-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
5
-
-
0003582713
-
Beyond concern: Understanding net users' attitudes about online privacy
-
AT&T Labs, Apr.
-
L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Technical Report TR 99.4.3, AT&T Labs, Apr. 1999.
-
(1999)
Technical Report TR 99.4.3
-
-
Cranor, L.F.1
Reagle, J.2
Ackerman, M.S.3
-
6
-
-
17644378243
-
Commentary: The threat of Microsoft's. NET
-
Last visited: 17 July 2003
-
W. Diffie and S. Landau. Commentary: The threat of Microsoft's.NET. kingpublishing.com, 2001. Last visited: 17 July 2003.
-
(2001)
Kingpublishing.com
-
-
Diffie, W.1
Landau, S.2
-
7
-
-
17644420903
-
-
Private communication between John Dobson and Steven J. Greenwald at NSPW 1996 as referenced by Greenwald
-
J. Dobson. Private communication between John Dobson and Steven J. Greenwald at NSPW 1996 as referenced by Greenwald, 2003.
-
(2003)
-
-
Dobson, J.1
-
8
-
-
17644401542
-
-
Last visited: 17 July 2003
-
Electronic Privacy Information Center. Microsoft passport investigation docket, http://www.epic.org/privacy/consumer/microsoft/passport.html, 2003. Last visited: 17 July 2003.
-
(2003)
Microsoft Passport Investigation Docket
-
-
-
9
-
-
0003593599
-
SPKI certificate theory
-
work in progress
-
C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Ylonen. SPKI certificate theory, 1998. Internet draft, work in progress.
-
(1998)
Internet Draft
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
10
-
-
33845284254
-
Using biometrics as an enabling technology in balancing universality and selectivity for management of information access
-
Paris, France. Springer-Verlag Heidelberg. Lecture Notes in Computer Science 2615. October 24-25, 2002
-
M. Fairhurst, R. Guest, F. Deravi, and J. George. Using biometrics as an enabling technology in balancing universality and selectivity for management of information access. In Universal Access. Theoretical Perspectives, Practice, and Experience: 7th ERCIM International Workshop on User Interfaces for All, pages 249-259, Paris, France, 2002. Springer-Verlag Heidelberg. Lecture Notes in Computer Science 2615. October 24-25, 2002.
-
(2002)
Universal Access. Theoretical Perspectives, Practice, and Experience: 7th ERCIM International Workshop on User Interfaces for All
, pp. 249-259
-
-
Fairhurst, M.1
Guest, R.2
Deravi, F.3
George, J.4
-
11
-
-
17644417989
-
Big brother award nomination for WPA, passport pains MS
-
1 April. Last visited: 17 July 2003
-
J. Lettice. Big Brother Award nomination for WPA, Passport pains MS. The Register, 2001. 1 April 2003. Last visited: 17 July 2003.
-
(2001)
The Register
-
-
Lettice, J.1
-
12
-
-
17644410588
-
-
Last visited: 17 July 2003
-
Liberty Alliance. Liberty Alliance project. http://www.projectliberty. org/, 2003. Last visited: 17 July 2003.
-
(2003)
Liberty Alliance Project
-
-
-
13
-
-
84871602696
-
-
webservices.xml.com, 1 April 2003. Last visited: 17 July 2003
-
P. Madsen. The Liberty Alliance, webservices.xml.com, 2003. 1 April 2003. Last visited: 17 July 2003.
-
(2003)
The Liberty Alliance
-
-
Madsen, P.1
-
16
-
-
0034829626
-
Cryptographic key generation from voice
-
F. Monrose, M. K. Reiter, Q. Li, and S. Wetzel. Cryptographic key generation from voice. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 202-213, 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 202-213
-
-
Monrose, F.1
Reiter, M.K.2
Li, Q.3
Wetzel, S.4
-
18
-
-
84994391858
-
Role-based access control on the web
-
J. S. Park, R. Sandhu, and G.-J. Ahn. Role-based access control on the web. ACM Transactions on Information and System Security, 4(1) :37-71, 2001.
-
(2001)
ACM Transactions on Information and System Security
, vol.4
, Issue.1
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.-J.3
-
19
-
-
2442419307
-
Trusted agents that enhance user privacy by self-profiling
-
HP Laboratories
-
S. Pearson. Trusted agents that enhance user privacy by self-profiling. Technical Report HPL-2002-196, HP Laboratories, 2002.
-
(2002)
Technical Report
, vol.HPL-2002-196
-
-
Pearson, S.1
-
20
-
-
17644388294
-
Trusted computing platforms, the next security solution
-
HP Laboratories
-
S. Pearson. Trusted computing platforms, the next security solution. Technical Report HPL-2002-221, HP Laboratories, 2002.
-
(2002)
Technical Report
, vol.HPL-2002-221
-
-
Pearson, S.1
-
21
-
-
84976770858
-
Responses to NIST's proposal
-
R. L. Rivest, M. E. Hellman, J. C. Anderson, and J. W. Lyons. Responses to NIST's proposal. Communications of the ACM, 35(7):41-54, 1992.
-
(1992)
Communications of the ACM
, vol.35
, Issue.7
, pp. 41-54
-
-
Rivest, R.L.1
Hellman, M.E.2
Anderson, J.C.3
Lyons, J.W.4
-
22
-
-
0003614529
-
SDSI-a simple distributed security infrastructure
-
Last visited: 27 May 2002
-
R. L. Rivest and B. Lampson. SDSI-a simple distributed security infrastructure, http://theory.lcs.mit.edu/~rivest/sdsi10.ps, 1996. Presented at CRYPTO '96. Last visited: 27 May 2002.
-
(1996)
CRYPTO '96
-
-
Rivest, R.L.1
Lampson, B.2
-
23
-
-
0030086382
-
Role-based access control models
-
R. S. Sandhu, E. J. Coyne, H. L. Feinnstein, and C. E. Youman. Role-based access control models. IEEE Computer, 29(2) :38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinnstein, H.L.3
Youman, C.E.4
-
24
-
-
0028513932
-
Access control: Principles and practice
-
R. S. Sandhu and P. Samarati. Access control: principles and practice. IEEE Communications, 32(9):40-48, 1994.
-
(1994)
IEEE Communications
, vol.32
, Issue.9
, pp. 40-48
-
-
Sandhu, R.S.1
Samarati, P.2
-
25
-
-
17644411629
-
-
Private communication at NSPW 2003 with Carrie Gates. 20 August
-
M. A. Sasse. Private communication at NSPW 2003 with Carrie Gates. 20 August 2003.
-
(2003)
-
-
Sasse, M.A.1
-
26
-
-
0035387175
-
Transforming the 'weakest link' -a human/computer interaction approach to usable and effective security
-
M. A. Sasse, S. Brostoff, and D. Weirich. Transforming the 'weakest link' -a human/computer interaction approach to usable and effective security. BT Technology Journal, 19(3):122-131, 2001.
-
(2001)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Sasse, M.A.1
Brostoff, S.2
Weirich, D.3
-
27
-
-
17644428215
-
-
U.S. Army. Common Access Card (CAC). Last visited: 17 July 2003
-
Secure Electronic Transactions - Devices, U.S. Army. Common access card (CAC). https://setdweb.setd.army.mil/cac/whatiscac.htm. Last visited: 17 July 2003.
-
Secure Electronic Transactions - Devices
-
-
-
28
-
-
33744810750
-
-
Last visited: 17 July 2003
-
M. Slemko. Microsoft passport to trouble. http://alive.znep.com/~marcs/ passport/, 2001. Last visited: 17 July 2003.
-
(2001)
Microsoft Passport to Trouble
-
-
Slemko, M.1
-
30
-
-
85084161247
-
Why Johnny can't encrypt: A usability evaluation of PGP 5.0
-
Washington, D.C. Usenix. August 23-26, 1999
-
A. Whitten and J. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, pages 169-184, Washington, D.C., 1999. Usenix. August 23-26, 1999.
-
(1999)
Proceedings of the 8th USENIX Security Symposium
, pp. 169-184
-
-
Whitten, A.1
Tygar, J.2
|