-
2
-
-
0342446301
-
Certifying trust
-
H. Imai and Y. Theng, editors
-
I. Lehti and P. Nikander. Certifying trust. In H. Imai and Y. Theng, editors, Proceedings of the first international workshop on Practice and Theory in Public Key Cryptography, PKC'98, pages 83-98, 1998.
-
(1998)
Proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98
, pp. 83-98
-
-
Lehti, I.1
Nikander, P.2
-
4
-
-
84958056811
-
Revocation: Options and challenges
-
In R. Hirschfeld, editor, Springer Verlag, Berlin
-
M. Myers. Revocation: Options and challenges. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 165-172. Springer Verlag, Berlin, 1998.
-
(1998)
Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science
, pp. 165-172
-
-
Myers, M.1
-
7
-
-
84947294004
-
Modelling a public-key infrastructure
-
In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Springer, LNCS
-
U. Maurer. Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proceedings 1996 European Symposium on Research in Computer Security (ESORICS' 96), Lecture Notes in Computer Science, Springer, LNCS, pages 325-350, 1996.
-
(1996)
Proceedings 1996 European Symposium on Research in Computer Security (ESORICS' 96), Lecture Notes in Computer Science
, pp. 325-350
-
-
Maurer, U.1
-
8
-
-
84956859603
-
-
C. E. et al.,. Internet Draft. Expires: 16 September 1998
-
C. E. et al. SPKI http://www.clark.net/pub/cme/html/spki.html. Internet Draft, 1998. Expires: 16 September 1998.
-
(1998)
SPKI
-
-
-
9
-
-
84958063551
-
On certificate revocation and validation
-
In R. Hirschfeld, editor, Springer Verlag, Berlin
-
P. Kocher. On certificate revocation and validation. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 172-177. Springer Verlag, Berlin, 1998.
-
(1998)
Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science
, pp. 172-177
-
-
Kocher, P.1
-
11
-
-
84958042111
-
Can we eliminate certificate revocation lists?
-
R. Hirschfeld, editor
-
R. Rivest. Can we eliminate certificate revocation lists? In R. Hirschfeld, editor, Proceedings of Financial Cryptography 1998, pages 178-183, 1998.
-
(1998)
Proceedings of Financial Cryptography 1998
, pp. 178-183
-
-
Rivest, R.1
-
12
-
-
0025386404
-
A logic of authentication
-
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. ACM Transactions on Computer Systems, 8(1):18-36, 1990.
-
(1990)
ACM Transactions on Computer Systems
, vol.8
, Issue.1
, pp. 18-36
-
-
Burrows, M.1
Abadi, M.2
Needham, R.3
-
13
-
-
85084162561
-
Certificate revocation and certificate update
-
January
-
M. Naor and K. Nissim. Certificate revocation and certificate update. Proceedings of Usenix '98, pages 217-228, January 1998.
-
(1998)
Proceedings of Usenix '98
, pp. 217-228
-
-
Naor, M.1
Nissim, K.2
-
15
-
-
85084160946
-
Establishing identity without certification authorities
-
In USENIX Association, editor, July 22-25, San Jose, CA, USENIX, July
-
C. Ellison. Establishing identity without certification authorities. In USENIX Association, editor, 6th USENIX Security Symposium, July 22-25, 1996. San Jose, CA, pages 67-76. USENIX, July 1996.
-
(1996)
6Th USENIX Security Symposium
, pp. 67-76
-
-
Ellison, C.1
-
16
-
-
84958043633
-
Certificate revocation: Mechanisms and meaning
-
In R. Hirschfeld, editor, Springer Verlag, Berlin
-
B. Fox and B. LaMaccia. Certificate revocation: Mechanisms and meaning. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 158-164. Springer Verlag, Berlin, 1998.
-
(1998)
Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science
, pp. 158-164
-
-
Fox, B.1
Lamaccia, B.2
-
17
-
-
0002863367
-
Valuation of trust in open systems
-
In D. Gollmann, editor, Springer Verlag, Berlin
-
T. Beth, M. Borcherding, and B. Klein. Valuation of trust in open systems. In D. Gollmann, editor, Computer Security - Esorics '94, volume 875 of Lecture Notes in Computer Science, pages 3-18. Springer Verlag, Berlin, 1994.
-
(1994)
Computer Security - Esorics '94, Volume 875 of Lecture Notes in Computer Science
, pp. 3-18
-
-
Beth, T.1
Borcherding, M.2
Klein, B.3
-
18
-
-
0026900438
-
A logic for reasoning about security
-
J. Glasgow, G. MacEwen, and P. Panagaden. A logic for reasoning about security. ACM transactions on Computer Systems, 10(3):226-264, 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.3
, pp. 226-264
-
-
Glasgow, J.1
Macewen, G.2
Panagaden, P.3
-
20
-
-
0342446297
-
A calculus for secure channel establishment in open networks
-
Lecture Notes in Computer Science
-
U. Maurer and P. Schmid. A calculus for secure channel establishment in open networks. In D. Gollmann, editor, Proc. 1994 European Symposium on Research in Computer Security (ESORICS` 94), volume 875, pages 175-192. Lecture Notes in Computer Science, 1994.
-
(1994)
D. Gollmann, Editor, Proc. 1994 European Symposium on Research in Computer Security (ESORICS` 94), Volume 875
, pp. 175-192
-
-
Maurer, U.1
Schmid, P.2
-
23
-
-
0027667638
-
A calculus for access control in distributed systems
-
September
-
M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706-734, September 1993.
-
(1993)
ACM Transactions on Programming Languages and Systems
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
24
-
-
0026684778
-
Authentication in distributed systems: Theory and practice
-
November
-
B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265-310, November 1992.
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
31
-
-
84958048748
-
Compliance checking in the policymaker trust management system
-
In R. Hirschfeld, editor, Springer Verlag, Berlin
-
M. Blaze, J. Feigenbaum, and M. Strauss. Compliance checking in the policymaker trust management system. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 254-274. Springer Verlag, Berlin, 1998.
-
(1998)
Financial Cryptography, Volume 1465 of Lecture Notes in Computer Science
, pp. 254-274
-
-
Blaze, M.1
Feigenbaum, J.2
Strauss, M.3
-
32
-
-
84956857377
-
-
I. I. S. 9594-8, the directory, part 8: Authentication framework
-
I. I. S. 9594-8. Information technology, open systems interconnection, the directory, part 8: Authentication framework, 1990.
-
(1990)
Information Technology, Open Systems Interconnection
-
-
|