (31):823-830, 1999.
-
(1999)
Computer Networks
, Issue.31
, pp. 823-830
-
-
Ellison, C.M.1
-
11
-
-
12444292205
-
A kernelized architecture for multilevel secure application policies
-
Springer Verlag LNCS 1485
-
S. Foley. A kernelized architecture for multilevel secure application policies. In European Symposium on Research in Security and Privacy. Springer Verlag LNCS 1485, 1998.
-
(1998)
European Symposium on Research in Security and Privacy
-
-
Foley, S.1
-
12
-
-
12444293847
-
Computational paradigms and protection
-
Cloudcroft, NM, USA. ACM Press
-
S. Foley and J. Morrison. Computational paradigms and protection. In ACM New Computer Security Paradigms, Cloudcroft, NM, USA, 2001. ACM Press.
-
(2001)
ACM New Computer Security Paradigms
-
-
Foley, S.1
Morrison, J.2
-
13
-
-
12444288567
-
Supporting imprecise delegation in keynote using similarity measures
-
Copenhagen, November
-
S. N. Foley. Supporting imprecise delegation in keynote using similarity measures. In Proceedings of The Sixth Nordic Workshop on Secure IT Systems, pages 101-119, Copenhagen, November 2001.
-
(2001)
Proceedings of the Sixth Nordic Workshop on Secure IT Systems
, pp. 101-119
-
-
Foley, S.N.1
-
14
-
-
28844452974
-
Secure component distribution using webcom
-
Cairo, Egypt, May
-
S. N. Foley, T. B. Quillinan, and J. P. Morrison. Secure component distribution using webcom. In Proceeding of the 17th International Conference on Information Security (IFIP/SEC 2002), Cairo, Egypt, May 2002.
-
(2002)
Proceeding of the 17th International Conference on Information Security (IFIP/SEC 2002)
-
-
Foley, S.N.1
Quillinan, T.B.2
Morrison, J.P.3
-
15
-
-
0004413588
-
-
Number ISBN: 0-130-96277-5. Prentice Hall PTR
-
R. Geraghty, S. Joyce, T. Moriarty, G. Noone, and S. Joyce. COM-CORBA Interoperability. Number ISBN: 0-130-96277-5. Prentice Hall PTR, 1998.
-
(1998)
COM-CORBA Interoperability
-
-
Geraghty, R.1
Joyce, S.2
Moriarty, T.3
Noone, G.4
Joyce, S.5
-
16
-
-
12444328776
-
A case study of middleware to middleware: Mom and orb interoperability
-
Irvine, CA, USA, Oct. University of California, Irvine
-
J. Hugues, F. Kordon, L. Pautet, and T. Quinot. A case study of middleware to middleware: Mom and orb interoperability. In Proceedings of the 4th International Symposium on Distributed Objects and Applications (DOA'02), Irvine, CA, USA, Oct. 2002. University of California, Irvine.
-
(2002)
Proceedings of the 4th International Symposium on Distributed Objects and Applications (DOA'02)
-
-
Hugues, J.1
Kordon, F.2
Pautet, L.3
Quinot, T.4
-
18
-
-
12444310225
-
Using SPKI certificates for authorization in CORBA based distributed object-oriented systems
-
Kista, Sweden, November
-
T. Lampinen. Using SPKI certificates for authorization in CORBA based distributed object-oriented systems. In 4th Nordic Workshop on Secure IT systems (NordSec '99), pages 61-81, Kista, Sweden, November 1999.
-
(1999)
4th Nordic Workshop on Secure IT Systems (NordSec '99)
, pp. 61-81
-
-
Lampinen, T.1
-
19
-
-
17444392993
-
Abstracting process-to-process relations in concurrent object-oriented applications
-
Springer Verlag LNCS 821
-
C. Lopes and K. Lieberherr. Abstracting process-to-process relations in concurrent object-oriented applications. In European Conference on Object-Oriented Programming (ECOOP). Springer Verlag LNCS 821, 1994.
-
(1994)
European Conference on Object-Oriented Programming (ECOOP)
-
-
Lopes, C.1
Lieberherr, K.2
-
22
-
-
0343618799
-
A condensed graphs engine to drive metacomputing
-
Las Vagas, Nevada, June 28-July 1
-
J. Morrison, D. Power, and J. Kennedy. A Condensed Graphs Engine to Drive Metacomputing. Proceedings of the international conference on parallel and distributed processing techniques and applications (PDPTA '99), Las Vagas, Nevada, June 28-July 1, 1999.
-
(1999)
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99)
-
-
Morrison, J.1
Power, D.2
Kennedy, J.3
-
25
-
-
0005311305
-
Unified login with pluggable authentication modules (PAM)
-
Open Software Foundation, October
-
V. Samar and R. Schemers. Unified login with pluggable authentication modules (PAM). Request for Comments 86.0, Open Software Foundation, October 1995.
-
(1995)
Request for Comments 86.0
-
-
Samar, V.1
Schemers, R.2
-
26
-
-
0030086382
-
Role-based access control models
-
February
-
R. S. Sandhu, E. J. Coyne, H. L. Feinstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
29
-
-
0242540371
-
PDBM: A flexible delegation model in RBAC
-
Como, Italy, June
-
X. Zhang, S. Oh, and R. Sandhu. PDBM: A flexible delegation model in RBAC. In Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2003), Como, Italy, June 2003.
-
(2003)
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT 2003)
-
-
Zhang, X.1
Oh, S.2
Sandhu, R.3
|