-
1
-
-
0031637195
-
On SDSI's linked local name spaces
-
Abadi, M.: On SDSI's linked local name spaces. J. Comp. Sec. 6 (1-2), 3-21 (1998)
-
(1998)
J. Comp. Sec.
, vol.6
, Issue.1-2
, pp. 3-21
-
-
Abadi, M.1
-
2
-
-
0027667638
-
A calculus for access control in distributed systems
-
Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A calculus for access control in distributed systems. ACM Trans. Prog. Lang. Syst. 15 (4), 706-734 (1993)
-
(1993)
ACM Trans. Prog. Lang. Syst.
, vol.15
, Issue.4
, pp. 706-734
-
-
Abadi, M.1
Burrows, M.2
Lampson, B.3
Plotkin, G.4
-
5
-
-
0004078695
-
-
IETF RFC 2704, Sept
-
Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust-management system, version 2. IETF RFC 2704, Sept (1999)
-
(1999)
The KeyNote Trust-management System, Version 2
-
-
Blaze, M.1
Feigenbaum, J.2
Ioannidis, J.3
Keromytis, A.D.4
-
6
-
-
0029700344
-
Decentralized trust management
-
IEEE Computer Society Press
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164-173. IEEE Computer Society Press (1996)
-
(1996)
Proceedings of the 1996 IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
7
-
-
0035680371
-
Certificate chain discovery in SPKI/SDSI
-
Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI/SDSI. J. Comp. Sec. 9 (4), 285-322 (2001)
-
(2001)
J. Comp. Sec.
, vol.9
, Issue.4
, pp. 285-322
-
-
Clarke, D.1
Elien, J.-E.2
Ellison, C.3
Fredette, M.4
Morcos, A.5
Rivest, R.L.6
-
8
-
-
0021509216
-
Linear-time algorithms for testing the satisfiability of propositional horn formulae
-
Dowling, W.F., Gallier, J.H.: Linear-time algorithms for testing the satisfiability of propositional horn formulae. J. Logic Prog. 1 (3), 267-284 (1984)
-
(1984)
J. Logic Prog.
, vol.1
, Issue.3
, pp. 267-284
-
-
Dowling, W.F.1
Gallier, J.H.2
-
9
-
-
0003546303
-
Simple public key certificates
-
Internet Draft (work in progress), July Available at
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Simple public key certificates. Internet Draft (work in progress), July (1999) Available at http://world.std.com/~cme/spki.txt
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
10
-
-
0003593599
-
SPKI certificate theory
-
IETF RFC 2693, Sept
-
Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. IETF RFC 2693, Sept. (1999)
-
(1999)
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
11
-
-
0035067717
-
A logic for SDSI's linked local name spaces
-
Halpern, J., van der Meyden, R.: A logic for SDSI's linked local name spaces. J. Comp. Sec. 9 (1-2), 47-74 (2001)
-
(2001)
J. Comp. Sec.
, vol.9
, Issue.1-2
, pp. 47-74
-
-
Halpern, J.1
van der Meyden, R.2
-
12
-
-
0141528667
-
A logical reconstruction of SPKI
-
Halpern, J., van der Meyden, R.: A logical reconstruction of SPKI. J. Comp. Sec. 11 (4), 581-614 (2003)
-
(2003)
J. Comp. Sec.
, vol.11
, Issue.4
, pp. 581-614
-
-
Halpern, J.1
van der Meyden, R.2
-
13
-
-
3042835585
-
Naming and sharing resources acroos administrative boundaries
-
PhD thesis, Dartmouth College, May
-
Howell, J.R.: Naming and sharing resources acroos administrative boundaries. PhD thesis, Dartmouth College, May (2000)
-
(2000)
-
-
Howell, J.R.1
-
15
-
-
4243532938
-
Constraint logic programming: A survey
-
Jaffar, J., Maher, M.J.: Constraint logic programming: A survey. J. Logic Prog. 19/20, 503-580 (1994)
-
(1994)
J. Logic Prog.
, vol.19-20
, pp. 503-580
-
-
Jaffar, J.1
Maher, M.J.2
-
17
-
-
0029359817
-
Constraint query languages
-
Kanellakis, P.C., Kuper, G.M., Revesz, P.Z.: Constraint query languages. J. Comp. Syst. Sci. 51 (1), 26-52 (1995)
-
(1995)
J. Comp. Syst. Sci.
, vol.51
, Issue.1
, pp. 26-52
-
-
Kanellakis, P.C.1
Kuper, G.M.2
Revesz, P.Z.3
-
19
-
-
84976834054
-
Authentication in distributed systems: Theory and practice
-
Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Inf. Syst. Sec. 10 (4), 265-310 (1992)
-
(1992)
ACM Trans. Inf. Syst. Sec.
, vol.10
, Issue.4
, pp. 265-310
-
-
Lampson, B.1
Abadi, M.2
Burrows, M.3
Wobber, E.4
-
21
-
-
0041524661
-
Delegation logic: A logic-based approach to distributed authorization
-
Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Sec. 6 (1), 128-171 (2003)
-
(2003)
ACM Trans. Inf. Syst. Sec.
, vol.6
, Issue.1
, pp. 128-171
-
-
Li, N.1
Grosof, B.N.2
Feigenbaum, J.3
-
23
-
-
33646250342
-
-
Aug. Unpublished manuscript. Available at
-
Li, N., Mitchell, J.C., Qiu, Y., Winsborough, W.H., Seamons, K.E., Halcrow, M., Jacobson, J.: RTML: A Role-based Trust-management Markup Language, Aug. (2002) Unpublished manuscript. Available at http://www.cs.purdue.edu/homes/ninghui/papers/rtml.pdf
-
(2002)
RTML: A Role-based Trust-management Markup Language
-
-
Li, N.1
Mitchell, J.C.2
Qiu, Y.3
Winsborough, W.H.4
Seamons, K.E.5
Halcrow, M.6
Jacobson, J.7
-
24
-
-
0036085965
-
Design of a role-based trust management framework
-
IEEE Computer Society Press
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust management framework. In: Proceedings of the 2002 IEEE Symposium on Security and Privacy, pp. 114-130. IEEE Computer Society Press (2002)
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 114-130
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
25
-
-
30544438141
-
Beyond proof-of-compliance: Security analysis in trust management
-
Li, N., Mitchell, J.C., Winsborough, W.H.: Beyond proof-of-compliance: Security analysis in trust management. J. ACM 52 (3), (2005)
-
(2005)
J. ACM
, vol.52
, Issue.3
-
-
Li, N.1
Mitchell, J.C.2
Winsborough, W.H.3
-
26
-
-
0037243196
-
Distributed credential chain discovery in trust management
-
Li, N., Winsborough, W.H., Mitchell, J.C.: Distributed credential chain discovery in trust management. J. Comp. Sec. 11 (1), 35-86 (2003)
-
(2003)
J. Comp. Sec.
, vol.11
, Issue.1
, pp. 35-86
-
-
Li, N.1
Winsborough, W.H.2
Mitchell, J.C.3
-
28
-
-
0000829789
-
-
Elsevier Science
-
Miller, D., Nadathur, G., Pfenning, F., Scedrov, A.: Uniform Proofs as a Foundation for Logic Programming, vol. 51 of Annals of Pure and Applied Logic, pp. 125-157. Elsevier Science (1991)
-
(1991)
Uniform Proofs As a Foundation for Logic Programming, Vol. 51 of Annals of Pure and Applied Logic
, pp. 125-157
-
-
Miller, D.1
Nadathur, G.2
Pfenning, F.3
Scedrov, A.4
-
29
-
-
0347367138
-
Correspondences between classical, intuitionistic and uniform provability
-
Nadathur, G.: Correspondences between classical, intuitionistic and uniform provability. Theoretical Computer Science 232 (1-2), 273-298 (2000)
-
(2000)
Theoretical Computer Science
, vol.232
, Issue.1-2
, pp. 273-298
-
-
Nadathur, G.1
-
30
-
-
0003614529
-
SDSI - A simple distributed security infrastructure
-
Oct. Available at
-
Rivest, R.L., Lampson, B.: SDSI - a simple distributed security infrastructure, Oct. (1996) Available at http://theory.lcs.mit.edu/~rivest/sdsi11.html
-
(1996)
-
-
Rivest, R.L.1
Lampson, B.2
|