-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
ABADI, M. 1998. On SDSI's linked local name spaces. J. Compta. Sec. 6, 1-2, 3-21.
-
(1998)
J. Compta. Sec.
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
ABADI, M, BURROWS, M. LAMPSON, B., AND PLOTKIN, G. 1993. A calculus for access control in distributed systems. ACM Trans. Prag. Lang. Syst. 15, 4 (Oct.), 706-734.
-
(1993)
ACM Trans. Prag. Lang. Syst.
, vol.15
, Issue.4 OCT
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
3
-
-
0002198395
-
Towards a theory of declarative knowledge
-
J. Minker, Ed. Morgan Kaufmann, Los Altos, Calif.
-
APT, K. R., BLAIR, H. A., AND WALKER, A. 1988. Towards a theory of declarative knowledge. In Foundations of Deductive Databases and Logic Programming, J. Minker, Ed. Morgan Kaufmann, Los Altos, Calif., 89-148.
-
(1988)
Foundations of Deductive Databases and Logic Programming
, pp. 89-148
-
-
Apt, K.R.1
Blair, H.A.2
Walker, A.3
-
4
-
-
0003226048
-
The KeyNote trustmanagement system, version 2
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999a. The KeyNote trustmanagement system, version 2. IETF RFC 2704.
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
5
-
-
84982899264
-
The role of trust management in distributed systems
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
BLAZE, M., FEIGENBAUM, J., IOANNIDIS, J., AND KEROMYTIS, A. D. 1999b. The role of trust management in distributed systems. In Secure Internet Programming. Lecture Notes in Computer Science, vol. 1603. Springer-Verlag, New York, 185-210.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
6
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
BLAZE, M., FEIGENBAUM, J., AND LACY, J. 1996. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 164-173.
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
84944409047
-
Reachability analysis of pushdown automata: Application to model-checking
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
BOUAJJANI, A., ESPARZA, J., AND MALER, O. 1997. Reachability analysis of pushdown automata: Application to model-checking. In Proceedings of CONCUR'97. Lecture Notes in Computer Science, vol. 1256. Springer-Verlag, New York, 135-150.
-
(1997)
Proceedings of CONCUR'97
, vol.1256
, pp. 135-150
-
-
Bouajjani, A.1
Esparza, J.2
Maler, O.3
-
8
-
-
0034823078
-
A state-transition model of trust management and access control
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
CHANDER, A., DEAN, D., AND MITCHELL, J. C. 2001. A state-transition model of trust management and access control. In Proceedings of the 14th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, Calif., 27-43.
-
(2001)
Proceedings of the 14th IEEE Computer Security Foundations Workshop
, pp. 27-43
-
-
Chander, A.1
Dean, D.2
Mitchell, J.C.3
-
9
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
CLARKE, D., ELIEN, J.-E., ELLISON, C., FREDETTE, M., MORCOS, A., AND RFVEST, R. L. 2001. Certificate chain discovery in SPKI/SDSI. J. Comput. Sec. 9, 4, 285-322.
-
(2001)
J. Comput. Sec.
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rfvest, R.L.6
-
10
-
-
0021509216
-
Linear-time algorithms for testing the satisfiability of propositional horn formulae
-
DOWLING, W. F., AND GALLIER, J. H. 1984. Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. Logic Prog. 1, 3, 267-284.
-
(1984)
J. Logic Prog.
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
11
-
-
0003358457
-
SPKIcertificate theory
-
ELLISON, C., FRANTZ, B., LAMPSON, B., RIVEST, R.,THOMAS, B., AND YLONEN, T. 1999. SPKIcertificate theory. IETF RFC 2693.
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
12
-
-
84944409009
-
Efficient algorithms for model checking pushdown systems
-
Lecture Notes in Computer Science. Springer-Verlag, New York
-
ESPARZA, J., HANSEL, D., ROSSMANITH, P., AND SCHWOON, S. 2000. Efficient algorithms for model checking pushdown systems. In Proceedings of the 12th International Conference on Computer Aided Verification (CAV 2000). Lecture Notes in Computer Science, vol. 1855. Springer-Verlag, New York, 232-247.
-
(2000)
Proceedings of the 12th International Conference on Computer Aided Verification (CAV 2000)
, vol.1855
, pp. 232-247
-
-
Esparza, J.1
Hansel, D.2
Rossmanith, P.3
Schwoon, S.4
-
15
-
-
0034428960
-
Policy-directed certificate retrieval
-
GUNTER, C. A., AND JIM, T. 2000. Policy-directed certificate retrieval. Softw.: Practi. Expe. 30, 15 (Sept.), 1609-1640.
-
(2000)
Softw.: Practi. Expe.
, vol.30
, Issue.15 SEPT
, pp. 1609-1640
-
-
Gunter, C.A.1
Jim, T.2
-
16
-
-
0035067717
-
A logic for SDSI's linked local name spaces
-
HALPERN, J., AND VAN DER MEYDEN, R. 2001. A logic for SDSI's linked local name spaces. J. Comput. Sec. 9, 1-2, 47-74.
-
(2001)
J. Comput. Sec.
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Halpern, J.1
Van Der Meyden, R.2
-
17
-
-
0016984825
-
Protection in operating systems
-
HARRISON, M. A., Ruzzo, W. L., AND ULLMAN, J. D. 1976. Protection in operating systems. Communi. ACM 19, 8 (Aug.), 461-471.
-
(1976)
Communi. ACM
, vol.19
, Issue.8 AUG
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, W.L.2
Ullman, J.D.3
-
18
-
-
0016946005
-
On the equivalence, containment, and covering problems for the regular and context-free languages
-
HUNT, H. B., ROSENKRAMTZ, D. J., AND SZYMANSKI. 1976. On the equivalence, containment, and covering problems for the regular and context-free languages. J. Comput. Syst. sci. 12, 2 (April), 222-268.
-
(1976)
J. Comput. Syst. Sci.
, vol.12
, Issue.2 APRIL
, pp. 222-268
-
-
Hunt, H.B.1
Rosenkramtz, D.J.2
Szymanski3
-
19
-
-
77955202238
-
Analysis of SPKI/SDSI certificates using model checking
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
JHA, S., AND REPS, T. 2002. Analysis of SPKI/SDSI certificates using model checking. In Proceedings of the 15th IEEE Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos, Calif., 129-144.
-
(2002)
Proceedings of the 15th IEEE Computer Security Foundations Workshop
, pp. 129-144
-
-
Jha, S.1
Reps, T.2
-
20
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
JIM, T. 2001. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 106-115.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
21
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
LAMPSON, B., ABADI, M., BURROWS, M., AND WOBBER, E. 1992. Authentication in distributed systems: Theory and practice. ACM Trans. Comput. Syst. 10, 4 (Nov.), 265-310.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, Issue.4 NOV
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
23
-
-
3142654848
-
-
Jan.
-
. (Reprinted in ACM Operating Systems Review, 8(1): 18-24, Jan. 1974.)
-
(1974)
ACM Operating Systems Review
, vol.8
, Issue.1
, pp. 18-24
-
-
-
25
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
LI, N., GROSOF, B. N., AND FEIGENBAUM, J. 2003. Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Sec. 6, 1 (Feb.), 128-171.
-
(2003)
ACM Trans. Inf. Syst. Sec.
, vol.6
, Issue.1 FEB
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
26
-
-
35248834606
-
Datalog with constraints: A foundation for trust management languages
-
Lecture Notes in Computer Science , Springer-Verlag, New York
-
Li, N., AND MITCHELL, J. C. 2003a. Datalog with constraints: A foundation for trust management languages. In Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages (PADL 2003). Lecture Notes in Computer Science, vol. 2562, Springer-Verlag, New York, 58-73.
-
(2003)
Proceedings of the 5th International Symposium on Practical Aspects of Declarative Languages (PADL 2003)
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
28
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
LI, N., MITCHELL, J. C., AND WINSBOROUGH, W. H. 2002. Design of a role-based trust management framework. In Proceedings of the 2002 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 114-130.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
29
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li, N., WINSBOROUGH, W. H., AND MITCHELL, J. C. 2003b. Distributed credential chain discovery in trust management. J. Comput. Sec. 11, 1 (Feb.), 35-86.
-
(2003)
J. Comput. Sec.
, vol.11
, Issue.1 FEB
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
30
-
-
0017512599
-
A linear time algorithm for deciding subject security
-
LIPTON, R. J., AND SNYDER, L. 1977. A linear time algorithm for deciding subject security. J. ACM 24, 3, 455-464.
-
(1977)
J. ACM
, vol.24
, Issue.3
, pp. 455-464
-
-
Lipton, R.J.1
Snyder, L.2
-
33
-
-
0023999796
-
The schematic protection model: Its definition and analysis for acyclic attenuating systems
-
SANDHU, R. S. 1988. The schematic protection model: Its definition and analysis for acyclic attenuating systems. J. ACM 35, 2, 404-432.
-
(1988)
J. ACM
, vol.35
, Issue.2
, pp. 404-432
-
-
Sandhu, R.S.1
-
35
-
-
0030086382
-
Role-based access control models
-
SANDHU, R. S., COYNE, E. J., FEINSTEIN, H. L., AND YOUMAN, C. E. 1996. Role-based access control models. IEEE Comput. 29, 2 (Feb.), 38-47.
-
(1996)
IEEE Comput.
, vol.29
, Issue.2 FEB
, pp. 38-47
-
-
Sandhu, R.S.1
Coyne, E.J.2
Feinstein, H.L.3
Youman, C.E.4
-
36
-
-
0034835799
-
Understanding trust management systems
-
IEEE Computer Society Press, Los Alamitos, Calif.
-
WEEKS, S. 2001. Understanding trust management systems. In Proceedings of 2001 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Los Alamitos, Calif., 94-105.
-
(2001)
Proceedings of 2001 IEEE Symposium on Security and Privacy
, pp. 94-105
-
-
Weeks, S.1
|