메뉴 건너뛰기




Volumn 52, Issue 3, 2005, Pages 474-514

Beyond proof-of-compliance: Security analysis in trust management

Author keywords

Access control; Distributed system security; Logic programs; Safety analysis; Trust management

Indexed keywords

DISTRIBUTED ACCESS CONTROL; SAFETY ANALYSIS; TRUST MANAGEMENT;

EID: 30544438141     PISSN: 00045411     EISSN: 00045411     Source Type: Journal    
DOI: 10.1145/1066100.1066103     Document Type: Article
Times cited : (122)

References (36)
  • 1
    • 0031637195 scopus 로고    scopus 로고
    • On SDSI's linked local name spaces
    • ABADI, M. 1998. On SDSI's linked local name spaces. J. Compta. Sec. 6, 1-2, 3-21.
    • (1998) J. Compta. Sec. , vol.6 , Issue.1-2 , pp. 3-21
    • Abadi, M.1
  • 5
    • 84982899264 scopus 로고    scopus 로고
    • The role of trust management in distributed systems
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999b. The role of trust management in distributed systems. In Secure Internet Programming. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, 185-210.
    • (1999) Secure Internet Programming , vol.1603 , pp. 185-210
    • Blaze, M.1    Feigenbaum, J.2    Ioannidis, J.3    Keromytis, A.D.4
  • 7
    • 84944409047 scopus 로고    scopus 로고
    • Reachability analysis of pushdown automata: Application to model-checking
    • Lecture Notes in Computer Science. Springer-Verlag, New York
    • BOUAJJANI, A., ESPARZA, J., AND MALER, O. 1997. Reachability analysis of pushdown automata: Application to model-checking. In Proceedings of CONCUR'97. Lecture Notes in Computer Science, vol. 1256. Springer-Verlag, New York, 135-150.
    • (1997) Proceedings of CONCUR'97 , vol.1256 , pp. 135-150
    • Bouajjani, A.1    Esparza, J.2    Maler, O.3
  • 10
    • 0021509216 scopus 로고
    • Linear-time algorithms for testing the satisfiability of propositional horn formulae
    • DOWLING, W. F., AND GALLIER, J. H. 1984. Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. Logic Prog. 1, 3, 267-284.
    • (1984) J. Logic Prog. , vol.1 , Issue.3 , pp. 267-284
    • Dowling, W.F.1    Gallier, J.H.2
  • 15
    • 0034428960 scopus 로고    scopus 로고
    • Policy-directed certificate retrieval
    • GUNTER, C. A., AND JIM, T. 2000. Policy-directed certificate retrieval. Softw.: Practi. Expe. 30, 15 (Sept.), 1609-1640.
    • (2000) Softw.: Practi. Expe. , vol.30 , Issue.15 SEPT , pp. 1609-1640
    • Gunter, C.A.1    Jim, T.2
  • 16
    • 0035067717 scopus 로고    scopus 로고
    • A logic for SDSI's linked local name spaces
    • HALPERN, J., AND VAN DER MEYDEN, R. 2001. A logic for SDSI's linked local name spaces. J. Comput. Sec. 9, 1-2, 47-74.
    • (2001) J. Comput. Sec. , vol.9 , Issue.1-2 , pp. 47-74
    • Halpern, J.1    Van Der Meyden, R.2
  • 17
    • 0016984825 scopus 로고
    • Protection in operating systems
    • HARRISON, M. A., Ruzzo, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Communi. ACM 19, 8 (Aug.), 461-471.
    • (1976) Communi. ACM , vol.19 , Issue.8 AUG , pp. 461-471
    • Harrison, M.A.1    Ruzzo, W.L.2    Ullman, J.D.3
  • 18
    • 0016946005 scopus 로고
    • On the equivalence, containment, and covering problems for the regular and context-free languages
    • HUNT, H. B., ROSENKRAMTZ, D. J., AND SZYMANSKI. 1976. On the equivalence, containment, and covering problems for the regular and context-free languages. J. Comput. Syst. sci. 12, 2 (April), 222-268.
    • (1976) J. Comput. Syst. Sci. , vol.12 , Issue.2 APRIL , pp. 222-268
    • Hunt, H.B.1    Rosenkramtz, D.J.2    Szymanski3
  • 19
    • 77955202238 scopus 로고    scopus 로고
    • Analysis of SPKI/SDSI certificates using model checking
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • JHA, S., AND REPS, T. 2002. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, Calif., 129-144.
    • (2002) Proceedings of the 15th IEEE Computer Security Foundations Workshop , pp. 129-144
    • Jha, S.1    Reps, T.2
  • 20
    • 0034829512 scopus 로고    scopus 로고
    • SD3: A trust management system with certified evaluation
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • JIM, T. 2001. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 106-115.
    • (2001) Proceedings of the 2001 IEEE Symposium on Security and Privacy , pp. 106-115
    • Jim, T.1
  • 21
    • 84976834054 scopus 로고
    • Authentication in distributed systems: Theory and practice
    • LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
    • (1992) ACM Trans. Comput. Syst. , vol.10 , Issue.4 NOV , pp. 265-310
    • Lampson, B.1    Abadi, M.2    Burrows, M.3    Wobber, E.4
  • 23
    • 3142654848 scopus 로고
    • Jan.
    • . (Reprinted in ACM Operating Systems Review, 8(1): 18-24, Jan. 1974.)
    • (1974) ACM Operating Systems Review , vol.8 , Issue.1 , pp. 18-24
  • 25
    • 0041524661 scopus 로고    scopus 로고
    • Delegation logic: A logic-based approach to distributed authorization
    • LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Sec. 6, 1 (Feb.), 128-171.
    • (2003) ACM Trans. Inf. Syst. Sec. , vol.6 , Issue.1 FEB , pp. 128-171
    • Li, N.1    Grosof, B.N.2    Feigenbaum, J.3
  • 29
    • 0037243196 scopus 로고    scopus 로고
    • Distributed credential chain discovery in trust management
    • Li, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003b. Distributed credential chain discovery in trust management. J. Comput. Sec. 11, 1 (Feb.), 35-86.
    • (2003) J. Comput. Sec. , vol.11 , Issue.1 FEB , pp. 35-86
    • Li, N.1    Winsborough, W.H.2    Mitchell, J.C.3
  • 30
    • 0017512599 scopus 로고
    • A linear time algorithm for deciding subject security
    • LIPTON, R. J., AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. J. ACM 24, 3, 455-464.
    • (1977) J. ACM , vol.24 , Issue.3 , pp. 455-464
    • Lipton, R.J.1    Snyder, L.2
  • 33
    • 0023999796 scopus 로고
    • The schematic protection model: Its definition and analysis for acyclic attenuating systems
    • SANDHU, R. S. 1988. The schematic protection model: Its definition and analysis for acyclic attenuating systems. J. ACM 35, 2, 404-432.
    • (1988) J. ACM , vol.35 , Issue.2 , pp. 404-432
    • Sandhu, R.S.1
  • 36
    • 0034835799 scopus 로고    scopus 로고
    • Understanding trust management systems
    • IEEE Computer Society Press, Los Alamitos, Calif.
    • WEEKS, S. 2001. Understanding trust management systems. In Proceedings of 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 94-105.
    • (2001) Proceedings of 2001 IEEE Symposium on Security and Privacy , pp. 94-105
    • Weeks, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.