-
1
-
-
0003226048
-
The KeyNote trust-management system, version 2
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote trust-management system, version 2. IETF RFC 2704, September 1999.
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
2
-
-
84982899264
-
The role of trust management in distributed systems security
-
J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects. Springer-Verlag
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The role of trust management in distributed systems security. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Mobile and Distributed Objects, volume 1603 of LNCS, pages 185-210. Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
3
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press, editor
-
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In IEEE Computer Society Press, editor, Proc. 1996 IEEE Symposium on Security and Privacy, pages 164-173, 1996.
-
(1996)
Proc. 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
4
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
D. Clarke, J-E. Elien, C. Ellison, M. Fredette, A. Morcos, and R. Rivest. Certificate chain discovery in SPKI/SDSI. Journal of Computer Security, 9(4):285-322, 2001.
-
(2001)
Journal of Computer Security
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.6
-
6
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. IETF RFC 2693, September 1999.
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
30644475433
-
Integrity constraints in trust management
-
Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, March
-
S. Etalle and W. H. Winsborough. Integrity constraints in trust management. Technical Report TR-CTIT-05-12, Centre for Telematics and Information Technology, Univ. of Twente, The Netherlands, March 2005.
-
(2005)
Technical Report
, vol.TR-CTIT-05-12
-
-
Etalle, S.1
Winsborough, W.H.2
-
8
-
-
0001348573
-
Integrity constraints: Semantics and applications
-
J. Chomicki and G. Saake, editors. Kluwer Academic
-
P. Godfrey, J. Grant, J. Gryz, and J. Minker. Integrity constraints: Semantics and applications. In J. Chomicki and G. Saake, editors, Logics for Databases and Information Systems, pages 265-306. Kluwer Academic, 1998.
-
(1998)
Logics for Databases and Information Systems
, pp. 265-306
-
-
Godfrey, P.1
Grant, J.2
Gryz, J.3
Minker, J.4
-
9
-
-
0034428960
-
Policy-directed certificate retrieval
-
September
-
C. Gunter and T. Jim. Policy-directed certificate retrieval. Software: Practice & Experience, 30(15):1609-1640, September 2000.
-
(2000)
Software: Practice & Experience
, vol.30
, Issue.15
, pp. 1609-1640
-
-
Gunter, C.1
Jim, T.2
-
10
-
-
0034829512
-
SD3: A trust management system with certified evaluation
-
IEEE Computer Society Press, May
-
T. Jim. SD3: A trust management system with certified evaluation. In Proceedings of the 2001 IEEE Symposium on Security and Privacy, pages 106-115. IEEE Computer Society Press, May 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 106-115
-
-
Jim, T.1
-
11
-
-
0036085965
-
Design of a role-based trust-management framework
-
IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press
-
N. Li, J. Mitchell, and W. Winsborough. Design of a role-based trust-management framework. In Proc. of the IEEE Symposium on Research in Security and Privacy, pages 114-130. IEEE Computer Society, Technical Committee on Security and Privacy, IEEE Computer Society Press, 2002.
-
(2002)
Proc. of the IEEE Symposium on Research in Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
12
-
-
30644467444
-
Beyond proof of compliance: Security analysis in trust management
-
To appear
-
N. Li, J. Mitchell, and W. Winsborough. Beyond proof of compliance: Security analysis in trust management. Journal of ACM, 2004. To appear.
-
(2004)
Journal of ACM
-
-
Li, N.1
Mitchell, J.2
Winsborough, W.3
-
13
-
-
35248834606
-
Datalog with constraints: A foundation for trust management languages
-
V. Dahl and P. Wadler, editors, 5th International Symposium on Practical Aspects of Declarative Languages (PADL'03). Springer-Verlag
-
N. Li and J. C. Mitchell. Datalog with constraints: A foundation for trust management languages. In V. Dahl and P. Wadler, editors, 5th International Symposium on Practical Aspects of Declarative Languages (PADL'03), volume 2562 of LNCS, pages 58-73. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2562
, pp. 58-73
-
-
Li, N.1
Mitchell, J.C.2
-
14
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
N. Li, W. Winsborough, and J. Mitchell. Distributed credential chain discovery in trust management. Journal of Computer Security, 11(1):35-86, 2003.
-
(2003)
Journal of Computer Security
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
15
-
-
0041524661
-
Delegation Logic: A logic-based approach to distributed authorization
-
February
-
Ninghui Li, Benjamin N. Grosof, and Joan Feigenbaum. Delegation Logic: A logic-based approach to distributed authorization. ACM Transaction on Information and System Security (TISSEC), 6(1):128-171, February 2003.
-
(2003)
ACM Transaction on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
17
-
-
0030086382
-
Role-based access control models
-
February
-
R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. IEEE Computer, 29(2):38-47, February 1996.
-
(1996)
IEEE Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
|