-
2
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
November
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4) (November 1992) 265-310
-
(1992)
ACM Transactions on Computer Systems
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
3
-
-
0345241829
-
Using authority certificates to create management structures
-
Cambridge, UK. Springer Verlag. In press April
-
Firozabadi, B.S., Sergot, M., Bandmann, O.: Using Authority Certificates to Create Management Structures. Proceeding of Security Protocols, 9th International Workshop, Cambridge, UK. Springer Verlag. In press (April 2001)
-
(2001)
Proceeding of Security Protocols, 9th International Workshop
-
-
Firozabadi, B.S.1
Sergot, M.2
Bandmann, O.3
-
4
-
-
0003358457
-
SPKI certificate theory
-
Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory. IETF RFC 2693 (1998)
-
(1998)
IETF RFC
, vol.2693
-
-
Ellison, C.M.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.M.5
Ylonen, T.6
-
7
-
-
0029700344
-
Decentralized trust management
-
Oakland IEEE
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. Proceedings of 17th Symposium on Security and Privacy, Oakland. IEEE (1996) 164-173
-
(1996)
Proceedings of 17th Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
8
-
-
0013142893
-
Keromytis: The KeyNote trust management system, version 2
-
September
-
Blaze, M., Feigenbaum, J., John Ioannidis, and Angelos D. Keromytis: The KeyNote trust management system, version 2. IETF RFC 2704 (September 1999)
-
(1999)
IETF RFC
, vol.2704
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Angelos, D.4
-
9
-
-
0016555241
-
The protection of information in computer systems
-
September 1975
-
Schroeder, M.D., Saltzer, J.H.: The protection of information in computer systems. IEEE, 63(9) (September 1975) 1278-1308
-
IEEE
, vol.63
, Issue.9
, pp. 1278-1308
-
-
Schroeder, M.D.1
Saltzer, J.H.2
-
15
-
-
0029359817
-
Constraint query languages
-
Kanellakis, P.C., Kuper, G.M., Revesz, P.Z.: Constraint query languages. Journal of Computer and System Sciences, 51(1) (1995) 26-52
-
(1995)
Journal of Computer and System Sciences
, vol.51
, Issue.1
, pp. 26-52
-
-
Kanellakis, P.C.1
Kuper, G.M.2
Revesz, P.Z.3
-
16
-
-
33646151199
-
-
Star middleware site, http://www.starmiddleware.net
-
-
-
-
17
-
-
2842595302
-
An analysis of the proxy problem in distributed systems
-
Oakland, CA
-
Varadharajan, V., Allen, P., Black, S.: An Analysis of the Proxy Problem in Distributed systems. IEEE Symposium on Research in Security and Privacy. Oakland, CA (1991)
-
(1991)
IEEE Symposium on Research in Security and Privacy
-
-
Varadharajan, V.1
Allen, P.2
Black, S.3
-
18
-
-
33748050831
-
An authorization framework based on constrained delegation
-
Hong Kong, China, LNCS 3358, Springer Verlag
-
Gang, Y., Meng, T, Huai-min, W. etc: An Authorization Framework Based on Constrained Delegation, International Symposium on Parallel and Distributed Processing and Applications (ISPA'2004), Hong Kong, China, LNCS 3358, Springer Verlag (2004) 845-857
-
(2004)
International Symposium on Parallel and Distributed Processing and Applications (ISPA'2004)
, pp. 845-857
-
-
Gang, Y.1
Meng, T.2
Huai-Min, W.3
|