-
1
-
-
0003226048
-
The KeyNote Trust-Management System, version 2
-
September
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust-Management System, version 2. IETF RFC 2704, September 1999.
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
2
-
-
84982899264
-
The role of trust management in distributed systems
-
Lecture Notes in Computer Science
-
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The Role of Trust Management in Distributed Systems. Secure Internet Programming, 1603:185-210, 1999. Lecture Notes in Computer Science.
-
(1999)
Secure Internet Programming
, vol.1603
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.4
-
3
-
-
0037362986
-
Role-based access control with X.509 attribute certificates
-
March-April
-
D. Chadwick, A. Otenko, and E. Ball. Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Computing, March-April 2003.
-
(2003)
IEEE Internet Computing
-
-
Chadwick, D.1
Otenko, A.2
Ball, E.3
-
4
-
-
84948391696
-
A model of certificate revocation
-
Phoenix, Arizona, USA, December. IEEE Computer Society
-
D. Cooper. A Model of Certificate Revocation. In 15th Annual Computer Security Applications Conference (ACSAC '99), pages 256-264, Phoenix, Arizona, USA, December 1999. IEEE Computer Society.
-
(1999)
15th Annual Computer Security Applications Conference (ACSAC '99)
, pp. 256-264
-
-
Cooper, D.1
-
5
-
-
0033295882
-
The nature of a usable pki
-
C. Ellison. The nature of a usable pki. Computer Networks, pages 823-830, 1999.
-
(1999)
Computer Networks
, pp. 823-830
-
-
Ellison, C.1
-
7
-
-
0003358457
-
SPKI certificate theory
-
September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. IETF RFC 2693, September 1999.
-
(1999)
IETF RFC
, vol.2693
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
8
-
-
0038150613
-
An internet attribute certificate profile for authorization
-
April
-
S. Farrell and R. Housley. An Internet Attribute Certificate Profile for Authorization. IETF RFC 3281, April 2002.
-
(2002)
IETF RFC
, vol.3281
-
-
Farrell, S.1
Housley, R.2
-
9
-
-
33646048955
-
Greenpass: Decentralized, PKI-based authorization for wireless LANs
-
NIST, April
-
N. Goffee, S. Kim, S.W. Smith, P. Thylor, M. Zhao, and J. Marchestni. Greenpass: Decentralized, PKI-based Authorization for Wireless LANs. In 3rd Annual PKI Research and Development Workshop. NIST, April 2004.
-
(2004)
3rd Annual PKI Research and Development Workshop
-
-
Goffee, N.1
Kim, S.2
Smith, S.W.3
Thylor, P.4
Zhao, M.5
Marchestni, J.6
-
10
-
-
0011255177
-
Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) profile
-
April
-
R. Housley, W. Polk, W. Ford, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280, April 2002.
-
(2002)
IETF RFC
, vol.3280
-
-
Housley, R.1
Polk, W.2
Ford, W.3
Solo, D.4
-
11
-
-
84902290299
-
A formal semantics for SPKI
-
Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000). Springer-Verlag, October
-
J. Howell and D. Kotz. A formal semantics for SPKI. In Proceedings of the Sixth European Symposium on Research in Computer Security (ESORICS 2000), volume 1895 of Lecture Notes in Computer Science, pages 140-158. Springer-Verlag, October 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1895
, pp. 140-158
-
-
Howell, J.1
Kotz, D.2
-
12
-
-
84958063551
-
On certificate revocation and validation
-
Proceedings of the Second International Conference on Financial Cryptography (FC'98). Springer-Verlag
-
P. Kocher. On Certificate Revocation and Validation. In Proceedings of the Second International Conference on Financial Cryptography (FC'98), volume 1465 of LNCS, pages 172-177. Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1465
, pp. 172-177
-
-
Kocher, P.1
-
13
-
-
0033749074
-
Reasoning about public-key certification: On bindings between entities and public keys
-
R. Kohlas and U. Maurer. Reasoning About Public-Key Certification: On Bindings Between Entities and Public Keys. Journal on Selected Areas in Communications, pages 551-560, 2000.
-
(2000)
Journal on Selected Areas in Communications
, pp. 551-560
-
-
Kohlas, R.1
Maurer, U.2
-
14
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
February
-
N. Li, B. Grosof, and J. Feigenbaum. Delegation logic: A logic-based approach to distributed authorization. ACM Transactions on Information and System Security (TISSEC), 6(1):128-171, February 2003.
-
(2003)
ACM Transactions on Information and System Security (TISSEC)
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.2
Feigenbaum, J.3
-
16
-
-
0038825043
-
Beyond proof-of-compliancc: Safety and availability analysis in trust management
-
IEEE Computer Society Press, May
-
N. Li, W. Winsborough, and J. Mitchell. Beyond Proof-of-compliancc: Safety and Availability Analysis in Trust Management. In Proceedings of 2003 IEEE Symposium on Security and Privacy, pages 123-139. IEEE Computer Society Press, May 2003.
-
(2003)
Proceedings of 2003 IEEE Symposium on Security and Privacy
, pp. 123-139
-
-
Li, N.1
Winsborough, W.2
Mitchell, J.3
-
19
-
-
0003344055
-
X.509 internet public key infrastructure online certificate status protocol
-
June
-
A. Malpani, S. Galperin, M. Mayers, R. Ankney, and C. Adams. X.509 Internet Public Key Infrastructure Online Certificate Status Protocol. RFC2560, http://www.ietf.org/rfc/rfc2560.txt, June 1999.
-
(1999)
RFC2560
-
-
Malpani, A.1
Galperin, S.2
Mayers, M.3
Ankney, R.4
Adams, C.5
-
20
-
-
0000926365
-
Modelling a public-key infrastructure
-
Springer-Verlag LNCS
-
U. Maurer. Modelling a Public-Key Infrastructure. In ESORICS. Springer-Verlag LNCS, 1996.
-
(1996)
ESORICS
-
-
Maurer, U.1
-
24
-
-
0004001001
-
-
S. Tuecke, V. Welch, D. Engert, L. Pearlman, and M. Thompson. Internet X.509 Public Key Infrastructure Proxy Certificate Profile, http://www.ietf.org/ internet-drafts/draft-ietf-pkix-proxy-10.txt, 2003.
-
(2003)
Internet X.509 Public Key Infrastructure Proxy Certificate Profile
-
-
Tuecke, S.1
Welch, V.2
Engert, D.3
Pearlman, L.4
Thompson, M.5
-
26
-
-
4944261591
-
X.509 proxy certificates for dynamic delegation
-
April
-
V. Welch, I. Foster, C. Kesselman, O. Mulmo, L. Pearlman, S. Tuecke, J. Gawor, S. Meder, and F. Siebenlist. X.509 Proxy Certificates for Dynamic Delegation. In 3rd Annual PKI Research and Development Workshop, April 2004.
-
(2004)
3rd Annual PKI Research and Development Workshop
-
-
Welch, V.1
Foster, I.2
Kesselman, C.3
Mulmo, O.4
Pearlman, L.5
Tuecke, S.6
Gawor, J.7
Meder, S.8
Siebenlist, F.9
|